<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability Protection - inbound traffic to DMZ Servers in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-inbound-traffic-to-dmz-servers/m-p/10317#M7589</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;Does the Vulnerability Protection Profile provide any benefit to inbound traffic from the Internet to servers on the DMZ? Is it more for web&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, we do. I think you are referring to "server-side" attacks. You can look for our protection against server attacks by either searching through signatures in "threat name" field on 'custom' vulnerability profile e.g. you can enter 'apache' and it will show you what apache related signatures we have, or to see a list of all server-side signatures, you can filter on host = server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;protection from users going outbound to browse the web and not so much from outside sources accessing servers.&amp;nbsp; For example will the&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are client-side attacks... coverage for these can be found by filtering on host&amp;nbsp; = client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;Vuln Pro signature block a SQL injection attack against a DMZ server or an Apache vuln exploit attempt?&amp;nbsp; Or would it even provide any &amp;gt;protection to the DMZ server for plain HTTP connection attacks?&amp;nbsp; Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For HTTP connection attacks, zone protection profile can be used that limit the number of TCP connections. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you have further questions,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Sandeep &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 21 Oct 2010 23:30:58 GMT</pubDate>
    <dc:creator>migration</dc:creator>
    <dc:date>2010-10-21T23:30:58Z</dc:date>
    <item>
      <title>Vulnerability Protection - inbound traffic to DMZ Servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-inbound-traffic-to-dmz-servers/m-p/10313#M7585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Does the Vulnerability Protection Profile provide any benefit to inbound traffic from the Internet to servers on the DMZ? Is it more for web protection from users going outbound to browse the web and not so much from outside sources accessing servers.&amp;nbsp; For example will the Vuln Pro signature block a SQL injection attack against a DMZ server or an Apache vuln exploit attempt?&amp;nbsp; Or would it even provide any protection to the DMZ server for plain HTTP connection attacks?&amp;nbsp; Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Oct 2010 14:58:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-inbound-traffic-to-dmz-servers/m-p/10313#M7585</guid>
      <dc:creator>MGoodnow</dc:creator>
      <dc:date>2010-10-19T14:58:32Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Protection - inbound traffic to DMZ Servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-inbound-traffic-to-dmz-servers/m-p/10314#M7586</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Zone protection is mostly for setting traffic limits and thresholds.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Syn flood:&lt;/P&gt;&lt;P&gt;Alert threshold&amp;nbsp; =&amp;nbsp; X Packets Per Second&lt;/P&gt;&lt;P&gt;Activate threshold = PPS&lt;/P&gt;&lt;P&gt;Action =&amp;nbsp; Random drop or SYN Cookie&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP flood&lt;/P&gt;&lt;P&gt;Alert Threshod = PPS&lt;/P&gt;&lt;P&gt;Activate threshold = PPS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;UDP and Other IP flood, same as ICMP flood.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It also allows Port scan and IP scan thresholds to stop dropping packets after X scans in Y seconds.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Zone protection does not detect coss site scripting or SQL injection or any HTTP based attacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve Krall&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Oct 2010 00:26:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-inbound-traffic-to-dmz-servers/m-p/10314#M7586</guid>
      <dc:creator>pantac</dc:creator>
      <dc:date>2010-10-21T00:26:19Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Protection - inbound traffic to DMZ Servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-inbound-traffic-to-dmz-servers/m-p/10315#M7587</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm actually refering to applying a Vulnerability Protection Profile to say inbound http/https traffic to a server on the DMZ.&amp;nbsp; Not Zone Protection.&amp;nbsp; Similiar to how we setup a Profile for outbound web browsing.&amp;nbsp; Would that inbound Profile offer any protection inbound to our DMZ server from becoming comprimised? Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Oct 2010 13:03:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-inbound-traffic-to-dmz-servers/m-p/10315#M7587</guid>
      <dc:creator>MGoodnow</dc:creator>
      <dc:date>2010-10-21T13:03:44Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Protection - inbound traffic to DMZ Servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-inbound-traffic-to-dmz-servers/m-p/10316#M7588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I apologize for the misunderstanding.&lt;/P&gt;&lt;P&gt;Yes, Adding a vulnerability protection profile to a Security Policy rule that protects a DMZ is a good idea. If you would like to see some of the actual vulnerabilities do the following.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Click the OBJECTS tab&lt;/P&gt;&lt;P&gt;Click VULNERABILITY PROTECTION on the left edge tree.&lt;/P&gt;&lt;P&gt;Click NEW to create a new profile.&lt;/P&gt;&lt;P&gt;Change the "Rule Type" from "Simple"&amp;nbsp; to "custom".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All of the threats have the following fields associated.&lt;/P&gt;&lt;P&gt;- ID (Paloalto threat ID)&lt;/P&gt;&lt;P&gt;- Name&lt;/P&gt;&lt;P&gt;- CVE&amp;nbsp; (CVE-year-4digits)&lt;/P&gt;&lt;P&gt;- Host (client or server)&lt;/P&gt;&lt;P&gt;- Catagory (Overflow, Code-execution, dos, others)&lt;/P&gt;&lt;P&gt;- Severity&amp;nbsp; (low, med, high, critical)&lt;/P&gt;&lt;P&gt;- Action (Alert, reset-client, reset-both)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve Krall&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Oct 2010 18:36:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-inbound-traffic-to-dmz-servers/m-p/10316#M7588</guid>
      <dc:creator>skrall</dc:creator>
      <dc:date>2010-10-21T18:36:33Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Protection - inbound traffic to DMZ Servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-inbound-traffic-to-dmz-servers/m-p/10317#M7589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;Does the Vulnerability Protection Profile provide any benefit to inbound traffic from the Internet to servers on the DMZ? Is it more for web&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, we do. I think you are referring to "server-side" attacks. You can look for our protection against server attacks by either searching through signatures in "threat name" field on 'custom' vulnerability profile e.g. you can enter 'apache' and it will show you what apache related signatures we have, or to see a list of all server-side signatures, you can filter on host = server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;protection from users going outbound to browse the web and not so much from outside sources accessing servers.&amp;nbsp; For example will the&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are client-side attacks... coverage for these can be found by filtering on host&amp;nbsp; = client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;Vuln Pro signature block a SQL injection attack against a DMZ server or an Apache vuln exploit attempt?&amp;nbsp; Or would it even provide any &amp;gt;protection to the DMZ server for plain HTTP connection attacks?&amp;nbsp; Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For HTTP connection attacks, zone protection profile can be used that limit the number of TCP connections. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you have further questions,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Sandeep &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Oct 2010 23:30:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-inbound-traffic-to-dmz-servers/m-p/10317#M7589</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2010-10-21T23:30:58Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Protection - inbound traffic to DMZ Servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-inbound-traffic-to-dmz-servers/m-p/10318#M7590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much for the information.&amp;nbsp; Very helpful and I will put the protection in place.&amp;nbsp; I should of added this to the initial inquiry.&amp;nbsp; How about AV protection? I would assume adding an AV profile to a DMZ server inbound - would provide no additional benefit (based on how AV scanning acts)?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Oct 2010 15:27:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-inbound-traffic-to-dmz-servers/m-p/10318#M7590</guid>
      <dc:creator>MGoodnow</dc:creator>
      <dc:date>2010-10-22T15:27:09Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Protection - inbound traffic to DMZ Servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-inbound-traffic-to-dmz-servers/m-p/10319#M7591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;Thank you very much for the information.&amp;nbsp; Very helpful and I will put the protection in place.&amp;nbsp; I should of added this to the initial inquiry. &amp;gt;How about AV protection? I would assume adding an AV profile to a DMZ server inbound - would provide no additional benefit (based&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It may... if your DMZ servers are allowing file upload or download (e.g., through HTTP, FTP etc.) then having A/V protection would be useful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Sandeep&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;on how AV scanning acts)?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Oct 2010 16:42:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-inbound-traffic-to-dmz-servers/m-p/10319#M7591</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2010-10-22T16:42:32Z</dc:date>
    </item>
  </channel>
</rss>

