官术网_书友最值得收藏!

Chapter 1: Understanding the Core Technologies

In this chapter, we're going to examine the core technologies that make up the Palo Alto Networks firewall.

We are going to take a closer look at how security zones control how security, Network Address Translation (NAT), and routing verdicts are made. We will review the mechanics behind App-ID and Content-ID so you get a deeper understanding of how packets are processed and security decisions are made by the firewall, and we will review how User-ID contributes to a more robust security stance by applying group-based or user-based access control.

This chapter will cover the following topics:

  • Understanding the zone-based firewall
  • Understanding App-ID and Content-ID
  • The management and data plane
  • Authenticating users with User-ID
主站蜘蛛池模板: 特克斯县| 清新县| 南靖县| 松潘县| 扎赉特旗| 青海省| 荔浦县| 时尚| 新郑市| 西藏| 石家庄市| 滁州市| 筠连县| 丰镇市| 定安县| 二手房| 屏山县| 东兰县| 锦屏县| 若羌县| 读书| 行唐县| 阜城县| 嘉义县| 体育| 台南市| 杂多县| 巴青县| 尉氏县| 姜堰市| 曲阳县| 雷州市| 灵川县| 枣强县| 仙桃市| 章丘市| 牡丹江市| 抚远县| 东兴市| 烟台市| 延川县|