I have a PAN-2050 installed in vitual wire reaching max concurrent session (262143) and discarding sessions in peak hours unable to create new sessions. I would like to know if it is possible to configure or create a rule to limit the max concurrent session per source IP. Or maybe per appication.
I couldn´t find information abour that in Admin or Command Guide. Does anybody have experience with similar issue?
The policy will be based on the check on the number of connections per source IP. So you do not need to know the source IP but you can say each source IP cannot have more then x amount of connections.
What you also can check is the sessions that are active. If you reach the limit of session you might want to decrease the timeout on DNS for example. This can lead to a fewer number of active connections.
and what about if I need to have different rates for different services, for example 1000 max sessions toward a WEB server and 2000 max sessions toward a DNS server?
And also, If I have 200 different SrcIPs wich make 10 sessions per second each toward the same DstIP I have a total of 2.000 sessions per second but only 10 sessions per second from each SrcIP...so It's not useful to limit by SrcIP, imho.
Does 4.0 achieve this?
So, Can I do DoS policy based on SrcIP, DstIP and application and rate limit all this component?
this is from the RN of the upcoming PAN-OS 4:
DoS Protection Rulebase – Complementing the existing Zone Protection Profiles, a new Denial
of Service rulebase and corresponding DoS Protection Profile have been added to provide more
granular and proactive protection from DoS attacks.
What a shame! 😞
Even Netfilter do DstIP/port based rate limiting.
Anyway, thanks for your fast response! 😉
PAN-OS has had SRC/DST/port based rate limiting for quite some time now. The next release will also allow SRC/DST/port based session and flood control. In addition, this will be available for the aggregate of traffic identified in a rule or classified per single source, destination, or combination of both hitting a rule.
My goal is to identify and limit DoS Attack to my DNS Servers.
Today the Zone Protection Profile make me able to protect per dst zone, not per single Dst IP address.
Do you suggest me anything else to achieve this goal?
I'm looking forward to seeing 4.0 release for the new feature!
thanks everybody for your help. Finally I was talking with PaloAlto Spain representaves.They told me PAN 4.0 will be released february 20, and as you said, it will be possible to create a DoS policy to limit sessions per Src-IP, Dest-IP, and also by protocols TCP/UDP/ICMP . I hope this will solve my problem because 80% of my sessions are UDP.
What I couldn´t find is Relesae Notes of PAN 4.0. Does anybody knows where can I donwload it?
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!