<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: When to use ZoneProfile and DoS Profile in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/when-to-use-zoneprofile-and-dos-profile/m-p/233737#M67010</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;Can you show an example policy for setting this up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;50,000 sessions or a connection rate of more then 250/s. In that same policy however I could say that no one source-address would be able to have more then 15/s for the connection rate or 20 sessions. "&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 03 Oct 2018 18:04:29 GMT</pubDate>
    <dc:creator>raji_toor</dc:creator>
    <dc:date>2018-10-03T18:04:29Z</dc:date>
    <item>
      <title>When to use ZoneProfile and DoS Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-to-use-zoneprofile-and-dos-profile/m-p/233035#M66845</link>
      <description>&lt;P&gt;Hello All - Can i understand that Zone Protection Profile is to Protect Firewall itself and DoS Protection Profile is to protect the servers and hosts behind the firewall from Internet?&lt;/P&gt;&lt;P&gt;Can i achieve a DoS protection (For example SYN Flood attack) only by configuring DoS Protection Profile that will be tailored with Policy Rule with source and destination IP address?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;regards/RB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My readings are below. But my question is not answered in the below, IMHO&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Zone Protection Profiles —Apply only to new sessions in ingress zones and provide broad protection against flood attacks by limiting the connections-per-second (CPS) to the firewall, plus protection against reconnaissance (port scans and host sweeps), packet-based attacks, and layer 2 protocol-based attacks.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Zone protection defends network zones against flood attacks, reconnaissance attempts, packet-based attacks, and attacks that use non-IP protocols. Tailor a Zone Protection profile to protect each zone (you can apply the same profile to similar zones).&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;Dos Protection Profiles and Policy Rules —Provide granular protection of specific, critical devices for new sessions. Classified policies protect individual devices by limiting the CPS for a specific device or specific devices. Aggregate policies limit the total CPS for a group of devices but don’t limit the CPS for a particular device in the group to less than the total allowed for the group, so one device may still receive the majority of the connection requests.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Denial-of-service (DoS) protection defends specific critical systems against flood attacks, especially devices that user access from the internet such as web servers and database servers, and protects resources from session floods. Tailor DoS Protection profiles and policy rules to protect each set of critical devices&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;A DoS protection policy can be used to accomplish some of the same things a Zone protection policy does but there are a few key differences:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;A major difference is a DoS policy can be classified or aggregate. Zone protection policies can be aggregate.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;A classified profile allows the creation of a threshold that applies to a single source IP.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;For example, a max session rate per IP can be created for all traffic matching the policy, then block that single IP address once the threshold is triggered&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;An aggregate profile allows the creation of a max session rate for all packets matching the policy. The threshold applies to new session rate for all IPs combined. Once the threshold is triggered it would affect ALL traffic matching the policy.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Zone protection policies allow the use of flood protection and have the ability to protect against port scanning\sweeps and packet based attacks. A few examples are IP spoofing, fragments, overlapping segments, reject tcp-non-syn&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Zone protection profiles may have less performance impact since they are applied pre-session and don’t engage the policy engine&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Sep 2018 18:49:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-to-use-zoneprofile-and-dos-profile/m-p/233035#M66845</guid>
      <dc:creator>KumarRamalinga</dc:creator>
      <dc:date>2018-09-28T18:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: When to use ZoneProfile and DoS Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-to-use-zoneprofile-and-dos-profile/m-p/233048#M66848</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;So to answer your first question, kinda but not exactly. To answer your second question, yes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Think of it this way.&lt;/P&gt;&lt;P&gt;Zone protection is for everything going into/out of the zone, all endpoints in that zone, and is has broad coverage. That is everything in that zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DoS protection has finer granularity where you can specifiy a specific endpoint in that zone.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/zone-protection-and-dos-protection" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/zone-protection-and-dos-protection&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Sep 2018 21:32:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-to-use-zoneprofile-and-dos-profile/m-p/233048#M66848</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-09-28T21:32:21Z</dc:date>
    </item>
    <item>
      <title>Re: When to use ZoneProfile and DoS Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-to-use-zoneprofile-and-dos-profile/m-p/233062#M66853</link>
      <description>&lt;P&gt;Thank you for the response. Shall i understand DoS protection profile is superior than Zone protection profile. With that said, in an environment&amp;nbsp;can i go without&amp;nbsp;configuring Zone Protection Profile, But configure only DoS Protection Profile with the settings Source Zone as Any and Destination Zone as Any?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What i am trying to ask is, whether DoS Protection profile with source and destination zone as ANY is equivalent to Zone Protection Profile?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks RB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Sep 2018 07:18:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-to-use-zoneprofile-and-dos-profile/m-p/233062#M66853</guid>
      <dc:creator>KumarRamalinga</dc:creator>
      <dc:date>2018-09-29T07:18:56Z</dc:date>
    </item>
    <item>
      <title>Re: When to use ZoneProfile and DoS Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-to-use-zoneprofile-and-dos-profile/m-p/233457#M66943</link>
      <description>&lt;P&gt;Sorry for the late response, I wouldnt say better, only it can be more specific. I try and use Zone protection since its broader in scope.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 02 Oct 2018 21:07:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-to-use-zoneprofile-and-dos-profile/m-p/233457#M66943</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-10-02T21:07:15Z</dc:date>
    </item>
    <item>
      <title>Re: When to use ZoneProfile and DoS Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-to-use-zoneprofile-and-dos-profile/m-p/233690#M66983</link>
      <description>&lt;P&gt;Thanks for response. I appreciate that. In the course of discussion, i have a question,&amp;nbsp; how PaloAlto categorize a SYN FLOOD. Does it just count the number of SYN packet from the same source IP address and decide it is a SYN FLOOD ATTACK. For example, i have a situation. I have 1000 customer&amp;nbsp; behind a single firewall NATing one Public IP address and hitting my server that is behind PaloAlto Firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In a situation when 1000 of the users start hitting my server (legitimately) does this tarffic is considered as SYN FLOOD by PaloAlto?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;RB&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 15:00:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-to-use-zoneprofile-and-dos-profile/m-p/233690#M66983</guid>
      <dc:creator>KumarRamalinga</dc:creator>
      <dc:date>2018-10-03T15:00:20Z</dc:date>
    </item>
    <item>
      <title>Re: When to use ZoneProfile and DoS Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-to-use-zoneprofile-and-dos-profile/m-p/233706#M66989</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/95502"&gt;@KumarRamalinga&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Depends on what you're trying to accomplish. Zone profiles are extremely broad and act sort of like an aggregate profile at all times. A DoS profile on the other hand limits connections to a particular host; so I could say for instance that my webserver should never have more then 50,000 sessions or a connection rate of more then 250/s. In that same policy however I could say that no one source-address would be able to have more then 15/s for the connection rate or 20 sessions.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Really depends on how far you want to go and what you need to actually protect on your network. Some may want to only have a ZoneProfile because they don't host anything major, others would want to use DoS Policies to limit connections to any one particular service/host. If you have anything publically accessable past a simple exchange server, I highly recommend spending the time to setup DoS profiles.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 15:12:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-to-use-zoneprofile-and-dos-profile/m-p/233706#M66989</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-10-03T15:12:46Z</dc:date>
    </item>
    <item>
      <title>Re: When to use ZoneProfile and DoS Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-to-use-zoneprofile-and-dos-profile/m-p/233720#M66999</link>
      <description>&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 16:38:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-to-use-zoneprofile-and-dos-profile/m-p/233720#M66999</guid>
      <dc:creator>KumarRamalinga</dc:creator>
      <dc:date>2018-10-03T16:38:14Z</dc:date>
    </item>
    <item>
      <title>Re: When to use ZoneProfile and DoS Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-to-use-zoneprofile-and-dos-profile/m-p/233737#M67010</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;Can you show an example policy for setting this up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;50,000 sessions or a connection rate of more then 250/s. In that same policy however I could say that no one source-address would be able to have more then 15/s for the connection rate or 20 sessions. "&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 18:04:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-to-use-zoneprofile-and-dos-profile/m-p/233737#M67010</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2018-10-03T18:04:29Z</dc:date>
    </item>
  </channel>
</rss>

