Alto STC 3000 Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Staubsauger Alto STC 3000 herunter. CNSE 5.1 Study Guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 145
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - CNSE 5.1 Study Guide

the network security companytm© 2013 Palo Alto Networks CNSE 5.1 Study Guide Version 2.1 Palo Alto Networks Education Services

Seite 2

Page 10 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Security Subscriptions •  Threat Prevention •  URL F

Seite 3 - CNSE 5.1 Exam Overview

Page 100 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GP-Portal | Client Configuration - Certificates CA

Seite 4 - Exam Preparation Suggestions

Page 101 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GP-Portal | Client Configurations – General tab Cli

Seite 5

Page 102 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GP-Portal | Client Configuration – Gateways Tab

Seite 6

Page 103 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Client Configuration – Agent Tab End-user can disab

Seite 7

Page 104 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Disabling the GlobalProtect Agent - Ticket Network

Seite 8

the network security companytm© 2013 Palo Alto Networks Configuration: GlobalProtect Agent

Seite 9 - Centralized Management

Page 106 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GlobalProtect Agent GlobalProtect Gateway GlobalPro

Seite 10 - Security Subscriptions

Page 107 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Client Configuration Can be left blank if using sin

Seite 11 - Flow Logic

Page 108 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Advanced View

Seite 12 - Packet Flow

Page 109 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Troubleshooting GlobalProtect Agent

Seite 13 - 5 Physical Interface Types

Page 11 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Flow Logic Initial Packet Processing Source Zone/ Ad

Seite 14 - Logical Interfaces Supported

the network security companytm© 2013 Palo Alto Networks Host Checks

Seite 15 - Multicast Support

Page 111 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Host Information Profile (HIP) Portal Gateway Agent

Seite 16 - - No VPN

Page 112 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Portal: Client Configuration – Data Collection • Re

Seite 17 - Interface Management

Page 113 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Portal: Client Configuration – Custom Checks

Seite 18 - Device Management

Page 114 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks HIP Objects • HIP Objects are used to define match

Seite 19 - Role-based Administration

Page 115 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Configuring HIP Objects •  Host Info •  Patc

Seite 20 - Application Identification

Page 116 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Custom Checks • HIP objects can check for specific

Seite 21 - Application Selection Window

Page 117 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Example - HIP Objects and Profiles Objects > G

Seite 22 - Dynamic Application Filters

Page 118 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Security Policy with HIP Profile Objects > Globa

Seite 23 - Security Policy

Page 119 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Gateway: HIP Notification Network > GlobalProtec

Seite 24 - Security Policy Operation

Page 12 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Packet Flow •  Refer to this document on the packet

Seite 25 - Security Policy Dependencies

Page 120 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks HIP Match Log Monitor > Logs > HIP Match

Seite 26

Page 121 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Large-Scale VPNs with GlobalProtect Satellites •  G

Seite 27 - • Objects > Addresses

Page 122 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Satellite Deployment •  Satellite devices can be ea

Seite 28 - Dynamic Block Lists

the network security companytm© 2013 Palo Alto Networks Panorama CNSE Bootcamp Panorama

Seite 29 - Scheduling Security Policies

Page 124 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks • Panorama is designed to provide three benefits: •

Seite 30 - Blocking Skype

Page 125 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Deployment •  Virtual Machine Appliance -  Simple i

Seite 31 - Monitoring Traffic

Page 126 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks •  Device Groups manage shared Policies and Objects

Seite 32 - Monitoring Traffic (2)

Page 127 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Objects •  Types of Objects -  “Objects” tab object

Seite 33 - Log Forwarding

Page 128 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Objects | Precedence Panorama!DG-1!DG1 Objects!Addr

Seite 34 - Unknown Applications

Page 129 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Shared Policy | Pre and Post Policy Config •  Devic

Seite 35

Page 13 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks 5 Physical Interface Types 1.  Tap mode interfaces s

Seite 36 - More on Unknown Applications

Page 130 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Managing Shared Objects •  Shared objects can be ov

Seite 37 - Source Address Translation

Page 131 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Managing Policy with Panorama •  Panorama Policy ar

Seite 38 - Policies > NAT

Page 132 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Policy Evaluation Order Shared Device Group Pre-Rul

Seite 39 - Security Profile

Page 133 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Shared Policy | Zones •  Zones are required to be m

Seite 40 - Using Security Profiles

Page 134 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks How to Use Templates •  Device specific settings ap

Seite 41 - Anti – Virus Profiles

Page 135 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Select Template in Device and Network Tabs

Seite 42 - Configuring Exceptions

Page 136 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Override Values on Managed Device Individual fields

Seite 43

Page 137 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Context Switch •  Device configuration editing is d

Seite 44 - Vulnerability Protection

Page 138 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Commit Workflow A Panorama commit must happen befor

Seite 45 - Custom Response Pages

Page 139 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Logging and Reporting •  Panorama'aggregates&a

Seite 46

Page 14 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Logical Interfaces Supported •  Subinterfaces (802.1

Seite 47 - URL Filtering Profile

Page 140 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks •  With the M-100, manager and log collector functi

Seite 48 - URL Filtering Actions

Page 141 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Aggregate Logging Firewall 1 Firewall 2 Panorama

Seite 49

Page 142 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Logging and Reporting Configurations •  Long term l

Seite 50 - Misc. URL Filtering Topics

Page 143 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Logging and Reporting Data Types •  Scheduled repor

Seite 51 - Data Filtering Overview

Page 144 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks

Seite 52

the network security companytm© 2013 Palo Alto Networks Questions?

Seite 53

Page 15 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Multicast Support •  Support for Multicast Filtering

Seite 54 - Zone Protection

Page 16 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Available Features in Different Interface Modes Vwir

Seite 55 - WildFire

Page 17 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks •  An interface management profile specifies which p

Seite 56

Page 18 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Device Management •  Managing the firewall (via GUI,

Seite 57

Page 19 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Role-based Administration •  Administrator can be gi

Seite 58 - Where are Usernames Used?

Page 2 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks CNSE Study Guide & Tech Documents Palo Alto Netwo

Seite 59

Page 20 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Application Identification •  App-ID provides the ab

Seite 60 - Installing the User-ID agent

Page 21 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Application Selection Window Within each policy, you

Seite 61 - Terminal Server Agent

Page 22 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Dynamic Application Filters •  A dynamic application

Seite 62 - Captive Portal

Page 23 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Security Policy Application Group and Application Fi

Seite 63 - Captive Portal (2)

Page 24 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Security Policy Operation •  All traffic following f

Seite 64 - SSL Decryption

Page 25 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Security Policy Dependencies Parent applications mus

Seite 65

Page 26 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Implicit Application Dependencies PAN-OS implicitly

Seite 66

Page 27 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Address Objects & Dynamic Block Lists •  Address

Seite 67

Page 28 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Dynamic Block Lists Allows the import of external li

Seite 68 - Misc. SSL Decryption

Page 29 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Scheduling Security Policies •  Policies can be sche

Seite 69

Page 3 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks CNSE 5.1 Exam Overview •  Exam offered at Kryterion t

Seite 70

Page 30 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Blocking Skype •  The skype application is classifi

Seite 71

Page 31 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Monitoring Traffic •  The default traffic log behav

Seite 72

Page 32 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Monitoring Traffic (2) Special Application names are

Seite 73 - Misc HA

Page 33 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Log Forwarding •  The logs on the firewall can be fo

Seite 74

Page 34 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Unknown Applications •  Scenario: a network has a pa

Seite 75

Page 35 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Steps to Define a New Application 1.  Objects ->

Seite 76 - Pre-shared key only

Page 36 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks More on Unknown Applications •  App override policie

Seite 77 - GlobalProtect

Page 37 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Source Address Translation •  NAT rules are in a se

Seite 78 - GlobalProtect

Page 38 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Destination Address Translation Policies > Securi

Seite 79 - GlobalProtect Licensing

Page 39 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Security Profile •  Security Profile look for malici

Seite 80 - GlobalProtect Components

Page 4 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Exam Preparation Suggestions •  Have skill and knowle

Seite 81 - Agent Software on the Portal

Page 40 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Using Security Profiles •  The profile used for traf

Seite 82 - Connection Sequence:

Page 41 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Anti – Virus Profiles •  A decoder is a software pr

Seite 83 - • Radius

Page 42 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Configuring Exceptions •  If you have a threat or v

Seite 84 - • Agent determines if it is

Page 43 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Email Protocols and AV/Spyware Protection •  If a Pa

Seite 85 - • Agent checks available

Page 44 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Vulnerability Protection •  Provides IPS functionali

Seite 86 - • User moves to new

Page 45 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Custom Response Pages •  Response pages are configur

Seite 87 - Policy for Students

Page 46 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Disable Server Response Inspection •  The vulnerabi

Seite 88 - Preparing the Firewall

Page 47 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks URL Filtering Profile •  Actions can be defined for

Seite 89 - Configuration Components

Page 48 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks URL Filtering Actions •  Allow – Traffic is passed,

Seite 90 - • *optional

Page 49 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks

Seite 91 - Certificate Profile

Page 5 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks PA appliances as of PAN-OS 5.0: 4000, 2000, 500 Serie

Seite 92 - GlobalProtect Gateway

Page 50 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Misc. URL Filtering Topics •  Order of checking with

Seite 93

Page 51 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Data Filtering Overview •  Scan traffic for potentia

Seite 94 - GP-Gateway

Page 52 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks

Seite 95 - GP-Gateway

Page 53 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Data Filtering Password Setup •  PCAPs on data filte

Seite 96

Page 54 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Zone Protection •  For each security zone, you can

Seite 97 - GlobalProtect Portal

Page 55 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks WildFire •  WildFire relies upon two main technolog

Seite 98

Page 56 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks WildFire •  Provides a virtual sanbox environment f

Seite 99

Page 57 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks User-ID: Enterprise Directory Integration •  User n

Seite 100 - CA certificate

Page 58 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Where are Usernames Used? 1.  Stored in logs •  Sort

Seite 101

Page 59 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks User-ID Agent Setup and Upgrade Procedure One agent

Seite 102

Page 6 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks PA appliances as of PAN-OS 5.0: PA-3000 Series

Seite 103

Page 60 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Installing the User-ID agent •  Note that a best pra

Seite 104 - On the portal firewall

Page 61 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Terminal Server Agent •  Runs on the Terminal or Ci

Seite 105 - GlobalProtect Agent

Page 62 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Captive Portal •  Captive portal is a feature of th

Seite 106

Page 63 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Captive Portal (2) •  Information on Captive Portal:

Seite 107 - Client Configuration

Page 64 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks SSL Decryption •  The Palo Alto firewall can perform

Seite 108 - Advanced View

Page 65 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Configuring SSL Inbound Decryption Certificate •  Al

Seite 109

Page 66 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Configuring SSL Outbound Decryption Certificate •  Y

Seite 110 - Host Checks

Page 67 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Configuring SSL Inbound or Outbound Policies Once th

Seite 111 - Gateway

Page 68 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Misc. SSL Decryption •  When SSL is decrypted, the a

Seite 112 - • Reduces the amount of

Page 69 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks

Seite 113

Page 7 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks PA appliances as of PAN-OS 5.0: PA-5000 Series

Seite 114 - HIP Objects

Page 70 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks

Seite 115 - Configuring HIP Objects

Page 71 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks

Seite 116 - Custom Checks

Page 72 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks

Seite 117

Page 73 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Misc HA • HA failover can be triggered by the follow

Seite 118 - Policies > Security

Page 74 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks

Seite 119 - Gateway: HIP Notification

Page 75 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Steps to configure an IPSec site-to-site VPN 1.  Cre

Seite 120 - HIP Match Log

Page 76 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Notes about IPSec site-to-site VPNs •  Possible IKE

Seite 121

the network security companytm© 2013 Palo Alto Networks GlobalProtect

Seite 122 - Satellite Deployment

Page 78 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GlobalProtect | Overview •  License & Components

Seite 123 - Panorama

Page 79 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GlobalProtect Licensing •  Portal – one-time perpetu

Seite 124 - Panorama Benefits

Page 8 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks PA appliances as of PAN-OS 5.0: PA-200 Series

Seite 125 - Deployment

Page 80 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GlobalProtect Components •  GlobalProtect Portal - 

Seite 126 - Device Groups and Templates

Page 81 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Agent Software on the Portal Device > GlobalProte

Seite 127 - Objects

the network security companytm© 2013 Palo Alto Networks Connection Sequence:

Seite 128 - Panorama!

Page 83 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks External User Sequence - Step 1 •  Remote User authe

Seite 129

Page 84 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks External User Sequence - Step 2 • Agent determines i

Seite 130 - Managing Shared Objects

Page 85 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks External User Sequence - Step 3 • Agent checks avail

Seite 131 - Policies > Security

Page 86 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks External User Sequence - Step 4 • User moves to new

Seite 132 - Policy Evaluation Order

Page 87 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Security Policy Enforcement - Example Teachers and S

Seite 133 - Shared Policy

the network security companytm© 2013 Palo Alto Networks Preparing the Firewall for GlobalProtect

Seite 134 - How to Use Templates

Page 89 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Configuration Components Gateway'Client'Po

Seite 135

Page 9 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Centralized Management

Seite 136

Page 90 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GlobalProtect Required Certificates •  Certificate A

Seite 137 - Context Switch

Page 91 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks Certificate Profile Device > Certificate Managem

Seite 138 - Commit Workflow

the network security companytm© 2013 Palo Alto Networks Configuration: GlobalProtect Gateway

Seite 139 - Logging and Reporting

Page 93 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GlobalProtect Gateway •  Provides security enforceme

Seite 140

Page 94 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GP-Gateway | General Tab Network > GlobalProtect

Seite 141 - Aggregate Logging

Page 95 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GP-Gateway | Tunnel Settings Network > GlobalProt

Seite 142 - •  ACC browsing and Reports

Page 96 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GP-Gateway | Network Settings Network > GlobalPro

Seite 143

the network security companytm© 2013 Palo Alto Networks Configuration: GlobalProtect Portal

Seite 144

Page 98 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GlobalProtect Portal GlobalProtect Gateway GlobalPro

Seite 145 - Questions?

Page 99 | CNSE 5.1 Study Guide PAN-OS 5.0 and Panorama 5.1 | © 2013 Palo Alto Networks GP-Portal | Portal Configuration tab Network > Gl

Kommentare zu diesen Handbüchern

Keine Kommentare