Firewall Concepts and Configuration

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/36

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts related to Next-Generation Firewalls (NGFWs) and their configuration, including security policies, network address translation, application identification, and SSL/TLS.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

What is the primary function of a Next-Generation Firewall (NGFW)?

To integrate multiple security functions into a single platform for better protection, visibility, and control over network traffic.

2
New cards

Name three key features of Next-Generation Firewalls (NGFWs).

Security policy, NAT policy, application identification.

3
New cards

What is the "never trust, always verify" architecture model called?

Zero Trust architecture model

4
New cards

What are Palo Alto Networks' physical appliances for various deployment sizes called?

PA-Series

5
New cards

What is the default Management IP for initial firewall access?

192.168.1.1 (most models)

6
New cards

What is the configuration in an active setting on a firewall called?

Running config

7
New cards

What is the configuration called when changes are in progress?

Candidate config

8
New cards

What does the commit process do?

Activates candidate changes to running config

9
New cards

What advanced capability do NGFWs have regarding applications?

Application awareness: NGFWs can identify and control applications regardless of port, protocol, or encryption.

10
New cards

What integration capability do NGFWs have regarding users?

User identity integration: NGFWs can tie network activity to specific users, not just IP addresses.

11
New cards

What is the purpose of microsegmentation in the zero-trust model?

Creating granular security zones to contain breaches.

12
New cards

What is the purpose of a

Tap interface: Passive monitoring, can't control traffic

13
New cards

virtual wire

"Bump in the wire" deployment, no IP/MAC needed

14
New cards

Layer 3

Enables routing between interfaces, requires IP addresses

15
New cards

Define security zones.

Group interfaces with similar security requirements

16
New cards

What do virtual routers support?

Static and dynamic routing protocols

17
New cards

Regarding network segmentation, what does network segmentation limits?

Limits lateral movement of threats if one segment is compromised

18
New cards

Name another benefit of network segmentation.

Allows for more granular security policies and access controls

19
New cards

Tap interface more detail

Useful for initial network discovery and policy planning

20
New cards

What is a VLAN interface used for?

Allow multiple logical networks on a single physical interface

21
New cards

What does Interface Management Profiles do?

Control management access to the firewall itself via interfaces, important for securing the firewall from unauthorized access.

22
New cards

What is the purpose of path monitoring?

Helps ensure high availability by detecting upstream failures

23
New cards

What does a Security policies protect

network assets by allowing or blocking traffic based on criteria like source/destination zones, IP addresses, applications, users, etc.

24
New cards

What is used to define limit ports

define custom services

25
New cards

What do custom Tags allow for

grouping and filtering of rules and objects.

26
New cards

What is a Source NAT used for?

translates private source IPs to public IPs for outbound traffic.

27
New cards

Integrates with directory services

User-ID

28
New cards

What does NAT64 do?

Allows translation between IPv6 and IPv4 networks, aiding in IPv6 transition.

29
New cards

What is the primary goal of App-ID?

Identifies applications in network traffic to enable more granular control

30
New cards

What methods determine application with App-ID

signatures, protocol decoding, heuristics

31
New cards

Application shifts

A single network session may start as one application and shift to another

32
New cards

Some applications rely on other applications or protocols to function properly

Application Dependencies

33
New cards

Where can detail applciations traffic be found?

Logging and Reporting

34
New cards

What encrypts data for privacy?

SSL/TLS

35
New cards

What does PKI use to verify key owners

digital certificates

36
New cards

What does SSL do?

TLS operates at the application layer and encrypts data before sending it over the network

37
New cards

What is X.509?

the standard format for digital certificates