God bless you man! This is the most detailed guide what I've seen .
@netsums3 ай бұрын
Glad you liked it!
@yummyummy86620035 ай бұрын
Hi Ricardo, thanks for the another quality video on palo. The details in the video shows your hands on experience on the platform. I would suggest to have couple of videos on global protect where you can show the Wireshark capture when internal gateway and external gateways are in use and to clearly distinguish how the tunnel is being created and packet details when connecting to external gateway along with traffic flow to specific destination with split tunnel configuration options
@mohammedqureshi9958 ай бұрын
Another great video appreciate for providing such a great information very interesting and interactive.
@netsums8 ай бұрын
Glad you enjoyed it, thanks for the comment.
@fantasycuber50568 ай бұрын
I really like the way you go about explaining things with a practical for everything unlike others Keep up the good work
@netsums8 ай бұрын
Thank you for the nice comment, I'm glad you like the videos!
@zs88507 ай бұрын
Awesome video!
@netsums7 ай бұрын
Thank you, I'm glad you liked it!
@kalibygomes34438 ай бұрын
Excelente conteúdo, obrigado!
@netsums8 ай бұрын
Obrigado também pelo comentário! 😊
@Killa_krayon9173 ай бұрын
This was great and informative. I am hoping to deploy this very soon. Does the Palo encrypt the data once it has inspected it and sends it to the final destination? I'll search the PA KBs in support but I'm just wondering how the last leg of data is handled. For topics I would like to see a video on HA Active / Active with shared resources and converged NAT table to eliminate the need for Source NAT when a resource is available via two external gateways.
@netsums3 ай бұрын
Thank you for your video suggestion. And yes, the Palo Alto encrypts the data again going to the server. It doesn't do SSL offloading.
@르브론시몬스8 ай бұрын
hi Please produce a panorama duplication guide video and a panorama duplication log setup video.
@victorb91572 ай бұрын
Hi, Did I missed something - there is no need to setup NAT for server inside?
@netsums2 ай бұрын
Hi. In my lab, my internet router does the NAT for the server. But yes, either you have a server that is accessible through the internet (public IP), or some device needs to do NAT. It can be the Palo Alto firewall, but it doesn't have to be.
@victorb91572 ай бұрын
In case of NAT on PA in Decryption Policy you should specify the preNAT port (in case you changed it e.g. 8443 -> 443) and preNAT IP (e.g. outside interface public IP) in address field. It may be not that obvious. Moreover you can omit the destination IP address and it will work - PA will just check the Certificate in Dec. Profile.