lesson 5 Flashcards

1
Q

app-id

A
  • identifies apps

- rules can be created for specific apps not just ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

app-id traffic identification

A
  • only known apps can traverse the firewall
  • often only needs to examine one udp packet to identify the app
  • requires more packets to identify apps that use tcp (3 way handshake is insufficient)
  • if traffic is encrypted the firewall references the decryption policy to determine if the traffic should be allowed, blocked or decrypted and inspected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

app-id identification technologies

A
  • application signatures
  • unknown protocol decoder
  • known protocol decoder
  • protocol decryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

application signatures

A

-database of signatures that is regularly updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

unknown protocol decoder

A

-heuristics engine that attempts to identify apps based on network behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

known protocol decoder

A

-decoders that understand the syntax and commands of common apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

protocol decryption

A

-ssl/tls decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

app-id operation

A
  • extract ip/port
  • check security policy
  • if traffic is allowed, it is processed by the unknown protocol decoder, known protocol decoder, or the decryption policy
  • application signature
  • check security policy
  • allow or block
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

application shifts

A

-since security policy rules are examined for every packet, firewall can detect protocol changes within a session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

application dependencies

A

-when creating a security policy to allow an app you must also allow its’ dependencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

application filters

A
  • object that dynamically groups apps based on attributes selected from the app-id database
  • used when creating rules based on match criteria instead of specific apps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

app groups

A

-static admin defined set of apps that can be used to define a single policy for all of them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

application block page

A
  • notifies the user that their session is denied if they try to use a blocked web based application
  • can be enabled or disabled
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

updating app-id

A
  • app-id database is part of the application and threat content update packages
  • it is best practice to schedule download and install of application and threat content updates automatically
  • released on the third tuesday of each month
  • review period for app-id updates can be scheduled for manual review
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

content-id

A
  • combines real time threat prevention engine with policies to inspect and control content
  • provides threat prevention and data loss prevention
  • occurs after app-id
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

security profiles

A
  • applied to all traffic with an allow action in the security policy rule
  • represent additional checks that the allowed traffic must pass
  • events related to security profiles are recorded in the firewall threat log
17
Q

available security profiles

A
  • vulnerability protection
  • url filtering
  • anti spyware
  • antivirus
  • file blocking
  • data filtering
  • wildfire analysis
  • security profile group
18
Q

vulnerability protection security profiles

A
  • collections of vulnerability protection signatures grouped into rules
  • grouped by type (client/server)
  • grouped by severity (informational, low, medium, high, critical)
  • custom profiles can be added
  • exceptions allow legitimate network traffic that has triggered a false positive to pass
19
Q

antivirus security profiles

A
  • protects against common forms of viruses
  • scans files and transmission channel protocols
  • exceptions allow legitimate network traffic that has triggered a false positive to pass
20
Q

anti spyware security profiles

A
  • organized by severity (informational, low, medium, high, critical)
  • exceptions allow legitimate network traffic that has triggered a false positive to pass
21
Q

file blocking security profiles

A
  • blocks prohibited and suspicious files from being downloaded or uploaded
  • blocks based on file name extension and file contents
22
Q

file blocking actions

A
  • alert, logs and allows
  • continue, logs and allows with user permission
  • block, logs and blocks
23
Q

data filtering security profiles

A
  • patterns of data can be blocked

- useful for data loss prevention ex. credit card number

24
Q

denial of service protection

A
  • packet based

- mitigates layer 3 and 4 attacks designed to disrupt network operation

25
Q

dos protection types

A
  • zone protection profile

- end host protection profile

26
Q

zone protection profile

A
  • protects the internet edge (ingress)

- protects against syn, udp, and icmp floods by monitoring the number of new session requests per second

27
Q

url filtering

A
  • pan-db groups urls into categories
  • pan-os can access this db to filter access to the urls
  • custom url filtering rules and categories can be created
  • can be used for authentication, decryption, qos, and security policies
28
Q

url filtering user responses

A
  • html block pages are displayed

- if user is allowed to use the continue option they are time on the page is restricted for 15 minutes by default

29
Q

user credential detection

A

-blocks users from submitting their credentials to phishing sites

30
Q

http header insertion

A

-allows admins to enable the enterprise version of saas platforms

31
Q

http header insertion supported platforms

A
  • dropbox
  • google
  • office 365
  • youtube
32
Q

unkown urls

A
  • an unknown url indicates that the url has not yet been categorized by palo alto
  • best practice to configure exceptions for all known good unknown urls and then block access to all unknown urls