Palo Alto Firewall Interview Questions and Answers
Palo Alto Firewall Interview Questions and Answers
Palo Alto Firewall Interview Questions and Answers
Ques 1. What is the role of Virtual Wire interface in Palo Alto firewall?
Virtual wire is a deployment method of Palo Alto NGFW deployment, where the firewall is
installed transparently on a network segment between two firewall ports and passes traffic
through as layer 2. Virtual wire is internal to the firewall since it performs the change
logically. We can create virtual wire sub interfaces to classify traffic according to an IP
address, IP range, or subnet. The best thing about virtual wire is that it does not require any
change to adjacent network devices
Ques 6. Which Palo Alto Networks solution targets endpoint security from successful Cyber-attacks?
TRAPS
Ques 7. What are different modes in which interfaces on Palo Alto can be configured?
When configuring the Ethernet ports on your firewall, we can have option to use in one of
below modes -
Virtual wire
Layer 2
Layer 3 interface
Ques 8. Which command is used to Show the maximum log file size?
show system logdb-quota
U-Turn NAT refers to the logical path that traffic appears to travel when accessing an
internal resource when they resolve their external address. U-turn NAT is mostly used in a
network when internal users also need to access Web facing servers in DMZ Zone server
using the server’s external public IP address.
Ques 12. Explain the difference between Virtual Routers and Virtual Systems in Palo Alto?
Ques 13. A new customer wants to setup firewall to process 10Gbps of traffic. Which firewall
models could be recommended to the customer?
Below are the best possible Firewalls that can be proposed in customer environment
(requiring atleast 10 Gbps throughput)
PA-5250 (40 Gbps)
PA-5220 (20 Gbps)
PA-3260 (10 Gbps)
Considering that fact that Firewall will be deployed for atleast 5 to 7 years, a higher
throughput is strongly recommended. For instance if 50% rise is throughput is expected
(which makes total throughput requirement as 15 Gbps), PA-5220 is the most suitable
candidate.
Ques 14. Which Dynamic Routing protocol cannot be configured on the Palo Alto Firewall?
EIGRP and IGRP
Ques 15. What is difference between stream-based application scanning and file-based
application scanning?
Stream-based scanning is a technique that begins scanning as soon as the first packets of
the file are received as opposed to waiting until the entire file is loaded into memory to
begin scanning. Stream-based scanning minimizes performance and latency issues by
receiving, scanning, and sending traffic to its intended destination immediately without
having to first buffer and then scan the file. On the other hand, File based scanning needs to
download the entire file before they can scan the traffic.
Ques 16. Which all IPS mechanisms are used for Content-ID to secure network from attacks?
IPS mechanisms used in Content-ID include -
Protocol decoders and anomaly detection
Stateful pattern matching
Statistical anomaly detection
Heuristic-based analysis
Invalid or malformed packet detection
IP defragmentation and TCP reassembly
Custom vulnerability and spyware phone-home signatures
Ques 17. What widget allows administrators to quickly investigate security incidents by
correlating threats with applications and user identity?
Application Command Center (ACC)
Ques 18. Which all types of logs can be viewed on Palo Alto NGFWs?
Traffic logs.
Threat logs.
URL Filtering logs.
WildFire Submissions logs.
Data Filtering logs.
Correlation logs.
Config logs.
System logs.
HIP Match logs
Alarms logs
Unified logs
Ques 19. A malicious file was not blocked by WildFire evaluation and somehow was allowed
to execute. Can such malicious activity still be blocked?
Yes, by Traps malware prevention modules (MPMs).
Ques 22. What is the key difference between superuser and device administrator?
A Superuser administrator can create virtual systems and add a Device Administrator,
vsysadmin, or vsysreader. A Device Administrator can access all virtual systems, but cannot
add administrators.
Ques 23. How many virtual systems can be carved out fromPA-800?
Palo Alto Firewall does not support Virtual Systems.
Ques 24. What are the HA modes in which Palo Alto Firewall can be configured?
Active/Passive
Active/Active
Ques 31. The Palo Alto Networks firewall supports how many types of VPN deployments?
Site-to-Site VPN - The simplest form of VPN that connects a central site and a
remote site, or a hub and spoke VPN that connects a central site with multiple
remote sites.
Remote User-to-Site VPN – This VPN type uses the GlobalProtect agent to allow a
remote user to establish a secure connection with the firewall.
Large Scale VPN - Provides a simplified mechanism to roll out a scalable hub and
spoke VPN with up to 1,024 satellite offices.
Ques 32. What is a service route? What interface is used by default to access external
services?
The firewall uses the management (MGT) interface by default to access external services
such as DNS servers, URL updates etc. An alternative to using the MGT interface is to
configure a data port which is a regular interface, to access these services. The path from the
interface to the service on a server is known as a service route. The service packets exit the
firewall on the port assigned for the external service and the server sends its response to the
configured source interface and source IP address.
Ques 34. 2 Zones are configured on a Palo Alto Firewall. IP communication is not happening
between both zones. What is required to allow this?
Security policy rule must be implemented to allow traffic flow across source zone and
destination zone.
Ques 35. What interface options are available to manage Palo Alto Firewall?
Web Interface
Command Line Interface (CLI)
XML API
Ques 37. What is the basic approach to deploy/obtain certificates for Palo Alto Networks
firewalls?
Obtain certificates from a trusted third‐party CA
Obtain certificates from an enterprise CA
Generate self‐signed certificates
Ques 38. What are different types of links related for Firewall HA?
Control Link
Data Link
Backup Links
Packet-Forwarding Link
Ques 41. An administrator wants to configure a Palo Alto Networks NGFW to provide
protection against worms and trojans. Which Security Profile type will protect against worms
and trojans?
Antivirus
Ques 42. Which virtualization platforms support the deployment of Palo Alto Networks VM-
Series firewalls?
Boot Strap Virtualization Module (BSVM)
Microsoft Hyper-V
Ques 43. A traffic log displays “incomplete” for a new application. What does that mean?
“Incomplete” signifies that new application traffic was not explicitly identified by App-ID.
Further, SYN or SYN-SYNACK-ACK for this new application is seen, but no data packet are
seen.
Ques 44. What are options available on Palo Alto firewall for forwarding the log messages?
Syslog server
SNMP manager
Email
Panorama
Ques 45. What happens when a URL matches multiple patterns (multiple custom URL filtering
categories and allow/block-list) within a URL filtering profile?
When that happens, the category chosen is the one that has the most severe action defined
as below (block being most severe and allow least severe).
block
override
continue
alert
allow
Ques 49. How Does Panorama address new logs Logs when It Reaches Maximum Storage
limit?
Panorama automatically deletes older logs to create space for new ones.
Ques 50. What is the benefit of using Splunk with Palo Alto devices?
By combining the visibility of Palo Alto products with Splunk allows to make correlations and
perform analytics around different kinds of data. These correlations can be between
different kinds of Palo Alto Networks data. Furthermore, Splunk is responsible for correlating
and analytics across multiple sources of data and multiple vendors like correlating firewall
logs with webserver logs, or advanced endpoint security logs with Windows event logs.