Deploy and Configure Features and Subscriptions |
17% |
Users are guided configuring App-ID, including tasks such as creating security rules using App-ID, transitioning port and protocol rules to App-ID rules, understanding the effects of application override on firewall functionality, creating customized apps and threats, and reviewing dependencies of App-ID. Additionally, assistance is offered in configuring GlobalProtect, covering aspects such as licensing, setting up gateways and portals, configuring the GlobalProtect agent, distinguishing between login methods, configuring Clientless VPN, establishing Host Information Profiles (HIPs), configuring multiple gateway agent profiles, and implementing split tunneling. |
Deploy and Configure Core Components |
20% |
To set up management profiles, Study4Exam guides users through configuring interface management profiles and SSL/TLS service profiles. In the deployment and configuration of security profiles, users learn to customize various security profiles and security profile groups. Additionally, the company explains the connection between URL filtering and credential theft prevention, as well as the utilization of usernames and domain names in HTTP header insertion. |
Deploy and Configure Firewalls Using Panorama |
17% |
Users are guided through the configuration of templates and template stacks, covering components configured within a template, the impact of the order of templates in a stack on firewall configuration deployment, the process of overriding a template value in a stack, configuring variables within templates, and the interaction between Panorama and devices concerning dynamic updates versions, policy implementation, and/or high availability (HA) peers. |
Core Concepts |
12% |
The course covers various security elements, including firewall components, Panorama components, PAN-OS subscriptions and their functionalities, plug-in components, heatmap and BPA reports, artificial intelligence operations (AIOps) and telemetry, IPv6, and Internet of Things (IoT) devices. |
Manage and Operate |
16% |
Users are guided in managing and setting up Log Forwarding, which involves identifying different types and levels of logs, managing external services, creating and handling tags, recognizing system and traffic issues using both web interface and command line tools, configuring Log Forwarding profiles and device log settings, monitoring logs, and customizing logging and reporting preferences. Additionally, the process to upgrade a Palo Alto Networks system is outlined, covering upgrades for single firewalls, high availability pairs, Panorama push deployments, and dynamic updates. Furthermore, users learn how to manage high availability functions, including link and path monitoring, configuring HA links, and handling failover situations. |
Troubleshooting |
18% |
Users are instructed on troubleshooting various network issues, starting with site-to-site tunnels, covering topics such as IPSec, GRE, one-to-one and one-to-many tunnels, and differences between route-based and policy-based remote hosts, including tunnel monitoring. Additionally, guidance is provided on troubleshooting interfaces, including transceivers, settings, aggregate interfaces, LACP, counters, and tagging. Users also learn troubleshooting decryption, which includes inbound decryption, SSL forward proxy, SSH proxy, identifying un-decryptable traffic, configuring exclusions and bypasses, and managing certificates. Troubleshooting routing issues is covered, encompassing dynamic routing, redistribution profiles, static routes, route monitoring, policy-based forwarding, multicast routing, and service routes. Finally, general troubleshooting techniques are discussed, including analyzing logs, performing packet captures (pcap), and generating reports. |
Official Information |
|
https://www.paloaltonetworks.com/services/education/palo-alto-networks-certified-network-security-engineer |