Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks Exam PSE-StrataDC Topic 1 Question 54 Discussion

Actual exam question for Palo Alto Networks's PSE-StrataDC exam
Question #: 54
Topic #: 1
[All PSE-StrataDC Questions]

A customer in a non-NSX VMware environment wants to add a VM-Series firewall and to partition an existing group of VMs in the same subnet into two groups. One group needs no additional security, but the second group requires substantially more security.

How can this partition be accomplished without editing the IP addresses or the default gateways of any of the guest VMs?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Tonette
1 months ago
Option B: 'Edit the IP address of all the affected VMs' - sounds like a job for the 'Copy and Paste' master!
upvoted 0 times
...
Matthew
1 months ago
Aha! Proxy ARP, that's an interesting idea. I like the simplicity of that approach.
upvoted 0 times
Davida
6 days ago
User 3: Creating a new virtual switch with the VM-Series firewall in Virtual Wire mode is also a good option.
upvoted 0 times
...
Elvera
7 days ago
User 2: I agree, it's a simple and effective way to partition the VMs without changing their IP addresses.
upvoted 0 times
...
Meghann
23 days ago
User 1: Proxy ARP is a great solution for that scenario.
upvoted 0 times
...
...
India
1 months ago
Sending the VLAN out to a hardware firewall? Hmm, that could work, but it might add some latency and complexity to the setup.
upvoted 0 times
...
Yaeko
1 months ago
Editing the IP addresses of all the VMs? That's way too much work and could easily introduce errors. Next!
upvoted 0 times
Dulce
5 days ago
C) Send the VLAN out of the virtual environment into a hardware Palo Alto Networks firewall in Layer 3 mode. Use the same IP address as the old default gateway, then delete the old default gateway
upvoted 0 times
...
Kristofer
12 days ago
A) Create a new virtual switch and use the VM-Series firewall to separate virtual switches using Virtual Wire mode Then move the guests that require more security into the new virtual switch
upvoted 0 times
...
...
An
2 months ago
Option A looks good, but I'm not sure if creating a new virtual switch is the best solution. Wouldn't that require reconfiguring the guest VMs and potentially cause some downtime?
upvoted 0 times
Aleisha
7 days ago
Option A might cause some downtime, but it's a good solution to separate the groups without changing IP addresses
upvoted 0 times
...
Leslee
1 months ago
Option A might be the best choice to avoid downtime and reconfiguring the guest VMs.
upvoted 0 times
...
Aja
1 months ago
B) Edit the IP address of all of the affected VMs
upvoted 0 times
...
Gilma
1 months ago
B) Edit the IP address of all of the affected VMs
upvoted 0 times
...
Elke
1 months ago
A) Create a new virtual switch and use the VM-Series firewall to separate virtual switches using Virtual Wire mode Then move the guests that require more security into the new virtual switch
upvoted 0 times
...
Julene
2 months ago
A) Create a new virtual switch and use the VM-Series firewall to separate virtual switches using Virtual Wire mode Then move the guests that require more security into the new virtual switch
upvoted 0 times
...
...
Mariko
3 months ago
I'm not sure about option A. I think option D could also work by creating a Layer 3 interface.
upvoted 0 times
...
Merlyn
3 months ago
I agree with Malcom. Option A seems like the most efficient way to achieve the partitioning.
upvoted 0 times
...
Malcom
3 months ago
I think option A is the best choice. It allows us to separate the VMs without changing any IP addresses.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77