<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tcp flood in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-flood/m-p/513206#M1736</link>
    <description>&lt;P&gt;Even I have this problem in out env. I tried all the options in zone protection profile, but as the max connections are reached, even legitimate traffic is also getting dropped (aged-out); not sure what is the best option or solution to fix this issue&lt;/P&gt;</description>
    <pubDate>Sun, 28 Aug 2022 19:17:06 GMT</pubDate>
    <dc:creator>Benkikere</dc:creator>
    <dc:date>2022-08-28T19:17:06Z</dc:date>
    <item>
      <title>Tcp flood</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-flood/m-p/182561#M79</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;today from 15.10 to 16.10 I received more than 15600 calls from the same IP. The Windows 2012 server already has a function against SYN ATTACK and TCP FLOOD, and I see it on the tcp-rst-from-server log monitor, but they are very small compared to those aged-out. It's been a month since I get continuous attacks and this sends my web application down. These attacks always come from different IPs. Block an IP but then a new one will appear even after days.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Here an example with some hidden fields for privacy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="attacco.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11994i1FB361A25828F9BB/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="attacco.jpg" alt="attacco.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I need to understand what kind of limit apply to DoS Protection rules. Have I to apply Aggregate or Classified type?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Actually I apply the rule to Aggregate mode with these settings:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;SYN FLOOD&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Action: SYN Cookies&lt;BR /&gt;Alarm Rate 30&lt;BR /&gt;Activate Rate 100&lt;BR /&gt;Max Rate 1000&lt;BR /&gt;Block Duration 300&lt;/P&gt;&lt;P&gt;UDP Flood&lt;BR /&gt;Alarm Rate 100&lt;BR /&gt;Activate Rate 1000&lt;BR /&gt;Max Rate 4000&lt;BR /&gt;Block Duration 300&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ICMP Flood&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alarm Rate 100&lt;BR /&gt;Activate Rate 1000&lt;BR /&gt;Max Rate 4000&lt;BR /&gt;Block Duration 300&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other IP Flood&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Alarm Rate 100&lt;BR /&gt;Activate Rate 1000&lt;BR /&gt;Max Rate 4000&lt;BR /&gt;Block Duration 300&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I did not enable Zone Protection on the interface but I created a rule in Policies -&amp;gt; DoS Protection. I did a test by setting the rule in Protect and I find many logs but I'm afraid it's too restrictive and blocking even those who really need to connect to websites.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Here the screen&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="flood.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11995i1A42340127A3056F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="flood.jpg" alt="flood.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I match one only&amp;nbsp;syncookie-sent and this maybe&amp;nbsp;restarted my application!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Besides, I can not understand what the firewall is blocking because TCP FLOOD makes not visible attacker and victim.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please help me!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2017 15:51:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-flood/m-p/182561#M79</guid>
      <dc:creator>s_quasar</dc:creator>
      <dc:date>2017-10-18T15:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: Tcp flood</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-flood/m-p/182767#M81</link>
      <description>&lt;P&gt;ok so with syn cookies you'll want to activate as early as possible since it is a low cost deterrant&lt;/P&gt;
&lt;P&gt;I usually activate at 0c/s (this is also the default)&lt;/P&gt;
&lt;P&gt;the alarm is only useful to warn you about irregularities so i'd put that closer to the max rate, as not to flood your log file with useless warnings, so at 90-95% of the max&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;in the case of a DoS profile with a DoS policy, an aggregate is going to count all connections to a resource (all sources combined hitting your server) while a classified profile is only going to count unique source/destination connections&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so you could say&lt;/P&gt;
&lt;P&gt;aggregate connections max 40.000&amp;nbsp; (this number should correspond to what your server is expected to process in total)&lt;/P&gt;
&lt;P&gt;classified connections "source-ip only" max 300 (this number should be where client connections become suspicious)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this will protect your server from exceeding it's capacity and also protect it from lone flooders&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DoS rule"&gt;&lt;img src="https://live.paloaltonetworks.com/skins/images/2F2A72B3BE70ACC5EBC3E1D7685F5297/responsive_peak/images/image_not_found.png" alt="DoS rule" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2017 14:37:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-flood/m-p/182767#M81</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-10-19T14:37:18Z</dc:date>
    </item>
    <item>
      <title>Re: Tcp flood</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-flood/m-p/182769#M82</link>
      <description>&lt;P&gt;FYI: UDP and ICMP flood use RandomEarlyDrop, here the Activate Rate is where packets will start to get discarded, so the setup is a little different from syn cookies:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;activate should be at a point where resources are already taxed and it becomes acceptable to randomly discard packets in favor of resources. The % of packets being discarded increaces the closer the total packet rate gets to the 'max'&lt;/P&gt;
&lt;P&gt;(eg , activate is at 9.000pps, max is at 10.000pps, at a packet rate of 9.100pps 10% will be discarded, at 9.200pps 20% will be discarded and so on)&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2017 14:45:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-flood/m-p/182769#M82</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-10-19T14:45:53Z</dc:date>
    </item>
    <item>
      <title>Re: Tcp flood</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-flood/m-p/513206#M1736</link>
      <description>&lt;P&gt;Even I have this problem in out env. I tried all the options in zone protection profile, but as the max connections are reached, even legitimate traffic is also getting dropped (aged-out); not sure what is the best option or solution to fix this issue&lt;/P&gt;</description>
      <pubDate>Sun, 28 Aug 2022 19:17:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-flood/m-p/513206#M1736</guid>
      <dc:creator>Benkikere</dc:creator>
      <dc:date>2022-08-28T19:17:06Z</dc:date>
    </item>
  </channel>
</rss>

