-
Book Overview & Buying
-
Table Of Contents
Palo Alto Networks from Policy to Code
By :
In the previous chapter, you examined how PAN-OS determines whether a session matches a security policy rule by evaluating attributes such as IP addresses, zones, users, applications, and URL categories. That matching logic forms the basis for any security decision the firewall makes. Now that you understand how connections are identified, it’s time to explore what happens next.
This chapter focuses on connection processing—specifically, the configuration options available on the Actions tab of a security rule. Here, you’ll define what the firewall should do with matched connections: allow or block them, inspect them for threats, log them, or apply additional controls. You’ll also learn how to configure and apply security profiles such as antivirus, anti-spyware, URL filtering, and more.
By the end of this chapter, you’ll be able to apply layered security controls to any session matched...