Remember, you should not have TCP-SYN enabled on both Zone Protection and DoS policies at the same time.
To enable the additional logging, run this operational command:
set system setting additional-threat-log on
More data here.
Information on troubleshooting Zone Protection Profiles can be found here.
While not strictly Zone Protection, Device > Setup > Session > “Drop segments with null timestamp option” will break PS4 connection to Internet.
Zone Protection Profile alerts appear in the Threat Prevention logs.
Flood protection
( subtype eq flood ) and ( name-of-threatid eq 'UDP Flood' ) and ( severity eq critical )
( subtype eq flood ) and ( name-of-threatid eq 'TCP Flood' ) and ( severity eq critical )
( subtype eq flood ) and ( name-of-threatid eq 'ICMP Flood' ) and ( severity eq critical )
Packet Based Attack Protection
show counter global filter packet-filter yes delta yes | match Zone
(Remember, Spoofed IP address is based on routing tables. Strict IP Address Check is based on ingress interface - be wary with aggregate links)
Palo Alto Network's best practice (June 2019) is to block Spoofed IP Address (internal zones only) as well as Unknown and Malformed under IP Option Drop. Also, block TCP with SYN data and TCP with SYNACK data and strip TCP Timestamp option. IPv6 drop best practice is to to drop packets with routing header type 0, 1, 4 to 252 and 255.
A packet is malformed if it has incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
A packet is unknown if the class and number are unknown.
Spoofed IP Address - On internal zones only, drop spoofed IP address packets to ensure that on ingress, the source address matches the firewall routing table. Obviously, this doesn't really work on the interface that the default route points to.
Reject Non-SYN TCP - If you configure Tunnel Content Inspection on a zone and enable Rematch Sessions, then for that zone only, disable Reject Non-SYN TCP so that enabling or editing a Tunnel Content Inspection policy doesn’t cause the firewall to drop existing tunnel sessions.