Palo Alto Lab 5 : How to configure security policies rules on a
Автор: CCIP
Загружено: 2024-12-02
Просмотров: 90
Описание:
Introduction
In this lab, you will allow network traffic from the Users Net security zone to the Extranet security
zone so that employees can access various business applications. You will create, modify, and test a
security policy rule to allow access between these two zones. Once your rule is successfully in place,
you will examine hit counters in the security policy rule table and examine the Traffic Log. Next, you
will create security policy rules to allow hosts in your network to access the internet. You will then
create source and destination NAT policy rules.
Objective
In this lab, you will perform the following tasks:
Apply a baseline configuration to the firewall
Create and test a security policy rule
Modify security policy table columns
Examine and reset the Rule Hit Count
Examine the Traffic Log
Create security rules for internet access
Ping the internet host from the client
Create source and destination NAT Policies
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: