Tag: Palo Alto Networks

Palo Alto Networks - PCNSE Certification Part 6: Basic Configuration (Destination NAT and Security Policy)
2 min read

Palo Alto Networks - PCNSE Certification Part 6: Basic Configuration (Destination NAT and Security Policy)

The last post was very long and a bit crazy all over the place, but here we are continuing with it. To illustrate how to crate a destination NAT, we will be opening FTP to one of our DMZ server, so lets get started Create Object Under Objects -> Services we will create our new FTP Object Destination NAT Policy We are pretty much following the same flow we initially followed when we were playing with the Source NAT Policies, with few minor changes that will make sense

Palo Alto Networks - PCNSE Certification Part 3: Basic Configuration (Admin Roles)
3 min read

Palo Alto Networks - PCNSE Certification Part 3: Basic Configuration (Admin Roles)

So I continue my journey to get this cert, I think I have procrastinated for too long and I need to get back to learning all the ins and outs for the technology. Again this certification is very heavy on configuration, HA concepts and maybe scattered between all their main Objectives. We are going to get working with Initial Configuration Admin Roles Like any other appliance out there, you have the ability to create different Admin roles and different permissions based on their job function

Palo Alto Networks - PCNSE Certification Part 4: Basic Configuration (Interfaces)
4 min read

Palo Alto Networks - PCNSE Certification Part 4: Basic Configuration (Interfaces)

This quick lab is going to be about creating Zones, assigning them to interfaces, Management Interface configuration Creating a Zone We will create the Outside Zone and we are going to add a name + selecting the type, nothing fancy, but later in the lab we will use it and go through configuring more features Create an Interface Management Profile We are going to quickly create a Management profile and assign to an interface

Palo Alto Networks - PCNSE Certification Part 5: Basic Configuration (Security Policies, source NAT)
5 min read

Palo Alto Networks - PCNSE Certification Part 5: Basic Configuration (Security Policies, source NAT)

Create Tags One thing that I really appreciate from PANOS is the introduction of TAGs, they are very handy when you are looking for policies, objects and many different things in your firewall. I know many of you out there appreciate the feature. Tags are color-coded labels and enable you to group, sort, and filter objects using keywords or phrases. Tags can be applied to Address objects, Address Groups (static and dynamic), services, Service Groups, and policy rules. Tags can be assigned a color that makes the results of a search easier to find in the web interface.

Palo Alto Networks - PCNSE Certification - Part 2 - Building a Lab (Where to get Started)
3 min read

Palo Alto Networks - PCNSE Certification - Part 2 - Building a Lab (Where to get Started)

As with any certification that I attempt I go into it with a mindset of learning by reading, watching videos and doing… Being doing the strongest one in my list of things to do. I want to make sure all the things that I have seen listed in the PCNSE Study Guide I can do, with the exception of the High Availability piece, which I will have. Bait of a hard time using since I only have access to 1 VM.

Palo Alto Networks - PCNSE Certification - Part 1 - Breaking down the Exam Objectives
4 min read

Palo Alto Networks - PCNSE Certification - Part 1 - Breaking down the Exam Objectives

As the new year hits, I have new resolutions, and these entail getting my feet wet with Palo Alto Networks, due to my job and many other factors I’m open to learning and get certified on the PCNSE, which stands for Palo Alto Networks Certified Network Security Engineer The Certification Requirements This exam contains 75 questions and over 80 minutes - The intended audience are engineers that currently work with Next-generation firewalls and would like to take their knowledge to the next level. They recommend having 3 to 5 years of experience