- Home
- PaloAlto Training (PCNSE)
COURSE DESCRIPTION
Palo Alto Networks Nex Gen Firewalls
As per PCNSE (Palo Alto Networks Certified Network Security Engineer)
Module 1: Introduction to Palo Alto Networks Products
1 Review of Products offered by Palo Alto Networks
2 Comparison between Legacy Vs NGFW
3 Pan OS architecture overview & Licenses
4 Form Factors – Physical, VM, CN Series & Cloud NGFW
Module 2: Deployment Modes, Pan OS Upgrade, Dynamic Updates
5 L-3, L-2, V-Wire & TAP deployment modes.
6 Pan OS Upgrade Procedure
7 Dynamic Updates & Best Practices
Module 3: Security Policies, Security Zones & Interfaces
8 Overview of Day 1 Config
9 Security Policy, Rule types – Interzone, Intrazone & universal.
10 Overview of Interface and Zone Types
11 Determining Appropriate Interface and Zone Types
12 Interface Types: Layer 2, Layer 3, Virtual Wire, Tap, Sub interfaces.
13 Interface Management Profiles
Module 4: Routing Techniques
14 Virtual Router Concepts
15 Dynamic Routing
16 Static Routes
17 Path Monitoring
18 ECMP (Equal Cost Multiple Path)
19 Policy Based Forwarding
20 Service Route and its uses.
Module 5: NAT Policies
21 Source NAT - Dynamic IP/Port, Dynamic IP & Static NAT
22 Destination NAT - Static IP, Dynamic IP (with session distribution), with Port Forwarding/Port Translation.
23 NO NAT
24 Use session browser to find NAT rule name
25 U-Turn NAT
Assessment - 1
Module 6: Understanding Security Profiles & Security Features
26 Antivirus, AntiSpyware & Vulnerability
27 URL Filtering
28 Wildfire, Data Filtering & File Blocking,
29 DOS & Zone Protection.
30 Packet Buffer Protection
Module 7: Site to Site Tunnels
31 IPSec Components
32 Proxy IDs
33 Tunnel Monitoring
Module 8: Global Protect & Authentication
34 Global Protect Components
35 Connect Methods
36 Split Tunnel Vs Full Tunnel
37 LDAP Auth
38 Radius Auth
39 SAML Auth
Module 9: User ID
40 User ID Agent vs Agentless
41 User ID Group mapping
42 User ID Methods
43 User ID redistribution
Module 10: SSL Decryption & App ID
44 SSL Forward Proxy & Inbound inspection
45 Certificate Management
46 SSL Decryption Profile
47 SSL Decryption Exclusions
48 APP ID & Application Tunnelling
49 Application Filter & Group
50 Application Override Policies
Module 11: High Availability
51 Active – Passive HA
52 Link & Path Monitoring
53 Overview of Active – Active HA
Module 13: Troubleshooting
54 Monitor Tab – Traffic/Threat/UrlFiltering/Global Protect Logs
55 ACC – Application Command Center
56 Session