<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Mitigation for DHCP Starvation attack in shared network zone (e.g.Eduroam) in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/mitigation-for-dhcp-starvation-attack-in-shared-network-zone-e-g/m-p/561009#M1937</link>
    <description>&lt;P&gt;Hi everyone,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there anyway for us to utilize Palo NGFW to prevent or mitigate DHCP starvation attack.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example, a user's BYOD device is infected with malware, after authenticated with eduroam network, the device start performing DHCP starvation attack without the user even realize.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have tried looking online for solutions, there's recommendation such as DHCP snooping, port security in layer 2 but not sure if it is effective for shared network/wifi zone.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance your help!&lt;/P&gt;</description>
    <pubDate>Tue, 10 Oct 2023 03:26:13 GMT</pubDate>
    <dc:creator>LuckyLau</dc:creator>
    <dc:date>2023-10-10T03:26:13Z</dc:date>
    <item>
      <title>Mitigation for DHCP Starvation attack in shared network zone (e.g.Eduroam)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/mitigation-for-dhcp-starvation-attack-in-shared-network-zone-e-g/m-p/561009#M1937</link>
      <description>&lt;P&gt;Hi everyone,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there anyway for us to utilize Palo NGFW to prevent or mitigate DHCP starvation attack.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example, a user's BYOD device is infected with malware, after authenticated with eduroam network, the device start performing DHCP starvation attack without the user even realize.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have tried looking online for solutions, there's recommendation such as DHCP snooping, port security in layer 2 but not sure if it is effective for shared network/wifi zone.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance your help!&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2023 03:26:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/mitigation-for-dhcp-starvation-attack-in-shared-network-zone-e-g/m-p/561009#M1937</guid>
      <dc:creator>LuckyLau</dc:creator>
      <dc:date>2023-10-10T03:26:13Z</dc:date>
    </item>
    <item>
      <title>Re: Mitigation for DHCP Starvation attack in shared network zone (e.g.Eduroam)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/mitigation-for-dhcp-starvation-attack-in-shared-network-zone-e-g/m-p/561069#M1940</link>
      <description>&lt;P&gt;Hello LuckyLau,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can set some rate limiting toward the DHCP server with DoS profile.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/zone-protection-and-dos-protection/zone-defense/dos-protection-profiles-and-policy-rules/classified-versus-aggregate-dos-protection" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/zone-protection-and-dos-protection/zone-defense/dos-protection-profiles-and-policy-rules/classified-versus-aggregate-dos-protection&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But not sure it is as efficient as other L2 mechanism (I'm a fan of blocking as soon as possible an unwanted traffic)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Olivier&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2023 08:27:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/mitigation-for-dhcp-starvation-attack-in-shared-network-zone-e-g/m-p/561069#M1940</guid>
      <dc:creator>ozheng</dc:creator>
      <dc:date>2023-10-10T08:27:40Z</dc:date>
    </item>
  </channel>
</rss>

