If HTTP/2 inspection is enabled in PAN-OS, an ongoing distributed denial-of-service (DDoS) attack in inspected traffic will contribute towards the session capacity limit of the firewall. This can result in the intermittent availability of new firewall sessions and is consistent in impact with other volumetric DDoS attacks. Availability of new firewall sessions will recover naturally once the DDoS attack stops. Customers who have enabled Threat prevention ID 40152 (Applications and Threats content update 8765) can block this attack from happening in inspected HTTP/2 traffic.
You might also like...
[SecurityWeek] Google Now Lets US Users Search Dark Web for Their Gmail ID
Gmail users in the US can now run scans to find out whether their Gmail ID appears on the dark web, Google announced today at Google I/O, its annual developer conference.
1 min read
[KnowBe4] Thinking Critically About Your Online Behavior
Thinking Critically About Your Online BehaviorEmployees need to adjust their mindsets in order to defend themselves against social engineering attacksStu
1 min read