top of page
Search
Mukesh Chanderia
Nov 5, 20224 min read
IPsec VPN Configuration
Let's have a look at ip address of two site for which we need to configure site to site VPN Let's configure Router A Step 1: Create an...
27 views0 comments
Mukesh Chanderia
Nov 4, 20224 min read
IPsec VPN
IPsec rides on Layer3 of TCP/IP. SSH & SSL rides on layers 4 -7. In transport mode layer 4 and above is encrypted whereas in tunnel mode...
20 views0 comments
Mukesh Chanderia
Oct 28, 202212 min read
IQ
Routing + Switching Loopguard Loopguard come into action only when the BPD's suddenly disappeared. It is incompatible with Root Guard....
11 views0 comments
Mukesh Chanderia
Jul 3, 202215 min read
Important Questions
R+S What is PTP used for? The Precision Time Protocol (PTP) is a protocol used to synchronize clocks throughout a computer network. On a...
44 views0 comments
Mukesh Chanderia
Jun 23, 202216 min read
ISE
ISE Use Cases 1) Visibility: What all users & devices are on the network and where are they connected. Where are phones, printers,...
76 views0 comments
Mukesh Chanderia
Feb 28, 20221 min read
Panorama
It is a centralized controller for PA firewalls. How to add devices in Panorama? Go to Panorama --> Managed Device --> Here you will get...
15 views0 comments
Mukesh Chanderia
Feb 1, 20221 min read
WildFire & Dos Protection
Create WildFire Profile Attach it in Security Policy as Security Profile Objects > Security Profiles > DoS Protection It is similar to...
7 views0 comments
Mukesh Chanderia
Jan 31, 20221 min read
PA Interface Mgmt Profile & Captive Portal
Network > Network Profiles > Interface Mgmt It is used to control what protocols are allowed on interface. Now Go to Interface -->...
25 views0 comments
Mukesh Chanderia
Jan 31, 20221 min read
PA ZONE PROTECTION PROFILE & Sub Interface
Network > Network Profiles > Zone Protection Tcp SYN Cookies : It is a technique used to resist SYN flood attacks. An SYN flood attack is...
39 views0 comments
Mukesh Chanderia
Jan 30, 20221 min read
Install CA Certificate on PA
Step 1 : Generate Certificate through CSR [Certificate Signing Request]. Click : Request a Certificate Open CSR file in notepad & Copy...
16 views0 comments
Mukesh Chanderia
Jan 30, 20221 min read
PA LDAP AD AUTHENTICATION
The default port for LDAP is port 389, but LDAPS uses port 636 and establishes TLS/SSL upon connecting with a client. Step 1 : Create...
12 views0 comments
Mukesh Chanderia
Jan 30, 20222 min read
PA Decryption Policy
Decryption Policy for Outbound SSL Connection. Why do we require this policy ? We do require this policy for acting Palo Alto as a Man In...
16 views0 comments
Mukesh Chanderia
Jan 29, 20222 min read
PA UPGRADE
Device > Software Select Device > Software to view the available software releases, to download or upload a release, to install a release...
11 views0 comments
Mukesh Chanderia
Jan 28, 20222 min read
PA Dynamic Update & Licenses
Select Device > Dynamic Updates and check which Applications or Applications Threats to determine which update is Currently Installed....
41 views0 comments
Mukesh Chanderia
Jan 28, 20221 min read
PA Exporting And Importing Configs
Device --> Setup --> Operations Step 1 Save Name Configuration Step 2 Export Named Configuration Step 3 Import Name Configuration Step 4...
10 views0 comments
Mukesh Chanderia
Jan 28, 20221 min read
How To Setup Virtual PC & HTTP Server in GNS3
Virtual PC Setup PC1> ip 3.3.3.3/24 3.3.3.1 PC1> ip dns 1.1.1.1 PC1> show ip HTTP Server Setup enable config t username admin privilege...
53 views0 comments
Mukesh Chanderia
Jan 24, 20221 min read
PA TEST 1
Now we may block website as a application as well. East-West traffic server to server within a data center North-South traffic describes...
36 views0 comments
Mukesh Chanderia
Jan 23, 20224 min read
Packet Flow in Palo Alto
Logic Flow 1) Initial Packet Processing --> Src Zone/Address/User ID --> Forwarding Lookup --> Destination Zone --> NAT policy evaluated...
261 views0 comments
Mukesh Chanderia
Jan 16, 20224 min read
Palo Alto HA
HIGH AVAILABILITY Pre-Requisites: - Same Hardware and Software version - Same Interfaces - Similar Licensing - There is only...
42 views0 comments
Mukesh Chanderia
Jan 16, 20221 min read
PA Packet Capture & Config Audit
Monitor --> Packet Capture Step 1: Create a Filter Click Manage Filter & set source and destination. Stage — Indicate the point at which...
25 views0 comments
bottom of page