(PA-210) Firewall 8.0: Essentials - Configuration and Management Training

Course 1679

  • Duration:
  • Language: English
  • Level:
Get This Course
  • Bring this or any training to your organisation
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching
#1679

The Palo Alto Networks Firewall 8.0 Essentials: Configuration and Management (210) course is five days of instructor-led training that will enable you to:

  • Configure and manage the essential features of Palo Alto Networks® next- generation firewalls
  • Configure and manage GlobalProtect to protect systems that are located outside of the data center perimeter
  • Configure and manage firewall high availability
  • Monitor network traffic using the interactive web interface and firewall reports
  • Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.

Learning Tree Training Vouchers cannot be used to pay for the tuition fee for this course.

This course is delivered by a Learning Tree approved training partner.

(PA-210) Firewall 8.0: Essentials - Configuration and Management Training Delivery Methods

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

(PA-210) Firewall 8.0: Essentials - Configuration and Management Training Course Benefits

  • Successful completion of this five-day, instructor-led course will enhance the student’s understanding of how to configure and manage Palo Alto Networks® next-generation firewalls. The student will learn and get hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

Firewall 8.0: Essentials - Configuration and Management Training Outline

  • Security platform overview
  • Next-generation firewall architecture
  • Zero Trust security model
  • Public cloud security
  • Firewall offerings
  • Administrative controls
  • Initial access to the system
  • Configuration management
  • Licensing and software updates
  • Account administration
  • Viewing and filtering logs
  • Security zones and interfaces
  • Tap interfaces
  • Virtual Wire interfaces
  • Layer 2 interfaces
  • Layer 3 interfaces
  • Virtual routers
  • VLAN interfaces
  • Loopback interfaces
  • Policy-based forwarding
  • Security policy fundamental concepts
  • Security policy administration
  • Network Address Translation
  • Source NAT configuration
  • Destination NAT configuration
  • Application Identification (App-ID) overview
  • Using App-ID in a Security policy
  • Identifying unknown application traffic
  • Updating App-ID
  • Content-ID overview
  • Vulnerability Protection Security Profiles
  • Antivirus Security Profiles
  • Anti-Spyware Security Profiles
  • File Blocking Profiles
  • Attaching Security Profiles to Security policy rules
  • Telemetry and threat intelligence
  • Denial of service protection
  • URL Filtering Security Profiles
  • Attaching URL Filtering Profiles
  • Decryption concepts
  • Certificate management
  • SSL Forward Proxy decryption
  • SSL Inbound Inspection
  • Other decryption topics:
    • Unsupported applications
    • No decryption
    • Decryption port mirroring
    • Hardware security modules
    • Troubleshooting SSL session terminations
  • WildFire concepts
  • Configuring and managing WildFire
  • WildFire reporting
  • User-ID overview
  • User mapping methods overview
  • Configuring User-ID
  • PAN-OS® Integrated agent configuration
  • Windows-based agent configuration
  • Configuring group mapping
  • User-ID and Security policy
  • GlobalProtect overview
  • Preparing the firewall for GlobalProtect
  • Configuration: GlobalProtect Portal
  • Configuration: GlobalProtect Gateway
  • Configuration: GlobalProtect agents
  • Site-to-site VPN
  • Configuring site-to-site tunnels
  • IPsec troubleshooting
  • Dashboard, ACC, and Monitor
  • Log forwarding
  • Syslog
  • Configuring SNMP
  • HA components and operation
  • Active/passive HA configuration
  • Monitoring HA state
  • Operational guidelines
  • Analyzing ACC information
  • Optimizing Security Profiles

Need Help Finding The Right Training Solution?

Our training advisors are here for you.

Course FAQs

Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want, including online training.