🛡️ Palo Alto Networks Zone Protection: Flood Protection Explained

Zone Protection Profiles in Palo Alto Networks firewalls offer flood protection mechanisms to safeguard ingress zones against various types of flood attacks, such as SYN, UDP, ICMP, and other IP floods. This guide provides an in-depth explanation of flood protection, configuration thresholds, and mitigation actions like Random Early Drop (RED) and SYN Cookies.

1. Understanding Flood Protection

Flood attacks aim to overwhelm network resources by sending a high volume of traffic, leading to degraded performance or service outages. Palo Alto Networks' flood protection measures monitor the rate of new connections per second (CPS) and apply thresholds to detect and mitigate such attacks.

2. Configuring Flood Protection Thresholds

For each flood type (SYN, UDP, ICMP, etc.), administrators can set three thresholds:

Properly configuring these thresholds ensures effective protection without impacting legitimate traffic.

3. Mitigation Actions: RED vs. SYN Cookies

For SYN flood protection, administrators can choose between two mitigation actions:

Feature Random Early Drop (RED) SYN Cookies
Mechanism Probabilistically drops incoming SYN packets based on thresholds. Firewall acts as a proxy, completing the handshake on behalf of the server.
Impact on Legitimate Traffic May drop legitimate connections under high load. Preserves legitimate connections by only dropping incomplete handshakes.
Resource Consumption Lower resource usage. Higher CPU and memory usage due to proxying.
Use Case Environments with limited resources or where occasional drops are acceptable. Environments requiring high accuracy and minimal impact on legitimate traffic.

Choosing between RED and SYN Cookies depends on the specific network environment and resource availability.

4. Best Practices

5. Additional Resources