Table of Contents

Zone Protection

Remember, you should not have TCP-SYN enabled on both Zone Protection and DoS policies at the same time.

Logging

To enable the additional logging, run this operational command:

set system setting additional-threat-log on

More data here.

Troubleshooting

Information on troubleshooting Zone Protection Profiles can be found here.

While not strictly Zone Protection, Device > Setup > Session > “Drop segments with null timestamp option” will break PS4 connection to Internet.

Logging

Zone Protection Profile alerts appear in the Threat Prevention logs.

Zone Protection Profile Logging

Flood protection

( subtype eq flood ) and ( name-of-threatid eq 'UDP Flood' ) and ( severity eq critical )
( subtype eq flood ) and ( name-of-threatid eq 'TCP Flood' ) and ( severity eq critical )
( subtype eq flood ) and ( name-of-threatid eq 'ICMP Flood' ) and ( severity eq critical )

Packet Based Attack Protection

show counter global filter packet-filter yes delta yes | match Zone

Problems with Zone Protection

Best Practice

(Remember, Spoofed IP address is based on routing tables. Strict IP Address Check is based on ingress interface - be wary with aggregate links)

Palo Alto Network's best practice (June 2019) is to block Spoofed IP Address (internal zones only) as well as Unknown and Malformed under IP Option Drop. Also, block TCP with SYN data and TCP with SYNACK data and strip TCP Timestamp option. IPv6 drop best practice is to to drop packets with routing header type 0, 1, 4 to 252 and 255.

A packet is malformed if it has incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.

A packet is unknown if the class and number are unknown.

Spoofed IP Address - On internal zones only, drop spoofed IP address packets to ensure that on ingress, the source address matches the firewall routing table. Obviously, this doesn't really work on the interface that the default route points to.

Reject Non-SYN TCP - If you configure Tunnel Content Inspection on a zone and enable Rematch Sessions, then for that zone only, disable Reject Non-SYN TCP so that enabling or editing a Tunnel Content Inspection policy doesn’t cause the firewall to drop existing tunnel sessions.