FOR THE WIN!
Management interfaces
Interfaces used for firewall management
Methods of access
Different ways to access the firewall
Access restrictions
Limitations placed on accessing the firewall
Identity-management traffic flow
The flow of traffic related to identity management
Management services
Services provided for firewall management
Service routes
Routes used for specific services
Authentication profile
Profile used for authentication purposes
Authentication sequence
Order in which authentication methods are applied
Running configuration
Current configuration settings actively used by the firewall
Candidate configuration
Configuration changes that have not been committed
Discern when to use load, save, import, and export
Understanding when to apply different configuration actions
Differentiate between configuration states
Distinguishing between various states of firewall configurations
Back up Panorama configurations and firewalls from Panorama
Creating copies of configurations for Panorama and firewalls managed by Panorama
Device groups and hierarchy
, Organizational structure for devices managed by Panorama
Where to place policies
Determining the appropriate location for firewall policies
Implications of Panorama management
Effects of managing firewalls through Panorama
Impact of templates, template stacks, and hierarchy
Influence of template structures on firewall configurations
From Panorama
Receiving dynamic updates from Panorama
From the firewall
Receiving dynamic updates directly from the firewall
Scheduling and staggering updates on an HA pair
Planning and timing updates for high availability pairs
Identify zone types
Recognizing different types of security zones
External types
Security zones related to external connections
Layer 2
Security zones operating at Layer 2 of the OSI model
Layer 3
Security zones operating at Layer 3 of the OSI model
TAP
Security zones using Test Access Points
VWire
Security zones using Virtual Wires
Tunnel
Security zones established through tunnels
Different types of interfaces
Varieties of interfaces used in firewall configurations