<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DoS policy notify in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/231401#M66436</link>
    <description>&lt;P&gt;Hi Bpry,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, in this thread you can see the screenshot about how SYN flood (max) is enabled. So we see that the DoS policy is being applied but we dont see any "floof" event in threat logs. So we also would like to know how to find event about flooding in PA.&lt;/P&gt;</description>
    <pubDate>Wed, 19 Sep 2018 07:37:10 GMT</pubDate>
    <dc:creator>BigPalo</dc:creator>
    <dc:date>2018-09-19T07:37:10Z</dc:date>
    <item>
      <title>DoS policy notify</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/230438#M66219</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have configured a DoS policy in order to limit the connections to several internal services.&lt;/P&gt;&lt;P&gt;So when we launch a test in order to check that the connections are being limit we dont see any logs or event reporting it.&lt;/P&gt;&lt;P&gt;But looking in policy statistics we see that its being applied.&lt;/P&gt;&lt;P&gt;how can we verify that the policy DoS is working???? should we see any log or event about DoS?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Sep 2018 14:18:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/230438#M66219</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2018-09-11T14:18:03Z</dc:date>
    </item>
    <item>
      <title>Re: DoS policy notify</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/230455#M66224</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Within the threat logs your subtype will be flood. This will show you whenever one of your policies are triggered.&amp;nbsp;&lt;/P&gt;&lt;P&gt;( subtype eq flood )&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then if you want to get notified you would just setup Log Forwarding profiles.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Sep 2018 17:19:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/230455#M66224</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-09-11T17:19:54Z</dc:date>
    </item>
    <item>
      <title>Re: DoS policy notify</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/230533#M66244</link>
      <description>&lt;P&gt;Hi BPry,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We dont know any event in "Threat logs" about this test. What are the causes to not show anything in "threat" logs?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Sep 2018 06:41:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/230533#M66244</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2018-09-12T06:41:31Z</dc:date>
    </item>
    <item>
      <title>Re: DoS policy notify</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/230586#M66250</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Are you sure that you are at least hitting the 'alert' value if not the 'activate' or the 'maximum'? The DoS Protection rules should show hits regardless of if you passed any of these values, as the profiles are actively evalutating the traffic.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Sep 2018 13:20:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/230586#M66250</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-09-12T13:20:35Z</dc:date>
    </item>
    <item>
      <title>Re: DoS policy notify</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/230686#M66267</link>
      <description>&lt;P&gt;I attach the config:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.JPG" style="width: 414px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16618iEDFEEF2C974749B6/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="1.JPG" alt="1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DoS Protection Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.1.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16616i555A7D73EAAAF887/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="1.1.JPG" alt="1.1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We dont see any log after testing the profile:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="3.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16615iB6F23CA106A73D61/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="3.JPG" alt="3.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Counter DoS. And DoS rule with 610 current, no drops.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16617iFDA53ED5F6E213B7/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2.jpg" alt="2.jpg" /&gt;&lt;/span&gt;Why is not limiting the connections??&lt;/P&gt;</description>
      <pubDate>Thu, 13 Sep 2018 09:13:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/230686#M66267</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2018-09-13T09:13:11Z</dc:date>
    </item>
    <item>
      <title>Re: DoS policy notify</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/230688#M66268</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The max rate that you specified to 200 does only apply for TCP-SYN packets and not for already established sessions. If you want to limit the concurrent sessions you will find the corresponding configuration in the "ressource protection" tab.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_20180913-111912_Chrome.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16619iF5FD04DF411AD062/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot_20180913-111912_Chrome.jpg" alt="Screenshot_20180913-111912_Chrome.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Sep 2018 09:26:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/230688#M66268</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-09-13T09:26:17Z</dc:date>
    </item>
    <item>
      <title>Re: DoS policy notify</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/230730#M66280</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;To go along with what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;mentioned; you are also running this as Classified and specifying a TCP-Syn alarm rate of 180 packets per second. That's quite a lot for one client to generate to actually trigger an alarm in a production environment, and I wouldn't expect this to actually trigger in most enviroments.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you actually went through and baselined expected traffic volume? Keep in mind that your DoS profile will show a hit for&amp;nbsp;&lt;EM&gt;any&amp;nbsp;&lt;/EM&gt;traffic that matches that policy and is analyzed; that doesn't mean that it's dropped traffic 610 times.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When initially setting up a DoS Profile I would highly recommend setting an incredibly high 'Activate' and 'Max' rate; then play around with the Alarm rate to see where you actually triggering the DoS Profile. This ensures that you aren't dropping anyones traffic until you actually know what your baseline is, and you can set your Activate and Max rates accordingly. The Session Limit you can't really play with, you need to properly baseline expected session levels before setting a session limit or you may see yourself dropping traffic that you don't necessary&amp;nbsp;want to.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Sep 2018 14:48:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/230730#M66280</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-09-13T14:48:14Z</dc:date>
    </item>
    <item>
      <title>Re: DoS policy notify</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/231029#M66340</link>
      <description>&lt;P&gt;Yes, one thing:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The configuration we are looking for does not require (and should not) limit the number of concurrent connections.&amp;nbsp; We should only control the growth of connections over time. The idea is that, before an 'avalanche' of connections to a specific service, only 200 (for example) are allowed every 2 seconds, although after a few seconds / minutes, there are, for example, 2500 concurrent connections.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have done tests (using j-meter), we observe that the DoS policy is executed, but we do not have logs or any trace or historical evidence, only We can see in real time, reviewing the status of the application of DoS policies.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Sep 2018 08:18:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/231029#M66340</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2018-09-17T08:18:29Z</dc:date>
    </item>
    <item>
      <title>Re: DoS policy notify</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/231257#M66402</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;BR /&gt;&lt;P&gt;We have done tests (using j-meter), we observe that the DoS policy is executed, but we do not have logs or any trace or historical evidence, only We can see in real time, reviewing the status of the application of DoS policies.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Explain this one for me a bit.if the DoS policy is activated then this&amp;nbsp;&lt;STRONG&gt;will&lt;/STRONG&gt; be recorded. If you are flooding the interface or running into limitations on your box then that's a different issue all together; but a properly functioning firewall will always record when a DoS policy hits an 'Activate', 'Max', or session limit event.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 17:06:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/231257#M66402</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-09-18T17:06:40Z</dc:date>
    </item>
    <item>
      <title>Re: DoS policy notify</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/231401#M66436</link>
      <description>&lt;P&gt;Hi Bpry,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, in this thread you can see the screenshot about how SYN flood (max) is enabled. So we see that the DoS policy is being applied but we dont see any "floof" event in threat logs. So we also would like to know how to find event about flooding in PA.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Sep 2018 07:37:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/231401#M66436</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2018-09-19T07:37:10Z</dc:date>
    </item>
    <item>
      <title>Re: DoS policy notify</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/231478#M66457</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I replied to your other post too early (btw please don't do separate&amp;nbsp;posts for the same issue like this, it makes everything far more confusing when people come across your post with the search functionality).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So what you're showing is that your policy is getting hit, but I think you're getting the different policy types mixed up. Your classified profile accounts for&amp;nbsp;&lt;EM&gt;one IP&lt;/EM&gt; hitting the alarm activate or max values. It appears per your previous comments and your expectation of how you expect this to function would dictate that you actually wish to setup an&amp;nbsp;&lt;EM&gt;aggregate&lt;/EM&gt; policy instead of a classified.&amp;nbsp; The section that you've highlited saying there is 610 sessions is the&amp;nbsp;&lt;STRONG&gt;total&lt;/STRONG&gt; session count for this policy. As you've configured it unless one of the sole source IPs hit above 180/s. The highlited rate of 15 that you've pointed out also doesn't come close to actually triggering your policy as configured.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The difference here is that you're currently limiting a sole source ip from hitting the target destination at the specified rates. That means that 172.16.1.1 gets 180/s and then 172.16.1.2 gets 180/s but collectively the firewall as you currently have the policies set don't care how many sessions collectively occur. If you switched this to an aggregate then it would be&amp;nbsp;&lt;STRONG&gt;all&lt;/STRONG&gt; traffic is only allowed to get to a specified rate.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once you've actually triggered the policy limit you can find the information in the threat logs when using the query ( subtype eq flood ), where you will see either 'Session Limit Event' if you've hit a resource limit or a variation of 'TCP/ICMP/UDP Flood' to indicate if you've hit a connection rate limit.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Again I would expect with your specified rate limits what you're actually looking for is an aggregate policy. If you aren't looking at an aggregate ppolicy and you actually want a classified policy, there is currently no provided results that your hitting the values you've set in the profile.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Sep 2018 14:10:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/231478#M66457</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-09-19T14:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: DoS policy notify</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/231623#M66507</link>
      <description>&lt;P&gt;Hi Bpry,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry for duplicate threads. You can delete the another one.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The point is that we can see that the policy DoS is getting hits. But we dont see any threat events type "flood" when we launch j-meter.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So it could be that flood threat event is only generated with "zone protection" limit, and not with DoS policy?????&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Should DoS limit SYN obverloaded&amp;nbsp; generate an event in threat logs??&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 14:42:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/231623#M66507</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2018-09-20T14:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: DoS policy notify</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/231639#M66514</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Right... again 'hits' against the profile are not the same as actually triggering the DoS protection. You keep talking about jmeter, but you haven't actually shown that you know that jmeter is actually launching enough traffic to trigger your DoS profile. Simply lowering your connection 'alarm' rate would allow you to verify/see that the DoS policies are working as expected and see exactly the alerts that I'm mentioning in the threat logs. I'm not confident that jmeter running on one host would be able to actually generate enough sessions to trigger the policy as you have it configured, your values are simply too high for a classified policy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Both Zone and DoS policies will trigger a log whenever either is actually activated; that's not a configurable piece, they trigger they log.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 17:02:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/231639#M66514</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-09-20T17:02:10Z</dc:date>
    </item>
    <item>
      <title>Re: DoS policy notify</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/231707#M66529</link>
      <description>&lt;P&gt;We changed the limits values lowe and it still not generating a threat food event.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We can see in counter DoS rule the number of packets matched in DoS policy that why we think the alarm should be generated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="new1.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16713iED0592FB88ECA668/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="new1.JPG" alt="new1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Sep 2018 06:12:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-policy-notify/m-p/231707#M66529</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2018-09-21T06:12:53Z</dc:date>
    </item>
  </channel>
</rss>

