Introduction:
Learn the essentials of firewall installation, configuration, and management with this Palo Alto Networks Essentials 2: Extended Firewall Management Training
In this Palo Alto Networks Essentials 2: Extended Firewall Management Training course, you will expand on Essentials 1 course topics. You will also be introduced to new features and functions of Palo Alto Networks Next-Generation firewalls
Customize It
● If you are familiar with some aspects of this Palo Alto Networks Essentials 2: Extended Firewall Management Training course, we can omit or shorten their discussion.
● We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
● If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.
Audience / Target Group
This Palo Alto Networks Essentials 2: Extended Firewall Management Training course is intended for Security Engineers, Network Engineers, and Support staff
Related Courses
Duration: 2 days
Objectives:
After completing this Palo Alto Networks Essentials 2: Extended Firewall Management Training course, attendees will be able to:
◾Install, configure, manage, and perform basic troubleshooting on the entire line of Palo Alto Networks Next-Generation firewalls
◾Basics of implementing and managing GlobalProtect and Active/Active High Availability
◾Optimize their visibility and control over applications, users, and content
Course Content:
Administration and Management
◾Password Management
◾Certificate Management
◾Log Forwarding
Interface Configuration
◾VLAN Objects
◾QoS
Layer 3
◾NAT
◾Policy Based Forwarding
◾Routing Protocols (OSPF)
App-ID™
◾Defining new Application Signatures
◾Application Override
Content-ID™
◾Custom Threat Signatures
◾Data Filtering
◾DoS Protection
◾Botnet Report
User-ID™
◾Captive Portal
◾Terminal Server Agent
◾XML API
◾Dynamic Address Objects
VPN
◾w
◾Configuring the Portal, Gateway, and Agent
◾Host Checks
◾Logs
High Availability
◾Configuring Active/Active HA
Timothy Dean
Tiffany Lloyd