Video Tutorial: How To Set Up DoS Protection

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ก.ย. 2024

ความคิดเห็น • 24

  • @programmingjava3724
    @programmingjava3724 5 ปีที่แล้ว

    when configure source zone why we do not have zone trust and why you have configure untrust zone from source

  • @nileshpardeshi6279
    @nileshpardeshi6279 5 ปีที่แล้ว

    very good video, please do keep posting such contents

  • @venkatc2393
    @venkatc2393 2 ปีที่แล้ว

    how to find offending IP's blocked by DOS policy ??

  • @sanjaysehgal7788
    @sanjaysehgal7788 2 ปีที่แล้ว

    what is the difference when we configure DOS Protection and zone protection

  • @microuploader
    @microuploader 3 ปีที่แล้ว

    If I apply dos protection for published service, which zone/ip address should be indicated for destination zone/ip. mapped ip or real public ip ?

    • @PANgurus
      @PANgurus 3 ปีที่แล้ว +1

      All rules use pre-NAT IP addresses and post-NAT zones, so the DoS policy would have the public IP and the internal zone as destination

  • @akeemskynet9274
    @akeemskynet9274 5 ปีที่แล้ว

    nice content. what tool did you use for setting this protection up in the video ?

    • @PaloAltoNetworksLiveCommunity
      @PaloAltoNetworksLiveCommunity  5 ปีที่แล้ว

      Hi Akeem, thank you for your comment ! The DoS protection in this video was set up on a Palo Alto Networks Firewall (VM-100). The recording was done using Camtasia. Cheers !

  • @ohvblue
    @ohvblue 6 ปีที่แล้ว

    As I just started looking at this, whats the best way to monitor DoS related sessions? Would it show up under Traffic rule name and dropped or protected?

    • @PaloAltoNetworksLiveCommunity
      @PaloAltoNetworksLiveCommunity  6 ปีที่แล้ว +1

      You will need to look in the threat logs, as DoS events are attacks

    • @ohvblue
      @ohvblue 6 ปีที่แล้ว

      @@PaloAltoNetworksLiveCommunity awesome. I'll work with default values and tweak as needed.

    • @Erickim003
      @Erickim003 4 ปีที่แล้ว

      @@PaloAltoNetworksLiveCommunity Can we see log at Monitor > alarm when sessions are reach at alarm value ( default 10,000 CPS) ?

  • @on4cgd
    @on4cgd 7 ปีที่แล้ว +1

    Kim Wens rocks.

  • @ashokreddyb7867
    @ashokreddyb7867 4 ปีที่แล้ว

    Have you inadvertently chosen source as untrust or do we have to apply DoS on untrust?? or is your source zone name is Untrust?? Confusing....

    • @brewst43
      @brewst43 4 ปีที่แล้ว +2

      You would want to protect your internal assets from a dos attack. So the source of the attack would be coming from untrust and going to trust. This is assuming your untrust zone is the internet and your trust is the lan you are trying to protect.

    • @ashokreddyb7867
      @ashokreddyb7867 4 ปีที่แล้ว

      @@brewst43 thank you bro. This dispelled the doubt.

    • @ashokreddyb7867
      @ashokreddyb7867 4 ปีที่แล้ว

      @@brewst43 yet I've another doubt. What if a purpotrator sits inside the LAN (Trusted) and tries to malign things... In that case don't we have to apply Dos to that interface? Reply is appreciated.

    • @brewst43
      @brewst43 4 ปีที่แล้ว +1

      @@ashokreddyb7867 you could set up another rule that has source zone and dest zone set as trust. This prevents systems in the lan from dosing each other. I wouldn't worry to much about that unless the users try to dos each other. If you want more detailed help, hit me up on Reddit. Add "user/HollowSavant" after the reddit.com portion without quotes. Hit chat on the right side under the picture. Currently configuring a pa200 for my home. Managed a 5k series at work.

    • @ashokreddyb7867
      @ashokreddyb7867 4 ปีที่แล้ว

      @@brewst43 Thank you bro for the replay again.

  • @hisashit6689
    @hisashit6689 4 ปีที่แล้ว

    Why are Packet Protection and Zone Protection disabled by default?

    • @mdabdulmoiz
      @mdabdulmoiz 3 ปีที่แล้ว

      because you need to define your own limit according to your traffic then enable it.

  • @RESCHER4444
    @RESCHER4444 3 ปีที่แล้ว +3

    Nice IP grabber link XD!

  • @wildyato3737
    @wildyato3737 3 ปีที่แล้ว

    Lol why old router doesn't have that rules 🤣