Palo Alto Packet Capture and APP ID

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
[Music] okay guys so let's start so today first uh we will start with the capturing okay packet capturing some troubleshooting and some debugs and all okay but before that we have to connect our uh palo alto with internet okay and after that the topic is app id so all these things we have to finish it today so first uh first of all we need internet so we have to connect our a apollo auto with the isp only so we have to perform three steps that is not mentioned here okay the first thing is we need to change what we have to assign ip address from which network 192 to 168.0 dot zero slash 24 there i'll assign the ipsa dot 150 then we have to configure default route okay on outside interface okay and after that we have to configure that netting we have to go with the netting concept another netting which i'm going to use i'm going to use the dynamic fat and which is all about that is all about interface space okay so these three things we have to perform okay so let's do that so http is all about 10.20 or 20. 150. so we have reachability with ies xi what about 150 okay let me start with workstation okay it's powerful let me power up okay we'll take two minutes so after that time i need one inside out so where is inside router here let me check the inside out inside router i need let me start it i need one uh test pc inside test pc so test pc for call to one is the for the first follow alter who means inside one so let me bring it on this side hold on to here this is hold on to here now and it's all about test pc okay let me change the vlan on paul to hear inside router that's fine although let me change it outside let me use a vm network that is connected vlan change that's fine router is okay now that is also fine okay and this is inside pc only these devices are required okay and on the outside what i'm using we are using actual internet so outside router outside servers and all not required okay so today in the starting we need all these devices the first is all about inside router inside pc one paulo auto then we have isp act that is my adapter over there okay that is also already connected so just we have to change the iphone because in the previous class we were using eleven dot something okay today we have to use 192.160. okay then what will be the gateway gateway will be the dot one so first of all i'll change the ip then i'll configure the default route and after that we will configure the navigator okay and we have to check our policies okay then check enter okay these are the things okay so let it be start will take one or two minutes started volatile just wait and watch from here let me start i'm able to ping that's fine now let me go with the let's access here products okay not able to browser that's https 10.20.20. 150 here wait and watch because the services are getting started wilty sometime so the first thing we will discuss about some troubleshooting so as you know p cap do you know what is the p cap format that is all about our wire shaft washer when we are using wireshark and all okay that file when we are saving it so that is always dot p dot p cap format here dot x is all about notepad mp4 mp3 okay jpg okay png so these are the formats so same pcap is a format for the wireshark okay so we have to download some files capturing files and all okay so that is the format for the wires so we have to go with the app id as well we have to block uh like today we will block any desk we will block some teamviewer and all facebook okay instagram and also these type of application we will try to block it today okay now automatically save admin one two three let it be start welcome to pa now go to the interfaces go to the network go to the interfaces we need to change the iphs slash two we need to change it will and we have already changed okay go to ipv4 outside ib let me delete it let me add 192.168.0.150 ipads change make it okay yes listen go to the routing table go to the virtual router need to add one default out for the outside interface let me add here okay on which interface is all about outside interface okay so default route destination is all about any network okay then iphs next stop is what one knight is zero dot one any doubt this is clear let me add that out route is added the third thing is all about netting go to the policy go to the net and add one policy so this is all about dynamic fact which is all about interface ipv4 what are the rules if you want to mention here you can mention inside to the outside this is just only tagging what's the original packet what are the source lan inside zone destination outside destination interface to service any source any destination i'll keep it any translated into dynamic ipn port interface based which interface slash if you want to mention iep you can otherwise automatically it will be used handling all the three things we have configured let me comment side by side let me open its association with putty okay 10.20.20 dot 150 username all about ssh open it admin up to that time i'll change so straight and watch on that one two three already committed okay static now default out next hope is not in subnet of outgoing okay we will check the ipad this is you know one second show interface all 150 that's fine show routing route this one it's correct what's the problem okay let me ping with sorry thing with the source of 192.168.0.1 as a host who will be the host 192.168.0. okay okay 150. source is 150 we are getting the reply that's fine and now go with the google dns when public dns we are getting the reply that's fine okay go to the inside router now those are inside router inside pc anything you can use it let me just think with my firewall 10 dot one dot one dot one fifty fine with 8.8.8.8 i'm able to everything is fine go with the test pc everything is fine over the netflix netflix india my internet is working okay so it what does it mean it means we have the reachability from inside pc to the actual internet here whether actual internet clear or not now go to objects okay and in objects sorry go to the device and in device okay go to monitor sorry and first thing is all about session browsers the first thing is mention it session browser we have to go with the three things session browser we will go with the packet captures and third is all about troubleshooting mention on the left side on the right side session browser package capture we have to capture the back end and the pcap dot format dot pica format and after that troubleshooting we have to troubleshoot transfer sometimes it's happen in the corporate or in the networks okay you won't get any cli access but you have to try to ping you have to trace route and all okay because for the troubleshooting that is the basics commands okay so how to use those commands from the gui part so that we have to discuss you don't have cli access you have only [Music] okay now so the first thing is all about session browsers here so changing browser means it's all about you can say basically if i'm comparing with asa or ftd it's all about type of connection tables okay which will maintain the entry of all the schedules which is going through okay that particular part so let's consider if i'm talking about this one here okay today is 24 december this is see day 23 december timing is little bit different it's all about 4 9 a.m okay whatever but date is same from zone it which is on it's all about inside to the outside what is the source 10.1.1.5 because who's my 10.1.1.5 this is my 10.1 destination is all about 45.57.91.1 this is netflix iphs public eye dns is already done okay from port number four double line double eight it's all about random port number two port number 443 which protocol tcp we are using or not so this is all about tcp application is all about ssl we are using netflix base this one okay then what are the rules and all inside to the which rule we have configured inside to outside hope you remember we have configured this row okay ingress interface okay ethernet one egress e slash two there ingress e1 and then exit is e slash two okay after that bytes it's all about size it's all about v system way system means like vlans we have wheel and console we have on the switches what should we land then we have vrf concept on the routers then we have context string concept on the firewall okay asa and now we have v-system here system is all about virtual systems so by default we are using basic virtual system and right now how many vs do we have one only okay click this one here and try to expand it all the information this is all the information okay now see is that visible now that's fine okay now see what is session id 95 was a timeout 15 which virtual system vs1 by default which vs is there vs one only please note down by default what is the virtual system by default we have native vlan right so this is all about v system see yes always we have discussed https is more secure as compared to std why http http s s is more secure okay why because this is all about which protocol because of ssl http is secure ssl isn't a type of you can say a protocol it's in a protocol actually it's in a collection of so many protocols we have handshake protocol with that we have one bracket protocol okay we have chain cipher protocol over there so like that we have four protocols then we have again some sub protocols okay so let's consider if i'm using netflix here okay so netflix this is all about secure one okay so let's consider i'm going with cisco certifications okay training and certification see cisco.com exactly what is this url this is all about https why https because https is more secure as compared to http so guys daily when we are browsing anything okay we are always using https even you no need to type https just type google and then all about http save okay so when we are using https s is all about ssl ssl is in a protocol it's in suits of the protocol and guys this concept is also known as web vpn we are using one vpn by default daily we are using the vpns and all okay but yes generally the people they are not aware about that only technical peoples are aware about that so that is all about web vpn you can okay you can say browser based vpn that's between because i'm using what i'm using browser here so this is browser vpn you can say this is remote vpn we are at remote locations for the side to side vpns always both the sides always having the fixed ip addresses static id but today uh right now i'm on first floor i'm using another network maybe once i'll go to the second floor i'll connect with any another network this first floor is any legs another network but from everywhere from all the flows i can access internet easily okay so dynamically my ip address is getting changed so it's all about remotely user at the remote location so which protocol do we use we use http as for that okay so if i'm coming back here oh sorry https and for https which protocol is there your ssl protocols okay so now st application is what ssl which we use on which layer l7 okay after that if i'm talking about transport layer which transport layer on the transport layer which protocol do we use for that dcp tcp protocol number six protocol number six what's the security rule inside to outside we have configure you can check it there go to policy and go to securities and can you see inside to outside this thing okay the same policy now net source is true any net destination false which net we are using source network destination at we are using source map so this is the reason it's what true a net destination or you can say destination net is what false because there is a no destination clear now net rule we have configured one rule what what is the name of the rule this name is configured by me only that is dynamic patch interface based here any quality of services are you using any qs rule no any quest class class 4 by default class foreign cookies and all to host asian transfer tunnel right now you are not aware about captive portalization and looks and all cheshire in agreement okay session from h.a these type of things we haven't configured so it's always what paul said so this is the details what is the flow one c2s client to server first i'm a client this is a server so this is client to server after that reply so to client here so we have two flow flow one and two please note it down it's all about requests from where your request if request is coming from server to client then flow one server to client flow to reply blind to server so request is flow one reply is float that's it it could be client to server and it could be server to client clear now what is the direction here c2s client to server chrome's on inside obviously source ip 10.5 destination is 8.8.4.4 all about dns from okay sorry from port number this one to the port number this one from user unknown to user unknown because user base concept i'm not using state is active type is flow s2c outside zone source is this one destination is 192.168.0. there because that ip i'm using as a public ip here because on my firewall from inside 10.1.1.5 destination is let's consider 8.8.4 but from this firewall now netting will be there what is the source source will be eight oh sorry at the places at 10 it will be 192.168. this public id clear enough okay and then finally it to the from port 443 to the port this one state is active so this is all about flow c2s s2c so this is all about like this way different differentiations we have session number two okay session number three okay and then we have session number four clear so this is the concept about yeah [Music] um this is exactly not the reply this is just flow this is just a road map not exact or not flow for the meaning of flow because see what is mentioned here this is flow only so flow is just type of road map test okay not the exact reply okay so this is all about sessions browsing here next is if i'm going with packet capture let's consider we have to capture the time on esxi we are doing all the practical on esxi here okay so on esx side i can't use fireshark at all because all the virtual devices and all but let's consider if you have to you need some packet capturing center how to start it packet capturing is what oh let's solve it okay stages and all so we need to add one here stage one what are the stages these are the stages drop firewall receive transmit i have to transmit okay file name amit make it okay that's here okay clear yeah that's it one more stage all about firewall name time that's okay two done let me add one more for the all the stages i'm using drop it's all about ccna okay name itself i'll use drop like we can add into place either drop here let me add drop is a transmit it's all about okay first is already transmitted receive like make it receive all the four packets are done we have to capture the files here only but for that first you have to generate the traffic obviously okay this is done let me go with inside the devices inside pc okay let me close the session here again first is let me open the pin language 10.10.1.1.150 to the traffic is done or not let me playing with 10 or 8.8 through that question http youtube understand it with the song this is all about youtube this is clear now come back to the firewall package receive the package now let me first open the amit file here i'm a dot p cap type see what's the format dot p can automatically open it okay let's consider it's all about ssl okay so it's all about ssl practice go through the packets what are those packages tls i'm using and all then usage this is clear all about packet first capturing let me go with the second capture second capture is downloading got it third is all about receive again receive and then all about transformation when we are browsing anything it's not only about tcp traffic because there's so much so many traffic systems okay all about that traffic okay then this one so four type of capturings we have and all the four type of captioning sometimes it's happened we need packet captures and all so wireshark should be installed on your machine so then you can open it because dot p cap format how will you open it okay so like this way you can download so this is clear all the settings that's it pick up settings clear everything is clear again if you have to like configure it then okay free pass match and all i will enable everything go with that enable stage and all that cetera clear so this is all about package captures browsing done session browser is done back it captures them from the session browser you can see which sessions are going on okay and from captures you can download the captions because i'll give you some tasks in that we need this capturing and all that's fine after that i'm coming back with the devices and i'm going with some troubleshooting see here go to the device okay go to device and then go away go with troubleshooting so this is all about testing we have to perform testing okay troubleshooting all is all about testing only because okay we have to do the testing and all okay means if we are getting some issues then we have to find out the solution and then we have to do with the testing here security policy match these are the different different type of tests you can perform here okay let's say policy match when your traffic is going through the firewall which traffic is matching with your your particular policies here so let's consider right now first i'm going with the basic ping how many counts by default five let me make it 25 any interval you want to mention no by default whatever is the size anything you want to mention nothing host who's a destination 8.8.8.8 who's a source 192.168.0.150. source and host execute result details will be here can you see on this side wait and watch ring account fulfillment will make it five only sources 192.168.0.15 don't attempt to print interest okay this was okay so this is result and this all the other things okay let me mention uh this is all about 50 execute 50 pin will be will take obviously time okay it's all about 50 pain one by one okay it is a test result and then the result details all the 25 packets okay next is let's consider you have to go with traceroute okay use ipv4 first tl maximum tl port number toes page pause set the dot fragment bit and all nothing is there okay who's the source 192.168.0.150. travis 8.8.8.8 who's a gateway 192.168. 168.0. my yacht router bypass routing table and send directly to post not now you can see the traces so in case if you don't have cli access or from gui you can perform all these sensors how many options how many testing tests do we have it's in a long list here so you have to perform all the tests one by one yes but after that so many legs uh tests are there you can perform other tests also trace it out here click on this one all the time source and host is correct still it's going on just wait and watch test progress running tests are just going on taking too much time wait and watch this any another test like this way that falls in match okay so security policy match here from inside to the outside here source uh mention anything over the 10.1.12 keep it like this way only try to keep it like this way okay anything over this like this way only okay let's see so 10.1.5 destination uh mention anything [Music] actually license we don't have some and palo alto 85 percent features will work with license only this is the one this advantage is here okay not in ftds so it could be that reason so we are not getting let's go with the routing then destination ip all about 8.8.8. it our virtual router is one virtual router we have and its router source 10.1 source port random destination ip 5.5. oh sorry 8.8.8 only try to execute okay there's a results over okay so will take some time here okay this is about feb lookup i'm talking about not mfa okay so lock electric connectivity external dynamic list update server connectivity and all so from here you have to so like quality of services okay authentication these things we have to discuss right now okay it's not completed yet from inside to outside so 10.1.205. destination keep it like 8.8.8.8 here source port okay definition for nothing okay need to go with the tcp udp let me go with the udp traffic let me execute no complaint okay for that thing the thing is to interface go with the tcp near about 40k oh one year okay license okay but now you're aware about that how to use troubleshooting concept in that okay so three things we have discussed one is session browser the second thing is all about packet captures and third is about double shooting next is all about app idc okay the next topic is application id now guys see paul auto is all about license page now onwards all the features are license based 98 features now okay hardly like side to side vpn okay even i'm talking about has okay so these type of basic features we can perform without any type of lenses but after that any type of filtering maybe you have filtering url filtering any content filtering okay antivirus any type of filtering okay that is just depends on lenses without lenses we can't go with that okay but still we have to learn how to configure all these things so first of all i'm going to start with app id now guys i'm a trainer here i'm from the security team so i have all the database of security students most of the students one most trainer is there let's consider puneet pandey he is from secure enterprise background that guy has the database of all the enterprise students okay now this is palo alto this is all about cisco okay now what's the poll all the polarities in the firewall okay they're also going with the application filtering and all so now paulo alto has one cloud over there okay let's consider right now on palo alto facebook is there okay your any desk is there all these application popular applications are mentioned but there's a one application that name is abc dot tam it's new application and this palo alto is not aware about that what is the cloud-based concept cloud is like in a service of paid services we have to pay for that these type of cloud all the likes vendors they are supporting these type of cloud services so for paula although there's a one cloud service okay that cloud service is known as aptly once again that name of that one is aptly pedia applipedia dot paulo alternate workers networkers networks.com what does that mean actually this is one database or cloud-based service and on this database or on this particular cloud all the updated applications are every time the poll order now followed got to know about one application abc dot 10 immediately they will update where to the cloud so let's consider uh today let's consider i'm a trainer i got some update uh from from management tomorrow there's no class so i have to update you or not so then between management and between student i'm acting as a what cloud over there okay so same now there's a new application the market okay that name is some abc.net it's a dot tan here cloud palo alto somehow got to know about this application and this is very dangerous and all okay it's very uh critical maybe on this site or maybe on this application it's not uh good for your network so many threats out there so many malwares out there so immediately paulo to guess they will update its database if there's no one site and that is what abc dot okay now what is the risk of that what is the risk of this application so that risk categories are like divided into different different parts first is all about categories then about sub categories technologies risk management now this is the risk percentage here now you are using on mobile and this is from mi ghost is only 10k you are not using any back cover no power you are now you have iphone 12 okay you will use two side covers on that because rest is high on that clear or not this is your mobile phone one small kid is there and that guy is asking for mobile to play the games and all easily you can okay no problem same mobile now your father or your mother they're asking okay give me your mobile phone and unlock it what is the risk percentage 200 percent okay so that is what percentage of the risk there so same now it's all about cloud this is paul teams they got to know about one application abc.10 but this is very dangerous application or url then they will update it and they will assign it some great grading concept is there what is the grading this type of rating five is the highest one so then to the this application they will assign the number five five means if it's one lower scale that's not an issue okay so then i'm using palo alto in my network if i have license and if i have subscription of this cloud then i'll get to know about this application because then this cloud will send what updates over okay okay this is the update please install it if you don't have subscription of this one no update nothing is there and your network has endangers now means maybe this is an attacker now okay and your applic your apollo is not aware about this application maybe by mistake or some of your employer will install this application in your now everything i don't know so the subscription of these type of cloud is very important so what is the cloud name for the applications and or appley media dot palo alto network server aptly also not here amplipedia dot polar network application research center this is just for the application then for the url it's a different one for the malware traffic different cloud for the uh like another like different different type of viruses different different type of malwares with enhancement different depend research center they will do the research whatever the result they will update in the cloud if you have subscriptions you will get the update otherwise nothing else okay so now they have divided the application in categories okay so many applications out there obviously they have divided networkers on if we are 20 trainers so we have categories five five from the security two from the enterprise this is the cloud in the cloud this is this gap of the aws this is for the zero this is for the google cloud and alibaba and also categories out there okay in the corporate also hr department i t sales friends so different different categories same here business system collaboration general internet media networking okay in business systems sub categories first category within category sub categories okay let's consider i am talking about networking okay so these are the networking based over there okay these are the sub categories into that media one okay these are the technology based over okay and this is their risk management let's consider if i'm talking about media let it be browser it will give you the list of all those applications this one okay mention here facebook check it facebook there or not this is all about media parts okay what are the risk management here business systems and all okay go with gmail here okay google calendar enterprises so these are the what different different typos and go with and test it's not mentioned here go with team for the remote access always for the networking only subcategory technology is what browser-based client server browser-based means use from the browser and we have client as well applications there okay risk as well this is the rest presentation okay characteristics sas cloud-based transfer files tunnel other applications vulnerabilities widely used so all right now i don't have access of this thing so i don't have full details of this application but once you will get the access okay then you will get the proper details over there okay uh facebook now networking media okay and on access don't have access so not getting the exact result over there but from teamviewer this one that i think that is clear right gaming different differences okay it's in a proper list and this one you can see it's in a list actually but we don't have access to that because we don't have license and we don't have any access of this allopedia aptlypedia cloud okay if i'm talking about and this one go to the objects we have these are the things so this is all about content filtering this is all about content filtering anti-virus anti-spare vulnerabilities url filtering file blocking while database and this one and objects go with security profile mention it load it down please clear now we have vulnerabilities we have url filtering spyware and data patterns okay so like this way it's in a long list applications we're talking about application can you see the same categories over there okay try to find out facebook this is inbuilt it's all about inbuilt here can you see facebook facebook is over there within facebook what is the facebook name is facebook there additional information go to wikipedia google or yahoo what are the description facebook is a social networking website launched on february 4 2004 the free access website is privately owned and operated by facebook and corporation users can join network organized by the city workplace school okay reasons to connect and interact with other people so this is full information about the this one who is the owner of this one okay so these type of informations there so within facebook if i'm talking about linkedin linkedin is in an application but within that we have so many sub applications chat one sub application okay chatting video calling jobs messaging notifications so these are the sub applications over there so same on facebook as well okay we have sub applications see facebook app base chat coach file sharing posting rooms these days roams is there like a like hike social plugins videos voice mail social account tinder the certain other applications okay so this is all about facebook full of facebook information what are the percentage risk management can you see this is different different ones different different concepts different different risk to the video four is there browser base tcp always uses your 443 even it will use which protocol and all it will show you those type of things voiceover ip and video call peer to peer okay so these type of information clear or not okay so this is all about application it's all about application groups if you want to add any application groups and all let's consider i just want to make in a group here of my social networking site okay social networking whatever application i want to mention here which one facebook okay so this is all about facebook closer okay so these type of applications i can add from it just browse it and then just add it over there okay this is just what we are doing we are just trying to create one you can say uh type of database over there okay this one check here facebook facebook is done i want to block the facebook okay now let's try to find out instagram is there i don't think so insta will be there monster is not there i'll go with it what's that check amazon so many things we have amazon alexa console crime cloud and all let's consider if you want to block alex's and all okay go with instagram instagram mr that is done okay so these type of things if you want to mention it it's my group now if you need all these let's consider if you have to block it if you have to let's consider 20 sites you have to block make your group every time making a group of 20 sites and then call it anywhere okay so this is those type of things but where should we call all these things go to policies inside to outside go to applications add you can just find out here we have application filter go with the groups you can add that group here again okay that is not showing okay we can create it over here as well okay this one clear for a main application both the things you can do sub application also and main applications also add here again new application filter if you want to mention let's consider we want to block here facebook let's consider any disk any discus okay then uh let's consider all about zoom zoom as an application here okay use zoom over there okay go with teamviewer add it all there okay make it now this is all about actions here action will be should be blocked over there but i can't use on top of this thing i have to use separately okay because if you will use here only it will block all the traffics over there because this inside this is what it will allow your traffic add one policy just for application blocking okay tag always about inside too outside here source you can mention any source destination any source zone let me mention here zone netflix inside source could be any outside applications then now define it let's consider define any disk this is okay defined here team teamviewer okay uh next application all about zone okay you want to block it that is done serial actions will allow blockage create the sessions so once session will be created and one session will be end in the session browsers we can check all these things here this is done here my kitchen should be on top of that blocking here there's an inside to outside change it sequence because first because if you will make it down here so on that time first they will check inside to outside and it will allow everything okay before committing anything i just want to go back to my test pc the test pc here now let's check it the reachabilities and all do i have any desk here no we don't have let me download it download and download teamviewer it's kitchen up to that time let me install any desk and let us get ready can you see the green sign green sign means this is ready here connect with the partner five six two or three zero nine two zero two this is one of my rack here and this is the any desk of that thing this is my that track i have access to my system so means my any desk is working or not okay that is my overall concept here let me check here my teamviewer as well this is my that pc and this is id of that let me mention this username and id one two nine three zero five one four two seven password is one three let us mention okay let me terminate the connection okay now let me go with teamviewer default installation let me install it can we do this same thing then you from why you're blocking all these from base pieces you can that but use test pc as a separate pc always admin pc because from admin we have to just access it okay yes i want to explore the full features no personal use team member is ready can you see ready to connect this is already ready now what's the idea one for two that's it everything is working both applications are working now now let me push the policy let me push the polishes here already done let me comment it yes online guys are you getting or not all these things are you there or not first question okay that's good done this is done here now now let's go back with this one and now close all these applications and all once go with first any test connecting it will show you only connecting itself go with teamviewer note ready please check your connection got it because the traffic is getting blocked where on firewall go back to the firewall go to the objects go to the session and all where association okay go to the monitor sorry and check your session and browser from inside to outside you can check but and this is just in a road map this is just an road map over here clear that so this is all about what it's all about application clear so like this way any application you can block it just don't configure in the same policy otherwise let's consider let me change its sequencer changed let me comment clear successfully done let me go back to inside test pc here can you see now because order change can you see now it says okay again go there just i have just changed the sequence of the policies that's it nothing else the sequence is always first priority because first policy saying allow it if allow it so why to block okay but let me change it this will say no block it first okay done now go back to the same pc again and check it here again ready okay no problem let me terminate the sessions and let me power adapter connecting and and these these are the word these are the applications it's not the urls url is different thing application is different okay so this is all about app identity okay download facebook application then okay go with zoom and install zoom and all so use some applications okay and then go with that concept so this is all about app clear so today we have done with the session browsers we are done with the troubleshooting we are done with the packet captures and app id that was the target and we completed that's it so tomorrow we will start with the content filtering tomorrow all there will be content no after that user id the content filtering how many type of content filtering do we have almost in this one go to objects security profiles one two three four five six seven eight nine to ten tabs okay but all these things is always only licensed we have separate url filtering url separate application is separate url separate we have to go with the url 15 and here we have to mention the sites www.networkersum.com and all okay so then after that we have to go to policy and then we have to then this application only okay service and url configuration so tomorrow the concept is tomorrow's topic first url filtering and then content filter next two classes all about these two things okay but for url filtering for the content filtering and all we need license okay so i'm done for that so guys if you have any doubt if you have any questions so you can ask me your documents is already uploaded on the drive you can go through the drive and then all app id is there then content id your filtering i told you that decryption one day then user id global protect and all all these things next week we will finish yes online guys any doubt any questions it's clear that's good then guys see you tomorrow at the same time okay okay bye-bye take care
Info
Channel: NETWORKERSHOME
Views: 774
Rating: undefined out of 5
Keywords: palo alto packet capture and app id
Id: mrMqHdMKzdM
Channel Id: undefined
Length: 72min 17sec (4337 seconds)
Published: Wed Dec 30 2020
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.