Introduction Palo Alto GlobalProtect is a network security for endpoints that protects mobile workforce by extending the Next-Generation Security Platform to all users geographically anywhere. GlobalProtect secures traffic by applying security policies with Palo Alto next-generation to the application. GlobalProtect …
Introduction The tremendous technical development in the IT and other digital fields started the popular trend of creating acronyms with the Suffix Ops. And the word DevOps, NetOps, and SecOps are confusing IT and Tech communities further as they are …
Are you buying a new iphone? It’s always exciting to get a new smartphone. Isn’t it? But in all that thrill, we often forget to do the basics. So, if you are also looking for a seamless experience with your …
Introduction to Palo Alto Panorama Panorama is the centralized management server that offers a global visibility and control over the multiple Palo Alto Networks next generation firewalls from web interface console. Panorama manage multiple Palo Alto Networks firewalls all from …
Introduction to MPLS MPLS i.e. Multi Protocol Label Switching (MPLS). It is a technique that is used for the routing of network packets. It is called a Multiprotocol as it supports multiple protocols like Internet Protocol (IP), Asynchronous Transport Mode …
Introduction Palo Alto has been considered one of the most coveted and preferred Next generation Firewall considering its robust performance, deep level of packet inspection and myriad of features required in enterprise and service provider domain. When troubleshooting network and …
High availability (HA) refers to a system or component that is operational without interruption for long periods of time. High availability (HA) is measured as a percentage, with a 100% percent system indicating a service that experiences zero downtime. High …
Introduction to Network Switching Before understanding Message Switching, let’s explore the basic types of switching. Switching is an important mechanism that provides communication between different networks or different computer(s) and manages the data flow between the two end points. There are …
Before digging deep into Palo alto SSL Decryption, let’s first understand what is Decryption? Decryption Palo Alto firewalls can be decrypt and inspect traffic to gain visibility of threats and to control protocols, certificate verification and failure handling. Decryption can …
LOOKING FOR A JOB IN CLOUD COMPUTING? Check out the Top Cloud Computing Certifications Today’s tremendous growth in Information Technology (IT) proves the importance of Cloud Computing. Industrialists say “the cloud computing is in the starting phase and expected to …
Site-to-Site VPN Overview A VPN connection that allows you to connect two Local Area Networks (LANs) securely is called a site-to-site VPN. Route based VPN can be configuring to connect Palo Alto Networks firewalls located at two sites or to …
In this article, we will understand the terminologies related to USER ID and their role w.r.t login monitoring, role discovery and related nuances. USER ID : PALO ALTO NETWORKS User Identification is a very unique feature of Palo Alto firewall …
Below are the key profile types provisioned in Palo Alto Firewall. Lets discus all the profile types one by one – Palo Alto Security Profiles & Security Policies While security policy rules enable to allow or block traffic in network, …
In this article, we will discuss on Packet handling process inside of PAN-OS of Palo Alto firewall. Introduction: Packet Flow in Palo Alto Packet passes through the multiple stages such as ingress and forwarding/egress stages that make packet forwarding decisions on …
In the previous post we discussed the Architecture of Palo alto firewall. Now, we will discuss the NAT configuration and NAT types in Palo alto. Network Address Translation (NAT) allows to translate private, non-routable IP addresses to one or more …
Introduction to Spoofing Today, in the cyber security community “spoofing” is called as any fraudulent or malicious practice in which communication is established from an unknown source, usually disguised as a known source to the receiver. In order to understand …
Network architecture refers to the structured approach of network, security devices and services structured to serve the connectivity needs of client devices, also considering controlled traffic flow and availability of services. Network devices typically include switches, routers and firewalls. Palo …
Hybrid Cloud vs Multi Cloud In recent years, with mushroom growth in Cloud technologies, a change has been observed w.r.t where the application Workload and data is hosted. A large number enterprises have started moving their data, applications and related …
Introduction to Palo Alto Firewall is a network security device that permit or denies network access to traffic flows between an untrusted zone and a trusted zone. Palo Alto Firewall is one of the globally coveted and widely preferred Security …
Any network engineer knows that when it comes to troubleshooting network problems and monitoring network performance, there are a variety of tools to help. Different tools play different parts in the troubleshooting process, so it’s important to understand what they …
Cloud Architect: Skills & Responsibilities With Cloud technologies showcasing a mushroom growth in the IT world and all the types of organizations (whether financial, manufacture or retail etc) moving the workloads to cloud, buffet of new roles and responsibilities have …
Enterprise Architect vs Solution Architect There are some key IT roles in organizations which focus on strategic and technology related aspects across their breadth and depth. Two such technical roles are of Enterprise Architect and Solutions Architect. While the former …
Difference Between MD5 and CRC MD5 and CRC are 2 of most commonly used hashing algorithms, infact while comparing files and including other use cases. In this article. We will understand both the concepts of hashing algorithm and how one …
Blockchain (Bitcoin Cryptocurrency) Technology Blockchain can be understood as “block of chains”, where the records or blocks are linked by cryptography. Each block (record) has a cryptographic hash of previous block (including a timestamp, and transaction data). Blockchain was introduced …
Business Process Management (BPM) Business process management (BPM) is a regulation that uses different tools and methods to design, model, execute, monitor, and enhance business processes. A business process correlates the behavior of people, systems, information, and things to bring …
Cloud Engineer vs DevOps Engineer Cloud has changed the way how we do Business. Cost savings have led the IT assets, especially compute Infrastructure migration to Cloud. Accompanied by this move, there have been buffet of new roles which have …
Hyper Converged Infrastructure (HCI) Vs Converged Infrastructure (CI) Hyperconvergence has been at the forefront of customer demand nowadays. Underpinned by virtualization technology, Hyperconvergence is gradually making strong hold in the IT world. In this article, we will talk through 2 …
Multi Cloud Network Architecture Multi cloud refers to multiple cloud computing and storage services in a single network architecture. Multi Cloud distributes cloud assets, software, applications and more across several cloud environments. Multi cloud architecture utilizing two or more public …
What is Hyper-Threading? Hyper-Threading (HT) concept was introduced by Intel on desktop CPUs with the Pentium 4 HT. Pentium 4 is a single CPU core and cannot perform multi-tasking and in order to address this situation, Hyper threading allows the …
What is Agile Methodology? Agile methodology points to a software development methodology consolidated to the idea of repetitive development, where requirements and solutions are developed through fraternizing between self-organizing and cross-functional teams. The utmost value in Agile development is that it …
VLAN Trunking Protocol VLAN Trunking Protocol is used by Cisco switches to exchange VLAN information. In VTP, synchronization of VLAN information, such as VLAN ID or VLAN name can be done with switches inside the same VTP domain. VTP domain is …
Hyper Converged Infrastructure Vendors Multiple Vendors offers Hyper Converged Infrastructure (HCI). Before we discuss on vendors involved, a quick definition of HCI should provide a good understanding of the technology in discussion – Hyper Converged infrastructure integrates compute, storage and …
Colocation vs Carrier Neutral Data Center With introduction of new infrastructure services focused at providing smooth application access for customers, there have been new and improved cost effective solutions w.r.t Data Center Infrastructure services like power, space etc and Multi …
Introduction to Hyper Converged Infrastructure (HCI) Hyper Converged Infrastructure (Also called HCI in short) combines storage, computing and networking into a single system to reduce complexity and increase scalability. Hyper Converged platforms use a hypervisor for virtualized computing, software-defined storage …
Cloud App vs Web App What is a Cloud App? Cloud App is an application that operates through the cloud and has some characteristics of both desktop apps and web apps. Cloud App is a more advanced web app. It’s …
What is CASB? Cloud access security brokers (CASBs) is a cloud hosted solution placed between cloud service consumers and cloud service providers to implement security, compliance and governance security policies for cloud applications. CASBs help organizations to extend the security …
NAT Type 1 vs 2 vs 3 Nowadays, the 2 major gaming console types used extensively around the globe are Sony PlayStation Microsoft Xbox NAT stands for Network Address Translation, which represents the ability to translate a public IP address …
Overview The IPSEC NAT Traversal feature introduces IPSEC traffic to travel through Network Address Translation (NAT) or Port Address Translation (PAT) device in the network by addressing many incompatibilities between NAT and IPSEC. NAT Traversal is a UDP encapsulation which …
NSLookup Command NSLookup Overview NSLookup (Name Server Lookup). NSlookup is a simple but very practical command-line tool which is used to find DNS records, or in other words, IP address that corresponds to a host or the domain name that …
HTTP vs TCP Before discussing the difference, let’s understand the two terms first What is HTTP? HTTP is a Hypertext Transfer Protocol. HTTP works similar to other application services like SMTP and FTP. Like the performance of FTP, it transfers …
CEF vs Routing Table RIB (or routing table) and CEF (Cisco Express Forwarding) are two different tables which are used in routing across IP networking platform. Both have common information but perform two distinctly different purposes. CEF technology is new in …
Telco Cloud Architecture Table of Content: Definition of TelcoCloud Definition of Network Function Virtualization (NFV) NFV Architecture Benefits of NFV Application of NFV Conclusion Definition of Telco Cloud Telco cloud represents the Data Center resources which are required to deploy …
SDN and Open Flow Network Architecture With colossal growth in Cloud computing and Intent based networking, SDN technology has clearly lead the race. Infact SDN has also catered to needs of overgrowing demand on IT for faster response to requests …
Content Filtering Model Overview Content filtering is essential to exclude access to web pages or email deemed objectionable. Content filtering is used by corporations as part of their security framework setup. Content filtering service boosts network security by blocking entry …
In this post, we will discuss about In band and Out of Band Network Management. The sequential order of subtopics is enlisted as below – Topics Understanding of Network Management In-band management Out-of-Band Management Comparison of In-band and Out-of-Band Management …