Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
1Activity

Table Of Contents

Preface
•“About This Guide” in the next section
•“Organization” on page9
About This Guide
Organization
Typographical Conventions
Notes and Cautions
Related Documentation
Obtaining More Information
Technical Support
Chapter1
Introduction
•“About the Firewall” in the next section
About the Firewall
Features and Benefits
About the Management Interfaces
Overview of Key Concepts
•“About Security Policies” in the next section
About Security Policies
About Security Profiles
About Virtual Systems
About Virtual Routers and Routing Protocols
About Virtual Private Networks
IPSec and IKE Crypto Profiles
Chapter2
Firewall Installation
•“Pre-Installation Tasks” in the next section
Pre-Installation Tasks
Installation Procedure
Performing the Initial Setup
To perform the initial setup:
Choosing a Deployment Option
•“Option A: Virtual Wire Deployment” in the next section
Connecting to Panorama
Post-Installation Tasks
Chapter3
Device Management
System Setup and Configuration Management
•“Defining the Host Name and Network Settings” in the next section
Defining the Host Name and Network Settings
Comparing Configuration Files
To compare configuration files:
Managing Configurations
Managing Administrator Roles
Creating Administrative Accounts
Configuring User Identification
Configuring the User Identification Agent
Installing the User Identification Agent
Configuring the Firewall to Support Terminal Servers
Defining Virtual Systems
Configuring High Availability
To configure high availability:
Defining Custom Response Pages
Defining Configuration and System Log Settings
•“Defining Configuration Log Settings” on page78
About the Logs
Defining Configuration Log Settings
Defining System Log Settings
Defining Log Destinations
•“About Log Destinations” in the next section
About Log Destinations
Defining SNMP Trap Destinations
To define SNMP trap destinations:
Defining Syslog Servers
Defining Email Notification Profiles
Scheduling Log Exports
Upgrading the PAN-OS Software
To upgrade the PAN-OS software:
Updating Threat and Application Definitions
Installing a License
To install a license:
Importing, Exporting and Generating Security Certificates
Viewing Support Information
Chapter4
Network Configuration
•“Networking Overview” in the next section
Networking Overview
Deployment Types
•“Virtual Wire Deployments” in the next section
•“Layer 2 Deployments” on page96
•“Layer 3 Deployments” on page97
Virtual Wire Deployments
Layer 2 Deployments
Layer 3 Deployments
Tap Mode Deployments
Summary of Interface Types
Configuring Interfaces
Viewing the Current Interfaces
To view the current interfaces:
Configuring Layer 2 Interfaces
To configure Layer 2 interfaces:
Configuring Layer 2 Subinterfaces
Configuring Layer 3 Interfaces
To configure Layer 3 interfaces:
Configuring Aggregate Ethernet Interfaces
To configure aggregate Ethernet interfaces:
Configuring Layer 3 Subinterfaces
Configuring Virtual Wire Interfaces
To configure virtual wire interfaces:
Configuring Aggregate Interface Groups
Configuring VLAN Interfaces
Configuring Loopback Interfaces
Configuring Tap Interfaces
Configuring High Availability Interfaces
Defining Security Zones
Defining VLANs
Defining Virtual Wires
Defining Virtual Routers
Defining DHCP Options
Defining Network Profiles
Setting Up IKE Gateways
Defining Interface Management Profiles
To define interface management profiles:
Defining Zone Protection Profiles
Chapter5
Policies and Security Profiles
•“About Policies and Profiles” in the next section
About Policies and Profiles
Defining Policies
•“Defining Security Policies” in the next section
Defining Security Policies
Log Setting
Defining Network Address Translation Policies
•“About NAT Policies” in the next section
Defining SSL Decryption Policies
To define captive portal policies:
Specifying Users and Applications for Policies
Defining Security Profiles
Defining Antivirus Profiles
To define antivirus profiles:
Defining Anti-Spyware Profiles
To define anti-spyware profiles:
Defining Vulnerability Protection Profiles
To define vulnerability protection profiles:
Defining URL Filtering Profiles
Defining File Blocking Profiles
Defining Log Forwarding Profiles
Defining Data Filtering Profiles
Defining Security Profile Groups
To define security profile groups:
Defining Policy Objects
Defining Addresses
Defining Address Groups
Defining Applications
Defining Application Groups
To define application groups:
Defining Application Filters
To define application filters:
Defining Services
Defining Service Groups
Defining Data Patterns
Defining Schedules
Chapter6
Reports and Logs
Using the Dashboard
Using the Application Command Center
Viewing App-Scope Reports
Summary Report
Change Monitor Report
Threat Monitor Report
Threat Map Report
Network Monitor Report
Traffic Map Report
Viewing the Logs
Managing PDF Summary Reports
Managing User Activity Reports
To manage user activity reports:
Managing Report Groups
Scheduling Reports for Email Delivery
Viewing Reports
Application Reports
Threat Reports
Traffic Reports
Generating Custom Reports
Identifying Unknown Applications and Taking Action
Taking Action
Chapter7
Configuring SSL VPNs
•“About SSL VPNs” in the next section
About SSL VPNs
Setting Up SSL VPNs
Downloading and Activating the NetConnect SSL VPN Client
Downloading and Activating the NetConnect SSL VPN Client
Configuring Authentication
Creating a Local User Database
Adding Local Users
Adding Local User Groups
To add local user groups:
Chapter8
Configuring IPSec Tunnels
•“About IPSec VPN Support on the Firewall” in the next section
About IPSec VPN Support on the Firewall
Defining IKE Crypto Profiles
Defining IPSec Crypto Profiles
Defining Tunnel Monitor Profiles
Setting Up IPSec Tunnels
Chapter9
Configuring Quality of Service
•“About Firewall Support for QoS” in the next section
About Firewall Support for QoS
Configuring QoS for Firewall Interfaces
Defining QoS Profiles
Defining QoS Policies
Chapter10
Panorama Installation
•“Installing Panorama” in the next section
Installing Panorama
Setting Up a Custom Virtual Disk
Performing the Final Setup
Accessing Panorama for the First Time
Creating an SSL Certificate
Chapter11
Central Management of Devices
•“Accessing the Panorama Interface” in the next section
Accessing the Panorama Interface
Overview of the Panorama Interface
Panorama Tab
Viewing Information on Individual Devices
Adding Devices
Defining Device Groups
Upgrading the Panorama Software
To upgrade the Panorama software:
Backing Up Firewall Configurations
AppendixA
Custom Pages
•“Default Antivirus Response Page” in the next section
Default Antivirus Response Page
Default Application Block Page
Default File Blocking Block Page
Default URL Filtering Response Page
Default Anti-Spyware Download Response Page
Default SSL Decryption Opt-out Response Page
Captive Portal Comfort Page
URL Filtering Continue and Override Page
SSL VPN Login Page
SSL Certificate Revoked Notify Page
AppendixB
Sample VPN Configuration
•“Existing Topology” in the next section
Existing Topology
New Topology
Configure the VPN Connection
VPN Connectivity Troubleshooting
AppendixC
Application Categories, Subcategories, Technologies, and Characteristics
•“Application Categories and Subcategories” in the next section
Application Categories and Subcategories
Application Technologies
Application Characteristics
AppendixD
Open Source Licenses
Artistic License
GNU General Public License
GNU Lesser General Public License
MIT/X11
OpenSSH
Zlib
Index
0 of .
Results for:
No results containing your search query
P. 1
PA-3.0 Administrators Guide

PA-3.0 Administrators Guide

Ratings: (0)|Views: 29 |Likes:
Published by Manuel Rodrigo

More info:

Published by: Manuel Rodrigo on Jan 11, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/11/2011

pdf

text

original

You're Reading a Free Preview
Pages 4 to 157 are not shown in this preview.
You're Reading a Free Preview
Pages 161 to 342 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->