Monthly Archives: May 2023
5. Setting Library Permissions – Granting Users Access to a Library Another feature of Salesforce CRM Content is setting Content Permissions and I’m on the Library Permissions screen. It’s not really named consistently because you got to search for Content permissions to bring up the Library Permission screen and set up. And this link here […]
1. Course and Content Management Introduction You so much for checking out part three of my Salesforce Advanced Administrator Certification course. So this is the third and final installment of this course series. So it’s in this particular course that we will cover the final four knowledge areas found in the exam guide that I’m […]
1. View Setup Audit Trail Think of auditing and monitoring a salesforce. org. One of the first things that comes to mind for me is the View Setup Audit trail, and it’s kind of oddly named, this link here view setup Audit Trail but the intention behind this is to be able to see what […]
11. IKEv2 intro and differences between IKEv2 and IKEv1 So in this lecture we’ll talk about IC version two. First phase consists of four messages that create the IC. Version two SA the IC. Version two uses UDP. Same like IC version one uses UDP 500 or 4500. There are two main phases of IC. […]
9. IKE security policies required and NAT-T explanation / example Let’s talk about the security policy that needs to be in place to allow the traffic. Typically what you would have is you have the firewall rules and then you would have at the end you would have deny all any to any. That’s the […]
7. IKE main mode more details, explanation So in this lecture we want to talk about some concepts. To make sure we clear on, we need to be familiar with the Diffie Hellman groups. Diffie Hillman is a method allowing two parties to exchange numbers to each other and arrive to a common shared secret […]
3. VPN IPSEc Site To Site Hub Spoke, Dynamic IP address example So in this lecture we will talk about how to deal with VPN tunnels behind dynamic IP addresses. So let’s say this Palo Alto firewall is behind dynamic IP address. It’s a 4G behind a 4G router and it gets different IP addresses. […]
1. VPN IPSEC L2L intro and configuration steps In this lecture we will talk about the Palo Alto Firewall VPN capability. Three setup supported in the Palo Alto Firewall VPN you have site to site and that side to side utilizes IPsec for traffic protection and then you have the Remote User support, remote VPN, […]
6. Bandwidth Throttling IPSEc tunnels demo The next thing we have to do is look at the QoS traffic QoS policy. We can include the IPsec tunnels. So if we go to QoS we’re going to add a QS profile so that’s the outside interface. And then we’re going to use the default, default for […]
3. QoS Classification and Marking On any given network there is multiple applications and services running. The concept of quality of service is to provide different service levels based on how important are the packet or the session. So some applications requires low latency queuing, for example like voice, some applications require allocated bandwidth and […]