<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Avoid Attack from outise in PA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272721#M74948</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;already mentioned, Zone Protection and DoS Policies aren't something that can simply be enabled with default values and function correctly.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have anything in front of the Firewall that can actually drop traffic, such as a router? If so, you could either start null routing traffic you identify with the firewall logs until you reach substainable levels or create a signature to drop the traffic directly on the router so your firewall can continue to function properly. Outside of that there isn't a quick fix that will really work.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 24 Jun 2019 18:37:39 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2019-06-24T18:37:39Z</dc:date>
    <item>
      <title>Avoid Attack from outise in PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272558#M74930</link>
      <description>&lt;P&gt;HI,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are having attacks from outside to DMZ. Many diffrents ips are attacking our public range. These attacks are causing packet buffer 100% and CPU 100%, doing an outage in our network. So in traffic logs we can see all sesiones being denied for policy deny. Is there any way to avoid that FW proccess these sessions and not increasing CPU?? what actions can be taken in FW?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2019 09:57:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272558#M74930</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2019-06-24T09:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: Avoid Attack from outise in PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272623#M74932</link>
      <description>&lt;P&gt;Zone Protection profile and DoS Protection.&amp;nbsp; Any details on the type of traffic?&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/zone-protection-and-dos-protection/zone-defense.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/zone-protection-and-dos-protection/zone-defense.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2019 13:48:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272623#M74932</guid>
      <dc:creator>JulioMancia</dc:creator>
      <dc:date>2019-06-24T13:48:53Z</dc:date>
    </item>
    <item>
      <title>Re: Avoid Attack from outise in PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272631#M74933</link>
      <description>&lt;P&gt;Yes, i enabled but i think with the default paramethers is not helping a lot.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I attach a screenshot where you can see the sessions. Many sessions from differents ipsin the same second.The most of sessions are using the ports 744 and 736.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any idea for not proccessing these sessions? to avoid impact in CPU&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="policydeny.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20486iDC29C282B93525DB/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="policydeny.jpg" alt="policydeny.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2019 14:18:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272631#M74933</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2019-06-24T14:18:30Z</dc:date>
    </item>
    <item>
      <title>Re: Avoid Attack from outise in PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272671#M74938</link>
      <description>&lt;P&gt;I cannot think of anything else to do but to shut down the interface until the attack is over. Let me know if you find an answer as it is an interesting topic. Sorry I cannot help more. If attack is not intended directly to you then it should not last too long. Good luck.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2019 15:18:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272671#M74938</guid>
      <dc:creator>lestrada</dc:creator>
      <dc:date>2019-06-24T15:18:01Z</dc:date>
    </item>
    <item>
      <title>Re: Avoid Attack from outise in PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272675#M74942</link>
      <description>&lt;P&gt;Which appliance do you have?&amp;nbsp;&amp;nbsp; What is the normal dp load on the firewall while it is not under attack?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You may want to not logging those policy-deny, because it is consuming CPU..&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2019 15:31:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272675#M74942</guid>
      <dc:creator>workarounds</dc:creator>
      <dc:date>2019-06-24T15:31:58Z</dc:date>
    </item>
    <item>
      <title>Re: Avoid Attack from outise in PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272688#M74943</link>
      <description>&lt;P&gt;PA 3050- normal DP is around 8-10%&lt;/P&gt;&lt;P&gt;sessions count 84564/543435&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2019 15:57:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272688#M74943</guid>
      <dc:creator>lestrada</dc:creator>
      <dc:date>2019-06-24T15:57:37Z</dc:date>
    </item>
    <item>
      <title>Re: Avoid Attack from outise in PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272696#M74945</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;You have to tune the Zone Protection and DoS protection limits to your environment. I started by using the default values then halving then and waiting until I found a number that was comfortable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry there is not a more specific answer. But dropping the traffic at the Zone Protection profile will utilize the least amount of CPU. Also if its from the same IP's over and over you can just put in a block policy at the top and let it drop the traffic that way or contact your ISP and have them block them for you?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also enable the External Dynamic Lists and have them drop the traffic. If its detected as a vulnerability, anti-spyware, or even Zone Protection, you can block the IP for up to an Hour automatically.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Might be worth a look.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2019 16:43:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272696#M74945</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-06-24T16:43:47Z</dc:date>
    </item>
    <item>
      <title>Re: Avoid Attack from outise in PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272721#M74948</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;already mentioned, Zone Protection and DoS Policies aren't something that can simply be enabled with default values and function correctly.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have anything in front of the Firewall that can actually drop traffic, such as a router? If so, you could either start null routing traffic you identify with the firewall logs until you reach substainable levels or create a signature to drop the traffic directly on the router so your firewall can continue to function properly. Outside of that there isn't a quick fix that will really work.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2019 18:37:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272721#M74948</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-06-24T18:37:39Z</dc:date>
    </item>
    <item>
      <title>Re: Avoid Attack from outise in PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272777#M74950</link>
      <description>&lt;P&gt;Perhaps a suggestion to slow/limit may be to take a look at a document I created&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/General-Topics/Using-the-Log-Forwarding-Built-In-Actions-to-create-Dynamic/td-p/267612" target="_blank"&gt;https://live.paloaltonetworks.com/t5/General-Topics/Using-the-Log-Forwarding-Built-In-Actions-to-create-Dynamic/td-p/267612&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It uses a Dynamic Address Group, along with a (somewhat simple auto-tagging from the Log Forwarding Profile) to tag "Bad Ppl", so that when this Address Group hits my DoS Policy, they are immediately dropped.&lt;/P&gt;&lt;P&gt;Not a lot of fine tuning required.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2019 20:40:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avoid-attack-from-outise-in-pa/m-p/272777#M74950</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-06-24T20:40:42Z</dc:date>
    </item>
  </channel>
</rss>

