Alto MS Series Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Tragbare Lautsprecher Alto MS Series herunter. PAN-OS® Getting Started Guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 108
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Palo Alto Networks

Palo Alto Networks®PAN-OS® Getting Started GuidePAN-OS 6.0

Seite 2 - About this Guide

6 Getting Started GuideSet Up Management Access to the Firewall Integrate the Firewall into Your Management NetworkStep 4 Configure the interface. 1

Seite 3 - Table of Contents

96 Getting Started GuideConfigure an Active/Passive Pair Set Up High AvailabilityConfigure an Active/Passive PairThe following procedure shows how t

Seite 4 - Table of Contents

Getting Started Guide 97Set Up High Availability Configure an Active/Passive Pair Step 4 Set up the control link connection.This example shows an in-

Seite 5 - Management Network

98 Getting Started GuideConfigure an Active/Passive Pair Set Up High AvailabilityStep 7 Set up the data link connection (HA2) and the backup HA2 con

Seite 6 - Perform Initial Configuration

Getting Started Guide 99Set Up High Availability Configure an Active/Passive Pair Step 9 Set the device priority and enable preemption.This setting i

Seite 7

100 Getting Started GuideConfigure an Active/Passive Pair Set Up High AvailabilityStep 12 Enable HA. 1. Select Device > High Availability > Ge

Seite 8 - 4 Getting Started Guide

Getting Started Guide 101Set Up High Availability Configure an Active/Passive Pair On the passive device: The state of the local device should displa

Seite 9

102 Getting Started GuideDefine the Failover Conditions Set Up High AvailabilityDefine the Failover ConditionsConfigure the Failover Triggers Step 1

Seite 10 - 6 Getting Started Guide

Getting Started Guide 103Set Up High Availability Verify Failover Verify Failover To test that your HA configuration works properly trigger a manual

Seite 11

104 Getting Started GuideVerify Failover Set Up High Availability

Seite 12 - 8 Getting Started Guide

Getting Started Guide 7Integrate the Firewall into Your Management Network Set Up Management Access to the Firewall Step 5 Because the firewall uses

Seite 13 - Activate Firewall Services

8 Getting Started GuideSet Up Management Access to the Firewall Integrate the Firewall into Your Management NetworkStep 6 Configure an external-faci

Seite 14

Getting Started Guide 9Integrate the Firewall into Your Management Network Activate Firewall Services Activate Firewall ServicesBefore you can begin

Seite 15 - Manage Content Updates

10 Getting Started GuideActivate Firewall Services Integrate the Firewall into Your Management Network Threat Prevention—Provides antivirus, anti-s

Seite 16 - 12 Getting Started Guide

Getting Started Guide 11Integrate the Firewall into Your Management Network Activate Firewall Services Manage Content UpdatesIn order to stay ahead o

Seite 17 - Install Software Updates

12 Getting Started GuideActivate Firewall Services Integrate the Firewall into Your Management NetworkStep 2 Check for the latest updates.Click Chec

Seite 18 - 14 Getting Started Guide

Getting Started Guide 13Integrate the Firewall into Your Management Network Activate Firewall Services Install Software UpdatesWhen installing a new

Seite 19 - Add Firewall Administrators

14 Getting Started GuideActivate Firewall Services Integrate the Firewall into Your Management NetworkStep 3 Download the update.Note If your firewa

Seite 20 - How to Configure

Getting Started Guide 15Integrate the Firewall into Your Management Network Add Firewall Administrators Add Firewall AdministratorsBy default, every

Seite 21

iiContact InformationCorporate Headquarters:Palo Alto Networks4401 Great America ParkwaySanta Clara, CA 95054-1211http://www.paloaltonetworks.com/cont

Seite 22 - 18 Getting Started Guide

16 Getting Started GuideAdd Firewall Administrators Integrate the Firewall into Your Management Network Local administrator account with SSL-based

Seite 23 - Monitor the Firewall

Getting Started Guide 17Integrate the Firewall into Your Management Network Add Firewall Administrators Create a Local AdministratorStep 1 If you pla

Seite 24 - View Local Log Data

18 Getting Started GuideAdd Firewall Administrators Integrate the Firewall into Your Management NetworkStep 2 (Optional) Set requirements for local

Seite 25 - View Reports

Getting Started Guide 19Integrate the Firewall into Your Management Network Monitor the Firewall Monitor the FirewallAnother thing to consider during

Seite 26

20 Getting Started GuideMonitor the Firewall Integrate the Firewall into Your Management NetworkView Local Log DataAll Palo Alto Networks next-gener

Seite 27 - Set Up SNMP Trap Destinations

Getting Started Guide 21Integrate the Firewall into Your Management Network Monitor the Firewall Display Log Data on the DashboardYou can also monito

Seite 28 - 24 Getting Started Guide

22 Getting Started GuideMonitor the Firewall Integrate the Firewall into Your Management NetworkForward Logs to External ServicesDepending on the ty

Seite 29 - Define Syslog Servers

Getting Started Guide 23Integrate the Firewall into Your Management Network Monitor the Firewall Set Up Email AlertsSet Up SNMP Trap DestinationsSimp

Seite 30 - 26 Getting Started Guide

24 Getting Started GuideMonitor the Firewall Integrate the Firewall into Your Management NetworkYou can also use SNMP to monitor the firewall. In th

Seite 31 - Enable Log Forwarding

Getting Started Guide 25Integrate the Firewall into Your Management Network Monitor the Firewall Define Syslog ServersSyslog is a standard log transp

Seite 32 - 28 Getting Started Guide

Getting Started Guide iiiTable of ContentsIntegrate the Firewall into Your Management Network . . . . . . . . . . . . . . . . . .1Set Up Management A

Seite 33

26 Getting Started GuideMonitor the Firewall Integrate the Firewall into Your Management NetworkThere are five log types that PAN-OS can export to a

Seite 34

Getting Started Guide 27Integrate the Firewall into Your Management Network Monitor the Firewall Forward Logs to PanoramaBefore you can forward log f

Seite 35 - Create the Security Perimeter

28 Getting Started GuideMonitor the Firewall Integrate the Firewall into Your Management Network Config Logs—Enable forwarding of Config logs by sp

Seite 36 - Security Perimeter Overview

Getting Started Guide 29Integrate the Firewall into Your Management Network Monitor the Firewall Monitor the Firewall Using SNMPAll Palo Alto Network

Seite 37 - Layer 3 Deployments

30 Getting Started GuideMonitor the Firewall Integrate the Firewall into Your Management NetworkStep 3 Enable the SNMP manager to interpret firewall

Seite 38 - About Security Policies

Getting Started Guide 31Create the Security PerimeterThe following topics provide basic steps for configuring the firewall interfaces, defining zones,

Seite 39

32 Getting Started GuideSecurity Perimeter Overview Create the Security PerimeterSecurity Perimeter OverviewTraffic must pass through the firewall i

Seite 40 - Optional

Getting Started Guide 33Create the Security Perimeter Security Perimeter Overview Virtual Wire DeploymentsIn a virtual wire deployment, the firewall

Seite 41 - About Policy Objects

34 Getting Started GuideSecurity Perimeter Overview Create the Security PerimeterAbout Network Address Translation (NAT)When you use private IP addr

Seite 42 - About Security Profiles

Getting Started Guide 35Create the Security Perimeter Security Perimeter Overview Field Description Required FieldsNameA label that supports up to 31

Seite 43 - Getting Started Guide 39

iv Getting Started Guide Table of ContentsProtect Your Network Against Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55Enable Wi

Seite 44 - Set Up Interfaces and Zones

36 Getting Started GuideSecurity Perimeter Overview Create the Security PerimeterURL CategoryUsing the URL Category as match criteria allows you to

Seite 45

Getting Started Guide 37Create the Security Perimeter Security Perimeter Overview Policy Best PracticesThe task of safely enabling Internet access an

Seite 46 - 42 Getting Started Guide

38 Getting Started GuideSecurity Perimeter Overview Create the Security PerimeterSome examples of address and application policy objects are shown i

Seite 47 - Configure NAT Policies

Getting Started Guide 39Create the Security Perimeter Security Perimeter Overview for information on using the default profiles in your security poli

Seite 48 - 44 Getting Started Guide

40 Getting Started GuideSet Up Interfaces and Zones Create the Security PerimeterSet Up Interfaces and ZonesThe following sections provide informati

Seite 49

Getting Started Guide 41Create the Security Perimeter Set Up Interfaces and Zones Configure Interfaces and ZonesAfter you plan your zones and the cor

Seite 50 - 46 Getting Started Guide

42 Getting Started GuideSet Up Interfaces and Zones Create the Security PerimeterStep 3 Configure the interface that connects to your internal netwo

Seite 51

Getting Started Guide 43Create the Security Perimeter Configure NAT Policies Configure NAT PoliciesBased on the example topology we used to create th

Seite 52 - Create Security Rules

44 Getting Started GuideConfigure NAT Policies Create the Security PerimeterTranslate Internal Client IP Addresses to your Public IP AddressWhen a c

Seite 53

Getting Started Guide 45Create the Security Perimeter Configure NAT Policies Enable Clients on the Internal Network to Access your Public ServersWhen

Seite 54 - 50 Getting Started Guide

Getting Started Guide 1Integrate the Firewall into Your Management NetworkThe following topics describe how to perform the initial configuration steps

Seite 55 - Test Your Security Policies

46 Getting Started GuideConfigure NAT Policies Create the Security PerimeterEnable Bi-Directional Address Translation for your Public-Facing Servers

Seite 56

Getting Started Guide 47Create the Security Perimeter Configure NAT Policies Step 2 Create the NAT policy. 1. Select Policies > NAT and click Add

Seite 57 - Monitor > Logs

48 Getting Started GuideSet Up Basic Security Policies Create the Security PerimeterSet Up Basic Security PoliciesPolicies allow you to enforce rule

Seite 58

Getting Started Guide 49Create the Security Perimeter Set Up Basic Security Policies Define Basic Security Rules Step 1 Permit Internet access for al

Seite 59 - Control Access to Web Content

50 Getting Started GuideSet Up Basic Security Policies Create the Security PerimeterStep 3 Restrict access from the Internet to the servers on the D

Seite 60

Getting Started Guide 51Create the Security Perimeter Set Up Basic Security Policies Test Your Security PoliciesTo verify that you have set up your b

Seite 61

52 Getting Started GuideSet Up Basic Security Policies Create the Security PerimeterMonitor the Traffic on Your NetworkNow that you have a basic sec

Seite 62

Getting Started Guide 53Create the Security Perimeter Set Up Basic Security Policies  In the ACC, review the most used applications and the high-ris

Seite 63

54 Getting Started GuideSet Up Basic Security Policies Create the Security Perimeter

Seite 64 - Set Up File Blocking

Getting Started Guide 55Protect Your Network Against ThreatsThe Palo Alto Networks next-generation firewall has unique threat prevention capabilities

Seite 65

2 Getting Started GuideSet Up Management Access to the Firewall Integrate the Firewall into Your Management NetworkSet Up Management Access to the F

Seite 66 - Continue to

56 Getting Started GuideEnable WildFire Protect Your Network Against ThreatsEnable WildFireThe WildFire service is included as part of the base prod

Seite 67

Getting Started Guide 57Protect Your Network Against Threats Enable WildFire For more information on WildFire, refer to the Palo Alto Networks WildFi

Seite 68 - 64 Getting Started Guide

58 Getting Started GuideScan Traffic for Threats Protect Your Network Against ThreatsScan Traffic for ThreatsSecurity profiles provide threat protec

Seite 69 - For More Information

Getting Started Guide 59Protect Your Network Against Threats Scan Traffic for Threats Step 3 Schedule signature updates.Best Practice for Updates:Per

Seite 70

60 Getting Started GuideScan Traffic for Threats Protect Your Network Against ThreatsSet Up File BlockingFile blocking profiles allow you to identif

Seite 71 - Configure User Identification

Getting Started Guide 61Protect Your Network Against Threats Scan Traffic for Threats Step 2 Configure the file blocking options. 1. Click Add to def

Seite 72 - User Identification Overview

62 Getting Started GuideScan Traffic for Threats Protect Your Network Against ThreatsStep 5 To test the file blocking configuration, access a client

Seite 73 - About User Mapping

Getting Started Guide 63Protect Your Network Against Threats Control Access to Web Content Control Access to Web ContentURL filtering provides visibi

Seite 74 - PAN-OS XMLAPI Usage Guide

64 Getting Started GuideControl Access to Web Content Protect Your Network Against ThreatsStep 4 Define how to control access to web content. If you

Seite 75 - Enable User Identification

Getting Started Guide 65Protect Your Network Against Threats Control Access to Web Content For More InformationFor more details on URL filtering, ref

Seite 76 - 72 Getting Started Guide

Getting Started Guide 3Integrate the Firewall into Your Management Network Set Up Management Access to the Firewall Set Up Network Access to the Fire

Seite 77 - Map IP Addresses to Users

66 Getting Started GuideControl Access to Web Content Protect Your Network Against Threats

Seite 78 - Configure User Mapping

Getting Started Guide 67Configure User IdentificationUser Identification (User-ID) is a Palo Alto Networks next-generation firewall feature that allow

Seite 79

68 Getting Started GuideUser Identification Overview Configure User IdentificationUser Identification OverviewUser-ID seamlessly integrates Palo Alt

Seite 80

Getting Started Guide 69Configure User Identification User Identification Overview About User MappingHaving the names of the users and groups is only

Seite 81 - Captive Portal Modes

70 Getting Started GuideUser Identification Overview Configure User IdentificationPortal policy requires user authentication, either transparently v

Seite 82 - Configure Captive Portal

Getting Started Guide 71Configure User Identification Enable User Identification Enable User IdentificationTo enable policy enforcement based on user

Seite 83

72 Getting Started GuideEnable User Identification Configure User IdentificationMap Users to GroupsStep 1 Create an LDAP Server Profile that specifi

Seite 84 - 80 Getting Started Guide

Getting Started Guide 73Configure User Identification Enable User Identification Map IP Addresses to UsersThe tasks you need to perform to map IP add

Seite 85

74 Getting Started GuideEnable User Identification Configure User IdentificationConfigure User MappingIn most cases, the majority of your network us

Seite 86 - 82 Getting Started Guide

Getting Started Guide 75Configure User Identification Enable User Identification Step 2 Define the servers the firewall should monitor to collect IP

Seite 87

4 Getting Started GuideSet Up Management Access to the Firewall Integrate the Firewall into Your Management NetworkStep 6 Configure DNS, time and da

Seite 88

76 Getting Started GuideEnable User Identification Configure User IdentificationMap IP Addresses to User Names Using Captive PortalIf the firewall r

Seite 89 - Monitor > Logs)

Getting Started Guide 77Configure User Identification Enable User Identification Captive Portal ModesThe Captive Portal mode defines how web requests

Seite 90

78 Getting Started GuideEnable User Identification Configure User IdentificationConfigure Captive PortalThe following procedure shows how to configu

Seite 91 - Set Up High Availability

Getting Started Guide 79Configure User Identification Enable User Identification Step 4 (Redirect mode only) To transparently redirect users without

Seite 92 - HA Overview

80 Getting Started GuideEnable User Identification Configure User IdentificationStep 6 (Optional) Set up client certificate authentication. Note tha

Seite 93 - Getting Started Guide 89

Getting Started Guide 81Configure User Identification Enable User Identification Step 8 Configure the Captive Portal settings. 1. Select Device >

Seite 94 - HA Timers

82 Getting Started GuideEnable User- and Group-Based Policy Configure User IdentificationEnable User- and Group-Based PolicyIn order to enable secur

Seite 95

Getting Started Guide 83Configure User Identification Enable User- and Group-Based Policy Step 3 Create your Captive Portal Policies.1. Select Polic

Seite 96 - 92 Getting Started Guide

84 Getting Started GuideVerify the User-ID Configuration Configure User IdentificationVerify the User-ID ConfigurationAfter you configure User Ident

Seite 97 - Getting Started Guide 93

Getting Started Guide 85Configure User Identification Verify the User-ID Configuration Step 4 Test your Captive Portal configuration. 1. From the s

Seite 98 - Configuration Guidelines

Getting Started Guide 5Integrate the Firewall into Your Management Network Set Up Management Access to the Firewall Set Up Network Access for Externa

Seite 99

86 Getting Started GuideVerify the User-ID Configuration Configure User IdentificationStep 6 Verify that user names are displayed in reports (Monito

Seite 100 - 96 Getting Started Guide

Getting Started Guide 87Set Up High AvailabilityHigh availability (HA) is a configuration in which two firewalls are placed in a group to prevent a si

Seite 101

88 Getting Started GuideHA Overview Set Up High AvailabilityHA OverviewOn Palo Alto Networks firewalls, you can set up two devices as an HA pair. HA

Seite 102 - 98 Getting Started Guide

Getting Started Guide 89Set Up High Availability HA Overview On devices with dedicated HA ports (HA1 and HA2) such as the PA-3000 Series, PA-4000 Ser

Seite 103

90 Getting Started GuideHA Overview Set Up High AvailabilityFailover TriggersWhen a failure occurs on the active device and the passive device takes

Seite 104 - 100 Getting Started Guide

Getting Started Guide 91Set Up High Availability HA Overview Timers Description PA-7050PA-5000 SeriesPA-4000 SeriesPA-3000 SeriesPA-2000 SeriesPA-500

Seite 105

92 Getting Started GuideHA Overview Set Up High AvailabilityAdditional master hold up timeThis time interval is applied to the same event as Monitor

Seite 106 - Click Commit

Getting Started Guide 93Set Up High Availability Prerequisites for Active/Passive HA Prerequisites for Active/Passive HATo set up high availability o

Seite 107 - Verify Failover

94 Getting Started GuideConfiguration Guidelines Set Up High AvailabilityConfiguration GuidelinesTo set up an active (PeerA) passive (PeerB) pair in

Seite 108 - Getting Started Guide

Getting Started Guide 95Set Up High Availability Configuration Guidelines Independent Configuration SettingsPeerA PeerBControl Link IP address of the

Kommentare zu diesen Handbüchern

Keine Kommentare