paloaltonetworks:configuration:zone_protection
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| paloaltonetworks:configuration:zone_protection [2020/05/28 13:42] – [Problems with Zone Protection] bstafford | paloaltonetworks:configuration:zone_protection [2022/11/23 12:49] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ======Zone Protection====== | + | ====== Zone Protection ====== |
| - | =====Troubleshooting===== | + | Remember, you should not have TCP-SYN enabled on both Zone Protection and DoS policies at the same time. |
| + | ===== Logging ===== | ||
| + | To enable the additional logging, run this operational command: | ||
| + | |||
| + | < | ||
| + | More data [[https:// | ||
| + | ===== Troubleshooting ===== | ||
| Information on troubleshooting Zone Protection Profiles can be found [[paloaltonetworks: | Information on troubleshooting Zone Protection Profiles can be found [[paloaltonetworks: | ||
| - | =====Problems with Zone Protection===== | + | While not strictly |
| - | | + | ===== Logging ===== |
| + | Zone Protection Profile alerts appear in the Threat Prevention logs. | ||
| + | |||
| + | ===== Zone Protection Profile Logging ===== | ||
| + | |||
| + | * Flood Protection logs appear under the Threat Logs. | ||
| + | * Reconnaissance Protection logs appear under Threat Logs. | ||
| + | * Packet Based Attack Protection logs appear on global counters on the CLI. | ||
| + | |||
| + | Flood protection | ||
| + | < | ||
| + | < | ||
| + | < | ||
| + | |||
| + | Packet Based Attack Protection | ||
| + | < | ||
| + | ===== Problems with Zone Protection ===== | ||
| + | |||
| + | | ||
| * **Fragmented traffic** broke the PS3 connection to the Internet. | * **Fragmented traffic** broke the PS3 connection to the Internet. | ||
| * **ICMP Drop > Suppress ICMP TTL Expired Error** This will break the first hop of a traceroute and mark the hop as " | * **ICMP Drop > Suppress ICMP TTL Expired Error** This will break the first hop of a traceroute and mark the hop as " | ||
| * **ICMP Drop > Discard ICMP embedded with error message** This will break all hops of a traceroute (except for the first) and mark each hop as " | * **ICMP Drop > Discard ICMP embedded with error message** This will break all hops of a traceroute (except for the first) and mark each hop as " | ||
| - | =====Best Practice===== | + | * **ICMP Drop > Suppress ICMP Frag Needed** This setting will interfere with the PMTUD process performed by hosts behind the firewall. |
| - | Palo Alto Network' | + | ===== Best Practice ===== |
| + | (Remember, Spoofed IP address is based on routing tables. Strict IP Address Check is based on ingress interface - be wary with aggregate links) | ||
| + | |||
| + | Palo Alto Network' | ||
| + | |||
| + | A packet is **malformed** if it has incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113. | ||
| + | |||
| + | A packet is **unknown** if the class and number are unknown. | ||
| + | |||
| + | **Spoofed IP Address** - On internal zones only, drop spoofed IP address packets to ensure that on ingress, the source address matches the firewall routing table. Obviously, this doesn' | ||
| + | **Reject Non-SYN TCP** - If you configure Tunnel Content Inspection on a zone and enable Rematch Sessions, then for that zone only, disable Reject Non-SYN TCP so that enabling or editing a Tunnel Content Inspection policy doesn’t cause the firewall to drop existing tunnel sessions. | ||
paloaltonetworks/configuration/zone_protection.1590673339.txt.gz · Last modified: (external edit)
