The document describes the flow of packets through a Palo Alto Networks firewall. Packets enter from the source zone and address and are forwarded based on policy-based forwarding rules. They then undergo pre-policy security checks for allowed ports and sessions before application and decryption policies are applied. Post-policy, packets are checked against security policies and profiles before being re-encrypted, having network address translation applied, and being forwarded to the destination zone.
The document describes the flow of packets through a Palo Alto Networks firewall. Packets enter from the source zone and address and are forwarded based on policy-based forwarding rules. They then undergo pre-policy security checks for allowed ports and sessions before application and decryption policies are applied. Post-policy, packets are checked against security policies and profiles before being re-encrypted, having network address translation applied, and being forwarded to the destination zone.
The document describes the flow of packets through a Palo Alto Networks firewall. Packets enter from the source zone and address and are forwarded based on policy-based forwarding rules. They then undergo pre-policy security checks for allowed ports and sessions before application and decryption policies are applied. Post-policy, packets are checked against security policies and profiles before being re-encrypted, having network address translation applied, and being forwarded to the destination zone.