<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: zone protection in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23044#M16811</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can we confirm if synfin are dropped by default without zp and Dos policy.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You Sharma and Hardik. I have checked the zp in the threat logs. It is same what you showed in the screen shot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 10 Oct 2014 20:16:52 GMT</pubDate>
    <dc:creator>Westcon2</dc:creator>
    <dc:date>2014-10-10T20:16:52Z</dc:date>
    <item>
      <title>zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23033#M16800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How do we block synfin port scan.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Oct 2014 19:07:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23033#M16800</guid>
      <dc:creator>Westcon2</dc:creator>
      <dc:date>2014-10-10T19:07:47Z</dc:date>
    </item>
    <item>
      <title>Re: zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23034#M16801</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can configure zone protection on your outside zone or zone that you are more concerned about. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="zone_protect.JPG" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/16196_zone_protect.JPG" style="height: 276px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can define various action. In above example, I have asked firewall to block source IP for 300 secs if that ip is trying to scan the tcp port. You can customize the alert and threshold as well. Hope this helps. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Oct 2014 19:14:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23034#M16801</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-10-10T19:14:28Z</dc:date>
    </item>
    <item>
      <title>Re: zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23035#M16802</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/u1/26191"&gt;Westcon2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried the syn flood or TCP port scan in zone protection profile ? Is it not working for synfin port scan ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Oct 2014 19:17:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23035#M16802</guid>
      <dc:creator>bat</dc:creator>
      <dc:date>2014-10-10T19:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23036#M16803</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have applied zone protection policy and it is set on alert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to port scan using nmap. however i could not see any hits using the command show counter global name flow_parse_l4_tcpsynfin.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way to see the zone protection logs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Oct 2014 19:33:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23036#M16803</guid>
      <dc:creator>Westcon2</dc:creator>
      <dc:date>2014-10-10T19:33:26Z</dc:date>
    </item>
    <item>
      <title>Re: zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23037#M16804</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Westcon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Zone Protection has ability to block port scan. You can find all relevant configuration in following link.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-5078"&gt;Understanding DoS Protection&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know for additional granular information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Oct 2014 19:34:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23037#M16804</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-10-10T19:34:50Z</dc:date>
    </item>
    <item>
      <title>Re: zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23038#M16805</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Westcon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can find zone protection logs in Monitor &amp;gt; Threat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems Nmap may not be crossing zone protection scan limit/second. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would&amp;nbsp; you share zone protection configuration along with Nmp scan rate ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Oct 2014 19:36:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23038#M16805</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-10-10T19:36:02Z</dc:date>
    </item>
    <item>
      <title>Re: zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23039#M16806</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you see any drops in the output of this command:&lt;/P&gt;&lt;P&gt; show zone-protection zone &amp;lt;zone-name&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Oct 2014 19:36:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23039#M16806</guid>
      <dc:creator>bat</dc:creator>
      <dc:date>2014-10-10T19:36:33Z</dc:date>
    </item>
    <item>
      <title>Re: zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23040#M16807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am using two firewalls. once is having an old setup and the other recently deployed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The out put of the command show counter global name flow_parse_l4_tcpsynfin is as below.&amp;nbsp; &lt;/P&gt;&lt;P&gt;My question is that does the firewall have the ability to drop the synfin packets automatically or do we need to apply the zp or dos policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the output&lt;/P&gt;&lt;P&gt;Firewall 1 without zone protection&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Name:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; flow_parse_l4_tcpsynfin&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Value:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5709&lt;/P&gt;&lt;P&gt;Severity:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Drop&lt;/P&gt;&lt;P&gt;Category:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; flow&lt;/P&gt;&lt;P&gt;Aspect:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; parse&lt;/P&gt;&lt;P&gt;Desciption:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets dropped: invalid TCP flags (SYN+FIN+*)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall 2&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;admin@Lab-Firewall&amp;gt; show counter global name flow_parse_l4_tcpsynfin&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Name:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; flow_parse_l4_tcpsynfin&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Value:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;Severity:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Drop&lt;/P&gt;&lt;P&gt;Category:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; flow&lt;/P&gt;&lt;P&gt;Aspect:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; parse&lt;/P&gt;&lt;P&gt;Desciption:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets dropped: invalid TCP flags (SYN+FIN+*)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Oct 2014 19:47:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23040#M16807</guid>
      <dc:creator>Westcon2</dc:creator>
      <dc:date>2014-10-10T19:47:46Z</dc:date>
    </item>
    <item>
      <title>Re: zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23041#M16808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Westcon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Provide us following output. Whic will list all kind of latest drop.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;1. Execute command "&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;show counter global filter delta sev drop"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;2. Run NMAP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;3. Run again "&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;show counter global filter delta sev drop"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Provide us output for 3rd pointer&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Oct 2014 19:49:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23041#M16808</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-10-10T19:49:15Z</dc:date>
    </item>
    <item>
      <title>Re: zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23042#M16809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Westcon2,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If zone protection is triggered, you can see it under threat logs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="scan.JPG" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/16197_scan.JPG" style="height: 558px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have flood attacks, you will Flood attacks warning as well. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Oct 2014 19:56:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23042#M16809</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-10-10T19:56:26Z</dc:date>
    </item>
    <item>
      <title>Re: zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23043#M16810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think the syn+fin packets should drop without zone protection or DoS policy in place.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Oct 2014 20:01:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23043#M16810</guid>
      <dc:creator>bat</dc:creator>
      <dc:date>2014-10-10T20:01:13Z</dc:date>
    </item>
    <item>
      <title>Re: zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23044#M16811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can we confirm if synfin are dropped by default without zp and Dos policy.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You Sharma and Hardik. I have checked the zp in the threat logs. It is same what you showed in the screen shot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Oct 2014 20:16:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23044#M16811</guid>
      <dc:creator>Westcon2</dc:creator>
      <dc:date>2014-10-10T20:16:52Z</dc:date>
    </item>
    <item>
      <title>Re: zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23045#M16812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any non-syn is dropped by default. But if an attack occurs and firewall is bombarded with syn-fin packets, it will open a session with syn packet and kill the session with fin.&amp;nbsp; If the rate is excessive for syn-fin then cpu might go really high. So zone protection will help in that scenario.&amp;nbsp; Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Oct 2014 20:31:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23045#M16812</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-10-10T20:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23046#M16813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does anyone now if there is a way to proactively alert when a port scan has been detected? In the threat logs, I can see the alert of a port scan but the severity level is medium and the alert id is 8001 and you cannot change the severity. We are sending email alerts on all critical threats and we do not want to start sending email alerts on severity of medium as this will generate a lot of noise.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks all in advance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Dec 2014 20:19:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23046#M16813</guid>
      <dc:creator>ttanzi</dc:creator>
      <dc:date>2014-12-22T20:19:05Z</dc:date>
    </item>
    <item>
      <title>Re: zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23047#M16814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can follow the procedure in DOC-3779 to fire an email for a specific threat.&amp;nbsp; It does require setting up a specific policy and email profile to fire the alert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-3779"&gt;How to Receive Email Threat Notification from the firewall&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Dec 2014 21:12:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection/m-p/23047#M16814</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-12-22T21:12:32Z</dc:date>
    </item>
  </channel>
</rss>

