index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
46 | PAN OS 11.1 Security Target Palo Alto Networks
Page 47
FCS_TLSS_EXT.1.4 The TSF shall support [session resumption based on session tickets according to RFC
5077 (TLS 1.2), session resumption according to RFC 8446 (TLS 1.3)].
FCS_TLSS_EXT.1.5 The TSF [provides] the ability to configure the list of supported ciphersuit... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
47 | PAN OS 11.1 Security Target Palo Alto Networks
Page 48
o length of time, where the time values can be configured within [1
to 8760] hours;
]].
FCS_IPSEC_EXT.1.9 The TSF shall generate the secret value x used in the IKE Diffie-Hellman key
exchange (“x” in gx mod p) using the random bit generator specified in
FCS_RBG_... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
48 | PAN OS 11.1 Security Target Palo Alto Networks
Page 49
5.2.4 Identification and Authentication (FIA)
FIA_AFL.1 – Authentication Failure Management
FIA_AFL.1.1 The TSF shall detect when an Administrator configurable positive integer within [1-10]
unsuccessful authentication attempts occur related to Administrators atte... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
49 | PAN OS 11.1 Security Target Palo Alto Networks
Page 50
● The TSF shall validate the extendedKeyUsage field according to the following
rules:
o Certificates used for trusted updates and executable code integrity
verification shall have the Code Signing purpose (id-kp 3 with OID
1.3.6.1.5.5.7.3.3) in the extendedKeyUs... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
50 | PAN OS 11.1 Security Target Palo Alto Networks
Page 51
5.2.5 Security Management (FMT)
FMT_MOF.1/ManualUpdate – Management of Security Functions Behaviour
FMT_MOF.1.1/ManualUpdate The TSF shall restrict the ability to enable the functions to perform manual
updates to Security Administrators.
FMT_MOF.1/Services – Manag... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
51 | PAN OS 11.1 Security Target Palo Alto Networks
Page 52
o Ability to manage the trusted public keys database;
o Ability to configure the authentication failure parameters for FIA_AFL.1
].
FMT_SMF.1/FFW – Specification of Management Functions
FMT_SMF.1.1/FFW The TSF shall be capable of performing the following management... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
52 | PAN OS 11.1 Security Target Palo Alto Networks
Page 53
5.2.6 Protection of the TSF (FPT)
FPT_SKP_EXT.1 – Protection of TSF data (for reading of all symmetric keys)
FPT_SKP_EXT.1.1 The TSF shall prevent reading of all pre-shared keys, symmetric keys, and private
keys.
FPT_APW_EXT.1 – Protection of Administrator Passwor... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
53 | PAN OS 11.1 Security Target Palo Alto Networks
Page 54
● DRBG SP800-90A Known Answer Tests
● SP 800-90A Section 11.3 Health Tests
● DH Known Answer Test
● ECDH Known Answer Test
● SP 800-135 KDF Known Answer Tests
].
to demonstrate the correct operation of the TSF: noise source health tests.
Application Note: Modified... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
54 | PAN OS 11.1 Security Target Palo Alto Networks
Page 55
5.2.8 Trusted Path/Channels (FTP)
FTP_ITC.1 – Inter-TSF Trusted Channel
FTP_ITC.1.1 The TSF shall be capable of using [TLS]to provide a trusted communication channel between
itself and another trusted IT product authorized IT entities supporting the following
cap... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
55 | PAN OS 11.1 Security Target Palo Alto Networks
Page 56
5.2.9 Firewall (FFW)
FFW_RUL_EXT.1 – Stateful Traffic Filtering
FFW_RUL_EXT.1.1 The TSF shall perform stateful traffic filtering on network packets processed by the
TOE.
FFW_RUL_EXT.1.2 The TSF shall allow the definition of stateful traffic filtering rules using t... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
56 | PAN OS 11.1 Security Target Palo Alto Networks
Page 57
b) Remove existing traffic flows from the set of established traffic flows based on the
following: [session inactivity timeout, completion of the expected information flow].
FFW_RUL_EXT.1.6 The TSF shall enforce the following default stateful traffic filtering rul... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
57 | PAN OS 11.1 Security Target Palo Alto Networks
Page 58
a) The TSF shall drop and be capable of logging network packets where the source
address of the network packet is equal to the address of the network interface where
the network packet was received;
b) The TSF shall drop and be capable of logging network packets ... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
58 | PAN OS 11.1 Security Target Palo Alto Networks
Page 59
5.2.10 Packet Filtering (FPF)
FPF_RUL_EXT.1 – Rules for Packet Filtering
FPF_RUL_EXT.1.1 The TSF shall perform packet filtering on network packets processed by the TOE.
FPF_RUL_EXT.1.2 The TSF shall allow the definition of Packet Filtering rules using the following... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
59 | PAN OS 11.1 Security Target Palo Alto Networks
Page 60
5.2.11 Intrusion Prevention (IPS)
IPS_ABD_EXT.1 – Anomaly-Based IPS Functionality
IPS_ABD_EXT.1.1 The TSF shall support the definition of [baselines (‘expected and approved’)]
including the specification of [
● frequency]
and the following network protocol fields... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
60 | PAN OS 11.1 Security Target Palo Alto Networks
Page 61
IPS_NTA_EXT.1.3 The TSF shall allow the signatures to be assigned to sensor interfaces configured
for promiscuous mode, and to interfaces configured for inline mode, and support
designation of one or more interfaces as ‘management’ for communication
between the ... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
61 | PAN OS 11.1 Security Target Palo Alto Networks
Page 62
● [no other packet payload inspection]
IPS_SBD_EXT.1.3 The TSF shall be able to detect the following header-based signatures (using fields
identified in IPS_SBD_EXT.1.1) at IPS sensor interfaces: [
a) IP Attacks
i. IP Fragments Overlap (Teardrop attack, Bonk attac... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
62 | PAN OS 11.1 Security Target Palo Alto Networks
Page 63 | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
63 | PAN OS 11.1 Security Target Palo Alto Networks
Page 64
5.3 TOE Security Assurance Requirements
The security assurance requirements for the TOE are included by reference to [NDcPP], [FW-Module],
[VPNGW-Module], and [IPS-Module].
Table 7 Assurance Components
Requirement Class Requirement Component
ADV: Development ADV_... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
64 | PAN OS 11.1 Security Target Palo Alto Networks
Page 65
6. TOE Summary Specification
This chapter describes the security functions:
● Security Audit
● Cryptographic Support
● User Data Protection
● Identification and Authentication
● Security Management
● Protection of the TSF
● TOE Access
● Trusted Path/Channels
● Sta... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
65 | PAN OS 11.1 Security Target Palo Alto Networks
Page 66
reaches the maximum size, the TOE starts overwriting the oldest log entries with the new
log entries. Maximum disk space is platform dependent, and it depends on the hard disk
drive installed on the system. By default, the TOE allocates 1-5% to system log, 1-5% t... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
66 | PAN OS 11.1 Security Target Palo Alto Networks
Page 67
ECDSA based key
establishment (NIST P-256, P384, P-521)
NIST SP 800-56A Appliances
(#A3453):
ECC
FFC
VMs (#A3454):
ECC
FFC
Key establishment scheme
using Diffie-Hellman groups
that meet the following: RFC
3526 and SP 800-56Ar3
(2048-bit MODP, 3072-bit
MOD... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
67 | PAN OS 11.1 Security Target Palo Alto Networks
Page 68
● HMAC-SHA-1 (block
size 512 bits, key size
160 bits and digest
size 160 bits)
● HMAC-SHA-256
(block size 512 bits,
key size 256 bits and
digest size 256 bits)
● HMAC-SHA-384
(block size 1024 bits,
key size 384 bits and
digest size 384 bits)
● HMAC-SHA-512... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
68 | PAN OS 11.1 Security Target Palo Alto Networks
Page 69
B.4.1 should Yes N/A
B.4.2 should Yes N/A
The TOE performs cryptographic key establishment in accordance with NIST Special
Publication 800-56A for elliptic curve-based key establishment5
schemes, and NIST
Special Publication 800-56A for finite field-based key est... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
69 | PAN OS 11.1 Security Target Palo Alto Networks
Page 70
4
TLS DHE/ECDHE
Private
Components
DH Diffie-Hellman private FFC or EC
component used in TLS
(DHE 2048, ECDHE P-256, P-384,
P-521)
5
TLS HMAC Keys HMAC TLS integrity and authentication
session keys (HMAC-SHA2-256,
HMAC-SHA2-384)
6
TLS Encryption
Keys
A... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
70 | PAN OS 11.1 Security Target Palo Alto Networks
Page 71
16
Firmware Content
Encryption Key
AES-256 Used to encrypt/decrypt
firmware, software, and sensitive
content.
17
Password Passwor
d
Authentication string with a
minimum length of 8 characters.
Stored hashed with SHA-256 and
nonce.
18
DRBG Seed /State DR... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
71 | PAN OS 11.1 Security Target Palo Alto Networks
Page 72
format provided in section 4 of RFC 5077. Fallback password-based authentication is
not supported for this interface.
The TOE denies connections from clients requesting connections using SSL 2.0, SSL 3.0,
TLS 1.0, or TLS 1.1 and shall not establish a trusted cha... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
72 | PAN OS 11.1 Security Target Palo Alto Networks
Page 73
● TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 as defined in RFC
5289
● TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 as defined in RFC
5289
● TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as defined in RFC 5289
● TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 as defined in RFC 5289
● T... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
73 | PAN OS 11.1 Security Target Palo Alto Networks
Page 74
diffie-hellman-group-1 are all disabled when FIPS-CC mode is enabled. Only the
Approved encryption and integrity algorithms along with key exchange algorithms ecdhsha2-nistp256, ecdh-sha2-nistp384, and ecdh-sha2-nistp521 (based on elliptic curve
from FCS_CKM.2) ... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
74 | PAN OS 11.1 Security Target Palo Alto Networks
Page 75
source or destination IP addresses and ports are converted between public and private
addresses and ports. For example, private source addresses can be translated to public
addresses on traffic sent from an internal (trusted) zone to a public (untrusted) zone.
N... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
75 | PAN OS 11.1 Security Target Palo Alto Networks
Page 76
6.3 User Data Protection
FDP_RIP.2 The TOE allocates and releases (i.e., deallocates) the memory resources used for
network packet objects. When it receives new data from the network and allocates
new buffer resources to store and transmit data to the network, i... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
76 | PAN OS 11.1 Security Target Palo Alto Networks
Page 77
characters. For example, if the administrator configures the minimum password length
as 15, users can only create passwords from length of 15 to 63.
FIA_AFL.1 The TOE logs all unsuccessful authentication attempts in the System Log and tracks
the number of failed ... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
77 | PAN OS 11.1 Security Target Palo Alto Networks
Page 78
decides to use it. The TOE uses a hard coded 1 hour as next update time (cached time)
in this case. Caching only applies to validated certificates; if a TOE never validated a
certificate, the TOE cache does not store the OCSP information for the issuing CA. To
u... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
78 | PAN OS 11.1 Security Target Palo Alto Networks
Page 79
FMT_SMF.1
FMT_SMF.1/FFW
FMT_SMF.1/VPN
FMT_SMF.1/IPS
The security management functions provided by the TOE include, but are not
limited to:
● Ability to administer the TOE remotely;
● Ability to configure the access banner;
● Ability to configure the session inacti... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
79 | PAN OS 11.1 Security Target Palo Alto Networks
Page 80
o Source IP addresses (host address and network address)
o Destination IP addresses (host address and network address)
o Source port (TCP and UDP)
o Destination port (TCP and UDP)
o Protocol (IPv4 and IPv6)
o ICMP Type and Code
● Update (import) signatures;
● Creat... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
80 | PAN OS 11.1 Security Target Palo Alto Networks
Page 81
Certificate. By default, all the private keys are protected since they are always stored in
encrypted format using AES-256. The TOE prevents the reading of all keys by
encrypting them with a Master Key using AES-256. The TOE does not provide an
interface to read... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
81 | PAN OS 11.1 Security Target Palo Alto Networks
Page 82
and enter maintenance mode (i.e., error state) in which the reason for the failure can be
determined. In the maintenance mode, all operational and network functions will be
unavailable with one exception which is the Reboot operation.
These self-tests are suffic... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
82 | PAN OS 11.1 Security Target Palo Alto Networks
Page 83
FTA_SSL.3 The TOE subsequently will enforce an administrator-defined inactivity timeout value
after which the remote session will be terminated regardless of authentication methods
(e.g., password, public-key, X.509v3 certificate). The TOE can be configured by an... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
83 | PAN OS 11.1 Security Target Palo Alto Networks
Page 84
● Internet Control Message Protocol version 4 (ICMPv4)
● Internet Control Message Protocol version 6 (ICMPv6)
● Internet Protocol version 4 (IPv4)
● Internet Protocol version 6 (IPv6)
o IPv6 Extension header type (Next Header, Hdr Ext Len, Header Specific
Data, Op... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
84 | PAN OS 11.1 Security Target Palo Alto Networks
Page 85
o identity of destination subject—destination address information within
the packet
o transport layer protocol (e.g., TCP, UDP)
o Internet layer protocol (e.g., ICMP type, code)
o source subject service identifier (e.g., source port number)
o destination subject s... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
85 | PAN OS 11.1 Security Target Palo Alto Networks
Page 86
o Log Setting—generate log entries in the local traffic log
o Schedule—limits the days and times when the rule is in effect (e.g., an
‘allow’ rule might be active only during normal business hours)
o QoS Marking—change the Quality of Service (QoS) marking on packe... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
86 | PAN OS 11.1 Security Target Palo Alto Networks
Page 87
FTP traffic, and can log FTP session starts, FTP session ends, or both. It does not log
individual FTP command or data packet.
The device provides a setting such that the Security Administrator can enable or disable
ICMP and SNMP for all users.
The TOE rejects re... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
87 | PAN OS 11.1 Security Target Palo Alto Networks
Page 88
there is an initial deny rule for the application service (i.e. service-HTTP, service-https)
matching the traffic with no applications defined.
The TOE performs the following steps when processing traffic:
● The traffic is passed through the Application Identific... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
88 | PAN OS 11.1 Security Target Palo Alto Networks
Page 89
session is deleted. Session removal becomes effective before the next packet that might
match the session is processed.
The PAN-OS performs Strict IP Address check, reject, and is capable of logging network
packets where the source or destination address of the n... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
89 | PAN OS 11.1 Security Target Palo Alto Networks
Page 90
destination IP address, protocol (as specified in RFCs), Next Header, the application, user,
and the service.
All traffic passing through the firewall is matched against a session and each session is
matched against a security policy. When a session match occurs... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
90 | PAN OS 11.1 Security Target Palo Alto Networks
Page 91
source and destination zones. The security zones are tied to any network data interface
(not management interface).
IPS_IPB_EXT.1 The TOE supports security rules based known-good or known-bad list rules mechanism,
or an External Dynamic List (EDL) mechanism. The... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
91 | PAN OS 11.1 Security Target Palo Alto Networks
Page 92
TOE will determine if content inspection will be applied based on the IPS policy
configured per security policy rule with logging options. If content inspection is
configured (per security policy rule) and the TOE is in inline deployment, any match of
the signat... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
92 | PAN OS 11.1 Security Target Palo Alto Networks
Page 93
7. Protection Profile Claims
This ST is conformant to the [CFG_NDcPP-FW-VPNGW_V2.0], [NDcPP], [FW-Module], [VPNGW-Module],
[SSHPKG], and [IPS-Module]. | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
93 | PAN OS 11.1 Security Target Palo Alto Networks
Page 94
8. Rationale
This Security Target includes by reference the [NDcPP], [FW-Module], [VPNGW-Module], [SSHPKG], and
[IPS-Module] applicable Security Problem Definition, Security Objectives, and Security Assurance
Requirements. The Security Target makes no additions t... | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11482-st.pdf |
0 | Strata by Palo Alto Networks | PA-7500 | Datasheet 1
Highlights
• World’s first ML-Powered NGFW
• Eleven-time Leader in the Gartner Magic
Quadrant for Network Firewalls
• Leader in the Forrester Wave: Enterprise
Firewalls, Q4 2022
• Operates on a unified and scalable
architecture
• Extends visibility and security to... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-7500 |
1 | Strata by Palo Alto Networks | PA-7500 | Datasheet 2
The controlling element of the PA-7500 is PAN-OS®, the same software that runs all Palo Alto Networks
NGFWs. PAN-OS natively classifies all traffic, inclusive of applications, threats, and content, and then ties
that traffic to the user regardless of location or de... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-7500 |
2 | Strata by Palo Alto Networks | PA-7500 | Datasheet 3
Prevents Malicious Activity Concealed in Encrypted Traffic
• Inspects and applies policy to SSL/TLS-encrypted traffic, both inbound and outbound, including for
traffic that uses TLS 1.3 and HTTP/2.
• Offers rich visibility into TLS traffic, such as the amount of enc... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-7500 |
3 | Strata by Palo Alto Networks | PA-7500 | Datasheet 4
• DNS Security: Gain 40% more threat coverage and stop 85% of malware that abuses DNS for command and control and data theft without requiring changes to your infrastructure.
• Enterprise DLP: Minimize risk of a data breach, stop out-of-policy data transfers, and en... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-7500 |
4 | 3000 Tannery Way
Santa Clara, CA 95054
Main: +1.408.753.4000
Sales: +1.866.320.4788
Support: +1.866.898.9087
www.paloaltonetworks.com
© 2023 Palo Alto Networks, Inc. Palo Alto Networks and the Palo Alto Networks logo
are registered trademarks of Palo Alto Networks, Inc. A list of our trademarks can be
found at https:... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-7500 |
0 | Strata by Palo Alto Networks | PA-1400 Series | Datasheet 1
Highlights
• World’s first ML-Powered NGFW
• Eleven-time Leader in the Gartner Magic
Quadrant for Network Firewalls
• Leader in the Forrester Wave: Enterprise
Firewalls, Q4 2022
• Delivers predictable performance with
security services
• Simplifies deplo... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-1400-series |
1 | Strata by Palo Alto Networks | PA-1400 Series | Datasheet 2
The controlling element of the PA-1400 Series is PAN-OS®, the same software that runs all Palo Alto
Networks NGFWs. PAN-OS natively classifies all traffic, inclusive of applications, threats, and content,
and then ties that traffic to the user regardless of ... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-1400-series |
2 | Strata by Palo Alto Networks | PA-1400 Series | Datasheet 3
• Provides dynamic security actions based on user behavior to restrict suspicious or malicious users.
• Consistently authenticates and authorizes your users, regardless of location and where user identity
stores live, to move quickly toward a Zero Trust secu... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-1400-series |
3 | Strata by Palo Alto Networks | PA-1400 Series | Datasheet 4
• Ability to support explicit proxy through PAC files and also transparent proxy.
• Explicit proxy can help with no-default route architectures with on-premises proxy deployments.
• Explicit proxy supports authentication with Kerberos and SAML.
• Transparent p... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-1400-series |
4 | Strata by Palo Alto Networks | PA-1400 Series | Datasheet 5
*
Firewall throughput is measured with App-ID and logging enabled, using appmix transactions.
† Threat Prevention throughput is measured with App-ID, IPS, antivirus, antispyware, WildFire, DNS Security, file blocking, and logging enabled,
utilizing appmix t... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-1400-series |
5 | Strata by Palo Alto Networks | PA-1400 Series | Datasheet 6
Table 2: PA-1400 Series Networking Features (continued)
VLANs
802.1Q VLAN tags per device/per interface: 4,094/4,094
Aggregate interfaces (802.3ad), LACP
Network Address Translation
NAT modes (IPv4): static IP, Dynamic IP, Dynamic IP and Port (port address tra... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-1400-series |
6 | 3000 Tannery Way
Santa Clara, CA 95054
Main: +1.408.753.4000
Sales: +1.866.320.4788
Support: +1.866.898.9087
www.paloaltonetworks.com
© 2024 Palo Alto Networks, Inc. A list of our trademarks in the United States and other
jurisdictions can be found at https://www.paloaltonetworks.com/company/trademarks.html.
All othe... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-1400-series |
0 | Strata by Palo Alto Networks | PA-3200 Series | Datasheet 1
Highlights
• World’s first ML-Powered NGFW
• Eleven-time Leader in the Gartner Magic
Quadrant for Network Firewalls
• Leader in The Forrester Wave: Enterprise
Firewalls, Q4 2022
• Delivers 5G-Native Security built to
safeguard service provider and enter... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-3200-series |
1 | Strata by Palo Alto Networks | PA-3200 Series | Datasheet 2
The controlling element of the PA-3200 Series is PAN-OS®, the same software that runs all Palo
Alto Networks Next-Generation Firewalls (NGFWs). PAN-OS natively classifies all traffic, inclusive
of applications, threats, and content, and then ties that traffi... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-3200-series |
2 | Strata by Palo Alto Networks | PA-3200 Series | Datasheet 3
• Prevents corporate credentials from leaking to third-party websites and prevents reuse of stolen
credentials by enabling multifactor authentication (MFA) at the network layer for any application
without any application changes.
• Provides dynamic security ... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-3200-series |
3 | Strata by Palo Alto Networks | PA-3200 Series | Datasheet 4
Services include:
• Advanced Threat Prevention: Stop known and unknown exploits and command-and-control
(C2) attacks with inline AI-powered detections, stopping 60% more zero-day injection attacks and
48% more highly evasive command-and-control traffic than ... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-3200-series |
4 | Strata by Palo Alto Networks | PA-3200 Series | Datasheet 5
Table 1: PA-3200 Series Performance and Capacities
PA-3220 PA-3250 PA-3260
Firewall throughput (appmix)* 4 Gbps 5 Gbps 7.5 Gbps
Threat Prevention throughput (appmix)† 2.2 Gbps 2.5 Gbps 4 Gbps
IPsec VPN throughput‡ 2.4 Gbps 2.6 Gbps 4.4 Gbps
Max concurrent sess... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-3200-series |
5 | Strata by Palo Alto Networks | PA-3200 Series | Datasheet 6
Table 2: PA-3200 Series Networking Features (continued)
Network Address Translation
NAT modes (IPv4): static IP, Dynamic IP, Dynamic IP and Port (port address translation)
NAT64, NPTv6
Additional NAT features: Dynamic IP reservation, tunable Dynamic IP and Por... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-3200-series |
6 | 3000 Tannery Way
Santa Clara, CA 95054
Main: +1.408.753.4000
Sales: +1.866.320.4788
Support: +1.866.898.9087
www.paloaltonetworks.com
© 2024 Palo Alto Networks, Inc. A list of our trademarks in the United States and other
jurisdictions can be found at https://www.paloaltonetworks.com/company/trademarks.html.
All othe... | https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/pa-3200-series |
0 | Key VM-Series next-generation
firewall features:
The Palo Alto Networks™ VM-Series extends secure application
enablement into virtualized environments while addressing key
virtualization security challenges: tracking security policies to
virtual machine movement with dynamic address objects and
integration with o... | https://media.paloaltonetworks.com/documents/specsheet-vm-series-specsheet.pdf |
1 | INTERFACE MODES
• L2, L3, Tap, Virtual wire (transparent mode)
ROUTING
• Modes: OSPF, RIP, BGP, Static
• Forwarding table size (entries per device/per VR): 5000/5000
(VM-300), 1,250/1,250 (VM-200), 1000/1000 (VM-100)
• Policy-based forwarding
• Multicast: PIM-SM, PIM-SSM, IGMP v1, v2, and v3
HIGH AVAILABILITY
• Mod... | https://media.paloaltonetworks.com/documents/specsheet-vm-series-specsheet.pdf |
2 | 3300 Olcott Street
Santa Clara, CA 95054
Main: +1.408.573.4000
Sales: +1.866.320.4788
Support: +1.866.898.9087
www.paloaltonetworks.com
Copyright ©2012, Palo Alto Networks, Inc. All rights reserved. Palo Alto Networks,
the Palo Alto Networks Logo, PAN-OS, App-ID and Panorama are trademarks of
Palo Alto Networks, Inc... | https://media.paloaltonetworks.com/documents/specsheet-vm-series-specsheet.pdf |
0 | null | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
1 | Cisco Press
800 East 96th Street
Indianapolis, IN 46240
Cisco ASA
All-in-One Next-Generation Firewall, IPS, and VPN
Services, Third Edition
Jazib Frahim, CCIE No. 5459
Omar Santos
Andrew Ossipov, CCIE No. 18483 | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
2 | Cisco ASA: All-in-One Next-Generation Firewall, IPS,
and VPN Services, Third Edition
Jazib Frahim, Omar Santos, Andrew Ossipov
Copyright © 2014 Pearson Education, Inc.
Published by:
Cisco Press
800 East 96th Street
Indianapolis, IN 46240 USA
All rights reserved. No part of this book may be reproduced or transmitted i... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
3 | Feedback Information
At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each
book is crafted with care and precision, undergoing rigorous development that involves the unique
expertise of members from the professional technical community.
Readers’ feedback is a natural co... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
4 | iv Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
About the Authors
Jazib Frahim, CCIE No. 5459, is a Principal Engineer in the Global Security Services
Practice at Cisco. He has been with Cisco for over 15 years, with a focus on cyber-security and emerging security technologies.... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
5 | v
■ Cisco Network Admission Control, Volume II: NAC Deployment and
Troubleshooting
■ End-to-End Network Security: Defense-in-Depth
Andrew Ossipov, CCIE No. 18483 and CISSP No. 344324, is currently a Technical
Marketing Engineer at Cisco with primary concentration on firewall, intrusion prevention, and other Cisco Da... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
6 | vi Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Dedications
Jazib Frahim:
I would like to dedicate this book to my lovely wife, Sadaf, and my two lovely and adorable children, Zayan and Zeenia, who have patiently put up with me during the writing
process.
I would also like to ... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
7 | vii
Acknowledgments
We would like to thank the technical editors, Magnus Mortensen and Phillip Strelau,
for their time and technical expertise. They verified our work and corrected us in all the
major and minor mistakes that were hard to find.
We would like to thank the Cisco Press team, especially Brett Bartow, Mari... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
8 | viii Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Contents at a Glance
Introduction
Chapter 1 Introduction to Security Technologies 1
Chapter 2 Cisco ASA Product and Solution Overview 29
Chapter 3 Licensing 59
Chapter 4 Initial Setup 81
Chapter 5 System Maintenance 119
Chapter 6... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
9 | ix
Contents
Introduction
Chapter 1 Introduction to Security Technologies 1
Firewalls 2
Network Firewalls 2
Packet-Filtering Techniques 2
Application Proxies 3
Network Address Translation 3
Stateful Inspection Firewalls 6
Demilitarized Zones (DMZ) 7
Deep Packet Inspection 8
Next-Generation Context-Aware Firewalls 8
Per... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
10 | x Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Cisco ASA 5585-X Models 47
Cisco Catalyst 6500 Series ASA Services Module 51
Cisco ASA 1000V Cloud Firewall 52
Cisco ASA Next-Generation Firewall Services (Formerly Cisco ASA CX) 53
Cisco ASA AIP-SSM Module 53
Cisco ASA AIP-SSM-10 54... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
11 | xi
Initial Setup 90
Initial Setup via CLI 90
Initial Setup of ASDM 92
Uploading ASDM 92
Setting Up the Appliance 93
Accessing ASDM 94
Functional Screens of ASDM 97
Device Setup 100
Setting Up a Device Name and Passwords 100
Configuring an Interface 102
Configuring a Data-Passing Interface 102
Configuring a Subinterface... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
12 | xii Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Logging Types 149
Defining a Syslog Server 153
Defining an Email Server 154
Storing Logs Internally and Externally 154
Syslog Message ID Tuning 156
NetFlow Secure Event Logging (NSEL) 156
Step 1: Define a NetFlow Collector 157
Step... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
13 | xiii
Authenticating SSH Connections 206
Authenticating Serial Console Connections 207
Authenticating Cisco ASDM Connections 208
Authenticating Firewall Sessions (Cut-Through Proxy Feature) 209
Authentication Timeouts 214
Customizing Authentication Prompts 214
Configuring Authorization 215
Command Authorization 217
Conf... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
14 | xiv Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Chapter 9 Implementing Next-Generation Firewall Services with ASA CX 267
CX Integration Overview 268
Logical Architecture 269
Hardware Modules 270
Software Modules 271
High Availability 272
ASA CX Architecture 273
Data Plane 274
Ev... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
15 | xv
Configuring Directory Servers 310
Connecting to AD Agent or CDA 312
Tuning Authentication Settings 313
Defining User Identity Discovery Policy 314
Enabling TLS Decryption 316
Configuring Decryption Settings 318
Defining a Decryption Policy 320
Enabling NG IPS 323
Defining Context-Aware Access Policies 324
Configurin... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
16 | xvi Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Integrating ACLs and NAT 359
Pre-8.3 Behavior for NAT and ACL Integration 359
Behavior of NAT and ACL Integration in Version 8.3 and Later 361
Configuration Use Cases 362
Use Case 1: Dynamic PAT for Inside Network with Static NAT f... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
17 | xvii
Scenario 2: RIP Authentication Mismatch 411
Scenario 3: Multicast or Broadcast Packets Blocked 411
OSPF 412
Configuring OSPF 413
Enabling OSPF 414
OSPF Virtual Links 419
Configuring OSPF Authentication 422
Configuring OSPF Redistribution 426
Stub Areas and NSSAs 428
OSPF Type 3 LSA Filtering 429
OSPF neighbor Comm... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
18 | xviii Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
General Packet Radio Service Tunneling Protocol 486
GTPv0 487
GTPv1 489
Configuring GTP Inspection 490
H.323 492
H.323 Protocol Suite 493
H.323 Version Compatibility 495
Enabling H.323 Inspection 496
Direct Call Signaling and Gat... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
19 | xix
WAAS 528
XDMCP 529
Chapter 14 Virtualization 531
Architectural Overview 533
System Execution Space 533
Admin Context 535
User Context 535
Packet Classification 538
Packet Classification Criteria 538
Destination IP Address 539
Unique MAC Address 540
Packet Flow in Multiple Mode 541
Forwarding Without a Shared Interf... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
20 | xx Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Chapter 15 Transparent Firewalls 591
Architectural Overview 594
Single-Mode Transparent Firewalls 594
Packet Flow in an SMTF 595
Multimode Transparent Firewalls 597
Packet Flow in an MMTF 597
Restrictions When Using Transparent Fire... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
21 | xxi
Configuring Static Routes with an SLA Monitor 647
Floating Connection Timeout 649
Sample Backup ISP Deployment 649
Failover 652
Unit Roles and Functions in Failover 652
Stateful Failover 653
Active/Standby and Active/Active Failover 654
Failover Hardware and Software Requirements 656
Zero Downtime Upgrade in Failov... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
22 | xxii Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Centralized Features 701
Scaling Factors 701
Packet Flow 702
TCP Connection Processing 702
UDP Connection Processing 703
Centralized Connection Processing 705
State Transition 705
Configuring Clustering 706
Setting Interface Mode ... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
23 | xxiii
Remote Blocking 758
Anomaly Detection 763
Global Correlation 766
Maintaining ASA IPS 768
User Account Administration 769
Administrator Account 769
Operator Account 769
Viewer Account 769
Service Account 770
Adding, Changing, and Deleting Users 770
Displaying CIPS Software and Process Information 771
Upgrading CIP... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
24 | xxiv Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Chapter 19 Site-to-Site IPsec VPNs 801
Preconfiguration Checklist 802
Configuration Steps 805
Step 1: Enable ISAKMP 806
Step 2: Create the ISAKMP Policy 807
Step 3: Set Up the Tunnel Groups 808
Step 4: Define the IPsec Policy 810
... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
25 | xxv
Manually Configuring IPsec (IKEv1) VPN Using ASDM and CLI 871
Configuring Group Policies 875
Configuring a Tunnel Group 876
IPsec (IKEv2) Remote-Access Configuration Steps 889
Step 1: Introduction 889
Step 2: Connection Profile Identification 890
Step 3: VPN Protocols 890
Step 4: Client Images 893
Step 5: Specify U... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
26 | xxvi Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Step 8: Select the IPsec Settings (Optional) 915
Step 9: Verify the Configuration 915
Windows L2TP over IPsec Client Configuration 915
Deployment Scenarios 916
Load Balancing of Cisco IPsec Clients and Site-to-Site Integration 916... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
27 | xxvii
Chapter 22 Clientless Remote-Access SSL VPNs 979
SSL VPN Design Considerations 980
User Connectivity 981
ASA Feature Set 981
Infrastructure Planning 981
Implementation Scope 981
SSL VPN Prerequisites 982
SSL VPN Licenses 983
AnyConnect Premium 984
AnyConnect Essentials 984
AnyConnect Mobile 984
Shared Premium Lic... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
28 | xxviii Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Configure Port Forwarding 1035
Configure Smart Tunnels 1037
Configure Client-Server Plug-ins 1040
Cisco Secure Desktop 1041
CSD Components 1043
Secure Desktop Manager 1043
Secure Desktop 1043
Cache Cleaner 1043
CSD Requirements ... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
29 | xxix
Troubleshooting Clientless Issues 1081
Troubleshooting CSD 1083
Troubleshooting DAP 1083
Chapter 23 Client-Based Remote-Access SSL VPNs 1085
SSL VPN Deployment Considerations 1086
Cisco AnyConnect Secure Mobility Client Licenses 1086
Cisco ASA Design Considerations 1086
ASA Feature Set 1086
Infrastructure Planning... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.