User contributions for Jamshad
From Notes_Wiki
- 11:42, 29 July 2025 diff hist +3,959 N Steps to Configure SSL Forward Proxy on Palo Alto Networks Firewall Created page with " Steps to Configure SSL Forward Proxy on Palo Alto Networks Firewall ==Objective== This article provides step-by-step instructions on how to configure SSL Forward Proxy on Palo Alto Networks next-generation firewalls. SSL Forward Proxy allows the firewall to decrypt, inspect, and control outbound SSL/TLS traffic initiated by internal users to the internet. ==Prerequisites== #A self-signed or internal CA certificate (or a subordinate CA from enterprise PKI) installed o..."
- 11:41, 29 July 2025 diff hist +73 Paloalto firewall
- 11:21, 29 July 2025 diff hist −69 SSL Inbound Inspection Configuration on Palo Alto Networks Firewall
- 11:20, 29 July 2025 diff hist +288 SSL Inbound Inspection Configuration on Palo Alto Networks Firewall
- 11:17, 29 July 2025 diff hist +24 SSL Inbound Inspection Configuration on Palo Alto Networks Firewall →Step 1: Verify the Server Certificate Chain
- 11:17, 29 July 2025 diff hist +26 SSL Inbound Inspection Configuration on Palo Alto Networks Firewall →Step 1: Verify the Server Certificate Chain
- 11:16, 29 July 2025 diff hist +5,680 N SSL Inbound Inspection Configuration on Palo Alto Networks Firewall Created page with "SSL Inbound Inspection Configuration on Palo Alto Networks Firewall ==Introduction== SSL Inbound Inspection is a feature on Palo Alto Networks firewalls that enables decryption and inspection of encrypted traffic destined for internal servers. This is crucial for detecting threats hidden in SSL/TLS traffic that would otherwise bypass inspection. This article outlines a step-by-step process to configure SSL Inbound Inspection when hosting services behind NAT and using p..."
- 11:07, 29 July 2025 diff hist +73 Paloalto firewall
- 05:24, 29 July 2025 diff hist +3,541 N Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are the Same) Created page with "Home > Enterprise security devices or applications > Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are the Same) ==Overview== In certain network environments, users within the same security zone may need to access internal resources using public IP addresses. This commonly occurs when DNS resolves internal servers to their public addresses or when services are designed with public IP references. To make this communicati..."
- 05:17, 29 July 2025 diff hist +92 Paloalto firewall
- 05:14, 29 July 2025 diff hist +329 Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are Different)
- 05:13, 29 July 2025 diff hist +1,858 Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are Different)
- 05:02, 29 July 2025 diff hist +1,400 N Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are Different) Created page with "Home > Enterprise security devices or applications > Steps to Configure U-NAT in Palo Alto (When Source and Destination Zones Are Different) = Overview = Unidirectional NAT (U-NAT) is commonly used in scenarios where external users access internal services using public IP addresses. When the source zone (internal) and destination zone (WAN/ISP) are different, specific NAT and Security policy configurations are necessary on a Palo Alto firewall. T..."
- 04:53, 29 July 2025 diff hist +93 Paloalto firewall
- 10:37, 18 July 2025 diff hist +459 Generating Audit Reports on Palo Alto Firewall →Overview current
- 10:35, 18 July 2025 diff hist −2 Generating Audit Reports on Palo Alto Firewall →Generating a Report on Improperly Named Objects
- 10:34, 18 July 2025 diff hist +13 Generating Audit Reports on Palo Alto Firewall →Generating a Report for Unused Decryption Rules
- 10:34, 18 July 2025 diff hist +13 Generating Audit Reports on Palo Alto Firewall →Generating a Report on Unused Policy-Based Forwarding (PBF) Rules
- 10:33, 18 July 2025 diff hist +13 Generating Audit Reports on Palo Alto Firewall →Generating a Report for Rules with No Traffic Hits in the Last 90 Days
- 10:33, 18 July 2025 diff hist +13 Generating Audit Reports on Palo Alto Firewall →Generating a Report for Unused NAT Rules
- 10:33, 18 July 2025 diff hist +13 Generating Audit Reports on Palo Alto Firewall →Generating a Report for Unused Security Rules
- 10:13, 18 July 2025 diff hist +337 Generating Palo Alto Firewall Audit Reports Using Firewall Analyzer current
- 10:12, 18 July 2025 diff hist +297 Generating Audit Reports on Palo Alto Firewall
- 10:07, 18 July 2025 diff hist +6,261 N Generating Palo Alto Firewall Audit Reports Using Firewall Analyzer Created page with " == Overview == This article presents a detailed guide to generating firewall audit reports for Palo Alto Networks firewalls using ''' Firewall Analyzer''' , a powerful log analysis and reporting tool designed to simplify and enhance firewall audit processes. Network and security administrators can utilize this tool to gain actionable insights into policy usage, configuration hygiene, risk assessment, and compliance status — all from a centralized interface. == Prereq..."
- 09:11, 18 July 2025 diff hist +73 Paloalto firewall
- 09:08, 18 July 2025 diff hist +3,311 N Generating Audit Reports on Palo Alto Firewall Created page with "== Overview == This article provides step-by-step instructions for generating audit reports related to unused, inactive, disabled, and misnamed rules and objects within a Palo Alto Networks firewall. These reports are essential for security optimization, policy cleanup, and maintaining configuration hygiene. == Generating a Report for Unused Security Rules == ''' Purpose: ''' To identify security rules that have had no traffic since their creation. ''' Steps: ''' <p..."
- 07:23, 18 July 2025 diff hist +52 Paloalto firewall