Module 5 Connecting the firewall to Production Networks with Security Zones Flashcards
Why do we segment the network?
Several reasons, secure access to data, prevents additional access if one area is compromised.
How do we use segmentation in Palo Alto Firewalls?
We used network segmentation/security zones to reduce the attack surface. Palo Alto uses logical zones to group physical/virtual interfaces on the firewall.
What is interzone traffic?
Between zones
What is Intrazone traffic?
Its own zone
How do we support segmentation with the firewall?
We configure security policies which will allow traffic between certain zones (interzone).
Can traffic flow between zones in a Palo Alto firewall?
Traffic can flow freely within a zone, but you need a security policy rule that allows traffic between zones.
What is zero-trust architecture
Never trust, always verify. Inspect traffic flows to inbound traffic, outbound traffic to the internet and internal traffic between nodes and your data center.
How do we carry VLAN traffic?
ROAS, firewall (sub-interfaces) which can be used on a single physical interface. Ethernet1/1, 1/1.2, 1/1.3
What is the control plane?
What is the data plane?
What is your first task before creating a security policy?
Create a Security Zone
Specify zone type: Virtual Wire, layer 2, tap, layer 3, tunnel
Assign interfaces -
What are the different zone types?
Tap, Virtual Wire, Layer 2, Layer 3, Tunnel
What is Tap, what is its purpose?
Switch port analyzer, requires no changes to the existing network design. Does not block traffic, or control traffic. Passive collecting
What is virtual wire, what is its purpose?
NAT functionality provided. Inserted into existing network, without any re-allocation of network addresses or redesign on the network topology. *Bind two firewall interfaces together through a virtual wire object. No network changes for adjacent network devices. *Can block traffic.
What is a layer 3 zone type, what is its purpose?
Fucking route man. Firewall has a virtual router. App-ID, Content-ID, User-ID, SSL Decryption, NAT and QoS.