SRA, we tried your suggestion but met with only limited success. Here's the experiment we did: Our firewall guy created a custom application which identified the initial connection attempt by Acunetix based on the signatures that the Acunetix CTO gave us. I then downloaded a free, community edition of Acunetix, version 8, and ran a scan against a URL which resides behind our firewall. The result was this: Palo Alto firewall noticed the signature present in the first couple of packets and, so, blocked those packets. Subsequent packets (from the same source IP), which lacked these signatures, were not identified as part of the banned application and were allowed through. Is there some we can create a DDoS trigger that can block the originating IP? Etc. What can we do about this? Please advise. Thank you again, Dovid
... View more