Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

    Listing Thumbnail

    Level 2 - Palo Alto Next Generation Firewall Optimization

     Info
    Convert Layer 3 and 4 policies to Layer 7 policies (App-ID), implement SSL decryption and QoS.
    Listing Thumbnail

    Level 2 - Palo Alto Next Generation Firewall Optimization

     Info

    Overview

    Advanced network security implementation service with Palo Alto Networks, including configuration and optimization to enhance your ecosystem's security. The service includes the implementation of advanced App-ID, User-ID, SSL Decryption and Content-ID functionalities, ensuring robust protection tailored to your specific needs.

    This service ensures a secure and efficient deployment, optimizing protection and visibility of your network with the migration from port-based rules to application-based rules, isolation of unknown TCP/UDP traffic, integration of an identification source (802. 1x, RADIUS, LDAP or XML API) and group mapping for granular access control, configuration of SSL decryption policies for high-risk categories, activation of decryption on selected devices and validation through log monitoring.

    In addition, implement PANDB-based content filtering, block high-risk categories and get recommendations of Anti-Virus and Anti-Spyware profiles, as well as the configuration of zone-based protection and public EDLs.

    • Implementation of App-ID functionality in the network and change of policies according to requirements.
    • Conversion of all applications known to the Palo Alto Networks solution from port-based rules to application-based rules.
    • Isolation of traffic rules that handle unknown TCP/UDP traffic.
    • Implementation of User-ID functionality in the client network with one (1) source of identification (802.1x, RADIUS, LDAP, XML API).
    • Configuration of group association according to User-ID (Group Mapping).
    • Safety rules modifications as required.
    • Development and deployment of SSL Decryption policies for high risk categories according to requirements.
    • Certificate deployment is not included.

    Highlights

    • App-ID: migration from port-based rules to application-based rules, with isolation of unknown TCP/UDP traffic.
    • SSL decryption: configuration of policies for high-risk categories, activation of decryption on selected devices and validation through log monitoring.
    • User-ID: integration of an identification source (802.1x, RADIUS, LDAP or XML API) and group mapping for granular access control.

    Details

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    • Contact via Xelco platform, telephone, email and chat
    • 7x24 support
    • Restrictions may apply. Contact Netdata for more information at netdatanetworks.com