Exam PCNSA All QuestionsBrowse all questions from this exam
Question 163

DRAG DROP -

Place the steps in the correct packet-processing order of operations.

Select and Place:

    Correct Answer:

    Reference:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0

Discussion
Mouna_cert

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0 1. Zone protection 2. Decryption 3. App-ID 4. Security profile enforcement

blackisok

I gree. Best explanation: https://networkinterview.com/packet-flow-in-palo-alto-detailed-explanation/

Ermbmx2

@blackisok Based on the link you provided this is incorrect. Decryption should be first as it is done in the Tunnel decapsulation of the the Ingress Stage. Zone Protection checks is done in the next Firewall Session Lookup Stage. Then Security Policy, then App-ID. So based on your link it should be 1. Decryption 2. Zone Protection 3. Security Profile 4. App-ID

leini

i think this is it too. Security profile should come first before App-ID. If not what App-ID does it know to check if it does not see the profile first.

Samurai55_1998_01

I believe that it goes in this order 1.Decryption 2.Zone protection 3.Security profile enforcement 4.App-ID

cert111

This seems right to me. Not sure why people are saying Zone protection comes first. The Palo Alto doc says that it's 3.1 - after decryption.

khaled_ellaboudy

1. Zone protection 2. Decryption 3. App id 4. Security profile enforcement

LetsDiscuss23

This is correct

markeloff23

Zone Protection Checks TCP State Check Forwarding (based on interface type) NAT Policy Lookup (only L3 & Virt wire) DoS Protection Policy Lookup Security Policy Lookup Session Allocation Firewall Session Fast Path (if packet from existing session) Security Processing Captive Portal Application Identification Content Inspection Forwarding/Egress (includes QoS)

Samurai55_1998_01

Where would you say that decryption process is taking place?

Ermbmx2

I would say it would have to be taking place first or else the contents of the packet wouldnt be able to be read to determine the remaining Zone/Security/App info.

Neil_Neo234

https://networkinterview.com/packet-flow-in-palo-alto-detailed-explanation/

davidmdlp85

The packet processing order in Palo Alto Networks firewalls typically follows these steps: Packet Ingress: Zone Protection: This is where the firewall evaluates if the packet complies with the security policies defined for the source and destination zones. Decryption: If the traffic is encrypted, the firewall decrypts the packet to inspect the decrypted content. Decryption is often performed using SSL decryption policies. App-ID (Application Identification): The firewall identifies the application associated with the traffic. This is a crucial step in allowing or blocking traffic based on the specific applications being used. Security Profile Enforcement: After the application is identified, security profiles (such as antivirus, anti-spyware, and vulnerability protection) are applied to the traffic to detect and prevent threats.

breal

This question is confusing as f*ck. It all depends on wether decryption is based on ssl proxy or VPN traffic And wether a session already exists or not. So if this would be adressing a NEW session of SSL Proxy traffic, the order should be 1. Zone protection 2. Decryption 3. App-ID 4. Security profile enforcement

Calica

Decryption Zone protection App-ID Security profile enforcement

dawlims

I think it should be Decryption, Zone Protection, App-ID then Security Profile enforcement. See link below. https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0

nolox

1. Zone protection 2. Security profile enforcement 3. Decryption 4. App id