exam questions

Exam PCNSE All Questions

View all questions & answers for the PCNSE exam

Exam PCNSE topic 1 question 495 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 495
Topic #: 1
[All PCNSE Questions]

In an HA failover scenario what happens with sessions decrypted by a SSL Forward Proxy Decryption policy?

  • A. The existing session is transferred to the active firewall.
  • B. The firewall drops the session.
  • C. The session is sent to fastpath.
  • D. The firewall allows the session but does not decrypt the session.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
evdw
Highly Voted 1 year, 11 months ago
Selected Answer: D
Correct answer D https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-concepts/decryption-and-high-availability
upvoted 9 times
...
amalandamal
Most Recent 1 month, 3 weeks ago
Selected Answer: B
I'll go with B, as the decrypted sessions are not synced between the pair, so the current session will be dropped, and a new session should be reestablished.
upvoted 1 times
...
HappyDay030303
5 months, 3 weeks ago
Selected Answer: B
After failover, the "firewall does not resume decrypted SSL Forward Proxy" https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/decryption/decryption-concepts/decryption-and-high-availability
upvoted 1 times
...
Marshpillowz
10 months, 2 weeks ago
Selected Answer: D
D is correct
upvoted 2 times
...
JRKhan
11 months ago
Selected Answer: B
I would go with B. I have checked both PANOS 9.1 and 10.1 documentation, there is no HA Sync support for outbound ssl decryption.
upvoted 1 times
...
Mocix
11 months, 4 weeks ago
Selected Answer: B
https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/decryption/decryption-concepts/decryption-and-high-availability After a failover, firewalls do not support High Availability (HA) sync for decrypted SSL sessions. The firewall does not resume decrypted SSL Forward Proxy, SSL Inbound Inspection, or SSH Proxy sessions. The firewall decrypts new sessions that start after the failover based on the Decryption policy. Then B is the correct answer!
upvoted 1 times
...
dorf05
1 year ago
Selected Answer: D
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-concepts/decryption-and-high-availability#:~:text=when%20a%20failover%20occurs%2C%20the%20passive%20device%20allows%20transferred%20sessions%20without%20decrypting%20them.%20New%20sessions%20will%20then%20continue%20to%20be%20decrypted%20based%20on%20your%20decryption%20policy.
upvoted 2 times
...
dorf05
1 year, 1 month ago
Selected Answer: D
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-concepts/decryption-and-high-availability#:~:text=decrypted%2C%20outbound%20SSL,your%20decryption%20policy.
upvoted 1 times
...
Daychill
1 year, 2 months ago
Selected Answer: B High Availability (HA) syncs are supported for inbound, decrypted SSL sessions, if the sessions were established using non-PFS key exchange algorithms. When a failover occurs, the passive device continues to inspect and enforce the decrypted traffic. HA syncs are not supported for: decrypted SSL sessions (both inbound and outbound) that were established using PFS key exchange algorithms decrypted, outbound SSL sessions using non-PFS key exchange algorithms No HA Sync for SSL forward proxy for both PFS and NoN-PFS The Firewall drops the session
upvoted 1 times
...
Examdumps2023
1 year, 2 months ago
In these cases, when a failover occurs, the passive device allows transferred sessions without decrypting them. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-concepts/decryption-and-high-availability
upvoted 1 times
...
sov4
1 year, 4 months ago
Selected Answer: B
I believe it is B: From the documentation: After a failover, firewalls do not support High Availability (HA) sync for decrypted SSL sessions. The firewall does not resume decrypted SSL Forward Proxy, SSL Inbound Inspection, or SSH Proxy sessions. The firewall decrypts new sessions that start after the failover based on Decryption policy. https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/decryption/decryption-concepts/decryption-and-high-availability "A" cant be correct because synching is not supported "B" is correct because the session is lost after failover and any new traffic for that session is dropped. "C" cant be correct because there isnt a session "D" can't be correct because the session isnt synched, so the new active firewall doesnt know about it, which is why B is correct... it'll be dropped.
upvoted 1 times
sov4
1 year, 4 months ago
To add to my comment above, the doc says "new sessions that start after the failover are decrypted based on decryption policy (paraphrased)." This is why B is correct. The original session didnt survive.
upvoted 1 times
...
...
lildevil
1 year, 6 months ago
D is correct, but if you don't have session synch enabled then B is also correct. Not a well written question. https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004OQCCA2&lang=en_US%E2%80%A9&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail
upvoted 1 times
...
nguyendtv50
1 year, 6 months ago
Correct answer A In an HA failover scenario, the active firewall takes over the traffic processing from the failed firewall. The SSL Forward Proxy Decryption policy is configured on the firewall to decrypt the SSL traffic and inspect it for threats. If the firewall fails over, the existing session is transferred to the active firewall, which continues to decrypt the SSL traffic and inspect it for threats. This ensures that there is no disruption in the traffic flow and the security of the network is maintained. Option B is incorrect because dropping the session would result in disruption of the traffic flow and could lead to security issues. Option C is incorrect because sending the session to fastpath would bypass the SSL Forward Proxy Decryption policy, which defeats the purpose of having the policy in place. Option D is incorrect because allowing the session without decrypting it would also defeat the purpose of having the SSL Forward Proxy Decryption policy in place.
upvoted 2 times
rampa70
1 year, 6 months ago
Nah, correct is D: https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/decryption/decryption-concepts/decryption-and-high-availability After a failover, firewalls do not support High Availability (HA) sync for decrypted SSL sessions. The firewall does not resume decrypted SSL Forward Proxy, SSL Inbound Inspection, or SSH Proxy sessions. The firewall decrypts new sessions that start after the failover based on Decryption policy.
upvoted 2 times
...
...
tahira
1 year, 11 months ago
D https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-concepts/decryption-and-high-availability
upvoted 2 times
PaloSteve
1 year, 4 months ago
The following points to Answer D, though this is from PAN-OS 9.1 docs, "In these cases, when a failover occurs, the passive device allows transferred sessions without decrypting them. New sessions will then continue to be decrypted based on your decryption policy." Also it notes that Inbound SSL Session for Non-PFS Protected Session is part of an HA Sync, in PAN-OS 9.1 anyway.
upvoted 1 times
PaloSteve
1 year, 4 months ago
The 11.0 doc says, " The firewall does not resume decrypted SSL Forward Proxy, SSL Inbound Inspection, or SSH Proxy sessions." So this supports Answer B. Mostly likely this question was dropped if the default action is different. Someone would have to dig through Release Notes to see if this is a Default Action change.
upvoted 1 times
...
...
...
djedeen
1 year, 11 months ago
Selected Answer: D
HA syncs are not supported for: decrypted SSL sessions (both inbound and outbound) that were established using PFS key exchange algorithms decrypted, outbound SSL sessions using non-PFS key exchange algorithms >>> In these cases, when a failover occurs, the passive device allows transferred sessions without decrypting them. New sessions will then continue to be decrypted based on your decryption policy.
upvoted 3 times
...
aatechler
1 year, 11 months ago
Selected Answer: D
From the same link of evdw When a failover occurs, the passive device allows transferred sessions without decrypting them. New sessions will then continue to be decrypted based on your decryption policy.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...