Skip to main content

Update a zone protection profile

PUT 

/zone-protection-profiles/:id

Update an existing zone protection profile.

Request

Path Parameters

    id uuidrequired

    The UUID of the configuration resource

Body

OK

    oneOf
    folder stringrequired

    Possible values: <= 64 characters, Value must match regular expression ^[a-zA-Z\d-_\. ]+$

    The folder in which the resource is defined

    name stringrequired

    Possible values: <= 31 characters

    The profile name

    description string

    Possible values: <= 255 characters

    The description of the profile

    flood object
    tcp_syn object
    oneOf
    alarm_rate int32required

    Possible values: <= 2000000

    When the flow exceeds the `alert_rate`` threshold, an alarm is generated.

    activate_rate int32required

    Possible values: <= 2000000

    When the flow exceeds the `activate_rate`` threshold, the firewall drops individual SYN packets randomly to restrict the flow.

    maximal_rate int32required

    Possible values: <= 2000000

    When the flow exceeds the maximal_rate threshold, 100% of incoming SYN packets are dropped.

    udp object
    enable boolean

    Enable protection against UDP floods?

    red object
    alarm_rate int32required

    Possible values: <= 2000000

    The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.

    activate_rate int32required

    Possible values: <= 2000000

    The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.

    maximal_rate int32required

    Possible values: <= 2000000

    The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.

    sctp_init object
    enable boolean

    Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?

    red object
    alarm_rate int32required

    Possible values: <= 2000000

    The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.

    activate_rate int32required

    Possible values: <= 2000000

    The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.

    maximal_rate int32required

    Possible values: <= 2000000

    The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.

    icmp object
    enable boolean

    Enable protection against ICMP floods?

    red object
    alarm_rate int32required

    Possible values: <= 2000000

    The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.

    activate_rate int32required

    Possible values: <= 2000000

    The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.

    maximal_rate int32required

    Possible values: <= 2000000

    The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.

    icmpv6 object
    enable boolean

    Enable protection against ICMPv6 floods?

    red object
    alarm_rate int32required

    Possible values: <= 2000000

    The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.

    activate_rate int32required

    Possible values: <= 2000000

    The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.

    maximal_rate int32required

    Possible values: <= 2000000

    The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.

    other_ip object
    enable boolean

    Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?

    red object
    alarm_rate int32required

    Possible values: <= 2000000

    activate_rate int32required

    Possible values: <= 2000000

    maximal_rate int32required

    Possible values: <= 2000000

    scan object[]
  • Array [
  • name stringrequired

    Possible values: [8001, 8002, 8003, 8006]

    The threat ID number. These can be found in Palo Alto Networks ThreatVault.

    • "8001" - TCP Port Scan
    • "8002" - Host Sweep
    • "8003" - UDP Port Scan
    • "8006" - Port Scan
    action object
    oneOf

    object

    interval int32

    Possible values: >= 2 and <= 65535

    threshold int32

    Possible values: >= 2 and <= 65535

  • ]
  • scan_white_list object[]
  • Array [
  • name stringrequired

    A descriptive name for the address to exclude.

  • ]
  • spoofed_ip_discard boolean

    Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.

    strict_ip_check boolean

    Check that both conditions are true:

    • The source IP address is not the subnet broadcast IP address of the ingress interface.
    • The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
    fragmented_traffic_discard boolean

    Discard fragmented IP packets.

    strict_source_routing_discard boolean

    Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.

    loose_source_routing_discard boolean

    Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.

    timestamp_discard boolean

    Discard packets with the Timestamp IP option set.

    record_route_discard boolean

    Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.

    security_discard boolean

    Discard packets if the security option is defined.

    stream_id_discard boolean

    Discard packets if the Stream ID option is defined.

    unknown_option_discard boolean

    Discard packets if the class and number are unknown.

    malformed_option_discard boolean

    Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.

    mismatched_overlapping_tcp_segment_discard boolean

    Drop packets with mismatched overlapping TCP segments.

    tcp_handshake_discard boolean

    Drop packets with split handshakes.

    tcp_syn_with_data_discard boolean

    Default value: true

    Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.

    tcp_synack_with_data_discard boolean

    Default value: true

    Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.

    reject_non_syn_tcp string

    Possible values: [global, yes, no]

    Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:

    • global — Use system-wide setting that is assigned through the CLI.
    • yes — Reject non-SYN TCP.
    • no — Accept non-SYN TCP.
    asymmetric_path string

    Possible values: [global, drop, bypass]

    Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:

    • global — Use system-wide setting that is assigned through TCP Settings or the CLI.
    • drop — Drop packets that contain an asymmetric path.
    • bypass — Bypass scanning on packets that contain an asymmetric path.
    tcp_timestamp_strip boolean

    Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.

    tcp_fast_open_and_data_strip boolean

    Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.

    mptcp_option_strip string

    Possible values: [no, yes, global]

    Default value: global

    MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:

    • no — Enable MPTCP support (do not strip the MPTCP option).
    • yes — Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.
    • global — Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
    icmp_ping_zero_id_discard boolean

    Discard packets if the ICMP ping packet has an identifier value of 0.

    icmp_frag_discard boolean

    Discard packets that consist of ICMP fragments.

    icmp_large_packet_discard boolean

    Discard ICMP packets that are larger than 1024 bytes.

    discard_icmp_embedded_error boolean

    Discard ICMP packets that are embedded with an error message.

    suppress_icmp_timeexceeded boolean

    Stop sending ICMP TTL expired messages.

    suppress_icmp_needfrag boolean

    Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.

    ipv6 object
    routing_header_0 boolean

    Drop packets with type 0 routing header.

    routing_header_1 boolean

    Drop packets with type 1 routing header.

    routing_header_3 boolean

    Drop packets with type 3 routing header.

    routing_header_4_252 boolean

    Drop packets with type 4 to type 252 routing header.

    routing_header_253 boolean

    Drop packets with type 253 routing header.

    routing_header_254 boolean

    Drop packets with type 254 routing header.

    routing_header_255 boolean

    Drop packets with type 255 routing header.

    ipv4_compatible_address boolean

    Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.

    filter_ext_hdr object
    hop_by_hop_hdr boolean

    Discard IPv6 packets that contain the Hop-by-Hop Options extension header.

    routing_hdr boolean

    Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.

    dest_option_hdr boolean

    Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.

    options_invalid_ipv6_discard boolean

    Discard IPv6 packets that contain invalid IPv6 options in an extension header.

    reserved_field_set_discard boolean

    Discard IPv6 packets that have a header with a reserved field not set to zero.

    anycast_source boolean

    Discard IPv6 packets that contain an anycast source address.

    needless_fragment_hdr boolean

    Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.

    icmpv6_too_big_small_mtu_discard boolean

    Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.

    ignore_inv_pkt object
    dest_unreach boolean

    Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.

    pkt_too_big boolean

    Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.

    time_exceeded boolean

    Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.

    param_problem boolean

    Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.

    redirect boolean

    Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.

    non_ip_protocol object
    list_type string

    Possible values: [exclude, include]

    Specify the type of list you are creating for protocol protection:

    • Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
    • Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
    protocol object[]
  • Array [
  • name stringrequired

    Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.

    ether_type stringrequired

    Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:

    enable boolean

    Enable the Ethertype code on the list.

  • ]
  • l2_sec_group_tag_protection object
    tags object[]
  • Array [
  • name stringrequired

    Name for the list of Security Group Tags (SGTs).

    tag stringrequired

    The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).

    enable boolean

    Enable this exclude list for Ethernet SGT protection.

  • ]

Responses

OK

Loading...