paloaltonetworks:configuration:zone_protection
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| paloaltonetworks:configuration:zone_protection [2020/05/28 15:45] – [Best Practice] bstafford | paloaltonetworks:configuration:zone_protection [2022/11/23 12:49] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ======Zone Protection====== | + | ====== Zone Protection ====== |
| - | =====Troubleshooting===== | + | Remember, you should not have TCP-SYN enabled on both Zone Protection and DoS policies at the same time. |
| + | ===== Logging ===== | ||
| + | To enable the additional logging, run this operational command: | ||
| + | |||
| + | < | ||
| + | More data [[https:// | ||
| + | ===== Troubleshooting ===== | ||
| Information on troubleshooting Zone Protection Profiles can be found [[paloaltonetworks: | Information on troubleshooting Zone Protection Profiles can be found [[paloaltonetworks: | ||
| - | =====Zone Protection Profile Logging===== | + | While not strictly Zone Protection, Device > Setup > Session > "Drop segments with null timestamp option" |
| + | |||
| + | ===== Logging ===== | ||
| + | Zone Protection Profile alerts appear in the Threat Prevention logs. | ||
| + | |||
| + | ===== Zone Protection Profile Logging ===== | ||
| * Flood Protection logs appear under the Threat Logs. | * Flood Protection logs appear under the Threat Logs. | ||
| Line 16: | Line 27: | ||
| Packet Based Attack Protection | Packet Based Attack Protection | ||
| < | < | ||
| - | =====Problems with Zone Protection===== | + | ===== Problems with Zone Protection ===== |
| - | * **Strict IP Address Check** caused problems when doing BGP and ECMP with four ISP links after a HA failover. | + | * **Strict IP Address Check** |
| * **Fragmented traffic** broke the PS3 connection to the Internet. | * **Fragmented traffic** broke the PS3 connection to the Internet. | ||
| * **ICMP Drop > Suppress ICMP TTL Expired Error** This will break the first hop of a traceroute and mark the hop as " | * **ICMP Drop > Suppress ICMP TTL Expired Error** This will break the first hop of a traceroute and mark the hop as " | ||
| * **ICMP Drop > Discard ICMP embedded with error message** This will break all hops of a traceroute (except for the first) and mark each hop as " | * **ICMP Drop > Discard ICMP embedded with error message** This will break all hops of a traceroute (except for the first) and mark each hop as " | ||
| - | =====Best Practice===== | + | * **ICMP Drop > Suppress ICMP Frag Needed** This setting will interfere with the PMTUD process performed by hosts behind the firewall. |
| + | ===== Best Practice ===== | ||
| + | (Remember, Spoofed IP address is based on routing tables. Strict IP Address Check is based on ingress interface - be wary with aggregate links) | ||
| Palo Alto Network' | Palo Alto Network' | ||
| + | A packet is **malformed** if it has incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113. | ||
| + | |||
| + | A packet is **unknown** if the class and number are unknown. | ||
| + | |||
| + | **Spoofed IP Address** - On internal zones only, drop spoofed IP address packets to ensure that on ingress, the source address matches the firewall routing table. Obviously, this doesn' | ||
| + | |||
| + | **Reject Non-SYN TCP** - If you configure Tunnel Content Inspection on a zone and enable Rematch Sessions, then for that zone only, disable Reject Non-SYN TCP so that enabling or editing a Tunnel Content Inspection policy doesn’t cause the firewall to drop existing tunnel sessions. | ||
paloaltonetworks/configuration/zone_protection.1590680741.txt.gz · Last modified: (external edit)
