<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DDOS / DOS Protection in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ddos-dos-protection/m-p/563020#M1999</link>
    <description>&lt;P&gt;Good Day&lt;BR /&gt;&lt;BR /&gt;It is possible to put a FW in front of the Internet Router, but the appliance would need to be scoped bigger to handle massive potential payloads that are unwarranted (DoS).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SCantwell_IM_0-1698185710098.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/54657i263E64FD378E2E2B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SCantwell_IM_0-1698185710098.png" alt="SCantwell_IM_0-1698185710098.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;If given the choice, I would work with the ISP to help limit DoS attacks coming to the router, as more ISP hardware&amp;nbsp; typically has better hardware buffer capacities to ward on a DDoS, built into their hardware.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;You may want to do some SNMP queries to determine that number of connection per sec (cps) that the router is handling at different times/peak times, to determine what PANW FW (if you choose to utilize it) for your customer.&lt;/P&gt;
&lt;P&gt;What other questions can we answer for you?&lt;/P&gt;</description>
    <pubDate>Tue, 24 Oct 2023 22:19:05 GMT</pubDate>
    <dc:creator>S.Cantwell</dc:creator>
    <dc:date>2023-10-24T22:19:05Z</dc:date>
    <item>
      <title>DDOS / DOS Protection</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ddos-dos-protection/m-p/561593#M1957</link>
      <description>&lt;P&gt;Is there any benefit of placing an additional firewall on the OUTSIDE of the customer's internet/external router? There is already a perimeter firewall on the inside of this router.&lt;/P&gt;
&lt;P&gt;(Proposed additional firewall running virtual wire) &amp;lt;---&amp;gt; External Router (BGP and internet links) &amp;lt;----&amp;gt; Perimeter Firewall &amp;lt;----&amp;gt; Internal Router&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This external router is serving as the internet gateway for the FW as well as a BGP termination point for various of their external links. The firewall does not take part in the BGP. ALL traffic from that internet router then passes through a perimeter gateway firewall and then gets sent to wherever it needs to go to in the inside of the customer network (they have an internal router also).&lt;/P&gt;
&lt;P&gt;The network team wants us to put an additional PA firewall on the OUTSIDE of the internet router to provide protection for that router against DOS and other attacks. Note that inspection and security policies are already done on the firewall on the inside of the router to protect the internal resources.&lt;/P&gt;
&lt;P&gt;Will the PA be able to provide enough protection to make this worth while? I assume this will only for network layer attacks so only really what is available in a DOS protection profile or will vulnerability protection also help here? Or should they get a dedicated DDOS appliance for this?&lt;/P&gt;
&lt;P&gt;I've never had to firewall/protect the actual network infrastructure before so no idea what to&amp;nbsp;tell&amp;nbsp;them&amp;nbsp;here.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Oct 2023 07:12:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ddos-dos-protection/m-p/561593#M1957</guid>
      <dc:creator>ThamiDlaminiITN</dc:creator>
      <dc:date>2023-10-13T07:12:32Z</dc:date>
    </item>
    <item>
      <title>Re: DDOS / DOS Protection</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ddos-dos-protection/m-p/563020#M1999</link>
      <description>&lt;P&gt;Good Day&lt;BR /&gt;&lt;BR /&gt;It is possible to put a FW in front of the Internet Router, but the appliance would need to be scoped bigger to handle massive potential payloads that are unwarranted (DoS).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SCantwell_IM_0-1698185710098.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/54657i263E64FD378E2E2B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SCantwell_IM_0-1698185710098.png" alt="SCantwell_IM_0-1698185710098.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;If given the choice, I would work with the ISP to help limit DoS attacks coming to the router, as more ISP hardware&amp;nbsp; typically has better hardware buffer capacities to ward on a DDoS, built into their hardware.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;You may want to do some SNMP queries to determine that number of connection per sec (cps) that the router is handling at different times/peak times, to determine what PANW FW (if you choose to utilize it) for your customer.&lt;/P&gt;
&lt;P&gt;What other questions can we answer for you?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 22:19:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ddos-dos-protection/m-p/563020#M1999</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2023-10-24T22:19:05Z</dc:date>
    </item>
    <item>
      <title>Re: DDOS / DOS Protection</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ddos-dos-protection/m-p/563032#M2001</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/226406"&gt;@ThamiDlaminiITN&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have seen some sales people promote protecting the external routers, but I agree with &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt; .&amp;nbsp; Most routers are built to be connected to the Internet and can be patched, hardened, and configured with some features to limit DoS.&amp;nbsp; Most ISPs offer some DDoS protection, and some offer extra DDoS protection as an additional service.&amp;nbsp; I would work with the ISP 1st.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Wed, 25 Oct 2023 01:24:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ddos-dos-protection/m-p/563032#M2001</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-10-25T01:24:53Z</dc:date>
    </item>
    <item>
      <title>Re: DDOS / DOS Protection</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ddos-dos-protection/m-p/563680#M2029</link>
      <description>&lt;P&gt;Thank you for the responses guys, really appreciate it. They helped.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2023 08:59:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ddos-dos-protection/m-p/563680#M2029</guid>
      <dc:creator>ThamiDlaminiITN</dc:creator>
      <dc:date>2023-10-31T08:59:03Z</dc:date>
    </item>
  </channel>
</rss>

