Multiple options to integrate the Palo Alto Firewall into your: Network Layer 2 interfaces and VLAN interfaces Layer 3 interfaces Tap interfaces Loopback and tunnel interfaces HA interfaces Type 1 - Layer 2 interfaces: Allows a Trunk interface to tra…
LDAP Authentication and Remote Users and Groups Create Remote User Objects and LDAP Integration: samAccountName - eric.wei UserPrincipalName - eric.wei@pandabusiness.local Prerequisites: Microsoft Active Directory(LDAP) AD service account for Palo Al…
Address Objects and Groups Creating address objects. Organizing address objects with address groups Limiting the human error and complexity thanks to address groups. Add a new address: Add new Address Groups:  Service Objects and Groups Creating serv…
Leveraging V-Wires Bridge two physical connections and apply security Policies without influencing any routing decision(transparent Firewall inspection) Inspect per VLAN traffic by creating V-Wire sub interfaces. Interface configuration>> STEP1: Con…
Firewall Security Zones Zones: The foundational aspect of every Firewall. Police network traffic Enforce ingress and egress flow Provide traffic identify Configure the Zones in Network Tab.…
Users Objects and Groups Creating local user objects. Creating local user groups. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/user-id/user-id-overview.html Add local users Add local groups. Add User Group-based Internet accessible Secur…
Preparation of the Lab Environment: Download and Install Pan-OS from the following website https://docs.gns3.com/appliances/pan-vm-fw.html or https://me.csdn.net/download/hotbrandon URL  https://IP Default Username/Password: admin/admin PAN-OS 8 Conf…
Task 3 The SOC(Security Operation Center) monitoring team dashboard reported more 1,000 requests to one of our eCommerce Server HTTPS portals in a matter of minutes. The source address identified by our SOC came from Africa and we only serve customer…
Security policies: Enforcing network traffic by configuring rules of what is allowed or denied to communicate between logical network segments (zones) Traffic can be policed with the following parameters: IP Address (source and/or destination) Users…
0x00 前言 SSL VPN虽然可以保护企业资产免受互联网被攻击的风险影响,但如果SSL VPN本身容易受到攻击呢?它们暴露在互联网上,可以可靠并安全地连接到内网中.一旦SSL VPN服务器遭到入侵,攻击者就可以渗透到内网,甚至接管所有连接到ssl-vpn服务器的用户!由于其重要性,在过去几个月中,我们开始对安全领先的SSL VPN产品进行安全研究. 我们计划用3篇文章上发布我们的结果.我们把本文作为第一篇,因为我们认为这是一个有趣的故事,非常适合作为我们Black Hat USA and D…