<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Overloading 5020 with 9.0.x in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306213#M79567</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/62286"&gt;@Alex_Samad&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;So nothing on-site (Exchange/PostFix) is actually sending the emails, you are sending to an external service? If that's the case then you're right, you can't rate limit the send-out outside of notifying users that they can't send that many messages at once. If you were hosting your own email server rate-limiting on the server side is a common and dead-simple process.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for your assumption that Threat Prevention is actively scanning the email and attached PDF; yes, that's exactly how it's supposed to work. Unlike WildFire, Threat Prevention doesn't care that the file hash has already been checked because it doesn't take hash values into account at all. Threat Prevention scans each of the PDFs through its signatures and ensures that the content doesn't violate anything each time. To the best of my knowledge there isn't a way to dynamically disable threat-prevention because your CPU is pegged.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 09 Jan 2020 22:30:50 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2020-01-09T22:30:50Z</dc:date>
    <item>
      <title>Overloading 5220 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306118#M79547</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I update my firmware from 8.1.10 to 9.0.5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;now I can bring my 5220 to its knees with my mailist run&lt;/P&gt;&lt;P&gt;So email consist of pdf attachment - approxy 3M.&amp;nbsp; but about 4K emails all around the same time&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This wasn't a problem before on the 8.1.10 .. but on 9.0.5 cpu hits 100% and my latency through the box goes from &amp;lt;1ms to 2-3s+ which makes things crash &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have put in a rule for my maillist server to no longer be content checked, but, I don't want to allow that for all email, I wouldn't mind ratelimiting it from the PA side of things, else somebody could crash my network by sending lots of email with large attachments to me !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can I ratelimit 1 app or how can i get back to the same behaviour I had under 8.1.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NOTE - sory original put in 5020 - fat finger mistake - 5220&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2020 18:58:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306118#M79547</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2020-01-10T18:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5020 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306184#M79562</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/62286"&gt;@Alex_Samad&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Whatever actually sends your email should be able to ratelimit the send rate no? If for some reason you&amp;nbsp;&lt;EM&gt;need&amp;nbsp;&lt;/EM&gt;to do this on the firewall itself, you could essentially rate limit the connection by setting up a DoS Protection rule for the traffic and simply allow that to act as a rate-limiter. Whatever is sending the emails&amp;nbsp;&lt;EM&gt;should&lt;/EM&gt; continue to send the messages until they are all sent.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 19:31:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306184#M79562</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-01-09T19:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5020 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306204#M79565</link>
      <description>&lt;P&gt;Well no.. you should ask your users to protect yourself . the PA should be able to protect itself.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Plus I am not sure what level to rate limit to. is it the size of attachment or ???. So basically if you do smpt content checking you are leaving yourself open to DDOS. I noticed when i hit 100%, all of my BGP and OSPF connections went down - why BFD&lt;/P&gt;&lt;P&gt;Latency went from &amp;lt;1ms to 3s+&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will spell out the situation a bit better (have to so I can send to SE and support).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The event&amp;nbsp;&lt;/P&gt;&lt;P&gt;Symptons&lt;/P&gt;&lt;P&gt;- 100% cpu usage&lt;/P&gt;&lt;P&gt;- BFD failure&lt;/P&gt;&lt;P&gt;- Latency &amp;gt; 3000ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe the later 2 are a result of the 1st symptom.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The environment 2x 5020 in A/P cluster&amp;nbsp; with 9.0.5. Note 8.1.10 handled this fine. so and I am not sure what change in 9.0 is causing this ! I use 3 x 40G LACP as the main trunk, with 2x10 LACP for ISP connectivity - on 1G lines.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What causes this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;SMTP traffic. 4000+ emails sent as fast as possible.&lt;/P&gt;&lt;P&gt;The emails are plain text with a 3M PDF.&amp;nbsp; The exact same PDF&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I think is happening is the PA is looking at each PDF and checking it.&lt;/P&gt;&lt;P&gt;I am guessing this is the extra content / APP ID stuff they are talking about.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But it doesn't seem to be very clear, recheck the same PDF 4k+ times seems a bit silly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do you protect yourself from this.&amp;nbsp; Seems like the protection / content checking is not limited.&amp;nbsp; If I could say only use 70% for this and just slow down that traffic that would be awesome&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even if I could rate limit the SMTP traffic - what do I ratelimit it to how do you work out how long the virus .. etc checking is going to take.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For now I have turned off contect checking - we will see this arvo if that is the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 22:11:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306204#M79565</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2020-01-09T22:11:02Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5020 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306213#M79567</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/62286"&gt;@Alex_Samad&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;So nothing on-site (Exchange/PostFix) is actually sending the emails, you are sending to an external service? If that's the case then you're right, you can't rate limit the send-out outside of notifying users that they can't send that many messages at once. If you were hosting your own email server rate-limiting on the server side is a common and dead-simple process.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for your assumption that Threat Prevention is actively scanning the email and attached PDF; yes, that's exactly how it's supposed to work. Unlike WildFire, Threat Prevention doesn't care that the file hash has already been checked because it doesn't take hash values into account at all. Threat Prevention scans each of the PDFs through its signatures and ensures that the content doesn't violate anything each time. To the best of my knowledge there isn't a way to dynamically disable threat-prevention because your CPU is pegged.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 22:30:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306213#M79567</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-01-09T22:30:50Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5020 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306217#M79569</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No.. thats an assumption &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for this event, my prod servers in my network send emails. But this is my edge SMTP server so internet connections potentialy come to this. I don't believe asking the dev guys to rate limit is the right response I have to trust somebody else to protect the firewall .. no no.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;THats not good. you can bring a PA to its knees by sending this through.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know what is different in 8.1.x and 9.0.x because i didn't have this issue before with 8.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 22:48:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306217#M79569</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2020-01-09T22:48:17Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5020 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306220#M79571</link>
      <description>&lt;P&gt;What would you recommend as a good protection profile&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have&amp;nbsp;&lt;/P&gt;&lt;P&gt;anitvirus&lt;/P&gt;&lt;P&gt;anti spy ware&lt;/P&gt;&lt;P&gt;vulnerability protect&lt;/P&gt;&lt;P&gt;URL filter&lt;/P&gt;&lt;P&gt;Wildfire&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 23:04:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306220#M79571</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2020-01-09T23:04:48Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5020 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306225#M79572</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/62286"&gt;@Alex_Samad&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;So&amp;nbsp;&lt;EM&gt;sending&lt;/EM&gt; this many messages is something you rate limit through your email servers so you don't surpass your networks (specifically the firewall in this case) capability. Regardless of the fact that 9.0 presented the issue, you now know that sending that much data at once is limiting the performance of the rest of your network. That means you find some way to limit that traffic to an amount that your network can actively handle; that could be limiting it on your prod servers or on your Edge servers. That's pretty much the only way you can fix it currently short of disabling content inspection on that traffic, which is something you've already stated you don't want to do. A DoS policy on the firewall can act as a rate-limit from your prod email servers sending messages to the edge server, but since you have control over the servers themselves that isn't necessary.&lt;/P&gt;&lt;P&gt;Keep in mind that you may be sending 4k emails at the same time, but depending on how the security rules between your zones are configured the firewall is analyzing each message twice. Once when it transfers from your prod servers to the edge SMTP server, and again when your edge SMTP server sends the message outside. Potentially you could limit the amount of content inspection by only inspecting the traffic once?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as&amp;nbsp;&lt;EM&gt;receiving&lt;/EM&gt;&amp;nbsp;this many messages and it causing stress through your firewall, this is&amp;nbsp;exactly what Denial of Service profiles and Denial of Service Prevention rules are designed to protect against; you should have any public service you have exposed already configured with one (Many people don't use this feature, that's a big mistake). SMTP is one of the best services in regards to DoS, because if you drop the connection the other end will simply attempt to send the message again.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;Do you know what is different in 8.1.x and 9.0.x because i didn't have this issue before with 8.1&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;This actually could be a lot of things. 9.0 itself adjusts some of the content inspection process, but you would also get access to a bunch of new signatures that otherwise wouldn't be getting analyzed because they wouldn't have been active until you upgraded to 9.0. You'll need to work with TAC so that they have access to all of the appropriate logs and PCAPs to see whats actually happening here.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 23:26:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306225#M79572</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-01-09T23:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5020 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306228#M79574</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So again - i think you are fixing symptoms. When its the problem that should be fixed. The fact that an unknown amount of emails or threat detection can cause the CPU to hit 100% is bad, especially as you can't cap how much cpu threat protection can utilise. &amp;lt;&amp;lt; This by its self it very bad design I think.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would presume there is a pipe line to process this - there should be a way to limit it and this would in effect limit SMTP traffic through put.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yuo talk about DOS profile, what am I going to profile. SMTP can be multi email per TCP connectoin - so can't do it by SYN packets.&amp;nbsp; Can you do it by size - no you can't tell if its one TCP connection weather is a big email or lots of little emails. Maybe you can expand on thise - happy to do something - but I am not sure&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm happy that its only getting checked once - did a quick check fairly happy &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I have tried TAC, its been a bit slow there so I thought I would raise it here as well (also recommended by my SE)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So&amp;nbsp;&lt;/P&gt;&lt;P&gt;* Don't want to rate limit my prod mailing list .. I have added a rule to allow it through without checking (tick)&lt;/P&gt;&lt;P&gt;* I don't check my outbound SMPT (me to the internet) - Turned this off&amp;nbsp; - don't want to check and I can't allow the prod mail through and check the other with this test. as its the main SMTP servers out. - I can live with this for now&lt;/P&gt;&lt;P&gt;* rest of my internal network to SMPT - &amp;gt; I want to check this - stop virus etc .. but if somebody starts to spam the PA it will bring it to its knees &amp;lt;&amp;lt;&amp;lt; this I need help on (I can probably ratelimit at the postfix level.&lt;/P&gt;&lt;P&gt;* Internet inbound to me.. I'm okay with this I only allow specific servers to me so I'm happy and I can ratelimit it at the postfix level&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TO DO is the smtp checking of internal source addressed email which are not from the prod servers&lt;/P&gt;&lt;P&gt;How to do on the PA - how to self protect.&lt;/P&gt;&lt;P&gt;Zone protection .. based on SYN packets and connection rate .. thats not going to work as pointed out above . what values ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;QOS .. nope , my main trunc is a LACP trunk with all of the vlans off there and from memory that doesn't work the way I want to. plus I only want to rate limit my SMTP..&amp;nbsp; I could create a new interface just for my DMZ - maybe i should and apply ratelimiting there ..&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking at the interface though its by class of traffic .....&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DOS protection profile .. again syn packets... if the 4k come over 10 long lives TCP connections - not going to help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is not much i can do to self protect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On my arista switches I can rate limit events that go to the CPU .. so to translate i can say .. threat prevention - is allowed to have max 80% of cpu &amp;lt;&amp;lt; this would be a nice feature - this i see as self protection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will look at postfix - if you can help me with the DOS protection profile incase I have missed anything !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2020 00:31:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306228#M79574</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2020-01-10T00:31:58Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5020 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306232#M79575</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/62286"&gt;@Alex_Samad&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I agree the problem should be fixed, and to do so you need insight into what exactly is going on. To enable that level of logging, you need to work with TAC and get past level 1 so they actually know what debug logging needs to be enabled. I should have made it more clear in my earlier posts, I am only looking to deal with the symptoms of the problem; the only people who can get the logs needed to fix the core issue is TAC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;Yuo talk about DOS profile, what am I going to profile. SMTP can be multi email per TCP connectoin - so can't do it by SYN packets.&amp;nbsp; Can you do it by size - no you can't tell if its one TCP connection weather is a big email or lots of little emails. Maybe you can expand on thise - happy to do something - but I am not sure&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;You can limit both tcp-syn and set a session max-concurrent-limit and rate-limit connections to a very appropriate level. I think you're thinking too much of what someone&amp;nbsp;&lt;EM&gt;could&amp;nbsp;&lt;/EM&gt;do to bypass your limits and what the vast majority of attacks&amp;nbsp;&lt;EM&gt;will&amp;nbsp;&lt;/EM&gt;do. If I knew your host I could overflow your systems if I wanted to, end of story no way you can defend against it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;QOS .. nope , my main trunc is a LACP trunk with all of the vlans off there and from memory that doesn't work the way I want to. plus I only want to rate limit my SMTP..&amp;nbsp; I could create a new interface just for my DMZ - maybe i should and apply ratelimiting there ..&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;Looking at the interface though its by class of traffic .....&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;Take a more detailed look at QoS configuration on the firewall, you can leave everything assigned to 3 (default) and assign just SMTP traffic a different class and set max as necessary.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2020 03:16:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306232#M79575</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-01-10T03:16:37Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5020 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306237#M79576</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, some thing that probably needs to be addressed some how.&lt;/P&gt;&lt;P&gt;TAC - yep waiting on them ... 3 days so far.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You can limit both tcp-syn and set a session max-concurrent-limit and rate-limit connections to a very appropriate level. I think you're thinking too much of what someone&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;could&amp;nbsp;&lt;/EM&gt;&lt;SPAN&gt;do to bypass your limits and what the vast majority of attacks&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;will&amp;nbsp;&lt;/EM&gt;&lt;SPAN&gt;do. If I knew your host I could overflow your systems if I wanted to, end of story no way you can defend against it.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have to disagree, because you don't know the characteristic of what is going to set off the 100% cpu usage.&amp;nbsp; You can't cound SYN / Connections / Session as SMTP allow for multiple message to be sent over 1 TCP session.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Size .. how can you tell if it 4k of 1k mailes or 1k of 4k emails with attachments .. so if you do it by size then you are going to kill valild connections.&lt;BR /&gt;&lt;BR /&gt;So let me correct / expand on this. I could set it to say limit to 5 connections (concurrent) and 1.2 * max attachment size. This would / should make sure I don't run into CPU issues. But then I am not getting the most out of my system.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2020 04:04:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306237#M79576</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2020-01-10T04:04:03Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5020 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306278#M79590</link>
      <description>&lt;P&gt;May I ask how you managed to update a PA 5020 to PAN-OS 9.0?&lt;/P&gt;&lt;P&gt;We were told PAN-OS 9.0 is not supported on PA 5000 series.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2020 13:46:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306278#M79590</guid>
      <dc:creator>Anon1</dc:creator>
      <dc:date>2020-01-10T13:46:29Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5020 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306318#M79599</link>
      <description>&lt;P&gt;apologies 5220&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2020 18:57:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306318#M79599</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2020-01-10T18:57:35Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5020 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306320#M79600</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/62286"&gt;@Alex_Samad&lt;/a&gt;&amp;nbsp;don't get me wrong because of this question but as this somehow seems like a bug of 9.0, what about a downgrade to 8.1? Or did you upgrade to 9.0 because of a new feature that you need?&lt;/P&gt;&lt;P&gt;I agree with you that the firewall should not reach 100% cpu usage because of such a connection, but I mean also a 5220 has it's limit an when this is reached - I know this is not the situation you have - you have to enable some protections - as described by &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;- on the surounding systems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;And the this of course this does not help you either, but do nut upgrade to a new major version prior to x.y.7 (or better x.y.8)&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2020 19:32:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306320#M79600</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2020-01-10T19:32:55Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5020 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306356#M79607</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure if its a bug.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why the move to 9.0&amp;nbsp; . thats the PA recommendation&lt;/P&gt;&lt;P&gt;Why 9.0.5 Thats the recomemnded release&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would hope that PA wouldn't recommend things that don't work !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The protection should be, in my opinion, that you can apply caps to CPU limits for type or process on the PA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Threat prevention shouldn't take up 100% over and above packet routing .. which is what happened.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes you can try and limit traffic / data to / through the PA but that is fraught with danger - again don't fix the symptoms fix the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any way I am happy - sort of - with my change - I have remove content checking ... I would like it on but I can live with out it for now&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Jan 2020 02:11:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/306356#M79607</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2020-01-11T02:11:48Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5220 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/308184#M79981</link>
      <description>&lt;P&gt;So ran into this problem again . but on my PA850 - much smaller PA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So users connecting to file server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Normally the PA's id's traffic as ms-ds-smbv3 no problem it doesn't get checked so no issue.&lt;/P&gt;&lt;P&gt;But the last one that went through was ID'ed as rss. not sure how that worked and it ifs under my catch all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It was 27G session&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so it tanked my CPU - stoped OSPF deamon replying to hello's.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;basically killed the Firewall and brought down the network in the office&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To me this is a Bug - rather big one ... not being able to limit the amount of cpu time that is allocated to threat protection&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2020 02:46:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/308184#M79981</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2020-01-28T02:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5220 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/308400#M80008</link>
      <description>&lt;P&gt;&lt;SPAN&gt;In your case, Packet Buffer Protection (PBP) should work, and it will protect your OSPF connections. I had many cases under high CPU spikes, and Zone Protection &amp;amp; DoS Protection didn't really help in my cases (probably, in your case as well.)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;My engineering generates aggressive traffic sometimes, and it easily spikes up high CPU on the firewall. It's impossible to control or rate limit it because they use this protocol today, but later they may use other protocols or applications.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Even if your case is a bug, you can only delay the situation by upgrading the PAN-OS. The high CPU event could be happening later by other protocols or applications.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm happy with the PBP solution since I applied it. Because it protects the firewall and never reaches 100% CPU usage.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Here is the link for PBP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/zone-protection-and-dos-protection/zone-defense/packet-buffer-protection" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/zone-protection-and-dos-protection/zone-defense/packet-buffer-protection&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2020 00:04:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/308400#M80008</guid>
      <dc:creator>AnalysisMan</dc:creator>
      <dc:date>2020-01-29T00:04:19Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5220 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/308416#M80011</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;my only problem with all of these protections is are they are based upon number of connections or number of byte or flow rate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thinks that don't corrolate to threat detection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I still think the best thing is to say threat protection can only use 80% of cpu ....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;from what I read about PBP&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When packet buffer consumption reaches the configured&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;Activate&lt;/DIV&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;percentage&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;works on the amount of traffic coming in - which might not relate to the amount of work threat protection has to do !&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2020 03:04:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/308416#M80011</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2020-01-29T03:04:33Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5020 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/308465#M80018</link>
      <description>&lt;P&gt;Is it the dataplane CPU usage that is100%? We had to downgrade our 5220 firewall cluster from 9.0.4 to 8.1.11 a couple of months ago because the packet buffer filled up 100% with our normal traffic, something that was not a problem in 8.1.x.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2020 11:29:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/308465#M80018</guid>
      <dc:creator>TerjeLundbo</dc:creator>
      <dc:date>2020-01-29T11:29:58Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5020 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/308473#M80021</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thats very interesting. So ... forgive me I might use the wrong words.&amp;nbsp; But I believe the CPU was at 100% across all the cpu - left no head room to process any packets for other things like OSPF heartbeats or BFD . etc etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe support said this was a 9.0.x thing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So we had 4k emails ... some some text and a PDF . that would send out at the end of day.&amp;nbsp; not a problem with 8.1.x or 8.0.x&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But 9.0.x shat itself.&amp;nbsp; so I took emails of the threat protection path .. I think thats silly. but I have no way to mitigate the problem with out rate limiting down to almost 0..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2020 11:52:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/308473#M80021</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2020-01-29T11:52:33Z</dc:date>
    </item>
    <item>
      <title>Re: Overloading 5020 with 9.0.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/308766#M80083</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/53120"&gt;@TerjeLundbo&lt;/a&gt;&amp;nbsp;was that a recommendation from PA support to go back ???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thinking thats a pretty big step to make that much difference&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2020 19:58:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/overloading-5220-with-9-0-x/m-p/308766#M80083</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2020-01-30T19:58:42Z</dc:date>
    </item>
  </channel>
</rss>

