Difference between revisions of "Palo Alto PA-Series"
Jump to navigation
Jump to search
(13 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
[[Palo Alto]] Series provides [[QoS]] and [[firewall]] capabilities including [[Denial of service]] (DoS) protection among other functionalities. | [[Palo Alto]] Series provides [[QoS]] and [[firewall]] capabilities including [[Denial of service]] (DoS) protection among other functionalities. | ||
+ | |||
+ | == Models == | ||
+ | * [[PA-820]] | ||
== Features == | == Features == | ||
Line 6: | Line 9: | ||
* [[WildFire]] | * [[WildFire]] | ||
* Configuration auditing log: <code>[[show log config]]</code> | * Configuration auditing log: <code>[[show log config]]</code> | ||
+ | * [[QoS]] | ||
+ | * [[GlobalProtect]] (SSL/IPsec [[VPN]]) | ||
+ | * [[MFA]] | ||
+ | * Active/Pasive HA<ref>https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/high-availability/set-up-activepassive-ha/configure-activepassive-ha</ref> | ||
+ | * Predefined or customized reporting capabilities by email<ref>https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/monitoring/view-and-manage-reports</ref> | ||
+ | * [[Bandwidth]] usage reports | ||
+ | * [[File blocking]] (<code>Objects -> Security -> Profiles -> File Blocking</code>) | ||
== Additional information == | == Additional information == | ||
* Palo Alto Best practices: https://docs.paloaltonetworks.com/best-practices/9-0/best-practices-getting-started.html | * Palo Alto Best practices: https://docs.paloaltonetworks.com/best-practices/9-0/best-practices-getting-started.html | ||
− | + | * [[Ansible]] Palo Alto modules and roles | |
− | |||
== See also == | == See also == | ||
+ | * {{firewalls}} | ||
* {{PAN-OS}} | * {{PAN-OS}} | ||
− | |||
* {{Networking}} | * {{Networking}} | ||
− | + | * {{Palo Alto}} | |
Latest revision as of 06:49, 3 February 2021
Palo Alto Series provides QoS and firewall capabilities including Denial of service (DoS) protection among other functionalities.
Models[edit]
Features[edit]
- External Dynamic List (EDL)[1]
- WildFire
- Configuration auditing log:
show log config
- QoS
- GlobalProtect (SSL/IPsec VPN)
- MFA
- Active/Pasive HA[2]
- Predefined or customized reporting capabilities by email[3]
- Bandwidth usage reports
- File blocking (
Objects -> Security -> Profiles -> File Blocking
)
Additional information[edit]
- Palo Alto Best practices: https://docs.paloaltonetworks.com/best-practices/9-0/best-practices-getting-started.html
- Ansible Palo Alto modules and roles
See also[edit]
- DMZ, Port knocking, Bastion host, Firewall Software:
iptables
ufw
firewalld
nftables
firewall-cmd
ipfw (FreeBSD)
PF (OpenBSD)
, netsh advfirewall, PAN-OS, WAF, pfsense, VyOS, Cisco ASA, DMZ, F5, URL Filtering, port forwarding, macOS application firewall, Windows firewall, Fortigate, ngrok, Network ACL - PAN-OS (Palo Alto): PAN-OS Releases,
show vpn
, GlobalProtect, GlobalProtect logs, WildFire,show log
,show session all
, MDM,match
, PAN-OS reports, HIP, Zone - Networking: bandwidth, latency, Jitter, Ethernet, UPnP, MPLS, Frame Relay, ATM, TCP/IP, ARP, WiFi, BGP, Networking timeline, Router, Proxy ARP, Services & Networking, Traffic shapper
- Palo Alto, Palo Alto PA-Series, PAN-OS, Panorama, WildFire, Cortex Data Lake, Prisma Cloud
Draft - Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. https://en.wikiversity.org/wiki/Draft:Firewall/Palo_Alto_PA-Series/PAN-OS
- ↑ https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list.html
- ↑ https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/high-availability/set-up-activepassive-ha/configure-activepassive-ha
- ↑ https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/monitoring/view-and-manage-reports
Advertising: