Which operation will impact the performance of the management plane?
A. Decrypting SSL sessions
B. Generating a SaaS Application report
C. Enabling DoS protection
D. Enabling packet buffer protection
Explanation :
In a Palo Alto Networks firewall, the management plane handles tasks such as configuration, logging, reporting, and communication with external systems (e.g., Panorama), while the data plane processes traffic, including security enforcement. Operations that impact the management plane’s performance are those that consume its CPU and memory resources, such as generating reports or processing logs. Among the options, generating a SaaS Application report involves the management plane analyzing traffic logs and application data to create detailed reports, which can significantly tax its resources, especially during peak usage or with large datasets. The Palo Alto Networks PAN-OS 11.1 Administrator’s Guide notes that report generation, particularly for application usage, is a management plane function that can lead to performance degradation if resource-intensive.
Why Other Options Are Incorrect:
A. Decrypting SSL sessions:
SSL decryption is performed by the data plane, which handles packet processing, including cryptographic operations. While it can increase data plane CPU usage, it does not directly impact the management plane. The PCNSE Study Guide confirms decryption is a data plane task
C. Enabling DoS protection:
DoS Protection profiles, which mitigate flood attacks, are enforced by the data plane through rate-limiting and packet inspection. The initial configuration occurs on the management plane, but the ongoing operation affects the data plane. The PAN-OS 11.1 Administrator’s Guide specifies DoS protection as a data plane function.
D. Enabling packet buffer protection:
Packet buffer protection addresses data plane resource exhaustion due to excessive buffering, managed entirely by the data plane. It does not involve management plane processing. The PCNSE Study Guide identifies this as a data plane optimization.
Practical Steps:
Monitor management plane performance via Device > High Availability > Resources or CLI command show running resource-monitor.
Schedule SaaS Application report generation (Monitor > Reports > SaaS Application Usage) during off-peak hours to minimize impact.
Optimize report settings (e.g., reduce time range or data granularity) if performance issues persist.
Commit changes and verify resource usage post-generation.
Additional Considerations:
Management plane performance can also be affected by high log rates or frequent Panorama syncs, but these are not listed options.
As of 11:23 AM PKT on Thursday, August 21, 2025, ensure any ongoing report generation aligns with current traffic patterns to assess impact accurately.
References:
Palo Alto Networks PAN-OS 11.1 Administrator’s Guide: Details management plane tasks, including report generation.
Palo Alto Networks PCNSE Study Guide: Differentiates management plane (e.g., reporting) from data plane (e.g., decryption, DoS) functions.
You are auditing the work of a co-worker and need to verify that they have matched the Palo Alto Networks Best Practices for Anti-Spyware Profiles. For which three severity levels should single-packet captures be enabled to meet the Best Practice standard? (Choose three.)
A. Low
B. High
C. Critical
D. Informational
E. Medium
Explanation:
Palo Alto Networks publishes Threat Prevention Best Practices that define recommended settings for Security Profiles (Vulnerability, Anti-Spyware, AV, URL, etc.).
For Anti-Spyware Profiles, best practices include:
Enable single-packet capture for severities Medium, High, and Critical
→ This allows administrators to analyze malicious sessions more effectively without capturing unnecessary benign traffic.
Do NOT enable packet capture for Low or Informational severities
→ These typically represent lower-risk or informational events that would unnecessarily consume disk space and processing.
🔹 So, Medium + High + Critical = the three severity levels where single-packet capture should be enabled.
Why not the others?
A. Low ❌ → Too much noise, not best practice.
D. Informational ❌ → Only logs metadata, doesn’t require packet capture.
Reference:
Palo Alto Networks TechDocs: Anti-Spyware Profile Best Practices
Best Practice Guidance: Enable Single-Packet Capture for medium, high, and critical severities.
An administrator plans to install the Windows-Based User-ID Agent. What type of Active Directory (AD) service account should the administrator use?
A. Dedicated Service Account
B. System Account
C. Domain Administrator
D. Enterprise Administrator
Explanation:
When installing the Windows-based User-ID Agent, Palo Alto Networks recommends using a Dedicated Service Account in Active Directory. This account should have just enough privileges to perform the necessary tasks — specifically:
Read access to security event logs on domain controllers
Permission to query user login events
Access to group membership information (if using group mapping)
This approach follows least privilege principles, reducing risk while ensuring functionality.
📚 Reference:
Palo Alto Networks – Configure the Windows User-ID Agent
❌ Why Other Options Are Wrong:
B. System Account:
Not usable for domain-level access; it's local to the machine.
C. Domain Administrator:
Overly privileged; not recommended for security reasons.
D. Enterprise Administrator:
Even more privileged than Domain Admin — unnecessary and risky.
A firewall engineer at a company is researching the Device Telemetry feature of PAN-OS. Which two aspects of the feature require further action for the company to remain compliant with local laws regarding privacy and data storage? (Choose two.)
A. Telemetry feature is automatically enabled during PAN-OS installation.
B. Telemetry data is uploaded into Strata Logging Service.
C. Telemetry feature is using Traffic logs and packet captures to collect data.
D. Telemetry data is shared in real time with Palo Alto Networks.
Explanation:
What Device Telemetry Does:
Device Telemetry in PAN-OS allows Palo Alto Networks to collect information from firewalls to improve product reliability, threat prevention, and customer support.
Data types include device health, configuration usage, feature adoption, threat samples, and system statistics.
Privacy/Security Consideration:
Since the data goes outside the company’s infrastructure, an organization must ensure compliance with local data privacy and data storage laws (e.g., GDPR in EU).
Option Review
A. Telemetry feature is automatically enabled during PAN-OS installation. ❌
→ False. By default, Device Telemetry is disabled. It must be explicitly enabled by an administrator.
B. Telemetry data is uploaded into Strata Logging Service. ✅
→ Correct. Data is stored in Palo Alto’s Strata Logging Service (SLS), which may be hosted in specific regions (e.g., US, EU). If regulations restrict data export, the company must review this.
C. Telemetry feature is using Traffic logs and packet captures to collect data. ❌
→ Incorrect. Device Telemetry does not use packet captures or forward raw traffic logs. It collects metadata/statistics/configuration health only.
D. Telemetry data is shared in real time with Palo Alto Networks. ✅
→ Correct. Because telemetry data is streamed to PAN in near-real time, companies under strict privacy laws must confirm whether this sharing complies with legal requirements.
Reference:
Palo Alto Networks TechDocs – About Device Telemetry
Palo Alto KB – Device Telemetry FAQ
An organization has recently migrated its infrastructure and configuration to NGFWs, for which Panorama manages the devices. The organization is coming from a L2-L4 firewall vendor, but wants to use App-ID while identifying policies that are no longer needed. Which Panorama tool can provide a solution?
A. Application Groups
B. Policy Optimizer
C. Test Policy Match
D. Config Audit
Explanation:
1.Problem Context
The organization is coming from an L2–L4 firewall vendor (so their legacy policies are mostly port-based).
They want to start leveraging Palo Alto Networks’ App-ID for Layer 7 visibility and control.
They also want to identify policies that are no longer needed (e.g., unused or shadowed rules).
2.Policy Optimizer in Panorama
Policy Optimizer helps administrators:
Convert legacy port-based rules → into App-ID based rules.
Find rules that are unused (never hit).
Find rules that are too broad (allowing "any app" or "any service").
Refine rules to improve security posture and reduce attack surface.
Why not the others?
A. Application Groups ❌
→ Just a way to group multiple App-IDs together for easier policy management. Does not help identify unused/port-based rules.
C. Test Policy Match ❌
→ Used for testing which rule a specific traffic flow would match. It won’t optimize policies.
D. Config Audit ❌
→ Compares running vs. candidate configurations (or between snapshots). Good for change tracking, not for identifying unused policies.
Reference
Palo Alto TechDocs – Policy Optimizer
PANW Best Practices – Security policy migration guide
The server team is concerned about the high volume of logs forwarded to their syslog server, it is determined that DNS is generating the most logs per second. The risk and compliance team requests that any Traffic logs indicating port abuse of port 53 must still be forwarded to syslog. All other DNS. Traffic logs can be exclude from syslog forwarding. How should syslog log forwarding be configured?
A. With (port,dst neq 53)’ Traffic log filter Object > Log Forwarding.
B. With ‘(port dst neq 53)’ Traffic log filter inside Device > log Settings.
C. With ‘(app neq dns-base)’’ Traffic log filter inside Device> Log Settings.
D. With ‘(app neq dns-base)’’ Traffic log filter inside Objects> Log Forwarding
Explanation:
The server team has identified a high volume of logs forwarded to their syslog server, with DNS traffic (using port 53) being the primary contributor. The risk and compliance team requires that Traffic logs indicating port abuse on port 53 (destination port 53) still be forwarded to syslog, while all other DNS Traffic logs should be excluded. In Palo Alto Networks firewalls, log forwarding to external servers like syslog is configured to filter specific log types and conditions. The correct approach is to use a Traffic log filter within the Device > Log Settings to exclude logs where the destination port is not 53 (i.e., non-port-53 DNS traffic), ensuring only relevant port 53 abuse logs are sent. The filter syntax (port dst neq 53) means "destination port not equal to 53," effectively excluding non-port-53 DNS logs while allowing port 53 logs to pass. The Palo Alto Networks PAN-OS 11.1 Administrator’s Guide details that log filters in Device > Log Settings control which logs are forwarded, making option B correct.
Why Other Options Are Incorrect:
A. With (port,dst neq 53)’ Traffic log filter Object > Log Forwarding:
This is incorrect due to a syntax error (missing quotes and incorrect comma usage; should be (port dst neq 53)). Additionally, Objects > Log Forwarding defines where logs are sent (e.g., syslog server), not the filter conditions. The PCNSE Study Guide clarifies that filters are set in Device > Log Settings.
C. With ‘(app neq dns-base)’ Traffic log filter inside Device > Log Settings:
This is incorrect because excluding the dns-base application (which matches DNS traffic regardless of port) would remove all DNS-related logs, including those with port 53 abuse that the compliance team requires. The PAN-OS 11.1 Administrator’s Guide notes that app neq dns-base is too broad for this requirement.
D. With ‘(app neq dns-base)’ Traffic log filter inside Objects > Log Forwarding:
This is incorrect for two reasons: the app neq dns-base filter excludes all DNS logs (including port 53), violating the requirement, and Objects > Log Forwarding is for defining forwarding profiles, not applying filters. The PCNSE Study Guide confirms filters belong in Device > Log Settings.
Practical Steps:
Navigate to Device > Log Settings.
Select the Traffic log type.
Add a filter with the condition (port dst neq 53) to exclude non-port-53 DNS logs.
Ensure the syslog server is configured under Objects > Log Forwarding and linked to the Traffic log settings.
Commit the configuration.
Verify via Monitor > Logs > Traffic that only port 53 logs are forwarded to syslog.
References:
Palo Alto Networks PAN-OS 11.1 Administrator’s Guide: Details log filtering in Device > Log Settings.
Palo Alto Networks PCNSE Study Guide: Explains log forwarding configuration and filter syntax.
Which protocol is natively supported by GlobalProtect Clientless VPN?
A. HTP
B. SSH
C. HTTPS
D. RDP
Explanation:
GlobalProtect Clientless VPN is designed to allow users to securely access internal web applications without installing the GlobalProtect agent. It works by proxying traffic through the firewall using a browser-based interface.
The protocol it natively supports is:
HTTPS — because Clientless VPN is web-based and only proxies web applications that use secure HTTP.
📚 Reference:
Palo Alto Networks – Configure Clientless VPN
❌ Why Other Options Are Wrong:
A. HTP:
Typo — not a valid protocol.
B. SSH:
Not supported natively via Clientless VPN.
D. RDP:
Requires the full GlobalProtect agent or other remote access tools — not supported via Clientless VPN.
An internal audit team has requested additional information to be included inside traffic logs forwarded from Palo Alto Networks firewalls to an interal syslog server. Where can the firewall engineer define the data to be added into each forwarded log?
A. Data Patterns within Objects > Custom Objects
B. Custom Log Format within Device Server Profiles> Syslog
C. Built-in Actions within Objects > Log Forwarding Profile
D. Logging and Reporting Settings within Device > Setup > Management
Explanation:
The question asks where to define additional information to be included in each forwarded log. This is the exact purpose of a Custom Log Format.
Here’s the breakdown:
1.Location: The path is Device > Server Profiles > Syslog. Here, you create or edit a syslog server profile that defines where to send the logs.
2.Feature: Within each syslog server profile, there is a section called "Custom Log Format".
3.Function: This feature allows you to build a custom template for the log message that will be sent to the syslog server. You can add, remove, and rearrange the fields (variables) that are included in the log.
You can add fields that are not in the standard format, such as action, app-category, rule-name, src-vm-name, dst-vm-name, and many more.
This provides the flexibility to include the exact "additional information" requested by the audit team.
Steps to Configure:
Navigate to Device > Server Profiles > Syslog.
Edit an existing profile or create a new one.
Click the "Custom Log Format" toggle to enable it.
Use the drop-down menus to add the desired fields to the log format template.
Detailed Analysis of the Other Options:
A. Data Patterns within Objects > Custom Objects
Why it's wrong: Data Patterns are used to define custom strings of data (like credit card numbers or employee IDs) for use in Data Filtering profiles to detect and prevent data exfiltration. They are not used to modify the structure or content of log messages sent to syslog.
C. Built-in Actions within Objects > Log Forwarding Profile
Why it's wrong: This is a distractor. There is no menu called "Objects > Log Forwarding Profile". Log forwarding profiles are server profiles created under Device > Server Profiles > Syslog. "Built-in Actions" is not a term associated with log formatting.
D. Logging and Reporting Settings within Device > Setup > Management
Why it's wrong: This path (Device > Setup > Management) is where you configure fundamental logging parameters, such as:
The number of logs to store on the firewall.
The log export schedule.
The IP address of the Panorama management server.
It does not contain any settings for customizing the content or format of individual log messages forwarded to a syslog server.
Reference & Key Takeaway:
Core Concept: Understanding the difference between where to send logs (the server profile) and what to send (the log format). The Custom Log Format feature gives you granular control over the "what".
Use Case: This is essential for integration with third-party SIEM systems that may require a specific log format or need additional contextual fields for correlation and analysis.
Syntax: The custom format uses variables like $action, $rule, etc., to represent the data fields in the log message.
What happens when an A/P firewall pair synchronizes IPsec tunnel security associations (SAs)?
A. Phase 1 and Phase 2 SAs are synchronized over HA3 links.
B. Phase 2 SAs are synchronized over HA2 links.
C. Phase 1 and Phase 2 SAs are synchronized over HA2 links.
D. Phase 1 SAs are synchronized over HA1 links.
Explanation:
GlobalProtect Clientless VPN is designed to allow users to securely access internal web applications without installing the GlobalProtect agent. It works by proxying traffic through the firewall using a browser-based interface.
The protocol it natively supports is:
HTTPS — because Clientless VPN is web-based and only proxies web applications that use secure HTTP.
📚 Reference:
Palo Alto Networks – Configure Clientless VPN
❌ Why Other Options Are Wrong:
A. HTP:
Typo — not a valid protocol.
B. SSH:
Not supported natively via Clientless VPN.
D. RDP:
Requires the full GlobalProtect agent or other remote access tools — not supported via Clientless VPN.
A network security engineer is attempting to peer a virtual router on a PAN-OS firewall with an external router using the BGP protocol. The peer relationship is not establishing. What command could the engineer run to see the current state of the BGP state between the two devices?
A. show routing protocol bgp summary
B. show routing protocol bgp rib-out
C. show routing protocol bgp state
D. show routing protocol bgp peer
Explanation:
The show routing protocol bgp summary command is the most useful and common command for quickly checking the BGP status and identifying potential peering issues.
show routing protocol bgp summary:
This command provides a high-level overview of all BGP peerings configured on the virtual router. It shows the peer's IP address, its configured state, its operational state (e.g., Active, Idle, Established), the number of messages exchanged, and the number of prefixes received and advertised. The output of this command is the first place an engineer would look to confirm if the BGP session is "Established." If the state is anything other than "Established," it indicates a peering problem.
Why the Other Options are Less Suitable
B. show routing protocol bgp rib-out:
This command shows the BGP Routing Information Base (RIB) that is being advertised to a specific peer. It is used to troubleshoot issues with what routes are being sent out, not the state of the BGP peering itself. You would use this command after you've confirmed that the BGP peering is established.
C. show routing protocol bgp state:
This command is not a valid or standard command in the PAN-OS CLI for BGP. While other networking vendors might use a similar command, it doesn't exist in the PAN-OS BGP command set.
D. show routing protocol bgp peer:
This command provides detailed information about a specific BGP peer, including its configuration and statistics. While it's very useful for deep-dive troubleshooting, the show routing protocol bgp summary command is the most efficient first step to get a quick overview of all peerings and their current state. The summary command is the go-to for checking the BGP state from a high level.
An engineer has been given approval to upgrade their environment to the latest version of
PAN-OS.
The environment consists of both physical and virtual firewalls, a virtual Panorama, and
virtual log collectors.
What is the recommended order of operational steps when upgrading?
A. Upgrade the log collectors, upgrade the firewalls, upgrade Panorama
B. Upgrade the firewalls, upgrade log collectors, upgrade Panorama
C. Upgrade Panorama, upgrade the log collectors, upgrade the firewalls
D. Upgrade the firewalls, upgrade Panorama, upgrade the log collectors
Explanation:
Reasoning
When upgrading a mixed environment (Panorama, log collectors, firewalls), Palo Alto has strict guidance:
1.Upgrade Panorama first
Panorama must always be at equal or higher version than managed firewalls and log collectors, otherwise it can’t manage them.
First upgrade Panorama to the target base version (but don’t push configs yet).
2.Upgrade the Log Collectors
Since log collectors are managed via Panorama, they must also be upgraded before firewalls, so logging remains compatible.
3.Upgrade the Firewalls
Finally, upgrade managed NGFWs (physical + virtual).
This ensures compatibility across management and logging planes.
Reference:
Palo Alto Docs: Upgrade Sequence for PAN-OS (Panorama > Log Collectors > Firewalls)
Palo Alto Networks – Upgrade Best Practices
An administrator needs to identify which NAT policy is being used for internet traffic. From the Monitor tab of the firewall GUI, how can the administrator identify which NAT policy is in use for a traffic flow?
A. Click Session Browser and review the session details.
B. Click Traffic view and review the information in the detailed log view.
C. Click Traffic view; ensure that the Source or Destination NAT columns are included and review the information in the detailed log view.
D. Click App Scope > Network Monitor and filter the report for NAT rules.
Explanation:
The Session Browser is the most direct and real-time tool within the GUI to inspect active traffic flows and see exactly which policies are applied to them, including the NAT policy.
Here’s how to do it:
Navigate to the Monitor tab.
Click Session Browser.
Locate the session for the internet traffic in question. You can use filters (source/destination IP, port, etc.) to find it quickly.
Select the session and click on the tiny, right-facing arrow on the left side of the entry to expand it and view the Session Details.
In the detailed view, look for the NAT Policy field. This field will explicitly show the name of the NAT policy that was applied to this session.
This method provides a live, precise view of the policy applied to an active flow.
Detailed Analysis of the Other Options:
B. Click Traffic view and review the information in the detailed log view.
Why it's less ideal: The Traffic logs also contain NAT policy information. However, this method requires waiting for the session to end and be written to the log, then searching through historical data. The Session Browser provides immediate results for active sessions, making it the more efficient and direct tool for this specific task.
C. Click Traffic view; ensure that the Source or Destination NAT columns are included and review the information in the detailed log view.
Why it's less ideal: While technically correct that the Traffic logs contain this information (in fields like NAT Source IP and NAT Destination IP), it shares the same drawback as option B: it is not real-time. It relies on logged data. The Session Browser is the preferred GUI tool for investigating active flows.
D. Click App Scope > Network Monitor and filter the report for NAT rules.
Why it's wrong: App Scope is a reporting and analytics tool for understanding application and network usage trends over time. It is not designed for the granular task of identifying which specific NAT policy is being applied to a single, specific traffic flow. You cannot "filter for NAT rules" in a way that shows the policy name applied to a session.
PCNSE Exam Reference & Key Takeaway:
Core Concept: Knowing the right tool for the job within the Monitor tab.
Session Browser: For real-time inspection of active sessions (policies applied, NAT details, bytes transferred).
Traffic Logs: For historical analysis of ended sessions.
App Scope: For high-level trend reporting and usage analysis.
Troubleshooting: The Session Browser is the first place to go when you need to verify why a live traffic flow is behaving a certain way (e.g., Is the right NAT policy applied? Is the traffic hitting the expected security rule?).
CLI Equivalent: The CLI command show session all filter
Page 9 out of 27 Pages |
Previous |