-
Book Overview & Buying
-
Table Of Contents
Palo Alto Networks from Policy to Code
By :
In the previous chapter, you learned how next-generation firewalls inspect, classify, and control network traffic across multiple OSI layers using features such as App-ID and Content-ID. That knowledge gives you a solid technical foundation, but building and managing firewall policies in the real world is a different kind of challenge. It’s messy, unpredictable, and influenced as much by human factors and business dynamics as by technical capabilities.
In this chapter, you’ll take a critical look at the many obstacles that make firewall management difficult in practice—from rushed implementations and inconsistent migrations to vague business requirements, unreliable vendor support, and internal politics. You’ll also assess what firewalls can and cannot realistically protect you from, given today’s cybersecurity risks.
Finally, you’ll begin to bridge the gap between theory and...