




























































































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
PCNSE7 Study meterial for Palo Alto firewall
Typology: Exams
1 / 136
This page cannot be seen from the preview
Don't miss anything!
Palo Alto Networks, Inc. www.paloaltonetworks.com ©2016 Palo Alto Networks – all rights reserved. Aperture, AutoFocus, GlobalProtect, Palo Alto Networks, PAN-OS, Panorama, Traps, and WildFire are trademarks of Palo Alto Networks, Inc. All other trademarks are the property of their respective owners.
PALO ALTO NETWORKS PCNSE7 STUDY GUIDE iii
You should have three to five years’ experience working in the Networking or Security industries and the equivalent of 6 months’ experience working full-time with the Palo Alto Networks security platform.
Palo Alto Networks strongly recommends that the candidate attend the following courses: Firewall 8.0 Essentials: Configuration and Management (EDU- 210 ), Panorama: Manage Multiple Firewalls (EDU-221), and Firewall: Debug and Troubleshoot (EDU-311). Courses do not cover everything that a PCNSE7 needs to know, but they’re the most efficient way to start learning. When you have the basics mastered, you should spend time on our platform practicing using the information in the 7.1 version of the Administrator’s Guide. Find the guide here: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os The Administrator’s Guide contains specific configuration information and some “best practice” configuration settings. Remember also that a number of supplemental documents are on the learning site. We suggest that all candidates take advantage of this free resource.
Efforts have been made to introduce all relevant information that might be found in a PCNSE Certification Test. This document should not be considered a definitive test preparation guide but an introduction to the knowledge required. This document contains many references to outside information that should be considered essential to completing your understanding.
By employing the Palo Alto Networks Threat Intelligence Cloud, businesses leverage the global threat community to detect unknown threats and to convert them into known, stoppable threats.
Feature and performance requirements impact the choice of firewall model. All Palo Alto Networks firewalls run the same version of PAN-OS® software, ensuring the same primary feature set. When you investigate which model fits a given need, evaluate throughput, maximum concurrent sessions, and connections per second with App-ID, threat prevention, and decryption features enabled. Note that there are two published throughput statistics: firewall throughput and threat prevention throughput. Threat prevention throughput is the expected throughput with all of the defensive options, and firewall throughput is the throughput with no defense options enabled. The following link provides a PDF features summary of all firewall models including throughput: https://www.paloaltonetworks.com/resources/datasheets/product-summary-specsheet
The Single Pass Architecture means packets should have to traverse the architecture only once. The Palo Alto Networks firewall was designed to use an efficient system referred to as Next Generation Processing. Next Generation Processing allows the system to perform packet evaluation, application identification, policy decisions, and content scanning in a single efficient processing pass. Palo Alto Networks firewalls contain Next Generation Security features consisting of:
The Security policy consists of numerous security rules that are the keystone of the firewall’s ability to enable or block sessions. Numerous match conditions can be used when creating these rules. Security zones, source and destination IP address, application (App-ID), source user (User-ID), service (port), HIP match, and URL categories in the case of web traffic all can serve as traffic matching criteria for allow/block decision making. Allowed sessions can be scanned
Profile settings for a Security policy rule that enable Content-ID threat scanning
Palo Alto Networks firewalls are zone based. In order for traffic to pass, the deployment requires that security zones be implemented. These zones act as a logical way to group physical and virtual interfaces. Zones also are required to control and log the traffic that traverses the interfaces. An interface must be of the same type as the zone it is assigned (TAP, Virtual Wire, Layer 2, or Layer 3). In order to pass traffic through an interface, it must be assigned to a zone. A zone can have multiple interfaces of the same type assigned to it, but an interface can belong to only one zone. All sessions on the firewall are defined by the source and destination zones. Rules can use these defined zones to allow or deny traffic, apply QoS, or perform NAT. All traffic can flow freely within a zone, which is referred to as intrazone traffic. Traffic between zones (interzone traffic) is denied by default. Traffic will be allowed to travel only between zones if a security rule is defined and the rule matches all of the conditions of the session. For interzone traffic, Security
policy rules must reference a source zone and destination zone (not interfaces) to allow or deny traffic. Security policies are used to create a positive (whitelist) and/or negative (blacklist) enforcement model for traffic flowing through the firewall. In order for the firewall to properly evaluate, configure, and maintain Security policies, the necessary security rules must be in place. These rules are enumerated from the top down, and the first rules with the appropriate matching conditions will allow or deny the matching traffic. If the logging is enabled on the matching rule, and the traffic crosses a zone, the action for that session is logged. These logs are extremely useful for adjusting the positive/negative enforcement model. The log information can be used to characterize traffic, providing specific usage information and allowing precise policy creation and control. Palo Alto Networks firewall logs, Application Command Center, App Scope, and other reporting tools all work to precisely describe traffic and usage patterns.
The Palo Alto Networks firewall processes can be visualized using the following graphical representation. Your understanding of this linear version of the traffic flow can be very useful when you set up the initial configuration and when you adjust the rules after installation. Note that the graphical representation is a simplified version of the complete flow that can be found in document #1628, Day in the Life of a Packet : https://live.paloaltonetworks.com/t5/Learning- Articles/Packet-Flow-Sequence-in-PAN-OS/ta-p/56081?attachment-id=
Active/active consists of a cluster of two firewalls attached with three cables: HA1, HA2, and HA3. It is recommended only when load-balancing technology randomizes the routing of traffic between the firewalls. Please see the following additional documentation for active/active: https://live.paloaltonetworks.com/t5/Documentation-Articles/Configuring-Active-Active- HA-PAN-OS- 4 - 0/ta-p/58158?attachment-id=
The high availability process can be monitored and triggered by a number of different methods. To avoid a split brain scenario, you should use all of the methods, which include the use of a simple heartbeat, path monitoring, and link monitoring. In an active/passive HA pair only the active firewall processes traffic. High Availability failover support in both active/active and active/passive clusters includes all firewall features and is non-disruptive to user sessions. Active/passive clusters include two interconnections between firewalls to synchronize all data required for failover support.
The HA1 and HA2 links work together to keep the HA firewalls perfectly syncronized..
Active/passive High Availability configuration details can be found here: https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-High- Availability-on-PAN-OS/ta-p/ Configuration synchronization is discussed here: https://live.paloaltonetworks.com/t5/Learning-Articles/Information-Synchronized-in-an-HA- Pair/ta-p/ and: https://live.paloaltonetworks.com/t5/Documentation-Articles/High-Availability- Synchronization/ta-p/61190?attachment-id= An active/active overview can be found here. This document refers to an older version of PAN-OS® software with an outdated UI, but the concepts remain the same for PAN-OS® 7.1: https://live.paloaltonetworks.com/t5/Documentation-Articles/Configuring-Active-Active-HA- PAN-OS- 4 - 0/ta-p/58158?attachment-id=