<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TCP Flood ID: 8501 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-flood-id-8501/m-p/5939#M4323</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On our user TAP interface (a TAP that collects user trafic only), we see 1000's of TCP flood events from 0.0.0.0 to 0.0.0.0 ; port 0 to port 0; Zone user to Zone user. It is always Session ID of 0. I have tried to do packet captures, but I never seem to get anything. It also doesn't show in session browser (probably because the session is 0!) Anyone else see this? Any idea what this is?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 04 Mar 2013 20:05:24 GMT</pubDate>
    <dc:creator>craymond</dc:creator>
    <dc:date>2013-03-04T20:05:24Z</dc:date>
    <item>
      <title>TCP Flood ID: 8501</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-flood-id-8501/m-p/5939#M4323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On our user TAP interface (a TAP that collects user trafic only), we see 1000's of TCP flood events from 0.0.0.0 to 0.0.0.0 ; port 0 to port 0; Zone user to Zone user. It is always Session ID of 0. I have tried to do packet captures, but I never seem to get anything. It also doesn't show in session browser (probably because the session is 0!) Anyone else see this? Any idea what this is?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Mar 2013 20:05:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-flood-id-8501/m-p/5939#M4323</guid>
      <dc:creator>craymond</dc:creator>
      <dc:date>2013-03-04T20:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Flood ID: 8501</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-flood-id-8501/m-p/5940#M4324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This threat ID is triggered by zone protection or DoS policies applied to the sessions.&amp;nbsp; It should be triggered by the SYN flood alert and activate rate being set low enough to trigger under normal traffic loads.&amp;nbsp; Could you see what these values are set for along with the output from the CLI command below?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show session info&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The session info should show you the new connection establish rate which should give some indication of the SYN rate the device is seeing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Mar 2013 20:37:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-flood-id-8501/m-p/5940#M4324</guid>
      <dc:creator>kfindlen</dc:creator>
      <dc:date>2013-03-04T20:37:18Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Flood ID: 8501</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-flood-id-8501/m-p/5941#M4325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Zone protection is set to "default" on the user zone. I didn't see anything under "show session info" but using "show zone-protection" I did see:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Zone User, vsys vsys1, profile default&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp; tcp-syn&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RED enabled: yes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; alarm rate:&amp;nbsp; 10000pps&amp;nbsp;&amp;nbsp; activate rate:&amp;nbsp; 10000pps&amp;nbsp;&amp;nbsp; maximal rate:&amp;nbsp; 40000pps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; current:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 115&amp;nbsp;&amp;nbsp; packets dropped:12400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I would guess this is the answer to what this is! Any idea what could cause it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Mar 2013 21:08:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-flood-id-8501/m-p/5941#M4325</guid>
      <dc:creator>craymond</dc:creator>
      <dc:date>2013-03-04T21:08:52Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Flood ID: 8501</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-flood-id-8501/m-p/5942#M4326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SYN flood protection on zone protection allows the firewall to drop SYN packets when they exceed the activate rate.&amp;nbsp; RED stands for random early drop and means that once the activate rate has been exceeded that SYN packets will be dropped at random to mitigate a possible SYN flood.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you are in TAP mode the value of zone protection is diminished as all traffic is dropped after processing in any case.&amp;nbsp; When a packet is dropped by RED that packet is not forwarded to the dataplane for session setup and inspection, and no traffic log is created.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please verify that the alarm, activate, and maximal rates are set for appropriate values for your environment.&amp;nbsp; If under normal traffic loads you see bursts of new TCP sessions above 10,000/sec then you would want to increase these values to take that into account.&amp;nbsp; The alarm rate is the rate that is required to trigger the threat log entry, while the activate rate is when packets begin being dropped.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Mar 2013 21:16:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-flood-id-8501/m-p/5942#M4326</guid>
      <dc:creator>kfindlen</dc:creator>
      <dc:date>2013-03-04T21:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Flood ID: 8501</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-flood-id-8501/m-p/5943#M4327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks kfindlen. I also found this from another message:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We don’t log the IP addresses because in a DDoS attack there could be hundreds or even thousands of IPs that were associated with the syn flood attack. We can’t log all of the IPs and showing only one for source and dest could be misleading.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I think that covers it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Mar 2013 21:21:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-flood-id-8501/m-p/5943#M4327</guid>
      <dc:creator>craymond</dc:creator>
      <dc:date>2013-03-04T21:21:43Z</dc:date>
    </item>
  </channel>
</rss>

