官术网_书友最值得收藏!

Chapter 1: Understanding the Core Technologies

In this chapter, we're going to examine the core technologies that make up the Palo Alto Networks firewall.

We are going to take a closer look at how security zones control how security, Network Address Translation (NAT), and routing verdicts are made. We will review the mechanics behind App-ID and Content-ID so you get a deeper understanding of how packets are processed and security decisions are made by the firewall, and we will review how User-ID contributes to a more robust security stance by applying group-based or user-based access control.

This chapter will cover the following topics:

  • Understanding the zone-based firewall
  • Understanding App-ID and Content-ID
  • The management and data plane
  • Authenticating users with User-ID
主站蜘蛛池模板: 玛沁县| 赣州市| 惠水县| 辽宁省| 民丰县| 年辖:市辖区| 科技| 开江县| 北流市| 枣庄市| 洛浦县| 萝北县| 石泉县| 安图县| 屏山县| 怀远县| 宜君县| 建水县| 灌云县| 蕲春县| 什邡市| 博客| 镶黄旗| 彭泽县| 亳州市| 郁南县| 工布江达县| 禄劝| 高台县| 新绛县| 四子王旗| 多伦县| 海宁市| 临朐县| 东兰县| 澄迈县| 洮南市| 中阳县| 贵南县| 安阳市| 甘南县|