Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Preventing SSH Tunneling of unwanted traffic while simultaneously allowing normal SSH sessions can be difficult. Enabling SSH decryption exposes SSH Tunneling within SSH sessions to the Palo Alto Networks Security Policy such that it is easy to differentiate between the two types of traffic. This tutorial video highlights both the problem and the solution.
Subscribe to become an Insider Pro and get access to premium content such as: