Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
Mastering Palo Alto Networks

You're reading from   Mastering Palo Alto Networks The complete journey to firewall mastery from setup to advanced security

Arrow left icon
Product type Paperback
Published in May 2025
Publisher Packt
ISBN-13 9781836644811
Length 646 pages
Edition 3rd Edition
Concepts
Arrow right icon
Author (1):
Arrow left icon
Tom Piens aka  'reaper' Tom Piens aka 'reaper'
Author Profile Icon Tom Piens aka 'reaper'
Tom Piens aka 'reaper'
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface 1. Understanding the Core Technologies FREE CHAPTER 2. Setting up a New Device 3. Building Strong Policies 4. Taking Control of Sessions 5. Services and Operational Modes 6. Identifying Users and Controlling Access 7. Managing Firewalls Through Panorama 8. Managing Firewalls Through Strata Cloud Manager 9. Upgrading Firewalls and Panorama 10. Logging and Reporting 11. Virtual Private Networks (VPNs) 12. Advanced Protection 13. Troubleshooting Common Session Issues 14. A Deep Dive Into Troubleshooting 15. Cloud-Based Firewall Deployment 16. Other Books You May Enjoy 17. Index
Appendix

Setting up a captive portal

A captive portal is a service that runs on the firewall and intercepts web sessions to have a user identify themselves. This can be a good addition to your user identification capabilities for unsupported operating systems that do not log on to the network, or guests that come into your network that you want to be able to identify.

It can also help pick up “strays”; for instance, a laptop may be used to roam a campus and hop SSIDs and access points, and it may be assigned a new IP address without generating a new logon event on AD. At this moment, the user becomes unknown and a captive portal can be triggered to have the user log in manually.

To set up a captive portal, we will need to be able to authenticate users, which we will cover first.

Authenticating users

To be able to authenticate users, we need to create an authentication profile that manages which protocol and server will be used. Create a new profile in Device ...

lock icon The rest of the chapter is locked
Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Mastering Palo Alto Networks
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime
Modal Close icon
Modal Close icon