Latest News: iON Welcomes New VP Service Delivery & Operations: Read More


    Palo Alto Networks NGFW 10.1 Essentials Training: Configuration & Management Go Back

    Code: EDU-210
    Format: 4 day Instructor-Led
    Tuition (CAD): $3,995
    Where: Online
    Date/Time: Nov 14, 2022 9:00am - Nov 17, 2022 5:00pm
    Extra: If you need to cancel, please provide at least 2 weeks notice prior to the first day of instruction for a full refund.

    Course Overview

    During this hands-on lab training, you will learn to work with the next-generation firewalls from Palo Alto Networks in a test environment. This 4-day course is taught by a Palo Alto Networks Authorized Trainer and forms the foundation of the educational training program to become a Palo Alto Networks Certified Network Security Engineer (PCNSE).

    Who can benefit

    This course is appropriate for individuals responsible for the deployment and day to day management of Palo Alto Networks Next-Generation Firewalls: Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers and Technical Support staff.

    Course outline

    In this course, you will learn how to:

    • Configure and manage the essential features of Palo Alto Networks next-generation firewalls
    • Configure and manage security and NAT policies to enable approved traffic to and from zones
    • Configure and manage threat prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
    • Monitor network traffic using the interactive web interface and firewall reports

    Module 1 – Platform and architecture

    • Describe the three pillars of the Palo Alto Networks portfolio
    • Define the single-pass architecture
    • Define Zero Trust Concept
    • Describe the physical and virtual firewall models available from Palo Alto Networks

    Module 2 – Initial configuration

    • Identify available firewall management interfaces and the methods to access them
    • Configure firewall management interface network settings and services
    • Identify the purpose and location of the firewall licenses and how to manage licenses
    • Identify how to update the PAN-OS® software

    Module 3 – Managing firewall configurations

    • Describe the purpose of the running and candidate firewall configurations
    • Manage firewall configuration
    • View and filter firewall logs, with focus on system and configuration logs because they are updated when managing firewall configurations

    Module 4 – Managing firewall administrator accounts

    • Describe the firewall authentication and authorization process and firewall components
    • Create a local firewall administrator account
    • Create a non-local firewall administrator account
    • Create a firewall account that supports non-interactive login

    Module 5 – Connecting the firewall

    • Describe firewall network segmentation components used to block threats
    • Configure firewall security zones to implement network segmentation
    • Configure tap interfaces to collect network traffic for later analysis
    • Configure virtual wire interfaces to control network traffic traversing between two firewall interfaces
    • Configure Layer 3 interfaces to control network traffic traversing Layer 3 networks
    • Configure a virtual router to support Layer 3 interfaces

    Module 6 – Security policies

    • Describe security policy concepts and operation
    • Configure a security policy rule
    • Manage a security policy
    • Create and use tags and custom services in a security policy

    Module 7 – NAT Policies

    • Configure a NAT policy to implement source NAT
    • Configure a NAT policy to implement destination NAT

    Module 8 – App ID

    • Identify how App-ID reduces the attack surface
    • Describe App-ID concepts and operation
    • Configure App-ID-based policy rules
    • Update App-ID application database

    Module 9 – Security Profiles

    • Describe the seven different security profile types
    • Define the two predefined vulnerability protection profiles
    • Configure security profiles to prevent virus and spyware infiltration
    • Configure file blocking profiles to identify and control the flow of file types through the firewall
    • Configure a DoS protection profile to help mitigate Layer 3 and 4 protocol-based attacks

    Module 10 – URL Filtering

    • Configure the firewall to block traffic from known-malicious IP addresses
    • Configure the firewall to block traffic from known-malicious domains
    • Configure the firewall to block traffic from known-malicious URLs
    • Describe other URL filtering operations and options

    Module 11 – Wildfire

    • Describe WildFire purposes and operation
    • Describe WildFire license and deployment choices
    • Configure and update WildFire
    • View WildFire reports and logs

    Module 12 – User-ID

    • Identify the purpose and four main components of User-ID
    • Identify available IP-to-username mapping methods
    • Configure the PAN-OS® integrated agent to connect to monitored servers
    • Configure username-to-group name mapping
    • Implement User-ID in Security policy

    Module 13 – Encrypted traffic

    • Review fundamental SSL concepts and operation
    • Create and manage certificates using the web interface
    • Configure SSL/TLS forward proxy decryption
    • Configure SSL/TLS inbound inspection decryption
    • Prevent decryption for specific traffic
    • View information and troubleshoot SSL/TLS issues using the CLI and logs
    • Identify decryption configuration considerations
    • Configure SSH decryption
    • List other available decryption methods

    Module 14 – Logging and reporting

    • Monitor threat and traffic information using the Dashboard and the ACC
    • Monitor threat and traffic information using the logs
    • Monitor threat and traffic information using App Scope reports
    • Monitor threat and traffic information using predefined and custom reports
    • Configure firewall log forwarding to external services

    What you need

    Basic network knowledge (scope: routing, switching and IP addressing). Basic security concepts. Experience with other security technologies (IPS, Proxy, content filtering) is a plus.

    Students need a laptop with a decent HTML5 browser, preferably Chrome or Firefox.