Вы находитесь на странице: 1из 14

Plao Alto Interview Questions and Answers

Some of our readers had requested for a post with some of the common
questions and answers for the Palo Alto Firewall, after reading our post on
PA Firewall. Following are some of the questions normally asked for PA
interview. Please use the comment section if you have any questions to
add .

Buy&Download PDF (~50 QA)

Note : for international purchases ($6) for the above


document (containing ~50 Q&A) please reach out to us at
beginnersforum@gmail.com

1. Why Palo Alto is being called as next generation firewall ?

Ans: Next-generation firewalls include enterprise firewall capabilities, an


intrusion prevention system (IPS) and application control features. Palo
Alto Networks delivers all the next generation firewall features using
the single platform, parallel processing and single management
systems, unlike other vendors who use different modules or multiple
management systems to offer NGFW features. Palo Alto NGFW different
from other venders in terms of Platform, Process and architecture

2. Difference between Palo Alto NGFW and Checkpoint UTM ?

PA follows Single pass parallel processing while UTM follows Multi pass
architecture process

3. Describe about Palo Alto architecture and advantage ?

Architecture- Single Pass Parallel Processing (SP3) architecture

Advantage: This Single Pass traffic processing enables very high


throughput and low latency – with all security functions active. It also
offers single, fully integrated policy which helps simple and easier
management of firewall policy

——————- advertisements ——————-

———————————————————-

4. Explain about Single Pass and Parallel processing architecture ?

Single Pass : The single pass software performs operations once per
packet. As a packet is processed, networking functions, policy lookup,
application identification and decoding, and signature matching for any
and all threats and content are all performed just once. Instead of using
separate engines and signature sets (requiring multi-pass scanning) and
instead of using file proxies (requiring file download prior to scanning), the
single pass software in next-generation firewalls scans content once and
in a stream-based fashion to avoid latency introduction.

Parallel Processing : PA designed with separate data and control


planes to support parallel processing. The second important element of
the Parallel Processing hardware is the use of discrete, specialized
processing groups to perform several critical functions.

 Networking: routing, flow lookup, stats counting, NAT, and similar


functions are performed on network-specific hardware

 User-ID, App-ID, and policy all occur on a multi-core security engine


with hardware acceleration for encryption, decryption, and
decompression.

 Content-ID content analysis uses dedicated, specialized content


scanning engine

 On the controlplane, a dedicated management processor (with


dedicated disk and RAM) drives the configuration management,
logging, and reporting without touching data processing hardware.

5. Difference between PA-200,PA-500 and higher models ?


In PA-200 and PA-500, Signature process and network processing
implemented on software while higher models have dedicate hardware
processer

6. What are the four deployment mode and explain ?

1. Tap Mode : Tap mode allows you to passively monitor traffic flow
across network by way of tap or switch SPAN/mirror port

2. Virtual wire : In a virtual wire deployment, the firewall is installed


transparently on a network segment by binding two interfaces
together

——————- advertisements ——————-

———————————————————-

1. Layer 2 mode : multiple interfaces can be configured into a


“virtual-switch” or VLAN in L2 mode.

2. Layer 3 Deployment : In a Layer 3 deployment, the firewall routes


traffic between multiple interfaces. An IP address must be assigned
to each interface and a virtual router must be defined to route the
traffic.

7. What you mean by Zone Protection profile ?

Zone Protection Profiles offer protection against most common flood,


reconnaissance, and other packet-based attacks. For each security zone,
you can define a zone protection profile that specifies how the security
gateway responds to attacks from that zone. The following types of
protection are supported:

-Flood Protection—Protects against SYN, ICMP, UDP, and other IP-based


flooding attacks.

-Reconnaissance detection—Allows you to detect and block commonly


used port scans and IP address sweeps that attackers run to find potential
attack targets.
-Packet-based attack protection—Protects against large ICMP packets and
ICMP fragment attacks.

Configured under Network tab -> Network Profiles -> Zone protection.

8. What is u-turn NAT and how to configure ?

U-turn NAT is applicable when internal resources on trust zone need to


access DMZ resources using public IP addresses of Untrust zone.

Let’s explain based on below scenario.

In above example, the website company.com (192.168.10.20) statically


NAT’ed with public IP address 81.23.7.22 on untrusted zone. Users in the
corporate office on the 192.168.1.0/24 segment need to access the
company webpage. Their DNS lookup will resolve to the public IP in the
Internet zone. The basic destination NAT rules that provide internet users
access to the web server will not work for internal users browsing to the
public IP .

Following are the NAT rule and policy definition.


1. How to publish internal website to internet. Or how to perform
destination NAT ?

To publish internal website to outside world, we would require destination


NAT and policy configuration. NAT require converting internal private IP
address in to external public IP address. Firewall policy need to enable
access to internal server on http service from outside .We can see how to
perform NAT and policy configuration with respect to following scenario

Provide the access to 192.168.10.100 through the public IP address


64.10.11.10 from internet

Following NAT and policy rules need to be created.


NAT:-> Here we need to use pre-NAT configuration to identify zone. Both
source and destination Zone should be Untrust-L3 as source and
destination address part of un trust zone

Policy-> Here we need to use Post-NAT configuration to identify zone. The


source zone will be Untrust-L3 as the source address still same 12.67.5.2
and the destination zone would be Trust-L3 as the translated IP address
belongs to trust-l3 zone.

We have to use pre-NAT IP address for the source and destination IP


address part on policy configuration. According to packet flow, actual
translation is not yet happen, only egress zone and route look up
happened for the packet. Actual translation will happen after policy lookup
. Please click here to understand detailed packet flow in PA firewall. Just
remember the following technique so it will be easy to understand

In firewall rule,

Zone: Post NAT

IP address: Pre NAT

In NAT rule,

Zone: Pre NAT

Final Configuration looks like below:


2. What is Global Protect ?

GlobalProtect provides a transparent agent that extends enterprise


security Policy to all users regardless of their location. The agent also can
act as Remote Access VPN client. Following are the component

Gateway : This can be or more interface on Palo Alto firewall which


provide access and security enforcement for traffic from Global Protect
Agent

Portal: Centralized control which manages gatrway, certificate , user


authentication and end host check list

Agent : software on the laptop that is configured to connect to the


GlobalProtect deployment.

3. Explain about virtual system ?

A virtual system specifies a collection of physical and logical firewall


interfaces and security zones.Virtual system allows to segmentation of
security policy functionalities like ACL, NAT and QOS. Networking functions
including static and dynamic routing are not controlled by virtual systems.
If routing segmentation is desired for each virtual system, we should have
an additional virtual router.
——————- advertisements ——————-

———————————————————-

4.Explain about various links used to establish HA or HA introduction ?

PA firewall use HA links to synchronize data and maintain state


information. Some models of the firewall have dedicated HA ports—
Control link (HA1) and Data link (HA2), while others require you to use the
in-band ports as HA links.

Control Link : The HA1 links used to exchange hellos, heartbeats, and
HA state information, and management plane sync for routing, User-ID
information and synchronize configuration . The HA1 should be layar 3
interface which require an IP address

Data Link : The HA2 link is used to synchronize sessions, forwarding


tables, IPSec security associations and ARP tables between firewalls in an
HA pair. The HA 2 is a layer 2 link

Backup Links: Provide redundancy for the HA1 and the HA2 links. In-
band ports are used as backup links for both HA1 and HA2. The HA backup
links IP address must be on different subnet from primary HA links.

Packet-Forwarding Link: In addition to the HA1 and HA2 links, an


active/active deployment also requires a dedicated HA3 link. The firewalls
use this link for forwarding packets to the peer during session setup and
asymmetric traffic flow.

4. What protocol used to exchange heart beat between HA ?

ICMP

——————- advertisements ——————-

———————————————————-

5. Various port numbers used in HA ?


HA1: tcp/28769,tcp/28260 for clear text communication ,tcp/28 for
encrypted communication

HA2: Use protocol number 99 or UDP-29281

6. What are the scenarios for fail-over triggering ?

->if one or more monitored interfaces fail

->if one or more specified destinations cannot be pinged by the active


firewall

->if the active device does not respond to heartbeat polls (Loss of three
consecutive heartbeats over period of 1000 milliseconds)

7. How to troubleshoot HA using CLI ?

>show high-availability state : Show the HA state of the firewall

>show high-availability state-synchronization : to check sync status

>show high-availability path-monitoring : to show the status of path


monitoring

>request high-availablity state suspend : to suspend active box and make


the current passive box as active

8. which command to check the firewall policy matching for particular destination ?

>test security-policy-match from trust to untrust destination <IP>

9.Command to check the NAT rule ?

>test nat-policy-match

10. Command to check the system details ?

>show system info // It will show management IP , System version and


serial number
11. How to perform debug in PA ?

Following are the steps

Clear all packet capture settings

>debug dataplane packet-diag clear all

set traffic matching condition

> debug dataplane packet-diag set filter match source 192.168.9.40


destination 4.2.2.2
> debug dataplane packet-diag set filter on

——————- advertisements ——————-

———————————————————-

Enable packet capture

> debug dataplane packet-diag set capture stage receive file rx.pcap
> debug dataplane packet-diag set capture stage transmit file tx.pcap
> debug dataplane packet-diag set capture stage drop file dp.pcap
> debug dataplane packet-diag set capture stage firewall file fw.pcap
> debug dataplane packet-diag set capture on

View the captured file

view-pcap filter-pcap rx.pcap

12. What you mean by Device Group and Device Template.?

Device group allows you to group firewalls which is require similar set of
policy , such as firewalls that manage a group of branch offices or
individual departments in a company. Panorama treats each group as a
single unit when applying policies. A firewall can belong to only one device
group. The Objects and Policies are only part of Device Group.

Device Template :
Device Templates enable you to deploy a common base configuration like
Network and device specific settings to multiple firewalls that require
similar settings.
This is available in Device and Network tabs on Panorama

13. Why you are using Security Profile .?

Security Profile using to scans allowed applications for threats, such as


viruses, malware, spyware, and DDOS attacks.Security profiles are not
used in the match criteria of a traffic flow. The security profile is applied to
scan traffic after the application or category is allowed by the security
policy. You can add security profiles that are commonly applied together to
a Security Profile Group

Following are the Security Profiles available

 Antivirus Profiles

 Anti-Spyware Profiles

 Vulnerability Protection Profiles

 URL Filtering Profiles

 Data Filtering Profiles

 File Blocking Profiles

 WildFire Analysis Profiles

 DoS Protection Profiles

1. Question 1. In A New Firewall, Which Port Provides Webui Access By


Default?
Answer :
Management port.
2. Question 2. The Management Network Port On A Firewall Can Be
Configured As Which Type Of Interface?
Answer :
Layer 3.
3. Question 3. How Does Panorama Handle Incoming Logs When It
Reaches The Maximum Storage Capacity?
Answer :
Panorama automatically delete older logs to create space for new ones.

4.

Question 4. In An Enterprise Deployment, A Network Security Engineer


Wants To Assign To A Group Of Administrators Without Creating Local
Administrator Accounts On The Firewall. Which Authentication Method
Must Be Used?
Answer :
RADIUS with Vendor-Specific Attributes.
5. Question 5. When A Malware-infected Host Attempts To Resolve A
Known Command-and-control Server, The Traffic Matches A Security
Policy With Dns Sinkhole Enabled, Generating A Traffic Log. What Will Be
The Destination Ip Address In That Log Entry?
Answer :
The IP Address specified in the sinkhole configuration.
6. Question 6. A Network Design Change Requires An Existing Firewall
To Start Accessing Palo Alto Updates From A Data Plane Interface
Address Instead Of The Management Interface. Which Configuration
Setting Needs To Be Modified?
Answer :
Service route.

7.

Question 7. What Must Be Used In Security Policy Rule That Contains


Addresses Where Nat Policy Applies?
Answer :
Pre-NAT address and Post-Nat zones.
8. Question 8. The Configuration Of A Dos Protection Profile Can
Defend Nodes From Which Attacks?
Answer :
Floods.
9. Question 9. Does The App Conform To The Common Information
Model?
Answer :
Yes! The Common Information Model (CIM) is a set of standards and an
app that help other apps conform to a common naming and tagging
scheme. This allows Splunk users to search for data across multiple kinds
of logs from multiple vendors using the same field names to access the
data, which eases correlations across different kinds of data. For example,
a Splunk user could correlate between firewall logs and web server logs. To
Splunk for Palo Alto Networks app conforms strictly to the Common
Information Model.

10.

Question 10. Does The App Have A Data Model?


Answer :
Yes! In Splunk 6.x, the data model feature allows Splunk users to quickly
visualize and analyze data with a point-and-click interface (instead of the
Splunk search bar language). This capability requires that the data be
modeled into a Splunk Data Model which is a highly accelerated summary
index of the data. Not only is there a data model for all Palo Alto Networks
logs, all the app’s dashboards are based on this accelerated data model for
extremely fast data retrieval and visualization. So the app itself is using the
same Data Model that Splunk administrators would use to generate
visualizations.
11. Question 11. What Kinds Of Data Does The App Take In?
Answer :
The Splunk for Palo Alto Networks app accepts syslog from Firewalls,
Panorama, and Endpoint Security Manager. Also, Wildfire malware reports
are pulled from the Wildfire portal as XML. These reports represent a
behavioral fingerprint of any malware detected by Wildfire which you can
correlate against other logs to detect indicators of compromise.
12. Question 12. Why Use Palo Alto Networks With My Splunk?
Answer :
Splunk has unmatched ability to consume and analyze data, but for Splunk
to present usable and actionable insights, it must have the highest level of
visibility and knowledge possible. Palo Alto Networks provides that level of
visibility into the network and the endpoint to detect and even predict
malicious activity. When an indicator of compromise is detected, Palo Alto
Networks and Splunk work together to take action and remediate problems
automatically to keep the network secure.

13.

Question 13. Why Use Splunk With My Palo Alto Networks Products?
Answer :
Palo Alto Networks products provide exceptional levels of visibility into
network traffic and malicious activity, both in the network and on the
endpoint. Combining this visibility with Splunk allows a customer to make
correlations and perform analytics around different kinds of data. These
correlations can be between different kinds of Palo Alto Networks data, for
example, correlating Wildfire reports against traffic logs to detect infected
hosts, or correlating firewall logs with endpoint logs. But the real power of
Splunk is correlations and analytics across multiple sources of data and
multiple vendors, for example, correlating firewall logs with webserver logs,
or advanced endpoint security logs with Windows event logs

Вам также может понравиться