Flood Protection
Table of Contents
Expand all | Collapse all
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > Devices
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > Mobile Network Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Decryption > Forwarding Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > VLANs
- Network > Virtual Wires
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device > Setup > DLP
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
- Device > Device Quarantine
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Certificate Management > SSH Service Profile
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
- Device > Policy Recommendation
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Server Profiles > SCP
- Panorama > Scheduled Config Export
End-of-Life (EoL)
Flood Protection
- Network > Network Profiles > Zone Protection > Flood Protection
Configure a profile that provides flood protection against SYN,
ICMP, ICMPv6, SCTP INIT, and UDP packets, as well as protection
against flooding from other types of IP packets. The rates are in
connections per second; for example, an incoming SYN packet that
doesn’t match an existing session is considered a new connection.
Zone Protection Profile Settings—Flood Protection | Configured In | Description |
---|---|---|
SYN | NetworkNetwork ProfilesZone ProtectionFlood Protection | Select to enable protection against SYN floods. |
Action | Select the action to take in response to
a SYN flood attack.
| |
Alarm Rate (connections/sec) | NetworkNetwork ProfilesZone ProtectionFlood Protection (cont) | Enter the number of SYN packets (not matching an
existing session) the zone receives per second that triggers an
alarm. You can view alarms on the Dashboard and
in the threat log (Monitor
> Packet Capture). Range is 0 to 2,000,000; default is 10,000. Set the threshold to 15-20% above the average
zone CPS rate to accommodate normal fluctuations and adjust the
threshold if you receive too many alarms. |
Activate (connections/sec) | Enter the number of SYN packets (not matching an
existing session) that the zone receives per second that triggers
the Action specified in this Zone Protection profile. The firewall
uses an algorithm to progressively drop more packets as the attack
rate increases, until the rate reaches the Maximum rate. The firewall
stops dropping the SYN packets if the incoming rate drops below
the Activate threshold. For RED, the range is 1 to 2,000,000 and
default is 10,000. For SYN Cookies, the range is 0 to 2,000,000
and default is 0. Set the threshold
just above the zone’s peak CPS rate to avoid throttling legitimate
traffic and adjust the threshold as needed. | |
Maximum (connections/sec) | Enter the maximum number of SYN packets
(not matching an existing session) that the zone receives per second
before packets exceeding the maximum are dropped. Range is 1 to
2,000,000. Default is 40,000 for RED; default is 1,000,000 for SYN
Cookies. Crossing this threshold blocks new connections until the
CPS rate falls below the threshold. Set
the threshold to 80-90% of firewall capacity, taking into account
other features that consume firewall resources. | |
ICMP | NetworkNetwork ProfilesZone ProtectionFlood Protection (cont) | Select to enable protection against ICMP floods. |
Alarm Rate (connections/sec) | Enter the number of ICMP echo requests (pings not
matching an existing session) that the zone receives per second
that triggers an attack alarm. Range is 0-2,000,000; default is
10,000. Set the threshold to 15-20%
above the average zone CPS rate to accommodate normal fluctuations
and adjust the threshold if you receive too many alarms. | |
Activate (connections/sec) | Enter the number of ICMP packets (not matching an
existing session) that the zone receives per second before subsequent
ICMP packets are dropped. The firewall uses an algorithm to progressively
drop more packets as the attack rate increases, until the rate reaches
the Maximum rate. The firewall stops dropping the ICMP packets if
the incoming rate drops below the Activate threshold. Range is 1
to 2,000,000; default is 10,000. Set
the threshold just above the zone’s peak CPS rate to avoid throttling
legitimate traffic and adjust the threshold as needed. | |
Maximum (connections/sec) | Enter the maximum number of ICMP packets
(not matching an existing session) that the zone receives per second
before packets exceeding the maximum are dropped. Range is 1 to
2,000,000; default is 40,000. Set
the threshold to 80-90% of firewall capacity, taking into account
other features that consume firewall resources. | |
SCTP INIT | NetworkNetwork ProfilesZone ProtectionFlood Protection (cont) | Select to enable protection against floods
of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation
(INIT) chunk. An INIT chunk cannot be bundled with other chunks,
so the packet is referred to as an SCTP INIT packet. |
Alarm Rate (connections/sec) | Enter the number of SCTP INIT packets (not matching
an existing session) that the zone receives per second that triggers
an attack alarm. Range is 0-2,000,000. Default per firewall model
is:
| |
Activate (connections/sec) | Enter the number of SCTP INIT packets (not matching
an existing session) that the zone receives per second before subsequent
SCTP INIT packets are dropped. The firewall uses an algorithm to progressively
drop more packets as the attack rate increases, until the rate reaches
the Maximum rate. The firewall stops dropping SCTP INIT packets
if the incoming rate drops below the Activate threshold. Range is
1 to 2,000,000. Default per firewall model is the same as for Alarm
Rate. | |
Maximum (connections/sec) | NetworkNetwork ProfilesZone ProtectionFlood Protection (cont) | Enter the maximum number of SCTP INIT packets
(not matching an existing session) that the zone receives per second
before packets exceeding the maximum are dropped. Range is 1 to
2,000,000. Default per firewall model is:
|
UDP | NetworkNetwork ProfilesZone ProtectionFlood Protection (cont) | Select to enable protection against UDP floods. |
Alarm Rate (connections/sec) | Enter the number of UDP packets (not matching an
existing session) that the zone receives per second that triggers
an attack alarm. Range is 0-2,000,000; default is 10,000. Set the threshold to 15-20% above the average
zone CPS rate to accommodate normal fluctuations and adjust the
threshold if you receive too many alarms. | |
Activate (connections/sec) | Enter the number of UDP packets (not matching an
existing session) that the zone receives per second that triggers
random dropping of UDP packets. The firewall uses an algorithm to
progressively drop more packets as the attack rate increases, until
the rate reaches the Maximum rate. The firewall stops dropping the
UDP packets if the incoming rate drops below the Activate threshold.
Range is 1 to 2,000,000; default is 10,000. Set
the threshold just above the zone’s peak CPS rate to avoid throttling
legitimate traffic and adjust the threshold as needed. | |
Maximum (connections/sec) | Enter the maximum number of UDP packets
(not matching an existing session) the zone receives per second
before packets exceeding the maximum are dropped. Range is 1 to
2,000,000; default is 40,000. Set
the threshold to 80-90% of firewall capacity, taking into account
other features that consume firewall resources. | |
ICMPv6 | NetworkNetwork ProfilesZone ProtectionFlood Protection (cont) | Select to enable protection against ICMPv6 floods. |
Alarm Rate (connections/sec) | Enter the number of ICMPv6 echo requests (pings
not matching an existing session) that the zone receives per second
that triggers an attack alarm. Range is 0-2,000,000; default is
10,000. Set the threshold to 15-20%
above the average zone CPS rate to accommodate normal fluctuations
and adjust the threshold if you receive too many alarms. | |
Activate (connections/sec) | Enter the number of ICMPv6 packets (not matching
an existing session) that the zone receives per second before subsequent
ICMPv6 packets are dropped. The firewall uses an algorithm to progressively
drop more packets as the attack rate increases, until the rate reaches
the Maximum rate. The firewall stops dropping the ICMPv6 packets
if the incoming rate drops below the Activate threshold. Range is
1 to 2,000,000; default is 10,000. Set
the threshold just above the zone’s peak CPS rate to avoid throttling
legitimate traffic and adjust the threshold as needed. | |
Maximum (connections/sec) | Enter the maximum number of ICMPv6 packets (not
matching an existing session) that the zone receives per second
before packets exceeding the maximum are dropped. Range is 1 to
2,000,000; default is 40,000. Set
the threshold to 80-90% of firewall capacity, taking into account
other features that consume firewall resources. | |
Other IP | NetworkNetwork ProfilesZone ProtectionFlood Protection (cont) | Select to enable protection against other
IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods. |
Alarm Rate (connections/sec) | Enter the number of other IP packets (non-TCP, non-ICMP,
non-ICMPv6, non-SCTP, and non-UDP packets) (not matching an existing
session) the zone receives per second that triggers an attack alarm. Range
is 0-2,000,000; default is 10,000. Set
the threshold to 15-20% above the average zone CPS rate to accommodate
normal fluctuations and adjust the threshold if you receive too
many alarms. | |
Activate (connections/sec) | Enter the number of other IP packets (non-TCP, non-ICMP,
non-ICMPv6, and non-UDP packets) (not matching an existing session)
the zone receives per second that triggers random dropping of other
IP packets. The firewall uses an algorithm to progressively drop
more packets as the attack rate increases, until the rate reaches
the Maximum rate. The firewall stops dropping the Other IP packets
if the incoming rate drops below the Activate threshold. Range is
1 to 2,000,000; default is 10,000. Set
the threshold just above the zone’s peak CPS rate to avoid throttling
legitimate traffic and adjust the threshold as needed. | |
Maximum (connections/sec) | Enter the maximum number of other IP packets (non-TCP,
non-ICMP, non-ICMPv6, and non-UDP packets) (not matching an existing
session) the zone receives per second before packets exceeding the maximum
are dropped. Range is 1 to 2,000,000; default is 40,000. Set the threshold to 80-90% of firewall
capacity, taking into account other features that consume firewall
resources. |