Lecture 3 pt 1. Flashcards
What is NIST? What are the benefits of its approach?
It’s a layered approach to security. If an attacker breaks through one layer, there are more layers protecting the system
Can you have redundancy with standalone installations?
Yes
Can you have automatic failover with standalone firewalls?
No
What does Checkpoint provide over Fortinet?
Application Control
Identity-Based Security Policies
Centralized Management
Name the 4 things we track to monitor NGFW performance
Throughput
Latency
Session Counts
CPU and Memory Usage
Name this: Measures the amount of data the firewall can process within a given time frame
Throughput
Name this: The time it takes for a packet to pass through the firewall
Latency
Name this: This can affect the performance of time-sensitive applications
Latency
Name this: We monitor this to ensure the firewall is not overwhelmed
Session Counts
What do the session counts tell us?
The number of concurrent sessions the firewall is handling
We also monitor the CPU and Memory usage for the firewall. What can High usage indicate?
The firewall is under stress and may become a bottleneck
Name 3 important things when managing NGFW policies for complex enterprise environments
- Centralized Management
- Segmentation
- Compliance checks
Name this important thing for managing a NGFW:
Provides a unified view and control over firewall rules across the entire network
Centralized Management
Name this important thing for managing a NGFW:
Divide the network into domains/segments to increase security and reduce complexity
Segmentation
Name this important thing for managing a NGFW:
Regularly ensure that the firewall policies and security configurations adhere to industry regulations, legal requirements, and internal security policies
Compliance checks
Separating _______ ________ (security gateways) from ___________ functions (policy control, logging, and monitoring) increases performance, _________, and scalability
firewall functions; management; isolation
T/F - By default, all Palo Alto interface come in Tap deployment mode
False, by default they all come in Virtual Wire mode
Name this: when in this mode, Palo Alto supports decryption, app-identification, content-identification, user-identification, and NAT
Virtual Wire mode
Name the 4 deployment modes of Palo Alto
Tap, Virtual Wire, Layer 2, Layer 3
T/F - Layer 2 deployment allows the configuration of multiple interfaces
True