Chapter 5: Enabling Features to Improve Your Security Posture

In this chapter, you will learn methods to improve your devices' security posture by applying some security best practices. The management interface and administrator access are of particular interest, as there's possibly nothing worse than a firewall being compromised by weak security measures.

In this chapter, we're going to cover the following main topics:  

  • Hardening the management interface
  • External dynamic lists (EDLs)

Technical requirements

This chapter will cover general topics regarding the management interface, the graphical user interface (GUI), the command-line interface (CLI), and configuration tweaks. A lab device to test things out before applying your new knowledge ...

Get Securing Remote Access in Palo Alto Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.