• Complain

Tom Piens - Securing Remote Access in Palo Alto Networks

Here you can read online Tom Piens - Securing Remote Access in Palo Alto Networks full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Packt Publishing, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Tom Piens Securing Remote Access in Palo Alto Networks
  • Book:
    Securing Remote Access in Palo Alto Networks
  • Author:
  • Publisher:
    Packt Publishing
  • Genre:
  • Year:
    2021
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Securing Remote Access in Palo Alto Networks: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Securing Remote Access in Palo Alto Networks" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Tom Piens: author's other books


Who wrote Securing Remote Access in Palo Alto Networks? Find out the surname, the name of the author of the book and a list of all author's works by series.

Securing Remote Access in Palo Alto Networks — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Securing Remote Access in Palo Alto Networks" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Securing Remote Access in Palo Alto Networks Practical techniques to enable and - photo 1
Securing Remote Access in Palo Alto Networks

Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls

Tom Piens

BIRMINGHAMMUMBAI Securing Remote Access in Palo Alto Networks Copyright 2021 - photo 2

BIRMINGHAMMUMBAI

Securing Remote Access in Palo Alto Networks

Copyright 2021 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.

Packt Publishing has endeavoured to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

Group Product Manager: Wilson D'souza

Publishing Product Manager: Vijin Boricha

Senior Editor: Shazeen Iqbal

Content Development Editor: Rafiaa Khan

Technical Editor: Shruthi Shetty

Copy Editor: Safis Editing

Project Coordinator: Shagun Saini

Proofreader: Safis Editing

Indexer: Rekha Nair

Production Designer: Jyoti Chauhan

First published: June 2021

Production reference: 1030621

Published by Packt Publishing Ltd.

Livery Place

35 Livery Street

Birmingham

B3 2PB, UK.

ISBN 978-1-80107-744-6

www.packt.com

I want to dedicate this book to my son, godson, and newborn nephew: life starts at 40, so don't grow up too fast.

Contributors
About the author

Tom Piens, PCNSE, CISSP, and founder of PANgurus, has over 10 years of experience working with Palo Alto Networks customers. Tom has been on the forefront of engaging with customers, responding to questions, and analysing unique needs to apply the best possible solutions or workarounds. He has authored a great many articles on the Palo Alto Networks knowledge base and discussion forum solutions, and a book, Mastering Palo Alto Networks. Also known as reaper on the PANgurus and LIVEcommunity forums, and PANWreaper on Twitter, Tom has been recognized by Palo Alto Networks user groups and community members, and by countless thankful customers.

I want to extend a special thanks to Nick "Ndx" for helping to review and fact-check this book, Aref Alsouqi for being a technical sounding board, and Rutger Truyers for his much-appreciated insights.

In these trying times I have very much enjoyed their friendship above all.

About the reviewer

Kris Znamierowski is an IT professional with over 18 years of experience in securing and supporting multiple operating systems, including PAN-OS, Microsoft, Linux, and BSD UNIX. An OpenBSD user since forever. He holds many credentials from industry leaders.

Table of Contents
Preface

In this book, we will review remote connectivity in depth and learn about the different ways to deploy GlobalProtect and site-to-site VPN. Besides traditional methods, we will also learn about Large Scale VPN and Prisma Access SASE. Other topics that will be covered include anti-phishing and credential detection, hardening the management interface, and getting the most out of your logs.

Who this book is for

This book is for anyone who wants to learn more about remote access for users and remote locations leveraging GlobalProtect, Prisma Access, and Large Scale VPN. You will learn about the added value that log forwarding can bring and how to improve the security posture of your management interface. Anti-phishing and credential detection are covered in depth to help those who want to protect their organization from credential theft and data leaks.

What this book covers

, Centralizing logs, is all about how to get more out of logging.

, Configuring Advanced GlobalProtect Features, looks at best practices, troubleshooting, and advanced configuration.

, Setting up site-to-site VPNs and Large Scale VPNs, covers the ins and outs of traditional IPSec and GlobalProtect as a LargeScale VPN solution.

, Configuring Prisma Access, explores the complete configuration of a Prisma Access deployment.

, Enabling features to improve your security posture, talks about configuring advanced security measures to reach compliance.

, Anti Phishing with User Credential Detection, gets into how to prevent the leaking of user credentials due to phishing or misuse.

, Practical troubleshooting and Best Practice Tools, explains troubleshooting for User-ID and NAT and some best practices.

To get the most out of this book

To get the most out of this book, it is highly recommended that you have a small lab at your disposal with two firewalls, Windows 10, and Windows Server 2016. Access to a Panorama management server would be helpful to follow the covered material but not required. Familiarity with IPSec, syslog, and accessing systems through CLI is recommended, as well as working experience with PAN-OS. Basic knowledge of Palo Alto Networks, network protocols, and network design would be helpful, so reading Mastering Palo Alto Networks first is recommended.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Securing Remote Access in Palo Alto Networks»

Look at similar books to Securing Remote Access in Palo Alto Networks. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Securing Remote Access in Palo Alto Networks»

Discussion, reviews of the book Securing Remote Access in Palo Alto Networks and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.