Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Palo Alto Firewall Masterclass 2025 – NGFW Configuration, Security Policies & Exam Prep
All About Firewalls
What is Firewall (7:42)
Statefull packet Filtering (8:05)
Stateless Packet Filtering (3:31)
Application Level Gateways - Proxy Servers (5:10)
Next Generation Firewalls (5:30)
Which Firewall - Vendors (6:24)
Next Gen Firewalls
NGFW History - Unified Threat Management (UTM) (9:10)
Next-Generation Firewall – Features - PART 2 (11:45)
Next-Generation Firewall – Features - PART 1 (15:52)
PaloAlto Firewall - Virtual Labs
Firewalls Lab Topology (11:13)
PaloAlto Labs -Virtual Setup (3:04)
PaloAlto -EVE-ng Image Setiup (8:29)
PaloAlto Lab Setup - EVE-NG (11:03)
PaloAlto Image Setup - GNS3 (9:40)
PaloAlto Lab Topology Setup -GNS3 (6:50)
Default CLI Login - PaloAlto (1:20)
PaloAlto Access
Default CLI Login - PaloAlto (1:20)
PaloAlto Default CLI Login (1:55)
PaloAlto CLI Login-Password (2:30)
PaloAlto GUI Login (8:35)
Static IP - Mgmt PaloAlto Firewall (7:03)
General Settings
Change Admin password (3:52)
General Settings (3:02)
Shutdown-Reboot PaloAlto (5:38)
Interface Configuration
Router Side Configurations (8:21)
Firewall Security Zones (5:31)
Creatinng Security Zones (3:26)
LAN Interface Configuration (4:50)
Interface Mgmt Profile (7:18)
Internet Interface Configuration (5:34)
DMZ Interface Configuration (6:13)
Verify Connectivity From Firewall (4:42)
Static Routing - Cisco
Types of Routing (5:20)
What is ROUTING (12:00)
Static Routing (3:20)
Static Routing - Configuration Example 1 (9:19)
Static Routing - Configuration Example 2 (9:26)
Static Routing - Next Hop or Exit interface (5:34)
Routing - How it Works (6:11)
Static Routing - Multiple Paths (4:44)
Floating Static Routes (8:27)
Default Routing - CCNA CCNP
What is Default Routing (18:40)
Default Routing - Configuration Example (13:11)
Floating Default Routing (11:26)
Default Routing Verfification - Real Scenario (24:45)
Default Routing - Real Scenario (7:27)
Dynamic Routing - CCNA CCNP
Dynamic Routing (12:05)
Dynamic Routing Protocols - Introduction (19:53)
IGP - EGP Routing Protocols (3:30)
Classfull vs Classless Protocols (6:04)
RIPv2 - Cisco - CCNA
Routing Information Protocol (RIP) (11:25)
Dynamic Routing Protocols - Introduction (19:53)
RIP Timers (5:36)
RIPv1 vs RIPv2 (5:00)
RIP Configuration on Cisco Routers (15:28)
Drawbacks of RIPv2 - Limitations (4:46)
OSPF Basics
Knowledge - Prerequisite (2:01)
OSPF - Overview (6:12)
OSPF - How it Works (3:28)
OSPF – Becoming Neighbors (11:04)
Router-ID (12:41)
OSPF - LSDB- Database (5:18)
Exchanging the LSDB (6:26)
Synchornize LSDB- Best Route (4:57)
Maintaining Neighbors - LSDB (7:36)
OSPF -Tables (2:31)
OSPF Configuration- Single Area
OSPF Configuration Syntax (8:15)
OSPF - Wild Card Mask (9:14)
OSPF Single Area - Pre-Requiste (2:30)
OSPF Single Area-Configuration (7:00)
OSPF - Single Area- Verification (8:52)
OSPF - Advertisement Example (4:07)
OSPF Metric - Cost
Calculate Best Routes - OSPF (5:48)
OSPF Metric - COst (5:59)
Changing Interface Bandwidth (5:49)
Default Reference BW- LImitiations (1:25)
Manual Cost (3:49)
Auto-Cost Reference BW (6:04)
OSPF Areas
MUltiple Areas (7:05)
OSPF Single Area - Limitations (7:13)
MUlti-Ares -Design Rules (14:31)
Multi-Area - Configurations (5:05)
LAB - Mutl-Area- Configuration (11:51)
OSPFv2 Interface SubCommands (9:33)
OSPF Network Types
OSPF Broadcast Networks- DR-BDR (9:40)
OSPF Network Types (7:29)
DR-BDR - ELections (9:12)
OSPF DR-BDR - Lab (12:48)
OSPF Point to Point LInks (8:52)
Default Routes - OSPF
OSPF Default Routes Advertisements (3:32)
Advertiing Default Routes -IGP (8:45)
OSPF Default Route- LAB (12:54)
OSPF Default Routes - Options (9:52)
Redistribution - CCNP
Redistribution -Overview (12:32)
RIPv2 - EIGRP Redistribution (17:34)
RIPv2 - OSPF Redistribution (16:35)
OSPF Different Process - Redistribution (13:03)
Border Gateway Protocol
IGP - EGP Routing Protocols (3:30)
BGP Autonomous system Number (8:10)
Border Gateway Protocol -BGP (8:19)
BGP -When to use-When not to use (8:22)
ISP Connection Types (5:13)
BGP route Exchange with ISP (8:29)
BGP Neighbors - Internal-External
Internal BGP - External BGP (4:27)
IBGP neighbors - Configuration (16:00)
BGP Split Horizon Rule (8:24)
BGP Split horzon rule - Full mesh Neighbors (5:36)
IBGP using Loopbacks (9:11)
IBGP loopbacks Configuration (14:46)
IBGP Update Source Loopback (11:18)
EBGP Neighbors -Configuration (5:42)
BGP Next-Hop-Self (18:52)
BGP Attributes
BGP Attributes (8:18)
As-Path Attribute (7:29)
Next-Hop Attribute (2:16)
Origin Attribute (4:13)
Show ip bgp - output (7:36)
Weight Attribute (7:19)
Verify Weight Attribute - LAB 1 (11:24)
Weight - using Route-maps (18:05)
Local Preference Attribute (9:51)
Local Prefernce- LAB 1 (8:21)
Local Preference- LAB 2 (8:18)
Inbound vs Outbound (7:04)
BGP Path Selecttion Steps (13:31)
Routing -Redistribution
Static Default Routing-Internet (8:03)
Firewall Routing (10:27)
OSPF Routing - LAN (10:03)
Inject Default Routes -OSPF (10:49)
RIPv2 Routing - DMZ3 (5:24)
RIPv2-OSPF Redistribution (7:17)
OSPF Routing - DMZ4 (5:56)
Network Address Translation - NAT
Public-Private IP (5:14)
What is NAT (7:55)
Why do we need NAT (6:33)
NAT Types (11:39)
NAT - PaloAlto Firewall
Security Policies - INTERNET to DMZ - PART 1 (11:39)
Static NAT (14:29)
Security Policies - INTERNET to DMZ - PART 2 (8:59)
Static PAT - PaloAlto (12:30)
Firewall Policies -Rules Zones Objectgroups Action
Firewall Security Zones (5:18)
Firewall Policies - Rules (5:43)
Firewall objects-groups (7:23)
Firewall Actions -permit block monitor (7:17)
Firewall Policies - Source Destination Address
Rule1- LAN-Internet-Allow Config (6:40)
Rule-1 LAN-Internet-Allow (7:08)
Rule 2 INTERNET_DMZ3_SERVERS (4:13)
Rule 2 INTERNET_DMZ3_SERVERS Config (5:53)
Rule 3 - LAN-to-DMZ-Servers (4:45)
LAN-to-DMZ-Servers - Configuration (10:54)
Rule4-DMZ-to-Internet (5:01)
Rule4-DMZ-to-Internet Configuration1 (10:20)
Rule5- DMZ3-to-DMZ4 (3:30)
Rule5- DMZ3-to-DMZ4 Configuration (7:00)
Rule6 -DENY_LAN_DMZ3 (5:00)
Rule6 -DENY_LAN_DMZ3 Configuration (9:08)
Rule7 -Implicit-Deny-All (4:17)
Rule7 -Implicit-Deny-All Configuration (4:15)
Intra-Inter Zone Rules (5:09)
Firewall Policies -Ports Services
Policies -Service ports (9:52)
Policies -Service ports -PaloAlto (3:22)
Rule1-Services LAN to INTERNET (6:24)
Services Rule1-LAN to INTERNET Paloalto Config (15:50)
Services Rule2-Internet to DMZ3 (5:53)
Services Rule2-Internet to DMZ3 Config (5:19)
Services Rule3-LAN to DMZ (3:58)
Services Rule3-LAN to DMZ PaloAlto Config (10:04)
Services Rule4- DMZ to Internet (4:13)
Services Rule4- DMZ to Internet PaloAlto (3:32)
Services Rule5- DMZ to DMZ (3:17)
Services Rule5- DMZ to DMZ PaloAlto (8:03)
Services Rule5- LAN to DMZ Deny (3:36)
Firewall Policies -URL Filtering
Firewall URL Filtering (22:03)
URL Filtering-Block Categories (11:06)
URL Filtering - Block Category (9:04)
URL Filtering-Allowed Categories (6:05)
URL Filtering - Allow Category (4:09)
Custom URL - Whitelisting (5:49)
URL Filtering Config (10:50)
Firewall Policies -Applications
Application Filtering-How it works (7:10)
Application Filtering-Firewalls (6:10)
Application Filtering-Examples (6:40)
Application Filtering-Allowed List (7:18)
Application Filtering-Allowed - PART 2 (1:22)
Application Filtering - PlaoAlto Config (11:43)
Allow Applicationss - PaloAlto (5:48)
Application Filtering-DMZ to Internet Allow (6:24)
Application Filtering-DMZ to Internet Deny (6:05)
Geo-location Filtering
Geolocation Based Filtering-Benifits (4:07)
Geolocation Based Filtering (12:19)
Geolocation Based Filtering-Rule1 (6:56)
Geo Location Filtering - Rule 1- PaloAlto (5:16)
Geo Location Filtering - Rule 2 (5:41)
Geolocation Based Filtering-Rule2 (2:41)
Geolocation Based Filtering-Rule3 (4:04)
Geolocation Based Filtering-Rule4 (2:13)
High Availablty Conceps
Understanding High Availability (HA) (12:30)
High Availability - Network (16:03)
High Availability-Switches (16:03)
High Availability-Firewalls (7:29)
High Availability-Servers (6:51)
High Availability-Summary (15:46)
High Availability-Best Practices (8:44)
HA in Firewalls (8:39)
HA Firewall Concepts (10:25)
HA - FIrewall Vendors (4:21)
High Availablty - Firewalls
High Availablity - Modes (8:12)
HA - Firewalls HA (7:08)
High Availablity - Ports (7:00)
High Availablity - HearBeat (11:25)
High Availablity - Failover Trigger (10:30)
High Availablity - Config Sync (7:18)
High Availablity - Session Sync (13:17)
HA - Link Path Monitoring (6:51)
HA -Prerequisite - PaloAlto (6:42)
Active Passive Firewall - PaloAlto
PaloAlto - Active Passive Initial Confg (20:17)
PaloAlto - Active Passive Lab Setup (8:40)
Active Passive Configuraion - PaloAlto Firewall (16:15)
Active Passive Verification - PaloAlto Firewall (8:14)
Paloalto - Subinterfaces
Firewall - Sub Interaces (7:34)
Firewall Sub-Interfacs- Lab Setup (16:30)
PaloAlto Sub -Interface Configuration (12:30)
Cryoptography
Goals of Cryptography (3:47)
What is Cryptography (3:40)
What is Hashing and How it works (2:56)
Hashing Drawbacks (2:15)
Hashing with HMAC (3:16)
What is Encryption - Decryption (1:53)
Encryption Algorithms - Symmetric vs Assymetric (5:26)
Cryptanalysis - Attacks (4:23)
Assymetric Encryption - Drawbacks (3:13)
Public Key Infrastructure (4:16)
VPN-Basics
VPN-Introduction (5:09)
VPN Types (3:49)
VPN Logical Topologies (1:25)
VPN Default Lab Setup- Routers (5:22)
VPN Default Topology - IOU - GNS3 (11:49)
About IPSEC
IPsec Security Services (6:53)
what is ipsec (2:48)
IPsec Modes - Tunnel vs Transport (5:29)
IPSec Site to site VPN
How IPsec VPN works (5:19)
Step-1 Interesting Traffic Configuration (3:02)
Step-2 IKE Phase-1 (7:36)
Step-3- IKE - Phase 2 (8:30)
IKE Phase -2 Configuration- Verification (6:56)
IPSEC VPN - With NAT (12:43)
IPSEC VPN - Dynamic IP Remote Site (16:45)
IKEv1 Phase 1-2 - Modes-Messages
IKE Phase 1 - Main Mode (5:47)
IKE Phases -Modes (1:57)
IKE Phase 1 - Aggressive Mode (8:12)
Phase1 - Agressive vs Main Mode (1:11)
IKE Phase 2 - Main Mode (8:12)
IPSEC VPN - LImitations (5:00)
IKEv2- Foundations
IKEv1 vs IKEv2 (13:47)
IPSEC KEv2 (8:47)
IKEv2 - Phase 1-IKE-SA_INIT_AUTH (12:22)
IKEv2 - Phase 2 - CHILD SA (7:02)
IKEv2 - Platform Support (4:16)
IKEv2 - Supported VPNs (4:56)
IKEv2-SIte-Site VPN
IKEv2- Site-Site VPN -Lab Setup (5:05)
IKEv2 -Site-Site VPN - Proposals (12:04)
IKEv2 -Site-Site VPN - Policy (8:32)
IKEv2 -Site-Site VPN - KeyRing (10:25)
IKEv2 -Site-Site VPN - Profile (7:23)
IKEv2 -Site-Site VPN - IPSec (7:09)
IKEv2 -Site-Site VPN - Verification (4:36)
SSL VPN-OVerview
What is SSL - TLS (3:06)
Remote Access VPN (2:32)
How SSL-TLS Works (7:53)
What is SSL VPN (4:17)
SSL VPN Modes (6:02)
Teach online with
Routing - How it Works
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock