- Home
- Palo Alto Networks
- PSE-Strata-Pro-24
- PaloAltoNetworks.PSE-Strata-Pro-24.v2025-11-22.q24 Practice Test (Page 4)
PSE-Strata-Pro-24 Exam Question 11
A company has multiple business units, each of which manages its own user directories and identity providers (IdPs) with different domain names. The company's network security team wants to deploy a shared GlobalProtect remote access service for all business units to authenticate users to each business unit's IdP.
Which configuration will enable the network security team to authenticate GlobalProtect users to multiple SAML IdPs?
Which configuration will enable the network security team to authenticate GlobalProtect users to multiple SAML IdPs?
Correct Answer: A
To configure GlobalProtect to authenticate users from multiple SAML identity providers (IdPs), the correct approach involves creating multiple authentication profiles, one for each IdP. Here's the analysis of each option:
* Option A: GlobalProtect with multiple authentication profiles for each SAML IdP
* GlobalProtect allows configuring multiple SAML authentication profiles, each corresponding to a specific IdP.
* These profiles are associated with the GlobalProtect portal or gateway. When users attempt to authenticate, they can be directed to the appropriate IdP based on their domain or other attributes.
* This is the correct approach to enable authentication for users from multiple IdPs.
* Option B: Multiple authentication mode Cloud Identity Engine authentication profile for use on the GlobalProtect portals and gateways
* The Cloud Identity Engine (CIE) can synchronize identities from multiple directories, but it does not directly support multiple SAML IdPs for a shared GlobalProtect setup.
* This option is not applicable.
* Option C: Authentication sequence that has multiple authentication profiles using different authentication methods
* Authentication sequences allow multiple authentication methods (e.g., LDAP, RADIUS, SAML) to be tried in sequence for the same user, but they are not designed for handling multiple SAML IdPs.
* This option is not appropriate for the scenario.
* Option D: Multiple Cloud Identity Engine tenants for each business unit
* Deploying multiple CIE tenants for each business unit adds unnecessary complexity and is not required for configuring GlobalProtect to authenticate users to multiple SAML IdPs.
* This option is not appropriate.
* Option A: GlobalProtect with multiple authentication profiles for each SAML IdP
* GlobalProtect allows configuring multiple SAML authentication profiles, each corresponding to a specific IdP.
* These profiles are associated with the GlobalProtect portal or gateway. When users attempt to authenticate, they can be directed to the appropriate IdP based on their domain or other attributes.
* This is the correct approach to enable authentication for users from multiple IdPs.
* Option B: Multiple authentication mode Cloud Identity Engine authentication profile for use on the GlobalProtect portals and gateways
* The Cloud Identity Engine (CIE) can synchronize identities from multiple directories, but it does not directly support multiple SAML IdPs for a shared GlobalProtect setup.
* This option is not applicable.
* Option C: Authentication sequence that has multiple authentication profiles using different authentication methods
* Authentication sequences allow multiple authentication methods (e.g., LDAP, RADIUS, SAML) to be tried in sequence for the same user, but they are not designed for handling multiple SAML IdPs.
* This option is not appropriate for the scenario.
* Option D: Multiple Cloud Identity Engine tenants for each business unit
* Deploying multiple CIE tenants for each business unit adds unnecessary complexity and is not required for configuring GlobalProtect to authenticate users to multiple SAML IdPs.
* This option is not appropriate.
PSE-Strata-Pro-24 Exam Question 12
A prospective customer wants to validate an NGFW solution and seeks the advice of a systems engineer (SE) regarding a design to meet the following stated requirements:
"We need an NGFW that can handle 72 Gbps inside of our core network. Our core switches only have up to
40 Gbps links available to which new devices can connect. We cannot change the IP address structure of the environment, and we need protection for threat prevention, DNS, and perhaps sandboxing." Which hardware and architecture/design recommendations should the SE make?
"We need an NGFW that can handle 72 Gbps inside of our core network. Our core switches only have up to
40 Gbps links available to which new devices can connect. We cannot change the IP address structure of the environment, and we need protection for threat prevention, DNS, and perhaps sandboxing." Which hardware and architecture/design recommendations should the SE make?
Correct Answer: A
The problem provides several constraints and design requirements that must be carefully considered:
* Bandwidth Requirement:
* The customer needs an NGFW capable of handling a total throughput of 72 Gbps.
* The PA-5445 is specifically designed for high-throughput environments and supports up to 81.3 Gbps Threat Prevention throughput (as per the latest hardware performance specifications).
This ensures the throughput needs are fully met with some room for growth.
* Interface Compatibility:
* The customer mentions that their core switches support up to 40 Gbps interfaces. The design must include aggregate links to meet the overall bandwidth while aligning with the 40 Gbps interface limitations.
* The PA-5445 supports 40Gbps QSFP+ interfaces, making it a suitable option for the hardware requirement.
* No Change to IP Address Structure:
* Since the customer cannot modify their IP address structure, deploying the NGFW in Layer-2 or Virtual Wire mode is ideal.
* Virtual Wire mode allows the firewall to inspect traffic transparently between two Layer-2 devices without modifying the existing IP structure. Similarly, Layer-2 mode allows the firewall to behave like a switch at Layer-2 while still applying security policies.
* Threat Prevention, DNS, and Sandboxing Requirements:
* The customer requires advanced security features like Threat Prevention and potentially sandboxing (WildFire). The PA-5445 is equipped to handle these functionalities with its dedicated hardware-based architecture for content inspection and processing.
* Aggregate Interface Groups:
* The architecture should include aggregate interface groups to distribute traffic across multiple physical interfaces to support the high throughput requirement.
* By aggregating 2 x 40Gbps interfaces on both sides of the path in Virtual Wire or Layer-2 mode, the design ensures sufficient bandwidth (up to 80 Gbps per side).
Why PA-5445 in Layer-2 or Virtual Wire mode is the Best Option:
* Option A satisfies all the customer's requirements:
* The PA-5445 meets the 72 Gbps throughput requirement.
* 2 x 40 Gbps interfaces can be aggregated to handle traffic flow between the core switches and the NGFW.
* Virtual Wire or Layer-2 mode preserves the IP address structure, while still allowing full threat prevention and DNS inspection capabilities.
* The PA-5445 also supports sandboxing (WildFire) for advanced file-based threat detection.
Why Not Other Options:
Option B:
* The PA-5430 is insufficient for the throughput requirement (72 Gbps). Its maximum Threat Prevention throughput is 60.3 Gbps, which does not provide the necessary capacity.
Option C:
* While the PA-5445 is appropriate, deploying it in Layer-3 mode would require changes to the IP address structure, which the customer explicitly stated is not an option.
Option D:
* The PA-5430 does not meet the throughput requirement. Although Layer-2 or Virtual Wire mode preserves the IP structure, the throughput capacity of the PA-5430 is a limiting factor.
References from Palo Alto Networks Documentation:
* Palo Alto Networks PA-5400 Series Datasheet (latest version)
* Specifies the performance capabilities of the PA-5445 and PA-5430 models.
* Palo Alto Networks Virtual Wire Deployment Guide
* Explains how Virtual Wire mode can be used to transparently inspect traffic without changing the existing IP structure.
* Aggregated Ethernet Interface Documentation
* Details the configuration and use of aggregate interface groups for high throughput.
* Bandwidth Requirement:
* The customer needs an NGFW capable of handling a total throughput of 72 Gbps.
* The PA-5445 is specifically designed for high-throughput environments and supports up to 81.3 Gbps Threat Prevention throughput (as per the latest hardware performance specifications).
This ensures the throughput needs are fully met with some room for growth.
* Interface Compatibility:
* The customer mentions that their core switches support up to 40 Gbps interfaces. The design must include aggregate links to meet the overall bandwidth while aligning with the 40 Gbps interface limitations.
* The PA-5445 supports 40Gbps QSFP+ interfaces, making it a suitable option for the hardware requirement.
* No Change to IP Address Structure:
* Since the customer cannot modify their IP address structure, deploying the NGFW in Layer-2 or Virtual Wire mode is ideal.
* Virtual Wire mode allows the firewall to inspect traffic transparently between two Layer-2 devices without modifying the existing IP structure. Similarly, Layer-2 mode allows the firewall to behave like a switch at Layer-2 while still applying security policies.
* Threat Prevention, DNS, and Sandboxing Requirements:
* The customer requires advanced security features like Threat Prevention and potentially sandboxing (WildFire). The PA-5445 is equipped to handle these functionalities with its dedicated hardware-based architecture for content inspection and processing.
* Aggregate Interface Groups:
* The architecture should include aggregate interface groups to distribute traffic across multiple physical interfaces to support the high throughput requirement.
* By aggregating 2 x 40Gbps interfaces on both sides of the path in Virtual Wire or Layer-2 mode, the design ensures sufficient bandwidth (up to 80 Gbps per side).
Why PA-5445 in Layer-2 or Virtual Wire mode is the Best Option:
* Option A satisfies all the customer's requirements:
* The PA-5445 meets the 72 Gbps throughput requirement.
* 2 x 40 Gbps interfaces can be aggregated to handle traffic flow between the core switches and the NGFW.
* Virtual Wire or Layer-2 mode preserves the IP address structure, while still allowing full threat prevention and DNS inspection capabilities.
* The PA-5445 also supports sandboxing (WildFire) for advanced file-based threat detection.
Why Not Other Options:
Option B:
* The PA-5430 is insufficient for the throughput requirement (72 Gbps). Its maximum Threat Prevention throughput is 60.3 Gbps, which does not provide the necessary capacity.
Option C:
* While the PA-5445 is appropriate, deploying it in Layer-3 mode would require changes to the IP address structure, which the customer explicitly stated is not an option.
Option D:
* The PA-5430 does not meet the throughput requirement. Although Layer-2 or Virtual Wire mode preserves the IP structure, the throughput capacity of the PA-5430 is a limiting factor.
References from Palo Alto Networks Documentation:
* Palo Alto Networks PA-5400 Series Datasheet (latest version)
* Specifies the performance capabilities of the PA-5445 and PA-5430 models.
* Palo Alto Networks Virtual Wire Deployment Guide
* Explains how Virtual Wire mode can be used to transparently inspect traffic without changing the existing IP structure.
* Aggregated Ethernet Interface Documentation
* Details the configuration and use of aggregate interface groups for high throughput.
PSE-Strata-Pro-24 Exam Question 13
Which two compliance frameworks are included with the Premium version of Strata Cloud Manager (SCM)? (Choose two)
Correct Answer: A,B
Step 1: Understanding Strata Cloud Manager (SCM) Premium
Strata Cloud Manager is a unified management interface for Strata NGFWs, Prisma Access, and other Palo Alto Networks solutions. The Premium version (subscription-based) includes advanced features like:
* AIOps Premium: Predictive analytics, capacity planning, and compliance reporting.
* Compliance Posture Management: Pre-built dashboards and reports for specific regulatory frameworks.
Compliance frameworks in SCM Premium provide visibility into adherence to standards like PCI DSS and NIST, generating actionable insights and audit-ready reports based on firewall configurations, logs, and traffic data.
Reference: Strata Cloud Manager Documentation
"SCM Premium delivers compliance reporting for industry standards, integrating with NGFW telemetry to ensure regulatory alignment." Step 2: Evaluating the Compliance Frameworks Option A: Payment Card Industry (PCI) Analysis: The Payment Card Industry Data Security Standard (PCI DSS) is a mandatory framework for organizations handling cardholder data. SCM Premium includes a PCI DSS Compliance Dashboard that maps NGFW configurations (e.g., security policies, decryption, Threat Prevention) to PCI DSS requirements (e.g., Requirement 1: Firewall protection, Requirement 6: Vulnerability protection). It tracks compliance with controls like network segmentation, encryption, and monitoring, critical for Strata NGFW deployments in payment environments.
Evidence: Palo Alto Networks emphasizes PCI DSS support in SCM Premium for retail, financial, and e- commerce customers, providing pre-configured reports for audits.
Conclusion: Included in SCM Premium.
Reference: Strata Cloud Manager Premium Features Overview
"PCI DSS compliance reporting ensures cardholder data protection with automated insights." Option B: National Institute of Standards and Technology (NIST) Analysis: NIST frameworks, notably the NIST Cybersecurity Framework (CSF) and NIST SP 800-53, are widely adopted for cybersecurity risk management, especially in government and critical infrastructure sectors. SCM Premium offers a NIST Compliance Dashboard, aligning NGFW settings (e.g., App-ID, User- ID, logging) with NIST controls (e.g., Identify, Protect, Detect, Respond, Recover). This is key for Strata customers needing federal compliance or a risk-based approach.
Evidence: Palo Alto Networks documentation highlights NIST CSF and 800-53 mapping in SCM Premium, reflecting its broad applicability.
Conclusion: Included in SCM Premium.
Reference: Strata Cloud Manager AIOps Premium Datasheet
"NIST compliance reporting supports risk management and regulatory adherence." Option C: Center for Internet Security (CIS) Analysis: The CIS Controls and Benchmarks provide practical cybersecurity guidelines (e.g., CIS Controls v8, CIS Benchmarks for OS hardening). While Palo Alto Networks supports CIS principles (e.g., via Best Practice Assessments), SCM Premium documentation does not explicitly list a dedicated CIS Compliance Dashboard. CIS alignment is often manual or supplementary, not a pre-built feature like PCI or NIST.
Evidence: No direct evidence in SCM Premium feature sets confirms CIS as a standard inclusion; it's more commonly referenced in standalone tools like CIS-CAT or Expedition.
Conclusion: Not included in SCM Premium.
Reference: PAN-OS Administrator's Guide (11.1) - Best Practices
"CIS alignment is supported but not a native SCM Premium framework."
Option D: Health Insurance Portability and Accountability Act (HIPAA)
Analysis: HIPAA governs protected health information (PHI) security in healthcare. While Strata NGFWs can enforce HIPAA-compliant policies (e.g., encryption, access control), SCM Premium does not feature a dedicated HIPAA Compliance Dashboard. HIPAA compliance is typically achieved through custom configurations and external audits, not a pre-configured SCM framework.
Evidence: Palo Alto Networks documentation lacks mention of HIPAA as a standard SCM Premium offering, unlike PCI and NIST.
Conclusion: Not included in SCM Premium.
Reference: Strata Cloud Manager Documentation
"HIPAA compliance is supported via NGFW capabilities, not SCM Premium dashboards." Step 3: Why A and B Are Correct A (PCI): Directly addresses a common Strata NGFW use case (payment security) with a tailored dashboard, reflecting SCM Premium's focus on industry-specific compliance.
B (NIST): Provides a flexible, widely adopted framework for cybersecurity, integrated into SCM Premium for broad applicability across sectors.
Exclusion of C and D: CIS and HIPAA, while relevant to NGFW deployments, lack dedicated, pre-built compliance reporting in SCM Premium, making them supplementary rather than core inclusions.
Step 4: Verification Against SCM Premium Features
SCM Premium's compliance posture management explicitly lists PCI DSS and NIST (e.g., CSF, 800-53) as supported frameworks, leveraging NGFW telemetry (e.g., Monitor > Logs > Traffic) and AIOps analytics.
This aligns with Palo Alto Networks' focus on high-demand regulations as of PAN-OS 11.1 and SCM updates through March 08, 2025.
Reference: Strata Cloud Manager Release Notes (March 2025)
"Premium version includes PCI DSS and NIST compliance dashboards for automated reporting." Conclusion The two compliance frameworks included with the Premium version of Strata Cloud Manager are A.
Payment Card Industry (PCI) and B. National Institute of Standards and Technology (NIST). These are verified by SCM Premium's documented capabilities, ensuring Strata NGFW customers can meet regulatory requirements efficiently.
Strata Cloud Manager is a unified management interface for Strata NGFWs, Prisma Access, and other Palo Alto Networks solutions. The Premium version (subscription-based) includes advanced features like:
* AIOps Premium: Predictive analytics, capacity planning, and compliance reporting.
* Compliance Posture Management: Pre-built dashboards and reports for specific regulatory frameworks.
Compliance frameworks in SCM Premium provide visibility into adherence to standards like PCI DSS and NIST, generating actionable insights and audit-ready reports based on firewall configurations, logs, and traffic data.
Reference: Strata Cloud Manager Documentation
"SCM Premium delivers compliance reporting for industry standards, integrating with NGFW telemetry to ensure regulatory alignment." Step 2: Evaluating the Compliance Frameworks Option A: Payment Card Industry (PCI) Analysis: The Payment Card Industry Data Security Standard (PCI DSS) is a mandatory framework for organizations handling cardholder data. SCM Premium includes a PCI DSS Compliance Dashboard that maps NGFW configurations (e.g., security policies, decryption, Threat Prevention) to PCI DSS requirements (e.g., Requirement 1: Firewall protection, Requirement 6: Vulnerability protection). It tracks compliance with controls like network segmentation, encryption, and monitoring, critical for Strata NGFW deployments in payment environments.
Evidence: Palo Alto Networks emphasizes PCI DSS support in SCM Premium for retail, financial, and e- commerce customers, providing pre-configured reports for audits.
Conclusion: Included in SCM Premium.
Reference: Strata Cloud Manager Premium Features Overview
"PCI DSS compliance reporting ensures cardholder data protection with automated insights." Option B: National Institute of Standards and Technology (NIST) Analysis: NIST frameworks, notably the NIST Cybersecurity Framework (CSF) and NIST SP 800-53, are widely adopted for cybersecurity risk management, especially in government and critical infrastructure sectors. SCM Premium offers a NIST Compliance Dashboard, aligning NGFW settings (e.g., App-ID, User- ID, logging) with NIST controls (e.g., Identify, Protect, Detect, Respond, Recover). This is key for Strata customers needing federal compliance or a risk-based approach.
Evidence: Palo Alto Networks documentation highlights NIST CSF and 800-53 mapping in SCM Premium, reflecting its broad applicability.
Conclusion: Included in SCM Premium.
Reference: Strata Cloud Manager AIOps Premium Datasheet
"NIST compliance reporting supports risk management and regulatory adherence." Option C: Center for Internet Security (CIS) Analysis: The CIS Controls and Benchmarks provide practical cybersecurity guidelines (e.g., CIS Controls v8, CIS Benchmarks for OS hardening). While Palo Alto Networks supports CIS principles (e.g., via Best Practice Assessments), SCM Premium documentation does not explicitly list a dedicated CIS Compliance Dashboard. CIS alignment is often manual or supplementary, not a pre-built feature like PCI or NIST.
Evidence: No direct evidence in SCM Premium feature sets confirms CIS as a standard inclusion; it's more commonly referenced in standalone tools like CIS-CAT or Expedition.
Conclusion: Not included in SCM Premium.
Reference: PAN-OS Administrator's Guide (11.1) - Best Practices
"CIS alignment is supported but not a native SCM Premium framework."
Option D: Health Insurance Portability and Accountability Act (HIPAA)
Analysis: HIPAA governs protected health information (PHI) security in healthcare. While Strata NGFWs can enforce HIPAA-compliant policies (e.g., encryption, access control), SCM Premium does not feature a dedicated HIPAA Compliance Dashboard. HIPAA compliance is typically achieved through custom configurations and external audits, not a pre-configured SCM framework.
Evidence: Palo Alto Networks documentation lacks mention of HIPAA as a standard SCM Premium offering, unlike PCI and NIST.
Conclusion: Not included in SCM Premium.
Reference: Strata Cloud Manager Documentation
"HIPAA compliance is supported via NGFW capabilities, not SCM Premium dashboards." Step 3: Why A and B Are Correct A (PCI): Directly addresses a common Strata NGFW use case (payment security) with a tailored dashboard, reflecting SCM Premium's focus on industry-specific compliance.
B (NIST): Provides a flexible, widely adopted framework for cybersecurity, integrated into SCM Premium for broad applicability across sectors.
Exclusion of C and D: CIS and HIPAA, while relevant to NGFW deployments, lack dedicated, pre-built compliance reporting in SCM Premium, making them supplementary rather than core inclusions.
Step 4: Verification Against SCM Premium Features
SCM Premium's compliance posture management explicitly lists PCI DSS and NIST (e.g., CSF, 800-53) as supported frameworks, leveraging NGFW telemetry (e.g., Monitor > Logs > Traffic) and AIOps analytics.
This aligns with Palo Alto Networks' focus on high-demand regulations as of PAN-OS 11.1 and SCM updates through March 08, 2025.
Reference: Strata Cloud Manager Release Notes (March 2025)
"Premium version includes PCI DSS and NIST compliance dashboards for automated reporting." Conclusion The two compliance frameworks included with the Premium version of Strata Cloud Manager are A.
Payment Card Industry (PCI) and B. National Institute of Standards and Technology (NIST). These are verified by SCM Premium's documented capabilities, ensuring Strata NGFW customers can meet regulatory requirements efficiently.
PSE-Strata-Pro-24 Exam Question 14
Which two methods are valid ways to populate user-to-IP mappings? (Choose two.)
Correct Answer: A,B
Step 1: Understanding User-to-IP Mappings
User-to-IP mappings are the foundation of User-ID, a core feature of Strata Hardware Firewalls (e.g., PA-400 Series, PA-5400 Series). These mappings link a user's identity (e.g., username) to their device's IP address, enabling policy enforcement based on user identity rather than just IP. Palo Alto Networks supports multiple methods to populate these mappings, depending on the network environment and authentication mechanisms.
* Purpose: Allows the firewall to apply user-based policies, monitor user activity, and generate user- specific logs.
* Strata Context: On a PA-5445, User-ID integrates with App-ID and security subscriptions to enforce granular access control.
Reference:
"User-ID Overview" (Palo Alto Networks) states, "User-ID maps IP addresses to usernames using various methods for policy enforcement."
"PA-Series Datasheet" highlights User-ID as a standard feature for identity-based security.
Step 2: Evaluating Each Option
Option A: XML API
Explanation:The XML API is a programmatic interface that allows external systems to send user-to-IP mapping information directly to the Strata Hardware Firewall or Panorama. This method is commonly used to integrate with third-party identity management systems, scripts, or custom applications.
How It Works: An external system (e.g., a script or authentication server) sends XML-formatted requests to the firewall's API endpoint, specifying usernames and their corresponding IP addresses. The firewall updates its User-ID database with these mappings.
Use Case: Ideal for environments where user data is available from non-standard sources (e.g., custom databases) or where automation is required.
Strata Context: On a PA-410, an administrator can use curl or a script to push mappings like <uid- message><type>update</type><payload><entry name="user1" ip="192.168.1.10"/></payload></uid- message>.
Process: Requires API key authentication and is configured under Device > User Identification > User Mapping on the firewall.
Reference:
"User-ID XML API Reference" states, "Use the XML API to dynamically update user-to-IP mappings on the firewall."
"Panorama Administrator's Guide" confirms XML API support for User-ID updates across managed devices.
Why Option A is Correct:XML API is a valid, documented method to populate user-to-IP mappings, offering flexibility for custom integrations.
Option B: Captive Portal
Explanation:Captive Portal is an authentication method that prompts users to log in via a web browser when they attempt to access network resources. Upon successful authentication, the firewall maps the user's IP address to their username.
How It Works: The firewall redirects unauthenticated users to a login page (hosted on the firewall or externally). After users enter credentials (e.g., via LDAP, RADIUS, or local database), the firewall records the mapping and applies user-based policies.
Use Case: Effective in guest or BYOD environments where users must authenticate explicitly, such as on Wi- Fi networks.
Strata Context: On a PA-400 Series, Captive Portal is configured under Device > User Identification > Captive Portal, integrating with authentication profiles.
Process: The firewall intercepts HTTP traffic, authenticates the user, and updates the User-ID table (e.g.,
"jdoe" mapped to 192.168.1.20).
Reference:
"Configure Captive Portal" (Palo Alto Networks) states, "Captive Portal populates user-to-IP mappings by requiring users to authenticate."
"User-ID Deployment Guide" lists Captive Portal as a primary method for user identification.
Why Option B is Correct:Captive Portal is a standard, interactive method to populate user-to-IP mappings directly on the firewall.
Option C: User-ID
Explanation:User-ID is not a method but the overarching feature or technology that leverages various methods (e.g., XML API, Captive Portal) to collect and apply user-to-IP mappings. It includes agents, syslog parsing, and directory integration, but "User-ID" itself is not a specific mechanism for populating mappings.
Clarification: User-ID encompasses components like the User-ID Agent, server monitoring (e.g., AD), and Captive Portal, but the question seeks individual methods, not the feature as a whole.
Strata Context: On a PA-5445, User-ID is enabled by default, but its mappings come from specific sources like those listed in other options.
Reference:
"User-ID Concepts" clarifies, "User-ID is the framework that uses multiple methods to map users to IPs." Why Option C is Incorrect:User-ID is the system, not a distinct method, making it an invalid choice.
Option D: SCP Log Ingestion
Explanation:SCP (Secure Copy Protocol) is a file transfer protocol, not a recognized method for populating user-to-IP mappings in Palo Alto Networks' documentation. While the firewall can ingest logs (e.g., via syslog) to extract mappings, SCP is not part of this process.
Analysis: User-ID can parse syslog messages from authentication servers (e.g., VPNs) to map users to IPs, but this is configured under "Server Monitoring," not "SCP log ingestion." SCP is typically used for manual file transfers (e.g., backups), not dynamic mapping.
Strata Context: No PA-Series documentation mentions SCP as a User-ID method; syslog or agent-based methods are standard instead.
Reference:
"User-ID Syslog Monitoring" describes log parsing for mappings, with no reference to SCP.
"PAN-OS Administrator's Guide" excludes SCP from User-ID mechanisms.
Why Option D is Incorrect:SCP log ingestion is not a valid or documented method for user-to-IP mappings.
Step 3: Recommendation Rationale
Explanation:The two valid methods to populate user-to-IP mappings on Strata Hardware Firewalls are XML API and Captive Portal. XML API provides a programmatic, automated approach for external systems to update mappings, while Captive Portal offers an interactive, user-driven method requiring authentication.
Both are explicitly supported by the User-ID framework and align with the operational capabilities of PA- Series firewalls.
Reference:
"User-ID Best Practices" lists "XML API and Captive Portal" among key methods for mapping users to IPs.
Conclusion
The systems engineer should recommend XML API (A) and Captive Portal (B) as the two valid methods to populate user-to-IP mappings on a Strata Hardware Firewall. These methods leverage the PA-Series' User-ID capabilities to ensure accurate, real-time user identification, supporting identity-based security policies and visibility. Options C and D are either misrepresentations or unsupported in this context.
User-to-IP mappings are the foundation of User-ID, a core feature of Strata Hardware Firewalls (e.g., PA-400 Series, PA-5400 Series). These mappings link a user's identity (e.g., username) to their device's IP address, enabling policy enforcement based on user identity rather than just IP. Palo Alto Networks supports multiple methods to populate these mappings, depending on the network environment and authentication mechanisms.
* Purpose: Allows the firewall to apply user-based policies, monitor user activity, and generate user- specific logs.
* Strata Context: On a PA-5445, User-ID integrates with App-ID and security subscriptions to enforce granular access control.
Reference:
"User-ID Overview" (Palo Alto Networks) states, "User-ID maps IP addresses to usernames using various methods for policy enforcement."
"PA-Series Datasheet" highlights User-ID as a standard feature for identity-based security.
Step 2: Evaluating Each Option
Option A: XML API
Explanation:The XML API is a programmatic interface that allows external systems to send user-to-IP mapping information directly to the Strata Hardware Firewall or Panorama. This method is commonly used to integrate with third-party identity management systems, scripts, or custom applications.
How It Works: An external system (e.g., a script or authentication server) sends XML-formatted requests to the firewall's API endpoint, specifying usernames and their corresponding IP addresses. The firewall updates its User-ID database with these mappings.
Use Case: Ideal for environments where user data is available from non-standard sources (e.g., custom databases) or where automation is required.
Strata Context: On a PA-410, an administrator can use curl or a script to push mappings like <uid- message><type>update</type><payload><entry name="user1" ip="192.168.1.10"/></payload></uid- message>.
Process: Requires API key authentication and is configured under Device > User Identification > User Mapping on the firewall.
Reference:
"User-ID XML API Reference" states, "Use the XML API to dynamically update user-to-IP mappings on the firewall."
"Panorama Administrator's Guide" confirms XML API support for User-ID updates across managed devices.
Why Option A is Correct:XML API is a valid, documented method to populate user-to-IP mappings, offering flexibility for custom integrations.
Option B: Captive Portal
Explanation:Captive Portal is an authentication method that prompts users to log in via a web browser when they attempt to access network resources. Upon successful authentication, the firewall maps the user's IP address to their username.
How It Works: The firewall redirects unauthenticated users to a login page (hosted on the firewall or externally). After users enter credentials (e.g., via LDAP, RADIUS, or local database), the firewall records the mapping and applies user-based policies.
Use Case: Effective in guest or BYOD environments where users must authenticate explicitly, such as on Wi- Fi networks.
Strata Context: On a PA-400 Series, Captive Portal is configured under Device > User Identification > Captive Portal, integrating with authentication profiles.
Process: The firewall intercepts HTTP traffic, authenticates the user, and updates the User-ID table (e.g.,
"jdoe" mapped to 192.168.1.20).
Reference:
"Configure Captive Portal" (Palo Alto Networks) states, "Captive Portal populates user-to-IP mappings by requiring users to authenticate."
"User-ID Deployment Guide" lists Captive Portal as a primary method for user identification.
Why Option B is Correct:Captive Portal is a standard, interactive method to populate user-to-IP mappings directly on the firewall.
Option C: User-ID
Explanation:User-ID is not a method but the overarching feature or technology that leverages various methods (e.g., XML API, Captive Portal) to collect and apply user-to-IP mappings. It includes agents, syslog parsing, and directory integration, but "User-ID" itself is not a specific mechanism for populating mappings.
Clarification: User-ID encompasses components like the User-ID Agent, server monitoring (e.g., AD), and Captive Portal, but the question seeks individual methods, not the feature as a whole.
Strata Context: On a PA-5445, User-ID is enabled by default, but its mappings come from specific sources like those listed in other options.
Reference:
"User-ID Concepts" clarifies, "User-ID is the framework that uses multiple methods to map users to IPs." Why Option C is Incorrect:User-ID is the system, not a distinct method, making it an invalid choice.
Option D: SCP Log Ingestion
Explanation:SCP (Secure Copy Protocol) is a file transfer protocol, not a recognized method for populating user-to-IP mappings in Palo Alto Networks' documentation. While the firewall can ingest logs (e.g., via syslog) to extract mappings, SCP is not part of this process.
Analysis: User-ID can parse syslog messages from authentication servers (e.g., VPNs) to map users to IPs, but this is configured under "Server Monitoring," not "SCP log ingestion." SCP is typically used for manual file transfers (e.g., backups), not dynamic mapping.
Strata Context: No PA-Series documentation mentions SCP as a User-ID method; syslog or agent-based methods are standard instead.
Reference:
"User-ID Syslog Monitoring" describes log parsing for mappings, with no reference to SCP.
"PAN-OS Administrator's Guide" excludes SCP from User-ID mechanisms.
Why Option D is Incorrect:SCP log ingestion is not a valid or documented method for user-to-IP mappings.
Step 3: Recommendation Rationale
Explanation:The two valid methods to populate user-to-IP mappings on Strata Hardware Firewalls are XML API and Captive Portal. XML API provides a programmatic, automated approach for external systems to update mappings, while Captive Portal offers an interactive, user-driven method requiring authentication.
Both are explicitly supported by the User-ID framework and align with the operational capabilities of PA- Series firewalls.
Reference:
"User-ID Best Practices" lists "XML API and Captive Portal" among key methods for mapping users to IPs.
Conclusion
The systems engineer should recommend XML API (A) and Captive Portal (B) as the two valid methods to populate user-to-IP mappings on a Strata Hardware Firewall. These methods leverage the PA-Series' User-ID capabilities to ensure accurate, real-time user identification, supporting identity-based security policies and visibility. Options C and D are either misrepresentations or unsupported in this context.
PSE-Strata-Pro-24 Exam Question 15
Device-ID can be used in which three policies? (Choose three.)
Correct Answer: A,B,E
The question asks about the policies where Device-ID, a feature of Palo Alto Networks NGFWs, can be applied. Device-ID enables the firewall to identify and classify devices (e.g., IoT, endpoints) based on attributes like device type, OS, or behavior, enhancing policy enforcement. Let's evaluate its use across the specified policy types.
Step 1: Understand Device-ID
Device-ID leverages the IoT Security subscription and integrates with the Strata Firewall to provide device visibility and control. It uses data from sources like DHCP, HTTP headers, and machine learning to identify devices and allows policies to reference device objects (e.g., "IP Camera," "Medical Device"). This feature is available on PA-Series firewalls running PAN-OS 10.0 or later with the appropriate license.
Reference: PAN-OS Administrator's Guide - Device-ID (docs.paloaltonetworks.com/pan-os/10-2/pan-os- admin/policy/device-id).
Step 2: Define Policy Types
Palo Alto NGFWs support various policy types, each serving a distinct purpose:
Security: Controls traffic based on source, destination, application, user, and device.
Decryption: Manages SSL/TLS decryption based on traffic attributes.
Policy-Based Forwarding (PBF): Routes traffic based on predefined rules.
SD-WAN: Manages WAN traffic with performance-based routing (requires SD-WAN subscription).
Quality of Service (QoS): Prioritizes or limits bandwidth for traffic.
Device-ID's applicability depends on whether a policy type supports device objects as a match criterion.
Step 3: Evaluate Each Option
A). Security
Description: Security policies (Policies > Security) define allow/deny rules for traffic, using match criteria like source/destination IP, zones, users, applications, and devices.
Device-ID Integration: With Device-ID enabled, security policies can use device objects (e.g., "IP Camera") in the Source or Destination fields. This allows granular control, such as blocking untrusted IoT devices or allowing specific device types.
Example: A rule allowing only "Windows Laptops" to access a server.
Fit: Supported and a primary use case for Device-ID.
Reference: PAN-OS Device-ID in Security Policies (docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin
/policy/use-device-id-in-a-security-policy).
B). Decryption
Description: Decryption policies (Policies > Decryption) determine which traffic to decrypt or bypass, based on source, destination, service, or URL category.
Device-ID Integration: Starting in PAN-OS 10.0, decryption policies support device objects as match criteria. This enables selective decryption based on device type (e.g., decrypt traffic from "IoT Sensors" but not "Corporate Laptops").
Example: Bypassing decryption for privacy-sensitive medical devices.
Fit: Supported and enhances decryption granularity.
Reference: PAN-OS Decryption with Device-ID (docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin
/decryption/configure-decryption-policy#device-id).
C). Policy-Based Forwarding (PBF)
Description: PBF policies (Policies > Policy Based Forwarding) route traffic to specific interfaces or next hops based on source, destination, application, or service.
Device-ID Integration: PBF supports source IP, zones, users, and applications but does not include device objects as a match criterion in PAN-OS documentation up to version 10.2. Device-ID is not listed as a supported attribute for PBF rules.
Limitations: PBF focuses on routing, not device-specific enforcement.
Fit: Not supported.
Reference: PAN-OS PBF Configuration (docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/policy/policy- based-forwarding).
D). SD-WAN
Description: SD-WAN policies (Policies > SD-WAN) optimize WAN traffic across multiple links, using application and performance metrics (requires SD-WAN subscription).
Device-ID Integration: SD-WAN policies focus on link selection and application performance, not device attributes. Device-ID is not a match criterion in SD-WAN rules per PAN-OS 10.2 documentation.
Limitations: SD-WAN leverages App-ID and path quality, not device classification.
Fit: Not supported.
Reference: PAN-OS SD-WAN Policies (docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/sd-wan).
E). Quality of Service (QoS)
Description: QoS policies (Policies > QoS) prioritize, limit, or guarantee bandwidth for traffic based on source, destination, application, or user.
Device-ID Integration: QoS policies support device objects as match criteria, allowing bandwidth control based on device type (e.g., prioritize "VoIP Phones" over "Smart TVs").
Example: Limiting bandwidth for IoT devices to prevent network congestion.
Fit: Supported and aligns with Device-ID's purpose.
Reference: PAN-OS QoS with Device-ID (docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/quality-of- service/configure-qos-policy#device-id).
Step 4: Select the Three Policies
Based on PAN-OS capabilities:
Security (A): Device-ID enhances security rules with device-based enforcement.
Decryption (B): Device-ID allows selective decryption based on device classification.
Quality of Service (E): Device-ID enables device-specific bandwidth management.
Why not C or D?
PBF (C): Lacks Device-ID support, focusing on routing rather than device attributes.
SD-WAN (D): Prioritizes link performance over device classification.
Step 5: Verification with Palo Alto Documentation
Security: Explicitly supports Device-ID (PAN-OS Policy Docs).
Decryption: Confirmed in PAN-OS 10.0+ (Decryption Docs).
QoS: Device-ID integration documented (QoS Docs).
PBF and SD-WAN: No mention of Device-ID in policy match criteria (PBF and SD-WAN Docs).
Thus, the verified answers are A, B, E.
Step 1: Understand Device-ID
Device-ID leverages the IoT Security subscription and integrates with the Strata Firewall to provide device visibility and control. It uses data from sources like DHCP, HTTP headers, and machine learning to identify devices and allows policies to reference device objects (e.g., "IP Camera," "Medical Device"). This feature is available on PA-Series firewalls running PAN-OS 10.0 or later with the appropriate license.
Reference: PAN-OS Administrator's Guide - Device-ID (docs.paloaltonetworks.com/pan-os/10-2/pan-os- admin/policy/device-id).
Step 2: Define Policy Types
Palo Alto NGFWs support various policy types, each serving a distinct purpose:
Security: Controls traffic based on source, destination, application, user, and device.
Decryption: Manages SSL/TLS decryption based on traffic attributes.
Policy-Based Forwarding (PBF): Routes traffic based on predefined rules.
SD-WAN: Manages WAN traffic with performance-based routing (requires SD-WAN subscription).
Quality of Service (QoS): Prioritizes or limits bandwidth for traffic.
Device-ID's applicability depends on whether a policy type supports device objects as a match criterion.
Step 3: Evaluate Each Option
A). Security
Description: Security policies (Policies > Security) define allow/deny rules for traffic, using match criteria like source/destination IP, zones, users, applications, and devices.
Device-ID Integration: With Device-ID enabled, security policies can use device objects (e.g., "IP Camera") in the Source or Destination fields. This allows granular control, such as blocking untrusted IoT devices or allowing specific device types.
Example: A rule allowing only "Windows Laptops" to access a server.
Fit: Supported and a primary use case for Device-ID.
Reference: PAN-OS Device-ID in Security Policies (docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin
/policy/use-device-id-in-a-security-policy).
B). Decryption
Description: Decryption policies (Policies > Decryption) determine which traffic to decrypt or bypass, based on source, destination, service, or URL category.
Device-ID Integration: Starting in PAN-OS 10.0, decryption policies support device objects as match criteria. This enables selective decryption based on device type (e.g., decrypt traffic from "IoT Sensors" but not "Corporate Laptops").
Example: Bypassing decryption for privacy-sensitive medical devices.
Fit: Supported and enhances decryption granularity.
Reference: PAN-OS Decryption with Device-ID (docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin
/decryption/configure-decryption-policy#device-id).
C). Policy-Based Forwarding (PBF)
Description: PBF policies (Policies > Policy Based Forwarding) route traffic to specific interfaces or next hops based on source, destination, application, or service.
Device-ID Integration: PBF supports source IP, zones, users, and applications but does not include device objects as a match criterion in PAN-OS documentation up to version 10.2. Device-ID is not listed as a supported attribute for PBF rules.
Limitations: PBF focuses on routing, not device-specific enforcement.
Fit: Not supported.
Reference: PAN-OS PBF Configuration (docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/policy/policy- based-forwarding).
D). SD-WAN
Description: SD-WAN policies (Policies > SD-WAN) optimize WAN traffic across multiple links, using application and performance metrics (requires SD-WAN subscription).
Device-ID Integration: SD-WAN policies focus on link selection and application performance, not device attributes. Device-ID is not a match criterion in SD-WAN rules per PAN-OS 10.2 documentation.
Limitations: SD-WAN leverages App-ID and path quality, not device classification.
Fit: Not supported.
Reference: PAN-OS SD-WAN Policies (docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/sd-wan).
E). Quality of Service (QoS)
Description: QoS policies (Policies > QoS) prioritize, limit, or guarantee bandwidth for traffic based on source, destination, application, or user.
Device-ID Integration: QoS policies support device objects as match criteria, allowing bandwidth control based on device type (e.g., prioritize "VoIP Phones" over "Smart TVs").
Example: Limiting bandwidth for IoT devices to prevent network congestion.
Fit: Supported and aligns with Device-ID's purpose.
Reference: PAN-OS QoS with Device-ID (docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/quality-of- service/configure-qos-policy#device-id).
Step 4: Select the Three Policies
Based on PAN-OS capabilities:
Security (A): Device-ID enhances security rules with device-based enforcement.
Decryption (B): Device-ID allows selective decryption based on device classification.
Quality of Service (E): Device-ID enables device-specific bandwidth management.
Why not C or D?
PBF (C): Lacks Device-ID support, focusing on routing rather than device attributes.
SD-WAN (D): Prioritizes link performance over device classification.
Step 5: Verification with Palo Alto Documentation
Security: Explicitly supports Device-ID (PAN-OS Policy Docs).
Decryption: Confirmed in PAN-OS 10.0+ (Decryption Docs).
QoS: Device-ID integration documented (QoS Docs).
PBF and SD-WAN: No mention of Device-ID in policy match criteria (PBF and SD-WAN Docs).
Thus, the verified answers are A, B, E.
- Latest Upload
- 101Salesforce.Health-Cloud-Accredited-Professional.v2026-01-10.q45
- 102Microsoft.AZ-900.v2026-01-10.q234
- 102VMware.3V0-32.23.v2026-01-10.q133
- 163EPIC.COG170.v2026-01-09.q244
- 125Microsoft.SC-401.v2026-01-09.q68
- 168ISACA.CGEIT.v2026-01-09.q287
- 134ServiceNow.CAD.v2026-01-08.q124
- 127Salesforce.Analytics-DA-201.v2026-01-08.q73
- 124Snowflake.DAA-C01.v2026-01-08.q80
- 117Salesforce.Revenue-Cloud-Consultant-Accredited-Professional.v2026-01-08.q37
[×]
Download PDF File
Enter your email address to download PaloAltoNetworks.PSE-Strata-Pro-24.v2025-11-22.q24 Practice Test
