<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Prevent DNS/DoS Attack in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Prevent-DNS-DoS-Attack/m-p/167885#M30336</link>
    <description>&lt;P&gt;Are there any logs you can share that could point us possibly in the right direction? Generally, make syre rules are "tightened" to only allow needed access, threat prevention blades are active (IPS at least with optimized profile at minimum).&lt;/P&gt;</description>
    <pubDate>Sun, 15 Jan 2023 20:27:34 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2023-01-15T20:27:34Z</dc:date>
    <item>
      <title>Prevent DNS/DoS Attack</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Prevent-DNS-DoS-Attack/m-p/167883#M30335</link>
      <description>&lt;P&gt;Happy Weekend CheckMates..&amp;nbsp;&lt;/P&gt;&lt;P&gt;But there is no weekend for mitigate an attack &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;so friday nite, my cust got an attack and impacted to some application can't access and dns was down.&lt;/P&gt;&lt;P&gt;we suspect because high rate access, either DoS or DNS attack.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since all service already up and running well, my cust request to check and improve the current firewall which is Check Point as Perimeter Gateway.&lt;/P&gt;&lt;P&gt;anyone has idea how to check and analyse the issue and how we can protect from high access on dns or dos attack? Thankyou!&lt;/P&gt;</description>
      <pubDate>Sun, 15 Jan 2023 16:18:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Prevent-DNS-DoS-Attack/m-p/167883#M30335</guid>
      <dc:creator>tropicanaslim</dc:creator>
      <dc:date>2023-01-15T16:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent DNS/DoS Attack</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Prevent-DNS-DoS-Attack/m-p/167885#M30336</link>
      <description>&lt;P&gt;Are there any logs you can share that could point us possibly in the right direction? Generally, make syre rules are "tightened" to only allow needed access, threat prevention blades are active (IPS at least with optimized profile at minimum).&lt;/P&gt;</description>
      <pubDate>Sun, 15 Jan 2023 20:27:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Prevent-DNS-DoS-Attack/m-p/167885#M30336</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-01-15T20:27:34Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent DNS/DoS Attack</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Prevent-DNS-DoS-Attack/m-p/167886#M30337</link>
      <description>&lt;P&gt;Check&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112454&amp;amp;partition=Advanced&amp;amp;product=SecureXL," target="_blank" rel="noopener"&gt;sk112454 -&amp;nbsp;How to configure Rate Limiting rules for DoS Mitigation (R80.20 and higher)&lt;/A&gt; to address DoS attacks.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 15 Jan 2023 20:31:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Prevent-DNS-DoS-Attack/m-p/167886#M30337</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2023-01-15T20:31:31Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent DNS/DoS Attack</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Prevent-DNS-DoS-Attack/m-p/167887#M30338</link>
      <description>&lt;P&gt;Without knowing exactly what you were hit with, enabling the SecureXL penalty box is a great first step and easy to enable:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112454&amp;amp;partition=Advanced&amp;amp;product=SecureXL," target="_blank" rel="noopener noreferrer"&gt;sk112454 -&amp;nbsp;How to configure Rate Limiting rules for DoS Mitigation (R80.20 and higher)&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;If that doesn't do the trick you can look at setting some various connection and connection rate limits with &lt;STRONG&gt;fwaccel dos&lt;/STRONG&gt;, that same SK has the info.&amp;nbsp; If it was just a blunt bandwidth saturation attack you'll need help from your ISP.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 15 Jan 2023 23:13:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Prevent-DNS-DoS-Attack/m-p/167887#M30338</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-01-15T23:13:55Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent DNS/DoS Attack</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Prevent-DNS-DoS-Attack/m-p/167888#M30339</link>
      <description>&lt;P&gt;That is absolutely right and has proved me beneficial so many times.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jan 2023 02:03:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Prevent-DNS-DoS-Attack/m-p/167888#M30339</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2023-01-16T02:03:53Z</dc:date>
    </item>
  </channel>
</rss>

