-
Book Overview & Buying
-
Table Of Contents
Palo Alto Networks from Policy to Code
By :
Building on the challenges and requirements discussed in the previous chapter, this one focuses on the mechanics that drive security enforcement in PAN-OS. Now that you have a clear understanding of the practical limitations of firewalls and the strategic needs of a modern enterprise, it’s time to examine how traffic is matched to policy rules—a critical step in designing adequate firewall controls.
This chapter introduces the complete set of connection-matching features available in PAN-OS. You’ll learn how the firewall uses various attributes—such as zones, addresses, users, applications, and URL categories—to determine whether a network connection matches a security policy rule. In addition to conventional criteria, we’ll also explore advanced options such as dynamic objects, external lists, and geolocation.
By the end, you’ll have a solid grasp of all the matching options...