Introduction :
This course designed to provide IT professionals, network administrators, and cybersecurity enthusiasts with the knowledge and skills required to deploy, manage, and secure networks using Palo Alto Networks Next-Generation Firewalls (NGFWs).
In today’s evolving cybersecurity landscape, traditional firewalls are no longer sufficient to protect against sophisticated threats. Palo Alto Networks has redefined firewall technology by integrating advanced features like App-ID, User-ID, Content-ID, and Threat Prevention into a single platform, offering visibility and control over users, applications, and content — not just ports and IPs.
This course will guide you from the fundamentals of firewall operations to advanced topics such as VPNs, High Availability, and real-world deployment scenarios. You’ll learn how to configure and manage Palo Alto firewalls using the PAN-OS, create effective security policies, set up NAT, integrate with directory services, and monitor traffic and threats using logs and reports.
Course Objectives :
By the end of this course, you will be well-equipped to:
- Understand and implement Palo Alto firewall solutions
- Secure enterprise networks effectively
- Prepare for Palo Alto certification exams such as PCNSA (Palo Alto Networks Certified Network Security Administrator)
- Configure and manage the essential features of Palo Alto Networks next-generation firewalls
- Configure and manage Security and NAT policies to enable approved traffic to and from zones
- Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs
- Monitor network traffic using the interactive web interface and firewall reports
Course outline :
Day One : Introduction to Palo Alto Networks
- Overview of Palo Alto Networks
- Palo Alto Networks Portfolio and Architecture
- Configuring Initial Firewall Settings
- Managing Firewall Configurations
- PAN-OS Architecture and Components
- Key Features and Use Cases
- Licensing and Subscriptions
Firewall Fundamentals
- Firewall Types and Deployment Scenarios
- Managing Firewall Administrator Accounts
- Connecting the Firewall to Production Networks with Security Zones
- Creating and Managing Security Policy Rules
- Security Zones and Interfaces
- Virtual Routers and Security Policies
Day Two : Initial Configuration
- Web Interface and CLI Access
- Basic Setup Wizard
- Interface Configuration
- Zone Creation and Assignment
- Creating and Managing NAT Policy Rules
- Controlling Application Usage with App-ID
- Blocking Known Threats Using Security Profiles
Security Policies
- Policy Types: Security, NAT, QoS, Policy-Based Forwarding
- Rulebase Management
- Application and User Identification
- Logging and Monitoring Policies
Day Three : NAT (Network Address Translation)
- Source NAT and Destination NAT
- Static vs Dynamic NAT
- U-Turn NAT Configuration
Objects and Services
- Address and Service Objects
- Tags and Groups
Day Four : App-ID, Content-ID, and User-ID
- How App-ID Works
- Custom Applications
- Content-ID and Threat Prevention
- User-ID Integration (LDAP, Active Directory)
High Availability (HA)
- HA Concepts
- Active/Passive vs Active/Active
- Configuring and Monitoring HA
- Blocking Inappropriate Web Traffic with URL Filtering
- Blocking Unknown Threats with Wildfire
VPN Configuration
- Site-to-Site VPN (IPSec)
- GlobalProtect VPN (Remote Access)
- Authentication and Certificates
Day Five : Logging, Reporting & Monitoring
- Log Types and Log Forwarding
- Panorama Overview
- Generating Reports and Dashboards
- Using ACC (Application Command Center)
Maintenance and Troubleshooting
- Backups and Snapshots
- Software and Content Updates
- Common Troubleshooting Commands and Tools
Real-World Labs and Scenarios
- Hands-on Lab: Basic Configuration
- Lab: NAT and Security Policies
- Lab: VPN Setup
- Lab: Threat Prevention