Packet Buffer Protection Overview

Packet Buffer Protection defends your firewall and network from single session DoS attacks that can overwhelm the firewall’s packet buffer and cause legitimate traffic to drop. Although you don’t configure Packet Buffer Protection in a Zone Protection profile or in a DoS Protection profile or policy rule, Packet Buffer Protection defends ingress zones.

While zone and DoS protection apply to new sessions (connections) and are granular, Packet Buffer Protection applies to existing sessions and is global in its monitoring, with per-zone enforcement options.

Packet Buffer Protection involves two configuration levels:

You must enable Packet Buffer Protection globally in order for it to be active in zones.

There are two methods to trigger packet buffer protection:

Protection Based on Buffer Utilization

Packet Buffer Protection based on buffer utilization is enabled by default. It monitors the percentage of the firewall's packet buffer being used.

Take baseline measurements of firewall packet buffer utilization over a significant period (at least one business week, preferably longer) to understand typical usage. Use the operational CLI command:

show running resource-monitor [day | hour | minute | second | week]

This command provides a snapshot. For continuous monitoring and anomaly detection, consider using an automated script (sample potentially available from Palo Alto Networks, but unsupported).

If baseline measurements consistently show abnormally high packet buffer utilization, the firewall might be undersized. Consider resizing the firewall deployment. Otherwise, carefully tune thresholds to prevent buffer overflow without dropping legitimate traffic.

Overrunning the firewall packet buffer negatively impacts the firewall’s packet forwarding capabilities for all traffic , as no packets can enter the firewall on any interface when buffers are full.

Buffer Utilization Thresholds

Best practices for setting thresholds:

In addition to blocking individual sessions, Packet Buffer Protection can also block an entire IP address for the configured Block Duration if the firewall detects that source IP rapidly creating many small sessions that wouldn't individually trigger utilization limits but collectively strain the buffer.

Source Network Address Translation (NAT) can make a single external IP address appear responsible for high buffer utilization. If this occurs, consider reducing the Block Hold Time (to block abusive individual sessions faster) and reducing the Block Duration (to avoid penalizing the shared NAT IP for too long).

Protection Based on Latency

As an alternative to buffer utilization, you can trigger packet buffer protection based on packet latency introduced by dataplane buffering, which indicates congestion.

This method mitigates head-of-line blocking and can trigger protection before latency-sensitive protocols or applications (like VoIP or video conferencing) are noticeably affected. Use this method if your network carries significant latency-sensitive traffic.

Latency Thresholds

Packet buffer protection based on latency involves setting these thresholds:

The Block Hold Time and Block Duration settings function the same way for latency-based protection as they do for utilization-based protection, determining when and for how long entire sessions are blocked at the zone level after the Latency Activate threshold is crossed.

Configuration Summary

Packet Buffer Protection requires configuration at two levels:

  1. Global Configuration:
    • Navigate to Device > Setup > Session Settings .
    • Under "Packet Buffer Protection", choose either Utilization or Latency as the trigger.
    • Configure the corresponding global thresholds ( Alert , Activate for utilization; Latency Alert , Latency Activate , Latency Max Tolerate for latency).
    • Ensure the "Enable" checkbox for Packet Buffer Protection is checked globally.
  2. Per-Zone Configuration:
    • Navigate to Network > Zones .
    • Select the zone you want to protect.
    • Check the Enable Packet Buffer Protection box for this zone.
    • Configure the zone-specific Block Hold Time (seconds).
    • Configure the zone-specific Block Duration (seconds).
    • Repeat for each ingress zone requiring this protection.

Remember, per-zone settings only take effect if Packet Buffer Protection is also enabled globally.

Start with default values for thresholds, monitor system logs and resource utilization, and tune the settings based on your network's specific baseline and requirements.

Diagrams

Packet Buffer Protection Flow (Utilization Based)

Illustrates the process for Packet Buffer Protection based on buffer utilization, showing global actions (alert, RED) and per-zone actions (block hold, block session).

Illustrates the process for Packet Buffer Protection based on buffer utilization, showing global actions (alert, RED) and per-zone actions (block hold, block session).

Packet Buffer Protection Flow (Latency Based)

Illustrates the process for Packet Buffer Protection based on packet latency, showing global actions (alert, RED) and per-zone actions (block hold, block session).

Illustrates the process for Packet Buffer Protection based on packet latency, showing global actions (alert, RED) and per-zone actions (block hold, block session).

Packet Buffer Protection Quiz

Test your understanding of Packet Buffer Protection. Select the best answer for each question.

1. What is the primary target of Packet Buffer Protection?

Correct Answer: B. Packet Buffer Protection specifically defends against attacks where existing, established sessions overwhelm the firewall's packet buffer, distinct from Zone/DoS protection which primarily handles floods of new connection attempts. Relevance: PCNSE/PCNSA, Core Concept

2. Where must Packet Buffer Protection be enabled for per-zone settings to take effect?

Correct Answer: B. Global enablement is mandatory for the feature to function. Per-zone enablement then allows for specific block hold/duration settings for that zone's traffic when global thresholds are met. Relevance: Critical, Gotcha

3. What action does the firewall take GLOBALLY when the Packet Buffer Utilization 'Activate' threshold is crossed?

Correct Answer: C. The initial global response upon hitting the Activate threshold is to start dropping packets via RED from the sessions consuming the most buffer space. Blocking entire sessions is a per-zone action triggered later. Relevance: PCNSE/PCNSA, Core Concept

4. What is the purpose of the 'Block Hold Time' setting in per-zone Packet Buffer Protection?

Correct Answer: B. The Block Hold Time is a grace period specific to the zone. Once global RED starts due to high buffer usage/latency, this timer begins for offending sessions in the zone. If the session continues to offend for this duration, the zone blocks the entire session. Relevance: PCNSE/PCNSA, Configuration Setting

5. Which operational CLI command is used to view recent resource monitor statistics, including packet buffer utilization?

Correct Answer: C. The `show running resource-monitor` command provides historical data (day, hour, minute, etc.) for various resources, including packet buffer utilization percentage. Relevance: Important, CLI Command

6. When might using Packet Buffer Protection based on Latency be preferable to using it based on Buffer Utilization?

Correct Answer: C. Latency-based protection triggers mitigation based on packet delay, potentially activating before high buffer utilization significantly impacts real-time applications like VoIP or video conferencing. Relevance: Important, Use Case

7. What does the 'Latency Max Tolerate' threshold signify in latency-based Packet Buffer Protection?

Correct Answer: C. This threshold represents the upper bound where packet latency is considered unacceptable, causing the firewall to apply the most aggressive RED packet dropping. Relevance: Configuration Setting

8. How can heavy use of source NAT impact Packet Buffer Protection based on utilization?

Correct Answer: B. Many internal clients hiding behind one source NAT IP can collectively cause high buffer usage attributed to that single IP. If PBP blocks the IP based on rapid session creation or aggregate usage, it affects all users behind that NAT IP. Tuning Block Hold/Duration may be needed. Relevance: Gotcha, Interaction

9. If the packet buffer utilization drops below the 'Activate' threshold before the 'Block Hold Time' expires, what happens?

Correct Answer: C. The Block Hold Timer is conditional on the Activate threshold remaining crossed. If the condition clears (buffer usage or latency drops), the timer resets, and the session avoids being blocked by the zone PBP for that instance. Relevance: Core Concept

10. Packet Buffer Protection is configured within which part of the PAN-OS interface?

Correct Answer: D. Global settings are under Device > Setup > Session, while per-zone enablement and block timers are configured within each Zone object under Network > Zones. It's separate from DoS and Zone Protection profiles. Relevance: Configuration Location

11. What is the primary consequence if a firewall's packet buffers become completely full?

Correct Answer: C. A full packet buffer prevents the firewall from accepting any new incoming packets on any interface, leading to widespread traffic disruption, not just on the interface experiencing the attack. Relevance: Critical, Impact

12. Packet Buffer Protection primarily operates at which stage of traffic processing?

Correct Answer: D. PBP monitors the resource consumption (buffer space or induced latency) of existing, established sessions and takes action based on that state, distinguishing it from protections applied at initial connection setup. Relevance: Core Concept

13. What is the default value for the Packet Buffer Utilization 'Activate' threshold?

Correct Answer: C. The default global Activate threshold for utilization-based PBP is 80%. Relevance: Default Value

14. Which action can Packet Buffer Protection take against a source IP address (not just a session)?

Correct Answer: B. The documentation states PBP can block an IP address for the configured Block Duration if it detects the IP rapidly creating sessions, even if individual sessions aren't excessively large. Relevance: PCNSE/PCNSA, Feature Detail

15. What is the recommended first action when configuring PBP thresholds?

Correct Answer: C. Palo Alto Networks generally recommends starting with default settings, establishing a baseline understanding of normal network behavior, and then carefully tuning thresholds if necessary. Relevance: Best Practice, Important

16. Does Packet Buffer Protection require a specific subscription license?

Correct Answer: C. Packet Buffer Protection is a fundamental part of the PAN-OS platform's defense mechanisms and does not require an additional subscription license. Relevance: Licensing

17. When PBP blocks an entire session (per-zone action), what determines how long the session remains blocked?

Correct Answer: C. After the 'Block Hold Time' expires for an offending session in a protected zone, the session is blocked for the length of time specified by the per-zone 'Block Duration' setting. Relevance: Configuration Setting

18. PBP helps mitigate "single session DoS attacks". What does this typically mean?

Correct Answer: C. This refers to attacks that leverage already established connections to flood the firewall's buffers, rather than overwhelming it with new connection attempts. PBP is designed to detect and mitigate this behavior within existing sessions. Relevance: Core Concept

19. The global PBP 'Alert' threshold (utilization-based) requires the threshold to be exceeded for how long before logging an alert?

Correct Answer: C. The documentation specifies that for the utilization-based Alert threshold, the condition must persist for more than 10 seconds before the firewall generates the System log entry. Relevance: Feature Detail

20. Is Packet Buffer Protection configured within a Zone Protection Profile?

Correct Answer: B. Packet Buffer Protection is distinct from Zone Protection Profiles. It's managed globally under Session Settings and enabled per Zone object, not within the profile applied to the zone. Relevance: Configuration Location, Core Concept
Please answer all questions before submitting.