Palo Alto Networks Certified Network Security Administrator (PCNSA) Blueprint
Palo Alto Networks Certified Network Security Administrator (PCNSA) Blueprint
Palo Alto Networks Certified Network Security Administrator (PCNSA) Blueprint
Task 1.1 Understand the components of the Palo Alto Networks Strata
Portfolio
1.1.1 Understand how to configure APP-ID.
1.1.2 Understand the purpose and usage of Content-ID.
1.1.3 Understand the purpose and usage of User-ID.
1.1.4 Understand the purpose and usage of captive portal.
1.1.5 Understand the purpose and usage of Device-ID.
1.1.6 Understand security processes.
1.1.7 Understand form factors of the NGFW.
1.1.8 Understand the management implications of the form factors of the
NGFW.
1.1.9 Understand use of Authentication Policy.
1.1.10 Understand uses for Prisma Access.
1.1.11 Understand uses for Panorama.
1.1.12 Understand the uses for CN-Series and VM-Series.
1.1.13 Understand GlobalProtect.
Task 2.5 Identify the types of dynamic updates and their purpose
2.5.1 Understand the impact of dynamic updates to existing security
policies.
© 2021 Palo Alto Networks PCNSA: Palo Alto Networks Certified Network Security
Administrator Blueprint, Confidential and Proprietary, V2. June 2021 2
Task 2.8 Configure a virtual router
2.8.1 Identify steps to create a static route.
2.8.2 Understand how to use the routing table.
2.8.3 Identify steps to configure a virtual router.
2.8.4 Identify what interface types can be added to a virtual router.
2.8.5 Understand how to configure route monitoring.
Task 3.3 Identify how to use pre-defined Palo Alto Networks external
dynamic lists
3.3.1 Identify how to implement an exception to a predefined EDL.
3.3.2 Identify how to apply in security policy.
© 2021 Palo Alto Networks PCNSA: Palo Alto Networks Certified Network Security
Administrator Blueprint, Confidential and Proprietary, V2. June 2021 3
Task 4.2 Identify the purpose of specific security rule types
4.2.1 Identify when to use interzone rules.
4.2.2 Identify when to use intrazone rules.
4.2.3 Identify when to use universal rules.
Task 4.3 Identify and configure Security policy match conditions, actions,
and logging options
4.3.1 Identify and configure Security policy match conditions, and actions.
4.3.2 Understand how to use Application Filters and Groups.
4.3.3 Understand how to use logging options.
Task 5.2 Identify the difference between Security policy actions and
Security Profile actions
5.2.1 Differentiate between traffic logs, threat logs and data logs.
5.2.2 Differentiate between security profile actions.
Task 5.3 Identify how the firewall can use the cloud DNS Security to
control traffic based on domains
5.3.1 Identify where to configure DNS security.
5.3.2 Identify how to apply DNS security in policy.
© 2021 Palo Alto Networks PCNSA: Palo Alto Networks Certified Network Security
Administrator Blueprint, Confidential and Proprietary, V2. June 2021 4
Task 5.4 Identify how the firewall can use the PAN-DB database to control
traffic based on websites
5.4.1 Identify how to apply a URL profile in a security policy.
5.4.2 Identify how to create a URL filtering profile.
Task 5.5 Identify how to control access to specific URLs using custom URL
filtering categories
5.5.1 Identify why a URL was blocked.
5.5.2 Identify how to allow a blocked URL.
5.5.3 Identify how to request a URL recategorization.
© 2021 Palo Alto Networks PCNSA: Palo Alto Networks Certified Network Security
Administrator Blueprint, Confidential and Proprietary, V2. June 2021 5