<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OSPF LSA Threshold: Security Finding in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ospf-lsa-threshold-security-finding/m-p/158532#M51865</link>
    <description>&lt;P&gt;Got the same reply in the notes of a&amp;nbsp;case opened with PAN support. &amp;nbsp;They must have been looking over your shoulder. &amp;nbsp;Sent email to our SE and will follow up with same.&lt;/P&gt;</description>
    <pubDate>Fri, 26 May 2017 19:50:45 GMT</pubDate>
    <dc:creator>NetWright</dc:creator>
    <dc:date>2017-05-26T19:50:45Z</dc:date>
    <item>
      <title>OSPF LSA Threshold: Security Finding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ospf-lsa-threshold-security-finding/m-p/145632#M49076</link>
      <description>&lt;P&gt;Wondering if there's a way to configure a threshold for OSPF LSA updates/messages?&lt;BR /&gt;Or if such a threshold is already in place by default on Palo Alto firewalls. &amp;nbsp;&lt;/P&gt;&lt;P&gt;Something that can maybe drop anything more than say 7 LSA messages in 5 minutes.&lt;BR /&gt;Apparently, there's a security threat related to a device getting DOS'd by an overwhelming flow of LSA messages and our security consultant wants us to configure a threshold to drop more than x number of LSA messages in a given period.&lt;BR /&gt;&lt;BR /&gt;I see there's an LSA interval like this:&lt;/P&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="TB1_TableBullet_inner"&gt;•&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="TB1_TableBullet_inner"&gt;&lt;SPAN&gt;LSA Interval (sec)&lt;/SPAN&gt;—The option specifies the minimum time between transmissions of two instances of the same LSA (same router, same type, same LSA ID). This is equivalent to MinLSInterval in RFC 2328. Lower values can be used to reduce re-convergence times when topology changes occur.&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yet that doesn't seem to address the issue of an overwhelming number of updates being sent maliciously.&lt;BR /&gt;&lt;BR /&gt;For comparison on the Cisco-side there's a concept of:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="2"&gt;"OSPF Link-State Database Overload Protection"&amp;nbsp;&lt;BR /&gt;which is configured with this command in the OSPF router process:&lt;BR /&gt;&lt;STRONG&gt;max-lsa&lt;/STRONG&gt; &lt;EM&gt;maximum-number&lt;/EM&gt;&lt;SPAN&gt; [&lt;/SPAN&gt;&lt;EM&gt;threshold-percentage&lt;/EM&gt;&lt;SPAN&gt;] [&lt;/SPAN&gt;&lt;STRONG&gt;warning-only&lt;/STRONG&gt;&lt;SPAN&gt;] [&lt;/SPAN&gt;&lt;STRONG&gt;ignore-time&lt;/STRONG&gt; &lt;EM&gt;minutes&lt;/EM&gt;&lt;SPAN&gt;] [&lt;/SPAN&gt;&lt;STRONG&gt;ignore-count&lt;/STRONG&gt; &lt;EM&gt;count-number&lt;/EM&gt;&lt;SPAN&gt;] [&lt;/SPAN&gt;&lt;STRONG&gt;reset-time&lt;/STRONG&gt; &lt;EM&gt;minutes&lt;/EM&gt;&lt;SPAN&gt;]&lt;/SPAN&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2017 21:52:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ospf-lsa-threshold-security-finding/m-p/145632#M49076</guid>
      <dc:creator>NetWright</dc:creator>
      <dc:date>2017-03-01T21:52:18Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF LSA Threshold: Security Finding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ospf-lsa-threshold-security-finding/m-p/148336#M49566</link>
      <description>&lt;P&gt;No, these parameters are not available in PanOS. &amp;nbsp;You could contact your sales engineer to see if there is an existing FR (Feature Request) on file for this and have them add a vote or create one. &amp;nbsp;If it is new tell them it is covered under RFC 5286 for implementation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But remember that Palo Alto is a security company here that also does routing. &amp;nbsp;So the pace of feature implementation on the routing side can be on the slow side.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Mar 2017 16:22:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ospf-lsa-threshold-security-finding/m-p/148336#M49566</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2017-03-19T16:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF LSA Threshold: Security Finding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ospf-lsa-threshold-security-finding/m-p/158532#M51865</link>
      <description>&lt;P&gt;Got the same reply in the notes of a&amp;nbsp;case opened with PAN support. &amp;nbsp;They must have been looking over your shoulder. &amp;nbsp;Sent email to our SE and will follow up with same.&lt;/P&gt;</description>
      <pubDate>Fri, 26 May 2017 19:50:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ospf-lsa-threshold-security-finding/m-p/158532#M51865</guid>
      <dc:creator>NetWright</dc:creator>
      <dc:date>2017-05-26T19:50:45Z</dc:date>
    </item>
  </channel>
</rss>

