+91-9910111641 +91-9871481152 +91-01204310416 info@ncpnetwork.com

PALOALTO
Syllabus

Virtual Course

001. PALOALRO INTRO -SP3- ARCHITECTURE-FLOW LOGIC

    001. Paloalto Firewall Introduction
    002. CONCEPT OF INGRESS & EGRESS PORT IN PA
    003. FLOW LOGIC-INITIAL PACKET PROCESSING
    004. FLOW LOGIC-SECURITY PRE POLICY
    005. FLOW LOGIC-APPLICATION
    006. FLOW LOGIC-SECURITY POLICY
    007. FLOW LOGIC-POST POLICY PROCESSING
    008. Paloalto Architecture Model Part 1
    009. Paloalto Architecture Model Part 2

Total Duration: 00

002.PALOALTO CLI AND GUI ACCESS-GENERAL SETTING

    001. How io access Paloalto Firewall via Console cable & via GUI mode Part 1
    002. How io access Paloalto Firewall via Console cable & via GUI mode Part 2
    003. How to change management ip address via CLI & GUI
    004. General Setting of Paloalto FW
    005. How to Access(configure) Paloalot firewall via console or GUI
    006. How to change Management IP Address via cli or GUI
    007. General Paloalto Settings
    008. Register firewall , licences. software, dynamic update

Total Duration: 00

003. TYPES OF ADMIN-ADMIN ROLES

    001. Types of Administrator Roles in Paloalto Part 1
    002. Types of Administrator Roles in Paloalto Part 2
    003. Administrator Roles and create new users Part1
    004. Administrator Roles and create new users Part2

Total Duration: 00

004. AUTH & PASSWORD PROFILE

    001. Authentication Profile and Password Profile
    002. Sequence Authentication profile
    003. User login Authentication via LDAP Server (AD Server)
    004. Window user Authenticate via LDAP SERVER

Total Duration: 00

005. PALOALTO INTERFACE DEPLOYMENT & ZONE MEMBERSHIP

    - 1 - TAP MODE DEPLOYMENT-ADD LAB
    001.Paloalto Interface Deployment modes
    002. Interface Deployment in Paloalto FW--TAP Mode
    - 2 - LAYER 2 DEPLOYMENT+
    001. Interface Deployment in Paloalto FW--Layer 2 Mode
    002. Configuration Steps--L2 Interface with No VLAN TAG
    003. Configuration Steps--Layer 2 Sub-int with VLAN TAG
    004. L2 DEPLOYMENT
    005. LAYER 2 DEPLOYMENT WITH NO VLAN TAG
    006. LAYER 2 SUB-INT WITH VLAN TAG
    007. LAYER 2 SUB-INT WITH SVI & INTERVLAN ROUTING
    - 3 - VIRTUAL WIRE DEPLOYMENT+
    001. Interface Deployment in Paloalto FW -Virtual Wire Mode
    002. Confguration Steps -V Wire Deployment -Allow Native & Tag Vlan Traffice
    004. Configuration Steps -V Wire Deployment-Seperate Customers Traffice--Multiple TAG
    005. Virtual-wire
    006. VIRTUAL WIRE-NATIVE VLAN-TAG VLAN -GRE
    - 4 - LAYER 3 DEPLOYMENT - ADD LAB
    001. Interface Deployment in Paloalto FW-Layer 3 Mode
    - 5 - AGGREGATE DEPLOYMENT-ADD LAB
    001. Interface Deployment in Paloalto FW - Aggregate Interface Group - HA - Mode
    - 6 - ZONE & ZONE MEMBERSHIP - ADD LAB
    010. What is ZONE-Why we need ZONE-How to Create ZONE
    011. How to define-Interface Deployment-VR membership-Zone Membership - IP Address

Total Duration: 00

006.SECURITY POLICY--INTRA ZONE AND INTER ZONE

    001. Default Security Policy - Intra-Zone and Inter-Zone Traffic Policy
    002. How to make security policy for Paloalto Inter-Zone
    003. Paloalto Intra-zone Security Policy
    004. Paloalto Inter-zone Security Policy
    005. By Default allow traffic intrazone

Total Duration: 00

007. DEFAULT ROUTE - SERVICE ROUTE-PLAOALTO INTERNET ACCESS

    001. How to configure Default Route for Paloalto Data Plane
    002. Service Route
    003. How to connect Paloalto to Internet
    004. How to connect paloalot to internet
    005. How to allow trafic trust to untrust
    006. PALOALTO - SECURITY POLICY-DNS-STATIC & DEFAULT

Total Duration: 00

008. NAT TYPES SOURCE NAT DESTINATION NAT AND U-TURN NAT

    001. Introduction of NAT
    002. Types of Source NAT
    003. Types of Destination NAT
    004. NAT Policy for Dynamic IP & Port(Source NAT)
    005. Provide Internet Access to LAN-Traffic from TRUST to UNTRUST ZONE Part 1(Source NAT)
    006. Provide Internet Access to LAN-Traffic from TRUST to UNTRUST ZONE Part 2(Source NAT)
    007. NAT & Security Policy for STATIC NAT -Allow public access to DMZ server(Source NAT)
    008. NAT & Security policies for DESITINATION NAT-One to Many-Port Forwarding
    009. NAT & Security policies for DESITINATION NAT-One to Many-Port Translation
    010. NAT & Security policies for DESITINATION NAT-One to Many-Port Translation, Service Group, Address Group
    011. U -TURN NAT DUBBLE NAT - SAME ZONE
    012. U-TURN NAT-DIFFERENT ZONE
    - LAB -
    001. How to Configure SOURCE NAT-Dynamic IP & Port Part 1
    002. How to Configure SOURCE NAT-Dynamic IP & Port Part 2
    003. How to Configure SOURCE NAT-Dynamic IP
    004. How to Configure SOURCE NAT-Static IP-Bi-directional
    005. How to Configure DESTINATION NAT-Port Forwarding Part 1
    006. How to Configure DESTINATION NAT-Port Forwarding Part 2
    007. How to Configure DESTINATION NAT-Port Translation
    008. How to Configure DESTINATION NAT-Port Translation with Address & Service Group
    009. How to Configure U-TURN NAT-SAME ZONE-SINGLE NAT
    010. How to Configure U-TURN NAT-SAME ZONE-DOUBLE NAT
    011. How to Configure U-TURN NAT-SAME ZONE-DOUBLE NAT-HIDE REAL IP
    012. How to Configure U-TURN NAT-DIFFERENT ZONE-SINGLE NAT-HIDE REAL IP
    BONUS VIDEOS
    01. SOURCE NAT & DESTINATION NAT BRIEF--VIDE
    02. SOURCE NAT
    03. DESTINATION NAT
    04. How to configure Destination NAT -Port Forwarding--Static
    05. How to configure Destination NAT -Port Translation--Static
    06. How to configure Destination NAT -Port Translation with Dynamic Distribution
    07. U TRUN NAT-DIFFERENT ZONE-SINGLE NAT
    08. U TRUN NAT-SAME ZONE-SAME SUBNET-DOUBLE NAT
    09. U TURN NAT
    ADVANCED VIDEO
    001. LAYER 2 SUB-INT WITH SVI & SOURCE NAT
    002. LAYER 2 SUB-INT WITH SVI & DESTINATION NAT WITH RDP
    003. LAYER 2 SUB-INT WITH GRE TUNNEL

Total Duration: 00

009. DYNAMIC PROTOCOLS AUTHENTICATION & REDISTRIBUTION PROFILE

    001. Paloalto Dynamic Protocol BGP & Static Redistribution
    002. RIP IMPLEMENTATION
    003. How to Configure Rip & Mututal Redistribute with BGP Part 1
    004. How to Configure Rip & Mututal Redistribute with BGP Part 2
    005. Paloalto Dynamic Protocol BGP & OSPF Redistribution
    006. MUTUAL REDISTRIBUTION RIP & OSPF
    007. PROTOCOLS REDISTRIBUTION STATIC & OSPF
    008. MUTUAL REDISTRIBUTION OSPF & BGP WITH AUTH

Total Duration: 00

010. POLICY BASED FORWARDING(PBF)

    001. Overview of Policy Based Forwarding PBF
    002. Configuration Steps Policy Based Forwarding
    003. How to configure Policy Based Forwarding in PALOALTO
    Bonous Video - How to Configure PBF on PLAOALTO

Total Duration: 00

011. PALOALTO LAYER 3 SUBINTERFACE & CONCEPT OF VIRTUAL ROUTER

    001. Overview of Inter-Vlan Routing L3 Sub-interface
    002. Configuration Steps Inter-Vlan Routing L3 Sub-interface
    003. VRF in Cisco Router Vs VR in Paloalto FW
    004. How to configure Sub-interface with DOT1Q TAG Part 1
    005. How to configure Sub-interface with DOT1Q TAG Part 2
    006. Concept of Sub-interface
    007. Sub-interface with diffrent Zone & diffrent VR
    008. L3 SUBINTERFACE VLAN TAGGING DIFFERENT ZONE-SAME VIRTUAL ROUTER
    009. L3 SUBINTERFACE VLAN TAGGING DIFFERENT ZONE-DIFFERENT VIRTUAL ROUTER

Total Duration: 00

012. PALOALTO HA

    001. PaloAlto High Availability(HA) & Prerequisite
    003. Paloalto HA Triggers Heart Beat Link Monitoring -Path Monitoring
    004. Configuration Steps for HA - Interface Deployment
    005. Configuration Steps for HA - Define General Setup-HA mode-Group ID-Peer IP
    006. Configuration Steps for HA - Define HA Priority & Preemption
    007. Configuration Steps for HA - Define HA 1 & HA 2 Perameter
    008. How to configure Paloalto for HA - Active & Passive Mode Part 1
    009. How to configure Paloalto for HA - Active & Passive Mode Part 2
    010. How to Configure PaloAlto in Active Passive Mode
    011. How to Configure PaloAlto in Active Active Mode

Total Duration: 00

013. SITE-TO SITE VPN ON PALOALTO AND CISCO ROUTER

    001. IPsec VPN is a combination of multiple protocols
    002. Site To Site VPN IPSEC on Cisco Router Part 1
    003. Site To Site VPN IPSEC on Cisco Router Part 2
    004. IPSec over GRE Part 1
    005. IPSec over GRE Part 2
    006. Site toSite VPN Overview---IPSEC --IKE Phase 1--IKE Phase 2
    007. Confguration Steps Site-to-Site VPN on Paloalto FW-Tunnel Interfece
    008. Confguration Steps Site-to-Site VPN on Paloalto FW-IKE Profile
    009. Confguration Steps Site-to-Site VPN on Paloalto FW-IPsec Profile
    010. Confguration Steps Site-to-Site VPN on Paloalto FW-IKE Gateway Profile
    011. Confguration Steps Site-to-Site VPN on Paloalto FW-IPsec Tunnel
    012. Confguration Steps Site-to-Site VPN on Paloalto FW-Static Route for PEER LAN
    013. Confguration Steps Site-to-Site VPN on Paloalto FW-Security Policy for IKE & ESP
    014. Confguration Steps Site-to-Site VPN on Paloalto FW-Security Policy for VPN Users
    015. Confguration Steps Site-to-Site VPN on Cisco Router-ISAKMP Policy or IKE Profile or Phase 1
    016. Confguration Steps Site-to-Site VPN on Cisco Router-IKE Gateway Profile
    017. Confguration Steps Site-to-Site VPN on Cisco Router-IPSEC Profile or Pahase 2
    018. Confguration Steps Site-to-Site VPN on Cisco Router-Tunnel Interface & IPSEC Tunnel
    019. Confguration Steps Site-to-Site VPN on Cisco Router-Static Route for PEER LAN
    020. How to configure IPSEC tunnel between PALOALTO & CISCO Router Part 1
    021. How to configure IPSEC tunnel between PALOALTO & CISCO Router Part 2
    022. How to configure IPSEC tunnel between PALOALTO & CISCO Router Part 3
    023. How to configure IPSEC tunnel between PALOALTO & CISCO Router Part 4
    024. How to configure IPSEC tunnel between PALOALTO to PALOALTO

Total Duration: 00

014. SSLVPN

    001. How to configure SSL VPN Part1
    002. How to configure SSL VPN Part 2
    003. PALOALTO-SSL VPN

Total Duration: 00

015. LDAP

    001. LDAP Authentication Part 1
    002. LDAP Authentication Part 2

Total Duration: 00

016. PANAROMA

    001. PANAORAMA Part 1
    002. PANAORAMA Part 2

Total Duration: 00

017. APP-ID

    001. Application Identity APP-ID
    002. How APP-ID works
    003. Application Vs Protocol & Port Security Policies Part 1
    004. Application Vs Protocol & Port Security Policies Part 2
    005. Application Vs Protocol & Port Security Policies Part 3
    006. CONCEPT OF APPLICATION -DEFAULT & APP-ID PART 1
    007. CONCEPT OF APPLICATION -DEFAULT & APP-ID PART 2
    008. How to Control APP-ID --Block facebbok chat & video--youtube base

Total Duration: 00

018. Decrytion Policy

    Decrytion policy

Total Duration: 00

019.PACKET CAPTURE

    001. Zoom_0
    002. Zoom_1

Total Duration: 00

020. URL FILTERING

    url-filtering

Total Duration: 00

021. ZONE PROTECTON

    ZONE PROTECTION

Total Duration: 00

025. Malware Behaviour DYNAMIC BLOCK LIST

    001. Malware Behaviour Part 1
    002. Malware Behaviour Part 2
    003. Malware Behaviour Part 3
    Dynamic Blocking list

Total Duration: 00

End of Course