10151106Perimeter Security
Course Information
Description
This is an introductory course covering all the fundamentals to understand the Palo-Alto Next-Generation Firewall from the ground up. Students configure and manage the essential features of Palo Alto Networks Next-Generation Firewall, Configure and Manage Security and NAT policies, Configure and manage Threat Prevention, Monitor network traffic and logging.
Total Credits
3
Course Competencies
-
Connect to the Management Network of the firewallAssessment StrategiesSkill demonstration in labCriteriaSet DNS servers for the firewallSet NTP servers for the firewallConfigure a login banner for the firewallConfigure permitted IP addresses for firewall management
-
Manipulate configuration snapshots and logsAssessment StrategiesSkill demonstration in labCriteriaSave a named configuration snapshotExport a named configuration snapshotRevert configuration changesExamine log filesCreate log file filters
-
Manage firewall administrator accountsAssessment StrategiesSkill demonstration in labCriteriaCreate a local user database accountCreate an Administrator AccountConfigure LDAP authenticationConfigure RADIUS authentication
-
Connect firewall to production networkAssessment StrategiesSkill demonstration in labCriteriaCreate layer 3 network interfacesCreate a virtual routerSegment the production network using security zonesTest connectivity to each zoneDefine interface management profilesTest interface access after management profiles
-
Apply subnetting to firewall networksAssessment StrategiesSkill demonstration in labCriteriaTake a network and divide it into at least two smaller networksConfigure the new network addresses to the firewall
-
Configure security policies and NAT rulesAssessment StrategiesSkill demonstration in labCriteriaCreate a security policy ruleModify a security policy ruleTest a security policy ruleCreate security rules for internet accessCreate a source NAT policyCreate a destination NAT policy
-
Block packet and protocol based attacksAssessment StrategiesSkill demonstration in labCriteriaConfigure and test TCP SYN flood zone protectionProtect against reconnaissance trafficProtect against denial-of-service attacks
-
Block threats from known bad sourcesAssessment StrategiesSkill demonstration in labCriteriaBlock malicious IP addresses-Using address objects-Using address groups-By geographic region-Using external dynamic listsCreate an external dynamic list (EDL) to block malicious domainsAdd an EDL to an antispyware profileAdd the antispyware profile to a security ruleCreate a custom URL Category Block access to malicious URL using an URL Filtering Profile
-
Block threats using custom applicationsAssessment StrategiesSkill demonstration in labCriteriaConfigure packet captureAnalyze packet captureCreate custom application with a signatureAdd the custom application to a security policyTest the custom application
-
Block threats with User-IDAssessment StrategiesSkill demonstration in labCriteriaEnable User-ID on one of the network zonesGenerate traffic from the network zoneExamine User-ID logsExamine firewall traffic logs
-
Block unknown malware with WildfireAssessment StrategiesSkill demonstration in labCriteriaCreate a Wildfire analysis profileApply Wildfire profile to security rulesTest the Wildfire profileExamine Wildfire analysis details
-
Block threats in encrypted trafficAssessment StrategiesSkill demonstration in labCriteriaCreate a decryption policy for outbound trafficTest outbound decryption policyTest a no-decryption rule
-
Prevent use of stolen credentialsAssessment StrategiesSkill demonstration in labCriteriaConfigure credential detectionTest the credential detection
-
Implement day-one best practice configurationAssessment StrategiesSkill demonstration in labCriteriaModify security policy rulesCreate recommended security profilesCreate a security profile group from the created security profilesApply the security profile group to security policies
-
Protect data transfer with site-to-site virtual private networkAssessment StrategiesSkill demonstration in labCriteriaConfigure a site-to-site virtual private network (VPN)Test the VPN
-
Protect data transfer with a GlobalProtect virtual private networkAssessment StrategiesSkill demonstration in labCriteriaConfigure GlobalProtect virtual private network (VPN)Test the VPN