<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: random-drop vs drop - zone protection in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/401665#M91731</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp; If we do Syn-Cookes on Zone protection what is the practice for Dos Policies. I have gone through support on this before, when we had Syn-Cookies enabled for both Zone and DoS policies, DoS policies do not generate any logs even with an alarm rate of 1 and activate rate of zero in this scenario.&lt;/P&gt;</description>
    <pubDate>Sat, 24 Apr 2021 04:16:26 GMT</pubDate>
    <dc:creator>raji_toor</dc:creator>
    <dc:date>2021-04-24T04:16:26Z</dc:date>
    <item>
      <title>random-drop vs drop - zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/401366#M91689</link>
      <description>&lt;P&gt;For TCP flood logs should only show "random-drop" with RED configured.&lt;/P&gt;&lt;P&gt;"drop" for TCP flood is this coming from options set under "TCP Drop" options under Packet Based Attack Protection.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/32426i0E92B8F37385A853/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Apr 2021 18:12:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/401366#M91689</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2021-04-22T18:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: random-drop vs drop - zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/401379#M91692</link>
      <description>&lt;P&gt;Good Day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Flood Protection is typically only used for the TCP/UDP/IP/IPv6 protections under the first tab in the Zone Protection Profile.&lt;BR /&gt;&lt;BR /&gt;It is recommended to do SynCookies vs RED for traffic from External zone.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Apr 2021 18:43:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/401379#M91692</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2021-04-22T18:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: random-drop vs drop - zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/401425#M91695</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp; These are my flood protection settings. I should be seeing only random-drop in logs. What is causing the 'drop' logs?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/32448i43610E6F2D2C4CD7/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Apr 2021 21:27:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/401425#M91695</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2021-04-22T21:27:50Z</dc:date>
    </item>
    <item>
      <title>Re: random-drop vs drop - zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/401434#M91697</link>
      <description>&lt;P&gt;That is a good question... I have my FW configured for Syn Cookies per PANW.&amp;nbsp; RED is typically only for UDP traffic, not TCP... so perhaps there is some internal logic at play here.&amp;nbsp; Best to swap it (correctly... ) to SYN Cookies.&amp;nbsp; This is per PANW recommendations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Oh, I also think.. that proper 3 way TCP handshake will be random dropped, but if some src IP did not respond and sent a 2nd SYN packet, the FW will probably DROP that... that is what I think is happening... &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anything else I can assist with?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Apr 2021 22:22:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/401434#M91697</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2021-04-22T22:22:15Z</dc:date>
    </item>
    <item>
      <title>Re: random-drop vs drop - zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/401440#M91698</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp;Thanks for your effort to answer this. I will probably ask support to have a good clarification.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And regarding your SYN-Cookie suggestion, I had it enabled recently but reverted back to RED when we found during an internal scan, that because firewall is replying SYN's on servers behalf it was also giving SYN replies when the servers did not even exist. We would not like to have that when we have /24 range facing internet.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Apr 2021 22:40:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/401440#M91698</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2021-04-22T22:40:13Z</dc:date>
    </item>
    <item>
      <title>Re: random-drop vs drop - zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/401555#M91724</link>
      <description>&lt;P&gt;Thank you for your info..&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All I can say is that is correct and totally appropriate for the FW to complete a proper 3 way handshake from an outside entity (client, if you may) to allow the FW to do Zone Protection.&amp;nbsp; Random Early drop WILL drop perfectly good TCP connections, and SynCookies will drop ONLY those clients on the Internet who do not attempt to properly establish a 3 way handshake.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I would recommend that you review the Best Practices located here:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/best-practices/9-1/dos-and-zone-protection-best-practices/dos-and-zone-protection-best-practices.html" target="_blank"&gt;https://docs.paloaltonetworks.com/best-practices/9-1/dos-and-zone-protection-best-practices/dos-and-zone-protection-best-practices.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are always striving to ensure your FW is properly configured, and if your company has your go into a different direction in terms of how to security environment, then I appreciate the time and effort to help guide you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your time and we are glad to assist you.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Apr 2021 17:33:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/401555#M91724</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2021-04-23T17:33:50Z</dc:date>
    </item>
    <item>
      <title>Re: random-drop vs drop - zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/401665#M91731</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp; If we do Syn-Cookes on Zone protection what is the practice for Dos Policies. I have gone through support on this before, when we had Syn-Cookies enabled for both Zone and DoS policies, DoS policies do not generate any logs even with an alarm rate of 1 and activate rate of zero in this scenario.&lt;/P&gt;</description>
      <pubDate>Sat, 24 Apr 2021 04:16:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/401665#M91731</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2021-04-24T04:16:26Z</dc:date>
    </item>
    <item>
      <title>Re: random-drop vs drop - zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/402371#M91789</link>
      <description>&lt;P&gt;Hello Raji&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think the question I need to ask here is... What are your expectations of what and how the FW should work vs how it actually works?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Zone Protection is like water pressure... all the bad traffic is trying to get inside of the FW and the ZPP regulates how much is allowed in.&amp;nbsp; As I stated... internet traffic inbound is mostly TCP and TCP is best controlled by Syn Cookie.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DoS protection controls IF a session needs to established (that is happens before security policies are even evaluated).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I&amp;nbsp; do not understand the comment about DoS do not generate logs.&amp;nbsp; Why would they?&amp;nbsp; Logs are done as END of session and DoS can PREVENT a session from even needing to started, if the packet does not do what you want it to do.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So someone from the Internet MUST be compliant is ensuring it responds to a 3 why handshake to make it through the ZPP and then you, as the FW Admin, determine IF a session from that Internet user should be allowed to connect inside of your network.. If YES, the a session is created... But.. if you do not want that session to be created... then DO NOT CREATE ONE, and logs will equally NOT be generated for UNWANTED traffic.&amp;nbsp; So to answer your question.... SYN Cookies should also be used for DoS in case that was not clear.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We seemed to have moved away from the original request of your query.&amp;nbsp; You asked why things have occurred and I believe I have properly answered them, as well as explained WHY this configuration should be implemented, based on my PS experience and based on PANW best practices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What additional questions can I answer for you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Apr 2021 19:47:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/402371#M91789</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2021-04-27T19:47:43Z</dc:date>
    </item>
    <item>
      <title>Re: random-drop vs drop - zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/402552#M91793</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp;I do not disagree agree with you, let me explain what had happened.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We had been trying to implement DP but that is not as straight forward as implementing security policies, and documentation mostly shows how to create a DP policy/profile. But the process on how reach at those values is not widely understood by most..&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ZPP - Syn-cookies was enabled with activation threshold of 1.&lt;/P&gt;&lt;P&gt;DP - Syn-Cookies was enabled with activation threshold of 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for above ZPP was being processed likely before DP there were no logs of syn-cookie sent "&lt;SPAN&gt;DoS do not generate logs&lt;/SPAN&gt;". I guess that is expected according to how the PA process packets, but it took a while to figure this out and engaging threat team. First level team was not able to identify this issue. I have queried here as well before.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After that we changed ZPP to RED and I see the logs which I stated above.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have changed back to syn-cookie now for ZPP but thresholds are much higher than those used in DP. It seems to work as expected now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Apr 2021 23:31:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/402552#M91793</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2021-04-27T23:31:05Z</dc:date>
    </item>
    <item>
      <title>Re: random-drop vs drop - zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/402732#M91812</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt;&amp;nbsp;&amp;nbsp; Thanks for reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you or your network team benchmark the number of connections per second that the FW would normally see?&lt;/P&gt;
&lt;P&gt;How did you or anyone choose 1 as the correct number?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is a great screen capture to you help you:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SteveCantwell_0-1619619160116.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/32754iD9E0E362AC7CCB05/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SteveCantwell_0-1619619160116.png" alt="SteveCantwell_0-1619619160116.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If there is nothing more to add, can you like the post, Accept as a Solution?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 14:13:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/402732#M91812</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2021-04-28T14:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: random-drop vs drop - zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/1234373#M124812</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp; I am asking same question to PA waiting for their response.&lt;/P&gt;
&lt;P&gt;I have seen DROP Action with both TCP and UDP traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jul 2025 17:25:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/1234373#M124812</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2025-07-21T17:25:26Z</dc:date>
    </item>
    <item>
      <title>Re: random-drop vs drop - zone protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/1234374#M124813</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp; As per this Note&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="difference-between-drop-and-random-drop"&gt;Difference Between Drop and Random Drop&lt;/H2&gt;
&lt;DIV class="gs_p"&gt;&lt;A class="gs_mdlink" tabindex="0" href="https://www.bing.com/ck/a?!&amp;amp;&amp;amp;p=66c96e744099dda6327c7492e76a30240c889afa1a855a5d6d5cd78cce6c8d2cJmltdHM9MTc1MzA1NjAwMA&amp;amp;ptn=3&amp;amp;ver=2&amp;amp;hsh=4&amp;amp;fclid=1b032d71-796d-675b-30ff-3b5d78336676&amp;amp;u=a1aHR0cHM6Ly9kb2NzLnBhbG9hbHRvbmV0d29ya3MuY29tL3Bhbi1vcy8xMS0wL3Bhbi1vcy1hZG1pbi96b25lLXByb3RlY3Rpb24tYW5kLWRvcy1wcm90ZWN0aW9uL3pvbmUtZGVmZW5zZS96b25lLXByb3RlY3Rpb24tcHJvZmlsZXMvcGFja2V0LWJhc2VkLWF0dGFjay1wcm90ZWN0aW9u&amp;amp;ntb=1" target="_blank" rel="noopener"&gt;&lt;SPAN class="gs_cit_txt b_hover" data-sups="1" data-hover-id="1"&gt;The difference between drop and random drop in Palo Alto Networks' packet-based attack protection lies in the handling of incoming packets.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Drop&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is a more strict action that drops the first packet of a session, while&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;random drop&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is a more flexible approach that drops packets based on a probability function tied to the average depth of the queue. This means that random drop can drop packets as they arrive, allowing for more efficient use of bandwidth and resources&lt;/SPAN&gt;&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV class="gs_p"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="gs_p"&gt;Regards&lt;/DIV&gt;</description>
      <pubDate>Mon, 21 Jul 2025 17:27:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/random-drop-vs-drop-zone-protection/m-p/1234374#M124813</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2025-07-21T17:27:08Z</dc:date>
    </item>
  </channel>
</rss>

