码迷,mamicode.com
首页 > 其他好文 > 详细

Cyber Security - Palo Alto Security Policies(1)

时间:2020-03-15 13:43:44      阅读:53      评论:0      收藏:0      [点我收藏+]

标签:user   each   awl   security   cat   ram   int   ORC   图片   

Security policies:

  • Enforcing network traffic by configuring rules of what is allowed or denied to communicate between logical network segments (zones)
  • Traffic can be policed with the following parameters:
    • IP Address (source and/or destination)
    • Users
    • Services(ports)
    • Applications

技术图片

 

 (From Packt)

  • Enforcement hierarchy:
    • Is essential to understand the security policy order of enforcement to avoid policy overruling
    • "A clean policy table limits the possibility of policy overruling"

技术图片

 

 

Task 1 

Please block the student wireless network from reaching the server subnet.

Source Zone         Source Address

Student Wireless:   10.10.0.0/22

Server Subnet:      10.30.0.0/23

Destination Zone    Destination Address

 Configure the firewall policy.技术图片

 

 技术图片

 

 技术图片

 

 技术图片

 

 技术图片

 

 技术图片

 

 技术图片

 

 技术图片

 Task 2

We are getting complaints of employees watching Netflix during work hours and it‘s causing our internet connection to crawl.

- Please block the employee subnet 10.25.0.0/23 from accessing Netflix.

Configure the firewall policy.

技术图片

 

 技术图片

 

 技术图片

 

 技术图片

 

 技术图片

 

 技术图片

 

 技术图片

 

 技术图片

 

Cyber Security - Palo Alto Security Policies(1)

标签:user   each   awl   security   cat   ram   int   ORC   图片   

原文地址:https://www.cnblogs.com/keepmoving1113/p/12496683.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!