- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Keeping your network secure is a full time job, especially when trying to prevent SSH Tunneling of unwanted traffic while simultaneously allowing normal SSH sessions. If you do not have the ability to decrypt SSH sessions, then you will never see what is really happening in those SSH tunnels.
Enabling SSH decryption exposes SSH Tunneling within SSH sessions to the Palo Alto Networks Security Policy such that it is easy to differentiate between the two types of traffic. This tutorial video highlights both the problem and the solution.
Please watch this video by John Cone.
Thanks for reading.
Stay Secure.
Joe Delio
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Subject | Likes |
---|---|
5 Likes | |
3 Likes | |
3 Likes | |
3 Likes | |
2 Likes |
User | Likes Count |
---|---|
11 | |
4 | |
3 | |
3 | |
2 |