Visão Geral
Cursos Palo Alto Networks Certified Network Security Administrator PCNSA:
pode operar os firewalls de próxima geração da Palo Alto Networks para proteger as redes contra ameaças cibernéticas de ponta. A certificação PCNSA valida sua capacidade de configurar os recursos centrais do Palo Alto Networks Next Generation Firewall e a capacidade de implantar efetivamente os firewalls para permitir o tráfego de rede com base em quem (ID do usuário), o quê (ID do aplicativo) e quando (Política), tudo isso garantindo a segurança (Content-ID).
O exame PCNSA deve ser realizado por qualquer pessoa que queira demonstrar um conhecimento profundo das tecnologias da Palo Alto Networks, incluindo clientes que usam produtos da Palo Alto Networks, revendedores de valor agregado, engenheiros de sistemas de pré-vendas, integradores de sistemas e administradores de sistemas.
Conteúdo Programatico
Device Management and Services
Demonstrate the knowledge of firewall management interfaces
- Management interfaces
- Methods of access
- Access restrictions
- Identity-management traffic flow
- Management services
- Service routes
Provision local administrators
- Authentication profile
- Authentication sequence
Assign role-based authentication
Maintain firewall configurations
- Running configuration
- Candidate configuration
- Discern when to use load, save, import, and export
- Differentiate between configuration states 17
- Backup Panorama configurations and firewalls from Panorama
Push policy updates to Panorama-managed firewalls
- Device groups and hierarchy
- Where to place policies
- Implications of Panorama management
- Impact of templates, template stacks, and hierarchy
Schedule and install dynamic updates
- From Panorama
- From the firewall
- Scheduling and staggering updates on an HA pair
- References
Create and apply security zones to policies
- Identify zone types
- External types
- Layer 2
- Layer 3
- Tap
- VWire
- Tunnel
Identify and configure firewall interfaces
- Different types of interfaces
- How interface types affect Security policies
Maintain and enhance the configuration of a virtual or logical router
- Steps to create a static route
- How to use the routing table
- What interface types can be added to a virtual or logical router
Create and maintain address and address group objects
- How to tag objects
- Differentiate between address objects
- Static groups versus dynamic groups
Create and maintain services and service groups
Create and maintain external dynamic lists
- When to use filters versus groups
- The purpose of application characteristics as defined in the App-ID database
Policy Evaluation and Management
- Create an appropriate App-ID rule
- Rule shadowing
- Group rules by tag
- The potential impact of App-ID updates to existing Security policy rules
- Policy usage statistics
Differentiate specific security rule types
- Interzone
- Intrazone
- Universal
Configure security policy match conditions, actions, and logging options
- Application filters and groups
- Logging options
- App-ID
- User-ID
- Device-ID
- Application filter in policy
- Application group in policy
- EDLs
Identify and implement proper NAT policies
- Destination
- Source
Optimize Security policies using appropriate tools
- Policy test match tool
- Policy Optimizer
Securing Traffic
Compare and contrast different types of Security profiles
- Antivirus
- Anti-Spyware
- Vulnerability Protection
- URL Filtering
- WildFire Analysis
Create, modify, add, and apply the appropriate Security profiles and groups
- Antivirus
- Anti-Spyware
- Vulnerability Protection
- URL Filtering
- WildFire Analysis
- Configure Threat Prevention policy
Differentiate between Security profile actions
Use information available in logs
- Traffic
- Traffic
- Data
- System logs
Enable DNS Security to control traffic based on domains
- Configure DNS Security
- Apply DNS Security in policy
Create and deploy URL-filtering-based controls
- Apply a URL profile in a Security policy
- Create a URL Filtering profile
- Create a custom URL category
- Control traffic based on a URL category
- Why a URL was blocked
- How to allow a blocked URL
- How to request a URL recategorization
Differentiate between group mapping and IP-to-user mapping within policies and logs
- How to control access to specific locations
- How to apply to specific policies
- Identify users within the ACC and the monitor tab