Video Tutorial: How to use Malicious IP Lists in an EDL

Video Tutorial: How to use Malicious IP Lists in an EDL

4691
Created On 02/28/20 00:35 AM - Last Modified 02/28/20 00:36 AM


Objective


The video explains how to use Malicious IP Lists in the External Dynamic List (EDL). The EDL configured can then be used in Security Rules.

 


Environment


  • PAN-OS 9.0
  • Palo Alto Firewall.


Procedure






 


Additional Information


Note1: This video is from the Palo Alto Network Learning Center course, Firewall 9.0: Optimizing Firewall Threat Prevention (EDU-114).
To learn more or sign up to view the online class, please go to Palo Alto Networks Education.


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000POsACAW&lang=en_US&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail