exam questions

Exam PCNSE All Questions

View all questions & answers for the PCNSE exam

Exam PCNSE topic 1 question 407 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 407
Topic #: 1
[All PCNSE Questions]

Refer to the diagram. Users at an internal system want to ssh to the SSH server. The server is configured to respond only to the ssh requests coming from IP 172.16.15.1.

In order to reach the SSH server only from the Trust zone, which Security rule and NAT rule must be configured on the firewall?

  • A. NAT Rule:

    Source Zone: Trust -

    Source IP: Any -

    Destination Zone: Server -

    Destination IP: 172.16.15.10 -
    Source Translation: Static IP / 172.16.15.1
    Security Rule:

    Source Zone: Trust -

    Source IP: Any -

    Destination Zone: Trust -

    Destination IP: 172.16.15.10 -
    Application: ssh
  • B. NAT Rule:

    Source Zone: Trust -

    Source IP: 192.168.15.0/24 -

    Destination Zone: Trust -

    Destination IP: 192.168.15.1 -
    Destination Translation: Static IP / 172.16.15.10
    Security Rule:

    Source Zone: Trust -

    Source IP: 192.168.15.0/24 -

    Destination Zone: Server -

    Destination IP: 172.16.15.10 -
    Application: ssh
  • C. NAT Rule:

    Source Zone: Trust -

    Source IP: Any -

    Destination Zone: Trust -

    Destination IP: 192.168.15.1 -
    Destination Translation: Static IP /172.16.15.10
    Security Rule:

    Source Zone: Trust -

    Source IP: Any -

    Destination Zone: Server -

    Destination IP: 172.16.15.10 -
    Application: ssh
  • D. NAT Rule:

    Source Zone: Trust -

    Source IP: Any -

    Destination Zone: Server -

    Destination IP: 172.16.15.10 -
    Source Translation: dynamic-ip-and-port / ethernet1/4
    Security Rule:

    Source Zone: Trust -

    Source IP: Any -

    Destination Zone: Server -

    Destination IP: 172.16.15.10 -
    Application: ssh
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
chrisy042
Highly Voted 2 years, 1 month ago
Selected Answer: D
We should use source NAT for the Trust zone in this case. https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-networking-admin/nat/source-nat-and-destination-nat/source-nat
upvoted 8 times
...
0d2fdfa
Most Recent 7 months ago
Selected Answer: A
Why not A ? This is the specific source ip
upvoted 2 times
Enforc3r
1 month, 1 week ago
Security rule won't work as the destination zone is Trust
upvoted 1 times
...
...
ARWANGSH
9 months, 3 weeks ago
Selected Answer: D
The question calls for source NAT, ie make the request appear to come from 172.16.15.1, so D is the only correct option (B describes destination NAT)
upvoted 1 times
...
evilCorpBot7494
10 months, 1 week ago
Selected Answer: D
It is D and not C because the translation you want to perform won't be of the destination, but of the source of the request. So that when you get to the SSH server (which was your original destination from beggining to end) it sees that the origin of the request was the 172.16.15.1 that it is expecting. Without source NAT translation, the source IP would be 192.168.15.47 and the server would reject it.
upvoted 1 times
...
Marshpillowz
11 months, 2 weeks ago
Selected Answer: D
Answer is D
upvoted 1 times
...
JoyBoyMx
1 year, 3 months ago
Selected Answer: D
Answer is D As the server only allows packets coming from IP 172.16.15.1, then Source NAT should be used. If we go for option B, then the source will remain with the original IP, which is 192.168.15.47 and the server won't allow those packets.
upvoted 1 times
...
ceyave7754
1 year, 8 months ago
Selected Answer: D
So here's why it's not B: Security Policies should have pre-NAT IPs and post-NAT Zones (https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-networking-admin/nat/nat-policy-rules/nat-policy-overview). For B to be correct (which it could have been, mind) the pre-NAT IP in the Security Policy's destination IP should've been 192.168.15.1. This leaves D as the only correct answer.
upvoted 2 times
...
Genos
1 year, 9 months ago
Selected Answer: D
explanation : https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClhwCAC
upvoted 1 times
...
[Removed]
1 year, 9 months ago
Selected Answer: B
in NAT the source and dest are the same(source)
upvoted 1 times
...
Frightened_Acrobat
1 year, 9 months ago
Selected Answer: D
This video helps explain why: https://www.youtube.com/watch?v=Ahrao6kBg8w
upvoted 1 times
...
certprep2021
1 year, 10 months ago
Selected Answer: D
It will be source NAT
upvoted 1 times
...
jam1234
1 year, 11 months ago
Selected Answer: D
https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-networking-admin/nat/nat-configuration-examples/source-and-destination-nat-example the example is here
upvoted 2 times
jam1234
1 year, 11 months ago
based on example since 80.80.80.80 is not intended for internal setup. There is no need to have a post NAT IP
upvoted 1 times
...
...
javim
1 year, 12 months ago
Selected Answer: B
Correct answer is B In NAT source zone and destination is Trust In policy rule, source is Trust and destination Server
upvoted 2 times
...
evdw
2 years ago
Selected Answer: D
Correct answer is D SNAT => source zone (pre-nat): TRUST , dest zone (pre-nat) : SERVER Policy => source zone (pre-nat): TRUST , dest zone (post-nat) : SERVER
upvoted 4 times
...
dogeatdog
2 years ago
Selected Answer: B
Keep in mind that the translation of the IP address and port do not occur until the packet leaves the firewall. The NAT rules and security policies apply to the original IP address (the pre-NAT address). A NAT rule is configured based on the zone associated with a pre-NAT IP address. Security policies differ from NAT rules because security policies examine post-NAT zones to determine whether the packet is allowed or not. Because the very nature of NAT is to modify source or destination IP addresses, which can result in modifying the packet’s outgoing interface and zone, security policies are enforced on the post-NAT zone.
upvoted 4 times
javim
1 year, 12 months ago
I tottally agree! Correct answer B
upvoted 2 times
...
...
Wayne366
2 years ago
Everyone is saying D, but I am pretty sure it's B. The NAT rule for Source NAT is to use pre zones, so Trust/Trust, where as for the security rule, its Post Zone, Trust/Server.
upvoted 2 times
Wayne366
2 years ago
Sorry ignore me!
upvoted 2 times
...
...
confusion
2 years, 1 month ago
Selected Answer: D
D S-NAT is what we're looking for here
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago