<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Distributed VPN attack in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/distributed-vpn-attack/m-p/588654#M3255</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Also setup zone protection profiles to help with DoS type activity. Also only allow traffic from the countries you trust. Setup security policies to block traffic from the Palo Alto External Dynamic lists. Send Telemetry back to Palo Alto and this will help everyone else, etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Mon, 03 Jun 2024 21:56:30 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2024-06-03T21:56:30Z</dc:date>
    <item>
      <title>Distributed VPN attack</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/distributed-vpn-attack/m-p/588261#M3238</link>
      <description>&lt;P&gt;Recently we experience distributed VPN dictionary attack on our Palo Alto Global Protect from different countries, ISPs and hundreds of IP addresses. Since we have MFA the attack was unsuccessful so far but I want to stop it somehow. The malicious actor seems to adopt the attack to our protection measures. Originally it was addressing our GlobalProtect Portal so disabling it helped for a while but yesterday they changed the way and now I can see in logs authentication failures again.&lt;/P&gt;
&lt;P&gt;I’m looking for advise about more sophisticated protection against these attacks. I can see in logs that the malicious actor is using:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;client_os Linux or Ubuntu but not Windows which we have. We change OS to Windows in Gateway configuration hoping it will stop the attack at least for a while.&lt;/LI&gt;
&lt;LI&gt;Client_ver is Browser or empty&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Can somebody advise if we can apply better protection somehow?&lt;/P&gt;
&lt;P&gt;Also, I would like to set different rule based protection to Global Protect Portal and Global Protect VPN client. In other words, Access to the Portal should be limited to one country only but the VPN should be accessible from anywhere. Is it possible?&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 13:25:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/distributed-vpn-attack/m-p/588261#M3238</guid>
      <dc:creator>Piotr_Kowalczyk</dc:creator>
      <dc:date>2024-05-29T13:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: Distributed VPN attack</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/distributed-vpn-attack/m-p/588650#M3252</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Assuming you have a vulnerability profile applied on your GP interface, is it triggering the brute force vulnerability? You can make various changes to this ID to fit your needs. Where you can set the action to block IP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Claw4609_0-1717447411661.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60160i3779C3A961271950/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Claw4609_0-1717447411661.png" alt="Claw4609_0-1717447411661.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Claw4609_1-1717447411663.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60159iDA948A18D637D7E8/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Claw4609_1-1717447411663.png" alt="Claw4609_1-1717447411663.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the second piece are you looking at protecting a separate clientless vpn page or the main portal itself? Clients grab their configurations from the portal so you wouldnt be able to block access to the portal.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 20:45:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/distributed-vpn-attack/m-p/588650#M3252</guid>
      <dc:creator>Claw4609</dc:creator>
      <dc:date>2024-06-03T20:45:40Z</dc:date>
    </item>
    <item>
      <title>Re: Distributed VPN attack</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/distributed-vpn-attack/m-p/588654#M3255</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Also setup zone protection profiles to help with DoS type activity. Also only allow traffic from the countries you trust. Setup security policies to block traffic from the Palo Alto External Dynamic lists. Send Telemetry back to Palo Alto and this will help everyone else, etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 21:56:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/distributed-vpn-attack/m-p/588654#M3255</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-06-03T21:56:30Z</dc:date>
    </item>
    <item>
      <title>Re: Distributed VPN attack</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/distributed-vpn-attack/m-p/588743#M3263</link>
      <description>Thank you!</description>
      <pubDate>Tue, 04 Jun 2024 16:03:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/distributed-vpn-attack/m-p/588743#M3263</guid>
      <dc:creator>Piotr_Kowalczyk</dc:creator>
      <dc:date>2024-06-04T16:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: Distributed VPN attack</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/distributed-vpn-attack/m-p/588744#M3264</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;No worries and let us know if you need anything else.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 16:09:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/distributed-vpn-attack/m-p/588744#M3264</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-06-04T16:09:14Z</dc:date>
    </item>
  </channel>
</rss>

