Palo Alto Next Generation Firewall Administration Training

  • Overview
  • Course Content
  • Drop us a Query

The Palo Alto Training Course, Palo Alto Next Generation Firewall Administration certification is a way to gain perfection in performing the installation, configuration and conducting the Palo Alto Network Firewall. Moreover, the training insights the candidates on how to configure, install, and administer Palo Alto Networks firewall and understand the configuration steps for VPN & High Availability.

After getting certification in Palo Alto Next Generation Firewall Administration, the candidates will gain proficiency in:

  • Using the GUI and use CLI
  • Describing IKE Gateways, IPSec Crypto Profiles, IKE Crypto Profiles, IKE Crypto Profiles, Alarm Log Settings and Configuration Log Settings.
  • Implementing the intelligence on Set Up IPSec Tunnels and Set Up IPSec VPNs
  • Configuring  Active/Active HA
  • Configuring RADIUS Server Settings
  • Understanding Content-ID Agent and View IPSec Tunnel Status on the Firewall
  • Comprehending about Panorama
  • Understand what are Set Up Authentication Profiles?
Target audience
  • Security Engineers
  • Support Staff
  • Network Engineers
Prerequisites

The candidates should have familiarity with the basics of networking concepts, including routing, switching, and IP address.

1. Introduction

2. Administration & Management

  • Using GUI
  • Using CLI Password Management
  • Certificate Management
  • Log Forwarding
  • PAN-OS & Software Update

3. Interface Configuration

  • VLAN Objects
  • QoS
  • Virtual Wire
  • Tap
  • Sub interfaces
  • Security Zones

4. Layer 3 Configurations

  • Advance NAT Features
  • IPv6 Overview
  • Policy Based Forwarding
  • Routing Protocols (OSPF)
  • Interface Management
  • Service Routes
  • DHCP
  • Virtual Routers

5. Security Policy

  • Policy Objects
  • Defining Security Policy
  • DMZ

6. NAT

  • Source and Destination NAT
  • NAT Policy Configuration

7. App-ID™

  • App-ID Process
  • Security Policy Configuration
  • Policy Administration
  • Defining new Application Signatures
  • Application Override

8. Content-ID™

  • Antivirus
  • Anti-spyware
  • Vulnerability
  • URL Filtering
  • File Blocking: WildFire™
  • Zone Protection
  • Custom Threat Signatures
  • Data Filtering
  • DoS Protection
  • Botnet Report

9. Authentication Profiles

  • Setting Up Authentication Profiles
  • Creating a Local User Database
  • Configuring RADIUS Server Settings
  • Configuring LDAP Server Settings
  • Configuring Kerberos Settings

10. User-ID™

  • User-ID Agent
  • Enumerating Users
  • Mapping Users to IP
  • Captive Portal
  • LDAP Integration
  • Users in Security Policy

11. Decryption

  • SSL Inbound and Outbound

12. VPN

  • Virtual Private Networks-Intro
  • VPN Tunnels
  • IPSec and IKE
  • IPSec and IKE Crypto Profiles
  • Setting Up IPSec VPNs
  • Defining IKE Gateways
  • Setting Up IPSec Tunnels
  • Defining IKE Crypto Profiles
  • Defining IPSec Crypto Profiles
  • Viewing IPSec Tunnel Status on the Firewall

13. Reports and Logs

  • Logging Configuration
  • Scheduling Log Exports
  • Defining Configuration Log Settings
  • Defining System Log Settings
  • Defining HIP Match Log Settings
  • Defining Alarm Log Settings
  • Managing Log Settings
  • Configuring Syslog Servers
  • Custom Syslog Field Descriptions

14. High Availability

  • Configuring Active/Active HA

15. Panorama

  • Device Groups & Templates
  • Shared Policy
  • Config Management
  • Reporting and Log Collection

A Few Things You'll Love!

What our Students Speak

+