<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: understanding palo alto classifying traffic in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/74924#M41835</link>
    <description>&lt;P&gt;Thanks everyone ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If dos attack happens &amp;nbsp;the victim may go down depends on the attack .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But how can we relate &amp;nbsp;the internet link down &amp;nbsp;and a dos attack ?&lt;/P&gt;
&lt;P&gt;for example an attacker doing a dos attack and the victim still &amp;nbsp;not down but the internet link down&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Fri, 18 Mar 2016 12:23:21 GMT</pubDate>
    <dc:creator>sib2017</dc:creator>
    <dc:date>2016-03-18T12:23:21Z</dc:date>
    <item>
      <title>understanding palo alto classifying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/74846#M41796</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;This is just to understand how palo alto understand classify the traffic and take action .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;as I pasted below from multiple &amp;nbsp;sources &amp;nbsp;sending packets to an inside host . &amp;nbsp;Palo alto log shows &amp;nbsp;around &amp;nbsp;10&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;times &amp;nbsp;(in a second ) &amp;nbsp;from the &amp;nbsp;same souce traffic hitting to the inside host .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the above scenario , traffic is normal &amp;nbsp;or abnormal?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How palo alto classify a dos attack&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;source Dest &amp;nbsp; &amp;nbsp; pkts &amp;nbsp; &amp;nbsp; Bytes&lt;BR /&gt;x.x.x.x h.h.h.h &amp;nbsp; 471 &amp;nbsp; 600000&lt;BR /&gt;y.y.y.y h.h.h.h &amp;nbsp; &amp;nbsp;143 &amp;nbsp; &amp;nbsp;100000&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2016 03:38:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/74846#M41796</guid>
      <dc:creator>sib2017</dc:creator>
      <dc:date>2016-03-17T03:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: understanding palo alto classifying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/74857#M41801</link>
      <description>&lt;P&gt;Please read this document for understanding how Dos protection works:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Documentation-Articles/Understanding-DoS-Protection/ta-p/54562" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Documentation-Articles/Understanding-DoS-Protection/ta-p/54562&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to look at aggregate profiles and classified profiles for understanding how will firewall classify dos attack in case of DDOS.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2016 06:03:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/74857#M41801</guid>
      <dc:creator>abjain</dc:creator>
      <dc:date>2016-03-17T06:03:22Z</dc:date>
    </item>
    <item>
      <title>Re: understanding palo alto classifying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/74864#M41802</link>
      <description>&lt;P&gt;Also look towards zone protection.&lt;/P&gt;
&lt;P&gt;This will not flood the log.&lt;/P&gt;
&lt;P&gt;And use dos protection for specific servers that need lower threshold than your whole zone has set in zone protection.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2016 08:53:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/74864#M41802</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2016-03-17T08:53:44Z</dc:date>
    </item>
    <item>
      <title>Re: understanding palo alto classifying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/74869#M41806</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;" use dos protection for specific servers that need lower threshold than your whole zone has set in zone protection."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;How can i do this&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;lets say zone is trust &amp;nbsp;and the profile is applied there and in the same zone if &amp;nbsp;there are systems which required lower threshold &amp;nbsp;,How can i apply that&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2016 10:35:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/74869#M41806</guid>
      <dc:creator>sib2017</dc:creator>
      <dc:date>2016-03-17T10:35:23Z</dc:date>
    </item>
    <item>
      <title>Re: understanding palo alto classifying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/74872#M41808</link>
      <description>&lt;P&gt;please ake a look at this video:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/Video-Tutorial-DoS-protection/ta-p/71164" target="_blank"&gt;Video Tutorial: DoS protection &lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and these articles:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Learning-Articles/Differences-between-DoS-Protection-and-Zone-Protection/ta-p/57761" target="_blank"&gt;Differences between DoS Protection and Zone Protection &lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Documentation-Articles/Understanding-DoS-Protection/ta-p/54562" target="_blank"&gt;Understanding DoS Protection &lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Configure-a-Policy-with-DoS-Protection-to-Protect-Hosted/ta-p/56507" target="_blank"&gt;How to Configure a Policy with DoS Protection to Protect Hosted Services This article contains posts that haven't been read by a moderator&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2016 12:07:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/74872#M41808</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-03-17T12:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: understanding palo alto classifying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/74924#M41835</link>
      <description>&lt;P&gt;Thanks everyone ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If dos attack happens &amp;nbsp;the victim may go down depends on the attack .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But how can we relate &amp;nbsp;the internet link down &amp;nbsp;and a dos attack ?&lt;/P&gt;
&lt;P&gt;for example an attacker doing a dos attack and the victim still &amp;nbsp;not down but the internet link down&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 18 Mar 2016 12:23:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/74924#M41835</guid>
      <dc:creator>sib2017</dc:creator>
      <dc:date>2016-03-18T12:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: understanding palo alto classifying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/74927#M41837</link>
      <description>&lt;P&gt;You could dig into firewall logs or install Chrome plugin that will show you current physical/virtual interface bandwidth (and a lot more).&lt;/P&gt;
&lt;P&gt;Search for&amp;nbsp;&lt;SPAN&gt;Pan(w)achrome&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Mar 2016 15:00:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/74927#M41837</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2016-03-18T15:00:21Z</dc:date>
    </item>
    <item>
      <title>Re: understanding palo alto classifying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/76641#M42387</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if i have&amp;nbsp;Zone-Based Protection&amp;nbsp;&amp;nbsp;profile in &amp;nbsp;untrust &amp;nbsp;zone &amp;nbsp;, for more granularity&lt;/P&gt;
&lt;DIV&gt;i can add &amp;nbsp;protection DoS Rule base and Profiles . If yes what is the best practice&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Thanks&lt;/DIV&gt;</description>
      <pubDate>Tue, 19 Apr 2016 05:50:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/76641#M42387</guid>
      <dc:creator>sib2017</dc:creator>
      <dc:date>2016-04-19T05:50:29Z</dc:date>
    </item>
    <item>
      <title>Re: understanding palo alto classifying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/76646#M42390</link>
      <description>&lt;P&gt;For Zone protection and DoS protection, you would first need to find your network's baseline to determine best practice&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you're receiving on average 1.000 packets&amp;nbsp;per second and peaks up to 4.000, you should tone zone protection down to fall within that spectrum. If you're seeing peaks of 1.500.000, you should scale up&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DoS protection works at a smaller scale where you can limit resources to a single host (or farm), so you'd need to set a baseline there as well: what is a desirable amount of resources available for a single source or what is the maximum amount we can allow towards the server (farm) before it runs out of resources or service degrades&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;overall I would recommend using SYN cookies whenever possible, as that puts part of the responability with the client and is less agressive than random early drop and especially for the untrust zone, enable as many of the protections as possible (after determining the baseline of what is to be expected and what falls outside of your desirable inbound traffic)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Apr 2016 07:47:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/76646#M42390</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-04-19T07:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: understanding palo alto classifying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/76673#M42394</link>
      <description>&lt;P&gt;Thank you reaper&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;How Dos rule action 'protect' protects the network and what is the differnence between protect and &amp;nbsp;deny&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Apr 2016 12:00:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/76673#M42394</guid>
      <dc:creator>sib2017</dc:creator>
      <dc:date>2016-04-19T12:00:57Z</dc:date>
    </item>
    <item>
      <title>Re: understanding palo alto classifying traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/76676#M42395</link>
      <description>&lt;P&gt;Protect is going to enforce the profile you have created and should be the action set to most of your policies&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Allow will allow all traffic, this is a sort of bypass functionality to temporarily open up the floodgates and not enforce DoS protection (this could be useful when doing a quick scan/PEN test)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Deny will block all traqffic, this could be used to temporarily turn off connectivity to a service when there is a DoS attack ongoing and you want to completely prevent all connections&lt;/P&gt;</description>
      <pubDate>Tue, 19 Apr 2016 12:55:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/understanding-palo-alto-classifying-traffic/m-p/76676#M42395</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-04-19T12:55:32Z</dc:date>
    </item>
  </channel>
</rss>

