Overview Today we’ll take a look at the steps required to create a basic security perimeter on a Palo Alto firewall. In particular we’ll be focused on the network segmentation inherent in Palo Alto firewalls and the security and flexibility it imparts. We’ll touch on the three basic deployment methods, but specifically step through a […]