<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Automatic attack block in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/automatic-attack-block/m-p/150843#M50030</link>
    <description>&lt;P&gt;I'll see if I can find this....&lt;/P&gt;</description>
    <pubDate>Mon, 03 Apr 2017 13:03:07 GMT</pubDate>
    <dc:creator>DPoppleton</dc:creator>
    <dc:date>2017-04-03T13:03:07Z</dc:date>
    <item>
      <title>Automatic attack block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/automatic-attack-block/m-p/150587#M49982</link>
      <description>&lt;P&gt;Occaisionally we get an attack from a single IP to one of our external servers where the attacker tries a whole bunch of known exploits. Is there anything like a "Zone Protection" for this type of attack? I'm looking for something where an external bad actor gets blacklisted for a period of time after it tries a number of expolits.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 14:55:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/automatic-attack-block/m-p/150587#M49982</guid>
      <dc:creator>DPoppleton</dc:creator>
      <dc:date>2017-03-31T14:55:28Z</dc:date>
    </item>
    <item>
      <title>Re: Automatic attack block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/automatic-attack-block/m-p/150605#M49984</link>
      <description>&lt;P&gt;there may be a more direct, better way, but what immediately comes to mind to me is if you have a threat prevention license and these are actual CVEs already known by PA, you can configure the vulnerability protection profile to have an action of Block IP which will shun the offending IP for up to an hour.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Capture.JPG" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8587i091357CCEF6B5536/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Capture.JPG" alt="Capture.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 15:37:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/automatic-attack-block/m-p/150605#M49984</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-03-31T15:37:04Z</dc:date>
    </item>
    <item>
      <title>Re: Automatic attack block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/automatic-attack-block/m-p/150608#M49986</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/48237"&gt;@DPoppleton&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think you need DoS protection ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;A classified DOS protection profile allows the creation of a threshold that applies to a single source IP.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;For example, a max session rate per IP can be created for all traffic matching the policy, then block that single IP address once the threshold is triggered for a certain amount of time which is configurable.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/How-to-Set-Up-DoS-Protection/ta-p/71164" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Featured-Articles/How-to-Set-Up-DoS-Protection/ta-p/71164&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope it helps !&lt;/P&gt;
&lt;P&gt;-Kiwi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 15:48:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/automatic-attack-block/m-p/150608#M49986</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2017-03-31T15:48:12Z</dc:date>
    </item>
    <item>
      <title>Re: Automatic attack block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/automatic-attack-block/m-p/150842#M50029</link>
      <description>&lt;P&gt;These attackers don't hit at a high rate, they just run through known vulnerabilities, most of which the Palo sees and blocks.&amp;nbsp; I would like a feature where if there are 5 hits against one IP of the known vulnerabilties then block all traffic for 1/2 an hour or so.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm thinking this might be a feature request.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2017 13:01:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/automatic-attack-block/m-p/150842#M50029</guid>
      <dc:creator>DPoppleton</dc:creator>
      <dc:date>2017-04-03T13:01:50Z</dc:date>
    </item>
    <item>
      <title>Re: Automatic attack block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/automatic-attack-block/m-p/150843#M50030</link>
      <description>&lt;P&gt;I'll see if I can find this....&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2017 13:03:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/automatic-attack-block/m-p/150843#M50030</guid>
      <dc:creator>DPoppleton</dc:creator>
      <dc:date>2017-04-03T13:03:07Z</dc:date>
    </item>
  </channel>
</rss>

