<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone protection for VM series in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-for-vm-series/m-p/540620#M110870</link>
    <description>&lt;P&gt;Either Palo will start dropping random incoming new sessions if treshold is met or will start sending back specially crafted SYN-ACK packets (SYN Cookies).&lt;/P&gt;
&lt;P&gt;Choosing random early drop will not send back cookie.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No difference in setting up VM or physical zone protection.&lt;/P&gt;
&lt;P&gt;You need to identify tresholds based on requirements and real needs.&lt;/P&gt;
&lt;P&gt;Can your web server handle 40k new sessions per second that your current settings allow?&lt;/P&gt;</description>
    <pubDate>Mon, 01 May 2023 16:35:38 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2023-05-01T16:35:38Z</dc:date>
    <item>
      <title>Zone protection for VM series</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-for-vm-series/m-p/540610#M110869</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was looking for PA best practices for&amp;nbsp; VM series' zone protection but only found documents that talked about physical PA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Are physical and VM series zone protection the same? could you point me where the docs for these are?&lt;/P&gt;
&lt;P&gt;2. Under zone protection profile, flood protection, and SYN, there are 2 options 'Random Early Drop' and Syn Cookies'. I chose to configure 'Random early drop' only (attachment), will 'Syn Cookies' still be in use if I don't touch it? or the SYN only works with 1 action which is either 'Random Early Drop' or 'Sync Cookies' if selected but not both?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 01 May 2023 16:11:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-for-vm-series/m-p/540610#M110869</guid>
      <dc:creator>tinhnho</dc:creator>
      <dc:date>2023-05-01T16:11:18Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection for VM series</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-for-vm-series/m-p/540620#M110870</link>
      <description>&lt;P&gt;Either Palo will start dropping random incoming new sessions if treshold is met or will start sending back specially crafted SYN-ACK packets (SYN Cookies).&lt;/P&gt;
&lt;P&gt;Choosing random early drop will not send back cookie.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No difference in setting up VM or physical zone protection.&lt;/P&gt;
&lt;P&gt;You need to identify tresholds based on requirements and real needs.&lt;/P&gt;
&lt;P&gt;Can your web server handle 40k new sessions per second that your current settings allow?&lt;/P&gt;</description>
      <pubDate>Mon, 01 May 2023 16:35:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-for-vm-series/m-p/540620#M110870</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-05-01T16:35:38Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection for VM series</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-for-vm-series/m-p/540626#M110871</link>
      <description>&lt;P&gt;Is it recommended to choose 'Random Early Drop' over 'Syn Cookies'?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is the web server behind the firewall that you mentioned above? if yes, yes it can.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 01 May 2023 16:53:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-for-vm-series/m-p/540626#M110871</guid>
      <dc:creator>tinhnho</dc:creator>
      <dc:date>2023-05-01T16:53:32Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection for VM series</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-for-vm-series/m-p/540628#M110872</link>
      <description>&lt;P&gt;If you are under SYN flood attack then random early drop is less resource intensive but can also drop benign traffic.&lt;/P&gt;
&lt;P&gt;SYN cookies put some load on the firewall but does not affect traffic from real users.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would choose SYN cookie setup.&lt;/P&gt;</description>
      <pubDate>Mon, 01 May 2023 17:01:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-for-vm-series/m-p/540628#M110872</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-05-01T17:01:11Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection for VM series</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-for-vm-series/m-p/540637#M110876</link>
      <description>&lt;P&gt;Last question, Does Syn Cookies drop packet &amp;nbsp;when seeing Syn flood attacks? if not what does it do exactly in terms of protecting the fw when seeing syn flood attacks?&lt;/P&gt;</description>
      <pubDate>Mon, 01 May 2023 18:03:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-for-vm-series/m-p/540637#M110876</guid>
      <dc:creator>tinhnho</dc:creator>
      <dc:date>2023-05-01T18:03:50Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection for VM series</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-for-vm-series/m-p/540639#M110877</link>
      <description>&lt;P&gt;When SYN cookies are enabled and activated then:&lt;BR /&gt;SYN comes into firewall.&lt;/P&gt;
&lt;P&gt;Firewall don't pass this SYN to web server but sends back SYN-ACK itself.&lt;/P&gt;
&lt;P&gt;After client sends final ACK firewall initiates session to web server and allows client and web server to communicate.&lt;/P&gt;
&lt;P&gt;As SYN-ACK is returned with sequence number from range that Palo is aware then even firewall don't need to create any session inside firewall session table before last packet from 3way handshake (ACK) arrives from client.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 May 2023 18:09:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-for-vm-series/m-p/540639#M110877</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-05-01T18:09:14Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection for VM series</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-for-vm-series/m-p/540654#M110885</link>
      <description>&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Mon, 01 May 2023 18:53:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-for-vm-series/m-p/540654#M110885</guid>
      <dc:creator>tinhnho</dc:creator>
      <dc:date>2023-05-01T18:53:53Z</dc:date>
    </item>
  </channel>
</rss>

