<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Support FAQ: Flood Attacks - Configuration &amp;amp; Troubleshooting Best Practices in Support FAQ</title>
    <link>https://live.paloaltonetworks.com/t5/support-faq/support-faq-flood-attacks-configuration-amp-troubleshooting-best/ta-p/1232249</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Title_Flood-Attacks_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68119iF7CF3517CA9A5BCC/image-size/large?v=v2&amp;amp;px=999" role="button" title="Title_Flood-Attacks_palo-alto-networks.jpg" alt="Title_Flood-Attacks_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2" color="#333333"&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;Written by&amp;nbsp;Alex Laulhe. With special thanks to&amp;nbsp;Anupam S. &amp;amp; Amogh G. for their contributions.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This&amp;nbsp;guide is designed to help firewall admins effectively &lt;/SPAN&gt;&lt;STRONG&gt;understand&lt;/STRONG&gt; &lt;STRONG&gt;flood attack prevention&lt;/STRONG&gt;&lt;SPAN&gt; and &lt;/SPAN&gt;&lt;STRONG&gt;troubleshoot&lt;/STRONG&gt; &lt;STRONG&gt;flooding incidents&lt;/STRONG&gt;&lt;SPAN&gt; detected by Palo Alto Networks firewalls. Whether the event is triggered by &lt;/SPAN&gt;&lt;STRONG&gt;&lt;I&gt;packet&lt;/I&gt;&lt;/STRONG&gt; &lt;STRONG&gt;&lt;I&gt;buffer protection (PBP)&lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;, &lt;/STRONG&gt;&lt;STRONG&gt;&lt;I&gt;Zone Protection (ZPP)&lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;, or &lt;/STRONG&gt;&lt;STRONG&gt;&lt;I&gt;DoS protection profiles (DoSP)&lt;/I&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, this document provides guidance on how to identify the type of flood, determine the root cause, and take corrective &amp;amp; preventive actions through “&lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;Best Practices”.&amp;nbsp;&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;I&gt;&lt;SPAN&gt;N.B: Please note that this document is a collection of best practices and knowledge from our PAN Community. It does not replace our official guides.&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;&lt;SPAN&gt;_________________________________________________________________________________________________&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Part 1 - &lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;Understanding Flood Prevention and Best Practices&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Part 2 -&lt;/STRONG&gt;&lt;SPAN&gt; Troubleshooting Flood Attacks: Workflow &amp;amp; CLI Commands!&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;&lt;SPAN&gt;_________________________________________________________________________________________________&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Part 1 - Understanding Flood Attack Prevention on NGFWs&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Flood attacks aim to overwhelm network resources by sending large volumes of traffic, typically to exhaust bandwidth or system processing capacity. Palo Alto Networks Next-Generation Firewalls (NGFWs) provide multiple layers of protection to detect and prevent these attacks, including:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL class="lia-list-style-type-upper-alpha"&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;​​&lt;/SPAN&gt;&lt;STRONG&gt;Zone Protection Profiles (ZPP)&lt;/STRONG&gt;&lt;SPAN&gt;: First line of defense, applied at the ingress interface to protect entire zones.​&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;DoS Protection Policies (DoSP)&lt;/STRONG&gt;&lt;SPAN&gt;: Second layer, applied &lt;/SPAN&gt;&lt;SPAN&gt;after session creation &lt;/SPAN&gt;&lt;SPAN&gt;to protect specific resources.​&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Packet Buffer Protection (PBP)&lt;/STRONG&gt;&lt;SPAN&gt;: Final layer, monitors and protects the firewall's internal resources during &lt;/SPAN&gt;&lt;SPAN&gt;active sessions.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;A. Zone Protection Profiles (ZPP)&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Zone Protection Profiles are defensive mechanisms applied at the zone level (not individual rules) to protect against network floods, reconnaissance, and protocol-based attacks &lt;/SPAN&gt;&lt;STRONG&gt;before&lt;/STRONG&gt; &lt;STRONG&gt;a session is even established.&lt;/STRONG&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Good to know:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Zone protection&lt;/STRONG&gt;&lt;SPAN&gt; will be enforced &lt;/SPAN&gt;&lt;STRONG&gt;before&lt;/STRONG&gt; &lt;STRONG&gt;DoS policy&lt;/STRONG&gt; &lt;STRONG&gt;lookup&lt;/STRONG&gt; &lt;SPAN&gt;IF&lt;/SPAN&gt;&lt;SPAN&gt; an IP happens to be present in both the profiles:&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;It can be used as a template configuration for applying similar settings to multiple zones.&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;These settings apply to the ingress zone (i.e. the zone where traffic enters the firewall).&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Zone protection settings apply to all interfaces within the zone for which the profile is configured.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;It applies to all traffic passing through the zone and it’s not based per source, destination or source-destination (Aggregate)&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 1_Flood-Attacks_palo-alto-networks.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68114i5F7FBA9032999AD9/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 1_Flood-Attacks_palo-alto-networks.jpg" alt="Fig 1_Flood-Attacks_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Key Protection Mechanisms:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Flood Protection&lt;/STRONG&gt;&lt;SPAN&gt;: Mitigates high-volume traffic attacks such as SYN, ICMP, and UDP floods by setting thresholds to detect and drop excessive packets.​&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Reconnaissance Protection&lt;/STRONG&gt;&lt;SPAN&gt;: Detects and blocks scanning activities like TCP/UDP port scans and host sweeps, which are often precursors to more targeted attacks.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Packet-Based Attack Protection&lt;/STRONG&gt;&lt;SPAN&gt;: Identifies and discards malformed or malicious packets that could exploit vulnerabilities in network protocols.​&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Non-IP Protocol Protection&lt;/STRONG&gt;&lt;SPAN&gt;: Controls traffic using non-IP protocols, preventing potential abuse of less common communication methods.​&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Best Practices&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Configure Flood Protection&lt;/STRONG&gt;&lt;SPAN&gt; under&lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt; Network &amp;gt; Network Profiles &amp;gt; Zone Protection &amp;gt; Zone Protection Profile &amp;gt; Flood Protection&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; and &lt;/SPAN&gt;&lt;STRONG&gt;apply it to the ingress zone of the traffic flood.&lt;/STRONG&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Tailored Profiles&lt;/STRONG&gt;&lt;SPAN&gt;: Customize Zone Protection Profiles based on the specific needs and typical traffic patterns of each zone (&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/best-practices/dos-and-zone-protection-best-practices/dos-and-zone-protection-best-practices/deploy-dos-and-zone-protection-using-best-practices" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;follow best practices&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Monitoring and Adjustment&lt;/STRONG&gt;&lt;SPAN&gt;: Regularly monitor the effectiveness of protection mechanisms and adjust thresholds as necessary to balance security and performance.​&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-level="1"&gt;&lt;STRONG&gt;Complementary Measures&lt;/STRONG&gt;&lt;SPAN&gt;: In addition to Zone Protection, implement DoS Protection profiles, PBP and Security Profiles to provide layered defense strategies.​&lt;/SPAN&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;STRONG&gt;References&amp;nbsp; &lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/zone-protection-and-dos-protection" target="_blank" rel="noopener"&gt;&lt;SPAN&gt; Zone Protection Profiles&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp; &amp;amp;&amp;nbsp; &lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/best-practices/dos-and-zone-protection-best-practices/dos-and-zone-protection-best-practices/deploy-dos-and-zone-protection-using-best-practices" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Best Practices&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;B. DoS Protection Policies (DoSP)&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;DoS Protection Profiles are policies that &lt;/SPAN&gt;&lt;STRONG&gt;protect specific targets&lt;/STRONG&gt;&lt;SPAN&gt; (like critical servers or services - i.e. policies can be configured to match zone, interface, IP address or user information as match conditions) from Denial of Service (DoS) attacks. Unlike Zone Protection Profiles (which protect at the &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;zone level&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;), DoS profiles focus on more granular control and operating &lt;/SPAN&gt;&lt;STRONG&gt;after a session is established.&lt;/STRONG&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Key Components:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;DoS Protection Profile&lt;/STRONG&gt;&lt;SPAN&gt;: Defines &lt;/SPAN&gt;&lt;STRONG&gt;how&lt;/STRONG&gt;&lt;SPAN&gt; to detect and mitigate attacks (thresholds, actions, flood types). It's a reusable set of settings.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;DoS Rule&lt;/STRONG&gt;&lt;SPAN&gt;: Defines &lt;/SPAN&gt;&lt;STRONG&gt;where&lt;/STRONG&gt;&lt;SPAN&gt; and &lt;/SPAN&gt;&lt;STRONG&gt;to whom&lt;/STRONG&gt;&lt;SPAN&gt; the profile applies (zones, IPs, interfaces). It matches traffic and applies a specific DoS profile.&lt;/SPAN&gt;&lt;/P&gt;
&lt;BR /&gt;
&lt;P&gt;&lt;STRONG&gt;How It Works&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Configured under &lt;/SPAN&gt;&lt;STRONG&gt;Objects &amp;gt; DoS Protection&lt;/STRONG&gt;&lt;SPAN&gt; and &lt;/SPAN&gt;&lt;STRONG&gt;Policies &amp;gt; DoS Protection&lt;/STRONG&gt;&lt;SPAN&gt;.It is applied through &lt;/SPAN&gt;&lt;STRONG&gt;DoS Policies&lt;/STRONG&gt;&lt;SPAN&gt;, which match traffic using criteria like: &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;Source IP / Destination IP / Destination Zone / Service.&lt;/SPAN&gt;&lt;/I&gt;&lt;I&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;It is evaluated &lt;/SPAN&gt;&lt;STRONG&gt;after security policy&lt;/STRONG&gt;&lt;SPAN&gt; allows traffic.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;There is an additional lookup involved in the process. DoS rules are applied &lt;/SPAN&gt;&lt;STRONG&gt;before&lt;/STRONG&gt;&lt;SPAN&gt; security policy lookup, but &lt;/SPAN&gt;&lt;SPAN&gt;after&lt;/SPAN&gt;&lt;SPAN&gt; destination Zone determination.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Protection modes:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Aggregate&lt;/STRONG&gt;&lt;SPAN&gt; – Controls the total rate of connections to a destination (e.g., to a public web server).&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Classified&lt;/STRONG&gt;&lt;SPAN&gt; – Controls rate &lt;/SPAN&gt;&lt;STRONG&gt;per source IP&lt;/STRONG&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;STRONG&gt;per destination IP&lt;/STRONG&gt;&lt;SPAN&gt;, or &lt;/SPAN&gt;&lt;STRONG&gt;per source-destination pair&lt;/STRONG&gt;&lt;SPAN&gt; (useful for blocking distributed or targeted attacks).&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Each profile includes:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Alarm Rate&lt;/STRONG&gt;&lt;SPAN&gt; – When to log the activity.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Activate Rate&lt;/STRONG&gt;&lt;SPAN&gt; – When mitigation begins.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Maximum Rate&lt;/STRONG&gt;&lt;SPAN&gt; – When the firewall drops all new connections.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;These are measured in:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Connections per second (CPS)&lt;/STRONG&gt;&lt;SPAN&gt; for TCP/UDP/ICMP flood protection.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Packets per second (PPS)&lt;/STRONG&gt;&lt;SPAN&gt; for packet-based attacks.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 2_Flood-Attacks_palo-alto-networks.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68115i494F06505240CC46/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 2_Flood-Attacks_palo-alto-networks.jpg" alt="Fig 2_Flood-Attacks_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditoremgarcia_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Best Practices&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;Although DoS Policy runs &lt;/SPAN&gt;&lt;SPAN&gt;after&lt;/SPAN&gt;&lt;SPAN&gt; Zone Protection, the thresholds should be configured aiming to activate the &lt;/SPAN&gt;&lt;STRONG&gt;DoS Rule before Zone Protection – so you can benefit from offloading the attacker IP to the HW Block List.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Always start with a Baseline&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Monitor &lt;/SPAN&gt;&lt;STRONG&gt;normal traffic&lt;/STRONG&gt;&lt;SPAN&gt; (CPS/PPS) to critical systems before applying limits.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Use ACC or logging to analyze patterns and peak usage.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Use Both Aggregate and Classified Profiles&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Aggregate&lt;/STRONG&gt;&lt;SPAN&gt; to protect servers from total overload.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Classified&lt;/STRONG&gt;&lt;SPAN&gt; to stop single or multiple sources from flooding.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Apply Only to Untrusted Zones or Critical Resources&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;DoS policies are resource-intensive; apply them only where needed (e.g., public-facing services like web/mail servers).&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;We Recommend to Use SYN Cookies or RED Mechanisms&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Enable &lt;/SPAN&gt;&lt;STRONG&gt;SYN cookies&lt;/STRONG&gt;&lt;SPAN&gt; to handle TCP floods.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Use &lt;/SPAN&gt;&lt;STRONG&gt;Random Early Drop (RED)&lt;/STRONG&gt;&lt;SPAN&gt; to reduce the chance of false positives.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Tune Thresholds Carefully&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Set thresholds &lt;/SPAN&gt;&lt;STRONG&gt;above your normal peak traffic&lt;/STRONG&gt;&lt;SPAN&gt;, but low enough to catch attacks early.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Start in &lt;/SPAN&gt;&lt;STRONG&gt;"monitor" mode&lt;/STRONG&gt;&lt;SPAN&gt;, then move to &lt;/SPAN&gt;&lt;STRONG&gt;"block" mode&lt;/STRONG&gt;&lt;SPAN&gt; once confident.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Log and Alert&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Consider &lt;/SPAN&gt;&lt;STRONG&gt;log drops and alerts&lt;/STRONG&gt;&lt;SPAN&gt; to help refine your tuning.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Consider forwarding logs to SIEM for correlation –&amp;nbsp; or better &lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/cyberpedia/what-is-extended-security-intelligence-and-automation-management-xsiam" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;to XSIAM!&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;STRONG&gt;References&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/zone-protection-and-dos-protection/dos-protection-profiles" target="_blank" rel="noopener"&gt;&lt;SPAN&gt; DoS Protection&lt;/SPAN&gt;&lt;/A&gt; &lt;SPAN&gt;&amp;amp; &lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/best-practices/dos-and-zone-protection-best-practices/dos-and-zone-protection-best-practices/deploy-dos-and-zone-protection-using-best-practices" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Best practices&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;C. Packet Buffer Protection (PBP)&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Overview: What is Packet Buffer Protection?&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;Packet Buffer Protection (PBP) is a defense mechanism designed to safeguard the NGFWs against &lt;/SPAN&gt;&lt;STRONG&gt;single-session&lt;/STRONG&gt;&lt;SPAN&gt; Denial-of-Service (DoS) attacks that can overwhelm the firewall's packet buffer, leading to legitimate traffic being dropped. Unlike Zone Protection or DoS Protection policies that primarily focus on new sessions, &lt;/SPAN&gt;&lt;STRONG&gt;PBP targets existing sessions&lt;/STRONG&gt;&lt;SPAN&gt; and &lt;/SPAN&gt;&lt;STRONG&gt;operates both globally and at the zone level.&lt;/STRONG&gt;&lt;SPAN&gt;​&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Key Components:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;1. Global Packet Buffer Protection&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Function&lt;/STRONG&gt;&lt;SPAN&gt;: Monitors overall packet buffer utilization across all zones.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Mechanism&lt;/STRONG&gt;&lt;SPAN&gt;: When utilization reaches a configured "Activate" threshold, the firewall employs Random Early Drop (RED) to probabilistically drop packets from sessions consuming excessive buffer resources.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Configuration&lt;/STRONG&gt;&lt;SPAN&gt;: Set under &lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/zone-protection-and-dos-protection/configure-zone-protection-to-increase-network-security/configure-packet-buffer-protection" target="_blank" rel="noopener"&gt;&lt;I&gt;&lt;SPAN&gt;Device &amp;gt; Setup &amp;gt; Session Settings&lt;/SPAN&gt;&lt;/I&gt;&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2. Per-Zone Packet Buffer Protection&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Function&lt;/STRONG&gt;&lt;SPAN&gt;: Adds a secondary layer of protection by monitoring buffer utilization within specific zones.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Mechanism&lt;/STRONG&gt;&lt;SPAN&gt;: If RED is triggered globally and the offending session persists beyond a configured "Block Hold Time," the firewall can block the entire session or the source IP address for a defined "Block Duration."&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Configuration&lt;/STRONG&gt;&lt;SPAN&gt;: Enabled under &lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/zone-protection-and-dos-protection/zone-defense/packet-buffer-protection?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;&lt;I&gt;&lt;SPAN&gt;Network &amp;gt; Zones&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Two (2) Types of Packet Buffer Protection&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;A. Based on “Buffer Utilization”&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Triggers protection mechanisms when packet buffer usage exceeds certain thresholds.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Key Settings&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Alert (%)&lt;/STRONG&gt;&lt;SPAN&gt;: Threshold to generate alert logs (default: 50%).&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Activate (%)&lt;/STRONG&gt;&lt;SPAN&gt;: Threshold to initiate RED (default: 80%).&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Block Hold Time (sec)&lt;/STRONG&gt;&lt;SPAN&gt;: Duration before blocking an offending session (default: 60 seconds).&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Block Duration (sec)&lt;/STRONG&gt;&lt;SPAN&gt;: Time to block the session or IP (default: 3600 seconds.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;B. Based on Latency (since PANOS 10)&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Activates protection based on packet latency, which can indicate congestion even before buffer utilization thresholds are met.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Such packet buffer protection mitigates head-of-line blocking by alerting you to the congestion and performing random early drop (RED) on packets. Packet buffer protection based on latency can trigger the protection before latency-sensitive protocols or applications are affected.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Key Settings&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Latency Alert (ms)&lt;/STRONG&gt;&lt;SPAN&gt;: Threshold to generate alert logs (default: 50ms).&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Latency Activate (ms)&lt;/STRONG&gt;&lt;SPAN&gt;: Threshold to initiate RED (default: 200ms).&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Latency Max Tolerate (ms)&lt;/STRONG&gt;&lt;SPAN&gt;: Threshold where RED drops nearly all packets (default: 500ms).​&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Best Practices For PBP:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Configuration&lt;/STRONG&gt;&lt;SPAN&gt;: We recommend enabling &lt;/SPAN&gt;&lt;SPAN&gt;both&lt;/SPAN&gt;&lt;SPAN&gt; PBP “per-zone” and also PBP “globally” (&lt;/SPAN&gt;&lt;SPAN&gt;Globally under &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;“Device &amp;gt; Setup&amp;gt; Session Settings &lt;/SPAN&gt;&lt;/I&gt;&lt;STRONG&gt;&lt;I&gt;and&lt;/I&gt;&lt;/STRONG&gt;&lt;I&gt;&lt;SPAN&gt; per zone under “Network &amp;gt; Zones&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;” &lt;/SPAN&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Baseline Monitoring&lt;/STRONG&gt;&lt;SPAN&gt;: Regularly monitor packet buffer utilization to establish normal operating thresholds.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threshold Tuning&lt;/STRONG&gt;&lt;SPAN&gt;: Adjust Alert and Activate thresholds based on observed traffic patterns.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;NAT Considerations&lt;/STRONG&gt;&lt;SPAN&gt;: Be cautious when applying IP-based blocking in environments using NAT, as multiple users might share the same IP address&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;References&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/zone-protection-and-dos-protection/packet-buffer-protection" target="_self"&gt;Packet Buffer Protection&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/best-practices/dos-and-zone-protection-best-practices/dos-and-zone-protection-best-practices/deploy-dos-and-zone-protection-using-best-practices" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Best Practices&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Part 2 - Troubleshooting Flood Attacks&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;BR /&gt;
&lt;P&gt;&lt;SPAN&gt;This second part focuses on providing a &lt;/SPAN&gt;&lt;STRONG&gt;high-level workflow&lt;/STRONG&gt;&lt;SPAN&gt; that an NGFW Admin can use to troubleshoot Flood Attacks&amp;nbsp; – and at the end, a list of &lt;/SPAN&gt;&lt;STRONG&gt;valuable CLI Commands&lt;/STRONG&gt;&lt;SPAN&gt; that they can refer to find the root cause and mitigate the impact.&lt;/SPAN&gt;&lt;/P&gt;
&lt;BR /&gt;
&lt;H3&gt;&lt;STRONG&gt;A - “7-Step” Flood Attack Troubleshooting Workflow:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;This workflow is a living document, feel free to add extra steps!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1. Identify Symptoms:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Like High CPU usage, elevated session counts, or unusual traffic spikes.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Increased latency or degraded application performance.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Dropped connections or connection resets.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Alerts from Panorama, SNMP monitoring tools, or Strata Cloud Manager.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;End users reporting intermittent access or denial of service, etc.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;2. Check Counters and Logs (CLI &amp;amp; GUI)&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Start setting up basic capture filters: run &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/I&gt;&lt;STRONG&gt;&lt;I&gt;show counter global filter delta yes | match drop&lt;/I&gt;&lt;/STRONG&gt;&lt;I&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; to see what's causing packets to be drop; It should look like this:&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;BR /&gt;
&lt;P&gt;&lt;SPAN&gt;name &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; value &amp;nbsp; &amp;nbsp; rate severity&amp;nbsp; category&amp;nbsp; aspect&amp;nbsp; &amp;nbsp; description&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-----------------------------------------------------------------------------------&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;flow_dos_red_tcp &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0 drop&amp;nbsp; &amp;nbsp; &amp;nbsp; flow&amp;nbsp; &amp;nbsp; &amp;nbsp; dos &amp;nbsp; &amp;nbsp; &amp;nbsp; Packets dropped: Zone protection protocol 'tcp-syn' RED&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;flow_dos_rule_drop &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0 drop&amp;nbsp; &amp;nbsp; &amp;nbsp; flow&amp;nbsp; &amp;nbsp; &amp;nbsp; dos &amp;nbsp; &amp;nbsp; &amp;nbsp; Packets dropped: Rate limited or IP blocked&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;flow_dos_rule_drop_aggr&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0 drop&amp;nbsp; &amp;nbsp; &amp;nbsp; flow&amp;nbsp; &amp;nbsp; &amp;nbsp; dos &amp;nbsp; &amp;nbsp; &amp;nbsp; Packets dropped: due to aggregate rate limiting&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;flow_dos_rule_ag_red_act &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0 drop&amp;nbsp; &amp;nbsp; &amp;nbsp; flow&amp;nbsp; &amp;nbsp; &amp;nbsp; dos &amp;nbsp; &amp;nbsp; &amp;nbsp; Packets dropped: Activate aggregate RED threshold reached, random early drop&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;flow_dos_rule_match&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 1&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0 info&amp;nbsp; &amp;nbsp; &amp;nbsp; flow&amp;nbsp; &amp;nbsp; &amp;nbsp; dos &amp;nbsp; &amp;nbsp; &amp;nbsp; Packets matched DoS policy&lt;/SPAN&gt;&lt;/P&gt;
&lt;BR /&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;On GUI: Monitor &amp;gt; Logs &amp;gt; Threat&lt;/STRONG&gt;&lt;SPAN&gt; → filter: &lt;/SPAN&gt;&lt;SPAN&gt;(subtype eq flood)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Review type (ZPP, DoS, PBP), action (drop, reset, block)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;BR /&gt;
&lt;P&gt;&lt;STRONG&gt;3. Validate Zone Protection (ZPP) configuration&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;GUI&lt;/STRONG&gt;&lt;SPAN&gt;: Network &amp;gt; Zones &amp;gt; Zone Protection Profile&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;CLI&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 3_Flood-Attacks_palo-alto-networks.jpg" style="width: 620px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68116i3457DE06CE8813DD/image-dimensions/620x180?v=v2" width="620" height="180" role="button" title="Fig 3_Flood-Attacks_palo-alto-networks.jpg" alt="Fig 3_Flood-Attacks_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;4. Validate DoS Protection (DoSP)&lt;/STRONG&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;GUI&lt;/STRONG&gt;&lt;SPAN&gt;: Policies &amp;gt; DoS Protection &amp;amp; Objects &amp;gt; DoS Protection Profiles&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;CLI&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 4_Flood-Attacks_palo-alto-networks.jpg" style="width: 621px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68117i0DDBD538AD3E0225/image-dimensions/621x178?v=v2" width="621" height="178" role="button" title="Fig 4_Flood-Attacks_palo-alto-networks.jpg" alt="Fig 4_Flood-Attacks_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;BR /&gt;
&lt;H4&gt;&lt;STRONG&gt;5. Validate Packet Buffer Protection (PBP)&lt;/STRONG&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;CLI&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 5_Flood-Attacks_palo-alto-networks.jpg" style="width: 621px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68118i0F9AA7DEB7C26C73/image-dimensions/621x205?v=v2" width="621" height="205" role="button" title="Fig 5_Flood-Attacks_palo-alto-networks.jpg" alt="Fig 5_Flood-Attacks_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;TIP: &lt;/I&gt;&lt;/STRONG&gt;&lt;I&gt;&lt;SPAN&gt;&amp;nbsp;Customers can enable PBP in &lt;/SPAN&gt;&lt;/I&gt;&lt;STRONG&gt;&lt;I&gt;monitor Mode&lt;/I&gt;&lt;/STRONG&gt;&lt;I&gt;&lt;SPAN&gt;; the FW won’t drop any traffic or block offenders but only monitors the traffic and figuring out aggressive sessions / sources.&amp;nbsp;&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;BR /&gt;
&lt;P&gt;&lt;I&gt;&lt;SPAN&gt;i.e. No action is taken, only logging the offender in the “Threat logs” with the action “Alert” instead of “Drop” or “Block”.&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;BR /&gt;
&lt;H4&gt;&lt;STRONG&gt;6. Identify Sources:&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;Pinpointing Source IPs in Flood Attacks can be challenging, for many reasons:&lt;/SPAN&gt;&lt;/P&gt;
&lt;BR /&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Flood attacks may originate from &lt;/SPAN&gt;&lt;STRONG&gt;thousands of IPs simultaneously&lt;/STRONG&gt;&lt;SPAN&gt; (botnets).&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Many flood attacks (e.g. &lt;/SPAN&gt;&lt;STRONG&gt;UDP or ICMP floods&lt;/STRONG&gt;&lt;SPAN&gt;) are &lt;/SPAN&gt;&lt;STRONG&gt;stateless&lt;/STRONG&gt;&lt;SPAN&gt;, meaning no session is established.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Since Palo Alto firewalls log most data at the &lt;/SPAN&gt;&lt;STRONG&gt;session level&lt;/STRONG&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;STRONG&gt;non-session traffic often bypasses visibility&lt;/STRONG&gt;&lt;SPAN&gt; unless Zone Protection or custom packet captures are configured (No session = no log = hard to trace back).&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;​​If &lt;/SPAN&gt;&lt;STRONG&gt;logging is not enabled&lt;/STRONG&gt;&lt;SPAN&gt; for flood detection (in ZPP or DoS Profiles), or if &lt;/SPAN&gt;&lt;STRONG&gt;packet captures&lt;/STRONG&gt;&lt;SPAN&gt; aren’t set up, there may simply be &lt;/SPAN&gt;&lt;STRONG&gt;no data&lt;/STRONG&gt;&lt;SPAN&gt; to analyze.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;BR /&gt;
&lt;P&gt;&lt;U&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;If logs still don’t show source IP:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A - Try Spotting “ Traffic Anomalies” with Panorama ACC&lt;/STRONG&gt; &lt;SPAN&gt;(or another traffic monitoring tool)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Widgets like "&lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;Top Applications&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;," "T&lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;op Source IPs,&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;" and "&lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;Top Sessions&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;" can highlight sudden spikes in traffic:&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;A flood attack might show up as:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;One or more IPs with &lt;/SPAN&gt;&lt;STRONG&gt;abnormally high session counts&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;High volumes of &lt;/SPAN&gt;&lt;STRONG&gt;UDP, ICMP, or unknown traffic&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Traffic to/from a target resource that’s much higher than baseline&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;BR /&gt;
&lt;P&gt;&lt;STRONG&gt;B - Perform Packet Captures&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;​​Packet captures are extremely powerful for diagnosing network issues — but in the context of flood attacks, they’re often used as a last resort – for example when &lt;/SPAN&gt;&lt;STRONG&gt;Logs are&lt;/STRONG&gt; &lt;STRONG&gt;inconclusive&lt;/STRONG&gt;&lt;SPAN&gt; or don’t show source IPs or when you suspect &lt;/SPAN&gt;&lt;STRONG&gt;internal traffic&lt;/STRONG&gt;&lt;SPAN&gt; or &lt;/SPAN&gt;&lt;STRONG&gt;east-west floods&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;SPAN&gt;Use basic filters or run unfiltered captures for ~30s to sample traffic&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;SPAN&gt;Then, try to identify patterns in flood traffic or sources&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/monitoring/take-packet-captures" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;How to Take Packet Captures&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H4 class="lia-message-template-content-zone"&gt;&lt;STRONG&gt;7. Stopping the Flood:&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P class="lia-message-template-content-zone"&gt;&lt;STRONG&gt;As an immediate response&lt;/STRONG&gt;&lt;SPAN&gt;: once the Source IP/IPs of the Flood have been flagged, apply a &lt;/SPAN&gt;&lt;STRONG&gt;Security Policy Rule&lt;/STRONG&gt;&lt;SPAN&gt; to block it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-message-template-content-zone"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-message-template-content-zone"&gt;&lt;STRONG&gt;Longer term preventative actions:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Review ZPP, DoSP &amp;amp; PBP profiles and configurations&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Review thresholds, best practices and keep monitoring&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 class="lia-message-template-content-zone"&gt;&lt;STRONG&gt;B - Useful commands &lt;/STRONG&gt;&lt;STRONG&gt;during time of Issue&amp;nbsp;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P class="lia-message-template-content-zone"&gt;&lt;LI-WRAPPER&gt;&amp;nbsp;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;1.&amp;nbsp;Useful Global Counters&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;FONT face="courier new,courier" color="#008000"&gt;&lt;STRONG&gt;flow_dos_pbp_drop&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;What it Tracks&lt;/STRONG&gt;&lt;SPAN&gt;: Increments &lt;/SPAN&gt;&lt;STRONG&gt;for each packet&lt;/STRONG&gt;&lt;SPAN&gt; dropped by &lt;/SPAN&gt;&lt;STRONG&gt;Random Early Drop (RED)&lt;/STRONG&gt;&lt;SPAN&gt; due to &lt;/SPAN&gt;&lt;STRONG&gt;Packet Buffer Protection&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use Case&lt;/STRONG&gt;&lt;SPAN&gt;: Indicates &lt;/SPAN&gt;&lt;STRONG&gt;RED-based PBP is active&lt;/STRONG&gt;&lt;SPAN&gt; and throttling sessions based on buffer thresholds.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Interpretation&lt;/STRONG&gt;&lt;SPAN&gt;: A high value here means the system is under buffer stress, and RED is actively dropping aggressive session traffic.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-message-template-content-zone"&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-message-template-content-zone"&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;FONT face="courier new,courier" color="#008000"&gt;&lt;STRONG&gt;flow_dos_pbp_block_session&lt;/STRONG&gt;&lt;/FONT&gt; &lt;STRONG&gt;&lt;I&gt;(PAN-OS 10.0+ only)&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;What it Tracks&lt;/STRONG&gt;&lt;SPAN&gt;: Increments &lt;/SPAN&gt;&lt;STRONG&gt;once per session&lt;/STRONG&gt;&lt;SPAN&gt; that is &lt;/SPAN&gt;&lt;STRONG&gt;terminated and blocked&lt;/STRONG&gt;&lt;SPAN&gt; by PBP.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use Case&lt;/STRONG&gt;&lt;SPAN&gt;: Tracks &lt;/SPAN&gt;&lt;STRONG&gt;escalated action&lt;/STRONG&gt;&lt;SPAN&gt; where a session exceeded thresholds even after RED, triggering a session block.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Interpretation&lt;/STRONG&gt;&lt;SPAN&gt;: Reflects &lt;/SPAN&gt;&lt;STRONG&gt;next-tier PBP mitigation&lt;/STRONG&gt;&lt;SPAN&gt; beyond simple packet drops.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier" color="#008000"&gt;&lt;STRONG&gt;flow_dos_pbp_block_host&lt;/STRONG&gt;&lt;/FONT&gt; &lt;STRONG&gt;&lt;I&gt;(PAN-OS 10.0+ only)&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;What it Tracks&lt;/STRONG&gt;&lt;SPAN&gt;: Increments &lt;/SPAN&gt;&lt;STRONG&gt;once per host&lt;/STRONG&gt;&lt;SPAN&gt; (source IP) that gets &lt;/SPAN&gt;&lt;STRONG&gt;placed in the block list&lt;/STRONG&gt;&lt;SPAN&gt; due to sustained buffer abuse.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use Case&lt;/STRONG&gt;&lt;SPAN&gt;: Useful for identifying &lt;/SPAN&gt;&lt;STRONG&gt;aggressive clients or attackers&lt;/STRONG&gt;&lt;SPAN&gt; being temporarily banned.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Interpretation&lt;/STRONG&gt;&lt;SPAN&gt;: You’re seeing enforcement of &lt;/SPAN&gt;&lt;STRONG&gt;block duration&lt;/STRONG&gt;&lt;SPAN&gt; per host at the PBP level.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-message-template-content-zone"&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-message-template-content-zone"&gt;&lt;FONT face="courier new,courier" color="#008000"&gt;&lt;STRONG&gt;flow_dos_drop_ip_blocked&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;What it Tracks&lt;/STRONG&gt;&lt;SPAN&gt;: Increments &lt;/SPAN&gt;&lt;STRONG&gt;for each packet&lt;/STRONG&gt;&lt;SPAN&gt; dropped from &lt;/SPAN&gt;&lt;STRONG&gt;an IP that is currently blocked&lt;/STRONG&gt;&lt;SPAN&gt; (due to Zone Protection, DoS Policies, or PBP).&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use Case&lt;/STRONG&gt;&lt;SPAN&gt;: Captures &lt;/SPAN&gt;&lt;STRONG&gt;ongoing traffic&lt;/STRONG&gt;&lt;SPAN&gt; from IPs that have been blocked.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Interpretation&lt;/STRONG&gt;&lt;SPAN&gt;: High values may indicate an &lt;/SPAN&gt;&lt;STRONG&gt;attacker persisting&lt;/STRONG&gt;&lt;SPAN&gt; even after block rules kicked in.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 class="lia-message-template-content-zone"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;2. Zone Protection (ZPP) Commands:&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; show zone-protection zone &amp;lt;zone-name&amp;gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Displays the &lt;/SPAN&gt;&lt;STRONG&gt;Zone Protection Profile&lt;/STRONG&gt;&lt;SPAN&gt; applied to a specific zone.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: Verify which protections (flood, reconnaissance, packet-based) are active for a given zone.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; show counter global filter severity drop reason zone-protection&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Displays &lt;/SPAN&gt;&lt;STRONG&gt;global drop counters&lt;/STRONG&gt;&lt;SPAN&gt; specific to Zone Protection activity.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: Monitor packet drops caused by flood thresholds, port scans, malformed packets, etc.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-message-template-content-zone"&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-message-template-content-zone"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; show zone-protection flood stats zone &amp;lt;zone-name&amp;gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Provides detailed statistics for &lt;/SPAN&gt;&lt;STRONG&gt;flood protection&lt;/STRONG&gt;&lt;SPAN&gt; (SYN, ICMP, UDP) on a zone.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: Identify flood patterns or confirm flood protection is being triggered.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; show zone-protection scan stats zone &amp;lt;zone-name&amp;gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Displays statistics for &lt;/SPAN&gt;&lt;STRONG&gt;reconnaissance protection&lt;/STRONG&gt;&lt;SPAN&gt; (e.g., port scans, host sweeps).&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: Monitor scanning activity and confirm Zone Protection is catching it.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; show zone-protection packet-stats zone &amp;lt;zone-name&amp;gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Displays statistics for &lt;/SPAN&gt;&lt;STRONG&gt;packet-based attack protection&lt;/STRONG&gt;&lt;SPAN&gt;, such as malformed TCP headers or IP spoofing.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: Investigate dropped traffic due to protocol anomalies or attack signatures.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; debug dataplane packet-diag set log feature zone-protection on&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Enables verbose logging of packets dropped due to Zone Protection.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: Advanced debugging when you need packet-level visibility for drops.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-message-template-content-zone"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 class="lia-message-template-content-zone"&gt;&lt;BR /&gt;&lt;STRONG&gt;3. DOS Protection (DoSP) Commands:&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; show dos-block-table all&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Shows all current &lt;/SPAN&gt;&lt;STRONG&gt;DoS blocked entries&lt;/STRONG&gt;&lt;SPAN&gt; (both software and hardware-enforced).&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: Identify which IPs or sessions are currently being blocked due to DoS thresholds.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; show dos-block-table software&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Filters to show only &lt;/SPAN&gt;&lt;STRONG&gt;software-enforced blocks&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: See which blocks are handled by software (vs. hardware offload).&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-message-template-content-zone"&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-message-template-content-zone"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; show dos-block-table hardware&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Filters to show only &lt;/SPAN&gt;&lt;STRONG&gt;hardware-enforced blocks&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: Monitor hardware-accelerated DoS protection (on supported platforms)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; debug dataplane show dos block-table&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Displays detailed, low-level view of the current DoS block table.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: Deep dive into what’s blocked, by what rule, and for how long.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-message-template-content-zone"&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-message-template-content-zone"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; debug dataplane reset dos block-table&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;STRONG&gt;Manually clears&lt;/STRONG&gt;&lt;SPAN&gt; all entries from the DoS block table.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: Useful in lab testing or to quickly reset protections after a false positive.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; clear dos-protection zone &amp;lt;zone&amp;gt; blocked all&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Clears all currently blocked IPs or sessions in a specific zone.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: Reset per-zone DoS blocks without touching the global block table.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; clear dos-block-table-all&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Clears &lt;/SPAN&gt;&lt;STRONG&gt;all entries&lt;/STRONG&gt;&lt;SPAN&gt; from both software and hardware DoS block tables.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: Emergency cleanup — removes all DoS-enforced blocks.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 class="lia-message-template-content-zone"&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 class="lia-message-template-content-zone"&gt;&lt;BR /&gt;&lt;STRONG&gt;4. Packet Buffer Protection (PBP) Commands:&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; show session packet-buffer-protection&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Displays &lt;/SPAN&gt;&lt;STRONG&gt;current sessions being tracked&lt;/STRONG&gt;&lt;SPAN&gt; by Packet Buffer Protection.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: See which sessions are considered aggressive or are causing buffer stress.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; show session packet-buffer-protection buffer-latency&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Shows &lt;/SPAN&gt;&lt;STRONG&gt;latency measurements&lt;/STRONG&gt;&lt;SPAN&gt; associated with packet buffers.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: Helps understand if latency thresholds are being exceeded (indicates potential congestion).&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; show running resource-monitor ingress-backlogs&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Provides statistics on &lt;/SPAN&gt;&lt;STRONG&gt;ingress queue backlog&lt;/STRONG&gt;&lt;SPAN&gt; in the firewall’s packet processing pipeline.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: Useful to diagnose performance bottlenecks or delays at the ingress interface.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; debug dataplane pow performance&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Displays &lt;/SPAN&gt;&lt;STRONG&gt;performance metrics&lt;/STRONG&gt;&lt;SPAN&gt; for packet processing in the dataplane.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: General performance debugging — includes metrics related to buffer usage and session load.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-message-template-content-zone"&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;&lt;I&gt;_________________________________________________________________________________________________&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-message-template-content-zone"&gt;&lt;BR /&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;&amp;gt; debug dataplane pow performance | match pbp&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Purpose&lt;/STRONG&gt;&lt;SPAN&gt;: Filters output of the previous command to show &lt;/SPAN&gt;&lt;STRONG&gt;only Packet Buffer Protection-specific stats&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;Use case&lt;/STRONG&gt;&lt;SPAN&gt;: Focus on PBP-specific performance metrics for troubleshooting.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 03 Jul 2025 06:12:18 GMT</pubDate>
    <dc:creator>emgarcia</dc:creator>
    <dc:date>2025-07-03T06:12:18Z</dc:date>
    <item>
      <title>Support FAQ: Flood Attacks - Configuration &amp; Troubleshooting Best Practices</title>
      <link>https://live.paloaltonetworks.com/t5/support-faq/support-faq-flood-attacks-configuration-amp-troubleshooting-best/ta-p/1232249</link>
      <description>&lt;P&gt;&lt;SPAN&gt;This&amp;nbsp;guide is designed to help firewall admins effectively &lt;/SPAN&gt;&lt;STRONG&gt;understand&lt;/STRONG&gt; &lt;STRONG&gt;flood attack prevention&lt;/STRONG&gt;&lt;SPAN&gt; and &lt;/SPAN&gt;&lt;STRONG&gt;troubleshoot&lt;/STRONG&gt; &lt;STRONG&gt;flooding incidents&lt;/STRONG&gt;&lt;SPAN&gt; detected by Palo Alto Networks firewalls. Whether the event is triggered by &lt;/SPAN&gt;&lt;STRONG&gt;&lt;I&gt;packet&lt;/I&gt;&lt;/STRONG&gt; &lt;STRONG&gt;&lt;I&gt;buffer protection (PBP)&lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;, &lt;/STRONG&gt;&lt;STRONG&gt;&lt;I&gt;Zone Protection (ZPP)&lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;, or &lt;/STRONG&gt;&lt;STRONG&gt;&lt;I&gt;DoS protection profiles (DoSP)&lt;/I&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, this document provides guidance on how to identify the type of flood, determine the root cause, and take corrective &amp;amp; preventive actions through “&lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;Best Practices”.&amp;nbsp;&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Title_Flood-Attacks_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68121iE08D90C377DFBF28/image-size/large?v=v2&amp;amp;px=999" role="button" title="Title_Flood-Attacks_palo-alto-networks.jpg" alt="Title_Flood-Attacks_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2025 06:12:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/support-faq/support-faq-flood-attacks-configuration-amp-troubleshooting-best/ta-p/1232249</guid>
      <dc:creator>emgarcia</dc:creator>
      <dc:date>2025-07-03T06:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: Flood Attacks: Configuration &amp; Troubleshooting Best Practices</title>
      <link>https://live.paloaltonetworks.com/t5/support-faq/support-faq-flood-attacks-configuration-amp-troubleshooting-best/tac-p/1232698#M19</link>
      <description>&lt;DIV id="55326b9b1ab22310" class="conversation-container message-actions-hover-boundary ng-star-inserted"&gt;
&lt;DIV class="response-container ng-tns-c2788162521-16 response-container-with-gpi ng-star-inserted"&gt;
&lt;DIV class="presented-response-container ng-tns-c2788162521-16"&gt;
&lt;DIV class="response-container-content ng-tns-c2788162521-16"&gt;
&lt;DIV class="response-content ng-tns-c2788162521-16"&gt;
&lt;DIV id="model-response-message-contentr_55326b9b1ab22310" class="markdown markdown-main-panel tutor-markdown-rendering enable-updated-hr-color" dir="ltr"&gt;
&lt;P&gt;This guide on flood attack prevention and troubleshooting for Palo Alto Networks firewalls is a lifesaver! The way it breaks down Zone Protection, DoS Protection, and Packet Buffer Protection, along with those invaluable troubleshooting steps and CLI commands, makes understanding and tackling these attacks so much more manageable. Seriously, this is a must-read for any firewall admin.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV id="ec6cda64bd598bdd" class="conversation-container message-actions-hover-boundary ng-star-inserted"&gt;
&lt;DIV class="user-query-container user-query-bubble-container ng-star-inserted"&gt;
&lt;DIV id="user-query-content-1" class="query-content ng-star-inserted"&gt;
&lt;DIV class="query-text gds-body-l collapsed" dir="ltr" role="heading" aria-level="2"&gt;
&lt;P class="query-text-line ng-star-inserted"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 26 Jun 2025 18:02:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/support-faq/support-faq-flood-attacks-configuration-amp-troubleshooting-best/tac-p/1232698#M19</guid>
      <dc:creator>jforsythe</dc:creator>
      <dc:date>2025-06-26T18:02:03Z</dc:date>
    </item>
    <item>
      <title>Re: Flood Attacks: Configuration &amp; Troubleshooting Best Practices</title>
      <link>https://live.paloaltonetworks.com/t5/support-faq/support-faq-flood-attacks-configuration-amp-troubleshooting-best/tac-p/1232738#M20</link>
      <description>&lt;P&gt;This article is awesome !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Those troubleshooting steps and commands are&amp;nbsp;super helpful.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jun 2025 08:01:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/support-faq/support-faq-flood-attacks-configuration-amp-troubleshooting-best/tac-p/1232738#M20</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2025-06-27T08:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: Support FAQ: Flood Attacks - Configuration &amp; Troubleshooting Best Practices</title>
      <link>https://live.paloaltonetworks.com/t5/support-faq/support-faq-flood-attacks-configuration-amp-troubleshooting-best/tac-p/1236150#M23</link>
      <description>&lt;P&gt;This is great article&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 08:32:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/support-faq/support-faq-flood-attacks-configuration-amp-troubleshooting-best/tac-p/1236150#M23</guid>
      <dc:creator>Vinod_Ola</dc:creator>
      <dc:date>2025-08-18T08:32:02Z</dc:date>
    </item>
  </channel>
</rss>

