Security Policy Quick Reference - Resource List

Printer Friendly Page


Security Policies allow users to control firewall operations by enforcing rules and automatically taking action. Security Policies on the Palo Alto Networks firewalls determine whether to block or allow a new network session based on traffic attributes, such as the source and destination security zones, the source and destination addresses and the application and services.


The following table provides a list of valuable resources on understanding and configuring Security Policies:


Security Policy Guidelines Best Practices for Creating Security Policies Document
Fundamental Guide on Security Policies Fundamentals of Security Policies Document
Tour of PAN-OS Security Policy Configuration Security Policies Configuration Video
How to Configure Security Policies on the PAN-OS UI Configure a Security Policy on PAN-OS Video
How to Configure Security Policy by Application Configure a Security Policy by App Video
How to Add Groups to Security Policy Add Group to Security Policy Document
Can Local User/Group Database be Used in Security Policies? Manually add to Security Policy Document
How to Enter an Application Name in Policy Without a Search Delay How to put an application name in the policy Document
How to Configure a Security Policy to use a Region Creating a Security Policy to use region instead of IP address Document
How to Tag and Filter Security Policy Rules How to add tags and filter security policies Document
How to View Security Policies from the CLI View Security Policies from the CLI Document
Security Policies Based on Zone Assignment for VPN Interface Policies based on zone assignment for VPN interface Document
How to See Traffic from Default Security Policies in Traffic Logs Describes traffic hitting default policies Document
Creating a Security Policy to Block Selective Flash Write a Security Policy to block Adobe Flash and allow flash Document
What is Default Value for "Service" Field in the Security Policy in PAN-OS 6.0? PAN-OS 6.0 Default Value for Service Field Document
How to Schedule Policy Actions Security Policies can be set to perform configured actions Document
Security Policy to Allow/Deny a Certain ICMP Type Cases where ICMP Type should be allowed Document
How to Create and View NAT Rules on the CLI Sample Commands to create Bi-Directional NAT Policy & Inbound Security Policy Document
How to Configure Email Notifications for Security Policy Changes How to Configure email notifications on Security Policy changes Document
CLI Listing of all Security Policies How to List All Security Policies from the CLI Board
Security Policy Organization Organizing Security Policies Board
Security Policy Limit Alarms How to Generate Tags Board
Adding Users to a Security Policy Add Users to Security Policy Board
Security Policy with URLs Create a Security Policy with the Destination Address as a URL Board


Note: If you have a suggestion for an article, video or discussion not included in this list please post a recommendation in the comments below and it will be added to the master list.


owner: asimon


Great work for putting this Quick Reference Resource List together !!!

Perhaps in the near future, someone can create a detailed doc on Lync 2013 / Skype Business 2015 configuration, this is a very evasive application with TURN, ICE, Stun, Sip and some App-ID's are outdated.