<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DoS applictation attack to DNS server - how to prevent, and how to create report showing IP addressess with the highest number of session (not bytes) opened to it in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dos-applictation-attack-to-dns-server-how-to-prevent-and-how-to/m-p/47624#M35021</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike, you'are definitely right, maybe this is workaround but I agree it works, always &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt;&lt;/P&gt;&lt;P&gt;Anyway &lt;SPAN lang="en"&gt;&lt;SPAN class="hps"&gt;I would like to&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;tackle the problem&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;without&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;external dns hosting services..&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 05 Feb 2014 23:25:22 GMT</pubDate>
    <dc:creator>mariusz_sawczuk</dc:creator>
    <dc:date>2014-02-05T23:25:22Z</dc:date>
    <item>
      <title>DoS applictation attack to DNS server - how to prevent, and how to create report showing IP addressess with the highest number of session (not bytes) opened to it</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-applictation-attack-to-dns-server-how-to-prevent-and-how-to/m-p/47620#M35017</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From time to time I observe a lots of DNS queries (not UDP floods) from Internet to my DNS servers. Unfortunately those queries have negative inpact to my old firewall (it can't establish so many sessions, which makes the network stops).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Probably my DNS servers are targets of:&lt;/P&gt;&lt;P&gt;- DoS application layer attacks: target specific applications, eg DNS dictionary attacks becuase I can see many DNS requests to unknown domains, which even doesn't exists on Internet.&lt;/P&gt;&lt;P&gt;rahter than &lt;/P&gt;&lt;P&gt;- DoS volumetric attacks: designed to saturate and overwhelm network recources, eg DNS Reflection, DNSSec Amplification, because I don't see DNS responses&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My questions are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. PAN device is offering Zone/DoS Protection featers How to configure those featers to prevent my whole network from such DoS application attacks?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. How to create report showing IP addresses with the highest number of session (not bytes) opened to my DNS servers behind PAN device? I would like to know (just in case) if in the future my DNS servers would be a target of DoS volumetric attack.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2014 15:58:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-applictation-attack-to-dns-server-how-to-prevent-and-how-to/m-p/47620#M35017</guid>
      <dc:creator>mariusz_sawczuk</dc:creator>
      <dc:date>2014-02-05T15:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: DoS applictation attack to DNS server - how to prevent, and how to create report showing IP addressess with the highest number of session (not bytes) opened to it</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-applictation-attack-to-dns-server-how-to-prevent-and-how-to/m-p/47621#M35018</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Please follow the below mentioned documents, it will help you to understand and configure DOS/ZONE protection profiles on PAN firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-5078"&gt;Understanding DoS Protection&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Few&lt;/SPAN&gt;&lt;/SPAN&gt; related docs to troubleshoot:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a. &lt;A href="https://live.paloaltonetworks.com/docs/DOC-2912"&gt;CLI commands to verify the DOS functionality on Palo Alto Networks Devices&lt;/A&gt;&lt;/P&gt;&lt;P&gt;b. &lt;A href="https://live.paloaltonetworks.com/docs/DOC-4501"&gt;What are the Differences between DoS Protection and Zone Protection?&lt;/A&gt;&lt;/P&gt;&lt;P&gt;c. &lt;A href="https://live.paloaltonetworks.com/docs/DOC-2793"&gt;Global Counters Triggered by a Zone Protection Profile&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. You can create a custom report under ACC tab &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;&lt;/SPAN&gt;Application Command center). Please see the example below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="11457" alt="ACC-session-1.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/11457_ACC-session-1.JPG.jpg" style="width: 620px; height: 340px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next, click into the application, where you want &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;see&lt;/SPAN&gt;&lt;/SPAN&gt; the source and destination IP details:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="11458" alt="ACC-session-2.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/11458_ACC-session-2.JPG.jpg" style="width: 620px; height: 356px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2014 16:51:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-applictation-attack-to-dns-server-how-to-prevent-and-how-to/m-p/47621#M35018</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-02-05T16:51:46Z</dc:date>
    </item>
    <item>
      <title>Re: DoS applictation attack to DNS server - how to prevent, and how to create report showing IP addressess with the highest number of session (not bytes) opened to it</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-applictation-attack-to-dns-server-how-to-prevent-and-how-to/m-p/47622#M35019</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mariusz,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In addition to the DOS protection, you may wish to consider using one of the DNS hosting services out there.&amp;nbsp; Then you won't see traffic like that targeted at your DNS servers.&amp;nbsp; I use DNS Made Easy, and I can tell you, they can take a bigger hit than I can.&amp;nbsp; Anyway for public DNS, it's a good way to go, and it isn't expensive.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2014 20:22:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-applictation-attack-to-dns-server-how-to-prevent-and-how-to/m-p/47622#M35019</guid>
      <dc:creator>msullivan</dc:creator>
      <dc:date>2014-02-05T20:22:55Z</dc:date>
    </item>
    <item>
      <title>Re: DoS applictation attack to DNS server - how to prevent, and how to create report showing IP addressess with the highest number of session (not bytes) opened to it</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-applictation-attack-to-dns-server-how-to-prevent-and-how-to/m-p/47623#M35020</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ad1. I was thinking about your recomendation how to configure DoS protection regarding described attacks, not sending documents from Knowledge base.&lt;/P&gt;&lt;P&gt;Is it possible anyway to prtoect from DoS application layer attacks with Palo Atlo?&lt;/P&gt;&lt;P&gt;Ad2. I know about ACC tab, but I was thinking about Manageed Custom Reports, and your advice how to configure such report grouped by seession.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2014 23:20:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-applictation-attack-to-dns-server-how-to-prevent-and-how-to/m-p/47623#M35020</guid>
      <dc:creator>mariusz_sawczuk</dc:creator>
      <dc:date>2014-02-05T23:20:03Z</dc:date>
    </item>
    <item>
      <title>Re: DoS applictation attack to DNS server - how to prevent, and how to create report showing IP addressess with the highest number of session (not bytes) opened to it</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-applictation-attack-to-dns-server-how-to-prevent-and-how-to/m-p/47624#M35021</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike, you'are definitely right, maybe this is workaround but I agree it works, always &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt;&lt;/P&gt;&lt;P&gt;Anyway &lt;SPAN lang="en"&gt;&lt;SPAN class="hps"&gt;I would like to&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;tackle the problem&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;without&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;external dns hosting services..&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2014 23:25:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-applictation-attack-to-dns-server-how-to-prevent-and-how-to/m-p/47624#M35021</guid>
      <dc:creator>mariusz_sawczuk</dc:creator>
      <dc:date>2014-02-05T23:25:22Z</dc:date>
    </item>
    <item>
      <title>Re: DoS applictation attack to DNS server - how to prevent, and how to create report showing IP addressess with the highest number of session (not bytes) opened to it</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-applictation-attack-to-dns-server-how-to-prevent-and-how-to/m-p/47625#M35022</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mariusz,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may also wish to reduce the session timeout for the dns application from the default 30 seconds to something a bit lower.&amp;nbsp; This would tear down the udp sessions sooner thus reducing the size of the connection table that relates to DNS traffic.&amp;nbsp; The other approach with DOS protection is to utilize resource protection and limit the number of concurrent sessions you allow to your DNS servers.&amp;nbsp; Hope this provides some additional options for you to think about.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 00:13:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-applictation-attack-to-dns-server-how-to-prevent-and-how-to/m-p/47625#M35022</guid>
      <dc:creator>HITSSEC</dc:creator>
      <dc:date>2014-02-06T00:13:39Z</dc:date>
    </item>
  </channel>
</rss>

