Course Introduction

Palo Alto is leader in next generation firewalls. After completing this course, students will be able to configure, install, and administer Palo Alto Networks firewall. Students will also learn about: the configuration steps for the networking, security, logging, and reporting features of the PAN-OS, and the configuration steps for VPN & High Availability. This course evaluates knowledge required by firewall administrators to design, install, configure, maintain, and troubleshoot Palo Alto Networks implementations.

Enquire Now

Salary of Security engineers in Bangalore, India​

ccse

Today is the day you make a decision that can transform your life and IT career forever.

Palo Alto – Configuration and Implementation

Module 1 – Introduction
Module 2 – Administration & Management

  • Using GUI
  • Using CLI Password Management
  • Certificate Management
  • Log Forwarding
  • PAN-OS & Software Update

Module 3 – Interface Configuration

  • Virtual Wire Tap
  • Sub interfaces
  • Security Zones
  • VLAN Objects QoS

Module 4 – Layer 3 Configurations

  • Advance NAT Features
  • IPv6 Overview
  • Policy Based
  • Forwarding
  • Routing Protocols (OSPF)
  • Interface Management
  • Service Routes
  • DHCP
  • Virtual Routers

Module 5- Security Policy

  • Policy Objects
  • Defining Security Policy
  • DMZ

Module 6- NAT

  • Source and Destination NAT
  • NAT Policy Configuration
  • Module 7 – App-ID™
  • App-ID Process
  • Security Policy Configuration
  • Policy Administration
  • Defining new Application Signatures
  • Application Override

Module 7 – App-IDTM

  • App-ID Process
  • Security Policy Configuration
  • Policy Administration
  • Defining new Application Signatures
  • Application Override

Module 8 – Content-ID™

  • Antivirus
  • Anti-spyware
  • Vulnerability
  • URL Filtering
  • File Blocking: WildFire™
  • Zone Protection
  • Custom Threat Signatures
  • Data Filtering
  • DoS Protection
  • Botnet Report

Module 9 – Authentication Profiles

  • Setting Up Authentication Profiles
  • Creating a Local User Database
  • Configuring RADIUS Server Settings
  • Configuring LDAP Server Settings
  • Configuring Kerberos Settings
  • Module 10 – User-ID™
  • User-ID Agent
  • Enumerating Users
  • Mapping Users to IP
  • Captive Portal
  • LDAP Integration
  • Users in Security Policy

Module 10 – User-IDTM

  • User-ID Agent
  • Enumerating Users
  • Mapping Users to IP
  • Captive Portal
  • LDAP Integration
  • Users in Security Policy

Module 11 – Decryption

  • SSL Inbound and Outbound

Module 12 – VPN

  • Virtual Private Networks – Intro
  • VPN Tunnels
  • IPSec and IKE
  • IPSec and IKE
  • Crypto Profiles
  • Setting Up IPSec VPNs
  • Defining IKE Gateways
  • Setting Up IPSec Tunnels
  • Defining IKE Crypto Profiles
  • Defining IPSec Crypto Profiles
  • Viewing IPSec Tunnel Status on the Firewall.

Module 13 – Reports and Logs

    • Logging Configuration
    • Scheduling Log Exports
    • Defining Configuration Log Settings
    • Defining System Log Settings
    • Defining HIP Match Log Settings
    • Defining Alarm Log Settings
    • Managing Log Settings
    • Configuring Syslog Servers
    • Custom Syslog Field Descriptions

Module 14 – High Availability

  • Configuring Active/Active HA

Module 15 – Panorama (Only Theory)

  • Device Groups & Templates
  • Shared Policy
  • Config Management
  • Reporting and Log Collection
    • Cisco Certified Network Associate (200-301 CCNA) is recommended before.
    • Knowledge of network protocols
    • Basic understanding of firewall concepts

Networking, System and security professionals involved in the management, configuration, administration, and monitoring of Security devices used to secure their organizations’ networks should attend this course.

How to earn 6 figure salary in IT Industry
Get Our Free Guide to
Overlay Image
Sky Rocket Your Agency Income
Get Our Free Guide to