<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using the Log Forwarding Built-In Actions to create Dynamic Address Gro in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/using-the-log-forwarding-built-in-actions-to-create-dynamic/m-p/353166#M87296</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Very good post Steve!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, the end goal of this is to "drop" packets by a DoS Policy, instead the Security Policy, isn't?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I understand that "tagged" IP sources within the DAG have been already blocked once by the your Security Policy, right ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Very good stuff so far... I'm planning to use DAG associated with sinkhole DNS mechanism to block dynamically infected inside host.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks !&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dominic.&lt;/P&gt;</description>
    <pubDate>Thu, 01 Oct 2020 02:08:28 GMT</pubDate>
    <dc:creator>DLONGPRÉ</dc:creator>
    <dc:date>2020-10-01T02:08:28Z</dc:date>
    <item>
      <title>Using the Log Forwarding Built-In Actions to create Dynamic Address Group to Slow down Attackers.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-the-log-forwarding-built-in-actions-to-create-dynamic/m-p/267612#M74482</link>
      <description>&lt;P&gt;Howdy Group&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;There is configuration area within the Log Fowarding Profile that is powerful to slow down the baddies.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I am not sure how many people are using it.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The premise is&lt;/P&gt;&lt;P&gt;1) I am using an EDL from Spamhaus to dynamically deny access to the public IPs of my NAT'd network.&lt;/P&gt;&lt;P&gt;2) I have a rule that denies Foreign Countries (US based FW) from attempting to access my hardware.&lt;/P&gt;&lt;P&gt;3) I have very good use of rules, so any source address from Internet that does not match, hits my clean up rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Presently, I have logs that show X amount of hits on my Spammers, No Foreign Countries, or CleanUp rules.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know these IPs/users are in constant vigil, trying to access my system(s), port scan, whatever they try is all bad.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have thought for a long time, about trying to the use the Log Forwarding Profile, to fwd to a http server, to create an EDL.&lt;/P&gt;&lt;P&gt;Then my newly created "Bad EDL" would stop people.&amp;nbsp; Never got that far.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;But I found (for me) a much easier way.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Is it advanced??&amp;nbsp; Maybe, but I wanted to share out and get comments/thoughts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have 3 rules (&lt;STRONG&gt;Spammers, No Foreign Countries, CleanUp&lt;/STRONG&gt;) that I started with logging at session end (for testing)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;create a TAG called "&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#800080"&gt;Bad US and Foreign ppl&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;", and used &lt;FONT color="#800080"&gt;&lt;STRONG&gt;purple&lt;/STRONG&gt;&lt;/FONT&gt; for the tag color.&lt;/P&gt;&lt;P&gt;create a Dynamic Address Group (called &lt;EM&gt;&lt;STRONG&gt;All Bad Ppl&lt;/STRONG&gt;&lt;/EM&gt;), and use the &lt;FONT color="#800080"&gt;tag&lt;/FONT&gt; just created, to populate the address group.&lt;/P&gt;&lt;P&gt;create a Log Fwd Profile, (called &lt;STRONG&gt;&lt;FONT color="#0000FF"&gt;S&lt;EM&gt;top Bad Ppl&lt;/EM&gt;&lt;/FONT&gt;&lt;/STRONG&gt;), looking at the Traffic Log,&amp;nbsp;but otherwise unconfigured Log Fwding Profile&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the 3 rules I have listed, I modified the security policies to use a Log Fwd Profile, called&amp;nbsp;&lt;STRONG&gt;&lt;FONT color="#0000FF"&gt;S&lt;EM&gt;top Bad Ppl&lt;/EM&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the new Log Fwd Profile, I used the &lt;EM&gt;Built-in Actions,&lt;/EM&gt; which allows for ADDING or REMOVING a tag to a Src or Dst Address.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;I did Src Address (because I want to ADD a TAG to the Src addresses that are ill fated attempting to access my FW.)&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I added my TAG&amp;nbsp;called "&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#800080"&gt;Bad US and Foreign ppl&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;" to the Built-In Actions.&lt;/P&gt;&lt;P&gt;There is a timeout period (if left to 0, will default to 30 days.)&amp;nbsp; &lt;EM&gt;Oh my... think about what can be done.... &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="builtin.png" style="width: 477px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20323iF047400627BB26AD/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="builtin.png" alt="builtin.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My DAG (Dynamic Address Group called &lt;EM&gt;&lt;STRONG&gt;All Bad People&lt;/STRONG&gt;&lt;/EM&gt;), which is associated with the "&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#800080"&gt;Bad US and Foreign ppl&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;" tag, will populate with every &lt;STRONG&gt;Spammer, Foreign Country, or CleanUp&lt;/STRONG&gt; src address. (My rules are very simple..all 3 rules would only have SC (source country) from the Internet, so my Src Zone is Untrusted-L3.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From there, what would you want to do.&lt;/P&gt;&lt;P&gt;For me, there were&amp;nbsp; 2 possibilities..&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;1) create a rule called &lt;EM&gt;&lt;STRONG&gt;No "Bad Ppl"&lt;/STRONG&gt;&lt;/EM&gt; that if anyone (for 30 days, based on the timeout) tries to access/port scan/whatever to my public IP (of FW) or any other offending type of traffic, they all will be denied.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;( Commentary, so what I created was a new rule that essentially blocked what would already have been denied/dropped by c configured policies...)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;But that is NOT how the PANW FW works.&amp;nbsp; Go DEEPER!!&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) The way the FW works is that the DoS Protection rules are viewed/read/acted upon while the session is first being setup.&lt;/P&gt;&lt;P&gt;So... If you have a bunch of BAD ppl, why make the FW even create a session setup to be off-loaded to the fastpath (security policy processing) only to be denied by security policy?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No!!&amp;nbsp; What I did (and think it was good) was to create a DoS policy with:&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;Untrust-L3&lt;/FONT&gt; (src add of&amp;nbsp;"&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#800080"&gt;All Bad Ppl&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;" DAG (dynamic address grp) talking to "any" Zone, "any"&amp;nbsp;Address,&amp;nbsp; &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;DENY&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The end result:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The DoS Protection Policy will now block all&amp;nbsp;"Bad US and Foreign ppl" in the DAG group, for 30 days.&amp;nbsp; And there is no expressed logging of DoS denied traffic, because it never makes it through the security policy.&lt;/P&gt;&lt;P&gt;It is stops waaaay in the beginning of the process.&amp;nbsp; Less CPU cycles stop keep the bad people out.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No more (or smaller number of ) hits on a continual basis from repeated script kiddies and nmap wannabes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dag.png" style="width: 401px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20324iE5230B180375075E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="dag.png" alt="dag.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I started this yesterday, and today, I have 274 Bad Ppl who are now being denied.&lt;/P&gt;&lt;P&gt;I expect that number to grow to whatever the max my DAG can hold (1000 on my test VM firewall)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Steve Cantwell&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2019 22:12:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-the-log-forwarding-built-in-actions-to-create-dynamic/m-p/267612#M74482</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-06-06T22:12:43Z</dc:date>
    </item>
    <item>
      <title>Re: Using the Log Forwarding Built-In Actions to create Dynamic Address Gro</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-the-log-forwarding-built-in-actions-to-create-dynamic/m-p/353166#M87296</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Very good post Steve!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, the end goal of this is to "drop" packets by a DoS Policy, instead the Security Policy, isn't?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I understand that "tagged" IP sources within the DAG have been already blocked once by the your Security Policy, right ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Very good stuff so far... I'm planning to use DAG associated with sinkhole DNS mechanism to block dynamically infected inside host.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks !&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dominic.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Oct 2020 02:08:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-the-log-forwarding-built-in-actions-to-create-dynamic/m-p/353166#M87296</guid>
      <dc:creator>DLONGPRÉ</dc:creator>
      <dc:date>2020-10-01T02:08:28Z</dc:date>
    </item>
  </channel>
</rss>

