-
Book Overview & Buying
-
Table Of Contents
Palo Alto Networks from Policy to Code
By :
In this first part of the book, you will build the foundation for designing and implementing firewall security policies. You will start by exploring next-generation firewall fundamentals, core networking concepts, and how PAN-OS identifies and inspects traffic. You will then examine the real-world challenges of managing firewalls and the key cyber risks they must address.
Chapters 3 and 4 provide a detailed look at PAN-OS security policy features: how the firewall matches connections and how it processes them with security profiles, logging, and auxiliary functions.
Finally, in Chapter 5, you will bring all this knowledge together to design enterprise-grade firewall security policies. This chapter shows how to combine traffic classification, connection processing, and user interaction into a coherent, enforceable model that can be applied consistently across your environment.
This section contains the following chapters: