EDU-110 Study
-
Palo Alto EDU-110: Active/Passive High Availability
Objectives: Describe the differences between active/active and active/passive high availability Define the prerequisites for creating a high availability pair Describe the metrics used to detect a firewall failure Configure the firewall interfaces used for heartbeats and hellos Configure a high availability pair Firewall High Availability Overview High availability is remains a concern for mission critical…
-
Palo Alto EDU 110: Monitoring and Reporting
Objectives: Create an interactive, graphical summary of the applications with the ACC Export policy rules, objects, and IPS signatures using the configuration table export Create a predefined report to view traffic statistics for the previous day Describe how log files are forwarded to an external source Configure a Server Profile to forward logs to a…
-
Palo Alto EDU-110: Site to Site VPNs
Objectives: Describe the three basic requirements for creating a VPN Configure the interface, IP addresses, and PSK for the IKE Gateway Configure the DH group, encryption methods, and authentication methods for an IKE Cryptographic profile Configure a static route in the route table for the tunnel Troubleshoot IPSec VPN issues from the responder side of…
-
Palo Alto EDU-110: Global Protect
Describe the three major components of GlobalProtect Configure the client and server certificates to authenticate the agent and the portal Define the three methods supported for GlobalProtect client connections Configure the tunnel parameters for an external gateway connection Extending the security platform with GlobalProtect GlobalProtect builds on the technology of and offers several features over…
-
Palo Altro EDU-110: User-ID
Objectives Describe the four main components of User-ID Describe the differences between the integrated agent and the Windows-based agent Define the methods to map IP addresses to users Configure the PAN-OS integrated agent to ocnnect to monitored servers Configure the Windows-based agent to probe IP addresses for username information User-ID’s Purpose The purpose of User-ID…
-
Palo Alto EDU-110: Wildfire
Objectives: Describe how a firewall works with WildFire Threat Intelligence Cloud Describe how WildFire analysis is used to update URL categories listed in the PAN-DB URL Filtering data Configure Session Information Settings to specify which type of session information will be sent to Wildfire Define a WildFire Analysis Profile Configure both the types of information…
-
Palo Alto EDU-110: Decryption
Objectives: Describe the benefits of decrypting traffic Define the three decryption types that can be configured at the firewall Describe how a certificate chain of trust is used to authenticate a device, service, or person Configure an SSL Forward Proxy Review Traffic logs to determine whether SSL sessions are being decrypted Why decrypt network traffic?…
-
Palo Alto EDU-110: URL Filtering
Objectives: Describe how the firewall uses PAN-DB database to filter user access to websites Configure a custom URL filtering profile to mimimise the number of blocked websites between trusted zones Configure safe search and logging options Configure access to only enterprise versions of SaaS applications The URL Filtering Feature Palo Alto networks maintns a PAN-DB…
-
Palo Alto EDU-110: Content-ID
Objectives: Describe the seven different Security Policy Types Define the two predefined Vulnerability Protection Profiles Configure Security Profiles to rpevent virus and spyware infiltration Configure File Blocking Profiles to identify and control the flow of file types through the firewall Configure a DoS profile to help mitigate Layer 3 and Layer 4 protocol based attacks…
-
Palo Alto EDU-110: App-ID
Objectives: Define application identification Describe four major technologies to help identify applications Configure application filters and application groups Detect unidentifeid applications that traverse the firewall Configure scheduling to Application ID What is an application? An application is a specific program or feature whose commuinications can be labeled, monitored and controlled Applications will include business tools…