Zone protection profile

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Zone protection profile

L2 Linker

Hi All,

 

I'm planning to implement Zone protection on outside interfaces using Strict IP Address Check" or only "Spoofed IP address" in the packet based attack protection of the zone protection profile. Does it drop legitimate traffic as per below points

 

1) Configure static one to one Snat and vice versa for reverse natting

2)  Does it impact if any one of my Server's (in Dmz) are in same public ip address range as my Outside interface

5 REPLIES 5

L4 Transporter

Hello,

Please look bellow to see what checks are performed by the firewall when you activate "Spoofed IP address" and "Strict IP Address Check" in Zone Protection:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004LnmCAE 

Cheers,
Cosmin

Don't forget to Like items if a post is helpful to you!
Please help out other users and “Accept as Solution” if a post helps solve your problem!

Read more about how and why to accept solutions.

Disclaimer: All messages are my personal ones and do not represent my company's view in any way.

Hi,

 

That I already gone through. Need to know what will be the impact as per my query 

Cyber Elite
Cyber Elite

Hi @vishalrsshah ,

 

You want to know if configuring the NGFW to drop spoofed packets will impact production traffic.  Not is you enable "Spoofed IP address" only.  As the URL posted by @CosminM states, dropping spoofed packets relies on the routing table.  If your routing is working fine, then IP spoof drops will work fine.  The 2 examples that you mention route fine now.

 

If you enable "Strict IP Address Check" then you may have production drops if you have asymmetric routing.

 

I enable "Spoofed IP address" on all my NGFWs, and it works fine.  I apply my Zone Protection Profile to all my interfaces.

 

One thing that many people do not know is that these spoofed IP drops along with other packet-based drops are not logged by default.  https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000wkr7CAA

 

Here is a good article on troubleshooting spoofed IP drops.  https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UuJCAU

 

Thanks,

 

Tom

Help the community: Like helpful comments and mark solutions.

L2 Linker

Thank you for reply.

 

So it means my reverse natting and server with public ip address in any zone would not be impact by packet based protection

Cyber Elite
Cyber Elite

Hi @vishalrsshah ,

 

I cannot comment on specific configuration that I do not know in detail.

 

If the routing is working correctly now, then "Spoofed IP address" packet protection will not break it.

 

Thanks,

 

Tom

Help the community: Like helpful comments and mark solutions.
  • 309 Views
  • 5 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!