How Firwall works
Why we need it
Module 2
Administrative controls
Initial Access to the system
Configuration management
Licensing and software update
Account administration
Viewing and filtering logs
2 ways to access PA-220
gui - https
cli - console, telnet
uid: admin
password: admin
To reset to factory default (if you know the firewall admin password)
set system private-data-reset
If you do not know the admin passwordk you must place the firewall in maintainance mode
at boot up time, type maint into the CLI through the console port
at some point you can chose the action Reset to Factory Default
Console - uid/password admin
>configuration
# set deviceconfig system type static
# set deviceconfig system ip-address 192.168.10.1 netmask 255.255.255.0
# commit
Module 3 Interface Configuration
Security Zones and interfaces
Tap interface
Virtual Wire interface
Layer 2 Interface
Layer 3 Interface
Virtual Router
Loopback Interface
Policy based Fowarding
Module 4 Security and NAT Policies
Security policy fundamental concepts
Security policy Administration
Network Address Translation
Source NAT configuration
Destination Configuration
https://www.youtube.com/watch?v=poQphxWb2MQ
License /Register device/feature set allowed
Palo Alto Portal https://support.paloaltonetworks.com/Support/Index
Login to Customer Support account
Assets
Management settings
<Device><setup><Management><General Settings> <gear>
hostname:
Domain:
Time
Firewall Setup
Tunnel Interface
Phase 1 Crypto
Phase 2 Crypto
192.69.180.132
68.160.164.11
18.235.195.121
54.208.86.132
152.195.50.6
VPN Configuration
Proxy ID
Create Routes
Create Security Policy
Create Reverse Policy
Create Tunnel Interface
Check Tunnels

No comments:
Post a Comment