index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
46
PAN OS 11.1 Security Target Palo Alto Networks Page 47 FCS_TLSS_EXT.1.4 The TSF shall support [session resumption based on session tickets according to RFC 5077 (TLS 1.2), session resumption according to RFC 8446 (TLS 1.3)]. FCS_TLSS_EXT.1.5 The TSF [provides] the ability to configure the list of supported ciphersuit...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
47
PAN OS 11.1 Security Target Palo Alto Networks Page 48 o length of time, where the time values can be configured within [1 to 8760] hours; ]]. FCS_IPSEC_EXT.1.9 The TSF shall generate the secret value x used in the IKE Diffie-Hellman key exchange (“x” in gx mod p) using the random bit generator specified in FCS_RBG_...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
48
PAN OS 11.1 Security Target Palo Alto Networks Page 49 5.2.4 Identification and Authentication (FIA) FIA_AFL.1 – Authentication Failure Management FIA_AFL.1.1 The TSF shall detect when an Administrator configurable positive integer within [1-10] unsuccessful authentication attempts occur related to Administrators atte...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
49
PAN OS 11.1 Security Target Palo Alto Networks Page 50 ● The TSF shall validate the extendedKeyUsage field according to the following rules: o Certificates used for trusted updates and executable code integrity verification shall have the Code Signing purpose (id-kp 3 with OID 1.3.6.1.5.5.7.3.3) in the extendedKeyUs...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
50
PAN OS 11.1 Security Target Palo Alto Networks Page 51 5.2.5 Security Management (FMT) FMT_MOF.1/ManualUpdate – Management of Security Functions Behaviour FMT_MOF.1.1/ManualUpdate The TSF shall restrict the ability to enable the functions to perform manual updates to Security Administrators. FMT_MOF.1/Services – Manag...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
51
PAN OS 11.1 Security Target Palo Alto Networks Page 52 o Ability to manage the trusted public keys database; o Ability to configure the authentication failure parameters for FIA_AFL.1 ]. FMT_SMF.1/FFW – Specification of Management Functions FMT_SMF.1.1/FFW The TSF shall be capable of performing the following management...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
52
PAN OS 11.1 Security Target Palo Alto Networks Page 53 5.2.6 Protection of the TSF (FPT) FPT_SKP_EXT.1 – Protection of TSF data (for reading of all symmetric keys) FPT_SKP_EXT.1.1 The TSF shall prevent reading of all pre-shared keys, symmetric keys, and private keys. FPT_APW_EXT.1 – Protection of Administrator Passwor...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
53
PAN OS 11.1 Security Target Palo Alto Networks Page 54 ● DRBG SP800-90A Known Answer Tests ● SP 800-90A Section 11.3 Health Tests ● DH Known Answer Test ● ECDH Known Answer Test ● SP 800-135 KDF Known Answer Tests ]. to demonstrate the correct operation of the TSF: noise source health tests. Application Note: Modified...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
54
PAN OS 11.1 Security Target Palo Alto Networks Page 55 5.2.8 Trusted Path/Channels (FTP) FTP_ITC.1 – Inter-TSF Trusted Channel FTP_ITC.1.1 The TSF shall be capable of using [TLS]to provide a trusted communication channel between itself and another trusted IT product authorized IT entities supporting the following cap...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
55
PAN OS 11.1 Security Target Palo Alto Networks Page 56 5.2.9 Firewall (FFW) FFW_RUL_EXT.1 – Stateful Traffic Filtering FFW_RUL_EXT.1.1 The TSF shall perform stateful traffic filtering on network packets processed by the TOE. FFW_RUL_EXT.1.2 The TSF shall allow the definition of stateful traffic filtering rules using t...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
56
PAN OS 11.1 Security Target Palo Alto Networks Page 57 b) Remove existing traffic flows from the set of established traffic flows based on the following: [session inactivity timeout, completion of the expected information flow]. FFW_RUL_EXT.1.6 The TSF shall enforce the following default stateful traffic filtering rul...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
57
PAN OS 11.1 Security Target Palo Alto Networks Page 58 a) The TSF shall drop and be capable of logging network packets where the source address of the network packet is equal to the address of the network interface where the network packet was received; b) The TSF shall drop and be capable of logging network packets ...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
58
PAN OS 11.1 Security Target Palo Alto Networks Page 59 5.2.10 Packet Filtering (FPF) FPF_RUL_EXT.1 – Rules for Packet Filtering FPF_RUL_EXT.1.1 The TSF shall perform packet filtering on network packets processed by the TOE. FPF_RUL_EXT.1.2 The TSF shall allow the definition of Packet Filtering rules using the following...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
59
PAN OS 11.1 Security Target Palo Alto Networks Page 60 5.2.11 Intrusion Prevention (IPS) IPS_ABD_EXT.1 – Anomaly-Based IPS Functionality IPS_ABD_EXT.1.1 The TSF shall support the definition of [baselines (‘expected and approved’)] including the specification of [ ● frequency] and the following network protocol fields...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
60
PAN OS 11.1 Security Target Palo Alto Networks Page 61 IPS_NTA_EXT.1.3 The TSF shall allow the signatures to be assigned to sensor interfaces configured for promiscuous mode, and to interfaces configured for inline mode, and support designation of one or more interfaces as ‘management’ for communication between the ...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
61
PAN OS 11.1 Security Target Palo Alto Networks Page 62 ● [no other packet payload inspection] IPS_SBD_EXT.1.3 The TSF shall be able to detect the following header-based signatures (using fields identified in IPS_SBD_EXT.1.1) at IPS sensor interfaces: [ a) IP Attacks i. IP Fragments Overlap (Teardrop attack, Bonk attac...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
62
PAN OS 11.1 Security Target Palo Alto Networks Page 63
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
63
PAN OS 11.1 Security Target Palo Alto Networks Page 64 5.3 TOE Security Assurance Requirements The security assurance requirements for the TOE are included by reference to [NDcPP], [FW-Module], [VPNGW-Module], and [IPS-Module]. Table 7 Assurance Components Requirement Class Requirement Component ADV: Development ADV_...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
64
PAN OS 11.1 Security Target Palo Alto Networks Page 65 6. TOE Summary Specification This chapter describes the security functions: ● Security Audit ● Cryptographic Support ● User Data Protection ● Identification and Authentication ● Security Management ● Protection of the TSF ● TOE Access ● Trusted Path/Channels ● Sta...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
65
PAN OS 11.1 Security Target Palo Alto Networks Page 66 reaches the maximum size, the TOE starts overwriting the oldest log entries with the new log entries. Maximum disk space is platform dependent, and it depends on the hard disk drive installed on the system. By default, the TOE allocates 1-5% to system log, 1-5% t...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
66
PAN OS 11.1 Security Target Palo Alto Networks Page 67 ECDSA based key establishment (NIST P-256, P￾384, P-521) NIST SP 800-56A Appliances (#A3453): ECC FFC VMs (#A3454): ECC FFC Key establishment scheme using Diffie-Hellman groups that meet the following: RFC 3526 and SP 800-56Ar3 (2048-bit MODP, 3072-bit MOD...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
67
PAN OS 11.1 Security Target Palo Alto Networks Page 68 ● HMAC-SHA-1 (block size 512 bits, key size 160 bits and digest size 160 bits) ● HMAC-SHA-256 (block size 512 bits, key size 256 bits and digest size 256 bits) ● HMAC-SHA-384 (block size 1024 bits, key size 384 bits and digest size 384 bits) ● HMAC-SHA-512...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
68
PAN OS 11.1 Security Target Palo Alto Networks Page 69 B.4.1 should Yes N/A B.4.2 should Yes N/A The TOE performs cryptographic key establishment in accordance with NIST Special Publication 800-56A for elliptic curve-based key establishment5 schemes, and NIST Special Publication 800-56A for finite field-based key est...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
69
PAN OS 11.1 Security Target Palo Alto Networks Page 70 4 TLS DHE/ECDHE Private Components DH Diffie-Hellman private FFC or EC component used in TLS (DHE 2048, ECDHE P-256, P-384, P-521) 5 TLS HMAC Keys HMAC TLS integrity and authentication session keys (HMAC-SHA2-256, HMAC-SHA2-384) 6 TLS Encryption Keys A...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
70
PAN OS 11.1 Security Target Palo Alto Networks Page 71 16 Firmware Content Encryption Key AES-256 Used to encrypt/decrypt firmware, software, and sensitive content. 17 Password Passwor d Authentication string with a minimum length of 8 characters. Stored hashed with SHA-256 and nonce. 18 DRBG Seed /State DR...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
71
PAN OS 11.1 Security Target Palo Alto Networks Page 72 format provided in section 4 of RFC 5077. Fallback password-based authentication is not supported for this interface. The TOE denies connections from clients requesting connections using SSL 2.0, SSL 3.0, TLS 1.0, or TLS 1.1 and shall not establish a trusted cha...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
72
PAN OS 11.1 Security Target Palo Alto Networks Page 73 ● TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 as defined in RFC 5289 ● TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5289 ● TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as defined in RFC 5289 ● TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5289 ● T...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
73
PAN OS 11.1 Security Target Palo Alto Networks Page 74 diffie-hellman-group-1 are all disabled when FIPS-CC mode is enabled. Only the Approved encryption and integrity algorithms along with key exchange algorithms ecdh￾sha2-nistp256, ecdh-sha2-nistp384, and ecdh-sha2-nistp521 (based on elliptic curve from FCS_CKM.2) ...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
74
PAN OS 11.1 Security Target Palo Alto Networks Page 75 source or destination IP addresses and ports are converted between public and private addresses and ports. For example, private source addresses can be translated to public addresses on traffic sent from an internal (trusted) zone to a public (untrusted) zone. N...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
75
PAN OS 11.1 Security Target Palo Alto Networks Page 76 6.3 User Data Protection FDP_RIP.2 The TOE allocates and releases (i.e., deallocates) the memory resources used for network packet objects. When it receives new data from the network and allocates new buffer resources to store and transmit data to the network, i...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
76
PAN OS 11.1 Security Target Palo Alto Networks Page 77 characters. For example, if the administrator configures the minimum password length as 15, users can only create passwords from length of 15 to 63. FIA_AFL.1 The TOE logs all unsuccessful authentication attempts in the System Log and tracks the number of failed ...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
77
PAN OS 11.1 Security Target Palo Alto Networks Page 78 decides to use it. The TOE uses a hard coded 1 hour as next update time (cached time) in this case. Caching only applies to validated certificates; if a TOE never validated a certificate, the TOE cache does not store the OCSP information for the issuing CA. To u...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
78
PAN OS 11.1 Security Target Palo Alto Networks Page 79 FMT_SMF.1 FMT_SMF.1/FFW FMT_SMF.1/VPN FMT_SMF.1/IPS The security management functions provided by the TOE include, but are not limited to: ● Ability to administer the TOE remotely; ● Ability to configure the access banner; ● Ability to configure the session inacti...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
79
PAN OS 11.1 Security Target Palo Alto Networks Page 80 o Source IP addresses (host address and network address) o Destination IP addresses (host address and network address) o Source port (TCP and UDP) o Destination port (TCP and UDP) o Protocol (IPv4 and IPv6) o ICMP Type and Code ● Update (import) signatures; ● Creat...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
80
PAN OS 11.1 Security Target Palo Alto Networks Page 81 Certificate. By default, all the private keys are protected since they are always stored in encrypted format using AES-256. The TOE prevents the reading of all keys by encrypting them with a Master Key using AES-256. The TOE does not provide an interface to read...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
81
PAN OS 11.1 Security Target Palo Alto Networks Page 82 and enter maintenance mode (i.e., error state) in which the reason for the failure can be determined. In the maintenance mode, all operational and network functions will be unavailable with one exception which is the Reboot operation. These self-tests are suffic...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
82
PAN OS 11.1 Security Target Palo Alto Networks Page 83 FTA_SSL.3 The TOE subsequently will enforce an administrator-defined inactivity timeout value after which the remote session will be terminated regardless of authentication methods (e.g., password, public-key, X.509v3 certificate). The TOE can be configured by an...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
83
PAN OS 11.1 Security Target Palo Alto Networks Page 84 ● Internet Control Message Protocol version 4 (ICMPv4) ● Internet Control Message Protocol version 6 (ICMPv6) ● Internet Protocol version 4 (IPv4) ● Internet Protocol version 6 (IPv6) o IPv6 Extension header type (Next Header, Hdr Ext Len, Header Specific Data, Op...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
84
PAN OS 11.1 Security Target Palo Alto Networks Page 85 o identity of destination subject—destination address information within the packet o transport layer protocol (e.g., TCP, UDP) o Internet layer protocol (e.g., ICMP type, code) o source subject service identifier (e.g., source port number) o destination subject s...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
85
PAN OS 11.1 Security Target Palo Alto Networks Page 86 o Log Setting—generate log entries in the local traffic log o Schedule—limits the days and times when the rule is in effect (e.g., an ‘allow’ rule might be active only during normal business hours) o QoS Marking—change the Quality of Service (QoS) marking on packe...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
86
PAN OS 11.1 Security Target Palo Alto Networks Page 87 FTP traffic, and can log FTP session starts, FTP session ends, or both. It does not log individual FTP command or data packet. The device provides a setting such that the Security Administrator can enable or disable ICMP and SNMP for all users. The TOE rejects re...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
87
PAN OS 11.1 Security Target Palo Alto Networks Page 88 there is an initial deny rule for the application service (i.e. service-HTTP, service-https) matching the traffic with no applications defined. The TOE performs the following steps when processing traffic: ● The traffic is passed through the Application Identific...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
88
PAN OS 11.1 Security Target Palo Alto Networks Page 89 session is deleted. Session removal becomes effective before the next packet that might match the session is processed. The PAN-OS performs Strict IP Address check, reject, and is capable of logging network packets where the source or destination address of the n...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
89
PAN OS 11.1 Security Target Palo Alto Networks Page 90 destination IP address, protocol (as specified in RFCs), Next Header, the application, user, and the service. All traffic passing through the firewall is matched against a session and each session is matched against a security policy. When a session match occurs...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
90
PAN OS 11.1 Security Target Palo Alto Networks Page 91 source and destination zones. The security zones are tied to any network data interface (not management interface). IPS_IPB_EXT.1 The TOE supports security rules based known-good or known-bad list rules mechanism, or an External Dynamic List (EDL) mechanism. The...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
91
PAN OS 11.1 Security Target Palo Alto Networks Page 92 TOE will determine if content inspection will be applied based on the IPS policy configured per security policy rule with logging options. If content inspection is configured (per security policy rule) and the TOE is in inline deployment, any match of the signat...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
92
PAN OS 11.1 Security Target Palo Alto Networks Page 93 7. Protection Profile Claims This ST is conformant to the [CFG_NDcPP-FW-VPNGW_V2.0], [NDcPP], [FW-Module], [VPNGW-Module], [SSHPKG], and [IPS-Module].
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
93
PAN OS 11.1 Security Target Palo Alto Networks Page 94 8. Rationale This Security Target includes by reference the [NDcPP], [FW-Module], [VPNGW-Module], [SSHPKG], and [IPS-Module] applicable Security Problem Definition, Security Objectives, and Security Assurance Requirements. The Security Target makes no additions t...
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf
0
Strata by Palo Alto Networks | PA-7500 | Datasheet 1 Highlights • World’s first ML-Powered NGFW • Eleven-time Leader in the Gartner Magic Quadrant for Network Firewalls • Leader in the Forrester Wave: Enterprise Firewalls, Q4 2022 • Operates on a unified and scalable architecture • Extends visibility and security to...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-7500
1
Strata by Palo Alto Networks | PA-7500 | Datasheet 2 The controlling element of the PA-7500 is PAN-OS®, the same software that runs all Palo Alto Networks NGFWs. PAN-OS natively classifies all traffic, inclusive of applications, threats, and content, and then ties that traffic to the user regardless of location or de...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-7500
2
Strata by Palo Alto Networks | PA-7500 | Datasheet 3 Prevents Malicious Activity Concealed in Encrypted Traffic • Inspects and applies policy to SSL/TLS-encrypted traffic, both inbound and outbound, including for traffic that uses TLS 1.3 and HTTP/2. • Offers rich visibility into TLS traffic, such as the amount of enc...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-7500
3
Strata by Palo Alto Networks | PA-7500 | Datasheet 4 • DNS Security: Gain 40% more threat coverage and stop 85% of malware that abuses DNS for com￾mand and control and data theft without requiring changes to your infrastructure. • Enterprise DLP: Minimize risk of a data breach, stop out-of-policy data transfers, and en...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-7500
4
3000 Tannery Way Santa Clara, CA 95054 Main: +1.408.753.4000 Sales: +1.866.320.4788 Support: +1.866.898.9087 www.paloaltonetworks.com © 2023 Palo Alto Networks, Inc. Palo Alto Networks and the Palo Alto Networks logo are registered trademarks of Palo Alto Networks, Inc. A list of our trademarks can be found at https:...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-7500
0
Strata by Palo Alto Networks | PA-1400 Series | Datasheet 1 Highlights • World’s first ML-Powered NGFW • Eleven-time Leader in the Gartner Magic Quadrant for Network Firewalls • Leader in the Forrester Wave: Enterprise Firewalls, Q4 2022 • Delivers predictable performance with security services • Simplifies deplo...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-1400-series
1
Strata by Palo Alto Networks | PA-1400 Series | Datasheet 2 The controlling element of the PA-1400 Series is PAN-OS®, the same software that runs all Palo Alto Networks NGFWs. PAN-OS natively classifies all traffic, inclusive of applications, threats, and content, and then ties that traffic to the user regardless of ...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-1400-series
2
Strata by Palo Alto Networks | PA-1400 Series | Datasheet 3 • Provides dynamic security actions based on user behavior to restrict suspicious or malicious users. • Consistently authenticates and authorizes your users, regardless of location and where user identity stores live, to move quickly toward a Zero Trust secu...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-1400-series
3
Strata by Palo Alto Networks | PA-1400 Series | Datasheet 4 • Ability to support explicit proxy through PAC files and also transparent proxy. • Explicit proxy can help with no-default route architectures with on-premises proxy deployments. • Explicit proxy supports authentication with Kerberos and SAML. • Transparent p...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-1400-series
4
Strata by Palo Alto Networks | PA-1400 Series | Datasheet 5 * Firewall throughput is measured with App-ID and logging enabled, using appmix transactions. † Threat Prevention throughput is measured with App-ID, IPS, antivirus, antispyware, WildFire, DNS Security, file blocking, and logging enabled, utilizing appmix t...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-1400-series
5
Strata by Palo Alto Networks | PA-1400 Series | Datasheet 6 Table 2: PA-1400 Series Networking Features (continued) VLANs 802.1Q VLAN tags per device/per interface: 4,094/4,094 Aggregate interfaces (802.3ad), LACP Network Address Translation NAT modes (IPv4): static IP, Dynamic IP, Dynamic IP and Port (port address tra...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-1400-series
6
3000 Tannery Way Santa Clara, CA 95054 Main: +1.408.753.4000 Sales: +1.866.320.4788 Support: +1.866.898.9087 www.paloaltonetworks.com © 2024 Palo Alto Networks, Inc. A list of our trademarks in the United States and other jurisdictions can be found at https://www.paloaltonetworks.com/company/trademarks.html. All othe...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-1400-series
0
Strata by Palo Alto Networks | PA-3200 Series | Datasheet 1 Highlights • World’s first ML-Powered NGFW • Eleven-time Leader in the Gartner Magic Quadrant for Network Firewalls • Leader in The Forrester Wave: Enterprise Firewalls, Q4 2022 • Delivers 5G-Native Security built to safeguard service provider and enter...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-3200-series
1
Strata by Palo Alto Networks | PA-3200 Series | Datasheet 2 The controlling element of the PA-3200 Series is PAN-OS®, the same software that runs all Palo Alto Networks Next-Generation Firewalls (NGFWs). PAN-OS natively classifies all traffic, inclusive of applications, threats, and content, and then ties that traffi...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-3200-series
2
Strata by Palo Alto Networks | PA-3200 Series | Datasheet 3 • Prevents corporate credentials from leaking to third-party websites and prevents reuse of stolen credentials by enabling multifactor authentication (MFA) at the network layer for any application without any application changes. • Provides dynamic security ...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-3200-series
3
Strata by Palo Alto Networks | PA-3200 Series | Datasheet 4 Services include: • Advanced Threat Prevention: Stop known and unknown exploits and command-and-control (C2) attacks with inline AI-powered detections, stopping 60% more zero-day injection attacks and 48% more highly evasive command-and-control traffic than ...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-3200-series
4
Strata by Palo Alto Networks | PA-3200 Series | Datasheet 5 Table 1: PA-3200 Series Performance and Capacities PA-3220 PA-3250 PA-3260 Firewall throughput (appmix)* 4 Gbps 5 Gbps 7.5 Gbps Threat Prevention throughput (appmix)† 2.2 Gbps 2.5 Gbps 4 Gbps IPsec VPN throughput‡ 2.4 Gbps 2.6 Gbps 4.4 Gbps Max concurrent sess...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-3200-series
5
Strata by Palo Alto Networks | PA-3200 Series | Datasheet 6 Table 2: PA-3200 Series Networking Features (continued) Network Address Translation NAT modes (IPv4): static IP, Dynamic IP, Dynamic IP and Port (port address translation) NAT64, NPTv6 Additional NAT features: Dynamic IP reservation, tunable Dynamic IP and Por...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-3200-series
6
3000 Tannery Way Santa Clara, CA 95054 Main: +1.408.753.4000 Sales: +1.866.320.4788 Support: +1.866.898.9087 www.paloaltonetworks.com © 2024 Palo Alto Networks, Inc. A list of our trademarks in the United States and other jurisdictions can be found at https://www.paloaltonetworks.com/company/trademarks.html. All othe...
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-3200-series
0
Key VM-Series next-generation firewall features: The Palo Alto Networks™ VM-Series extends secure application enablement into virtualized environments while addressing key virtualization security challenges: tracking security policies to virtual machine movement with dynamic address objects and integration with o...
https://media.paloaltonetworks.com/documents/specsheet-vm-series-specsheet.pdf
1
INTERFACE MODES • L2, L3, Tap, Virtual wire (transparent mode) ROUTING • Modes: OSPF, RIP, BGP, Static • Forwarding table size (entries per device/per VR): 5000/5000 (VM-300), 1,250/1,250 (VM-200), 1000/1000 (VM-100) • Policy-based forwarding • Multicast: PIM-SM, PIM-SSM, IGMP v1, v2, and v3 HIGH AVAILABILITY • Mod...
https://media.paloaltonetworks.com/documents/specsheet-vm-series-specsheet.pdf
2
3300 Olcott Street Santa Clara, CA 95054 Main: +1.408.573.4000 Sales: +1.866.320.4788 Support: +1.866.898.9087 www.paloaltonetworks.com Copyright ©2012, Palo Alto Networks, Inc. All rights reserved. Palo Alto Networks, the Palo Alto Networks Logo, PAN-OS, App-ID and Panorama are trademarks of Palo Alto Networks, Inc...
https://media.paloaltonetworks.com/documents/specsheet-vm-series-specsheet.pdf
0
null
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
1
Cisco Press 800 East 96th Street Indianapolis, IN 46240 Cisco ASA All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Jazib Frahim, CCIE No. 5459 Omar Santos Andrew Ossipov, CCIE No. 18483
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
2
Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Jazib Frahim, Omar Santos, Andrew Ossipov Copyright © 2014 Pearson Education, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted i...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
3
Feedback Information At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book is crafted with care and precision, undergoing rigorous development that involves the unique expertise of members from the professional technical community. Readers’ feedback is a natural co...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
4
iv Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition About the Authors Jazib Frahim, CCIE No. 5459, is a Principal Engineer in the Global Security Services Practice at Cisco. He has been with Cisco for over 15 years, with a focus on cyber-secu￾rity and emerging security technologies....
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
5
v ■ Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting ■ End-to-End Network Security: Defense-in-Depth Andrew Ossipov, CCIE No. 18483 and CISSP No. 344324, is currently a Technical Marketing Engineer at Cisco with primary concentration on firewall, intrusion preven￾tion, and other Cisco Da...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
6
vi Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Dedications Jazib Frahim: I would like to dedicate this book to my lovely wife, Sadaf, and my two lovely and ador￾able children, Zayan and Zeenia, who have patiently put up with me during the writing process. I would also like to ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
7
vii Acknowledgments We would like to thank the technical editors, Magnus Mortensen and Phillip Strelau, for their time and technical expertise. They verified our work and corrected us in all the major and minor mistakes that were hard to find. We would like to thank the Cisco Press team, especially Brett Bartow, Mari...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
8
viii Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Contents at a Glance Introduction Chapter 1 Introduction to Security Technologies 1 Chapter 2 Cisco ASA Product and Solution Overview 29 Chapter 3 Licensing 59 Chapter 4 Initial Setup 81 Chapter 5 System Maintenance 119 Chapter 6...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
9
ix Contents Introduction Chapter 1 Introduction to Security Technologies 1 Firewalls 2 Network Firewalls 2 Packet-Filtering Techniques 2 Application Proxies 3 Network Address Translation 3 Stateful Inspection Firewalls 6 Demilitarized Zones (DMZ) 7 Deep Packet Inspection 8 Next-Generation Context-Aware Firewalls 8 Per...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
10
x Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Cisco ASA 5585-X Models 47 Cisco Catalyst 6500 Series ASA Services Module 51 Cisco ASA 1000V Cloud Firewall 52 Cisco ASA Next-Generation Firewall Services (Formerly Cisco ASA CX) 53 Cisco ASA AIP-SSM Module 53 Cisco ASA AIP-SSM-10 54...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
11
xi Initial Setup 90 Initial Setup via CLI 90 Initial Setup of ASDM 92 Uploading ASDM 92 Setting Up the Appliance 93 Accessing ASDM 94 Functional Screens of ASDM 97 Device Setup 100 Setting Up a Device Name and Passwords 100 Configuring an Interface 102 Configuring a Data-Passing Interface 102 Configuring a Subinterface...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
12
xii Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Logging Types 149 Defining a Syslog Server 153 Defining an Email Server 154 Storing Logs Internally and Externally 154 Syslog Message ID Tuning 156 NetFlow Secure Event Logging (NSEL) 156 Step 1: Define a NetFlow Collector 157 Step...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
13
xiii Authenticating SSH Connections 206 Authenticating Serial Console Connections 207 Authenticating Cisco ASDM Connections 208 Authenticating Firewall Sessions (Cut-Through Proxy Feature) 209 Authentication Timeouts 214 Customizing Authentication Prompts 214 Configuring Authorization 215 Command Authorization 217 Conf...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
14
xiv Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Chapter 9 Implementing Next-Generation Firewall Services with ASA CX 267 CX Integration Overview 268 Logical Architecture 269 Hardware Modules 270 Software Modules 271 High Availability 272 ASA CX Architecture 273 Data Plane 274 Ev...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
15
xv Configuring Directory Servers 310 Connecting to AD Agent or CDA 312 Tuning Authentication Settings 313 Defining User Identity Discovery Policy 314 Enabling TLS Decryption 316 Configuring Decryption Settings 318 Defining a Decryption Policy 320 Enabling NG IPS 323 Defining Context-Aware Access Policies 324 Configurin...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
16
xvi Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Integrating ACLs and NAT 359 Pre-8.3 Behavior for NAT and ACL Integration 359 Behavior of NAT and ACL Integration in Version 8.3 and Later 361 Configuration Use Cases 362 Use Case 1: Dynamic PAT for Inside Network with Static NAT f...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
17
xvii Scenario 2: RIP Authentication Mismatch 411 Scenario 3: Multicast or Broadcast Packets Blocked 411 OSPF 412 Configuring OSPF 413 Enabling OSPF 414 OSPF Virtual Links 419 Configuring OSPF Authentication 422 Configuring OSPF Redistribution 426 Stub Areas and NSSAs 428 OSPF Type 3 LSA Filtering 429 OSPF neighbor Comm...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
18
xviii Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition General Packet Radio Service Tunneling Protocol 486 GTPv0 487 GTPv1 489 Configuring GTP Inspection 490 H.323 492 H.323 Protocol Suite 493 H.323 Version Compatibility 495 Enabling H.323 Inspection 496 Direct Call Signaling and Gat...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
19
xix WAAS 528 XDMCP 529 Chapter 14 Virtualization 531 Architectural Overview 533 System Execution Space 533 Admin Context 535 User Context 535 Packet Classification 538 Packet Classification Criteria 538 Destination IP Address 539 Unique MAC Address 540 Packet Flow in Multiple Mode 541 Forwarding Without a Shared Interf...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
20
xx Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Chapter 15 Transparent Firewalls 591 Architectural Overview 594 Single-Mode Transparent Firewalls 594 Packet Flow in an SMTF 595 Multimode Transparent Firewalls 597 Packet Flow in an MMTF 597 Restrictions When Using Transparent Fire...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
21
xxi Configuring Static Routes with an SLA Monitor 647 Floating Connection Timeout 649 Sample Backup ISP Deployment 649 Failover 652 Unit Roles and Functions in Failover 652 Stateful Failover 653 Active/Standby and Active/Active Failover 654 Failover Hardware and Software Requirements 656 Zero Downtime Upgrade in Failov...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
22
xxii Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Centralized Features 701 Scaling Factors 701 Packet Flow 702 TCP Connection Processing 702 UDP Connection Processing 703 Centralized Connection Processing 705 State Transition 705 Configuring Clustering 706 Setting Interface Mode ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
23
xxiii Remote Blocking 758 Anomaly Detection 763 Global Correlation 766 Maintaining ASA IPS 768 User Account Administration 769 Administrator Account 769 Operator Account 769 Viewer Account 769 Service Account 770 Adding, Changing, and Deleting Users 770 Displaying CIPS Software and Process Information 771 Upgrading CIP...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
24
xxiv Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Chapter 19 Site-to-Site IPsec VPNs 801 Preconfiguration Checklist 802 Configuration Steps 805 Step 1: Enable ISAKMP 806 Step 2: Create the ISAKMP Policy 807 Step 3: Set Up the Tunnel Groups 808 Step 4: Define the IPsec Policy 810 ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
25
xxv Manually Configuring IPsec (IKEv1) VPN Using ASDM and CLI 871 Configuring Group Policies 875 Configuring a Tunnel Group 876 IPsec (IKEv2) Remote-Access Configuration Steps 889 Step 1: Introduction 889 Step 2: Connection Profile Identification 890 Step 3: VPN Protocols 890 Step 4: Client Images 893 Step 5: Specify U...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
26
xxvi Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Step 8: Select the IPsec Settings (Optional) 915 Step 9: Verify the Configuration 915 Windows L2TP over IPsec Client Configuration 915 Deployment Scenarios 916 Load Balancing of Cisco IPsec Clients and Site-to-Site Integration 916...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
27
xxvii Chapter 22 Clientless Remote-Access SSL VPNs 979 SSL VPN Design Considerations 980 User Connectivity 981 ASA Feature Set 981 Infrastructure Planning 981 Implementation Scope 981 SSL VPN Prerequisites 982 SSL VPN Licenses 983 AnyConnect Premium 984 AnyConnect Essentials 984 AnyConnect Mobile 984 Shared Premium Lic...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
28
xxviii Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Configure Port Forwarding 1035 Configure Smart Tunnels 1037 Configure Client-Server Plug-ins 1040 Cisco Secure Desktop 1041 CSD Components 1043 Secure Desktop Manager 1043 Secure Desktop 1043 Cache Cleaner 1043 CSD Requirements ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
29
xxix Troubleshooting Clientless Issues 1081 Troubleshooting CSD 1083 Troubleshooting DAP 1083 Chapter 23 Client-Based Remote-Access SSL VPNs 1085 SSL VPN Deployment Considerations 1086 Cisco AnyConnect Secure Mobility Client Licenses 1086 Cisco ASA Design Considerations 1086 ASA Feature Set 1086 Infrastructure Planning...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf