Category Archives: Uncategorized
1. High Availability Overview In this lecture, we’ll talk about high availability. The Palo Alto firewall supports two types of high availability: active passive and active active. In the case of active-passive, you have two firewalls. One of them is the active firewall that is forwarding the traffic, and the other is a backup firewall […]
1. DHCP Services In this lecture, we will see how to setup the Palo Alto firewall to provide DHCP services to the Trust segment depicted in this diagram here. So I have the firewall, and I have the Trust interface, which is Ethernet on. And I am going to configure this for 10:00 and provide […]
6. Static NAT with Port Translation Use Case and scenario example In this lecture, we’ll talk about static networks with port translation. So there are certain situations where you want to use the same public IP address for different purposes. And this happens in a situation where you’re running out of IP addresses. So let’s […]
1. Understanding Dynamic NAT and port We’re going to start talking about network address translation. Network address translation is used to preserve IPv4 addresses, which are basically running out. It’s recommended to go to IPV 6. There’s a section for IPV 6. So we’re going to talk specifically about IPV 4. The next allows you […]
4. SSL Forward Proxy Using an Internal PKI Subordinate CA So most companies prefer to centralise their certificates using their internal PKI. I’m going to show you in this lecture how to create a CA certificate for your Palo Alto Firewall from your internal PKI. and I am creating it using the Windows 2012 server. […]
1. Force Synchronization Welcome to Section Ten. Implementing identity synchronization For the first video, we are going to force the synchronization. So what are the four synchronization requirements? First thing, Active Directory Connect can take up to 30 minutes for the sync. And we cannot wait. PowerShell is the best option for synchronization in Atlanta. […]
1. Software Applications (OBJ 1.3) In this portion of the course, we’re going to discuss software applications in your enterprise architecture. Throughout this section, we’re going to be focused on Domain One’s security architecture, and specifically on Objective 1.3. Given a scenario, you must integrate software applications securely into an enterprise architecture. Now, we’re going […]
1. Cloud and Virtualization (OBJ 1.6) In this section of the course, we’re going to discuss how to implement secure cloud and virtualization solutions. Throughout this section, we’re going to be focused on domain one security architecture and specifically objective six. Given a set of requirements, you must implement secure cloud and virtualization solutions. We’re […]
1. Infrastructure Design (OBJ 1.2) In this section of the course, we’re going to discuss how to determine the proper infrastructure security design by considering some key requirements such as scalability, resiliency, and automation. So in this section, we’re again going to be focusing on domain one security architecture specifically, objective one and two of […]
1. Securing Architectures (OBJ 1.1) In this section of the course, we’re going to continue discussing ways to secure our network architectures. But this time we’re going to be focused on different services, segmentation, and zero trust in conjunction with deep parameterization and software-defined networking. In this section, we are again going to discuss domain […]