<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: About DNS amplification attack issue in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/about-dns-amplification-attack-issue/m-p/7967#M5887</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Vincent,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please let us know, what content database version is installed on your PAN firewall. The default action of above mentioned threats is "alert". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="DNS-Amplification.JPG" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/13900_DNS-Amplification.JPG" style="height: 388px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;Could you please set the action to "drop-all-packet" or "reset-both". So that, all packets matching with the signature of above mentioned Threat ID will be dropped by PAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 12 Jun 2014 15:45:46 GMT</pubDate>
    <dc:creator>HULK</dc:creator>
    <dc:date>2014-06-12T15:45:46Z</dc:date>
    <item>
      <title>About DNS amplification attack issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-dns-amplification-attack-issue/m-p/7966#M5886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Sir,&lt;/P&gt;&lt;P&gt;We have a customer for education envirument and they suffered a lot of DNS amplification attacks.Last 7 days session count is 688 Million and 220G Bytes for DNS traffic.&lt;/P&gt;&lt;P&gt;We try to drop the "Threat ID 36027 DNS Amplication Attack Query " and "Threat ID 36029 DNS Amplication Attack Response",But we only drop the ID 36027 signature once.&lt;/P&gt;&lt;P&gt;We want to know the problem for IPS signature Issue? Hope you can help us, Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vincent.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2014 09:11:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-dns-amplification-attack-issue/m-p/7966#M5886</guid>
      <dc:creator>vincentsun</dc:creator>
      <dc:date>2014-06-12T09:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: About DNS amplification attack issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-dns-amplification-attack-issue/m-p/7967#M5887</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Vincent,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please let us know, what content database version is installed on your PAN firewall. The default action of above mentioned threats is "alert". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="DNS-Amplification.JPG" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/13900_DNS-Amplification.JPG" style="height: 388px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;Could you please set the action to "drop-all-packet" or "reset-both". So that, all packets matching with the signature of above mentioned Threat ID will be dropped by PAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2014 15:45:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-dns-amplification-attack-issue/m-p/7967#M5887</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-06-12T15:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: About DNS amplification attack issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-dns-amplification-attack-issue/m-p/7968#M5888</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi HULK,&lt;/P&gt;&lt;P&gt;We already drop the "DNS Amplication Attack" . Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vincent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="DNS Amplication Attack.jpg" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/13949_DNS Amplication Attack.jpg" style="height: 385px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jun 2014 09:30:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-dns-amplification-attack-issue/m-p/7968#M5888</guid>
      <dc:creator>vincentsun</dc:creator>
      <dc:date>2014-06-16T09:30:01Z</dc:date>
    </item>
  </channel>
</rss>

