In case there are sources attempting malicious attempts at your environment, we can blacklist them automatically if they exceed a certain severity threshold and tag…
Some websites might not like SSL decryption or due to certificate pinning, There are several ways of doing getting past that, but I’ll be covering…
In this guide, we’ll be covering the best practices for security policies. Explaining the use of App-ID, security profiles, logging options, principles and methodology etc.…
In this article, we’ll be covering how to migrate from a FortiGate firewall to Palo Alto Networks firewalls using the Expedition tool. We can migrate…
QoS (Quality of Service) is used to prioritize certain type of traffic, configure how bandwidth is distributed, allocate a desired amount of performance for a…
The NSX-T builtin firewall is quite refined, but it lacks so much of what Palo Alto Networks and their cloud services have to offer. Traffic…
The NSX-T builtin firewall is quite refined, but it lacks so much of what Palo Alto Networks and their cloud services have to offer. Traffic…
Usually the phase 2 subnets are different with site-to-site IPSEC tunnels. When the subnets are the same on both ends, 1:1 NAT should be used…
Okta started offering MFA for free when using Palo Alto Networks applications such as GlobalProtect, CaptivePortal, Admin UI and even Active Directory. Previously you were…
In previous posts we’ve explained the use case of virtual wire interfaces and configured a basic virtual wire deployment and with VLAN subinterfaces. NAT might…
Inter-VLAN routing is simply routing traffic between one or more broadcast domains. Without the addition of a router, there’s no way to get traffic from…
Splunk is a log aggregator and analyzer collecting logs from different sources to present those in a dashboard fashion for visibility. Inspecting traffic logs on…