lesson 7 Flashcards

1
Q

pan-os ssl decryption

A

-ssl/tls sessions can be decrypted and inspected to enforce security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

decryption types

A
  • ssl forward proxy (outbound)
  • ssl inbound inspection
  • ssh decryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

certificate chain of trust

A
  • hierarchical list of certificates used to authenticate
  • if a device contains the certificates of the root ca and intermediate ca it can verify a certificate within the chain of trust
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

certificate verification steps

A
  • determine chain of trust

- validate each certificate based on: valid signature, valid expiry date, no malformation or corruption, not revoked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

certificate revocation reasons

A
  • compromised key

- failed verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

preferred way to acquire a certificate in pan-os

A
  • generate a certificate signing request (csr)

- have the csr signed by a ca

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

csr process

A
  • generate csr on device
  • sign identity info with private key
  • send csr to ca
  • ca signs and returns the csr
  • signed request is installed on device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

certificate deployment option 1

A

-obtain a signing certificate from a third party ca

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

certificate deployment option 2

A

-use an internal ca to issue a signing certificate to the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

certificate deployment option 3

A

-generate a self signing certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ssl forward proxy decryption

A
  • decrypts and inspects ssl/tls traffic from internal users destined for external web servers
  • firewall first requests and verifies the external servers’ certificate, resulting in connection between firewall and server
  • firewall then signs the server’s certificate with its own and sends it to the client
  • the client verifies the firewall’s certificate, resulting in a connection between the client and firewall
  • if the server does not present a trusted certificate the firewall signs with untrust certificate and a block page is generated
  • the user can choose to proceed or terminate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ssl inbound inspection

A
  • used to check ssl connections from external hosts for threats
  • firewall requires copy of server’s public and private keys which allows the firewall to decrypt traffic in both directions
  • a decryption policy rule can be defined to inspect incoming ssl/tls connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ssl inbound inspection unsupported applications

A
  • apps that use client side certificates
  • non-rfc-compliant apps
  • servers using unsupported cryptographic settings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

no decryption

A
  • a decryption profile can be used to enforce minimum ssl security without having to decrypt the traffic
  • sessions with expired certificates, or untrusted issuers will be blocked
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

wildfire threat intelligence cloud

A
  • unknown file and url links from web traffic and email are automatically sent to wildfire threat intelligence cloud servers
  • the cloud analyses and generates malware signatures and verdicts
  • files can also be manually uploaded to wildfire for analyses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

wildfire markings

A
  • benign, does not exhibit malice
  • greyware, similar to malware but is not considered malicious
  • malware
  • phishing