Configure Reconnaissance Protection
Focus
Focus

Configure Reconnaissance Protection

Table of Contents

Configure Reconnaissance Protection

Prevent attackers from probing your network for vulnerabilities by configuring reconnaissance protection for IP protocol scan, UDP and TCP scans, and host sweeps.
Where Can I Use This?
What Do I Need?
  • NGFW (Cloud Managed)
  • NGFW (PAN-OS or Panorama Managed)
For cloud-managed NGFWs:
Malicious actors use various scanning techniques, including port scans (TCP and UDP), host sweeps
, and IP protocol scans,
to identify and exploit network vulnerabilities. To protect your network against these scans, configure the Reconnaissance Protection settings of a Zone Protection profile. For each scan type, you will specify an action and the conditions that trigger the action. For example, you can
block
subsequent packets from an untrusted source if the firewall detects
1000
IP protocol
scan events from that source within
60
seconds.
The following actions are supported for each scan:
  • Allow
    —The firewall allows the port scan, host sweep
    , or IP protocol scan
    reconnaissance to continue.
  • (
    Default
    )
    Alert
    —The firewall generates an alert for each port scan, host sweep
    , or IP protocol scan
    that matches the configured threshold within the specified time interval.
  • Block
    —The firewall drops all subsequent packets from the source to the destination for the remainder of the specified time interval.
  • Block IP
    —The firewall drops all subsequent packets for the specified
    Duration
    , in seconds (the range is 1-3,600).
    Track By
    determines whether the firewall blocks source or source-and-destination traffic.

Cloud Management

Configure reconnaissance protection for IP protocol scan, UDP and TCP scans, and host sweeps on Strata Cloud Manager.
You can configure protection against IP protocol scan, UDP or TCP scans, or host sweeps for next-generation firewalls managed with Strata Cloud Manager.
  1. Configure Reconnaissance Protection.
    1. Select
      Manage
      Configuration
      NGFW and
      Prisma Access
      Device Settings
      Zones
      .
    2. Select or
      Add a Zone
      .
      If you add a zone:
      • Enter a
        Name
        for the zone.
      • Select an
        Interface Type
        .
      • Add
        or
        Remove
        Interfaces.
    3. Select or
      Create a New
      Zone Protection Profile.
      If you add a new Zone Protection profile:
      • Enter a
        Name
        for the profile.
      • (
        Optional
        ) Add a profile description.
      • Configure
        Flood
        ,
        Packet Based Attack
        ,
        Protocol
        , or
        EthernetSGT
        settings.
    4. Select
      Reconnaissance
      and under Items,
      Enable
      the scan types to protect against.
    5. For each scan, select an
      Action
      .
      If you select
      Block-IP
      , you must also configure the
      Track-By
      (source or source-and-destination) and
      Duration
      options.
    6. For each scan, specify an
      Interval (Sec)
      .
      This option defines the time interval, in seconds, for detection of the given scan type.
    7. For each scan, specify a
      Threshold (Events)
      .
      The threshold defines the number of events that must be detected within the specified interval before the specified action triggers.
    8. (
      Optional
      ) Configure the Source Address Exclusion List.
      Source Address Exclusions are IP addresses that you want to exclude from reconnaissance protection. You can specify up to 20 IP addresses or netmask address objects.
      1. Click
        Add
        to create a new entry.
      2. Enter a descriptive
        Name
        for the address.
      3. Select an
        Address Type
        .
      4. Specify one or more
        IP Address(es)
        .
    9. Click
      Add
      to save the Zone Protection profile.
  2. Save
    the Zone.
  3. Push Config
    .

PAN-OS

PAN-OS: Prevent attackers from probing your network for vulnerabilities by configuring reconnaissance protection.
  1. Configure Reconnaissance Protection.
    1. Select
      Network
      Network Profiles
      Zone Protection
      .
    2. Select a Zone Protection profile, or
      Add
      a new profile and enter a
      Name
      for it.
    3. On the Reconnaissance Protection tab, select the scan types to protect against.
    4. Select an
      Action
      for each scan.
      If you select Block IP, you must also configure the
      Track By
      (source or source-and-destination) and
      Duration
      options.
    5. Set the
      Interval
      in seconds. This option defines the time interval for port scan, host sweep
      , and IP protocol scan
      detection.
    6. Set the
      Threshold
      for reconnaissance events. The threshold defines the number of port scan, host sweep
      , or IP protocol scan
      events that need to occur within the specified time interval to trigger an action.
    7. (
      Optional
      ) Configure a Source Address Exclusion.
      Source Address Exclusions are IP addresses that you want to exclude from reconnaissance protection. You can specify up to 20 IP addresses or netmask address objects.
      Exclude only IP addresses for trusted internal groups that perform vulnerability testing.
      1. Add
        the address you want to exclude.
      2. Enter a descriptive
        Name
        for the address.
      3. For Address Type, select either
        IPv4
        or
        IPv6
        , and then select an address object or enter one manually.
      4. Click
        OK
        .
    8. Click
      OK
      to save the Zone Protection profile.
    9. Commit
      your changes.
  2. Apply the Zone Protection profile to the appropriate zones, including zones that connect to the internet.

Recommended For You