An administrator has created an SSL Decryption policy rule that decrypts SSL sessions on any port. Which log entry can the administrator use to verify that sessions are being decrypted?
PCNSE 9 is current exam content [02/2021] *** ANSWER = A ***
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClboCAC
The Question is simply asking how to verify if traffic was being decrypted. There are (2) ways to see this in the traffic logs:
1. To confirm that the traffic is decrypted inside the WebGUI > Monitor > Logs > Traffic. Click the magnifying glass icon in the traffic log entries to confirm that the connections were decrypted.
2. Another way to validate the decrypted session is by enabling the column "Decrypted" as below Traffic logs . This can be done by clicking on the arrow down next to any column title and selecting the Columns > Decrypted. This shows decrypted status in regular traffic log view.
As of, August 17th 2020, the Palo Alto Networks Certified Network Security Engineer (PCNSE) and the Palo Alto Networks Certified Network Security Administrator (PCNSA) certification exams reflect changes based on PAN-OS 10.0.
Well certainly you want to check if your SSL traffic is being decrypted, so you would look onto traffic logs and apply the "Is decrypted" column. You usually check on Decryption logs when you know that decryption could be causing an issue (so besides the flag is Decrypted marks yes or no, you would see a session end reason: "decrypt-error" in the same traffic log).
Based on daily workload I'd go with A.
When SSL decryption is configured and SSL sessions are being decrypted, the Decryption log is where the administrator can verify the details of the decrypted sessions. This log provides information about the SSL decryption process, including whether the decryption was successful, if there were any issues, and the details of the decrypted traffic.
PAN-OS 11 the decryption log can be filtered using a source address to see all decrypted sessions. “A” is also true but B is a better answer. This is a bad question.
Hello guys, here I am willing to help.
I chose A because you can see if the traffic was decrypten with the column: is decrypted. You would use normally the decryption log to tshoot purposes, but its not this question (although you do can see if certain traffic is being decrypted by a decryptiuon rule in the decryption log).
Another stupid question with 2 answers. Both A and B are correct.
https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/verify-decryption
After you configure a best practice decryption profile and apply it to traffic, you can check both the Decryption logs (introduced in PAN-OS 10.0) and the Traffic logs to verify that the firewall is decrypting the traffic.
I would lean towards option A as the question asks about how one can go about verifying if sessions are being decrypted. In the details of traffic log entry, you can check if the decrypt flag is marked or not. The decrypted log file introduced in PAN OS 10 on the other hand provides comprehensive information about individual session that are decrypted, the sessions that are marked for "no decrypt" in the decryption policy or any global protect sessions when you enable decryption logging in the global protect portal or gateway configuration.
Very clear answer on PA website
After you configure a best practice decryption profile and apply it to traffic, you can check both the Decryption logs
https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/verify-decryption
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
bmarks
Highly Voted 3 years, 11 months agoBarry_Allen
3 years, 10 months agolucaboban
3 years, 10 months agoBiz90
3 years, 3 months agoscanossa
1 year, 2 months agoPA
Highly Voted 5 years, 2 months agoCarlosDV06
Most Recent 1 week, 5 days agoOswaldo_CCSM
2 weeks, 5 days agocorpguy
3 weeks, 4 days agoCarlosDV06
2 months, 1 week ago3a97627
4 months, 1 week ago3a97627
4 months, 1 week agokambata
6 months, 2 weeks ago[Removed]
8 months agojens23
10 months, 1 week agokambata
6 months, 2 weeks agoJRKhan
1 year agodorf05
1 year, 1 month agoms997
1 year, 1 month agotechplus
1 year, 1 month agoXuzi
1 year, 2 months agoMicutzu
1 year, 3 months ago