<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trigger/logs DoS policy in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/trigger-logs-dos-policy/m-p/231407#M66439</link>
    <description>&lt;P&gt;We would like to be adviced about connections limit against server. This is the config:&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.JPG" style="width: 414px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16701i48C032DFAE32A96B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="1.JPG" alt="1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.1.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16702i175836325432A183/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="1.1.JPG" alt="1.1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the same source machine launches more than 200 packets/sec, this machine will be blocked during 2 seconds.&lt;/P&gt;&lt;P&gt;We saw that the DoS policy is being applied but we dont see any event in threat logs. (sub type flood). Why is not showing anything in monitor-&amp;gt;logs-&amp;gt;threat.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are simulating traffic with j-meter.&lt;/P&gt;</description>
    <pubDate>Wed, 19 Sep 2018 07:56:34 GMT</pubDate>
    <dc:creator>BigPalo</dc:creator>
    <dc:date>2018-09-19T07:56:34Z</dc:date>
    <item>
      <title>Trigger/logs DoS policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trigger-logs-dos-policy/m-p/231187#M66385</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We would like to be notified when there is a high number of requests to our servers, and even to control them in time. Aside to be able to see an event in the logs (as it is the case with the flood in the sessions)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The configuration we are looking for does not require (and should not) limit the number of concurrent connections.&amp;nbsp; We should only control the growth of connections over time. The idea is that, before an 'avalanche' of connections to a specific service, only 200 (for example) are allowed every 2 seconds, although after a few seconds / minutes, there are, for example, 2500 concurrent connections.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have done tests (using j-meter), we observe that the DoS policy is executed, but we do not have logs or any trace or historical evidence, only We can see in real time, reviewing the status of the application of DoS policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is that possible with PA doS policy??? how paramethers sould be configured???&lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 08:18:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trigger-logs-dos-policy/m-p/231187#M66385</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2018-09-18T08:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: Trigger/logs DoS policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trigger-logs-dos-policy/m-p/231255#M66401</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I'm a bit confused on what you're actually looking for I guess. You can certiantly apply a maximum concurrent session limit, but you can't generically say that hosts can only create sessions at a set rate per second. That type of finer control would be set through the flood protection limits and is broken down into what you're actually looking at ( SYN UDP ICMP ect). When configuring flood protection you need to input an 'Activate' and 'Max' rate, but you can set this artifically high as to never have it trip for anyone.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for alerting everything applied will be recorded in the Threat logs as subtype flood. What exactly triggered the policy will also be recorded ( Session Limit Event, TCP Flood, UDP Flood, ICMP Flood, ect) and you could then setup log forwarding so that you are alerted however you want when these alerts are triggered.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for the parameters you should use, that's kind of on you to figure out. The values would be done based off of what you have recorded as the baseline. How I've configured a policy for example would have no baring or benefit if you were to apply the same policy on your own service; it's dependent on the environment that it's being deployed in.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 16:53:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trigger-logs-dos-policy/m-p/231255#M66401</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-09-18T16:53:41Z</dc:date>
    </item>
    <item>
      <title>Re: Trigger/logs DoS policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trigger-logs-dos-policy/m-p/231407#M66439</link>
      <description>&lt;P&gt;We would like to be adviced about connections limit against server. This is the config:&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.JPG" style="width: 414px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16701i48C032DFAE32A96B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="1.JPG" alt="1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.1.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16702i175836325432A183/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="1.1.JPG" alt="1.1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the same source machine launches more than 200 packets/sec, this machine will be blocked during 2 seconds.&lt;/P&gt;&lt;P&gt;We saw that the DoS policy is being applied but we dont see any event in threat logs. (sub type flood). Why is not showing anything in monitor-&amp;gt;logs-&amp;gt;threat.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are simulating traffic with j-meter.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Sep 2018 07:56:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trigger-logs-dos-policy/m-p/231407#M66439</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2018-09-19T07:56:34Z</dc:date>
    </item>
  </channel>
</rss>

