- 249
- 272 199
Technical Security
India
Приєднався 27 жов 2018
15 Device Groups, Templates, and Security Zones
#firewall #paloalto #paloaltofirewall #paloaltonetworks
Переглядів: 38
Відео
12 Push Template Stacks to Devices
Переглядів 15Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
13 Overriding Template Settings on Firewalls
Переглядів 19Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
14 Adding Device Groups
Переглядів 18Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
19 Changing Inherited Object Values
Переглядів 11Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
20 Managing Device Groups
Переглядів 4Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
21 Moving an Object to Another Device Group
Переглядів 3Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
22 Viewing Inherited Rules
Переглядів 5Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
23 Creating a Policy Rule
Переглядів 2Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
24 Verify Rulebase on Firewalls with Preview Rules
Переглядів 5Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
27 Log Forwarding Profile Panorama Only Example
Переглядів 8Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
28 Log Forwarding Profile Syslog and SNMP Example
Переглядів 10Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
29 Log Forwarding Profile Traffic Log Example
Переглядів 13Місяць тому
#firewall #paloalto #paloaltofirewall #paloaltonetworks
31 Defining Log Forwarding Profiles for Panorama
Переглядів 33Місяць тому
31 Defining Log Forwarding Profiles for Panorama
33 Creating an Authentication Profile for LDAP
Переглядів 8Місяць тому
33 Creating an Authentication Profile for LDAP
34 Creating an External Server Profile RADIUS
Переглядів 10Місяць тому
34 Creating an External Server Profile RADIUS
35 Creating an Authentication Profile for RADIUS
Переглядів 7Місяць тому
35 Creating an Authentication Profile for RADIUS
37 Admin Roles Device Group and Template
Переглядів 6Місяць тому
37 Admin Roles Device Group and Template
39 Config Locks and Multiple Administrators
Переглядів 27Місяць тому
39 Config Locks and Multiple Administrators
40 Customize Log File Views in Panorama
Переглядів 15Місяць тому
40 Customize Log File Views in Panorama
Thanks man, it helped a lot. I liked it and subscribed
File "/home/kali/Downloads/keepnote-0.7.8/bin/keepnote", line 380 print "available commands:" ^^^^^^^^^^^^^^^^^^^^^^^^^^^ SyntaxError: Missing parentheses in call to 'print'. Did you mean print(...)? I have this issue in the last prompt
obrigado, ajudou
Now Hasmob has newer password lists :) 1. Put it behind an Overlay VPN like Netbird (Better use it with MFA) 2. Or at least a traditional VPN (Better use it with MFA) 3. Change the port (this only delays the attacker) 4. Limit source IP to a single IP, range, ISP, or geo-block 5. Use fail2ban to block bad IPs 6. Use strong passwords and unique usernames or disable password authentication 7. Disable root login from SSH 8. Actively monitor the network for suspicious activity. Any other solution to secure SSH? It's best to do - Zero Trust Network Access and Principle of Least Privilege
useless
how can i contact with u bro , i wanna make some network with u .
thank you
Imagine the case, production links are going down but lab is still up. It won't failover but for productive reasons it should, right? So better delete the Link Group Lab and all should be fine.
melhor video aula vls
Is this algorithm confusion attack ??
Can't see CIDR block format, why need to hide, just use fake.
Not working bhai
Try again. If require, watch again
Policy Types (F5 BIG-IP ASM/AWAF): - Automatically (Fundamental, Enhanced, Comprehensive) - Manually (Rapid Deployment) - API Security (XML,JSON,...) - Default Templates - Vulnerability Assessment Tools (3rd Party Company) - Passive (Traffic Mirroring)
What does this show ? Is that token comming from redacted website ? Or reading from client web browser ? I can't understand
For those asking about cabling, there are some considerations First, there are some firewalls with dedicated HA1 and HA2 ports and they are labeled. Those have no further mistery, you just connect HA1 of FW1 to HA1 of FW2 and HA2 of FW1 to HA2 of FW2. For firewalls that have no dedicated HA ports, the best practice is to use the Management ports as HA1 (control) link. - The two main ways of doing this are 1. Directly connecting the Management interfaces of both NGFWs. Connecting MGMT of FW1 to MGMT of FW2 and set them both as HA1. 2. Connecting both Magament interfaces to a switch and still set them both as HA1. - Way 1. is simpler and may be better for smaller networks. Its greatest disadvantage is that you can no longer access the out of band Management port, you'd have to assign an in-band data interface as a Management one (ideally putting it in your separate administration network with its dedicated VLAN, etc...) Way 2. is the best for bigger, more complex networks. The only disadvantage it has is that the switch working as an intermediary for both Management/HA1 ports is a new point of failure. Ergo, if the switch fails, the HA fails. But this method allows you to still access the Management interfaces for management purposes as they keep the HA1 communication at the same time as you access them, they even use separate IPs for each task, its pretty much as if you had created a management subinterface for HA1. If concerned about traffic spoofing, you can enable encryption for the HA1 (control link) connection. - For HA2, in any of those 2 cases you just assign an in-band data port as HA type and set it up as HA2 in Device --> HA --> HA communications - Still, in my experience, the best thing to do is to just set up 2 data ports as HA type and use one for HA1 and the other for HA2, but I am not a Best Practice Expert, just a silly little dude.
From VietNam. Thankss
When in HA mode, your eth 1/1 or eth 1/2 will have same IP on both firewalls!
/30 ip range one side .1 another .2
Does the IPs listed in Peer HA1 matter if they are publicly routable If the pair are directly connected?
Audio No..
What next?
What about cabling...
@animal9470 There are some considerations. First, there are some Palo Alto NGFWs with dedicated HA1 and HA2 ports and they are labeled. Those have no further mistery, you just connect HA1 of FW1 to HA1 of FW2 and HA2 of FW1 to HA2 of FW2. For firewalls that have no dedicated HA ports, the best practice is to use the Management ports as HA1 (control) link. - The two main ways of doing this are 1. Directly connecting the Management interfaces of both NGFWs. Connecting MGMT of FW1 to MGMT of FW2 and set them both as HA1. 2. Connecting both Magament interfaces to a switch and still set them both as HA1. - Way 1. is simpler and may be better for smaller networks. Its greatest disadvantage is that you can no longer access the out of band Management port, you'd have to assign an in-band data interface as a Management one (ideally putting it in your separate administration network with its dedicated VLAN, etc...) Way 2. is the best for bigger, more complex networks. The only disadvantage it has is that the switch working as an intermediary for both Management/HA1 ports is a new point of failure. Ergo, if the switch fails, the HA fails. But this method allows you to still access the Management interfaces for management purposes as they keep the HA1 communication at the same time as you access them, they even use separate IPs for each task, its pretty much as if you had created a management subinterface for HA1. If concerned about traffic spoofing, you can enable encryption for the HA1 (control link) connection. - For HA2, in any of those 2 cases you just assign an in-band data port as HA type and set it up as HA2 in Device --> HA --> HA communications
not working
when clicking it wont download the certificate. why??
command not found gtk-recordmydesktop
did u do the first command? sudo apt-get install gtk-recordmydesktop actually its not working for me did u skip this step? or i am theonly one facing the issue 👀
@@maheshwaranup5695 not working directly its has to update resporitories after it done now i have to know configuration not working this command
sudo apt install recordmydesktop This will do
@@hamamunashe still not workin'😔
@@Aazib_x25 PICNIC: problem in chair, not in computer
Some audio and better resolution would be great.
How should the interfaces be cabled up? Should they connect to each other directly or via switches?
Can be connected directly between the two firewalls
Yes they can be connected directly to each other
Wow! Your explanation is so clean and understandable! Thank you!
Awesome video with all relevant details!
the most stupid application ever doesn't even work
how this attack could be used/escalated? is this considered self-xss?
Hello. Sir can this tools solve hash seed? To find hash coefficient?
Great and clear description. I hope you produce more tutorial videos. Thank you.
nice audio....
🤣
After a little digging into the source code of sqlmap on github, i found that there is a "bias" towards the input file being a raw dump of a http request intercepted by burpsuite or webscarab. Any other file (manually copy-pasted for instance from a web browser's http traffic as seen in the debug console) is somehow not ok.
kali㉿kali)-[~/Downloads] └─$ keepnote-0.7.8/bin/keepnote File "/home/kali/Downloads/keepnote-0.7.8/bin/keepnote", line 380 print "available commands:" ^^^^^^^^^^^^^^^^^^^^^^^^^^^ SyntaxError: Missing parentheses in call to 'print'. Did you mean print(...)?
what is -y
Its just the Yes command for installing software.
Do you provide training and assistance
Next video please 🙏
There's no audio.
We picked the same background music "Late Night Drive" for our videos. 😂
It helps a Lot ❤️
Absolutely life saver. thanks
Glad it helped!
Please make beginner to advance level practical live website hacking, live website bug hunting, live website penetration testing, live website exploitation content video series... 🙏 😊 💯✌❤💚💙💜😍😘🤝
ua-cam.com/video/XCq2Mfv60UA/v-deo.html
Except you got a signature from somewhere I didn't know about if not it's not possible. But thank you for showing it
Hi guys the command sudo apt install libjenkins-htmlunit-core-js-java doesn't work anymore!! any suggestions?
the video image is too poor, you need to fix it more
I'm a new student trying to learn, so I can become a programmer with python and I have a project on how to make a port scan. So far I already make a port scan with Python3, and it scans fine, give a date and everything working good so far. I see on your video tutorial, it is very good. I would like to ask for your advice if you can and guide me on how I will add this 3 in a Python script, I have: I only have problems with this 2 3. If the Ports is open, it should create a file and add an entry for port number 4. In case of any exception for instance “host is not available”, “host name could not be resolved” or due to any other error, you need to write that exception into the same file. Thank you and Merry Christmas.
ok
🤣
@@ab1577 ok
🤣
@@ruxzy.7190 ok
🤣
absolutely clueless.....do you even know what you're doing. came here for help ended up being more messed up -_-