End-of-Life (EoL)
Actions in Security Profiles
The action specifies how the firewall responds to a
threat event. Every threat or virus signature that is defined by Palo
Alto Networks includes a default action, which is typically either
set to
Alert,
which informs you using the option
you have enabled for notification, or to Reset Both
,
which resets both sides of the connection. However, you can define
or override the action on the firewall. The following actions are
applicable when defining Antivirus profiles, Anti-Spyware profiles,
Vulnerability Protection profiles, custom spyware objects, custom
vulnerability objects, or DoS Protection profiles.Action | Description | Antivirus Profile | Anti-Spyware profile | Vulnerability Protection Profile | Custom Object—Spyware and Vulnerability | DoS Protection Profile |
---|---|---|---|---|---|---|
Default | Takes the default action that is specified
internally for each threat signature. For antivirus profiles,
it takes the default action for the virus signature. | ![]() | ![]() | ![]() | — | Random Early Drop |
Allow | Permits the application traffic. The Allow action does
not generate logs related to the signatures or profiles. | ![]() | ![]() | ![]() | ![]() | — |
Alert | Generates an alert for each application
traffic flow. The alert is saved in the threat log. | ![]() | ![]() | ![]() | ![]() | ![]() Generates
an alert when attack volume (cps) reaches the Alarm threshold set
in the profile. |
Drop | Drops the application traffic. | ![]() | ![]() | ![]() | ![]() | — |
Reset Client | For TCP, resets the client-side connection. For
UDP, the connection is dropped | ![]() | ![]() | ![]() | ![]() | — |
Reset Server | For TCP, resets the server-side connection. For
UDP, the connection is dropped | ![]() | ![]() | ![]() | ![]() | — |
Reset Both | For TCP, resets the connection on both client
and server ends. For UDP, the connection is dropped | ![]() | ![]() | ![]() | ![]() | — |
Block IP | Blocks traffic from either a source or a source-destination pair;
Configurable for a specified period of time. | — | ![]() | ![]() | ![]() | ![]() |
Sinkhole | This action directs DNS queries for malicious domains
to a sinkhole IP address. The action is available for Palo Alto
Networks DNS- signatures and for custom domains included in Objects
> External Dynamic Lists. | — | — | — | — | — |
Random Early Drop | Causes the firewall to randomly drop packets
when connections per second reach the Activate Rate threshold in
a DoS Protection profile applied to a DoS Protection rule. | — | — | — | — | ![]() |
SYN Cookies | Causes the firewall to generate SYN cookies
to authenticate a SYN from a client when connections per second
reach the Activate Rate Threshold in a DoS Protection profile applied
to a DoS Protection rule. | — | — | — | — | ![]() |
You cannot delete a profile that is used in a policy rule;
you must first remove the profile from the policy rule.
Recommended For You
Recommended Videos
Recommended videos not found.