Tips & Tricks: Complete Action List in Profiles

Tips & Tricks: Complete Action List in Profiles

39840
Created On 09/25/18 19:02 PM - Last Modified 06/06/23 19:32 PM


Resolution


When choosing the action to take with threat signatures at the rule level, pre PAN-OS 7.0 versions provided only allow/alert/block options. Some customers would like more granular control over the session handling when a threat is encountered.  For example, some users may prefer silent drops, whereas others may prefer client-side resets.  In pre PAN-OS 7.0 versions, the only way to get this control is at the signature exception level.  As a result, customers need to create threat exceptions for every signature in order to get this level of control over the action. This solution isn't scalable.

 

Starting from PAN-OS 7.0, we've added more actions, allowing more control over the firewall responses to threat events.

 

Reset Server

For a TCP packet, it is self-explanatory because it will reset the server.

For UDP, this action does a 'Drop'.

For the SMTP decoder, this action maps to SMTP 541 response with a server reset.

 

Reset Client

For a TCP packet, it is self-explanatory because it will reset the client.

For UDP, this action does a 'Drop'.

For the SMTP decoder, this action maps to SMTP 541 response with a client reset.

 

Reset Both

For a TCP packet, it is self-explanatory because it will reset both client AND server.

For UDP, this action does a 'Drop'.

For the SMTP decoder ,this action maps to SMTP 541 response with a server and client reset.

 

The screenshots below illustrate the difference between pre PAN-OS 7.0 and PAN-OS 7.0 onwards.

 

Under Objects tab > Security Profiles > Antivirus Profile > Antivirus > Decoder Actions

 

 

2016-11-29_12-58-17.pngAdded Actions from PAN-OS 7.0 Onwards

 

Under Objects tab > Security Profiles > Antivirus Profile > Wildfire Actions

 

2016-11-29_13-01-44.pngAdded Action from PAN-OS 7.0 Onwards

Under Objects tab > Security Profiles > Antivirus Profile > Application Exceptions

 

2016-11-29_14-35-36.pngAdded Action for PAN-OS 7.0 Onwards

We are doing the same for Anti-Spyware Profiles.

 

Under Objects tab > Security Profiles > Anti-Spyware

 

2016-11-29_13-35-26.pngAdded Action from PAN-OS 7.0 Onwards

 

We are doing the same thing for Vulnerability Protection.

 

Under Object tab > Security Profiles > Vulnerability Protection

 

2016-11-29_13-40-11.pngAdded Actions from PAN-OS 7.0 OnwardsNote that for Custom Vulnerability signatures, we already had the Reset Both, Reset Client, Reset Server options.  We added an Allow action from PAN-OS 7.0 onwards.  Below screenshots illustrate the change from pre PAN-OS 7.0 to PAN-OS 7.0 onwards.

 

Objects tab > Custom Objects > Vulnerability

 

2016-11-29_13-47-08.pngAdded Action from PAN-OS 7.0 OnwardsWe did the same for Custom Spyware.

 

Under Objects tab > Custom Objects > Spyware

 

2016-11-29_13-51-07.pngAdded Actions from PAN-OS 7.0 OnwardsNotice that the new actions will also be logged in the threat logs :

 

2016-11-29_13-55-39.pngNew Actions Also Logged in Threat Log

 

How does this translate exactly when you upgrade or downgrade?

 

The tables below illustrate the mapping of the actions upon upgrading or downgrading:

 

UPGRADING from a pre PAN-OS 7.0 version to PAN-OS 7.0 or later

 

Pre PAN-OS 7.0PAN-OS 7.0 or later

Default

Block

Block IP

Allow

Alert

drop-all-packets

drop-packets

Default

Reset Both

Block IP

Allow

Alert

Drop

Drop

 

DOWNGRADING from a PAN-OS 7.0 or later to a pre PAN-OS 7.0 version

 

PAN-OS 7.0 or laterPre PAN-OS 7.0

Reset Server

Reset Client

Reset Both

Drop

Block IP

Allow

Alert

Block

Block

Block

Block

Block IP

Allow

Alert

 

Cheers!

-Kim.



Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClT9CAK&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language