Securing remote access in palo alto networks

practical techniques to enable and protect remote users, improve your security posture and troubleshoot next-genertion firewalls

  • 1 Want to read
  • 0 Currently reading
  • 0 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 1 Want to read
  • 0 Currently reading
  • 0 Have read

Buy this book

Last edited by 75browser
October 12, 2021 | History

Securing remote access in palo alto networks

practical techniques to enable and protect remote users, improve your security posture and troubleshoot next-genertion firewalls

  • 1 Want to read
  • 0 Currently reading
  • 0 Have read

Summary
This book focuses largely on different methodologies for connecting remote users, highlighting the benefits and drawbacks as well as step-by-step instructions. You'll understand phishing prevention and log forwarding and find a comprehensive section on troubleshooting common issues with the help of examples.

What your will learn
Understand how log forwarding is configured on the firewall
Focus on effectively enabling remote access
Explore alternative ways for connecting users and remote networks
Protect against phishing with credential detection
Understand how to troubleshoot complex issues confidently
Strengthen the security posture of your firewalls

What this book is for
This book is for anyone who wants to learn more about remote access for users and remote locations by using Global Protect and Prisma access and by deploying Large Scale VPN Basic knowledge of Palo Alto Networks, network protocols, and network design will be helpful, which is why reading Mastering Palo Alto Networks is recommended first to help you make the most of this book.

Publish Date
Publisher
Packt Publishing
Language
English
Pages
336

Buy this book

Book Details


Table of Contents

Section 1. Leveraging the Cloud and Enabling Remote Access
Chapter 1. Centralizing Logs
Chapter 2. Configuring Advanced Global Protect Features
Chapter 3. Setting up site to Site VPNs and Large-Scale VPNs
Chapter 4. Configuring Prima Access
Section 2. Tools,, Troubleshooting and Best Practices
Chapter 5. Enabling Features to improve Your Security Posture
Chapter 6. Anti-Phishing with User Credential Detection
Chapter 7. Practical Troubleshooting and Best Practice tools

Edition Notes

Published in
Birmingham

Classifications

Dewey Decimal Class
004/6

The Physical Object

Format
paperback
Number of pages
336
Dimensions
.7 x 7.5 x inches

ID Numbers

Open Library
OL35261449M
ISBN 13
9781801077446

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
October 12, 2021 Edited by 75browser Edited without comment.
October 12, 2021 Edited by 75browser Edited without comment.
October 12, 2021 Created by 75browser Added new book.