-
Palo Alto Security rules
Security rules define whether traffic is allowed or denied between specific zones (e.g., untrusted internet to trusted internal network). The rules are applied in a top-down order, so traffic matches the first rule that applies. Common fields include:
-
Problem Solving
Bear in mind your biggest problem, prioritize time to fix it.
-
Impact of the Internet
The internet is a near ubiquitous aspect of modern life — making it easy to take for granted all the skills, tools, opportunities, and benefits that it provides.
-
Attack Life Cycle
Same life cycle is followed across both physical or virtualized network
-
Managed Instance Group
Group of identical machines created from a template. Use case: When need VM elasticity based on demand
-
Service Level Indicator
An SLI is a service level indicator—a carefully defined quantitative measure of some aspect of the level of service that is provided. Most services consider request latency—how long it takes to return a response to a request—as a key SLI. Other common SLIs include the error rate, often expressed as a fraction of all requests received, and system throughput,…
-
Policy-based routes (PBR)
Policy-based routes let you specify a next hop based on the packet’s protocol and source IP address in addition to the destination IP address. In this case, traffic is redirected to an internal passthrough Network Load Balancer which enables the insertion of appliances such as firewalls into the path of network traffic as policy-based routes…