Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Implementing Palo Alto Networks Prisma® Access

You're reading from   Implementing Palo Alto Networks Prisma® Access Learn real-world network protection

Arrow left icon
Product type Paperback
Published in May 2024
Publisher Packt
ISBN-13 9781835081006
Length 346 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Tom Piens Aka 'Reaper' Tom Piens Aka 'Reaper'
Author Profile Icon Tom Piens Aka 'Reaper'
Tom Piens Aka 'Reaper'
Arrow right icon
View More author details
Toc

Table of Contents (17) Chapters Close

Preface 1. Part 1:Activate and Configure Prisma Access
2. Chapter 1: Designing and Planning Prisma Access FREE CHAPTER 3. Chapter 2: Activating Prisma Access 4. Chapter 3: Setting Up Service Infrastructure 5. Chapter 4: Deploying Service Connections 6. Part 2:Configure Mobile User and Remote Network Security Processing Nodes
7. Chapter 5: Configuring Remote Network SPNs 8. Chapter 6: Configuring Mobile User SPNs 9. Chapter 7: Securing Web Gateway 10. Chapter 8: Setting Up Your Security Policy 11. Part 3:Advanced Configuration and Best Practices
12. Chapter 9: User Identification and Cloud Identity Engine 13. Chapter 10: Advanced Configurations and Insights 14. Chapter 11: ZTNA Connector 15. Index 16. Other Books You May Enjoy

What this book covers

Chapter 1, Designing and Planning Prisma Access, explains how to prepare before deploying Prisma Access, which components to consider, and considerations that need to be made before deploying.

Chapter 2, Activating Prisma Access, reviews the process of activating the Prisma Access tenant and activating Cortex Data Lake.

Chapter 3, Setting up Service Infrastructure, covers the steps needed to activate the service infrastructure, the backbone of Prisma Access

Chapter 4, Deploying Service Connections, discusses service connections and how to configure them.

Chapter 5, Configuring Remote Network SPNs, covers the Remote Network Security Processing Nodes, what they are used for, and how to configure them.

Chapter 6, Configuring Mobile User SPNs, explains Mobile User Security Processing Nodes, how to deploy them in different locations, and how to set up GlobalProtect.

Chapter 7, Securing Web Gateway, discusses the explicit proxy configuration as an alternative to MU-SPN.

Chapter 8, Setting up Your Security Policy, explains how to set up security rules for all our Security Processing Nodes.

Chapter 9, User Identification and Cloud Identity Engine, discusses user identification and how group mapping via Cloud Identity Engine can be done.

Chapter 10, Advanced Configurations and Insights, covers Insights, Cortex Data Lake, and Autonomous Digital Experience Management.

Chapter 11, ZTNA Connector, discusses ZTNA connector, an alternative to SC-CAN that makes private applications available to users.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime