The following table describes session settings.
Rematch Sessionsto cause the firewall to apply newly configured security policy rules to sessions that are already in progress. This capability is enabled by default. If this setting is disabled, any policy rule change applies to only those sessions initiated after the change was committed.
For example, if a Telnet session started while an associated policy rule was configured that allowed Telnet, and you subsequently committed a policy rule change to deny Telnet, the firewall applies the revised policy rule to the current session and blocks it.
Rematch Sessionsto apply your latest Security policy rules to currently active sessions.
ICMPv6 Token Bucket Size
Enter the bucket size for rate limiting of ICMPv6 error messages. The token bucket size is a parameter of the token bucket algorithm that controls how bursty the ICMPv6 error packets can be (range is 10 to 65,535 packets; default is 100).
ICMPv6 Error Packet Rate
Enter the average number of ICMPv6 error packets per second allowed globally through the firewall (range is 10 to 65,535; default is 100). This value applies to all interfaces. If the firewall reaches the ICMPv6 error packet rate, the ICMPv6 token bucket is used to enable throttling of ICMPv6 error messages.
Enable IPv6 Firewalling
To enable firewall capabilities for IPv6 traffic,
The firewall ignores all IPv6-based configurations if you do not enable IPv6 firewalling. Even if you enable IPv6 traffic on an interface, you must also enable the
IPv6 Firewallingoption for IPv6 firewalling to function.
Enable Jumbo Frame
Select to enable jumbo frame support on Ethernet interfaces. Jumbo frames have a maximum transmission unit (MTU) of 9,192 bytes and are available only on certain models.
If you enable jumbo frames and you have interfaces where the MTU is not specifically configured, those interfaces automatically inherit the jumbo frame size. Therefore, before you enable jumbo frames, if you have any interface on which you do not want to allow jumbo frames, you must set the MTU for that interface to 1,500 bytes or another value. To configure the MTU for the interface (
), see PA-7000 Series Layer 3 Interface.
DHCP Broadcast Session
If your firewall is acting as a DHCP server, select this option to enable session logs for DHCP broadcast packets. The DHCP Broadcast Session option enables generation of Enhanced Application Logs (EAL logs) for DHCP for use by IoT Security and other services. If you do not enable this option, the firewall forwards the packets without creating logs for the DHCP broadcast packets.
NAT64 IPv6 Minimum Network MTU
Enter the global MTU for IPv6 translated traffic. The default of 1,280 bytes is based on the standard minimum MTU for IPv6 traffic (range is 1,280 to 9,216).
NAT Oversubscription Rate
Select the DIPP NAT oversubscription rate, which is the number of times that the firewall can use the same translated IP address and port pair concurrently. Reducing the oversubscription rate decreases the number of source device translations but will provide higher NAT rule capacities.
ICMP Unreachable Packet Rate (per sec)
Define the maximum number of ICMP Unreachable responses that the firewall can send per second. This limit is shared by IPv4 and IPv6 packets.
Default value is 200 messages per second (range is 1 to 65,535).
Enables accelerated age-out of idle sessions.
Select this option to enable accelerated aging and specify the threshold (%) and scaling factor.
When the session table reaches the
Accelerated Aging Threshold(% full), PAN-OS applies the
Accelerated Aging Scaling Factorto the aging calculations for all sessions. The default scaling factor is 2, meaning that accelerated aging occurs at a rate twice as fast as the configured idle time. The configured idle time divided by 2 results in a faster timeout (one-half the time). To calculate the accelerated aging of a session, PAN-OS divides the configured idle time (for that type of session) by the scaling factor to determine a shorter timeout.
For example, if the scaling factor is 10, a session that would normally time out after 3,600 seconds will time out 10 times faster (in 1/10 of the time), which is 360 seconds.
Enable an accelerated aging threshold and set an acceptable scaling factor to free up session table space faster when the session table begins to fill up.
Packet Buffer Protection
Beginning in PAN-OS 10.0, Packet Buffer Protection is enabled by default globally and on each zone. As a best practice, keep packet buffer protection enabled globally and on each zone to protect the firewall buffers from DoS attacks and aggressive sessions and sources. This option protects the receive buffers on the firewall from attacks or abusive traffic that causes system resources to back up and legitimate traffic to get dropped. Packet buffer protection identifies offending sessions, uses Random Early Detection (RED) as a first line of defense, and discards the session or blocks the offending IP address if abuse continues. If the firewall detects many small sessions or rapid session creation (or both) from a particular IP address, it blocks that IP address.
Take baseline measurements of firewall packet buffer utilization to understand the firewall capacity and ensure that the firewall is properly configured so that only an attack causes a large spike in buffer usage.
Packet Buffer Protection (cont)
Packet Buffer Protection (cont)
Network Address Translation (NAT) can increase packet buffer utilization. If this affects the buffer utilization, reduce the Block Hold Time to block individual sessions faster and reduce the Block Duration so other sessions from the underlying IP address aren’t unduly penalized.
Multicast Route Setup Buffering
Select this option (disabled by default) to enable multicast route setup buffering, which allows the firewall to preserve the first packet in a multicast session when the multicast route or forwarding information base (FIB) entry does not yet exist for the corresponding multicast group. By default, the firewall does not buffer the first multicast packet in a new session; instead, it uses the first packet to set up the multicast route. This is expected behavior for multicast traffic. You only need to enable multicast route setup buffering if your content servers are directly connected to the firewall and your custom application cannot withstand the first packet in the session being dropped.
Multicast Route Setup Buffer Size
If you enable Multicast Route Setup Buffering, you can tune the buffer size, which specifies the buffer size per flow (range is 1 to 2,000; default is 1,000.) The firewall can buffer a maximum of 5,000 packets.
Recommended For You
Recommended videos not found.