Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Implementing Palo Alto Networks Prisma® Access

You're reading from   Implementing Palo Alto Networks Prisma® Access Learn real-world network protection

Arrow left icon
Product type Paperback
Published in May 2024
Publisher Packt
ISBN-13 9781835081006
Length 346 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Tom Piens Aka 'Reaper' Tom Piens Aka 'Reaper'
Author Profile Icon Tom Piens Aka 'Reaper'
Tom Piens Aka 'Reaper'
Arrow right icon
View More author details
Toc

Table of Contents (17) Chapters Close

Preface 1. Part 1:Activate and Configure Prisma Access
2. Chapter 1: Designing and Planning Prisma Access FREE CHAPTER 3. Chapter 2: Activating Prisma Access 4. Chapter 3: Setting Up Service Infrastructure 5. Chapter 4: Deploying Service Connections 6. Part 2:Configure Mobile User and Remote Network Security Processing Nodes
7. Chapter 5: Configuring Remote Network SPNs 8. Chapter 6: Configuring Mobile User SPNs 9. Chapter 7: Securing Web Gateway 10. Chapter 8: Setting Up Your Security Policy 11. Part 3:Advanced Configuration and Best Practices
12. Chapter 9: User Identification and Cloud Identity Engine 13. Chapter 10: Advanced Configurations and Insights 14. Chapter 11: ZTNA Connector 15. Index 16. Other Books You May Enjoy

Building security policies in Strata Cloud Manager

When you’re logged in to Strata Cloud Manager, which you can access via https://apps.paloaltonetworks.com or https://stratacloudmanager.paloaltonetworks.com, you can navigate to Manage | Configuration | NGFW and Prisma Access to access the security rule bases, which is split up into the following sections:

  • Security Services constitute the security rules used to control which traffic is allowed and all of the deep packet (layer 7) inspection elements that can be applied to these sessions.
  • Network Policies is where you can create application override policies. These are used to bypass App-ID for traffic flows that can’t be identified, need to be identified as something else, or to prevent L7 inspection from happening on these flows.
  • Identity Services is where you can configure and control user ID ingestion and redistribution.
  • Objects is where all the user-created objects, such as address objects, groups...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime