Given the following configuration, which route is used for destination 10 10 0 4?
Why are external zones required to be configured on a Palo Alto Networks NGFW in an environment with multiple virtual systems?
External zones are a unique zone type on Palo Alto Networks firewalls that facilitate the movement of traffic between virtual systems on the same physical appliance. These zones are required when multiple virtual systems (vsys) are configured on a single firewall and there is a need to allow inter-vsys traffic without the need for the traffic to leave the firewall and re-enter. An external zone is associated with a specific virtual system and enables traffic to pass from one virtual system to another securely, thereby simplifying traffic management and reducing the need for additional physical interfaces or external routing to handle inter-vsys communication.
An engineer troubleshoots a high availability (HA) link that is unreliable.
Where can the engineer view what time the interface went down?
When you import the configuration of an HA pair into Panorama, how do you prevent the import from affecting ongoing traffic?
A firewall engineer creates a NAT rule to translate IP address 1.1.1.10 to 192.168.1.10. The engineer also plans to enable DNS rewrite so that the firewall rewrites the IPv4 address in a DNS response based on the original destination IP address and translated destination IP address configured for the rule. The engineer wants the firewall to rewrite a DNS response of 1.1.1.10 to 192.168.1.10.
What should the engineer do to complete the configuration?
Submit Cancel
Currently there are no comments in this discussion, be the first to comment!