<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone protection flood thresholds in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/zone-protection-flood-thresholds/m-p/417105#M1205</link>
    <description>&lt;P&gt;In this example, you enable the&amp;nbsp;zone-syn-flood protection&amp;nbsp;screen option and set set&amp;nbsp;security&amp;nbsp;screen ids-option&amp;nbsp;zone-syn-flood&amp;nbsp;tcp syn-flood&amp;nbsp;source-threshold.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.walgreenslistens.biz/" target="_self"&gt;&lt;SPAN&gt;Walgreenslistens&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 05 Jul 2021 09:22:44 GMT</pubDate>
    <dc:creator>Gaeta589</dc:creator>
    <dc:date>2021-07-05T09:22:44Z</dc:date>
    <item>
      <title>Zone protection flood thresholds</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/zone-protection-flood-thresholds/m-p/414255#M1185</link>
      <description>&lt;P&gt;I get ICMP and UDP flood alert messages from my external zone protection profile all the time. It does not seem to impact production - but not totally sure on that though.&lt;/P&gt;&lt;P&gt;We just have 1 - 5220, no Panarama. Anyone have any advise as to how best to collect CPS values for my environment or best practice baseline numbers I could plug in here to help prevent firewall performance degradation, but not too restrictive as to block legit traffic.&lt;/P&gt;&lt;P&gt;Thanks so much for your time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Jun 2021 12:33:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/zone-protection-flood-thresholds/m-p/414255#M1185</guid>
      <dc:creator>dkordyban</dc:creator>
      <dc:date>2021-06-20T12:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection flood thresholds</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/zone-protection-flood-thresholds/m-p/414259#M1186</link>
      <description>&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/zone-protection-and-dos-protection/zone-defense/take-baseline-cps-measurements-for-setting-flood-thresholds" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/zone-protection-and-dos-protection/zone-defense/take-baseline-cps-measurements-for-setting-flood-thresholds&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Palo Alto Networks Professional Services can also assist with this task.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jun 2021 19:38:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/zone-protection-flood-thresholds/m-p/414259#M1186</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2021-06-21T19:38:50Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection flood thresholds</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/zone-protection-flood-thresholds/m-p/414367#M1189</link>
      <description>&lt;P&gt;Thanks for your response.&lt;/P&gt;&lt;P&gt;I think I will call in a support ticket. When I run show counter interface for my outside public DMZ interface all of the CPS counters show 0 or 2&lt;/P&gt;&lt;P&gt;Interface: ethernet1/4&lt;BR /&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Physical port counters read from MAC:&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;rx-broadcast 6850014&lt;BR /&gt;rx-bytes 80666157310&lt;BR /&gt;rx-multicast 187961&lt;BR /&gt;rx-unicast 88233605&lt;BR /&gt;tx-broadcast 51326&lt;BR /&gt;tx-bytes 40087463553&lt;BR /&gt;tx-multicast 0&lt;BR /&gt;tx-unicast 68106486&lt;BR /&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Detailed physical port counters read from MAC:&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;snmpBcmReceivedPkts1024to1518Octets 49439268&lt;BR /&gt;lines 1-21 snmpBcmReceivedPkts128to255Octets 17757018 lines 2-22&lt;BR /&gt;lines 3-22 snmpBcmReceivedPkts256to511Octets 4311305 lines 4-23&lt;BR /&gt;lines 5-23 snmpBcmReceivedPkts512to1023Octets 4452079 lines 6-24&lt;BR /&gt;lines 7-24 snmpBcmReceivedPkts64Octets 12371256 lines 8-25&lt;BR /&gt;lines 9-25 snmpBcmReceivedPkts65to127Octets 6940654 lines 10-26&lt;BR /&gt;lines 11-26 snmpBcmRxFecCorrectable 2945731321&lt;BR /&gt;snmpBcmRxFecUncorrectable 1152357450&lt;BR /&gt;snmpBcmTransmittedPkts1024to1518Octets 22063636&lt;BR /&gt;snmpBcmTransmittedPkts128to255Octets 7602117&lt;BR /&gt;snmpBcmTransmittedPkts256to511Octets 5070261&lt;BR /&gt;snmpBcmTransmittedPkts512to1023Octets 4083105&lt;BR /&gt;snmpBcmTransmittedPkts64Octets 20225490&lt;BR /&gt;snmpBcmTransmittedPkts65to127Octets 9113203&lt;BR /&gt;snmpBcmTransmittedUndersizePkts 52772&lt;BR /&gt;snmpDot1dTpPortInFrames 95271580&lt;BR /&gt;snmpDot1dTpPortOutFrames 68157812&lt;BR /&gt;snmpEtherStatsBroadcastPkts 6901340&lt;BR /&gt;lines 27-38 snmpEtherStatsMulticastPkts 187961&lt;BR /&gt;snmpEtherStatsOctets 120753620863&lt;BR /&gt;snmpEtherStatsPkts 163429392&lt;BR /&gt;snmpEtherStatsPkts1024to1518Octets 71502904&lt;BR /&gt;snmpEtherStatsPkts128to255Octets 25359135&lt;BR /&gt;snmpEtherStatsPkts256to511Octets 9381566&lt;BR /&gt;snmpEtherStatsPkts512to1023Octets 8535184&lt;BR /&gt;snmpEtherStatsPkts64Octets 32596746&lt;BR /&gt;snmpEtherStatsPkts65to127Octets 16053857&lt;BR /&gt;snmpEtherStatsRXNoErrors 95271580&lt;BR /&gt;snmpEtherStatsTXNoErrors 68157812&lt;BR /&gt;snmpIfHCInBroadcastPkts 6850014&lt;BR /&gt;lines 39-50 snmpIfHCInMulticastPkts 187961&lt;BR /&gt;snmpIfHCInOctets 80666157310&lt;BR /&gt;snmpIfHCInUcastPkts 88233605&lt;BR /&gt;snmpIfHCOutBroadcastPckts 51326&lt;BR /&gt;snmpIfHCOutOctets 40087463553&lt;BR /&gt;snmpIfHCOutUcastPkts 68106486&lt;BR /&gt;snmpIfInBroadcastPkts 6850014&lt;BR /&gt;snmpIfInMulticastPkts 187961&lt;BR /&gt;snmpIfInNUcastPkts 7037975&lt;BR /&gt;snmpIfInOctets 80666157310&lt;BR /&gt;snmpIfInUcastPkts 88233605&lt;BR /&gt;snmpIfOutBroadcastPkts 51326&lt;BR /&gt;snmpIfOutNUcastPkts 51326&lt;BR /&gt;snmpIfOutOctets 40087463553&lt;BR /&gt;lines 51-64 snmpIfOutUcastPkts 68106486&lt;BR /&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Hardware interface counters read from CPU:&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;bytes received 59921385220&lt;BR /&gt;bytes transmitted 35981034299&lt;BR /&gt;packets received 83423989&lt;BR /&gt;packets transmitted 58817672&lt;BR /&gt;receive incoming errors 0&lt;BR /&gt;receive discarded 0&lt;BR /&gt;receive errors 174&lt;BR /&gt;packets dropped 0&lt;BR /&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Logical interface counters read from CPU:&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;bytes received 59921373488&lt;BR /&gt;bytes transmitted 35981034386&lt;BR /&gt;packets received 83423801&lt;BR /&gt;packets transmitted 58817673&lt;BR /&gt;receive errors 0&lt;BR /&gt;lines 65-86 packets dropped 458318&lt;BR /&gt;packets dropped by flow state check 90&lt;BR /&gt;forwarding errors 0&lt;BR /&gt;no route 0&lt;BR /&gt;arp not found 107603&lt;BR /&gt;neighbor not found 0&lt;BR /&gt;neighbor info pending 0&lt;BR /&gt;mac not found 0&lt;BR /&gt;packets routed to different zone 7233&lt;BR /&gt;land attacks 0&lt;BR /&gt;ping-of-death attacks 0&lt;BR /&gt;teardrop attacks 0&lt;BR /&gt;ip spoof attacks 0&lt;BR /&gt;mac spoof attacks 0&lt;BR /&gt;ICMP fragment 0&lt;BR /&gt;layer2 encapsulated packets 0&lt;BR /&gt;layer2 decapsulated packets 0&lt;BR /&gt;tcp cps 0&lt;BR /&gt;udp cps 0&lt;BR /&gt;sctp cps 0&lt;BR /&gt;other cps 0&lt;BR /&gt;--------------------------------------------------------------------------------&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jun 2021 20:23:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/zone-protection-flood-thresholds/m-p/414367#M1189</guid>
      <dc:creator>dkordyban</dc:creator>
      <dc:date>2021-06-21T20:23:34Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection flood thresholds</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/zone-protection-flood-thresholds/m-p/415255#M1190</link>
      <description>&lt;P&gt;I've been told by support that running "show session info" - Number of active TCP sessions, Number of active UDP sessions, Number of active ICMP sessions periodically over 30 days will give accurate data for configuring zone protection profiles. We have all of our L3 networks terminated on the firewall.&lt;/P&gt;&lt;P&gt;The output is not broken down by interface. My zone protection profile is only applied to DMZ - public facing interface. Any know how I could get accurate CPS info for just one interface (DMZ)&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jun 2021 14:45:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/zone-protection-flood-thresholds/m-p/415255#M1190</guid>
      <dc:creator>dkordyban</dc:creator>
      <dc:date>2021-06-25T14:45:50Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection flood thresholds</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/zone-protection-flood-thresholds/m-p/415292#M1193</link>
      <description>&lt;P&gt;Here's another resource that can be helpful:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/gogasvig/cpsmine" target="_blank"&gt;https://github.com/gogasvig/cpsmine&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jun 2021 18:40:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/zone-protection-flood-thresholds/m-p/415292#M1193</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2021-06-25T18:40:34Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection flood thresholds</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/zone-protection-flood-thresholds/m-p/417105#M1205</link>
      <description>&lt;P&gt;In this example, you enable the&amp;nbsp;zone-syn-flood protection&amp;nbsp;screen option and set set&amp;nbsp;security&amp;nbsp;screen ids-option&amp;nbsp;zone-syn-flood&amp;nbsp;tcp syn-flood&amp;nbsp;source-threshold.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.walgreenslistens.biz/" target="_self"&gt;&lt;SPAN&gt;Walgreenslistens&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 09:22:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/zone-protection-flood-thresholds/m-p/417105#M1205</guid>
      <dc:creator>Gaeta589</dc:creator>
      <dc:date>2021-07-05T09:22:44Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection flood thresholds</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/zone-protection-flood-thresholds/m-p/433245#M1313</link>
      <description>&lt;P&gt;show counter interface (interface name here)---view the cps---&amp;nbsp; and divide that number by two (apparently that shows twice the actual rate). Do this with each interface in the given zone that you have, and then add them up- that is your cps- the number you can use as a baseline to start with your zone protection for the alert rate ( give or take 10%)&lt;BR /&gt;&lt;BR /&gt;Take alert rate and add 10-20% for activate rate.&lt;BR /&gt;&lt;BR /&gt;take activate rate and add 20-30% for max rate-careful with this.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Running a show session info shows the entire firewall and I'm not sure why some of the documentation hasn't addressed this when a zone could cover 1 or multiple interfaces, not a single zone.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Sep 2021 02:18:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/zone-protection-flood-thresholds/m-p/433245#M1313</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2021-09-11T02:18:26Z</dc:date>
    </item>
  </channel>
</rss>

