4.1 4-About Palo Alto Networks

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

About Palo Alto Networks:

o Palo Alto is a City in California’s San Francisco Bay Area in USA.


o This Next-Generation Firewall is named by this City of USA.
o PA is USA Multinational cybersecurity company headquarters in California.
o Palo Alto Networks was founded in 2005 by Israeli-American Nir Zuk.
o Nir Zuk is former engineer from Check Point and NetScreen Technologies.
o World-class team with strong security and networking experience.
o Innovations of Palo Alto Firewall are App-ID, User-ID and Content-ID.
o Builds next-generation firewalls that identify & control more than 900 applications.
o Palo Alto Network is Global footprint presence in 50+ countries, 24/7 support.
o The company serves over 60,000 organizations in over 150 countries.
o Palo Alto Next-Generation firewall named Gartner Cool Vendor in the Year 2008.
o Former Google executive Nikesh Arora joined company as Chairman & CEO 2018.
o Palo Alto has been named Leader in Gartner Magic for Network Firewalls 8 time in a row.

PCNSE:
A Palo Alto Networks Certified Network Security Engineer (PCNSE) is capable of designing,
deploying, configuring, maintaining and trouble-shooting the vast majority of Palo Alto
Networks Operating Platform implementations.

PCNSE Palo Alto Networks Certified Network Security Engineer


Exam Name Network Security Engineer
Exam Number PCNSE PAN-OS 9
Exam Price $160 USD
Duration 80 minutes plus 30 minutes for non-English speakers
Number of Questions 75
Passing Score 70%
Exam Registration PEARSON VUE need to create new account
Exam Topics Plan 16%, Deploy and Configure 23%, Operate 20%,
Configuration Troubleshooting 18%, Core Concepts 23%
Exam Format Only MCQS (no drag & Drop, no Lab, no SIM etc)
Certification Validity Two Years

1 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


Palo Alto Firewall:

o The only firewall to identify, control & inspect your SSL encrypted traffic & applications.
o The only firewall with real-time content scanning to protect you against viruses.
o The only firewall to protect against spyware, data leakage & application vulnerabilities.
o The only next-generation firewall based on a stream-based threat prevention engine.
o Palo Alto unleashes the power of the cloud against threats known and unknown.
o Palo Alto is security application that allows or denies traffic by a single fingerprint.
o If one company experiences unique attack, all other subscribers’ networks are updated.
o You can allow certain functions of an application without blocking the entire application.

2 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


Single Pass:
o Palo Alto firewalls are based on a unique Single Pass Parallel Processing (SP3) Architecture.
o Single Pass Parallel Processing (SP3) enables high-throughput, low-latency network security.
o SP3, combines two components Single Pass software and Parallel Processing hardware.
o Palo Alto firewalls the single pass software performs an operation once per packet.
o Packet is processed, networking functions, policy lookup, application identification all once.
o Packet is decoding & signature matching for any & all threats & content all performed once.
o the single pass software in next-generation firewalls scans content once to avoid latency.
o This Single Pass traffic processing enables very high throughput and low latency.

Parallel Processing:
o The other critical piece of Palo Alto Networks SP3 Architecture is hardware.
o It is use Parallel Processing hardware to ensure Single Pass software runs fast.
o Palo Alto Networks engineers designed separate data plan and control plane.
o This separation means you can update the device while still keep forwarding going.
o Palo Alto firewall using multiple cores and processors will run checks in parallel.
o It is not re-compile files in order to scan them but scan stream for signature.
o Identification Technologies Transform the Firewall, App-ID, User-ID, and Content-ID.

3 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


App-ID (Application Identification) :
Is a combination of application signatures, protocol detection and decryption, protocol
encoding, and heuristics to identify Applications. This application identification is carried
through to the Content-ID functionality to scan and inspect applications appropriate to their
use as well as to the policy engine
Content-ID (Scan Content):
Single hardware accelerated signature format to scan traffic for data credit card numbers, social
security numbers, and custom patterns and Threats vulnerability exploits -IPS, viruses and
spyware plus a URL categorization engine to perform URL Filtering.
User-ID (Identify User):
Maps IP Address to Active Directory users and users to groups (roles) to enable visibility and
policy enforcement by user and group.

Single-Pass Architecture:
o PAN Firewall are optimized to only inspect the packet "ONE TIME", concurrently.
o At same time do Signature Matching, Security Processing & Networking Processing.
o All in Parallel to each other without having to re buffer same packet over & over again.
o Single-Pass performs the L7 classification and inspection Operations once per packet.
o Strength of Palo Alto Networks Firewall is its Single Pass Parallel Processing (SP3) engine.
o Every single layer of Protection Antivirus, Spyware, Data Filtering & Vulnerability protection.
o Palo Alto Networks Firewall all utilized the same stream-based signature format.
o allows PAN to buffer and inspect a packet at the same time, it can do all three in parallel.

4 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


The Control Plan & The Data Plane:
Control Plane:
o Management Functionality is provided via a dedicated control plan processor.
o Drives configuration management, logging & reporting, without touching data processing.
o Palo Alto Control Plan has its own Dual Core CPU, dedicated RAM, and dedicated RAM.

Data Plane:
o Palo Alto Firewall Data Plan It is the Traffic Forwarding Plan with different chip sets.
o Three functions Signature Match process inspects traffic built on Regular Expressions.
o The second function is Security Processors matches against Palo Alto security policies.
o And the last function is Network Processor is used for traffic forwarding etc.
Networking:
Packet Routing, Flow lookup, Stat Counts, NAT & All performed on Dedicated Network Pro.
Security:
User-ID, App-ID, & Policy Engine, all occur on multicore, Encrypting, Decryption, Decompression
Signature:
Content-ID performs Signature Lookups via a Dedicated FPGA with dedicated Memory.

5 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


o Other companies are going to claim they "bundle" everything into one device too.
o It goes through steps, zone, policy, UTM, finish with anti-spam, it does UTM anti-virus.

6 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717

You might also like