{"id":139,"date":"2022-04-25T07:31:32","date_gmt":"2022-04-25T11:31:32","guid":{"rendered":"https:\/\/opentextbc.ca\/paloalto\/chapter\/deal-with-bad-actors\/"},"modified":"2023-11-28T19:04:34","modified_gmt":"2023-11-29T00:04:34","slug":"deal-with-bad-actors","status":"publish","type":"chapter","link":"https:\/\/opentextbc.ca\/paloalto\/chapter\/deal-with-bad-actors\/","title":{"raw":"2.2 Deal with Bad Actors","rendered":"2.2 Deal with Bad Actors"},"content":{"raw":"<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n \t<li>Restrict certain websites<\/li>\n \t<li>Deal with DoS floods<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox\">\n\n<strong>Prerequisites<\/strong>:\n<ul>\n \t<li>SNAT for the Internet<\/li>\n \t<li>Security policy for Inside to Outside<\/li>\n \t<li>Interface configuration<\/li>\n \t<li>Knowledge of previous labs<\/li>\n<\/ul>\n<\/div>\n<div class=\"textbox shaded\">\n\n<strong>Scenario<\/strong>: In this lab, we will learn how to block a specific website and how to prevent script kiddies from succeeding with the infinite ping tool they downloaded from the sketchiest site you've ever seen. Kali acts like an attacker machine and we are going to attack the firewall through port Ethernet1\/2. Then, we'll enable DoS Prevention in the firewall to prevent attacks.\n\n<\/div>\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1164\"]<img class=\"wp-image-105 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2022\/04\/2022-04-23-00-07-28-image.png\" alt=\"Main scenario\" width=\"1164\" height=\"604\"> Figure 2.6: Main scenario[\/caption]\n<table class=\"grid\" style=\"border-collapse: collapse; width: 100%; height: 107px;\" border=\"0\"><caption>Table 2.3: Addressing Table<\/caption>\n<tbody>\n<tr style=\"height: 15px;\">\n<th style=\"width: 50%; height: 15px;\" scope=\"col\">Device<\/th>\n<th style=\"width: 50%; height: 15px;\" scope=\"col\">Configuration<\/th>\n<\/tr>\n<tr style=\"height: 47px;\">\n<td style=\"width: 50%; height: 47px;\">PaloAlto-1<\/td>\n<td style=\"width: 50%; height: 47px;\">management: 192.168.0.1\/24\nEthernet1\/1: 10.0.0.1\/24\nEthernet1\/2: DHCP<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Client (webterm)<\/td>\n<td style=\"width: 50%; height: 15px;\">eth0: 10.0.0.2\/24 GW: 10.0.0.1\u00a0DNS: 8.8.8.8<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Management (webterm)<\/td>\n<td style=\"width: 50%; height: 15px;\">eth0: 192.168.0.2\/24<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">KaliLinux2019-3-1<\/td>\n<td style=\"width: 50%; height: 15px;\">eth0: DHCP<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table class=\"grid\" style=\"border-collapse: collapse; width: 100%;\" border=\"0\"><caption>Table 2.4: Zone Configuration<\/caption>\n<tbody>\n<tr>\n<th style=\"width: 50%;\" scope=\"col\">Zone<\/th>\n<th style=\"width: 50%;\" scope=\"col\">Interfaces<\/th>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">Inside<\/td>\n<td style=\"width: 50%;\">Ethernet1\/1<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">Outside<\/td>\n<td style=\"width: 50%;\">Ethernet1\/2<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 style=\"page-break-before: always;\">Create a URL Category<\/h2>\nUnder<strong> object &gt; custom objects &gt; URL category<\/strong>, click <strong>Add<\/strong>. Click cancel on the pop-up.\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-106 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-21-06-image.png\" alt=\"Create a Custom URL Category\" width=\"1026\" height=\"830\"> Figure 2.7: Create a Custom URL Category[\/caption]\n<p style=\"page-break-before: always;\">Here we can block 5, 6, or multiple sites. But here we will use just 1. Give it a name, then click <strong>Add<\/strong>.<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-107 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/1-1.jpg\" alt=\"Add a CustomURL Category\" width=\"1026\" height=\"830\"> Figure 2.8: Add a CustomURL Category[\/caption]\n\nEnter some websites you would like to block. Here I have added a sample website <a href=\"https:\/\/www.thegreattechadventure.com\">(www.thegreattechadventure.com)<\/a> you can also use wildcards if you want.\n\nAfter you're done. Click <strong>OK<\/strong>.\n<h2 style=\"page-break-before: always;\">Block a Website<\/h2>\nUnder <strong>Policies &gt; Security<\/strong>. Click <strong>Add<\/strong>:\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-91 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/NAT3.jpg\" alt=\"Add a security policy\" width=\"1026\" height=\"830\"> Figure 2.9: Add a security policy[\/caption]\n<p style=\"page-break-before: always;\">Under the source tab, add the Inside zone under the source zone:<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-108 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-28-image.png\" alt=\"Add a Source Zone\" width=\"1026\" height=\"830\"> Figure 2.10: Add a Source Zone[\/caption]\n<p style=\"page-break-before: always;\">Under the destination tab, add the Outside zone under the destination zone:<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-109 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-53-image.png\" alt=\"Add a Destination Zone\" width=\"1026\" height=\"830\"> Figure 2.11: Add a Destination Zone[\/caption]\n<p style=\"page-break-before: always;\">Under the <strong>Service\/URL<\/strong> Category tab, add the created URL category you created in the previous step.<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-621 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2-1.jpg\" alt=\"Assign URL Category\" width=\"1026\" height=\"830\"> Figure 2.12: Assign URL Category[\/caption]\n<p style=\"page-break-before: always;\">Under the actions page, set the action to deny.<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-111 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec2.jpg\" alt=\"Set an Action to Deny\" width=\"1026\" height=\"830\"> Figure 2.13: Set an Action to Deny[\/caption]\n\nThen click <strong>OK<\/strong>.\n<h2 style=\"page-break-before: always;\">Enable Block Pages<\/h2>\nUnder <strong>Device &gt; Response pages<\/strong>. Click on Disabled beside Application Block Page.\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-112 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec3.jpg\" alt=\"Enabling Application Block Page\" width=\"1026\" height=\"830\"> Figure 2.14: Enabling Application Block Page[\/caption]\n<p style=\"page-break-before: always;\">Tick on the enable checkbox, then press <strong>OK<\/strong>.<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-113 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-38-58-image.png\" alt=\"Enabling Application Block Page\" width=\"1026\" height=\"830\"> Figure 2.15: Enabling Application Block Page[\/caption]\n\nMake sure to commit your changes!\n<h2 style=\"page-break-before: always;\">Test the Blocked URL<\/h2>\nOpen up Firefox on the Client machine, and try to connect to the URL you blocked. If all is right, you should see a blocked page.\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"400\"]<img class=\"wp-image-114\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-41-38-image.png\" alt=\"Application Block Page\" width=\"400\" height=\"324\"> Figure 2.16: Application Block Page[\/caption]\n\nIf you see this page, that is alright too!\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"400\"]<img class=\"wp-image-115\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-42-15-image.png\" alt=\"Application Block Page\" width=\"400\" height=\"324\"> Figure 2.17: Application Block Page[\/caption]\n<h2 style=\"page-break-before: always;\">Set Up Kali to Be a Bad Actor<\/h2>\nAfter entering into the live graphical environment and testing for internet connection. Open up the terminal.\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-116 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-44-16-image.png\" alt=\"Open up Terminal in Kali\" width=\"1026\" height=\"830\"> Figure 2.18: Open up Terminal in Kali[\/caption]\n\nWe will be using <a href=\"https:\/\/github.com\/GinjaChris\/pentmenu\">Pentmenu by GinjaChris<\/a> to demonstrate a flood. Run these commands to download and run the application:\n<div class=\"textbox shaded\"><span style=\"color: #000000;\"><code>#git clone https:\/\/github.com\/GinjaChris\/pentmenu<\/code><\/span>\n<span style=\"color: #000000;\"><code>#cd pentmenu<\/code><\/span>\n<span style=\"color: #000000;\"><code>#chmod +x pentmenu<\/code><\/span>\n<span style=\"color: #000000;\"><code>#.\/pentmenu<\/code><\/span><\/div>\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-117 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-56-14-image.png\" alt=\"PentMenu app\" width=\"1026\" height=\"830\"> Figure 2.19: PentMenu app[\/caption]\n<p style=\"page-break-before: always;\">Select option 2 for DoS attack.<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-118 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-05-image.png\" alt=\"PentMenu app - Select DOS(2)\" width=\"1026\" height=\"830\"> Figure 2.20: PentMenu app - Select DoS (2)[\/caption]\n<p style=\"page-break-before: always;\">Select option 1 for ICMP Echo Flood.<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-119 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-43-image.png\" alt=\"PentMenu app - Select ICMP Echo Flood(1)\" width=\"1026\" height=\"830\"> Figure 2.21: PentMenu app - Select ICMP Echo Flood(1)[\/caption]\n<p style=\"page-break-before: always;\">For the IP, use the IP of the interface in the outside zone. It should be in the 192.168.122.0\/24 range.<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1819\"]<img class=\"wp-image-120 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec4.jpg\" alt=\"PentMenu app - Enter Target IP address\" width=\"1819\" height=\"794\"> Figure 2.22: PentMenu app - Enter Target IP address[\/caption]\n<p style=\"page-break-before: always;\">Select r for random IP address.<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-121 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-01-02-image.png\" alt=\"PentMenu app - Enter r for random IP address\" width=\"1026\" height=\"829\"> Figure 2.23: PentMenu app - Enter r for random IP address[\/caption]\n\nAfter about 2 seconds, press <strong>Ctrl+C.<\/strong>\n<h2 style=\"page-break-before: always;\">Analyze the ICMP Flood<\/h2>\nBack on the Management machine, go under <strong>Monitor &gt; Session browser<\/strong>.\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-122 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-05-43-image.png\" alt=\" Verify session logs\" width=\"1026\" height=\"830\"> Figure 2.24: Verify session logs[\/caption]\n\nAs you can see, there are many entries here for ping. We want to prevent floods like these.\n<h2 style=\"page-break-before: always;\">Create a DoS Protection Profile<\/h2>\nUnder <strong>Objects &gt; Security Profiles &gt; DoS Protection<\/strong>. Click Add.\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-123 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec5.jpg\" alt=\" Create a DOS Protection\" width=\"1026\" height=\"830\"> Figure 2.25: Create a DoS Protection[\/caption]\n<p style=\"page-break-before: always;\">Set the type to Classified and under Flood protection, click the checkbox on the <strong>SYN Flood<\/strong>, <strong>UDP Flood<\/strong>, and <strong>ICMP Flood<\/strong> tabs.<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-124 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec6.2.jpg\" alt=\"SYN Flood Protection\" width=\"1026\" height=\"830\"> Figure 2.26: SYN Flood Protection[\/caption]\n\nAfter that, click <strong>OK<\/strong>.\n<h2 style=\"page-break-before: always;\">Apply the DoS Protection Profile<\/h2>\nUnder <strong>Policies &gt; Dos Protection<\/strong>. Click <strong>Add<\/strong>.\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-125 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec7.jpg\" alt=\" Add a DoS Protection Rule\" width=\"1026\" height=\"830\"> Figure 2.27: Add a DoS Protection Rule[\/caption]\n<p style=\"page-break-before: always;\">Under the Source tab, add the Outside zone.<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-126 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-13-35-image.png\" alt=\"Add the Source Zone\" width=\"1026\" height=\"830\"> Figure 2.28: Add the Source Zone[\/caption]\n<p style=\"page-break-before: always;\">Under the Destination tab, add the Inside zone.<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-127 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-14-15-image.png\" alt=\"Add the Destination Zone\" width=\"1026\" height=\"830\"> Figure 2.29: Add the Destination Zone[\/caption]\n\nUnder the <strong>Option\/Protection<\/strong> tab, configure these settings:\n<table class=\"grid\" style=\"border-collapse: collapse; width: 100%; height: 120px;\" border=\"0\"><caption>Table 2.5: DoS Rule Protection Configuration<\/caption>\n<tbody>\n<tr style=\"height: 15px;\">\n<th style=\"width: 50%; height: 15px;\" scope=\"col\">Parameter<\/th>\n<th style=\"width: 50%; height: 15px;\" scope=\"col\">Value<\/th>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Action<\/td>\n<td style=\"width: 50%; height: 15px;\">Protect<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Schedule<\/td>\n<td style=\"width: 50%; height: 15px;\">None<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Log Forwarding<\/td>\n<td style=\"width: 50%; height: 15px;\">None<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Aggregate<\/td>\n<td style=\"width: 50%; height: 15px;\">None<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Classified<\/td>\n<td style=\"width: 50%; height: 15px;\"><em>Tick this box<\/em><\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Profile<\/td>\n<td style=\"width: 50%; height: 15px;\"><em>The name of the one you created<\/em><\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Address<\/td>\n<td style=\"width: 50%; height: 15px;\">source-IP-only<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-128 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-17-49-image.png\" alt=\"DoS Rule - Option\/Policies\" width=\"1026\" height=\"830\"> Figure 2.30: DoS Rule - Option\/Policies[\/caption]\n\nThen click <strong>OK<\/strong>.\n<h2 style=\"page-break-before: always;\">Create a Zone Protection Profile<\/h2>\nUnder <strong>Network &gt; Network Profiles &gt; Zone Protection<\/strong>. Click <strong>Add<\/strong>.\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-129 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec8.jpg\" alt=\"Add a Zone Protection\" width=\"1026\" height=\"830\"> Figure 2.31: Add a Zone Protection[\/caption]\n<p style=\"page-break-before: always;\">Under the flood protection tab, tick <strong>SYN<\/strong>, <strong>ICMP<\/strong>, and <strong>UDP<\/strong>.<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-130 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-18-37-image.png\" alt=\"Add a Flood Protection\" width=\"1026\" height=\"830\"> Figure 2.32: Add a Flood Protection[\/caption]\n<p style=\"page-break-before: always;\">Under the Reconnaissance Protection tab, tick enables on all boxes, and change the action to block.<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-131 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-20-40-image.png\" alt=\"Set UDP Port Scan\" width=\"1026\" height=\"830\"> Figure 2.33: Set UDP Port Scan[\/caption]\n<p style=\"page-break-before: always;\">Under the Packet Based Attack Protection tab, under the IP drop subtab, tick on <strong>Spoofed IP address<\/strong> and <strong>Strict IP Address<\/strong> Check.<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-132 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-23-19-image.png\" alt=\"Enable Spoof IP address and Strict Address Check\" width=\"1026\" height=\"830\"> Figure 2.34: Enable Spoof IP address and Strict Address Check[\/caption]\n<p style=\"page-break-before: always;\">Under the Packet Based Attack Protection tab, under the TCP drop subtab, tick on <strong>TCP SYN with Data<\/strong> and <strong>TCP SYNACK with Data<\/strong>.<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-133 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-24-19-image.png\" alt=\"Enable TCP SYN with Data\" width=\"1026\" height=\"830\"> Figure 2.35: Enable TCP SYN with Data[\/caption]\n<p style=\"page-break-before: always;\">Under the Packet Based Attack Protection tab, under the ICMP drop subtab, tick on<strong> ICMP Ping ID 0<\/strong>,<strong> ICMP Fragment<\/strong>, and <strong>ICMP Large Packet(&gt;1024).<\/strong><\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-134 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-25-24-image.png\" alt=\"Enable ICMP Ping ID 0, ICMP Fragment\" width=\"1026\" height=\"830\"> Figure 2.36: Enable ICMP Ping ID 0, ICMP Fragment[\/caption]\n\nThen click <strong>OK<\/strong>.\n<h2 style=\"page-break-before: always;\">Apply a Zone Protection Profile<\/h2>\nUnder <strong>Network &gt; Zones<\/strong>. Click on the Outside Zone.\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1024\"]<img class=\"wp-image-135 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec9.jpg\" alt=\"Create an Outside zone\" width=\"1024\" height=\"769\"> Figure 2.37: Create an Outside zone[\/caption]\n<p style=\"page-break-before: always;\">Under the Zone Protection category, select the profile you just created.<\/p>\n\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-136 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec10.jpg\" alt=\"Enable Zone Protection under Outside Zone\" width=\"1026\" height=\"830\"> Figure 2.38: Enable Zone Protection under Outside Zone[\/caption]\n\nClick <strong>OK<\/strong>.\n\nDon't forget to commit your changes!\n<h2 style=\"page-break-before: always;\">Test the DoS Protection<\/h2>\nRun Pentmenu again using the previous options, then <strong>Ctrl+C<\/strong> after 3 seconds.\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"400\"]<img class=\"wp-image-137\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-06-image.png\" alt=\"Running PentMenu\" width=\"400\" height=\"323\"> Figure 2.39: Running PentMenu[\/caption]\n\nUnder <strong>Monitor &gt; Logs &gt; Threat<\/strong>. You should see an entry for an ICMP flood.\n\n[caption id=\"attachment_138\" align=\"aligncenter\" width=\"400\"]<img class=\"wp-image-138\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-49-image.png\" alt=\"Verify logs\" width=\"400\" height=\"324\"> Figure 2.40: Verify logs[\/caption]","rendered":"<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li>Restrict certain websites<\/li>\n<li>Deal with DoS floods<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox\">\n<p><strong>Prerequisites<\/strong>:<\/p>\n<ul>\n<li>SNAT for the Internet<\/li>\n<li>Security policy for Inside to Outside<\/li>\n<li>Interface configuration<\/li>\n<li>Knowledge of previous labs<\/li>\n<\/ul>\n<\/div>\n<div class=\"textbox shaded\">\n<p><strong>Scenario<\/strong>: In this lab, we will learn how to block a specific website and how to prevent script kiddies from succeeding with the infinite ping tool they downloaded from the sketchiest site you&#8217;ve ever seen. Kali acts like an attacker machine and we are going to attack the firewall through port Ethernet1\/2. Then, we&#8217;ll enable DoS Prevention in the firewall to prevent attacks.<\/p>\n<\/div>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1164px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-105 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2022\/04\/2022-04-23-00-07-28-image.png\" alt=\"Main scenario\" width=\"1164\" height=\"604\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2022\/04\/2022-04-23-00-07-28-image.png 1164w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2022\/04\/2022-04-23-00-07-28-image-300x156.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2022\/04\/2022-04-23-00-07-28-image-1024x531.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2022\/04\/2022-04-23-00-07-28-image-768x399.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2022\/04\/2022-04-23-00-07-28-image-65x34.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2022\/04\/2022-04-23-00-07-28-image-225x117.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2022\/04\/2022-04-23-00-07-28-image-350x182.png 350w\" sizes=\"auto, (max-width: 1164px) 100vw, 1164px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.6: Main scenario<\/figcaption><\/figure>\n<table class=\"grid\" style=\"border-collapse: collapse; width: 100%; height: 107px;\">\n<caption>Table 2.3: Addressing Table<\/caption>\n<tbody>\n<tr style=\"height: 15px;\">\n<th style=\"width: 50%; height: 15px;\" scope=\"col\">Device<\/th>\n<th style=\"width: 50%; height: 15px;\" scope=\"col\">Configuration<\/th>\n<\/tr>\n<tr style=\"height: 47px;\">\n<td style=\"width: 50%; height: 47px;\">PaloAlto-1<\/td>\n<td style=\"width: 50%; height: 47px;\">management: 192.168.0.1\/24<br \/>\nEthernet1\/1: 10.0.0.1\/24<br \/>\nEthernet1\/2: DHCP<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Client (webterm)<\/td>\n<td style=\"width: 50%; height: 15px;\">eth0: 10.0.0.2\/24 GW: 10.0.0.1\u00a0DNS: 8.8.8.8<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Management (webterm)<\/td>\n<td style=\"width: 50%; height: 15px;\">eth0: 192.168.0.2\/24<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">KaliLinux2019-3-1<\/td>\n<td style=\"width: 50%; height: 15px;\">eth0: DHCP<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table class=\"grid\" style=\"border-collapse: collapse; width: 100%;\">\n<caption>Table 2.4: Zone Configuration<\/caption>\n<tbody>\n<tr>\n<th style=\"width: 50%;\" scope=\"col\">Zone<\/th>\n<th style=\"width: 50%;\" scope=\"col\">Interfaces<\/th>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">Inside<\/td>\n<td style=\"width: 50%;\">Ethernet1\/1<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\">Outside<\/td>\n<td style=\"width: 50%;\">Ethernet1\/2<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 style=\"page-break-before: always;\">Create a URL Category<\/h2>\n<p>Under<strong> object &gt; custom objects &gt; URL category<\/strong>, click <strong>Add<\/strong>. Click cancel on the pop-up.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-106 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-21-06-image.png\" alt=\"Create a Custom URL Category\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-21-06-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-21-06-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-21-06-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-21-06-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-21-06-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-21-06-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-21-06-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.7: Create a Custom URL Category<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Here we can block 5, 6, or multiple sites. But here we will use just 1. Give it a name, then click <strong>Add<\/strong>.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-107 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/1-1.jpg\" alt=\"Add a CustomURL Category\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/1-1.jpg 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/1-1-300x243.jpg 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/1-1-1024x828.jpg 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/1-1-768x621.jpg 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/1-1-65x53.jpg 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/1-1-225x182.jpg 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/1-1-350x283.jpg 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.8: Add a CustomURL Category<\/figcaption><\/figure>\n<p>Enter some websites you would like to block. Here I have added a sample website <a href=\"https:\/\/www.thegreattechadventure.com\">(www.thegreattechadventure.com)<\/a> you can also use wildcards if you want.<\/p>\n<p>After you&#8217;re done. Click <strong>OK<\/strong>.<\/p>\n<h2 style=\"page-break-before: always;\">Block a Website<\/h2>\n<p>Under <strong>Policies &gt; Security<\/strong>. Click <strong>Add<\/strong>:<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-91 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/NAT3.jpg\" alt=\"Add a security policy\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/NAT3.jpg 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/NAT3-300x243.jpg 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/NAT3-1024x828.jpg 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/NAT3-768x621.jpg 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/NAT3-65x53.jpg 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/NAT3-225x182.jpg 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/NAT3-350x283.jpg 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.9: Add a security policy<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Under the source tab, add the Inside zone under the source zone:<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-108 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-28-image.png\" alt=\"Add a Source Zone\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-28-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-28-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-28-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-28-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-28-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-28-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-28-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.10: Add a Source Zone<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Under the destination tab, add the Outside zone under the destination zone:<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-109 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-53-image.png\" alt=\"Add a Destination Zone\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-53-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-53-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-53-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-53-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-53-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-53-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-33-53-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.11: Add a Destination Zone<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Under the <strong>Service\/URL<\/strong> Category tab, add the created URL category you created in the previous step.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-621 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2-1.jpg\" alt=\"Assign URL Category\" width=\"1026\" height=\"830\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.12: Assign URL Category<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Under the actions page, set the action to deny.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-111 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec2.jpg\" alt=\"Set an Action to Deny\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec2.jpg 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec2-300x243.jpg 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec2-1024x828.jpg 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec2-768x621.jpg 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec2-65x53.jpg 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec2-225x182.jpg 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec2-350x283.jpg 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.13: Set an Action to Deny<\/figcaption><\/figure>\n<p>Then click <strong>OK<\/strong>.<\/p>\n<h2 style=\"page-break-before: always;\">Enable Block Pages<\/h2>\n<p>Under <strong>Device &gt; Response pages<\/strong>. Click on Disabled beside Application Block Page.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-112 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec3.jpg\" alt=\"Enabling Application Block Page\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec3.jpg 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec3-300x243.jpg 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec3-1024x828.jpg 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec3-768x621.jpg 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec3-65x53.jpg 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec3-225x182.jpg 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec3-350x283.jpg 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.14: Enabling Application Block Page<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Tick on the enable checkbox, then press <strong>OK<\/strong>.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-113 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-38-58-image.png\" alt=\"Enabling Application Block Page\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-38-58-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-38-58-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-38-58-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-38-58-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-38-58-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-38-58-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-38-58-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.15: Enabling Application Block Page<\/figcaption><\/figure>\n<p>Make sure to commit your changes!<\/p>\n<h2 style=\"page-break-before: always;\">Test the Blocked URL<\/h2>\n<p>Open up Firefox on the Client machine, and try to connect to the URL you blocked. If all is right, you should see a blocked page.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-114\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-41-38-image.png\" alt=\"Application Block Page\" width=\"400\" height=\"324\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-41-38-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-41-38-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-41-38-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-41-38-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-41-38-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-41-38-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-41-38-image-350x283.png 350w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.16: Application Block Page<\/figcaption><\/figure>\n<p>If you see this page, that is alright too!<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-115\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-42-15-image.png\" alt=\"Application Block Page\" width=\"400\" height=\"324\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-42-15-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-42-15-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-42-15-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-42-15-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-42-15-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-42-15-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-42-15-image-350x283.png 350w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.17: Application Block Page<\/figcaption><\/figure>\n<h2 style=\"page-break-before: always;\">Set Up Kali to Be a Bad Actor<\/h2>\n<p>After entering into the live graphical environment and testing for internet connection. Open up the terminal.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-116 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-44-16-image.png\" alt=\"Open up Terminal in Kali\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-44-16-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-44-16-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-44-16-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-44-16-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-44-16-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-44-16-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-44-16-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.18: Open up Terminal in Kali<\/figcaption><\/figure>\n<p>We will be using <a href=\"https:\/\/github.com\/GinjaChris\/pentmenu\">Pentmenu by GinjaChris<\/a> to demonstrate a flood. Run these commands to download and run the application:<\/p>\n<div class=\"textbox shaded\"><span style=\"color: #000000;\"><code>#git clone https:\/\/github.com\/GinjaChris\/pentmenu<\/code><\/span><br \/>\n<span style=\"color: #000000;\"><code>#cd pentmenu<\/code><\/span><br \/>\n<span style=\"color: #000000;\"><code>#chmod +x pentmenu<\/code><\/span><br \/>\n<span style=\"color: #000000;\"><code>#.\/pentmenu<\/code><\/span><\/div>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-117 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-56-14-image.png\" alt=\"PentMenu app\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-56-14-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-56-14-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-56-14-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-56-14-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-56-14-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-56-14-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-56-14-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.19: PentMenu app<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Select option 2 for DoS attack.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-118 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-05-image.png\" alt=\"PentMenu app - Select DOS(2)\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-05-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-05-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-05-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-05-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-05-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-05-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-05-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.20: PentMenu app &#8211; Select DoS (2)<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Select option 1 for ICMP Echo Flood.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-119 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-43-image.png\" alt=\"PentMenu app - Select ICMP Echo Flood(1)\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-43-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-43-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-43-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-43-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-43-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-43-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-00-57-43-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.21: PentMenu app &#8211; Select ICMP Echo Flood(1)<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">For the IP, use the IP of the interface in the outside zone. It should be in the 192.168.122.0\/24 range.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1819px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-120 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec4.jpg\" alt=\"PentMenu app - Enter Target IP address\" width=\"1819\" height=\"794\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec4.jpg 1819w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec4-300x131.jpg 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec4-1024x447.jpg 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec4-768x335.jpg 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec4-1536x670.jpg 1536w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec4-65x28.jpg 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec4-225x98.jpg 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec4-350x153.jpg 350w\" sizes=\"auto, (max-width: 1819px) 100vw, 1819px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.22: PentMenu app &#8211; Enter Target IP address<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Select r for random IP address.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-121 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-01-02-image.png\" alt=\"PentMenu app - Enter r for random IP address\" width=\"1026\" height=\"829\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-01-02-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-01-02-image-300x242.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-01-02-image-1024x827.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-01-02-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-01-02-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-01-02-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-01-02-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.23: PentMenu app &#8211; Enter r for random IP address<\/figcaption><\/figure>\n<p>After about 2 seconds, press <strong>Ctrl+C.<\/strong><\/p>\n<h2 style=\"page-break-before: always;\">Analyze the ICMP Flood<\/h2>\n<p>Back on the Management machine, go under <strong>Monitor &gt; Session browser<\/strong>.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-122 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-05-43-image.png\" alt=\"Verify session logs\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-05-43-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-05-43-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-05-43-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-05-43-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-05-43-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-05-43-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-05-43-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.24: Verify session logs<\/figcaption><\/figure>\n<p>As you can see, there are many entries here for ping. We want to prevent floods like these.<\/p>\n<h2 style=\"page-break-before: always;\">Create a DoS Protection Profile<\/h2>\n<p>Under <strong>Objects &gt; Security Profiles &gt; DoS Protection<\/strong>. Click Add.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-123 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec5.jpg\" alt=\"Create a DOS Protection\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec5.jpg 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec5-300x243.jpg 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec5-1024x828.jpg 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec5-768x621.jpg 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec5-65x53.jpg 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec5-225x182.jpg 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec5-350x283.jpg 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.25: Create a DoS Protection<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Set the type to Classified and under Flood protection, click the checkbox on the <strong>SYN Flood<\/strong>, <strong>UDP Flood<\/strong>, and <strong>ICMP Flood<\/strong> tabs.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-124 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec6.2.jpg\" alt=\"SYN Flood Protection\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec6.2.jpg 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec6.2-300x243.jpg 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec6.2-1024x828.jpg 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec6.2-768x621.jpg 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec6.2-65x53.jpg 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec6.2-225x182.jpg 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec6.2-350x283.jpg 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.26: SYN Flood Protection<\/figcaption><\/figure>\n<p>After that, click <strong>OK<\/strong>.<\/p>\n<h2 style=\"page-break-before: always;\">Apply the DoS Protection Profile<\/h2>\n<p>Under <strong>Policies &gt; Dos Protection<\/strong>. Click <strong>Add<\/strong>.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-125 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec7.jpg\" alt=\"Add a DoS Protection Rule\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec7.jpg 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec7-300x243.jpg 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec7-1024x828.jpg 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec7-768x621.jpg 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec7-65x53.jpg 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec7-225x182.jpg 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec7-350x283.jpg 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.27: Add a DoS Protection Rule<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Under the Source tab, add the Outside zone.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-126 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-13-35-image.png\" alt=\"Add the Source Zone\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-13-35-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-13-35-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-13-35-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-13-35-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-13-35-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-13-35-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-13-35-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.28: Add the Source Zone<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Under the Destination tab, add the Inside zone.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-127 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-14-15-image.png\" alt=\"Add the Destination Zone\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-14-15-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-14-15-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-14-15-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-14-15-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-14-15-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-14-15-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-14-15-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.29: Add the Destination Zone<\/figcaption><\/figure>\n<p>Under the <strong>Option\/Protection<\/strong> tab, configure these settings:<\/p>\n<table class=\"grid\" style=\"border-collapse: collapse; width: 100%; height: 120px;\">\n<caption>Table 2.5: DoS Rule Protection Configuration<\/caption>\n<tbody>\n<tr style=\"height: 15px;\">\n<th style=\"width: 50%; height: 15px;\" scope=\"col\">Parameter<\/th>\n<th style=\"width: 50%; height: 15px;\" scope=\"col\">Value<\/th>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Action<\/td>\n<td style=\"width: 50%; height: 15px;\">Protect<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Schedule<\/td>\n<td style=\"width: 50%; height: 15px;\">None<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Log Forwarding<\/td>\n<td style=\"width: 50%; height: 15px;\">None<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Aggregate<\/td>\n<td style=\"width: 50%; height: 15px;\">None<\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Classified<\/td>\n<td style=\"width: 50%; height: 15px;\"><em>Tick this box<\/em><\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Profile<\/td>\n<td style=\"width: 50%; height: 15px;\"><em>The name of the one you created<\/em><\/td>\n<\/tr>\n<tr style=\"height: 15px;\">\n<td style=\"width: 50%; height: 15px;\">Address<\/td>\n<td style=\"width: 50%; height: 15px;\">source-IP-only<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-128 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-17-49-image.png\" alt=\"DoS Rule - Option\/Policies\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-17-49-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-17-49-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-17-49-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-17-49-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-17-49-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-17-49-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-17-49-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.30: DoS Rule &#8211; Option\/Policies<\/figcaption><\/figure>\n<p>Then click <strong>OK<\/strong>.<\/p>\n<h2 style=\"page-break-before: always;\">Create a Zone Protection Profile<\/h2>\n<p>Under <strong>Network &gt; Network Profiles &gt; Zone Protection<\/strong>. Click <strong>Add<\/strong>.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-129 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec8.jpg\" alt=\"Add a Zone Protection\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec8.jpg 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec8-300x243.jpg 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec8-1024x828.jpg 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec8-768x621.jpg 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec8-65x53.jpg 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec8-225x182.jpg 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec8-350x283.jpg 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.31: Add a Zone Protection<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Under the flood protection tab, tick <strong>SYN<\/strong>, <strong>ICMP<\/strong>, and <strong>UDP<\/strong>.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-130 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-18-37-image.png\" alt=\"Add a Flood Protection\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-18-37-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-18-37-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-18-37-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-18-37-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-18-37-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-18-37-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-18-37-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.32: Add a Flood Protection<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Under the Reconnaissance Protection tab, tick enables on all boxes, and change the action to block.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-131 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-20-40-image.png\" alt=\"Set UDP Port Scan\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-20-40-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-20-40-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-20-40-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-20-40-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-20-40-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-20-40-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-20-40-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.33: Set UDP Port Scan<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Under the Packet Based Attack Protection tab, under the IP drop subtab, tick on <strong>Spoofed IP address<\/strong> and <strong>Strict IP Address<\/strong> Check.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-132 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-23-19-image.png\" alt=\"Enable Spoof IP address and Strict Address Check\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-23-19-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-23-19-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-23-19-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-23-19-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-23-19-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-23-19-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-23-19-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.34: Enable Spoof IP address and Strict Address Check<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Under the Packet Based Attack Protection tab, under the TCP drop subtab, tick on <strong>TCP SYN with Data<\/strong> and <strong>TCP SYNACK with Data<\/strong>.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-133 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-24-19-image.png\" alt=\"Enable TCP SYN with Data\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-24-19-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-24-19-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-24-19-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-24-19-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-24-19-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-24-19-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-24-19-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.35: Enable TCP SYN with Data<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Under the Packet Based Attack Protection tab, under the ICMP drop subtab, tick on<strong> ICMP Ping ID 0<\/strong>,<strong> ICMP Fragment<\/strong>, and <strong>ICMP Large Packet(&gt;1024).<\/strong><\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-134 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-25-24-image.png\" alt=\"Enable ICMP Ping ID 0, ICMP Fragment\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-25-24-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-25-24-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-25-24-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-25-24-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-25-24-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-25-24-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-25-24-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.36: Enable ICMP Ping ID 0, ICMP Fragment<\/figcaption><\/figure>\n<p>Then click <strong>OK<\/strong>.<\/p>\n<h2 style=\"page-break-before: always;\">Apply a Zone Protection Profile<\/h2>\n<p>Under <strong>Network &gt; Zones<\/strong>. Click on the Outside Zone.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-135 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec9.jpg\" alt=\"Create an Outside zone\" width=\"1024\" height=\"769\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec9.jpg 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec9-300x225.jpg 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec9-768x577.jpg 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec9-65x49.jpg 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec9-225x169.jpg 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec9-350x263.jpg 350w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.37: Create an Outside zone<\/figcaption><\/figure>\n<p style=\"page-break-before: always;\">Under the Zone Protection category, select the profile you just created.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-136 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec10.jpg\" alt=\"Enable Zone Protection under Outside Zone\" width=\"1026\" height=\"830\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec10.jpg 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec10-300x243.jpg 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec10-1024x828.jpg 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec10-768x621.jpg 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec10-65x53.jpg 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec10-225x182.jpg 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/Sec10-350x283.jpg 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.38: Enable Zone Protection under Outside Zone<\/figcaption><\/figure>\n<p>Click <strong>OK<\/strong>.<\/p>\n<p>Don&#8217;t forget to commit your changes!<\/p>\n<h2 style=\"page-break-before: always;\">Test the DoS Protection<\/h2>\n<p>Run Pentmenu again using the previous options, then <strong>Ctrl+C<\/strong> after 3 seconds.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-137\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-06-image.png\" alt=\"Running PentMenu\" width=\"400\" height=\"323\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-06-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-06-image-300x242.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-06-image-1024x827.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-06-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-06-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-06-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-06-image-350x283.png 350w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.39: Running PentMenu<\/figcaption><\/figure>\n<p>Under <strong>Monitor &gt; Logs &gt; Threat<\/strong>. You should see an entry for an ICMP flood.<\/p>\n<figure id=\"attachment_138\" aria-describedby=\"caption-attachment-138\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-138\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-49-image.png\" alt=\"Verify logs\" width=\"400\" height=\"324\" srcset=\"https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-49-image.png 1026w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-49-image-300x243.png 300w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-49-image-1024x828.png 1024w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-49-image-768x621.png 768w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-49-image-65x53.png 65w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-49-image-225x182.png 225w, https:\/\/opentextbc.ca\/paloalto\/wp-content\/uploads\/sites\/445\/2023\/11\/2022-04-23-01-54-49-image-350x283.png 350w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-138\" class=\"wp-caption-text\">Figure 2.40: Verify logs<\/figcaption><\/figure>\n","protected":false},"author":124,"menu_order":2,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-139","chapter","type-chapter","status-publish","hentry"],"part":97,"_links":{"self":[{"href":"https:\/\/opentextbc.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapters\/139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbc.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/opentextbc.ca\/paloalto\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbc.ca\/paloalto\/wp-json\/wp\/v2\/users\/124"}],"version-history":[{"count":1,"href":"https:\/\/opentextbc.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapters\/139\/revisions"}],"predecessor-version":[{"id":140,"href":"https:\/\/opentextbc.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapters\/139\/revisions\/140"}],"part":[{"href":"https:\/\/opentextbc.ca\/paloalto\/wp-json\/pressbooks\/v2\/parts\/97"}],"metadata":[{"href":"https:\/\/opentextbc.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapters\/139\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbc.ca\/paloalto\/wp-json\/wp\/v2\/media?parent=139"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/opentextbc.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapter-type?post=139"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbc.ca\/paloalto\/wp-json\/wp\/v2\/contributor?post=139"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbc.ca\/paloalto\/wp-json\/wp\/v2\/license?post=139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}