View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

zone

SEC0321 - PAN 9.0 Virtual System (Part 3)

The video looks at different aspects and use-cases of Virtual System (VSYS) feature on Palo Alto firewall. The lab begins with creations of two VSYS; internet and guest, and their configuration to provide logical separation within a physical firewall. The remaining part of the labs covers more advanced use-cases of virtual routing, external zone, and shared gateway.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0321 - PAN 9.0 Virtual System (Part 2)

The video looks at different aspects and use-cases of Virtual System (VSYS) feature on Palo Alto firewall. The lab begins with creations of two VSYS; internet and guest, and their configuration to provide logical separation within a physical firewall. The remaining part of the labs covers more advanced use-cases of virtual routing, external zone, and shared gateway.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0321 - PAN 9.0 Virtual System (Part 1)

The video looks at different aspects and use-cases of Virtual System (VSYS) feature on Palo Alto firewall. The lab begins with creations of two VSYS; internet and guest, and their configuration to provide logical separation within a physical firewall. The remaining part of the labs covers more advanced use-cases of virtual routing, external zone, and shared gateway.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0320 - PAN 9.0 Tunnel Inspection (Part 3)

The video shows another capability on Palo Alto firewall to inspect tunneled traffic. We will begin with demonstrating the effect a traffic encapsulation has on security policy enforcement using a GRE tunnel. We will enable traffic re-zoning to allow tunneled traffic to be properly inspected by the firewall.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0320 - PAN 9.0 Tunnel Inspection (Part 2)

The video shows another capability on Palo Alto firewall to inspect tunneled traffic. We will begin with demonstrating the effect a traffic encapsulation has on security policy enforcement using a GRE tunnel. We will enable traffic re-zoning to allow tunneled traffic to be properly inspected by the firewall.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0320 - PAN 9.0 Tunnel Inspection (Part 1)

The video shows another capability on Palo Alto firewall to inspect tunneled traffic. We will begin with demonstrating the effect a traffic encapsulation has on security policy enforcement using a GRE tunnel. We will enable traffic re-zoning to allow tunneled traffic to be properly inspected by the firewall.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0319 - PAN 9.0 Zone and DoS Protection (Part 2)

The video takes you through features on Palo Alto firewall that protect you from various type of network attacks such as volumetric, protocol, and reconnaissance, using Zone and DoS protection. We will first look at Zone protection that provides protection at a zone-level, followed by DoS protection that protect a host or group of host.

Rating: 
0
No votes yet
Difficulty Level: 
3

SEC0319 - PAN 9.0 Zone and DoS Protection (Part 1)

The video takes you through features on Palo Alto firewall that protect you from various type of network attacks such as volumetric, protocol, and reconnaissance, using Zone and DoS protection. We will first look at Zone protection that provides protection at a zone-level, followed by DoS protection that protect a host or group of host.

Rating: 
0
No votes yet
Difficulty Level: 
3

RS0162 - SD-WAN Zone-Based Firewall (Part 3)

The video shows how to configure Zone-Based Firewall in Cisco SD-WAN. We will cover the basic of ZBFW and its configuration components before getting into use-case scenarios of using ZBFW to restrict guest internet access, as well as traffic within and across different VPN to help further enforce security policy in an SD-WAN deployment.
Rating: 
0
No votes yet
Difficulty Level: 
3

RS0162 - SD-WAN Zone-Based Firewall (Part 2)

The video shows how to configure Zone-Based Firewall in Cisco SD-WAN. We will cover the basic of ZBFW and its configuration components before getting into use-case scenarios of using ZBFW to restrict guest internet access, as well as traffic within and across different VPN to help further enforce security policy in an SD-WAN deployment.
Rating: 
0
No votes yet
Difficulty Level: 
3

Pages

Subscribe to RSS - zone