When configuring firewall settings, particularly in a Zone Protection profile on Palo Alto Networks (PAN-OS), it’s important to understand the...
The terms “Log at Session Start” and “Log at Session End” are used to describe the practice of creating logs...
In network security, inspecting encrypted traffic is vital for detecting threats and ensuring data integrity. Palo Alto Networks firewalls employ...
PAC files, short for Proxy Auto-Configuration files, are critical in dictating how web traffic is directed through or around proxy...
VLANs are a common way to segment network traffic. While they can provide a degree of security by segregating traffic,...
# Author: Kerry Cordero # Version: 1.0.0 # Description: This script prompts for domain and gets the TLS version for...
If you’re looking to improve your network security by inspecting encrypted traffic using Palo Alto firewalls, you’re in the right...
Imagine this common scenario: you are a network administrator, and you are tasked with creating a secure yet accessible environment...
Step 1: Network Audit Begin with a thorough network audit. Document all VLANs and associated Switch Virtual Interfaces (SVIs) currently...
URL Filtering, an essential component of Palo Alto firewalls, provides granular control over web access by categorizing URLs according to...