Classified vs. Aggregate DoS Protection Profiles

Overview

Palo Alto Networks firewalls offer two types of DoS Protection profiles: Classified and Aggregate . Understanding the differences between these profiles is crucial for effectively protecting your network resources against Denial-of-Service (DoS) attacks.

Comparison Table

Feature Classified Profile Aggregate Profile
Scope of Protection Applies thresholds to individual IP addresses (source, destination, or both) Applies thresholds to the combined traffic matching the policy criteria
Use Case Protect critical individual devices (e.g., web servers, DNS servers) Protect groups of devices or services collectively
Threshold Application Each IP address has its own threshold counters All traffic shares a common threshold counter
Resource Consumption Higher, due to per-IP tracking Lower, as it tracks aggregate traffic
Configuration Complexity More granular and complex Simpler to configure
Recommended For Environments where specific hosts need individual protection Environments where collective protection is sufficient

Classified DoS Protection Profile

A Classified DoS Protection profile sets thresholds for each individual IP address. This is particularly useful for protecting critical devices that require dedicated protection. When configuring a Classified profile, you can specify the address type as:

It's important to note that using source-ip-only or src-dest-ip-both in internet-facing zones is not recommended due to the high number of unique IP addresses, which can lead to resource exhaustion.

Aggregate DoS Protection Profile

An Aggregate DoS Protection profile sets thresholds for all traffic matching the policy criteria collectively. This approach is suitable for protecting groups of devices or services where individual tracking is not necessary. The thresholds apply to the combined traffic, and once exceeded, mitigation actions are triggered for all traffic matching the policy.

Sequence Diagram: DoS Protection Workflow

sequenceDiagram
    participant Client
    participant Firewall
    participant Server

    Client->>Firewall: Initiates connection
    alt Classified Profile
        Firewall->>Firewall: Check per-IP thresholds
        alt Threshold exceeded
            Firewall-->>Client: Block connection
        else
            Firewall-->>Server: Allow connection
        end
    else Aggregate Profile
        Firewall->>Firewall: Check aggregate thresholds
        alt Threshold exceeded
            Firewall-->>Client: Block connection
        else
            Firewall-->>Server: Allow connection
        end
    end
    

Best Practices

References