<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DOS protection rule in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160239#M52258</link>
    <description>&lt;P&gt;FYI I am just investigating a rule that someon wants to put in and am really looking for the best way to stop a denial of service attach&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 08 Jun 2017 15:27:54 GMT</pubDate>
    <dc:creator>jdprovine</dc:creator>
    <dc:date>2017-06-08T15:27:54Z</dc:date>
    <item>
      <title>DOS protection rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160061#M52207</link>
      <description>&lt;P&gt;We are thinking of creating a DoS rule and I was wondering what the group thinks of this rule and what affect it would have. &amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DoSrule.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9583i62EDDA6C5692149B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="DoSrule.PNG" alt="DoSrule.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2017 21:04:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160061#M52207</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-06-07T21:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160071#M52208</link>
      <description>&lt;P&gt;I like this article. This requires planning a bit........:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Tech-Note-Articles/Understanding-DoS-Protection/ta-p/54562?attachment-id=1085" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Tech-Note-Articles/Understanding-DoS-Protection/ta-p/54562?attachment-id=1085&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2017 21:11:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160071#M52208</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-06-07T21:11:35Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160073#M52210</link>
      <description>&lt;P&gt;Action "deny" does exactly what is says - it denies traffic.&lt;/P&gt;&lt;P&gt;Same as you block in security policy.&lt;/P&gt;&lt;P&gt;Don't enable this rule.&lt;/P&gt;&lt;P&gt;What you wan't to do is to "protect"&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2017 21:18:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160073#M52210</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-06-07T21:18:55Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160205#M52241</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&lt;/P&gt;&lt;P&gt;so basically with out a profile attached to this rule it is going to deny all traffice coming for the outside zone as a source to the destination zones of DMZ, net-services and working. so my question is why is there an option to do this with out a profile either to deny or block seems like protect should be your only option.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 13:02:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160205#M52241</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-06-08T13:02:09Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160206#M52242</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/37163"&gt;@TranceforLife&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Yes I downloaded that and I do think its a good article thanks. So is anyone doing DoS protection and how is it working for you&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 13:03:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160206#M52242</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-06-08T13:03:11Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160207#M52243</link>
      <description>&lt;P&gt;I don't know why there is deny option.&lt;/P&gt;&lt;P&gt;I guess it is assumed you have DoS profile in place and if you fall under attack and suddenly want to block this traffic completely you can do so.&lt;/P&gt;&lt;P&gt;But yes this option will just deny like security policy.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 13:04:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160207#M52243</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-06-08T13:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160210#M52244</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Thanks thats exactly what I thought too &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 13:10:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160210#M52244</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-06-08T13:10:53Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160229#M52252</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&lt;/P&gt;&lt;P&gt;are you using DoS protection on your firewall? Can you add DoS protection as a profile on to you policies? I don't see a way to do that or do they stand alone&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 14:09:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160229#M52252</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-06-08T14:09:48Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160230#M52253</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;I don't know why there is deny option.&lt;/P&gt;&lt;P&gt;I guess it is assumed you have DoS profile in place and if you fall under attack and suddenly want to block this traffic completely you can do so.&lt;/P&gt;&lt;P&gt;But yes this option will just deny like security policy.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;It's not exacly the same as security policys ... at least on more powerful hardware with FPGA's (I don't know exactly which hardware has specific FPGA's and for what features) ...&lt;/P&gt;&lt;P&gt;because DoS policys are processed first, so if you are under Attack or want to drop a lot of traffic because of another reason, doing this with DoS policys will affect your DP processor much less than dropping the traffic in later stages of the packet processing (security policy)&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 14:19:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160230#M52253</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-06-08T14:19:22Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160231#M52254</link>
      <description>&lt;P&gt;So it isn't added as a profile to an existing policy but is hit first and then goes to the policies&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 14:38:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160231#M52254</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-06-08T14:38:09Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160237#M52256</link>
      <description>&lt;P&gt;DoS protection can be set at 2 places.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One is zone protection profile that is processed first.&lt;/P&gt;&lt;P&gt;It is highly suggested to set it up because it does not take too much bandwitdh to fill firewall session table with lots of hping requests and take you offline.&lt;/P&gt;&lt;P&gt;Downside is that you don't see IP's in log (but in case of DoS do you need to see all those IPs?).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Second place is DoS policy what we are currently discussing.&lt;/P&gt;&lt;P&gt;This is good to use if you need to protect specific resource or you are service provider and need to limit how many concurrent sessions specific server or client can have.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also don't use "random early drop" but "syn cookies" &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 14:59:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160237#M52256</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-06-08T14:59:40Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160238#M52257</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;To add, the initial policy rule that you have in your screenshot is a really poor use of the DoS protection profile and it looks like you are attempting to do Zone protection in the wrong area. When you build out DoS protection profiles you should attempt to limit them to your public services and set them up specific to that, for example you would have one for SMTP, one for DNS, one for any service that you have open to the outside world if that's doable.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also when you are making this policy it's probably best to put things into an Allow action and look at the logs specifically so that this doesn't actually start affecting traffic until you have a baseline of the rates that are normal for your public services. DoS profiles take a little bit of time to actually setup properly and ensure that you have everything correct before you start allowing it to take action against traffic.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 15:26:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160238#M52257</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-06-08T15:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160239#M52258</link>
      <description>&lt;P&gt;FYI I am just investigating a rule that someon wants to put in and am really looking for the best way to stop a denial of service attach&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 15:27:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160239#M52258</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-06-08T15:27:54Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160241#M52260</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;So if we did want to do DoS, the best way would be to start out in with the allow action and base the profiles on that information.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So should I have both DoS and Zone protection set up? I think the main focus is to make sure we are not deisabled by a DoS attach and we need to figure out the best way to do that&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 15:36:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160241#M52260</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-06-08T15:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160243#M52261</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I would generally want to see both a Zone Protection profile in place along with DoS policies for any public service when setting up a firewall. Zone Protection is a good way to limit everything from a ZONE level, this protection profile however isn't specific as it looks at an entire Zone and you set limits at that level.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The DoS protection profile you can get way more granular, so for example we have a public DNS server that would be vulnerable to multiple types of attack I can protect that so that it doesn't get flooded and I can limit the amount of traffic to something that would be a 'normal' rate.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Obviously before you actually setup a DoS or a Zone Protection profile with an 'Activate' and 'Maximum' value you would want to keep lowering your 'Alert' value or someone keep track of what your normal traffic rate is. If you setup your Activate and Maximum values without knowing your normal traffic rate then your DoS and Zone Protection profiles are going to be pretty much useless as it wouldn't take your actual traffic rate into account.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 15:46:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-rule/m-p/160243#M52261</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-06-08T15:46:40Z</dc:date>
    </item>
  </channel>
</rss>

