Palo Alto Firewall Interview Questions and Answers

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Palo Alto Firewall Interview Questions and Answers

Ques 1. What is the role of Virtual Wire interface in Palo Alto firewall?
Virtual wire is a deployment method of Palo Alto NGFW deployment, where the firewall is
installed transparently on a network segment between two firewall ports and passes traffic
through as layer 2. Virtual wire is internal to the firewall since it performs the change
logically. We can create virtual wire sub interfaces to classify traffic according to an IP
address, IP range, or subnet. The best thing about virtual wire is that it does not require any
change to adjacent network devices

Ques 2. What is APP-ID?


App-ID is a feature in Palo Alto NGFW which enables us to see the applications on the
network and learn how they work, their behavioural characteristics and associated risks.
App-ID identifies application functions via multiple methods –
• Application signatures
• Decryption
• Protocol decoding
• Heuristics.
The App-ID service can block high risk applications, as well as high risk behaviour, such as
file-sharing, and traffic encrypted with the SSL protocol can be decrypted and inspected.

Ques 3. How does App-ID identify the application used in network?


Identification of the applications is the very 1st task performed by Palo Alto Networks NGFW
traversing the network using App-ID. Below are the identification mechanisms–
• Application protocol detection and decryption where application protocol is
determined and if SSL is in use, decrypts the traffic so that it can be analysed further.
• Application protocol decoding where it determines whether the initially detected
application protocol is the actual one, or if it is being used as a tunnel to hide the
actual application.
• Application signatures where Context-based signatures look for unique properties
and transaction characteristics to correctly identify the application regardless of the
port and protocol being used.
• Heuristics is applied for traffic that eludes identification by signature analysis.
Heuristics identifies any troublesome applications, such as P2P or VoIP tools that use
proprietary encryption
Ques 4. An administrator is finding it hard to manage multiple Palo Alto NGFW Firewalls. What
solution should he use to simplify and centrally manage Firewalls through singly source?
Panorama is the solution. Using Panorama we can centralize policy and firewall
management of a distributed network of firewalls.

Ques 5. What are key areas in which Panorama adds value?


The key benefits/ value add which can be reaped from Panorama are -
• Centralized configuration and deployment – Panorama simplifies central
management and rapid deployment of the firewalls on the network. Firewalls can be
assembled into groups, and templates can be created to apply on devices and use
device groups to administer rules.
• Aggregated logging for analysis and reporting – 1st activity logs are collected from
all the managed firewalls on the network and then centrally analysed, investigated
and finally reported. A comprehensive view of network traffic, user activity, and the
associated risks is showcased on Panorama.
• Distributed administration- Access can be delegated or restricted to global and local
firewall configurations and policies.

Ques 6. Which Palo Alto Networks solution targets endpoint security from successful Cyber-attacks?
TRAPS

Ques 7. What are different modes in which interfaces on Palo Alto can be configured?
When configuring the Ethernet ports on your firewall, we can have option to use in one of
below modes -
 Virtual wire
 Layer 2
 Layer 3 interface

Ques 8. Which command is used to Show the maximum log file size?
show system logdb-quota

Ques 9. What is function of Zone Protection profile?


Zone Protection Profiles offer protection against most common flood, reconnaissance, and
other packet-based attacks. For each security zone, we can define a zone protection profile
that specifies how the security gateway responds to attacks from that zone. The following
types of protection are supported -
 Flood Protection - Protects against SYN, ICMP, UDP, and other IP-based flooding
attacks.
 Reconnaissance detection- Allows you to detect and block commonly used port
scans and IP address sweeps that attackers run to find potential attack targets.
 Packet-based attack protection -Protects against large ICMP packets and ICMP
fragment attacks.
Ques 10. What is difference between Palo Alto NGFW and WAF?

Ques 11. What is U-Turn NAT?

U-Turn NAT refers to the logical path that traffic appears to travel when accessing an
internal resource when they resolve their external address. U-turn NAT is mostly used in a
network when internal users also need to access Web facing servers in DMZ Zone server
using the server’s external public IP address.
Ques 12. Explain the difference between Virtual Routers and Virtual Systems in Palo Alto?

Ques 13. A new customer wants to setup firewall to process 10Gbps of traffic. Which firewall
models could be recommended to the customer?
Below are the best possible Firewalls that can be proposed in customer environment
(requiring atleast 10 Gbps throughput)
 PA-5250 (40 Gbps)
 PA-5220 (20 Gbps)
 PA-3260 (10 Gbps)
Considering that fact that Firewall will be deployed for atleast 5 to 7 years, a higher
throughput is strongly recommended. For instance if 50% rise is throughput is expected
(which makes total throughput requirement as 15 Gbps), PA-5220 is the most suitable
candidate.

Ques 14. Which Dynamic Routing protocol cannot be configured on the Palo Alto Firewall?
EIGRP and IGRP

Ques 15. What is difference between stream-based application scanning and file-based
application scanning?
Stream-based scanning is a technique that begins scanning as soon as the first packets of
the file are received as opposed to waiting until the entire file is loaded into memory to
begin scanning. Stream-based scanning minimizes performance and latency issues by
receiving, scanning, and sending traffic to its intended destination immediately without
having to first buffer and then scan the file. On the other hand, File based scanning needs to
download the entire file before they can scan the traffic.
Ques 16. Which all IPS mechanisms are used for Content-ID to secure network from attacks?
IPS mechanisms used in Content-ID include -
 Protocol decoders and anomaly detection
 Stateful pattern matching
 Statistical anomaly detection
 Heuristic-based analysis
 Invalid or malformed packet detection
 IP defragmentation and TCP reassembly
 Custom vulnerability and spyware phone-home signatures

Ques 17. What widget allows administrators to quickly investigate security incidents by
correlating threats with applications and user identity?
Application Command Center (ACC)

Ques 18. Which all types of logs can be viewed on Palo Alto NGFWs?
 Traffic logs.
 Threat logs.
 URL Filtering logs.
 WildFire Submissions logs.
 Data Filtering logs.
 Correlation logs.
 Config logs.
 System logs.
 HIP Match logs
 Alarms logs
 Unified logs

Ques 19. A malicious file was not blocked by WildFire evaluation and somehow was allowed
to execute. Can such malicious activity still be blocked?
Yes, by Traps malware prevention modules (MPMs).

Ques 20. What is Wildfire? Explain its functioning?


WildFire provides detection and prevention of zero-day malware using a combination of
malware sandboxing and signature-based detection and blocking of malware. When a Palo
Alto Networks firewall detects an unknown sample, which may be a file or a link in an email,
the firewall can automatically forward the sample for WildFire analysis. The sample is
analysed and executed in the WildFire sandbox, where sample is determined to be benign,
grayware, or malicious. WildFire then generates signatures to recognize the newly-
discovered malware, and makes the latest signatures globally available every five minutes.
All Palo Alto Networks firewalls can then compare incoming samples against these
signatures to automatically block the malware first detected by a single firewall.
Ques 21. By default, what is the IP address of management port on Palo Alto Firewall and
default username/password?
Default IP address of management port is 192.168.1.1. From a browser, go to
https://192.168.1.1 and input the Username and password as admin/admin.

Ques 22. What is the key difference between superuser and device administrator?
A Superuser administrator can create virtual systems and add a Device Administrator,
vsysadmin, or vsysreader. A Device Administrator can access all virtual systems, but cannot
add administrators.

Ques 23. How many virtual systems can be carved out fromPA-800?
Palo Alto Firewall does not support Virtual Systems.

Ques 24. What are the HA modes in which Palo Alto Firewall can be configured?
 Active/Passive
 Active/Active

Ques 25. What is HA Lite?


HA Lite is an active/passive deployment that provides configuration synchronization and
some runtime data synchronization such as IPsec security associations. It does not support
any session synchronization (HA2), and therefore does not offer Stateful failover. The PA-
200 firewall supports HA Lite only.

Ques 26. Explain Active/Active HA in Palo Alto NGFW?


Active-Active HA is supported only in Virtual-Wire and Layer 3 modes. With Active-Active
deployment, both the devices are working as active in addition to processing of traffic.
Active-Active HA is supported only in the virtual-wire and Layer 3 modes. This type of
deployment is preferred for scenarios involving asymmetric routing. In addition to the HA1
and HA2 links used in active-passive, active-active deployments require a dedicated HA3 link.
This link is used as packet forwarding link for session setup and asymmetric traffic handling.

In an active-active cluster, the packet handling is performed by 2 important functions that


are handled by the devices in a cluster
 Session ownership
 Session setup
Session Ownership - Within an active–active cluster, the session owner device can be either
the firewall that receives the first packet of a new session or the device in an active-primary
state. This device is responsible for -
 All layer 7 processing
 Generating all traffic logs for the session
Session Setup - The session setup device is responsible for
 Layer2 through layer4 processing required for setting up a new session.
 Address translation is performed by the session setup device.

Ques 27. Explain Active/Passive HA in Palo Alto NGFW?


In scenario of Active/Passive HA, one firewall actively manages traffic while the other
continuously synchronizes and always ready to transition to the active state during event of
failure. In this mode, both firewalls share the same configuration settings, and one actively
manages traffic. When the active firewall fails, the passive firewall transitions to the active
state and takes over seamlessly and enforces the same policies to maintain network
security. Active/passive HA is supported in the virtual wire, Layer 2, and Layer 3
deployments. HA1 (config sync) and HA2 (state sync) are used in Active/Passive setup, while
HA3 is not required.
Ques 28. What are the different states of HA Firewall?
Different states of HA Firewall are enlisted below -
 Initial
 Active
 Passive
 Active-Primary
 Active-Secondary
 Tentative
 Non-functional
 Suspended

Ques 29. Which ports types are used in HA Pair?


 Control Link - The HA1 link is used to exchange hellos, heartbeats, and HA state
information, and management plane sync for routing and User-ID information. This
link is also used to synchronize configuration changes on either the active or passive
device with its peer.
 Data Link—The HA2 link is used to synchronize sessions, forwarding tables, IPsec
security associations and ARP tables between devices in an HA pair. Data flow
always flows from the active device to the passive device.
 Backup Links - Provide redundancy for the HA1 and the HA2 links. In-band ports are
used as backup links for both HA1 and HA2.
 Packet-Forwarding Link - In addition to HA1 and HA2 links, an active/active
deployment also requires a dedicated HA3 link. The firewalls use this link for
forwarding packets to the peer during session setup and asymmetric traffic flow.
The HA3 link is a Layer 2 link that uses MAC-in-MAC encapsulation. It does not
support Layer 3 addressing or encryption.
Ques 30. What are the prerequisites while configuring an HA pair?
Below are the pre-requisites for configuring an HA pair -
 The same model
 The same PAN-OS version
 The same multi virtual system capability
 The same type of interfaces
 The same set of licenses

Ques 31. The Palo Alto Networks firewall supports how many types of VPN deployments?
 Site-to-Site VPN - The simplest form of VPN that connects a central site and a
remote site, or a hub and spoke VPN that connects a central site with multiple
remote sites.
 Remote User-to-Site VPN – This VPN type uses the GlobalProtect agent to allow a
remote user to establish a secure connection with the firewall.
 Large Scale VPN - Provides a simplified mechanism to roll out a scalable hub and
spoke VPN with up to 1,024 satellite offices.

Ques 32. What is a service route? What interface is used by default to access external
services?
The firewall uses the management (MGT) interface by default to access external services
such as DNS servers, URL updates etc. An alternative to using the MGT interface is to
configure a data port which is a regular interface, to access these services. The path from the
interface to the service on a server is known as a service route. The service packets exit the
firewall on the port assigned for the external service and the server sends its response to the
configured source interface and source IP address.

Ques 33. How many zones can an interface be part of?


One

Ques 34. 2 Zones are configured on a Palo Alto Firewall. IP communication is not happening
between both zones. What is required to allow this?
Security policy rule must be implemented to allow traffic flow across source zone and
destination zone.
Ques 35. What interface options are available to manage Palo Alto Firewall?
 Web Interface
 Command Line Interface (CLI)
 XML API

Ques 36. Which file is mandatory for bootstrap process to function?


init‐cfg.txt

Ques 37. What is the basic approach to deploy/obtain certificates for Palo Alto Networks
firewalls?
 Obtain certificates from a trusted third‐party CA
 Obtain certificates from an enterprise CA
 Generate self‐signed certificates

Ques 38. What are different types of links related for Firewall HA?
 Control Link
 Data Link
 Backup Links
 Packet-Forwarding Link

Ques 39. What parameter decides a primary and secondary HA pair?


The firewalls in an HA pair can be assigned a device priority value to indicate a preference
for which firewall should assume the active or active‐primary role.

Ques 40. What is Application Command Center (ACC)?


The Application Command Center (ACC) provides insight about the activity within customer
network. It is an interactive, graphical summary of traffic traversing the network. This traffic
may be applications, users, URLs, threats, and content. ACC uses the firewall logs to provide
visibility into traffic patterns and actionable information on threats. ACC

Ques 41. An administrator wants to configure a Palo Alto Networks NGFW to provide
protection against worms and trojans. Which Security Profile type will protect against worms
and trojans?
Antivirus
Ques 42. Which virtualization platforms support the deployment of Palo Alto Networks VM-
Series firewalls?
 Boot Strap Virtualization Module (BSVM)
 Microsoft Hyper-V

Ques 43. A traffic log displays “incomplete” for a new application. What does that mean?
“Incomplete” signifies that new application traffic was not explicitly identified by App-ID.
Further, SYN or SYN-SYNACK-ACK for this new application is seen, but no data packet are
seen.

Ques 44. What are options available on Palo Alto firewall for forwarding the log messages?
 Syslog server
 SNMP manager
 Email
 Panorama

Ques 45. What happens when a URL matches multiple patterns (multiple custom URL filtering
categories and allow/block-list) within a URL filtering profile?
When that happens, the category chosen is the one that has the most severe action defined
as below (block being most severe and allow least severe).
 block
 override
 continue
 alert
 allow

Ques 46. What are actions available while filtering URLs?


Following are the available actions -
 Allow – Traffic is passed and no log generated
 Block – Traffic is blocked and block log generated
 Alert – Traffic is allowed and allow log generated
 Continue – User is warned that the site is questionable. Block- Continue log is
generated.
 Override – Traffic is blocked. User is offered chance to enter override password.
Block-Override log is generated.

Ques 47. Which are pre-defined administrator roles?


There are 6 pre-defined administrator roles:
- Superuser – All access to all options of all virtual systems.
- Superuser (read-only)
- Device Admin – Full access to the device except for creation of virtual systems and
administrative accounts.
- Device admin (read-only)
- Vsys Admin – Full access to a specific virtual system.
- Vsys admin (read-only)
Ques 48. What is Captive portal and its usage?
Captive portal is a feature on Palo Alto firewall which can be used for user identification.
When a user tries to access http or https sites, he will get prompted for captive portal
authentication page. After providing the username and password, user will be allowed to
access internet and firewall can enforce security policy.

Ques 49. How Does Panorama address new logs Logs when It Reaches Maximum Storage
limit?
Panorama automatically deletes older logs to create space for new ones.

Ques 50. What is the benefit of using Splunk with Palo Alto devices?
By combining the visibility of Palo Alto products with Splunk allows to make correlations and
perform analytics around different kinds of data. These correlations can be between
different kinds of Palo Alto Networks data. Furthermore, Splunk is responsible for correlating
and analytics across multiple sources of data and multiple vendors like correlating firewall
logs with webserver logs, or advanced endpoint security logs with Windows event logs.

You might also like