VPN traffic intended for an administrator's firewall is being maliciously intercepted and retransmitted by the interceptor.
When creating a VPN tunnel, which protection profile can be enabled to prevent this malicious behavior?
VPN traffic intended for an administrator's firewall is being maliciously intercepted and retransmitted by the interceptor.
When creating a VPN tunnel, which protection profile can be enabled to prevent this malicious behavior?
To protect against malicious interception and retransmission of VPN traffic, enabling Replay Protection is crucial. Replay protection defends against replay attacks, where an interceptor might capture and resend packets to gain unauthorized access or disrupt communication. By activating Replay Protection, you ensure that each packet is unique and can only be accepted once, which prevents attackers from successfully reusing intercepted traffic.
Terrible question as usual with PANW tests. There is no "Replay protection profile" this is a checkbox in the IPSec tunnel creation part (-_-)...
B. https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-web-interface-help/network/network-ipsec-tunnels/ipsec-tunnel-general-tab.html
B "If you choose Auto Key, specify the following:" "Enable Replay Protection—Select to protect against replay attacks. The anti-replay protocol is used to prevent hackers from injecting or making changes in packets that travel from a source to a destination and uses a unidirectional security association in order to establish a secure connection between two nodes in the network." Src: https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-web-interface-help/network/network-ipsec-tunnels/ipsec-tunnel-general-tab
https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-web-interface-help/network/network-ipsec-tunnels/ipsec-tunnel-general-tab
B is correct
Correct is B