<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is it possible to DDoS/DoS a public IP which has only outbound traffic and ipsec tunnel. No DNAT configured and ping disabled. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/is-it-possible-to-ddos-dos-a-public-ip-which-has-only-outbound/m-p/475326#M103447</link>
    <description>&lt;P&gt;In theory this is still possible. Most DDoS attacks Palo sees now are reflection-based amplification attacks... UDP, not ICMP. (Which sounds like these are allowed in your network).&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mirai botnet... reflected and amplified NTP on IoT devices with outbound rules. Is it harder with only outbound rules and hiding behind NAT? Yes. Impossible? No. Unless you know for certain all current inside devices are clean, and you know where they are 365 days a year, it's still possible. Slim, hence defense in depth, but possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Consider also DDoS lives on loads of NAS, routers, home security kits so in some cases reflection/amplification will still come down that IPSec tunnel depending on what terminates it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;+1 on the above for DoS/Zone protection profiles on zones.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 23 Mar 2022 21:29:36 GMT</pubDate>
    <dc:creator>LAYER_8</dc:creator>
    <dc:date>2022-03-23T21:29:36Z</dc:date>
    <item>
      <title>Is it possible to DDoS/DoS a public IP which has only outbound traffic and ipsec tunnel. No DNAT configured and ping disabled.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-it-possible-to-ddos-dos-a-public-ip-which-has-only-outbound/m-p/475079#M103423</link>
      <description />
      <pubDate>Tue, 22 Mar 2022 22:14:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-it-possible-to-ddos-dos-a-public-ip-which-has-only-outbound/m-p/475079#M103423</guid>
      <dc:creator>Kandarp_Desai</dc:creator>
      <dc:date>2022-03-22T22:14:05Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possible to DDoS/DoS a public IP which has only outbound traffic and ipsec tunnel. No DNAT configured and ping disabled.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-it-possible-to-ddos-dos-a-public-ip-which-has-only-outbound/m-p/475088#M103424</link>
      <description>&lt;P&gt;Rather not play with fire and enable DoS protection and Zone protection on all outside interfaces/zones.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Mar 2022 00:36:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-it-possible-to-ddos-dos-a-public-ip-which-has-only-outbound/m-p/475088#M103424</guid>
      <dc:creator>addawes</dc:creator>
      <dc:date>2022-03-23T00:36:33Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possible to DDoS/DoS a public IP which has only outbound traffic and ipsec tunnel. No DNAT configured and ping disabled.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-it-possible-to-ddos-dos-a-public-ip-which-has-only-outbound/m-p/475326#M103447</link>
      <description>&lt;P&gt;In theory this is still possible. Most DDoS attacks Palo sees now are reflection-based amplification attacks... UDP, not ICMP. (Which sounds like these are allowed in your network).&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mirai botnet... reflected and amplified NTP on IoT devices with outbound rules. Is it harder with only outbound rules and hiding behind NAT? Yes. Impossible? No. Unless you know for certain all current inside devices are clean, and you know where they are 365 days a year, it's still possible. Slim, hence defense in depth, but possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Consider also DDoS lives on loads of NAS, routers, home security kits so in some cases reflection/amplification will still come down that IPSec tunnel depending on what terminates it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;+1 on the above for DoS/Zone protection profiles on zones.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Mar 2022 21:29:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-it-possible-to-ddos-dos-a-public-ip-which-has-only-outbound/m-p/475326#M103447</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2022-03-23T21:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possible to DDoS/DoS a public IP which has only outbound traffic and ipsec tunnel. No DNAT configured and ping disabled.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-it-possible-to-ddos-dos-a-public-ip-which-has-only-outbound/m-p/475335#M103451</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/205893"&gt;@Kandarp_Desai&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Traffic from the Internet to the public IP (same zone) is allowed by the default intrazone-default rule.&amp;nbsp; You could create an intrazone drop rule to block the traffic, and no DoS should be possible.&amp;nbsp; Remember to create an allow rule for your IPsec tunnel first.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Wed, 23 Mar 2022 22:13:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-it-possible-to-ddos-dos-a-public-ip-which-has-only-outbound/m-p/475335#M103451</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-03-23T22:13:47Z</dc:date>
    </item>
  </channel>
</rss>

