Securing Remote Access in Palo Alto Networks

Securing Remote Access in Palo Alto Networks
Author :
Publisher : Packt Publishing Ltd
Total Pages : 336
Release :
ISBN-10 : 9781801076111
ISBN-13 : 1801076111
Rating : 4/5 (111 Downloads)

Book Synopsis Securing Remote Access in Palo Alto Networks by : Tom Piens

Download or read book Securing Remote Access in Palo Alto Networks written by Tom Piens and published by Packt Publishing Ltd. This book was released on 2021-07-02 with total page 336 pages. Available in PDF, EPUB and Kindle. Book excerpt: Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key FeaturesLearn the ins and outs of log forwarding and troubleshooting issuesSet up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issuesGain an in-depth understanding of user credential detection to prevent data leaks Book Description This book builds on the content found in Mastering Palo Alto Networks, focusing on the different methods of establishing remote connectivity, automating log actions, and protecting against phishing attacks through user credential detection. Complete with step-by-step instructions, practical examples, and troubleshooting tips, you will gain a solid understanding of how to configure and deploy Palo Alto Networks remote access products. As you advance, you will learn how to design, deploy, and troubleshoot large-scale end-to-end user VPNs. Later, you will explore new features and discover how to incorporate them into your environment. By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection. What you will learnUnderstand how log forwarding is configured on the firewallFocus on effectively enabling remote accessExplore alternative ways for connecting users and remote networksProtect against phishing with credential detectionUnderstand how to troubleshoot complex issues confidentlyStrengthen the security posture of your firewallsWho this book is for This book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN. Basic knowledge of Palo Alto Networks, network protocols, and network design will be helpful, which is why reading Mastering Palo Alto Networks is recommended first to help you make the most of this book.


Securing Remote Access in Palo Alto Networks Related Books

Securing Remote Access in Palo Alto Networks
Language: en
Pages: 336
Authors: Tom Piens
Categories: Computers
Type: BOOK - Published: 2021-07-02 - Publisher: Packt Publishing Ltd

GET EBOOK

Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key FeaturesLearn the ins and
Mastering Palo Alto Networks
Language: en
Pages: 515
Authors: Tom Piens
Categories: Computers
Type: BOOK - Published: 2020-09-07 - Publisher: Packt Publishing Ltd

GET EBOOK

Set up next-generation firewalls from Palo Alto Networks and get to grips with configuring and troubleshooting using the PAN-OS platform Key FeaturesUnderstand
Mastering Palo Alto Networks
Language: en
Pages: 637
Authors: Tom Piens aka Piens aka 'reaper'
Categories: Computers
Type: BOOK - Published: 2022-06-08 - Publisher: Packt Publishing Ltd

GET EBOOK

Deploy and manage industry-leading PAN-OS 10.x solutions to secure your users and infrastructure Key Features Understand how to optimally use PAN-OS features Bu
Zero Trust Networks
Language: en
Pages: 240
Authors: Evan Gilman
Categories: Computers
Type: BOOK - Published: 2017-06-19 - Publisher: "O'Reilly Media, Inc."

GET EBOOK

The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in
Secure Operations Technology
Language: en
Pages: 162
Authors: Andrew Ginter
Categories: Computers
Type: BOOK - Published: 2019-01-03 - Publisher: Lulu.com

GET EBOOK

IT-SEC protects the information. SEC-OT protects physical, industrial operations from information, more specifically from attacks embedded in information. When