Palo Interview Questions Flashcards
(78 cards)
What are the different deployment modes available in Palo Alto firewalls?
Palo Alto firewalls support multiple deployment modes:
* Tap mode: Used for monitoring traffic without affecting the flow.
* Virtual Wire mode: Allows for inline deployment without requiring changes to the existing network infrastructure.
* Layer 2 mode: Operates as a transparent bridge, forwarding traffic at layer 2.
* Layer 3 mode: Functions as a traditional router, routing traffic at layer 3.
Question #02: Is the firewall at Palo Alto stateful
Yes, the firewall matches all traffic passing through it against the session and then matches every session against the security policy.
Question #03: What is the difference between Virtual Routers and Virtual Systems in Palo Alto firewalls?
- Virtual Routers (VR): Logical routing instances within a firewall, allowing for separate routing tables and configurations.
- Virtual Systems (VSYS): Logical firewalls within a single physical device, providing multi-tenancy capabilities.
Question #04: What is the purpose of Palo Alto Autofocus?
Cloud-based threat intelligence service allowing admins to conveniently determine all critical attacks. This way, the admins can triage effectively and take the necessary actions without the need for additional IT resources.
Question #05: What are the different failover scenarios?
A failover gets triggered when a monitored metric fails on the active Panorama.
There are two significant scenarios when a failover gets triggered:
* The peers in the Panorama cannot communicate with each other, and the active peer is not responding to status polls and health.
* One or more of the destinations specified on the active peer is unreachable.
Question #06: What is a U-Turn NAT?
Internal users with private IP address want to connect to the server deployed in the internal DMZ zone with the public IP address. Since there’s no Internal DNS server and it depends on a Public DNS server from the internet
Question #07: Explain Active/Passive and Active/Active modes in Palo Alto.
- Active/Passive mode: One firewall manages traffic while the other is ready and synchronized to move to the active state if there is a failure. Both firewalls share the same settings, and one is responsible for actively managing the traffic until there is a failure.
- Active/Active mode: Several firewalls are grouped in the form of a cluster and contain multiple active units processing traffic. They share the network load and do DPI as well, together.
Question #08: What is a Zone Protection Profile?
It helps protect the network from attacks. The attacks can be in the form of reconnaissance attacks, common floods, and similar other packet-based attacks.
Question #09: What is the Application Command Centre (ACC)?
The ACC or Application Command Centre provides URL, threat, and data (files and patterns) traversing the Palo Alto network firewalls.
Question #10: What is WAF (Web Application Firewall)?
A WAF helps protect web applications by monitoring and filtering the HTTP traffic between the internet and a web application.
Question #11: What do HA, HA1, and HA2 mean in Palo Alto?
- HA: High Availability port. A dedicated HA link port connects the auxiliary and primary devices physically. You can place two firewalls in a group and synchronize their configuration.
- HA1: Used for clear text communication and encrypted communication.
- HA2: Used to forward tables, synchronize sessions, IPsec security associations, and the ARP tables.
Question #13: What exactly is an App-ID?
It identifies and classifies applications traversing a network.
Traffic entering the network is first checked against security policies to determine if it is allowed.
Application signatures are applied to identify the application based on unique properties.
If encryption (SSL/SSH) is detected, traffic is decrypted (if a decryption policy exists) to further analyze and classify the application.
Identified applications are then subject to granular security rules for enforcement or monitoring.
Question #14: How does an App-ID work?
APP ID uses several identification techniques that help determine the exact ID of the applications traversing your network. It also includes those who try evading detection by masquerading as legitimate traffic, using encryption, or by hopping ports.
Question #15: What are the advantages of Panorama in Palo Alto?
It is a centralized management system that controls various Palo firewalls via a web-based interface. It helps the administrators view the device-specific or aggregate application content, user data and manage Palo Alto Networks firewalls.
Question #16: What are the possibilities for forwarding log messages on the Palo Alto firewall?
Every firewall stores the log file locally by default. Panorama supports forwarding log messages to a log collector, a cortex data lake, or simultaneously both.
One can even use external services for notification, archiving, or analysis by forwarding logs to the services from panorama or firewalls.
Question #17: What is the procedure for adding a license to the Palo Alto firewall?
To add a license:
1. Navigate to the device, and license, and click on the activate feature using the Auth code.
2. Download the authorization file.
3. Copy this file to a computer that has access to the internet and log in to the support panel.
4. Click on my VM series auth codes and select the applicable auth code from the list.
5. Now click on register VM. Select the authorization file from the pop-up.
6. The registration process is completed, and the serial number of the VM series firewall will be attached to the records on the support site.
Question #18: What is GlobalProtect in Palo Alto?
VPN Client
Question #19: What is endpoint security in Palo Alto?
Suite of tools to protect devices connected to the network such as laptops, desktops, servers, and tablets.
Cortex XDR combines advanced threat detection, machine learning, and behavioral analysis to safeguard endpoints.
Threat Detection & Prevention
Data Encryption
Firewall Protection
Device Control
Zero-Day Threat Protection
Question #20: What are the various linkages used to establish HA or the HA Introduction?
The firewall in HA pair uses HA links to synchronize data and maintain state information.
However, some models of the firewall also dedicate the HA ports- Control link (HA1) and Data link (HA2).
Question #21: What are Backup Links?
Backup links provide redundancy for the HA2 and HA1 links.
In-brand ports can be used for backup links for HA1 and HA2 connections when dedicated backup links aren’t available.
Question #22: What are the various port numbers used in HA?
There are two major types of ports used in HA:
- TCP port 28769 and 28260: Used to ensure clear text communication between two ends.
- Port 28: Used for encrypted communication.
Question #23: What functionalities does Palo Alto support in Virtual Wire Mode?
A virtual wire interface supports App ID, user ID, content ID, NAT, and decryption.
Question #24: Which virtualization platform fully supports Palo Alto Network Deployments?
Cisco ACI, OpenStack, Microsoft Public, ENCS, Vmware, etc.
Question #25: What command is used to show the maximum size of the log file?
- bash
- show logdb-quota