Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Preventing SSH Tunneling of unwanted traffic while simultaneously allowing normal SSH sessions can be difficult. Enabling SSH decryption exposes SSH Tunneling within SSH sessions to the Palo Alto Networks Security Policy such that it is easy to differentiate between the two types of traffic. This tutorial video highlights both the problem and the solution.