Get Started with NGFWs
Learn about the network security capabilities, management abilities, and initial
setup for Palo Alto Networks Next-Generation Firewalls.
Where Can I Use This? | What Do I Need? |
Palo Alto Networks Next-Generation Firewalls (NGFWs) implement a security architecture
that extends beyond traditional firewall capabilities. Traditional firewalls primarily
filter traffic based on port, protocol, and IP addresses, while Palo Alto Networks 's
NGFWs use App-ID technology to identify and control applications regardless of port,
protocol, or encryption status. This application-based approach enables for more precise
security controls than port-based methods, enabling administrators to create policy
rules based on applications and user identities rather than just network attributes.
The core functions include: App-ID technology, which identifies and controls
applications regardless of port, protocol, or encryption, moving beyond traditional
firewall limitations. This application awareness is seamlessly integrated into
unified security policies that combine all protection mechanisms into a
single, streamlined rule base for simplified management. To address the growing
challenge of encrypted traffic, SSL/TLS decryption capabilities provide
visibility into threats hiding within encrypted communications. Advanced threat
intelligence and sandboxing through WildFire continuously protect against
unknown malware and zero-day attacks in real-time, while URL filtering blocks
access to malicious websites and enforces acceptable use policies. Finally,
integrated VPN connectivity ensures secure remote access for today's
distributed workforce. Together, these core features create a unified security platform
that provides unprecedented visibility, control, and protection across all network
traffic.
Administrators have several options for managing Palo Alto Networks NGFWs, depending on
your network's deployment scale and technical requirements:
For more information about the management styles available for your NGFWs, click
here.