A firewall administrator has been tasked with ensuring that all Panorama-managed firewalls forward traffic logs to Panorama. In which section is this configured?
A firewall administrator has been tasked with ensuring that all Panorama-managed firewalls forward traffic logs to Panorama. In which section is this configured?A . Panorama > Managed Devices B. Monitor > Logs > Traffic C. Device Groups > Objects > Log Forwarding D. Templates > Device > Log SettingsView AnswerAnswer:...
Which statement is correct about the configuration of the interfaces assigned to an aggregate interface group?
An engineer wants to configure aggregate interfaces to increase bandwidth and redundancy between the firewall and switch. Which statement is correct about the configuration of the interfaces assigned to an aggregate interface group?A . They can have a different bandwidth. B. They can have a different interface type such as...
Which application will be used to identify traffic traversing the firewall?
An administrator creates a custom application containing Layer 7 signatures. The latest application and threat dynamic update is downloaded to the same firewall. The update contains an application that matches the same traffic signatures as the custom application. Which application will be used to identify traffic traversing the firewall?A ....
PBF can address which two scenarios? (Select Two)
PBF can address which two scenarios? (Select Two)A . forwarding all traffic by using source port 78249 to a specific egress interface B. providing application connectivity the primary circuit fails C. enabling the firewall to bypass Layer 7 inspection D. routing FTP to a backup ISP link to save bandwidth...
Which two actions can be taken on the firewall to allow the dropped traffic permanently?
A network engineer has discovered that asymmetric routing is causing a Palo Alto Networks firewall to drop traffic. The network architecture cannot be changed to correct this. Which two actions can be taken on the firewall to allow the dropped traffic permanently? (Choose two.)A . Navigate to Network > Zone...
If Panorama pushes the configuration of a dynamic update schedule to managed firewalls, but the configuration does not appear, what is the root cause?
An administrator has 750 firewalls. The administrator's central-management Panorama instance deploys dynamic updates to the firewalls. The administrator notices that the dynamic updates from Panorama do not appear on some of the firewalls. If Panorama pushes the configuration of a dynamic update schedule to managed firewalls, but the configuration does...
Which statement accurately describes service routes and virtual systems?
Which statement accurately describes service routes and virtual systems?A . Virtual systems that do not have specific service routes configured inherit the global service and service route settings for the firewall. B. Virtual systems can only use one interface for all global service and service routes of the firewall. C....
How does adding the WildFire subscription improve the security posture of the organization1?
An administrator has a PA-820 firewall with an active Threat Prevention subscription The administrator is considering adding a WildFire subscription. How does adding the WildFire subscription improve the security posture of the organization1?A . Protection against unknown malware can be provided in near real-time B. WildFire and Threat Prevention combine...
Based on this information, which two statements are correct?
View the screenshots. A QoS profile and policy rules are configured as shown. Based on this information, which two statements are correct? (Choose two.)A . DNS has a higher priority and more bandwidth than SSH. B. Google-video has a higher priority and more bandwidth than WebEx. C. SMTP has a...
Which method should the administrator use when creating Forward Trust and Forward Untrust certificates on the firewall for use with decryption?
During the implementation of SSL Forward Proxy decryption, an administrator imports the company's Enterprise Root CA and Intermediate CA certificates onto the firewall. The company's Root and Intermediate CA certificates are also distributed to trusted devices using Group Policy and GlobalProtect. Additional device certificates and/or Subordinate certificates requiring an Enterprise...