Securing Remote Access in Palo Alto Networks

Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key Features Learn the ins and outs of log forwarding and troubleshooting issues Set up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot...

Full description

Bibliographic Details
Main Author: Piens, Tom
Format: eBook
Language:English
Published: Packt Publishing 2021
Edition:1st edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 03612nmm a2200397 u 4500
001 EB001997726
003 EBX01000000000000001160627
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210823 ||| eng
020 |a 9781801076111 
050 4 |a QA76.9.A25 
100 1 |a Piens, Tom 
245 0 0 |a Securing Remote Access in Palo Alto Networks  |c Piens, Tom 
250 |a 1st edition 
260 |b Packt Publishing  |c 2021 
300 |a 336 pages 
505 0 |a Table of Contents Centralizing logs Configuring Advanced GlobalProtect Features Setting up site-to-site VPNs and Large Scale VPNs Configuring Prisma Access Enabling features to improve your security posture Anti Phishing with User Credential Detection Practical troubleshooting and Best Practice Tools 
653 |a Firewalls (Computer security) / fast 
653 |a Computer networks / Remote access / fast 
653 |a Coupe-feu (Sécurité informatique) 
653 |a Firewalls (Computer security) / http://id.loc.gov/authorities/subjects/sh00006011 
653 |a Réseaux d'ordinateurs / Accès à distance 
653 |a Computer networks / Remote access / http://id.loc.gov/authorities/subjects/sh00004799 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Made available through: Safari, an O'Reilly Media Company 
776 |z 1801076111 
776 |z 9781801077446 
776 |z 9781801076111 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781801077446/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 004.6 
520 |a Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key Features Learn the ins and outs of log forwarding and troubleshooting issues Set up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an in-depth understanding of user credential detection to prevent data leaks Book Description This book builds on the content found in Mastering Palo Alto Networks, focusing on the different methods of establishing remote connectivity, automating log actions, and protecting against phishing attacks through user credential detection. Complete with step-by-step instructions, practical examples, and troubleshooting tips, you will gain a solid understanding of how to configure and deploy Palo Alto Networks remote access products. As you advance, you will learn how to design, deploy, and troubleshoot large-scale end-to-end user VPNs.  
520 |a Later, you will explore new features and discover how to incorporate them into your environment. By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection. What you will learn Understand how log forwarding is configured on the firewall Focus on effectively enabling remote access Explore alternative ways for connecting users and remote networks Protect against phishing with credential detection Understand how to troubleshoot complex issues confidently Strengthen the security posture of your firewalls Who this book is for This book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN.  
520 |a Basic knowledge of Palo Alto Networks, network protocols, and network design will be helpful, which is why reading Mastering Palo Alto Networks is recommended first to help you make the most of this book