User contributions for Jamshad
From Notes_Wiki
- 05:12, 4 August 2025 diff hist +368 Steps to Configure VPN Bad Login Attempt Limit to 10 per Hour on Palo Alto Firewall current
- 05:10, 4 August 2025 diff hist +2,800 N Steps to Configure VPN Bad Login Attempt Limit to 10 per Hour on Palo Alto Firewall Created page with " ==Overview== Limiting the number of failed VPN login attempts is a critical step in defending against brute-force attacks targeting remote access services such as GlobalProtect VPN. Palo Alto Networks firewalls support a built-in mechanism to detect and block excessive authentication failures using Vulnerability Protection Profiles. By customizing these profiles, administrators can enforce a stricter limit—for example, capping failed login attempts to 10 per hour per..."
- 05:09, 4 August 2025 diff hist +89 Paloalto firewall current
- 12:35, 1 August 2025 diff hist +2 Steps for Creating a New Voucher for Guest SSID current
- 12:34, 1 August 2025 diff hist +294 Steps for Creating a New Voucher for Guest SSID
- 12:32, 1 August 2025 diff hist +2,486 N Steps for Creating a New Voucher for Guest SSID Created page with "==Overview== Voucher-based authentication is a secure and flexible method of providing temporary Wi-Fi access to guests without compromising your main network credentials. Each voucher is a unique code with defined limitations such as usage time, device count, or bandwidth. When redeemed, it grants temporary access to the Guest SSID. This method: #Enhances network security by isolating guest traffic from internal devices #Simplifies administration through centralized c..."
- 11:52, 1 August 2025 diff hist +258 N Wi-Fi controller Created page with "Home > Enterprise security devices or applications > Wi-Fi controller *Steps for Creating a New Voucher for Guest SSID Home > Enterprise security devices or applications > Wi-Fi controller" current
- 11:50, 1 August 2025 diff hist +22 Enterprise security devices or applications current
- 06:32, 1 August 2025 diff hist −290 Steps to Configure SSL Forward Proxy on Palo Alto Networks Firewall →Apply the CA Certificate to SSL Forward Proxy current
- 05:40, 1 August 2025 diff hist +429 SSL Inbound Inspection Configuration on Palo Alto Networks Firewall →Step 4: Create Decryption Profile current
- 05:34, 1 August 2025 diff hist 0 SSL Inbound Inspection Configuration on Palo Alto Networks Firewall
- 11:57, 31 July 2025 diff hist −132 Fortinet firewall CIS Hardening →Ensure Admin Accounts Have Correct Profiles Assigned (Manual) current
- 11:57, 31 July 2025 diff hist +9 Fortinet firewall CIS Hardening →Ensure CDN is enabled for improved GUI performance (Manual)
- 11:56, 31 July 2025 diff hist +9 Fortinet firewall CIS Hardening →Ensure management GUI listens on secure TLS version (Manual)
- 05:06, 30 July 2025 diff hist +2,799 N QoS Configuration for VoIP and Backup Traffic in Palo Alto Firewall Created page with "Home > Enterprise security devices or applications > Paloalto firewall > QoS Configuration for VoIP and Backup Traffic in Palo Alto Firewall ==Overview== Prioritizing real-time traffic such as VoIP is essential to maintain call quality and performance. At the same time, it is important to ensure that bandwidth-intensive operations like data backups do not saturate the network link and impact critical services. This configuration ensures: #Vo..." current
- 04:55, 30 July 2025 diff hist +73 Paloalto firewall
- 13:00, 29 July 2025 diff hist +45 Steps to Configure SSL Forward Proxy on Palo Alto Networks Firewall →Configuration Steps
- 12:09, 29 July 2025 diff hist +48 Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are Different) current
- 12:08, 29 July 2025 diff hist +48 Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are the Same) current
- 12:07, 29 July 2025 diff hist +48 SSL Inbound Inspection Configuration on Palo Alto Networks Firewall
- 12:06, 29 July 2025 diff hist +50 Steps to Configure SSL Forward Proxy on Palo Alto Networks Firewall
- 12:05, 29 July 2025 diff hist +219 Steps to Configure SSL Forward Proxy on Palo Alto Networks Firewall
- 12:03, 29 July 2025 diff hist −21 Steps to Configure SSL Forward Proxy on Palo Alto Networks Firewall
- 11:42, 29 July 2025 diff hist +3,959 N Steps to Configure SSL Forward Proxy on Palo Alto Networks Firewall Created page with " Steps to Configure SSL Forward Proxy on Palo Alto Networks Firewall ==Objective== This article provides step-by-step instructions on how to configure SSL Forward Proxy on Palo Alto Networks next-generation firewalls. SSL Forward Proxy allows the firewall to decrypt, inspect, and control outbound SSL/TLS traffic initiated by internal users to the internet. ==Prerequisites== #A self-signed or internal CA certificate (or a subordinate CA from enterprise PKI) installed o..."
- 11:41, 29 July 2025 diff hist +73 Paloalto firewall
- 11:21, 29 July 2025 diff hist −69 SSL Inbound Inspection Configuration on Palo Alto Networks Firewall
- 11:20, 29 July 2025 diff hist +288 SSL Inbound Inspection Configuration on Palo Alto Networks Firewall
- 11:17, 29 July 2025 diff hist +24 SSL Inbound Inspection Configuration on Palo Alto Networks Firewall →Step 1: Verify the Server Certificate Chain
- 11:17, 29 July 2025 diff hist +26 SSL Inbound Inspection Configuration on Palo Alto Networks Firewall →Step 1: Verify the Server Certificate Chain
- 11:16, 29 July 2025 diff hist +5,680 N SSL Inbound Inspection Configuration on Palo Alto Networks Firewall Created page with "SSL Inbound Inspection Configuration on Palo Alto Networks Firewall ==Introduction== SSL Inbound Inspection is a feature on Palo Alto Networks firewalls that enables decryption and inspection of encrypted traffic destined for internal servers. This is crucial for detecting threats hidden in SSL/TLS traffic that would otherwise bypass inspection. This article outlines a step-by-step process to configure SSL Inbound Inspection when hosting services behind NAT and using p..."
- 11:07, 29 July 2025 diff hist +73 Paloalto firewall
- 05:24, 29 July 2025 diff hist +3,541 N Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are the Same) Created page with "Home > Enterprise security devices or applications > Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are the Same) ==Overview== In certain network environments, users within the same security zone may need to access internal resources using public IP addresses. This commonly occurs when DNS resolves internal servers to their public addresses or when services are designed with public IP references. To make this communicati..."
- 05:17, 29 July 2025 diff hist +92 Paloalto firewall
- 05:14, 29 July 2025 diff hist +329 Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are Different)
- 05:13, 29 July 2025 diff hist +1,858 Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are Different)
- 05:02, 29 July 2025 diff hist +1,400 N Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are Different) Created page with "Home > Enterprise security devices or applications > Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are Different) = Overview = Unidirectional NAT (U-NAT) is commonly used in scenarios where external users access internal services using public IP addresses. When the source zone (internal) and destination zone (WAN/ISP) are different, specific NAT and Security policy configurations are necessary on a Palo Alto firewall. T..."
- 04:53, 29 July 2025 diff hist +93 Paloalto firewall
- 10:37, 18 July 2025 diff hist +459 Generating Audit Reports on Palo Alto Firewall →Overview current
- 10:35, 18 July 2025 diff hist −2 Generating Audit Reports on Palo Alto Firewall →Generating a Report on Improperly Named Objects
- 10:34, 18 July 2025 diff hist +13 Generating Audit Reports on Palo Alto Firewall →Generating a Report for Unused Decryption Rules
- 10:34, 18 July 2025 diff hist +13 Generating Audit Reports on Palo Alto Firewall →Generating a Report on Unused Policy-Based Forwarding (PBF) Rules
- 10:33, 18 July 2025 diff hist +13 Generating Audit Reports on Palo Alto Firewall →Generating a Report for Rules with No Traffic Hits in the Last 90 Days
- 10:33, 18 July 2025 diff hist +13 Generating Audit Reports on Palo Alto Firewall →Generating a Report for Unused NAT Rules
- 10:33, 18 July 2025 diff hist +13 Generating Audit Reports on Palo Alto Firewall →Generating a Report for Unused Security Rules
- 10:13, 18 July 2025 diff hist +337 Generating Palo Alto Firewall Audit Reports Using Firewall Analyzer current
- 10:12, 18 July 2025 diff hist +297 Generating Audit Reports on Palo Alto Firewall
- 10:07, 18 July 2025 diff hist +6,261 N Generating Palo Alto Firewall Audit Reports Using Firewall Analyzer Created page with " == Overview == This article presents a detailed guide to generating firewall audit reports for Palo Alto Networks firewalls using ''' Firewall Analyzer''' , a powerful log analysis and reporting tool designed to simplify and enhance firewall audit processes. Network and security administrators can utilize this tool to gain actionable insights into policy usage, configuration hygiene, risk assessment, and compliance status — all from a centralized interface. == Prereq..."
- 09:11, 18 July 2025 diff hist +73 Paloalto firewall
- 09:08, 18 July 2025 diff hist +3,311 N Generating Audit Reports on Palo Alto Firewall Created page with "== Overview == This article provides step-by-step instructions for generating audit reports related to unused, inactive, disabled, and misnamed rules and objects within a Palo Alto Networks firewall. These reports are essential for security optimization, policy cleanup, and maintaining configuration hygiene. == Generating a Report for Unused Security Rules == ''' Purpose: ''' To identify security rules that have had no traffic since their creation. ''' Steps: ''' <p..."
- 07:23, 18 July 2025 diff hist +52 Paloalto firewall