Layer 3 and Layer 4 Header Inspection in Palo Alto Networks Firewalls

Overview

Layer 3 (Network Layer) and Layer 4 (Transport Layer) header inspection allows Palo Alto Networks firewalls to analyze packet headers for anomalies and threats before establishing sessions. This proactive approach enhances security by detecting and mitigating potential attacks at the earliest stage of packet processing.

Zone Protection Integration

Zone Protection profiles can be configured to include Layer 3 and Layer 4 header inspection. This enables the firewall to:

To configure:

  1. Navigate to Network > Network Profiles > Zone Protection .
  2. Select or create a profile and enable L3 & L4 Header Inspection .
  3. Define custom rules with specific conditions and actions.
  4. Apply the profile to the desired security zone.

For detailed steps, refer to the official documentation: L3 & L4 Header Inspection .

Packet Buffer Protection Integration

While Packet Buffer Protection primarily focuses on preventing buffer exhaustion due to high traffic volumes, Layer 3 and Layer 4 header inspection complements it by identifying and mitigating malicious packets that could contribute to buffer overflows. By inspecting packet headers, the firewall can:

For more information on Packet Buffer Protection, visit: Packet Buffer Protection .

DoS Protection Integration

Denial-of-Service (DoS) Protection profiles can leverage Layer 3 and Layer 4 header inspection to:

To configure DoS Protection profiles with header inspection:

  1. Navigate to Objects > Security Profiles > DoS Protection .
  2. Create or edit a profile, specifying thresholds and actions.
  3. Apply the profile to a DoS Protection policy targeting the desired traffic.

Detailed guidance is available here: DoS Protection Profiles and Policy Rules .

Sequence Diagram: Packet Processing with Header Inspection

sequenceDiagram
    participant Client
    participant Firewall
    participant Server

    Client->>Firewall: Sends packet
    Firewall->>Firewall: Inspect L3/L4 headers
    alt Headers valid
        Firewall->>Firewall: Check security policies
        alt Policy allows
            Firewall->>Server: Forward packet
        else Policy denies
            Firewall-->>Client: Drop or reset connection
        end
    else Headers invalid
        Firewall-->>Client: Drop packet and log threat
    end
    

Best Practices for Layer 3 and Layer 4 Header Inspection

References