<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Will DoS Protection Block IP or Block Service of IP when Max Rate Threshold is Exceeded? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/will-dos-protection-block-ip-or-block-service-of-ip-when-max/m-p/394569#M91156</link>
    <description>&lt;P&gt;To add a little background, I got around 800Kpps UDP port 80 DDoS which overrun on-chip buffer descriptor and packet buffer resulted in good traffic drops.&amp;nbsp; The target server is a web server, and security policy is permitting tcp port 80 and 443.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to see how can I use DoS to protect port without service running. Ultimately, I am thinking how can I utilize DoS to drop&amp;nbsp;&lt;STRONG&gt;flow_policy_deny&amp;nbsp;&lt;/STRONG&gt;traffic in fastpath or offload path as describe in the KB blow:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HBjNCAW&amp;amp;lang=en_US%E2%80%A9" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HBjNCAW&amp;amp;lang=en_US%E2%80%A9&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;HIGH ON-CHIP DESCRIPTOR AND PACKET BUFFER USAGE DUE TO POLICY DENY RESULTING IN TRAFFIC LATENCY AND DROPS&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 27 Mar 2021 11:51:36 GMT</pubDate>
    <dc:creator>Shiling</dc:creator>
    <dc:date>2021-03-27T11:51:36Z</dc:date>
    <item>
      <title>Will DoS Protection Block IP or Block Service of IP when Max Rate Threshold is Exceeded?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/will-dos-protection-block-ip-or-block-service-of-ip-when-max/m-p/394530#M91155</link>
      <description>&lt;P&gt;For the following scenario, will DoS block destination IP or block service of the destination IP?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If a DoS protection policy include destination IP and Services to protect an internet facing server, for example source any destination 1.1.1.1 service UDP port 80, then action protection, address destination-ip-only and a DoS security profile which will only check UDP Flood CPS. When there is a DoS attack to UDP port 80, and DoS protection kicked in and max rate is exceeded, will only all UDP port 80 traffic to 1.1.1.1 be dropped or all traffic to destination 1.1.1.1 dropped by DoS protection? I am hoping the former will be true, since the later one basically completes the goal of bringing the target IP 1.1.1.1 offline.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is DoS protection use block-table only to check the future drop or combination of session table and block-table?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/zone-protection-and-dos-protection/zone-defense/dos-protection-profiles-and-policy-rules/dos-protection-policy-rules" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/zone-protection-and-dos-protection/zone-defense/dos-protection-profiles-and-policy-rules/dos-protection-policy-rules&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In addition to protecting service ports in use on critical servers, you can also protect against DoS attacks on the unused service ports of critical servers. For critical systems, you can do this by creating one DoS Protection policy rule and profile to protect ports with services running, and a different DoS Protection policy rule and profile to protect ports with no services running. For example, you can protect a web server’s normal service ports, such as 80 and 443, with one policy/profile, and protect all of the other service ports with the other policy/profile. Be aware of the firewall’s capacity so that servicing the DoS counters doesn’t impact performance.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Shiling&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Mar 2021 00:45:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/will-dos-protection-block-ip-or-block-service-of-ip-when-max/m-p/394530#M91155</guid>
      <dc:creator>Shiling</dc:creator>
      <dc:date>2021-03-27T00:45:59Z</dc:date>
    </item>
    <item>
      <title>Re: Will DoS Protection Block IP or Block Service of IP when Max Rate Threshold is Exceeded?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/will-dos-protection-block-ip-or-block-service-of-ip-when-max/m-p/394569#M91156</link>
      <description>&lt;P&gt;To add a little background, I got around 800Kpps UDP port 80 DDoS which overrun on-chip buffer descriptor and packet buffer resulted in good traffic drops.&amp;nbsp; The target server is a web server, and security policy is permitting tcp port 80 and 443.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to see how can I use DoS to protect port without service running. Ultimately, I am thinking how can I utilize DoS to drop&amp;nbsp;&lt;STRONG&gt;flow_policy_deny&amp;nbsp;&lt;/STRONG&gt;traffic in fastpath or offload path as describe in the KB blow:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HBjNCAW&amp;amp;lang=en_US%E2%80%A9" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HBjNCAW&amp;amp;lang=en_US%E2%80%A9&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;HIGH ON-CHIP DESCRIPTOR AND PACKET BUFFER USAGE DUE TO POLICY DENY RESULTING IN TRAFFIC LATENCY AND DROPS&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Mar 2021 11:51:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/will-dos-protection-block-ip-or-block-service-of-ip-when-max/m-p/394569#M91156</guid>
      <dc:creator>Shiling</dc:creator>
      <dc:date>2021-03-27T11:51:36Z</dc:date>
    </item>
  </channel>
</rss>

