-
What is the difference between Layer 3, Layer 2, and Virtual Wire (V-Wire) modes?
-
What are the main deployment modes available in Palo Alto firewalls?
-
What is an App-ID, and why is it important?
-
What are Content-ID and User-ID in Palo Alto?
-
What is a Security Policy rule?
-
Explain the difference between Security Policy, NAT Policy, and QoS Policy.
-
What are Zones in Palo Alto, and how do they work?
-
What is the purpose of Virtual Routers in Palo Alto?
-
What are the default security rule actions (intra-zone, inter-zone, etc.)?
-
What is a Panorama in Palo Alto Networks?
-
What is a Security Profile? Give examples.
-
What are the management ports in a Palo Alto firewall?
-
What is the function of the management interface?
-
What is the difference between the management plane and data plane?
-
How does Palo Alto identify applications that use non-standard ports?
-
Explain the difference between Source NAT and Destination NAT.
-
What is the purpose of the NAT rule’s untrust-to-untrust configuration?
-
What is the order of policy evaluation in Palo Alto (NAT vs. Security)?
-
What are the steps to troubleshoot traffic not passing through the firewall?
-
How can you check session information for a specific traffic flow?
-
Explain the difference between session start logs and session end logs.
-
How does Palo Alto perform SSL Decryption?
-
What is the role of the Management Plane and Control Plane?
-
How do you perform packet captures on a Palo Alto Firewall?
-
What is a “commit” operation, and what happens during it?
-
How do you roll back a configuration in Palo Alto?
-
Explain the function of the GlobalProtect VPN.
-
What is a Zone Protection Profile, and how is it used?
-
What is the difference between DoS protection and Zone Protection?
-
How does Palo Alto detect and prevent threats (AV, Spyware, URL, WildFire)?
-
What is WildFire? How does it differ from Antivirus?
-
How does Palo Alto identify users without installing an agent?
-
What is the difference between a dynamic update and a content update?
-
How do you check logs for dropped packets or denied traffic?
-
Describe the packet flow in a Palo Alto Firewall.
-
How would you analyze a slow application issue behind a Palo Alto firewall?
-
What happens when a packet enters the firewall (from ingress to egress)?
-
How would you troubleshoot asymmetric routing issues?
-
How does Palo Alto handle HA (High Availability)?
-
What are the HA modes available (Active/Passive, Active/Active)?
-
How do you synchronize configurations between HA peers?
-
What are the common HA failover triggers?
-
Explain the process of SSL decryption — inbound vs. outbound.
-
How do you secure GlobalProtect using certificates?
-
What are the benefits of using Panorama for centralized management?
-
How can you use API calls to configure or monitor the Palo Alto firewall?
-
What is a "Dynamic Address Group," and when would you use it?
-
How do you integrate Palo Alto with LDAP/Active Directory for User-ID?
-
What are “Application Override” rules, and why would you need one?
-
What is session offloading, and when does it occur?
-
How does Palo Alto handle fragmented packets?
-
How do you identify and mitigate a DDoS attack in Palo Alto?
-
How can you check resource utilization (CPU, memory) on a firewall?
-
How do you debug policy match issues using the CLI?
