舉報

會員
Mastering Palo Alto Networks
Tosafeguardagainstsecuritythreats,itiscrucialtoensurethatyourorganizationiseffectivelysecuredacrossnetworks,mobiledevices,andthecloud.PaloAltoNetworks’integratedplatformmakesiteasytomanagenetworkandcloudsecurityalongwithendpointprotectionandawiderangeofsecurityservices.Withthisbook,you'llunderstandPaloAltoNetworksandlearnhowtoimplementessentialtechniques,rightfromdeployingfirewallsthroughtoadvancedtroubleshooting.ThebookstartsbyshowingyouhowtosetupandconfigurethePaloAltoNetworksfirewall,helpingyoutounderstandthetechnologyandappreciatethesimple,yetpowerful,PAN-OSplatform.Onceyou'veexploredthewebinterfaceandcommand-linestructure,you'llbeabletopredictexpectedbehaviorandtroubleshootanomalieswithconfidence.You'lllearnwhyandhowtocreatestrongsecuritypoliciesanddiscoverhowthefirewallprotectsagainstencryptedthreats.Inadditiontothis,you'llgettogripswithidentifyingusersandcontrollingaccesstoyournetworkwithuserIDsandevenprioritizetrafficusingqualityofservice(QoS).Thebookwillshowyouhowtoenablespecialmodesonthefirewallforsharedenvironmentsandextendsecuritycapabilitiestosmallerlocations.Bytheendofthisnetworksecuritybook,you'llbewell-versedwithadvancedtroubleshootingtechniquesandbestpracticesrecommendedbyanexperiencedsecurityengineerandPaloAltoNetworksexpert.
目錄(107章)
倒序
- 封面
- 版權信息
- Why subscribe?
- Contributors About the author
- About the reviewers
- Packt is searching for authors like you
- Preface
- Section 1: First Steps and Basic Configuration
- Chapter 1: Understanding the Core Technologies
- Technical requirements
- Understanding the zone-based firewall
- Understanding App-ID and Content-ID
- The management and data plane
- Authenticating users with User-ID
- Summary
- Chapter 2: Setting Up a New Device
- Technical requirements
- Gaining access to the user interface
- Adding licenses and setting up dynamic updates
- Upgrading the firewall
- Hardening the management interface
- Understanding the interface types
- Section 2: Advanced Configuration and Putting the Features to Work
- Chapter 3: Building Strong Policies
- Technical requirements
- Understanding and preparing security profiles
- Understanding and building security rules
- Creating NAT rules
- Summary
- Chapter 4: Taking Control of Sessions
- Technical requirements
- Controlling the bandwidth with quality of service policies
- Leveraging SSL decryption to break open encrypted sessions
- Redirecting sessions over different paths using policy-based forwarding
- Summary
- Chapter 5: Services and Operational Modes
- Technical requirements
- Applying a DHCP client and DHCP server
- Configuring a DNS proxy
- Setting up high availability
- Enabling virtual systems
- Managing certificates
- Summary
- Chapter 6: Identifying Users and Controlling Access
- Technical requirements
- User-ID basics
- Configuring group mapping
- Setting up a captive portal
- Using an API for User-ID
- User credential detection
- Summary
- Chapter 7: Managing Firewalls through Panorama
- Technical requirements
- Setting up Panorama
- Device groups
- Setting up templates and template stacks
- Panorama management
- Summary
- Section 3: Maintenance and Troubleshooting
- Chapter 8: Upgrading Firewalls and Panorama
- Technical requirements
- Documenting the key aspects
- Preparing for the upgrade
- The upgrade process
- The rollback procedure
- Special case for upgrading older hardware
- The downgrade procedure
- Summary
- Chapter 9: Logging and Reporting
- Technical requirements
- Log storage and forwarding
- Configuring log collectors and log collector groups
- Logging Service
- External logging
- Configuring log forwarding
- Reporting
- The Application Command Center
- Filtering logs
- Summary
- z: VPN and Advanced Protection
- Technical requirements
- Setting up the VPN
- Custom applications and threats
- Zone protection and DoS protection
- Summary
- Chapter 11: Troubleshooting Common Session Issues
- Technical requirements
- Using the tools at our disposal
- Interpreting session details
- Using the troubleshooting tool
- Using maintenance mode to resolve and recover from system issues
- Summary
- Chapter 12: A Deep Dive into Troubleshooting
- Technical requirements
- Understanding global counters
- Analyzing session flows
- Debugging processes
- CLI troubleshooting commands cheat sheet
- Summary
- Chapter 13: Supporting Tools
- Technical requirements
- Integrating Palo Alto Networks with Splunk
- Monitoring with Pan(w)achrome
- Threat intelligence with MineMeld
- Exploring the API
- Summary
- Other Books You May Enjoy 更新時間:2021-06-11 18:34:28
推薦閱讀
- 應對多突發事件的信息系統應用技術
- .NET Core 2.0 應用程序高級調試:完全掌握Linux、macOS和Windows跨平臺調試技術
- WebGIS之Element前端組件開發
- CSS + DIV網頁樣式布局實戰從入門到精通
- ASP.NET Core 3 框架揭秘(上下冊)
- ASP.NET從入門到精通(第5版)
- P2P網絡測量與分析
- 矛與盾:黑客就這幾招
- Learn Wireshark
- 計算機網絡技術及應用
- 用Microsoft Project 2007構建企業項目管理信息系統
- 全球網絡空間治理體系與中國方案
- 網站說服力
- Bootstrap響應式Web前端開發
- 性能之巔:洞悉系統、企業與云計算
- 多云和混合云:云原生多集群和應用管理
- Grails技術精解與開發實戰
- 基于工作過程網站設計與制作項目教程
- 云計算原理與實踐
- CSS3+DIV網頁樣式與布局從入門到精通(微課精編版)
- 計算機網絡(第3版)
- Instant HubSpot Dashboard Customization
- OpenStack云計算實戰手冊(第3版)
- Dreamweaver CC2018中文版入門與提高
- Drupal 8 Theming with Twig
- 基于大范圍模式的互聯網拓撲建模
- 企業互聯網架構原理與實踐
- 軟硬件融合:超大規模云計算架構創新之路
- 隱姓埋名
- 計算機網絡實驗教程