<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DOS protection alert test in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/234001#M67075</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;I used the document step by step, creating profiles and then using those profile in DOS policy. Also as the document shows server is behind NAT with DOS policy selected as untrust to untrust. And thanks for reminding me again, yes the activate and maximum values are way past.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show dos-protection rule TEST-DOS settings&lt;/P&gt;&lt;P&gt;Rule: TEST-DOS, idx: 0, id: 4&lt;BR /&gt;Aggregate profile: TEST-DOS-AGG&lt;BR /&gt;Classified profile: TEST-DOS-CLA&lt;BR /&gt;Classification Criteria: source-only&lt;BR /&gt;Action: protect&lt;BR /&gt;Log Forwarding profile: Panorama&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Aggregate profile: TEST-DOS-AGG&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;tcp-syn SYN cookie enabled: yes&lt;BR /&gt;DP alarm rate: 2 cps, activate rate: 40000 cps, maximal rate: 40000 cps&lt;BR /&gt;block duration: 300 sec&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;udp RED enabled: yes&lt;BR /&gt;DP alarm rate: 2 cps, activate rate: 40000 cps, maximal rate: 40000 cps&lt;BR /&gt;block duration: 300 sec&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;icmp RED enabled: yes&lt;BR /&gt;DP alarm rate: 2 cps, activate rate: 40000 cps, maximal rate: 40000 cps&lt;BR /&gt;block duration: 300 sec&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;other-ip RED enabled: yes&lt;BR /&gt;DP alarm rate: 2 cps, activate rate: 40000 cps, maximal rate: 40000 cps&lt;BR /&gt;block duration: 300 sec&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;icmpv6 RED enabled: no&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;session: enabled: yes&lt;BR /&gt;DP limit: 40000&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show dos-protection rule TEST-DOS statistics&lt;/P&gt;&lt;P&gt;Rule: TEST-DOS, idx: 0, id: 4&lt;BR /&gt;Aggregate profile: TEST-DOS-AGG&lt;BR /&gt;Classified profile: TEST-DOS-CLA&lt;BR /&gt;Classification Criteria: source-only&lt;BR /&gt;Action: protect&lt;BR /&gt;Log Forwarding profile: Panorama&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Aggregate profile: TEST-DOS-AGG&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;tcp-syn&lt;BR /&gt;current: 3, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;udp&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;icmp&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;other-ip&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;icmpv6&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;sessions&lt;BR /&gt;current: 331, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Classified profile: TEST-DOS-CLA&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;tcp-syn&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;udp&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;icmp&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;other-ip&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;icmpv6&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;sessions&lt;BR /&gt;current: 331, dropped: 0&lt;BR /&gt;ip tracked: 470, ip blocked: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;/P&gt;</description>
    <pubDate>Thu, 04 Oct 2018 19:44:55 GMT</pubDate>
    <dc:creator>raji_toor</dc:creator>
    <dc:date>2018-10-04T19:44:55Z</dc:date>
    <item>
      <title>DOS protection alert test</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/233973#M67070</link>
      <description>&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClL3CAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClL3CAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using the above linked KB to create DOS profile and policy for a particular server, but i have not changed the defaults as i donot want it start actioning on it right away. I have set the alarm rate to 1 and 2 connections per second for classified and aggregate profiles. Although this is a busy server i donot see any alerts.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Oct 2018 17:47:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/233973#M67070</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2018-10-04T17:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection alert test</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/233986#M67073</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;That article is only going into how to build out the profile. You need to build this into a DoS Protection Policy so that it actually works. Look under the 'Policies' &amp;gt; 'DoS Protection' on the GUI and build out the policy there.&amp;nbsp;&lt;/P&gt;&lt;P&gt;FYI, make sure you've set your 'activate' and 'maximum' values&amp;nbsp;&lt;STRONG&gt;way&lt;/STRONG&gt; past what you would ever expect them to be if you don't want this to do anything for the traffic, esspecially if you've created aggregate profiles instead of Classified.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Oct 2018 18:52:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/233986#M67073</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-10-04T18:52:34Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection alert test</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/234001#M67075</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;I used the document step by step, creating profiles and then using those profile in DOS policy. Also as the document shows server is behind NAT with DOS policy selected as untrust to untrust. And thanks for reminding me again, yes the activate and maximum values are way past.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show dos-protection rule TEST-DOS settings&lt;/P&gt;&lt;P&gt;Rule: TEST-DOS, idx: 0, id: 4&lt;BR /&gt;Aggregate profile: TEST-DOS-AGG&lt;BR /&gt;Classified profile: TEST-DOS-CLA&lt;BR /&gt;Classification Criteria: source-only&lt;BR /&gt;Action: protect&lt;BR /&gt;Log Forwarding profile: Panorama&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Aggregate profile: TEST-DOS-AGG&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;tcp-syn SYN cookie enabled: yes&lt;BR /&gt;DP alarm rate: 2 cps, activate rate: 40000 cps, maximal rate: 40000 cps&lt;BR /&gt;block duration: 300 sec&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;udp RED enabled: yes&lt;BR /&gt;DP alarm rate: 2 cps, activate rate: 40000 cps, maximal rate: 40000 cps&lt;BR /&gt;block duration: 300 sec&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;icmp RED enabled: yes&lt;BR /&gt;DP alarm rate: 2 cps, activate rate: 40000 cps, maximal rate: 40000 cps&lt;BR /&gt;block duration: 300 sec&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;other-ip RED enabled: yes&lt;BR /&gt;DP alarm rate: 2 cps, activate rate: 40000 cps, maximal rate: 40000 cps&lt;BR /&gt;block duration: 300 sec&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;icmpv6 RED enabled: no&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;session: enabled: yes&lt;BR /&gt;DP limit: 40000&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show dos-protection rule TEST-DOS statistics&lt;/P&gt;&lt;P&gt;Rule: TEST-DOS, idx: 0, id: 4&lt;BR /&gt;Aggregate profile: TEST-DOS-AGG&lt;BR /&gt;Classified profile: TEST-DOS-CLA&lt;BR /&gt;Classification Criteria: source-only&lt;BR /&gt;Action: protect&lt;BR /&gt;Log Forwarding profile: Panorama&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Aggregate profile: TEST-DOS-AGG&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;tcp-syn&lt;BR /&gt;current: 3, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;udp&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;icmp&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;other-ip&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;icmpv6&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;sessions&lt;BR /&gt;current: 331, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Classified profile: TEST-DOS-CLA&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;tcp-syn&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;udp&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;icmp&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;other-ip&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;icmpv6&lt;BR /&gt;current: 0, dropped: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;BR /&gt;sessions&lt;BR /&gt;current: 331, dropped: 0&lt;BR /&gt;ip tracked: 470, ip blocked: 0&lt;BR /&gt;------------------------------------------------------------------------------------------&lt;/P&gt;</description>
      <pubDate>Thu, 04 Oct 2018 19:44:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/234001#M67075</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2018-10-04T19:44:55Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection alert test</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/234007#M67077</link>
      <description>&lt;P&gt;I was looking at wrong place. I was searching for server IP as destination in threat logs, but instead it shows up as&amp;nbsp;TCP Flood with source and destination both as 0.0.0.0.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How would i tell from these logs, which one of our servers are being targeted.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Oct 2018 20:32:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/234007#M67077</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2018-10-04T20:32:51Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection alert test</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/234029#M67081</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;By the name of the policy. The logs that get generated don't offer much additional information you could use to identify which servers are actively being targeted.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Oct 2018 21:32:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/234029#M67081</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-10-04T21:32:53Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection alert test</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/234129#M67121</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;Any thoughts on how would&amp;nbsp;that be achieved.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Oct 2018 16:23:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/234129#M67121</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2018-10-05T16:23:32Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection alert test</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/234138#M67123</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If you go into the log details under 'General' you'll see the actual rule that was triggered. If you setup a forwarding for these logs to say your email, it will also include this information.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Oct 2018 16:47:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/234138#M67123</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-10-05T16:47:11Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection alert test</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/234146#M67127</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;Yes i get that the rule name will help in identifying what server is being targeted. But that also means i have to create a separate DOS rule for each of our servers.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Oct 2018 17:06:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/234146#M67127</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2018-10-05T17:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: DOS protection alert test</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/234149#M67130</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Well...ya...but wouldn't you want to as no one service will baseline the same as another. For instance I break ours out to the service level and then set classified profiles to utilize source and destination IP. I don't necissarly care what individual server is being hit, I care that the service itself has bypassed norms.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So for example I might have a DoS profile for any publically available service, so 'Mail' 'Docs' 'MapServices', 'WiseDecade' and the like would all get their own individual DoS policy. If you break it up on the service level you don't necissarly need to do one for each server, just each public service.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Oct 2018 17:11:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dos-protection-alert-test/m-p/234149#M67130</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-10-05T17:11:05Z</dc:date>
    </item>
  </channel>
</rss>

