{"id":1329,"date":"2021-03-12T08:30:00","date_gmt":"2021-03-12T14:30:00","guid":{"rendered":"https:\/\/packitforwarding.com\/?p=1329"},"modified":"2021-03-08T07:49:52","modified_gmt":"2021-03-08T13:49:52","slug":"pcnsa-2-5","status":"publish","type":"post","link":"https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/","title":{"rendered":"PCNSA 2.5"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Given a network diagram, create the appropriate security zones.<\/p><cite>Palo Alto Networks PCNSA Study Guide v10<\/cite><\/blockquote>\n\n\n\n<p>Palo Alto firewalls use security zones to define where traffic is analyzed, controlled and logged. Zones logically group networks. Example zones are Outside, VPN, Infrastructure, Users, Extranet, Partners and Data Center.<\/p>\n\n\n\n<p>Security zones are either interzone or intrazone and contain one or more interfaces. An interface can only be part of one zone. By default intrazone traffic is allowed. Interzone traffic is denied.<\/p>\n\n\n\n<p>Policies are applied to zones, not interfaces. (Security, NAT, QoS, Logging)<\/p>\n\n\n\n<p><strong>Zone Types:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Tap: Zone is connected to SPAN traffic for analysis<\/li><li>Virtual Wire: creates a &#8220;bump&#8221; in the wire for traffic to be analyzed without changing the traffic.<\/li><li>Layer 2: transparent firewall mode where the interfaces participate in the L2 domain<\/li><li>Layer 3: firewall participates in routing and has IP addresses on the interfaces<\/li><li>Tunnel: Attached to a VPN interface<\/li><li>External: (ONLY available with vsys capable firewalls PA-2000 and &gt;) special zone allows traffic between vsys.<\/li><\/ul>\n\n\n\n<p>NOTE: Zone names are case sensitive.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Given a network diagram, create the appropriate security zones. Palo Alto Networks PCNSA Study Guide v10 Palo Alto firewalls use security zones to define where traffic is analyzed, controlled and logged. Zones logically group networks. Example zones are Outside, VPN, Infrastructure, Users, Extranet, Partners and Data Center. Security zones are either interzone or intrazone and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":349,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"PCNSA 2.5 Study Notes #pcnsa #paloalto","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[88,31,189,188],"tags":[90,191,190],"class_list":["post-1329","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-certification","category-palo-alto","category-pcnsa","tag-certification","tag-palo-alto","tag-pcnsa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PCNSA 2.5 -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PCNSA 2.5 -\" \/>\n<meta property=\"og:description\" content=\"Given a network diagram, create the appropriate security zones. Palo Alto Networks PCNSA Study Guide v10 Palo Alto firewalls use security zones to define where traffic is analyzed, controlled and logged. Zones logically group networks. Example zones are Outside, VPN, Infrastructure, Users, Extranet, Partners and Data Center. Security zones are either interzone or intrazone and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-12T14:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ben Story\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/www.twitter.com\/ntwrk80\" \/>\n<meta name=\"twitter:site\" content=\"@ntwrk80\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ben Story\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/03\\\/12\\\/pcnsa-2-5\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/03\\\/12\\\/pcnsa-2-5\\\/\"},\"author\":{\"name\":\"Ben Story\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"headline\":\"PCNSA 2.5\",\"datePublished\":\"2021-03-12T14:30:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/03\\\/12\\\/pcnsa-2-5\\\/\"},\"wordCount\":171,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/03\\\/12\\\/pcnsa-2-5\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1\",\"keywords\":[\"certification\",\"Palo Alto\",\"PCNSA\"],\"articleSection\":[\"Blog\",\"Certification\",\"Palo Alto\",\"PCNSA\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/03\\\/12\\\/pcnsa-2-5\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/03\\\/12\\\/pcnsa-2-5\\\/\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/03\\\/12\\\/pcnsa-2-5\\\/\",\"name\":\"PCNSA 2.5 -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/03\\\/12\\\/pcnsa-2-5\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/03\\\/12\\\/pcnsa-2-5\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1\",\"datePublished\":\"2021-03-12T14:30:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/03\\\/12\\\/pcnsa-2-5\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/03\\\/12\\\/pcnsa-2-5\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/03\\\/12\\\/pcnsa-2-5\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1\",\"width\":640,\"height\":426,\"caption\":\"Photo by Engin Akyurt from Pexels\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2021\\\/03\\\/12\\\/pcnsa-2-5\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/packitforwarding.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PCNSA 2.5\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/\",\"name\":\"\",\"description\":\"Paying it forward to the next generation of IT.\",\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/packitforwarding.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\",\"name\":\"Ben Story\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"width\":489,\"height\":250,\"caption\":\"Ben Story\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\"},\"description\":\"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/packitforwarding\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/benstory\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/www.twitter.com\\\/ntwrk80\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PCNSA 2.5 -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/","og_locale":"en_US","og_type":"article","og_title":"PCNSA 2.5 -","og_description":"Given a network diagram, create the appropriate security zones. Palo Alto Networks PCNSA Study Guide v10 Palo Alto firewalls use security zones to define where traffic is analyzed, controlled and logged. Zones logically group networks. Example zones are Outside, VPN, Infrastructure, Users, Extranet, Partners and Data Center. Security zones are either interzone or intrazone and [&hellip;]","og_url":"https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/","article_publisher":"https:\/\/www.facebook.com\/packitforwarding","article_author":"https:\/\/www.facebook.com\/packitforwarding","article_published_time":"2021-03-12T14:30:00+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1","type":"image\/jpeg"}],"author":"Ben Story","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/www.twitter.com\/ntwrk80","twitter_site":"@ntwrk80","twitter_misc":{"Written by":"Ben Story","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/#article","isPartOf":{"@id":"https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/"},"author":{"name":"Ben Story","@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"headline":"PCNSA 2.5","datePublished":"2021-03-12T14:30:00+00:00","mainEntityOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/"},"wordCount":171,"commentCount":0,"publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1","keywords":["certification","Palo Alto","PCNSA"],"articleSection":["Blog","Certification","Palo Alto","PCNSA"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/","url":"https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/","name":"PCNSA 2.5 -","isPartOf":{"@id":"https:\/\/packitforwarding.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/#primaryimage"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1","datePublished":"2021-03-12T14:30:00+00:00","breadcrumb":{"@id":"https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/#primaryimage","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1","width":640,"height":426,"caption":"Photo by Engin Akyurt from Pexels"},{"@type":"BreadcrumbList","@id":"https:\/\/packitforwarding.com\/index.php\/2021\/03\/12\/pcnsa-2-5\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/packitforwarding.com\/"},{"@type":"ListItem","position":2,"name":"PCNSA 2.5"}]},{"@type":"WebSite","@id":"https:\/\/packitforwarding.com\/#website","url":"https:\/\/packitforwarding.com\/","name":"","description":"Paying it forward to the next generation of IT.","publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/packitforwarding.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8","name":"Ben Story","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","width":489,"height":250,"caption":"Ben Story"},"logo":{"@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1"},"description":"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.","sameAs":["https:\/\/www.facebook.com\/packitforwarding","https:\/\/www.linkedin.com\/in\/benstory","https:\/\/x.com\/https:\/\/www.twitter.com\/ntwrk80"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1552617.jpeg?fit=640%2C426&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pay9MD-lr","jetpack-related-posts":[{"id":1339,"url":"https:\/\/packitforwarding.com\/index.php\/2021\/04\/02\/pcnsa-2-8\/","url_meta":{"origin":1329,"position":0},"title":"PCNSA 2.8","author":"Ben Story","date":"April 2, 2021","format":false,"excerpt":"Identify the purpose of specific security rule types.Palo Alto Networks PCNSA Study Guide v10 Security Rule Types Security policies allow enforcement and action. They are evaluated top down and the first one matched is applied. There are two pre-defined rules that are read-only by default but have some limited properties\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"woman with text projected on her face","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/04\/pexels-photo-5473957.jpeg?fit=800%2C1200&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/04\/pexels-photo-5473957.jpeg?fit=800%2C1200&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/04\/pexels-photo-5473957.jpeg?fit=800%2C1200&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/04\/pexels-photo-5473957.jpeg?fit=800%2C1200&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1342,"url":"https:\/\/packitforwarding.com\/index.php\/2021\/04\/05\/pcnsa-2-9\/","url_meta":{"origin":1329,"position":1},"title":"PCNSA 2.9","author":"Ben Story","date":"April 5, 2021","format":false,"excerpt":"Identify and configure Security policy match conditions, actions, and logging options.Palo Alto Networks PCNSA Study Guide v10 Implicit vs Explicit The two predefined interzone and intrazone rules are the only implicit rules on a Palo Alto firewall. Explicit rules are defined by an administrator and always are before the implicit\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"adult american football athlete audience","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/03\/pexels-photo-209954.jpeg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/03\/pexels-photo-209954.jpeg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/03\/pexels-photo-209954.jpeg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/03\/pexels-photo-209954.jpeg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/03\/pexels-photo-209954.jpeg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1332,"url":"https:\/\/packitforwarding.com\/index.php\/2021\/03\/26\/pcnsa-2-6\/","url_meta":{"origin":1329,"position":2},"title":"PCNSA &#8211; 2.6","author":"Ben Story","date":"March 26, 2021","format":false,"excerpt":"Identify and configure firewall interfaces.Palo Alto Networks PCNSA Study Guide v10 Special Interfaces Decrypt Mirror: Allows traffic that has been decrypted to be sent to other tools for analysis. This is not available on VM-Series firewalls.Log card: On the PA-7000 series firewalls a log card data is used for forwarding\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"close up photo of gray metal pipes","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/03\/pexels-photo-1381938.jpeg?fit=1200%2C798&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/03\/pexels-photo-1381938.jpeg?fit=1200%2C798&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/03\/pexels-photo-1381938.jpeg?fit=1200%2C798&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/03\/pexels-photo-1381938.jpeg?fit=1200%2C798&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2021\/03\/pexels-photo-1381938.jpeg?fit=1200%2C798&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1308,"url":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/19\/pcnsa-1-4\/","url_meta":{"origin":1329,"position":3},"title":"PCNSA &#8211; 1.4","author":"Ben Story","date":"February 19, 2021","format":false,"excerpt":"Identify stages in the cyberattack lifecycle and firewall mitigations that can prevent attacks.Palo Alto PCNSA Study Guide v10 Cyberattack Lifecycle Stages The cyberattack lifecycle, or cyber kill chain, is a model to show the stages of an attack and how it can be prevented. If any one stage is stopped,\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"A graphical depiction of the cyber kill chain model.","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/Cyber-Kill-Chain.png?fit=800%2C600&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/Cyber-Kill-Chain.png?fit=800%2C600&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/Cyber-Kill-Chain.png?fit=800%2C600&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/Cyber-Kill-Chain.png?fit=800%2C600&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1303,"url":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/15\/pcnsa-1-3\/","url_meta":{"origin":1329,"position":4},"title":"PCNSA &#8211; 1.3","author":"Ben Story","date":"February 15, 2021","format":false,"excerpt":"Given a network design scenario, apply the Zero Trust security model and describe how it relates to traffic moving through your network.Palo Alto PCNSA Study Guide v10 Traditional Security Model In the traditional security model, internal devices, users, and applications were inherently trusted. No verification of the traffic once on\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/07\/security-protection-anti-virus-software-60504-1.jpeg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/07\/security-protection-anti-virus-software-60504-1.jpeg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/07\/security-protection-anti-virus-software-60504-1.jpeg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/07\/security-protection-anti-virus-software-60504-1.jpeg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/07\/security-protection-anti-virus-software-60504-1.jpeg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1300,"url":"https:\/\/packitforwarding.com\/index.php\/2021\/02\/12\/pcnsa-1-2\/","url_meta":{"origin":1329,"position":5},"title":"PCNSA &#8211; 1.2","author":"Ben Story","date":"February 12, 2021","format":false,"excerpt":"Identify the components and operation of Single-Pass ParallelProcessing architecture.Palo Alto PCNSA Study Guide v10 Single-Pass Parallel Processing The Palo Alto firewalls use a single-pass parallel processing architecture. It combines single-pass software with parallel processing hardware. The goal is to \"scan it all, scan it once.\" The software uses stream processing.\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Security","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/07\/security-protection-anti-virus-software-60504.jpeg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/07\/security-protection-anti-virus-software-60504.jpeg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/07\/security-protection-anti-virus-software-60504.jpeg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/07\/security-protection-anti-virus-software-60504.jpeg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/07\/security-protection-anti-virus-software-60504.jpeg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/1329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/comments?post=1329"}],"version-history":[{"count":2,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/1329\/revisions"}],"predecessor-version":[{"id":1428,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/1329\/revisions\/1428"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media\/349"}],"wp:attachment":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media?parent=1329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/categories?post=1329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/tags?post=1329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}