官术网_书友最值得收藏!

Chapter 1: Understanding the Core Technologies

In this chapter, we're going to examine the core technologies that make up the Palo Alto Networks firewall.

We are going to take a closer look at how security zones control how security, Network Address Translation (NAT), and routing verdicts are made. We will review the mechanics behind App-ID and Content-ID so you get a deeper understanding of how packets are processed and security decisions are made by the firewall, and we will review how User-ID contributes to a more robust security stance by applying group-based or user-based access control.

This chapter will cover the following topics:

  • Understanding the zone-based firewall
  • Understanding App-ID and Content-ID
  • The management and data plane
  • Authenticating users with User-ID
主站蜘蛛池模板: 东莞市| 安平县| 双辽市| 谷城县| 阳谷县| 西乌珠穆沁旗| 禹城市| 黔南| 凉山| 祁东县| 当涂县| 南木林县| 滨州市| 定西市| 诸暨市| 汝阳县| 集安市| 兴山县| 永仁县| 洪洞县| 瑞安市| 宜兰市| 抚州市| 浦北县| 汽车| 余江县| 乐都县| 黄浦区| 冷水江市| 灵台县| 通州区| 遵化市| 德清县| 文安县| 定南县| 兰考县| 敖汉旗| 新巴尔虎左旗| 凌源市| 商城县| 永嘉县|