ExamGecko
Question list
Search
Search

Related questions











Question 371 - PCNSE discussion

Report
Export

A firewall engineer has determined that, in an application developed by the company's internal team, sessions often remain idle for hours before the client and server exchange any data. The application is also currently identified as unknown-tcp by the firewalls. It is determined that because of a high level of trust, the application does not require to be scanned for threats, but it needs to be properly identified in Traffic logs for reporting purposes.

Which solution will take the least time to implement and will ensure the App-ID engine is used to identify the application?

A.
Create a custom application with specific timeouts and signatures based on patterns discovered in packet captures.
Answers
A.
Create a custom application with specific timeouts and signatures based on patterns discovered in packet captures.
B.
Access the Palo Alto Networks website and raise a support request through the Customer Support Portal.
Answers
B.
Access the Palo Alto Networks website and raise a support request through the Customer Support Portal.
C.
Create a custom application with specific timeouts, then create an application override rule and reference the custom application.
Answers
C.
Create a custom application with specific timeouts, then create an application override rule and reference the custom application.
D.
Access the Palo Alto Networks website and complete the online form to request that a new application be added to App-ID.
Answers
D.
Access the Palo Alto Networks website and complete the online form to request that a new application be added to App-ID.
Suggested answer: C

Explanation:

For an application that is currently identified as unknown-tcp and has sessions that often remain idle for long periods, creating a custom application and using an application override rule is the most time-efficient solution.

C) The process involves:

Creating a custom application in the Palo Alto Networks firewall and configuring it with specific timeouts to accommodate the application's idle session behavior. This step ensures that the firewall does not prematurely close the application's sessions due to inactivity.

Next, creating an application override rule that references the custom application. This rule directs the firewall to identify traffic matching the rule criteria (such as source, destination, and port information) as the custom application, bypassing the App-ID engine's regular identification process.

This approach allows for the quick implementation of a solution that ensures the application is properly identified in traffic logs without undergoing threat scanning, meeting the requirements for both identification and reporting.

asked 23/09/2024
J Von
49 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first