understanding palo alto classifying traffic

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

understanding palo alto classifying traffic

L4 Transporter

 

Hi,

This is just to understand how palo alto understand classify the traffic and take action .

 

as I pasted below from multiple  sources  sending packets to an inside host .  Palo alto log shows  around  10 

 

times  (in a second )  from the  same souce traffic hitting to the inside host .

 

Question? 

In the above scenario , traffic is normal  or abnormal? 

How palo alto classify a dos attack 

 

source Dest     pkts     Bytes
x.x.x.x h.h.h.h   471   600000
y.y.y.y h.h.h.h    143    100000

 

Thanks

 

10 REPLIES 10

L4 Transporter

Please read this document for understanding how Dos protection works: https://live.paloaltonetworks.com/t5/Documentation-Articles/Understanding-DoS-Protection/ta-p/54562

 

You need to look at aggregate profiles and classified profiles for understanding how will firewall classify dos attack in case of DDOS.

Also look towards zone protection.

This will not flood the log.

And use dos protection for specific servers that need lower threshold than your whole zone has set in zone protection.

Enterprise Architect, Security @ Cloud Carib Ltd
Palo Alto Networks certified from 2011

Hi,

" use dos protection for specific servers that need lower threshold than your whole zone has set in zone protection."

How can i do this 

lets say zone is trust  and the profile is applied there and in the same zone if  there are systems which required lower threshold  ,How can i apply that 

Thanks

 

Thanks everyone , 

 

If dos attack happens  the victim may go down depends on the attack .

 

But how can we relate  the internet link down  and a dos attack ?

for example an attacker doing a dos attack and the victim still  not down but the internet link down 

Thanks

You could dig into firewall logs or install Chrome plugin that will show you current physical/virtual interface bandwidth (and a lot more).

Search for Pan(w)achrome

Enterprise Architect, Security @ Cloud Carib Ltd
Palo Alto Networks certified from 2011

Hi

 

if i have Zone-Based Protection  profile in  untrust  zone  , for more granularity

i can add  protection DoS Rule base and Profiles . If yes what is the best practice
 
Thanks

For Zone protection and DoS protection, you would first need to find your network's baseline to determine best practice

 

if you're receiving on average 1.000 packets per second and peaks up to 4.000, you should tone zone protection down to fall within that spectrum. If you're seeing peaks of 1.500.000, you should scale up

 

DoS protection works at a smaller scale where you can limit resources to a single host (or farm), so you'd need to set a baseline there as well: what is a desirable amount of resources available for a single source or what is the maximum amount we can allow towards the server (farm) before it runs out of resources or service degrades 

 

overall I would recommend using SYN cookies whenever possible, as that puts part of the responability with the client and is less agressive than random early drop and especially for the untrust zone, enable as many of the protections as possible (after determining the baseline of what is to be expected and what falls outside of your desirable inbound traffic)

 

 

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

Thank you reaper 

 

How Dos rule action 'protect' protects the network and what is the differnence between protect and  deny

Thanks

Protect is going to enforce the profile you have created and should be the action set to most of your policies

 

Allow will allow all traffic, this is a sort of bypass functionality to temporarily open up the floodgates and not enforce DoS protection (this could be useful when doing a quick scan/PEN test)

 

Deny will block all traqffic, this could be used to temporarily turn off connectivity to a service when there is a DoS attack ongoing and you want to completely prevent all connections

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization
  • 3959 Views
  • 10 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!