<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TCP &amp;amp; UDP Floods from trusted zones in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-amp-udp-floods-from-trusted-zones/m-p/593469#M118112</link>
    <description>&lt;P&gt;The source zone is the actual source, as that is the zone protection profile that is being hit. The destination zone may be incorrect as the firewall is discarding a flood packet (skipping destination route lookup etc)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is a RED (random early drop) action. If this is unexpected, this may mean you have your 'activate' set too low&lt;/P&gt;
&lt;P&gt;RED will progressively start discarding random packets once it reaches the activate rate (and progressively more the closer the rate gets to the maximum)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you're using the default settings you'll have 10.000 alarm, 10.000 activate and 40.000 max, see about increasing the activate to a level that is slightly above the expected peak (connections per second during peak time)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;e.g. if your normal cps is 8.000 and your peak cps is 12.000, set alarm to 12.000, activate to 16.000 and max to 20.000&lt;/P&gt;</description>
    <pubDate>Tue, 30 Jul 2024 08:35:35 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2024-07-30T08:35:35Z</dc:date>
    <item>
      <title>TCP &amp; UDP Floods from trusted zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-amp-udp-floods-from-trusted-zones/m-p/593309#M118084</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;We receive TCP or UDP Flood threat logs from time to time on different firewalls of ours. In the image below you can see that the source and destination zones are the same, i.e. "zoneTrust", and this the case for all threat logs of this type. Is this information regarding zones reliable? and if yes, how can we find the host(s) responsible for these syn-floods?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Arman_Zaheri_0-1722255506276.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/61149iE9BE4EAFE5AA44F8/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Arman_Zaheri_0-1722255506276.png" alt="Arman_Zaheri_0-1722255506276.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;BR,&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2024 12:21:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-amp-udp-floods-from-trusted-zones/m-p/593309#M118084</guid>
      <dc:creator>Arman_Zaheri</dc:creator>
      <dc:date>2024-07-29T12:21:06Z</dc:date>
    </item>
    <item>
      <title>Re: TCP &amp; UDP Floods from trusted zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-amp-udp-floods-from-trusted-zones/m-p/593469#M118112</link>
      <description>&lt;P&gt;The source zone is the actual source, as that is the zone protection profile that is being hit. The destination zone may be incorrect as the firewall is discarding a flood packet (skipping destination route lookup etc)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is a RED (random early drop) action. If this is unexpected, this may mean you have your 'activate' set too low&lt;/P&gt;
&lt;P&gt;RED will progressively start discarding random packets once it reaches the activate rate (and progressively more the closer the rate gets to the maximum)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you're using the default settings you'll have 10.000 alarm, 10.000 activate and 40.000 max, see about increasing the activate to a level that is slightly above the expected peak (connections per second during peak time)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;e.g. if your normal cps is 8.000 and your peak cps is 12.000, set alarm to 12.000, activate to 16.000 and max to 20.000&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2024 08:35:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-amp-udp-floods-from-trusted-zones/m-p/593469#M118112</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2024-07-30T08:35:35Z</dc:date>
    </item>
  </channel>
</rss>

