
the network security companytm© 2013 Palo Alto Networks CNSE 5.1 Study Guide Version 2.1 Palo Alto Networks Education Services
Page 10 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Security Subscriptions • Threat Prevention • URL F
Page 100 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GP-Portal | Client Configuration - Certificates CA
Page 101 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GP-Portal | Client Configurations – General tab Cli
Page 102 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GP-Portal | Client Configuration – Gateways Tab
Page 103 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Client Configuration – Agent Tab End-user can disab
Page 104 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Disabling the GlobalProtect Agent - Ticket Network
the network security companytm© 2013 Palo Alto Networks Configuration: GlobalProtect Agent
Page 106 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GlobalProtect Agent GlobalProtect Gateway GlobalPro
Page 107 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Client Configuration Can be left blank if using sin
Page 108 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Advanced View
Page 109 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Troubleshooting GlobalProtect Agent
Page 11 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Flow Logic Initial Packet Processing Source Zone/ Ad
the network security companytm© 2013 Palo Alto Networks Host Checks
Page 111 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Host Information Profile (HIP) Portal Gateway Agent
Page 112 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Portal: Client Configuration – Data Collection • Re
Page 113 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Portal: Client Configuration – Custom Checks
Page 114 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks HIP Objects • HIP Objects are used to define match
Page 115 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Configuring HIP Objects • Host Info • Patc
Page 116 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Custom Checks • HIP objects can check for specific
Page 117 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Example - HIP Objects and Profiles Objects > G
Page 118 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Security Policy with HIP Profile Objects > Globa
Page 119 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Gateway: HIP Notification Network > GlobalProtec
Page 12 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Packet Flow • Refer to this document on the packet
Page 120 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks HIP Match Log Monitor > Logs > HIP Match
Page 121 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Large-Scale VPNs with GlobalProtect Satellites • G
Page 122 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Satellite Deployment • Satellite devices can be ea
the network security companytm© 2013 Palo Alto Networks Panorama CNSE Bootcamp Panorama
Page 124 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks • Panorama is designed to provide three benefits: •
Page 125 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Deployment • Virtual Machine Appliance - Simple i
Page 126 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks • Device Groups manage shared Policies and Objects
Page 127 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Objects • Types of Objects - “Objects” tab object
Page 128 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Objects | Precedence Panorama!DG-1!DG1 Objects!Addr
Page 129 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Shared Policy | Pre and Post Policy Config • Devic
Page 13 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks 5 Physical Interface Types 1. Tap mode interfaces s
Page 130 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Managing Shared Objects • Shared objects can be ov
Page 131 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Managing Policy with Panorama • Panorama Policy ar
Page 132 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Policy Evaluation Order Shared Device Group Pre-Rul
Page 133 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Shared Policy | Zones • Zones are required to be m
Page 134 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks How to Use Templates • Device specific settings ap
Page 135 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Select Template in Device and Network Tabs
Page 136 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Override Values on Managed Device Individual fields
Page 137 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Context Switch • Device configuration editing is d
Page 138 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Commit Workflow A Panorama commit must happen befor
Page 139 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Logging and Reporting • Panorama'aggregates&a
Page 14 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Logical Interfaces Supported • Subinterfaces (802.1
Page 140 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks • With the M-100, manager and log collector functi
Page 141 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Aggregate Logging Firewall 1 Firewall 2 Panorama
Page 142 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Logging and Reporting Configurations • Long term l
Page 143 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Logging and Reporting Data Types • Scheduled repor
Page 144 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks
the network security companytm© 2013 Palo Alto Networks Questions?
Page 15 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Multicast Support • Support for Multicast Filtering
Page 16 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Available Features in Different Interface Modes Vwir
Page 17 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks • An interface management profile specifies which p
Page 18 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Device Management • Managing the firewall (via GUI,
Page 19 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Role-based Administration • Administrator can be gi
Page 2 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks CNSE Study Guide & Tech Documents Palo Alto Netwo
Page 20 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Application Identification • App-ID provides the ab
Page 21 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Application Selection Window Within each policy, you
Page 22 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Dynamic Application Filters • A dynamic application
Page 23 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Security Policy Application Group and Application Fi
Page 24 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Security Policy Operation • All traffic following f
Page 25 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Security Policy Dependencies Parent applications mus
Page 26 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Implicit Application Dependencies PAN-OS implicitly
Page 27 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Address Objects & Dynamic Block Lists • Address
Page 28 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Dynamic Block Lists Allows the import of external li
Page 29 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Scheduling Security Policies • Policies can be sche
Page 3 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks CNSE 5.1 Exam Overview • Exam offered at Kryterion t
Page 30 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Blocking Skype • The skype application is classifi
Page 31 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Monitoring Traffic • The default traffic log behav
Page 32 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Monitoring Traffic (2) Special Application names are
Page 33 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Log Forwarding • The logs on the firewall can be fo
Page 34 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Unknown Applications • Scenario: a network has a pa
Page 35 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Steps to Define a New Application 1. Objects ->
Page 36 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks More on Unknown Applications • App override policie
Page 37 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Source Address Translation • NAT rules are in a se
Page 38 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Destination Address Translation Policies > Securi
Page 39 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Security Profile • Security Profile look for malici
Page 4 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Exam Preparation Suggestions • Have skill and knowle
Page 40 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Using Security Profiles • The profile used for traf
Page 41 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Anti – Virus Profiles • A decoder is a software pr
Page 42 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Configuring Exceptions • If you have a threat or v
Page 43 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Email Protocols and AV/Spyware Protection • If a Pa
Page 44 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Vulnerability Protection • Provides IPS functionali
Page 45 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Custom Response Pages • Response pages are configur
Page 46 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Disable Server Response Inspection • The vulnerabi
Page 47 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks URL Filtering Profile • Actions can be defined for
Page 48 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks URL Filtering Actions • Allow – Traffic is passed,
Page 49 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks
Page 5 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks PA appliances as of PAN-OS 5.0: 4000, 2000, 500 Serie
Page 50 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Misc. URL Filtering Topics • Order of checking with
Page 51 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Data Filtering Overview • Scan traffic for potentia
Page 52 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks
Page 53 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Data Filtering Password Setup • PCAPs on data filte
Page 54 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Zone Protection • For each security zone, you can
Page 55 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks WildFire • WildFire relies upon two main technolog
Page 56 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks WildFire • Provides a virtual sanbox environment f
Page 57 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks User-ID: Enterprise Directory Integration • User n
Page 58 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Where are Usernames Used? 1. Stored in logs • Sort
Page 59 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks User-ID Agent Setup and Upgrade Procedure One agent
Page 6 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks PA appliances as of PAN-OS 5.0: PA-3000 Series
Page 60 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Installing the User-ID agent • Note that a best pra
Page 61 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Terminal Server Agent • Runs on the Terminal or Ci
Page 62 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Captive Portal • Captive portal is a feature of th
Page 63 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Captive Portal (2) • Information on Captive Portal:
Page 64 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks SSL Decryption • The Palo Alto firewall can perform
Page 65 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Configuring SSL Inbound Decryption Certificate • Al
Page 66 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Configuring SSL Outbound Decryption Certificate • Y
Page 67 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Configuring SSL Inbound or Outbound Policies Once th
Page 68 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Misc. SSL Decryption • When SSL is decrypted, the a
Page 69 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks
Page 7 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks PA appliances as of PAN-OS 5.0: PA-5000 Series
Page 70 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks
Page 71 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks
Page 72 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks
Page 73 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Misc HA • HA failover can be triggered by the follow
Page 74 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks
Page 75 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Steps to configure an IPSec site-to-site VPN 1. Cre
Page 76 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Notes about IPSec site-to-site VPNs • Possible IKE
the network security companytm© 2013 Palo Alto Networks GlobalProtect
Page 78 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GlobalProtect | Overview • License & Components
Page 79 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GlobalProtect Licensing • Portal – one-time perpetu
Page 8 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks PA appliances as of PAN-OS 5.0: PA-200 Series
Page 80 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GlobalProtect Components • GlobalProtect Portal -
Page 81 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Agent Software on the Portal Device > GlobalProte
the network security companytm© 2013 Palo Alto Networks Connection Sequence:
Page 83 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks External User Sequence - Step 1 • Remote User authe
Page 84 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks External User Sequence - Step 2 • Agent determines i
Page 85 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks External User Sequence - Step 3 • Agent checks avail
Page 86 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks External User Sequence - Step 4 • User moves to new
Page 87 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Security Policy Enforcement - Example Teachers and S
the network security companytm© 2013 Palo Alto Networks Preparing the Firewall for GlobalProtect
Page 89 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Configuration Components Gateway'Client'Po
Page 9 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Centralized Management
Page 90 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GlobalProtect Required Certificates • Certificate A
Page 91 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Certificate Profile Device > Certificate Managem
the network security companytm© 2013 Palo Alto Networks Configuration: GlobalProtect Gateway
Page 93 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GlobalProtect Gateway • Provides security enforceme
Page 94 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GP-Gateway | General Tab Network > GlobalProtect
Page 95 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GP-Gateway | Tunnel Settings Network > GlobalProt
Page 96 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GP-Gateway | Network Settings Network > GlobalPro
the network security companytm© 2013 Palo Alto Networks Configuration: GlobalProtect Portal
Page 98 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GlobalProtect Portal GlobalProtect Gateway GlobalPro
Page 99 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GP-Portal | Portal Configuration tab Network > Gl
Kommentare zu diesen Handbüchern