All branch sites in an organization have NGFWs running in production, and the organization wants to centralize its logs with Strata Logging Service.
Which type of certificate is required to ensure connectivity from the NGFWs to Strata Logging Service?
To centralize logs from NGFWs to the Strata Logging Service, a Root Certificate Authority (Root CA) certificate is required to ensure secure connectivity between firewalls and Palo Alto Networks' cloud-based Strata Logging Service.
Why a Root Certificate is Required?
Authenticates Firewall Connections -- Ensures NGFWs trust the Strata Logging Service.
Enables Encrypted Communication -- Protects log integrity and confidentiality.
Prevents Man-in-the-Middle Attacks -- Ensures secure TLS encryption for log transmission.
Why Other Options Are Incorrect?
A . Device
Incorrect, because Device Certificates are used for firewall management authentication, not log transmission to Strata Logging Service.
B . Server
Incorrect, because Server Certificates authenticate service endpoints, but firewalls need to trust a Root CA for secure logging connections.
D . Intermediate CA
Incorrect, because Intermediate CA certificates are used for validating certificate chains, but firewalls must trust the Root CA for establishing secure connections.
Reference to Firewall Deployment and Security Features:
Firewall Deployment -- Ensures secure log transmission to centralized services.
Security Policies -- Prevents log tampering and unauthorized access.
VPN Configurations -- Ensures VPN logs are securely sent to the Strata Logging Service.
Threat Prevention -- Ensures firewall logs are analyzed for security threats.
WildFire Integration -- Logs malware-related events to the cloud for analysis.
Zero Trust Architectures -- Ensures secure logging of all network events.
Thus, the correct answer is: C. Root
Gerald
1 hours agoLigia
1 days agoValene
2 days agoTresa
5 days agoKatlyn
8 days agoBarbra
13 days agoSylvia
14 days agoJosephine
3 days ago