All public logs
From Notes_Wiki
Combined display of all available logs of Notes_Wiki. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
- 07:12, 18 August 2025 Jamshad talk contribs created page Deploying Forti-SDWAN Using FortiManager (Created page with "Home > Enterprise security devices or applications > Fortigate firewall > Deploying Forti-SDWAN Using FortiManager ==Overview== Forti-SDWAN allows multiple WAN interfaces to be used intelligently and dynamically, improving performance and reliability. FortiManager serves as the centralized management platform for FortiGate devices, making it ideal for deploying and managing SD-WAN configurations at scale. ==Step 1: Add and Authorize FortiGate...")
- 05:10, 4 August 2025 Jamshad talk contribs created page Steps to Configure VPN Bad Login Attempt Limit to 10 per Hour on Palo Alto Firewall (Created page with " ==Overview== Limiting the number of failed VPN login attempts is a critical step in defending against brute-force attacks targeting remote access services such as GlobalProtect VPN. Palo Alto Networks firewalls support a built-in mechanism to detect and block excessive authentication failures using Vulnerability Protection Profiles. By customizing these profiles, administrators can enforce a stricter limit—for example, capping failed login attempts to 10 per hour per...")
- 12:32, 1 August 2025 Jamshad talk contribs created page Steps for Creating a New Voucher for Guest SSID (Created page with "==Overview== Voucher-based authentication is a secure and flexible method of providing temporary Wi-Fi access to guests without compromising your main network credentials. Each voucher is a unique code with defined limitations such as usage time, device count, or bandwidth. When redeemed, it grants temporary access to the Guest SSID. This method: #Enhances network security by isolating guest traffic from internal devices #Simplifies administration through centralized c...")
- 11:52, 1 August 2025 Jamshad talk contribs created page Wi-Fi controller (Created page with "Home > Enterprise security devices or applications > Wi-Fi controller *Steps for Creating a New Voucher for Guest SSID Home > Enterprise security devices or applications > Wi-Fi controller")
- 05:06, 30 July 2025 Jamshad talk contribs created page QoS Configuration for VoIP and Backup Traffic in Palo Alto Firewall (Created page with "Home > Enterprise security devices or applications > Paloalto firewall > QoS Configuration for VoIP and Backup Traffic in Palo Alto Firewall ==Overview== Prioritizing real-time traffic such as VoIP is essential to maintain call quality and performance. At the same time, it is important to ensure that bandwidth-intensive operations like data backups do not saturate the network link and impact critical services. This configuration ensures: #Vo...")
- 11:42, 29 July 2025 Jamshad talk contribs created page Steps to Configure SSL Forward Proxy on Palo Alto Networks Firewall (Created page with " Steps to Configure SSL Forward Proxy on Palo Alto Networks Firewall ==Objective== This article provides step-by-step instructions on how to configure SSL Forward Proxy on Palo Alto Networks next-generation firewalls. SSL Forward Proxy allows the firewall to decrypt, inspect, and control outbound SSL/TLS traffic initiated by internal users to the internet. ==Prerequisites== #A self-signed or internal CA certificate (or a subordinate CA from enterprise PKI) installed o...")
- 11:16, 29 July 2025 Jamshad talk contribs created page SSL Inbound Inspection Configuration on Palo Alto Networks Firewall (Created page with "SSL Inbound Inspection Configuration on Palo Alto Networks Firewall ==Introduction== SSL Inbound Inspection is a feature on Palo Alto Networks firewalls that enables decryption and inspection of encrypted traffic destined for internal servers. This is crucial for detecting threats hidden in SSL/TLS traffic that would otherwise bypass inspection. This article outlines a step-by-step process to configure SSL Inbound Inspection when hosting services behind NAT and using p...")
- 05:24, 29 July 2025 Jamshad talk contribs created page Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are the Same) (Created page with "Home > Enterprise security devices or applications > Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are the Same) ==Overview== In certain network environments, users within the same security zone may need to access internal resources using public IP addresses. This commonly occurs when DNS resolves internal servers to their public addresses or when services are designed with public IP references. To make this communicati...")
- 05:02, 29 July 2025 Jamshad talk contribs created page Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are Different) (Created page with "Home > Enterprise security devices or applications > Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are Different) = Overview = Unidirectional NAT (U-NAT) is commonly used in scenarios where external users access internal services using public IP addresses. When the source zone (internal) and destination zone (WAN/ISP) are different, specific NAT and Security policy configurations are necessary on a Palo Alto firewall. T...")
- 10:07, 18 July 2025 Jamshad talk contribs created page Generating Palo Alto Firewall Audit Reports Using Firewall Analyzer (Created page with " == Overview == This article presents a detailed guide to generating firewall audit reports for Palo Alto Networks firewalls using ''' Firewall Analyzer''' , a powerful log analysis and reporting tool designed to simplify and enhance firewall audit processes. Network and security administrators can utilize this tool to gain actionable insights into policy usage, configuration hygiene, risk assessment, and compliance status — all from a centralized interface. == Prereq...")
- 09:08, 18 July 2025 Jamshad talk contribs created page Generating Audit Reports on Palo Alto Firewall (Created page with "== Overview == This article provides step-by-step instructions for generating audit reports related to unused, inactive, disabled, and misnamed rules and objects within a Palo Alto Networks firewall. These reports are essential for security optimization, policy cleanup, and maintaining configuration hygiene. == Generating a Report for Unused Security Rules == ''' Purpose: ''' To identify security rules that have had no traffic since their creation. ''' Steps: ''' <p...")