Reader small image

You're reading from  Mastering Palo Alto Networks - Second Edition

Product typeBook
Published inJun 2022
PublisherPackt
ISBN-139781803241418
Edition2nd Edition
Concepts
Right arrow
Author (1)
Tom Piens aka Piens aka 'reaper'
Tom Piens aka Piens aka 'reaper'
author image
Tom Piens aka Piens aka 'reaper'

Tom Piens is a seasoned cybersecurity professional with a distinguished career closely tied to Palo Alto Networks. With over two decades of experience in the field, Tom has played a pivotal role in shaping the digital defense landscape. His journey began as the first international (outside of the continental US) support engineer at Palo Alto Networks, where he rapidly ascended the ranks due to his remarkable aptitude for innovative solutions. Beyond his technical prowess, Tom's passion for knowledge transfer has made him a sought-after mentor. He's been instrumental in cultivating a dynamic learning environment within the Palo Alto Networks LIVE community, fostering a culture of continuous growth and excellence. His innate ability to simplify complex concepts has empowered his colleagues to stay at the forefront of cybersecurity trends.
Read more about Tom Piens aka Piens aka 'reaper'

Right arrow

Understanding and building security rules

We now need to build some security rules to allow or deny traffic in and out of the network. The default rules will only allow intrazone traffic and will block everything else, as you can see here:

Figure 3.23 – Default security rules

Figure 3.24: Default security rules

In the next sections, we will start to build a rule base, making sure we first introduce some rules to drop undesirable sources and destinations, followed by adding permissive policies focused on allowing applications required by the users in a secure way, leveraging App-ID to ensure only the intended applications are let through. Finally, we’ll look in more detail at which objects make up rule bases and how the rules can be kept tidy after having been in use for a while.

We will first make sure “bad” traffic is dropped by creating two new rules—one for inbound and one for outbound traffic.

Dropping “bad” traffic

The inbound rule will have the...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Mastering Palo Alto Networks - Second Edition
Published in: Jun 2022Publisher: PacktISBN-13: 9781803241418

Author (1)

author image
Tom Piens aka Piens aka 'reaper'

Tom Piens is a seasoned cybersecurity professional with a distinguished career closely tied to Palo Alto Networks. With over two decades of experience in the field, Tom has played a pivotal role in shaping the digital defense landscape. His journey began as the first international (outside of the continental US) support engineer at Palo Alto Networks, where he rapidly ascended the ranks due to his remarkable aptitude for innovative solutions. Beyond his technical prowess, Tom's passion for knowledge transfer has made him a sought-after mentor. He's been instrumental in cultivating a dynamic learning environment within the Palo Alto Networks LIVE community, fostering a culture of continuous growth and excellence. His innate ability to simplify complex concepts has empowered his colleagues to stay at the forefront of cybersecurity trends.
Read more about Tom Piens aka Piens aka 'reaper'