Best Practices for Securing Your Network from Layer 4 and
Layer 7 Evasions
To monitor and protect your network from most Layer 4 and Layer 7 attacks, here are a few recommendations.
- Set up the firewall to act as a DNS proxy and enable evasion signatures:
- When acting as a DNS proxy, the firewall resolves DNS requests and caches hostname-to-IP address mappings to quickly and efficiently resolve future DNS queries.
- Evasion signatures that detect crafted HTTP or TLS requests can send alerts when clients connect to a domain other than the domain specified in the original DNS request. Make sure to configure DNS proxy before you enable evasion signatures. Without DNS proxy, evasion signatures can trigger alerts when a DNS server in the DNS load balancing configuration returns different IP addresses—for servers hosting identical resources—to the firewall and client in response to the same DNS request.
- For servers, create Security policy rules to allow only the application(s) that you sanction on each server. Verify that the standard port for the application matches the listening port on the server. For example, to ensure that only SMTP traffic is allowed to your email server, set the Application tosmtpand set the Service toapplication-default. If your server uses only a subset of the standard ports (for example, if your SMTP server uses only port 587 while the SMTP application has standard ports defined as 25 and 587), create a new custom service that includes only port 587 and use that new service in your security policy rule instead of application-default. Additionally, make sure you restrict access to specific source and destinations zones and sets of IP addresses.
- Block all unknown applications and traffic using the Security policy. Typically, the only applications classified as unknown traffic are internal or custom applications on your network and potential threats. Unknown traffic can be either non-compliant applications or protocols that are anomalous or abnormal or it can be known applications that are using non-standard ports, both of which should be blocked. See Manage Custom or Unknown Applications.
- Create a Zone Protection profile that is configured to protect against packet-based attacks ():NetworkNetwork ProfilesZone Protection
- Select the option to dropMalformedIP packets ().Packet Based Attack ProtectionIP Drop
- Enable the dropMismatched overlapping TCP segmentoption ().Packet Based Attack ProtectionTCP DropBy deliberately constructing connections with overlapping but different data in them, attackers attempt to cause misinterpretation of the intent of the connection and deliberately induce false positives or false negatives. Attackers also use IP spoofing and sequence number prediction to intercept a user's connection and inject their own data into that connection. Selecting theMismatched overlapping TCP segmentoption specifies that PAN-OS discards frames with mismatched and overlapping data. Received segments are discarded when they are contained within another segment, when they overlap with part of another segment, or when they contain another complete segment.
- Enable the dropTCP SYN with Dataand dropTCP SYNACK with Dataoptions ().Packet Based Attack ProtectionTCP DropDropping SYN and SYN-ACK packets that contain data in the payload during a three-way handshake increases security by blocking malware contained in the payload and preventing it from extracting unauthorized data before the TCP handshake is completed.
- Strip TCP timestamps from SYN packets before the firewall forwards the packet ().Packet Based Attack ProtectionTCP DropWhen you enable theStrip TCP Options - TCP Timestampoption, the TCP stack on both ends of the TCP connection will not support TCP timestamps. This prevents attacks that use different timestamps on multiple packets for the same sequence number.
- If you configure IPv6 addresses on your network hosts, be sure to enable support for IPv6 if not already enabled (NetworkInterfacesEthernet> IPv6).Enabling support for IPv6 allows access to IPv6 hosts and also filters IPv6 packets encapsulated in IPv4 packets, which prevents IPv6 over IPv4 multicast addresses from being leveraged for network reconnaissance.
- Enable support for multicast traffic so that the firewall can enforce policy on multicast traffic ().NetworkVirtual RouterMulticast
- Disable theAllow HTTP partial response().DeviceSetupContent-IDContent-ID SettingsThe HTTP partial response option allows a client to fetch only part of a file. When a next-generation firewall in the path of a transfer identifies and drops a malicious file, it terminates the TCP session with an RST packet. If the web browser implements the HTTP header range option, it can start a new session to fetch only the remaining part of the file, which prevents the firewall from triggering the same signature again due to the lack of context into the initial session and, at the same time, allows the web browser to reassemble the file and deliver the malicious content. Disabling this option prevents this from happening.Disabling this option should not impact device performance. However, HTTP file transfer interruption recovery may be impaired. In addition, disabling this option can impact streaming media services, such as Netflix, Windows Server Updates Services (WSUS), and Palo Alto Networks content updates.
- Create a Vulnerability Protection Profile that blocks protocol anomalies and all vulnerabilities with low and high severities.A protocol anomaly occurs when a protocol behavior deviates from standard and compliant usage. For example, a malformed packet, poorly written application, or an application running on a non-standard port would all be considered protocol anomalies, and could be used as evasion tools.If yours is a mission-critical network, where the business’s highest priority is application availability, you should begin by alerting on protocol anomalies for a period of time to ensure that no critical internal applications are using established protocols in a non-standard way. If you find that certain critical applications trigger protocol anomaly signatures, you can then exclude those applications from protocol anomaly enforcement. To do this, add another rule to the Vulnerability Protection Profile that whitelists protocol anomalies and attach the profile to the security policy rule that enforces traffic to and from the critical applications.Make sure that Vulnerability Protection Profile rules and security policy rules that whitelist protocol anomalies for critical internal applications are listed above rules that block protocol anomalies. Traffic is evaluated against security policy rules and associated Vulnerability Protection Profiles rules from top to bottom, and is enforced based on the first matching rule.
- Begin by alerting on protocol anomalies:Create a Vulnerability Protection Profile rule with theActionset to Alert, theCategoryset to protocol-anomaly, and theSeverityset to Any. Monitor your traffic to determine if any critical internal applications are using established protocols in non-standard ways. If you find this to be true, continue to whitelist protocol anomalies for those applications, and then block protocol anomalies for all other applications.
- Block protocol anomalies:Create a Vulnerability Protection Profile rule with theCategoryset to protocol-anomaly, the ruleActionset to Reset Both, and theSeverityset to Any.
- Optionally whitelist protocol anomalies for critical applications that use established protocols in a non-standard way. To do this, create a Vulnerability Protection Profile rule that allows protocol anomalies: set the ruleActionto Allow, theCategoryto protocol-anomaly, and theSeverityto any. Attach the Vulnerability Protection Profile rule to the security policy rule that enforces traffic to and from critical applications.
- Add another rule to the Vulnerability Protection profile to block all vulnerabilities with low and higher severity. This rule must be listed after the rule that blocks protocol anomalies.
- Continue to attach the following security profiles to your Security policy rules to provide signature-based protection:
- An Anti-Spyware profile to block all spyware with severity low and higher.
- An Antivirus profile to block all content that matches an antivirus signature.
Deploy DoS and Zone Protection Using Best Practices
DoS and Zone Protection deployment best practices help to ensure a smooth rollout that protects your network and your most critical servers. ...
Threat Signature Categories
Threat Signatures There are three types of Palo Alto Networks threat signatures, each designed to detect different types of threats as the firewall scans network ...
Deploy Data Center Best Practices
If you’re already familiar with Palo Alto Networks’ platform, this checklist streamlines deploying security best practices in your data center to safeguard your most valuable ...
Create Best Practice Security Profiles for the Internet Gat...
Use these File Blocking settings as a best practice at your internet gateway. ...
Building Blocks in a Security Policy Rule
Building Blocks in a Security Policy Rule The following section describes each component in a Security policy rule . When you create a Security policy ...
Step 2: Create the Application Whitelist Rules
Step 2: Create the Application Whitelist Rules After you Identify Whitelist Applications you are ready to create the next part of the best practice internet ...
Packet-Based Attack Protection
Protect your network against bad IP, TCP, ICMP, IPv6, and ICMPv6 packets. ...
Actions in Security Profiles
Actions in Security Profiles The action specifies how the firewall responds to a threat event. Every threat or virus signature that is defined by Palo ...
Enable Evasion Signatures
Enable Evasion Signatures Palo Alto Networks evasion signatures detect crafted HTTP or TLS requests, and can alert to instances where a client connects to a ...