Table of Contents

Zone Defense Overview

Zone Protection profiles defend zones against flood, reconnaissance, packet-based, and non-IP-protocol-based attacks. Separately, DoS Protection profiles, used in DoS Protection policy rules, defend specific, critical devices against targeted flood and resource-based attacks. A Denial-of-Service (DoS) attack attempts to overload the network or targeted systems with large amounts of unwanted traffic to disrupt services.

Plan defenses against different DoS attack types:

There are no default Zone Protection or DoS Protection profiles/policies. Configuration should be based on the specific traffic characteristics of each zone and the criticality of devices within them.

Zone Defense Tools

Effective DoS defense requires a layered approach. Ideally, dedicated DDoS protection devices and perimeter routers/switches with ACLs handle large volumetric attacks before traffic reaches the firewall.

Palo Alto Networks firewalls provide granular layers of DoS protection:

Zone and DoS Protection only affect dataplane traffic, not traffic originating from the firewall's management interface.

How Do the Zone Defense Tools Work?

When a new packet arrives (doesn't match an existing session), the firewall processes it in the following order:

  1. Zone Protection Profile Check: The firewall checks the Zone Protection profile applied to the ingress zone. If the profile denies the packet based on aggregate flood thresholds, reconnaissance detection, packet anomalies, or protocol rules, the packet is dropped. If allowed, proceed to the next step. (Applies only to new sessions).
  2. DoS Protection Policy Rule Check: The firewall evaluates DoS Protection policy rules. If a matching rule with action 'Protect' is found, it checks the thresholds in the associated DoS Protection profile(s). If thresholds are exceeded, the packet may be dropped or the source blocked. If the action is 'Deny', the packet is dropped. If the action is 'Allow' or 'Protect' and thresholds aren't exceeded, proceed to the next step. (Applies only to new sessions).
  3. Security Policy Rule Check: The firewall performs a Security policy lookup. If a matching rule allows the traffic, a session is created. If no rule matches or the matching rule denies, the packet is dropped. (Applies to new sessions and determines ongoing treatment).
  4. Packet Buffer Protection Check: For packets belonging to existing sessions, Packet Buffer Protection monitors buffer usage globally and per-zone. If thresholds (based on utilization or latency) are exceeded, it may apply RED or block offending sessions/IPs.

Packet Flow Diagram (New Session)

flowchart TD A[Packet Arrives] --> B{Session Match?} B -- Yes --> K[Apply Existing Session Rules] B -- No --> C{Zone_Protection_Check_Ingress_Zone} C -- Deny --> D[Drop Packet] C -- Allow --> E{DoS_Policy_Check} E -- Deny --> D E -- Allow/Protect_Threshold_OK --> F{Security_Policy_Check} F -- Deny_No_Match --> D F -- Allow --> G[Create Session] G --> H[Apply_Security_Profiles_Vuln_AV_etc.] H --> I{Packet_Buffer_Check_Ongoing_for_Session} I -- OK --> J[Forward Packet] I -- Exceeds_Threshold --> L[Apply_RED_Block_Session] style D fill:#f99,stroke:#333,stroke-width:2px style G fill:#cfc,stroke:#333,stroke-width:2px style J fill:#cfc,stroke:#333,stroke-width:2px style L fill:#f99,stroke:#333,stroke-width:2px

This flowchart illustrates the decision-making process for a new incoming packet subject to Zone and DoS protection checks before a session is established.

Firewall Placement for DoS Protection

Firewalls are session-based and not designed for massive volumetric DDoS attacks (millions of CPS). Effective placement is crucial:

Baseline CPS Measurements for Setting Flood Thresholds

Effective flood protection requires setting appropriate thresholds based on normal and peak Connections Per Second (CPS) for your network. Default thresholds are generally too high and unsafe.

CPS Measurements to Take:

Measure over at least five business days, including any known peak periods (special events, quarterly closings, etc.). Understand firewall capacity limits.

How to Measure CPS:

Remember firewalls measure aggregate CPS in 10-second intervals, potentially missing short bursts within that window.

Configure specific Log Forwarding profiles for flood events to ensure timely alerts reach the correct administrators.

Zone Protection Profiles

Apply Zone Protection profiles ( Network > Network Profiles > Zone Protection ) to *each* zone to provide broad, aggregate defense at the zone ingress.

In addition to configuring zone protection and DoS protection, apply the best practice Vulnerability Protection profile to each Security policy rule to help defend against DoS attacks.

Flood Protection

Defends against SYN, ICMP, ICMPv6, UDP, and Other IP floods based on aggregate CPS entering the zone. Set three thresholds:

For SYN Floods, choose an Action:

When SYN Cookies is activated, the firewall does not honor TCP options like window size and MSS from the server during the handshake, potentially leading to fragmentation if the path MSS is smaller than the firewall's default.

Adjust default thresholds based on baseline measurements. Firewalls distribute thresholds across multiple dataplane processors (DPs).

Reconnaissance Protection

Defends against port scans (TCP/UDP) and host sweeps. Enable on all zones.

Packet-Based Attack Protection

Checks packet headers for anomalies and drops or strips options.

Protocol Protection

Controls non-IP protocols (based on Ethertype) on Layer 2 VLANs or Virtual Wires.

If you don’t configure Protocol Protection, the default intrazone-allow rule permits non-IP protocols between Layer 2 interfaces within the same zone.

Ethernet SGT Protection

For Cisco TrustSec integration. Allows dropping packets based on specific Layer 2 Security Group Tag (SGT) values found in 802.1Q headers (Ethertype 0x8909).

Packet Buffer Protection

Packet Buffer Protection defends your firewall and network from single session DoS attacks that can overwhelm the firewall’s packet buffer and cause legitimate traffic to drop. Although you don’t configure Packet Buffer Protection in a Zone Protection profile or in a DoS Protection profile or policy rule, Packet Buffer Protection defends ingress zones. While zone and DoS protection apply to new sessions (connections) and are granular, Packet Buffer Protection applies to existing sessions and is global.

You configure Packet Buffer Protection globally to protect the entire firewall and you also enable Packet Buffer Protection on each zone to protect zones:

You must enable Packet Buffer Protection globally in order for it to be active in zones.

There are two types of packet buffer protection:

Packet Buffer Protection Based on Buffer Utilization

This type (enabled by default) triggers based on the percentage of the packet buffer being used. Take baseline measurements using CLI commands like show running resource-monitor [day | hour | minute | second | week] or custom scripts.

If baseline usage is consistently high, the firewall might be undersized. Otherwise, tune thresholds carefully:

The firewall may also block a source IP if it rapidly creates many sessions, even if none individually trigger high buffer usage.

Packet Buffer Protection Based on Latency

Alternatively, trigger protection based on packet processing latency, which indicates congestion. This can mitigate issues before buffers become full, which is beneficial for latency-sensitive applications.

Block Hold Time and Block Duration function similarly as with utilization-based protection.

style H fill:#f99,stroke:#333,stroke-width:2px

packet buffer flow)

graph TD A[Packet Arrives: Existing Session] --> B{Global Activate Threshold Exceeded?} B -- No --> Z[Forward Packet Normally] B -- Yes --> C(Apply Global RED to Offending Sessions) C --> D{Per-Zone Protection Enabled for Packet's Zone?} D -- No --> Z_RED[Forward Packet if not dropped by RED] D -- Yes --> E{Is Session/IP currently Blocked? Block Duration Active?} E -- Yes --> X[Drop Packet - Blocked] E -- No --> F(Start/Continue Block Hold Timer for Offending Session/IP) F --> G{Block Hold Timer Expired?} G -- Yes --> H[Block Session/IP for Block Duration] H --> X G -- No --> Z_RED style Z fill:#cfc,stroke:#333,stroke-width:2px style Z_RED fill:#cfc,stroke:#333,stroke-width:2px style X fill:#f99,stroke:#333,stroke-width:2px

DoS Protection Profiles and Policy Rules

DoS Protection provides granular defense for specific critical resources (servers, services) against session floods, complementing the broader Zone Protection.

In addition to configuring DoS protection and zone protection, apply the best practice Vulnerability Protection profile to each Security policy rule to help defend against DoS attacks.

Classified Versus Aggregate DoS Protection

A single DoS policy rule can reference one Aggregate profile AND one Classified profile. The Aggregate profile is checked first. If both are applied, the firewall enforces both limits, potentially blocking based on the aggregate limit first, or blocking an individual device based on the classified limit even if the aggregate limit isn't reached.

DoS Protection Profiles

( Objects > Security Profiles > DoS Protection > Add )

DoS Protection Policy Rules

( Policies > DoS Protection > Add )

Zone Defense - Key Concepts Memorization Aid

Overall Goal: Protect network zones and critical resources from various DoS attacks using a layered approach .


Critical Setup Step: Effective Flood thresholds (Zone & DoS) require baselining normal/peak Connections Per Second (CPS).

Order of Operations (New Packet): Zone Protection Check -> DoS Policy Check -> Security Policy Check -> Session Creation.

📝 Zone Defense Interactive Quiz

1. Which Zone Defense tool provides the first layer of protection against aggregate flood attacks entering an ingress zone?

2. Which type of DoS Protection profile applies thresholds individually to each device matching the associated policy rule?

3. For an internet-facing zone, what Address classification method should generally be used in a Classified DoS Protection policy rule to protect internal servers?

4. Which feature specifically protects the firewall itself from being overwhelmed by single, abusive sessions consuming excessive buffer space?

5. What is the recommended 'Action' setting for SYN Flood protection in a Zone Protection Profile as a starting point, assuming an upstream DDoS device exists?

6. Reconnaissance Protection in a Zone Protection Profile primarily defends against which two activities?

7. What is the primary difference between a Zone Protection Profile and a DoS Protection Profile/Policy?

8. The 'Activate Rate' threshold in flood protection settings typically determines when the firewall should:

9. Which Packet-Based Attack Protection option is specifically recommended for internal zones to prevent traffic originating from unexpected internal networks?

10. What type of protection within a Zone Protection Profile is used to control non-IP traffic based on Ethertype values on Layer 2 segments?

11. If a firewall is correctly sized, what should typically cause a large, sustained spike in packet buffer utilization?

12. In Packet Buffer Protection, what happens when the 'Block Hold Time' expires after the 'Activate' threshold has been triggered?

13. What is the primary goal of setting Resource Protection limits (max concurrent sessions) in a DoS Protection Profile?

14. When using Panorama Device Monitoring or certain CLI commands to baseline CPS, what adjustment might be needed for the reported values?

15. What is the recommended best practice for applying Zone Protection Profiles?

16. Which Zone Defense tool is evaluated *last* for a new incoming packet before a session is established?

17. Which type of list (Include or Exclude) is generally recommended for configuring non-IP Protocol Protection for better security?

18. What is the purpose of the 'Exclude List' within Reconnaissance Protection settings?

19. If you apply both an Aggregate and a Classified DoS profile to the same DoS policy rule, which profile's threshold check is performed first by the firewall?

20. Which Zone Defense mechanism uses Random Early Drop (RED) or SYN Cookies to mitigate attacks?