Palo Alto Firewall -Destination NAT and Packet Flow (Live Class)
Vložit
- čas přidán 8. 09. 2024
- For complete Self-paced training materials visit at
nettechcloud.c...
----------------------------------------------------------------------------------------------------------------------------------------------
COURSE : Palo Alto Firewall Configuration, Management and Troubleshooting - PAN 10
Trainer : Manoj Verma , CCIE 43923
_______________________________________________________________________________________
TOPICS:
[FREE PREVIEW - Module 1, 2, 28 and 39]
Module 1: Overview of Firewall Technologies [FREE PREVIEW]
Module 2 - Palo Alto Firewall Features [FREE PREVIEW]
Module 3 - Palo Alto Firewall Platforms and Architecture
Module 4 - Initial Configuration
Module 5 - Creating your virtual Lab in EVE-NG
Module 6 - Creating your virtual Lab in AWS Cloud
Module 7 - Palo Alto Firewall Web Interface (WebUI)
Module 8 - Interface Configuration and Deployments
Module 9 - TAP Mode Interface Type
Module 10 - Vwire and Layer 2 Interface Type
Module 11 - Layer 3 and HA Interface Type
Module 12 - Palo Alto Firewall Security Polices
Module 13 - Network Address Translation (Theory)
Module 14 - Understanding NAT Policy (Theory)
Module 15 - Network Address Translation LAB (PART 1)
Module 16 - U-turn NAT (One Armed)
Module 17 - NAT Oversubscription and ICMP packet Translation
Module 18 - Application Identification APP ID
Module 19 - Decryption Concepts
Module 20 - SSL Decryption LAB
Module 21 - Content ID and Security Profiles (Theory)
Module 22 - AV, Anti spyware and Vulnerability Protection Profiles (LAB)
Module 23 - URL Filtering Security Profile
Module 24 - Wild Fire Analysis (Theory)
Module 25 - Wild Fire Analysis (LAB)
Module 26 - File Blocking Profile
Module 27 - User ID and Captive Portal
Module 28 - IPsec site to site VPN (Theory) [FREE PREVIEW]
Module 29 - S2S IPsec VPN between PAs (Pre Shared Key)
Module 30 - S2S IPsec VPN between PAs (Certificate Based)
Module 31 - S2S IPsec VPN between Overlapping Networks
Module 32 - S2S IPsec VPN between Cisco Router and PA (Policy Based)
Module 33 - S2S IPsec VPN between Cisco Router and PA (Route Based)
Module 34 - Global Protect VPN (Theory)
Module 35 - Global Protect VPN (LAB)
Module 36 - HA Mode Deployment Active-Passive
Module 37 - HA Mode Deployment Active-Active
Module 38 - Zone Protection Profile and DoS Protection
Module 39 - Packet Flow and Troubleshooting [FREE PREVIEW]
Module 40 - PANOS Software upgrade
Module 41 - Palo Alto Firewall Routing - VR, Static, RIP, OSPF, BGP
Module 42 - DUAL ISP Redundancy (PBF)
Module 43 - Packet Capture, Logging, Reporting etc.
“We not only explain the theory but how to use every feature in real life with practical demonstration and troubleshooting"
#paloalto #pcnse #firewall
Very well-explained and the best video on DNAT and it cleared my many concepts. Thanks.
Thanks.
One of the best videos on DNAT and UTurn NAT. Very well explained 🙏
Glad. You liked.
Well explained sir... very informative video
very nice video
Excellent training
Very indepth explanation.... thanks
Thanks for sharing knowledge
Superb.
Great video sir...
Very informative!!!!
Glad you liked it
Very informative sir
Really appreciated
Thanks.
please show source and static NAT too..
Hi Sir, thanks for your quality explanations. I have a worry, I can see from the topology that the Outside interface IP is 114.30.77.51 but in your explanations you keep mentioning 114.30.77.52. Thanks
51 is firewall outside interface IP..and 52 is the free IP in this subnet pool that we are using for DMZ server
Why you have not mention dest ip add in security policy?
If we need to create specific security policy for the server isntead "any" which IP address we need to use? post nat IP address or pre nat public IP address in the security policy? If pre-nat public ip address need to use why is that as we already translated the destinatin IP address before going to security policy.
Mirai C2 attack alert on AlienVault and system compromise but PaloAlto Firewall traffic logs not show Attackers Destination IP on traffic log? can u plz help me why PaloALto not show Attacker Destination IP on log traffic in firewall?
can we get more videos on PaloAlto fw
Please check czcams.com/play/PLQUiLs8Ui40s1LzLd16rHMMfDEYZE5tdl.html
For complete course visit nettechcloud.com
R SW.