Listing Thumbnail

    Level 2 - Palo Alto Next Generation Firewall Optimization

     Info
    Convert Layer 3 and 4 policies to Layer 7 policies (App-ID), implement SSL decryption and QoS.
    Listing Thumbnail

    Level 2 - Palo Alto Next Generation Firewall Optimization

     Info

    Overview

    Advanced network security implementation service with Palo Alto Networks, including configuration and optimization to enhance your ecosystem's security. The service includes the implementation of advanced App-ID, User-ID, SSL Decryption and Content-ID functionalities, ensuring robust protection tailored to your specific needs.

    This service ensures a secure and efficient deployment, optimizing protection and visibility of your network with the migration from port-based rules to application-based rules, isolation of unknown TCP/UDP traffic, integration of an identification source (802. 1x, RADIUS, LDAP or XML API) and group mapping for granular access control, configuration of SSL decryption policies for high-risk categories, activation of decryption on selected devices and validation through log monitoring.

    In addition, implement PANDB-based content filtering, block high-risk categories and get recommendations of Anti-Virus and Anti-Spyware profiles, as well as the configuration of zone-based protection and public EDLs.

    • Implementation of App-ID functionality in the network and change of policies according to requirements.
    • Conversion of all applications known to the Palo Alto Networks solution from port-based rules to application-based rules.
    • Isolation of traffic rules that handle unknown TCP/UDP traffic.
    • Implementation of User-ID functionality in the client network with one (1) source of identification (802.1x, RADIUS, LDAP, XML API).
    • Configuration of group association according to User-ID (Group Mapping).
    • Safety rules modifications as required.
    • Development and deployment of SSL Decryption policies for high risk categories according to requirements.
    • Certificate deployment is not included.

    Highlights

    • App-ID: migration from port-based rules to application-based rules, with isolation of unknown TCP/UDP traffic.
    • SSL decryption: configuration of policies for high-risk categories, activation of decryption on selected devices and validation through log monitoring.
    • User-ID: integration of an identification source (802.1x, RADIUS, LDAP or XML API) and group mapping for granular access control.

    Details

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    • Contact via Xelco platform, telephone, email and chat
    • 7x24 support
    • Restrictions may apply. Contact Netdata for more information at netdatanetworks.com