Skip to main content

Posts

PSE Platform Professional

Hi Folks, I have attached PSE Platform Professional official study guide for beginner, who are willing to learn about PALO ALTO NGFW . https://drive.google.com/file/d/13AstV09kgf1eETkrHbPuF9JsV9ADSZrP/view?usp=sharing
Recent posts

Checkpoint Interview Questions and Answers 2020

Question 1. What Is Anti-spoofing? Answer : Anti-Spoofing is the feature of Checkpoint Firewall. which the help of that we can avoid attacks in which attacker who generate IP Packet with Fake or Spoof source address. It will determine that whether traffic is legitimate or not. If the traffic is not legitimate then firewall block that traffic on interface of firewall. Question 2. What Is Asymmetric Encryption? Answer : In the Asymmetric Encryption there are two different key used for encrypt and decrypt to packet. Means that one key is used for Encrypt packet, and second key used to for decrypt packet. Same key can not encrypt and decrypt. Question 3. What Is Stealth Rule In Checkpoint Firewall? Answer : Stealth Rule will Protect Checkpoint firewall from direct access any traffic. It’s rule should be on the top of Security rule base. In this rule administrator is going to denied all traffic to access checkpoint firewall. Question 4. What Is Cleanup Rule In Chec

File Blocking Shootout – Palo Alto vs. Fortinet

File Blocking Shootout – Palo Alto vs. Fortinet 2018-06-27 Fortinet ,  Palo Alto Networks ,  Password Data Leak Prevention ,  DLP ,  Encrypted ,  fail ,  File Blocking ,  FortiGate ,  Fortinet ,  Microsoft Office ,  Palo Alto Networks ,  Password ,  PDF ,  Protected ,  ZIP Johannes Weber We needed to configure the Internet-facing firewall for a customer  to block encrypted files  such as protected PDF, ZIP, or Microsoft Office documents. We tested it with two next-generation firewalls, namely Fortinet FortiGate and Palo Alto Networks. The experiences were quite different… TL;DR:  While Fortinet is able to block encrypted files, Palo Alto fails since it does not identify encrypted office documents! [ UPDATE : Palo Alto has fixed the main problem, see notes below.] Note that the Internet connection must be either unencrypted itself, i.e., HTTP or FTP, or some TLS inspection/MITM techniques must be used to look into those encrypted streams such as HTTPS. Otherwise no fire

From MPLS to SD-WAN to SASE: An Evolution of Enterprise Networking

From MPLS to SD-WAN to SASE: An Evolution of Enterprise Networking The way we do business is changing. As critical business applications migrate to the cloud, and the mobile workforce continues to grow, networking and security solutions need to evolve in order to meet the changing business needs. Gartner believes (and we agree) that the future of networking lies with  SASE (Secure Access Service Edge)  – the convergence of networking and security into one cloud service. Here’s why. 1990s – 2000s: MPLS and the Era of Clear Network Boundaries? Back in the day, networking models were hardware-centric and manually configured. Applications, data, and services lived within private datacenters and relied on remote access solutions to connect remote workers. Dedicated network connectivity, known as MPLS, was the preferred approach for connecting remote locations. MPLS provides predictable performance, low latency and packet loss, and central management. However, MPLS is expensive

Check Throughput of Interfaces - Palo Alto Networks NGFW

Check Throughput of Interfaces - Palo Alto Networks NGFW Following command shows brief interface throughput. > show system statistics session To see the complete statistics, run the show system state browser command > show system state browser Press Shift+L and click on Ports To enable tracking and updates press Y and U To see additional ports, press space bar