Exam PCNSE All QuestionsBrowse all questions from this exam
Question 2

Refer to the exhibit.

An organization has Palo Alto Networks NGFWs that send logs to remote monitoring and security management platforms. The network team has reported excessive traffic on the corporate WAN.

How could the Palo Alto Networks NGFW administrator reduce WAN traffic while maintaining support for all the existing monitoring/security platforms?

    Correct Answer: A

    In the given scenario, the network team has reported excessive traffic on the corporate WAN due to the logs being sent from several remote firewalls to multiple monitoring and security management platforms. The best solution to reduce WAN traffic, while still supporting all existing platforms, is to centralize the log forwarding process. By forwarding logs from firewalls only to Panorama and then having Panorama forward logs to the other external services, you can significantly reduce the number of log streams traversing the WAN. This centralized approach minimizes the bandwidth consumption on the WAN link, as Panorama acts as an intermediate log aggregator and distributor. Additionally, it simplifies the log collection and forwarding architecture, leading to more efficient network resource usage and potentially improved overall system performance.

Discussion
quappayacre

Valid Question tinyurl.com/2y4nowqa

r4nq7b6l7f

Gratz man! What a coincidence that I was just passed from here too

AdamabdiOption: A

A is the correct https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKFCA0

niklausOption: A

Correct Answer: A Link: https://docs.paloaltonetworks.com/panorama/10-2/panorama-admin/panorama-overview/centralized-logging-and-reporting/log-forwarding-options PAN-OS: 10.2 Time of answer: May 30, 2022

king04Option: A

A is correct

tururu1496Option: A

Answer: A

Abu_MuhammadOption: A

It is A

NNgiggsOption: A

the correct answer is A. forwarding from Panorama reduces the number of log streams and cut down extra negotiation traffic per stream etc.

dehaOption: A

A is correct

shinichi_88Option: A

A, 100%, look at the 2nd picture https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKFCA0

scanossaOption: A

Based on documentation correct answer is A: Forward logs from firewalls to Panorama and from Panorama to external services—This configuration is best for deployments in which the connections between firewalls and external services have insufficient bandwidth to sustain the logging rate, which is often the case when the connections are remote. This configuration improves firewall performance by offloading some processing to Panorama. https://docs.paloaltonetworks.com/panorama/10-2/panorama-admin/panorama-overview/centralized-logging-and-reporting/log-forwarding-options

MarshpillowzOption: A

Answer A makes most sense to me.

lol12Option: A

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKFCA0 https://docs.paloaltonetworks.com/panorama/10-0/panorama-admin/panorama-overview/centralized-logging-and-reporting/log-forwarding-options.html

TAKUM1yOption: A

https://docs.paloaltonetworks.com/panorama/10-2/panorama-admin/panorama-overview/centralized-logging-and-reporting/log-forwarding-options

MyKasalaOption: A

A is correct

anbohmOption: A

Need to be A

MekoOption: A

Firewall logs -> Panorama -> Monitoring system

rquintanaOption: A

After reading the KB, I vote for option A.