Hello sir thanks for the lesson, it is really informative. I have a concern/question: where is that demo website hosted.?Is it on your LAN/Network or somewhere on the internet? if it is hosted somewhere on the internet, how will my firewall protect someone's website/application from SQL injection? if the website is hosted on your LAN/Network it's very impressive and makes a lot of sense to me. but from the video, it looks like the demo site is hosted somewhere else on the internet unless I did not get the point well. As for the case of WAF, we normally use it to protect the server hosting our application/sites which are in our LAN/DC. Kindly, enlighten me on this. Maybe my understanding is not ok. Thanks
Thank you Issack Ali! If you want to prevent your internal users, from using a SQL injection attack against sites on the Internet, place the firewall between your users and the internet, and attach the vulnerability profile to the security policy rule that is allowing their initial flows of traffic, from their computers to the Internet. To prevent a SQL injection attack against server you are hosting, place the firewall between the Internet and your hosted server, and attach the vulnerability profile to the security policy rule that is allowing the initial flow of traffic from users on the Internet to your hosted server. The same logic would hold, if you have a server hosted in the cloud. Simply place the FW between it and the clients that access that server. Hope that helps, and thanks for the question.
Thanks a lot for sharing such a Very informative Video, Could you please let me know SSL decryption is really necessary to configure before using vulnerability protection security profile.
Are you Seth Meyers brother? Enjoying your videos. I just reset my PA440 and followed along with the instructions. Since I had unplugged all the cables during the reset, I forgot to reconnect the Management/console port to Interface 2. This caused all kinds of delays until I remembered. Maybe put that bit of info in your videos.
Thank you for the suggestion Eric Aures❗ Its been a while since I worked on those, but next time I ramp up on those, especially the Checkpoint, I may make some RUclips videos as well. Thanks for the suggestion.
Thanks Keith, great series on the palo
Thank you Ken Murphy!
Thanks, Keith!! following you a couple of months ago.
Thank you Erick Tapia!
well prepared video and thanks for sharing , i've been watching your pcnse video on cbt nuggets also
Thank you Lucas Nyeinchan!
Hello sir thanks for the lesson, it is really informative. I have a concern/question: where is that demo website hosted.?Is it on your LAN/Network or somewhere on the internet? if it is hosted somewhere on the internet, how will my firewall
protect someone's website/application from SQL injection?
if the website is hosted on your LAN/Network it's very impressive and makes a lot of sense to me. but from the video, it looks like the
demo site is hosted somewhere else on the internet unless I did not get the point well.
As for the case of WAF, we normally use it to protect the server hosting our application/sites which are in our LAN/DC.
Kindly, enlighten me on this. Maybe my understanding is not ok.
Thanks
Thank you Issack Ali!
If you want to prevent your internal users, from using a SQL injection attack against sites on the Internet, place the firewall between your users and the internet, and attach the vulnerability profile to the security policy rule that is allowing their initial flows of traffic, from their computers to the Internet.
To prevent a SQL injection attack against server you are hosting, place the firewall between the Internet and your hosted server, and attach the vulnerability profile to the security policy rule that is allowing the initial flow of traffic from users on the Internet to your hosted server.
The same logic would hold, if you have a server hosted in the cloud. Simply place the FW between it and the clients that access that server.
Hope that helps, and thanks for the question.
@@KeithBarker
Thank you so much for the comprehensive reply and enlightenment. yeah really helped and
well understood.🫡
Thanks a lot for sharing such a Very informative Video, Could you please let me know SSL decryption is really necessary to configure before using vulnerability protection security profile.
Are you Seth Meyers brother? Enjoying your videos. I just reset my PA440 and followed along with the instructions. Since I had unplugged all the cables during the reset, I forgot to reconnect the Management/console port to Interface 2. This caused all kinds of delays until I remembered. Maybe put that bit of info in your videos.
Thank you @tomsheldon6398!
How about Checkpoint / Juniper FWs?
Thank you for the suggestion Eric Aures❗
Its been a while since I worked on those, but next time I ramp up on those, especially the Checkpoint, I may make some RUclips videos as well.
Thanks for the suggestion.