Aggregate vs. Classified DoS Protection Profiles

Overview

Palo Alto Networks firewalls provide robust Denial-of-Service (DoS) protection capabilities configured via DoS Protection Profiles applied to DoS Protection Policy rules ( Policies > DoS Protection ). A fundamental choice when creating a DoS Protection Profile ( Objects > Security Profiles > DoS Protection ) is selecting the profile type: Aggregate or Classified .

Choosing the correct profile type is crucial because it determines the scope and granularity of protection, impacting both security effectiveness and firewall resource consumption.

The primary goal of both profile types is to protect specific destination resources (servers, services) from being overwhelmed by excessive connection rates or SYN floods, but they achieve this with different levels of precision and resource overhead.
Understanding the fundamental difference in scope (total traffic vs. per-IP/pair) between Aggregate and Classified DoS profiles is a critical concept for the PCNSE exam.

Aggregate DoS Protection Profiles

An Aggregate DoS Protection profile applies its configured thresholds (Alarm, Activate, Maximum Rates for metrics like CPS - Connections Per Second) to the total combined traffic that matches the associated DoS Protection Policy rule.

How it Works:

Use Cases:

Configuration:

Key takeaway for Aggregate: One set of thresholds applied to the sum of all matching traffic. Action impacts all new matching sessions once the total threshold is breached. Lower resource consumption than Classified.

Classified DoS Protection Profiles

A Classified DoS Protection profile provides more granular protection by monitoring traffic and applying thresholds independently for specific entities within the overall traffic flow matching the DoS policy rule.

How it Works:

Use Cases:

Configuration:

Using source-ip-only or source-and-destination-ip classification in DoS policies applied to internet-facing zones (like Untrust) is generally not recommended . The potentially vast number of unique external source IPs can overwhelm the firewall's resources dedicated to tracking these classified states. Use destination-ip-only for protecting specific internal servers from external attacks.
Key takeaway for Classified: Separate thresholds per source, destination, or source-destination pair. Action impacts only the specific entity breaching its threshold. More granular but higher resource consumption. Be wary of using source-based classification on internet-facing rules.

Comparison Table: Aggregate vs. Classified

Feature Classified Profile Aggregate Profile
Scope of Protection Applies thresholds individually based on classification (Source IP, Destination IP, or Source-Destination Pair). Applies thresholds to the total combined traffic matching the policy rule.
Threshold Application Each classified entity has its own independent set of counters and thresholds. All matching traffic contributes to a single, shared set of counters and thresholds.
Mitigation Action Scope Action (e.g., RED, SYN Cookies) applies only to new sessions involving the specific entity that exceeded its threshold. Action applies to all new sessions matching the policy rule once the aggregate threshold is exceeded.
Primary Use Case Protecting specific critical hosts individually; identifying/mitigating specific abusive sources. Protecting groups of resources collectively; situations where overall load is the main concern.
Firewall Resource Consumption Higher (due to tracking state per classified entity). Can be very high if using source-based classification on internet traffic. Lower (only tracks aggregate state).
Configuration Complexity Slightly more complex due to classification choice. Simpler.
Recommended Internet-Facing Classification destination-ip-only (to protect specific internal servers). N/A (applies to aggregate).
Configuration Location Objects > Security Profiles > DoS Protection (Profile definition)
Policies > DoS Protection (Policy Rule application)
This table summarizes the key differences frequently tested on the PCNSE exam. Focus on Scope, Threshold Application, Action Scope, and Resource Consumption differences.

Best Practices for DoS Protection

Effective DoS protection requires understanding traffic patterns, choosing the right profile type (Aggregate vs. Classified), careful threshold tuning, and ongoing monitoring.

Diagrams: DoS Protection Concepts

Sequence Diagram: DoS Policy Processing

Sequence diagram illustrating how Aggregate and Classified DoS profiles are checked within a DoS Policy rule.


Flowchart: Aggregate vs. Classified Logic

Flowchart comparing the logic flow for Aggregate vs. Classified DoS protection.


Graph: Relationship between Components

Graph showing the relationships between DoS Policy Rules, DoS Profiles, thresholds, traffic, and logging.


State Diagram: DoS Protection State (Simplified CPS Threshold)

Simplified state diagram based on Connections Per Second (CPS) thresholds in a DoS profile (applies conceptually to Aggregate total or individual Classified entity).

PCNSE Exam Focus Points

Key concepts regarding Aggregate vs. Classified DoS Protection for the PCNSE exam:

Expect scenario questions asking you to choose between Aggregate and Classified based on a protection goal. Know the resource implications and recommended use cases for each classification type, especially regarding source-based classification.

Aggregate vs. Classified DoS Quiz (PCNSE Style)

Test your understanding of DoS Protection profile types.

1. Which DoS Protection profile type applies thresholds and actions based on the total combined traffic matching a DoS policy rule?

2. Which DoS Protection profile type maintains separate counters and applies thresholds independently for each unique source IP, destination IP, or source-destination pair?

3. You need to protect a farm of critical web servers (10.1.1.10 - 10.1.1.20) individually, applying SYN flood protection thresholds separately to each server. Which DoS profile configuration is most appropriate?

4. Which Classified Address type is generally NOT recommended for use in DoS policy rules applied to internet-facing zones due to high resource consumption?

5. An Aggregate DoS profile is configured with an Activate Rate of 1000 CPS for SYN floods. If the total SYN rate matching the associated DoS policy rule reaches 1200 CPS, what happens?

6. A Classified DoS profile (destination-ip-only) protects two servers, A and B. Server A's traffic exceeds its Activate Rate threshold, but Server B's traffic is below its thresholds. What action does the firewall take?

7. Where are DoS Protection Profiles created?

8. Where are DoS Protection Profiles applied to control traffic?

9. Which factor generally leads to higher resource consumption on the firewall?

10. What is the primary metric typically used for setting thresholds in DoS Protection profiles (both Aggregate and Classified)?

11. Can a single DoS Protection Policy rule reference both an Aggregate and a Classified DoS profile simultaneously?

12. When using a Classified DoS profile with 'destination-ip-only' classification, the thresholds apply to:

13. Which DoS Protection profile type is generally simpler to configure and manage?

14. If a DoS Policy rule has the action 'SYN Cookies' and an attached DoS Profile with SYN Flood thresholds, when are SYN Cookies employed?

15. A company wants to protect its single, critical public web server (1.1.1.1) from being overwhelmed by too many connections per second from any single source IP. Which approach is most suitable?

16. DoS Protection Profiles and Policies primarily aim to protect against:

17. Where are events triggered by DoS Protection policies logged?

18. What is a key first step in tuning DoS Protection thresholds effectively?

19. Which DoS profile type would be more suitable for protecting a DNS server where you want to limit the connection rate from any single client querying it, but allow a high total connection rate from many clients?

20. In the context of DoS Protection profiles, what does CPS typically stand for?