官术网_书友最值得收藏!

Chapter 1: Understanding the Core Technologies

In this chapter, we're going to examine the core technologies that make up the Palo Alto Networks firewall.

We are going to take a closer look at how security zones control how security, Network Address Translation (NAT), and routing verdicts are made. We will review the mechanics behind App-ID and Content-ID so you get a deeper understanding of how packets are processed and security decisions are made by the firewall, and we will review how User-ID contributes to a more robust security stance by applying group-based or user-based access control.

This chapter will cover the following topics:

  • Understanding the zone-based firewall
  • Understanding App-ID and Content-ID
  • The management and data plane
  • Authenticating users with User-ID
主站蜘蛛池模板: 静安区| 司法| 永胜县| 远安县| 台南县| 宾阳县| 雷山县| 泰来县| 阳西县| 宁国市| 宝鸡市| 临洮县| 和顺县| 周宁县| 开化县| 武邑县| 图木舒克市| 临西县| 青龙| 镇雄县| 永新县| 灌阳县| 安义县| 平陆县| 庆阳市| 新疆| 浙江省| 南乐县| 大余县| 连南| 昭平县| 高淳县| 湟中县| 德安县| 澄江县| 东宁县| 中西区| 绩溪县| 青龙| 天门市| 宁夏|