Knowledge sharing: High Data Plane CPU because of DDOS or overutilization (access to Palo Alto Auto Assistant may help)

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

Knowledge sharing: High Data Plane CPU because of DDOS or overutilization (access to Palo Alto Auto Assistant may help)

L6 Presenter

I have seen for example on a small firewall when the customer enables SSL decryption that the counters for work groups "ecdhe_key_gen", "flow_host " etc. jump. This may show that the firewall can't handle the ssl decryption or that there is an SSL DDOS attack:

 

 

 

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CmV2CAK

 

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXwCAK

 

 

 

 

If you have access to the Palo Alto Auto Assistant tool (like F5 ihealth but for some reason Palo Alto gives access to this tool only to Partners) you can use it to better view such issue from the Tech support file. Otherwise use the logs and global counters in the articles I provided.

 

 

For more about Palo Alto logs and their meaning you can view:

 

https://live.paloaltonetworks.com/t5/general-topics/knowledge-sharing-palo-alto-general-logs-and-log...

 

 

5 REPLIES 5

Cyber Elite
Cyber Elite

Hello @nikoolayy1 

 

I have a PA-220 and decrypt all of my traffic (minus 3 protected URL categories) and I do not notice slowdowns.  I will acknowledge that I do see CPU spike, but I can confirm that I am not over-utilizing my FW.  The smaller FWs do not have a network processor; everything is emulated in software, so there will be global counters that may be a misnomer or can be ignored.

Help the community: Like helpful comments and mark solutions

Yes but there is a limit to everything even to Palo Alto, which otherwise is a great firewall that is not just a server like the most other firewalls but a purpose build firewall for blocking advanced attacks. The example I talk about is that the customer firewall that was a small model I think 220 crashed and we used the Palo Alto Auto Assistant and a firewall tech support to see that the data plane delta of the max counters changed right before the crash (jumped like crazy) and it was related to SSL key generation and the number of hosts. The client mentioned that they rerouted a lot of client traffic to the firewall right before the crash it seems to have been too much for this model, so I am mentioning this to who sees similar issues about what can be checked if a higher model firewall is needed or if a Layer 7 DDOS has happened.

@nikoolayy1 

 

Also I have seen High DP utilization due to SSL decryption, Excess amount  of traffic and also DDos.

 

Regards

MP

Help the community: Like helpful comments and mark solutions.

Yes and if the issue is still present then the Chrome tool Pan(w)achrome can also be used that is free and accessible by everyone  not like the web tool Palo Alto Auto Assistant. There is also another web tool I think named PANS that can also view logs in a tech support file but it is primary for investigating issues with the control plane issues.

 

 

https://live.paloaltonetworks.com/t5/blogs/get-more-gui-functionality-using-pan-w-achrome/ba-p/17807...

L3 Networker

Another info is if the client has rebooted the firewall or if the firewall crashed the max counters will all jump when the firewall sees traffic and this is normal as the counters were reseted, so don't get confused.

  • 4608 Views
  • 5 replies
  • 1 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!