Palo Alto Interview Questions and Answers
1. Palo Alto is a stateful firewall. What does it mean?
Ans. A stateful firewall means all the traffic that is transmitted through the firewall is matched against a session. Also, each session is matched against a security policy as well.
2. Palo Alto is touted as the next-generation firewall. What are the reasons for this?
Ans. Palo Alto has everything that is needed to call it the next-generation firewall. It has an intrusion prevention system. It also has application control features. In terms of delivery, it is much different from other vendors. It delivers the next generation features using a single platform.
3. What is the advantage of Palo Alto’s Single Pass Parallel Processing (SP3) architecture?
Ans. The following are the advantages of Single Pass Parallel Processing (SP3) architecture:
- High throughput and low latency
- Active security functions
- Provision of single and fully integrated policy
- Easier management of firewall policy
4. Why to use Palo Alto Networks together with My Splunk?
Ans. Palo Alto provides the visibility that is needed by Splunk to provide actionable and usable insights. Both Palo Alto and Splunk work together to keep the network secure.
5. What is the difference between PA-200 and PA-500 and the higher models?
Ans. Activities such as signature process and network processing are implemented on software in PA-200 and PA-500. However, the higher models contain a dedicated hardware processor.
6. Security policy rule contains addresses where NAT policy applies. Which address needs to be used in the security policy?
Ans. You need to use Pre-NAT address and Post-Nat zone.
7. When is U-turn NAT applicable? How to configure it?
Ans. When there is a need for the internal resources on a trust zone to access DMZ resources using public IP addresses of an untrusted zone, the U-turn NAT is applicable.
8. What is a Tap deployment mode?
Ans. The Tap deployment mode is the one, which allows monitoring of traffic passively across the network. It uses a tap or switch SPAN/mirror port for this purpose.
9. What is Virtual ware deployment mode?
Ans. In the Virtual ware deployment mode, the firewall is installed transparently on a network segment. The installation will be done by binding two interfaces into a single set.
10. What is a Layer2 deployment mode?
Ans. In the Layer2 deployment mode, multiple interfaces are configured into a virtual-switch or VLAN in L2 mode.
Related Article: What is Palo Alto
11. What is a Layer3 deployment mode?
Ans. In the Layer3 deployment mode, traffic is routed by a firewall across multiple interfaces. To do this, each interface needs to be assigned with an IP address. Besides, a virtual router also needs to be defined to route the traffic.
12. By default, which mode comes pre-configured in Palo Alto?
Subscribe to our youtube channel to get new updates..!
Ans. Palo Alto comes with Virtual Wire mode by default.
13. Which are the features Palo Alto supports when it is in Virtual Wire mode?
Ans. When in Virtual Wire mode, Palo Alto supports features such as App-ID, Decryption, Content-ID, User-ID, and NAT.
14. What is App-ID?
Ans. App-ID is the short form for Application Identification. It is the main component in Palo Alto. The responsibility of App-ID is to identify the applications, which traverse the firewalls independently.
15. What are the benefits of using Panorama in Palo Alto?
Ans. There are multiple benefits to using Panorama. Some of these benefits include:
- You can update the software in bulk with a single click.
- You can get a complete report, which enables you to validate the compliance status.
- You can use Panorama logs from managed services, which enables solving logging issues.
16. What are the main areas Panorama adds value to?
Ans. The following are the main areas in which Panorama adds value:
- Distributed administration, which enables to control and delegate access to firewall configurations locally and globally.
- Centralized configuration and deployment.
- Logging (aggregated) with central oversight for analysis and reporting.
17. What is U-Turn NAT in Palo Alto?
Ans. U-turn NAT is a logical path used in a network. In U-turn NAT, the users have to access the internal DMZ server. For this purpose, they use the external IP address of that server.
18. What is a virtual router in Palo Alto?
Ans. A virtual router is a function of the firewall, which is a part of Layer 3 routing.
19. What is a virtual system in Palo Alto?
Ans. A virtual system is an exclusive and logical firewall in Palo Alto. Being an independent firewall, the traffic in a virtual system is kept separate.
20. What is the endpoint security in Palo Alto?
Ans. Endpoint security ensures the protection of individual access points in the network and sensitive data. It is a process, which illustrates techniques, tools, and applications or products, which can be used to protect the devices including computer systems, laptops, and smartphones, etc.
21. What is a Single Pass processing architecture?
Ans. Single-pass processing architecture operates only once on a packet. Similarly, activities such as policy lookup, application identification, networking functions, and decoding, and signature matching are also will be performed only once when a packet is processed. Even the content is also scanned only once in the Single-pass processing architecture.
22. What is a Zone Protection profile?
Ans. Using the Zone protection profile, you can get protection from attacks such as flood, reconnaissance, and packet-based attacks, etc. It provides you protection from flood attacks such as SYN, ICMP, and UDP, etc. The reconnaissance protection enables you to defend against port scans and host sweeps. In the case of packet-based protection, you can get protection from large ICMP packets and ICMP fragment attacks.
23. What is a WAF? What purpose does it serve?
Ans. WAF is the short form of a Web Application Firewall. It monitors web applications for security issues, which may arise due to errors in the code.
24. Which are the log types that can be viewed in Palo Alto?
Ans. You can view Traffic Logs, Threat Log, URL Filtering Logs, WildFire Submissions Logs, Data Filtering Logs, Correlation Logs, Tunnel Inspection Logs, Unified logs, HIP Match logs, GTP logs, SCTP logs, System logs, Alarm logs, and Configuration logs, etc.
25. What is the functioning of Palo Alto WildFire?
Ans. Palo Alto Wirefire highlights the threats that need more attention using a threat intelligence prioritization feature called AutoFocus. It is a cloud-based service, which provides malware sandboxing.
26. What are Active/Passive and Active/Active modes in Palo Alto?
Ans. These are the modes in which Palo Alto can be configured. Here is a brief of these modes:
- Active/Passive: This mode is supported in deployment types including virtual wire, Layer 2, and Layer 3. In this mode, the configuration settings are shared by both the firewalls. In case, the Active firewall fails, the Passive firewall becomes active and maintains the network security.
- Active/Active: This mode is supported in deployment types including virtual wire and Layer 3. In this mode, both the firewalls work synchronously and process the traffic.
27. What are HA1 and HA2 in Palo Alto?
Ans. HA1 and HA2 have dedicated HA ports. HA1 is a control link whereas HA2 is a data link. These links are used by firewalls to synchronize the data and maintain state information.
28. What is a HA in Palo Alto?
Ans. HA is the short form of High Availability. The HA is a deployment type in which two firewalls are placed together and configuration is synchronized. This is done to prevent a single point of failure in the network. This HA deployment enables redundancy and ensures the continuity of the business. In case, one firewall fails, the other one ensures maintaining the security of the traffic.
29. What is HALite in Palo Alto? What are its capabilities? Which are the features not available in HA Lite?
Ans. The high-availability feature on the PA-200 is called HA Lite in Palo Alto. The HA Lite provides a lighter version of HA capabilities. Some of the capabilities of HA Lite include - DHCP Lease information, PPPoE lease information, A/P High Availability without session sync, Failover of IPSec Tunnels, Configuration sync, and Layer 3 forwarding tables. Some of the features that are not available in HA include – Jumbo Frames, Link Aggregation, A/A High Availability, and A/P High Availability with session synchronization.
30. What is the VPN deployment type in which a GlobalProtect agent is used?
Ans. GlobalProtect agent is used in Remote User-to-Site VPN deployment. It is used to enable the remote user to establish a secure connection through the firewall.
31. Which are the media types that the firewall supports?
Ans. Palo Alto Networks firewall supports two media types, which include copper and fiber optic.
32. Which are the port types recommended to use in a HA pair in Palo Alto?
Ans. The recommended ports to be used in a HA are:
- HA1, HA1-A, and HA1-B - for HA control and synchronizing traffic
- HA2 and HSCI (High-Speed Chassis Interconnect ) ports - for HA session setup traffic
- AUX-1 and AUX-2 (multipurpose auxiliary ports) – for PA-5200 Series firewalls
33. What is an HSCI port?
Ans. It is a Layer 1 SFP+ interface. In a HA configuration, this port connects two PA-3200 series firewalls. This port can be used for HA2 and HA3 connection. Raw layer 1 traffic is transmitted on the HSCI ports.
34. What does GlobalProtect VPN support?
Ans. This GlobalProtect VPN supports clientless SSL VPN and provides access to the applications in the data center.
35. What are the log forwarding options supported in the Palo Alto firewall?
Ans. The log forwarding options supported in Palo Alto include the following:
- Forwarding of logs from firewalls to Panorama and from Panorama to external services
- Forwarding of logs from firewalls to Panorama and to external services in parallel
36. What is the purpose of the virtual wire interface in the Palo Alto firewall?
Ans. A virtual wire interface allows the transmission of traffic between two interfaces by binding them together.
37. What is The Application Command Center (ACC)?
Ans. The Application Command Center provides visibility into traffic patterns and actionable information on threats by using the firewall logs.
38. What is Application Override in Palo Alto?
Ans. Application override is used to override the App-ID (normal Application Identification) of specific traffic transmitted through the firewall.
39. What is the purpose of Palo Alto AutoFocus?
Ans. AutoFocus is a threat intelligence service, which provides easier identification of critical attacks so that effective action can be taken without the need for additional resources.
40. What is Application Incomplete in Palo Alto?
Ans. The Application Incomplete can be understood as - either the three-way TCP handshake is not completed or it is completed but there was no data to identify the application after the handshake.