PDF Google Drive Downloader v1.1


Report a problem

Content text EDU-318-v2.2-M05-Security Processing Nodes-Express.pdf


Security policy rules Security Processing Node comparison
Display and Manage Security Policy Rules Policies > Security > Pre Rules Action for match Individual rule 3 | © 2018-2022 Palo Alto Networks, Inc. Match criteria Threat prevention profile • Palo Alto Networks security tools do first fit rule scanning. • When the session matches the criteria of a rule, the session is then subject to the actions and threat prevention profile of that rule.
Prisma Access Rule Enforcement 4 | © 2018-2022 Palo Alto Networks, Inc. • Prisma Access enforces Security policies only as sessions come into the Prisma Access environment: • When traffic leaves Prisma Access to return to a remote network, service connection, or mobile user, there is no security enforcement. • Because there is no security enforcement as traffic leaves Prisma Access, no traffic logs are generated. • SC-CANs do not enforce Security policy. RN-SPNs and MU-SPNs enforce Security policy. Enforcement No enforcement when session egresses to Prisma Access nodes Remote Network Remote Network Prisma Access

Related document

x
Report download errors
Report content



Download file quality is faulty:
Full name:
Email:
Comment
If you encounter an error, problem, .. or have any questions during the download process, please leave a comment below. Thank you.