Traffic Lockdown

Public Preview Announcement

This feature is currently in public preview. Please refer to the noted limitations within this documentation.

Overview

Traffic Lockdown is a network-level containment feature that enables Vectra to automatically add compromised host IP addresses to an external blocklist that your firewalls can subscribe to. When a host is added to Traffic Lockdown (manually or automatically), its IP address is published to a plain-text threat feed that integrated firewall devices poll and use to block traffic from that host.

This provides a multi-layered containment strategy alongside Host Lockdown and Account Lockdown, allowing you to isolate threats at the network.

How It Works

  1. A host meets lockdown criteria (manual selection or automatic threshold)

  2. Vectra adds the host's IP address to the managed blocklist

  3. Subscribed firewalls poll the blocklist URL at their configured interval

  4. Firewalls retrieve updated IP list and enforce blocking rules

  5. Traffic from the locked-down host is blocked at the network perimeter


Configuration

Prerequisites

  • Vectra platform with Traffic Lockdown feature enabled

  • Firewall(s) that support external threat feed/blocklist consumption

  • Network connectivity between firewall(s) and Vectra appliance

  • IP addresses of firewalls that will retrieve the blocklist

Step 1: Enable Traffic Lockdown

  1. Navigate to Configuration > Response - Traffic Lockdown

  2. Toggle On the "Traffic Lockdown of hosts via your firewall" switch

Step 2: Configure Authorized Firewall IPs

The Authorized Firewall IPs field controls which IP addresses are permitted to communicate with the Vectra appliance to retrieve the Traffic Lockdown feed. This provides an additional layer of access control to ensure only trusted firewall infrastructure can access the blocklist.

Configuration Options:

Option 1: Specific Firewall IPs (Recommended for most environments)

  • Enter the IP addresses or CIDR ranges of your specific firewalls

  • Provides tightest security by explicitly allowlisting known firewall management IPs

  • Format: One entry per line

  • CIDR supported: Yes (e.g., 10.0.0.0/24)

  • Maximum entries: 50

Example:

Option 2: Allow All Sources (0.0.0.0/0)

Use 0.0.0.0/0 when:

  • You have an extensive number of firewalls across multiple sites/clouds

  • Your environment uses internal firewalls or network segmentation to control communications between devices and the Vectra appliance

  • You manage access control through other means (e.g., VPN, jump hosts, bastion servers)

  • Firewall IPs are dynamic or frequently change

Example:

Important: When using 0.0.0.0/0, ensure your Vectra appliance is protected by other network security controls, as any IP address will be able to retrieve the blocklist URL. The blocklist itself only contains IP addresses and does not expose sensitive configuration data.

Step 3: Note the Blocklist URL

Copy the Vectra Managed Plain Text Source IP Block List URL displayed in the configuration:

You'll need this URL when configuring your firewall's external connector or threat feed subscription.

Step 4: Configure Automatic Lockdown (Optional)

If you want Vectra to automatically lock down hosts that meet certain risk criteria:

  1. Toggle On the "Enable Automatic Traffic Lockdown" switch

  2. Set Automatically disable hosts for: Choose duration from dropdown

    • 1 hour

    • 2 hours

    • 4 hours

    • 8 hours

    • 12 hours

    • 24 hours

  3. Configure Urgency Score Threshold for Auto Lockdown:

    • Use slider to set minimum urgency score (10-100)

    • Hosts must meet or exceed this threshold

  4. Configure Importance Level:

    • Use slider to set minimum importance level (Low, Medium, High)

    • Hosts must meet or exceed this level

How Automatic Lockdown Works:

  • After saving this configuration, any host that exceeds all configured thresholds will be automatically added to Traffic Lockdown for the selected duration

  • Hosts can be manually re-enabled at any time from the host details page

  • After the configured duration expires, the host is automatically removed from lockdown

Step 5: Save Configuration

Click Save to apply your Traffic Lockdown settings.

SIEM Configuration (QUX only, with RUX no action is required)

If storing all data in a SIEM then update the syslog output configuration to send Traffic Lockdown logs. This is configured under Settings - Notifications - Syslog

Edit the destinations you wish to receive these logs and ensure Traffic Lockdown log type is selected.


Manual vs Automatic Traffic Lockdown

Manual Lockdown

When to use: For immediate containment of specific hosts during active investigations

How to enable:

  1. Navigate to the host details page for the target host

  2. Click the Lock Host button within the Traffic Lockdown section

  3. Specify the duration for how long the address will exist in the block list

Characteristics:

  • Immediate effect (when the firewall completes its polling cycle)

  • Remains in lockdown until selected duration expires or is manually removed by using the Unlock Host button

  • Best for confirmed threats or ongoing investigations

Automatic Lockdown

When to use: For automated response to high-risk hosts

How it works:

  • Vectra continuously monitors host urgency scores and importance levels

  • When a host exceeds all configured thresholds (Urgency AND Importance), it's automatically added to lockdown

  • Host is automatically removed after the configured duration expires

  • Can be manually removed at any time before expiration by using the Unlock Host button

Characteristics:

  • Threshold-based triggering

  • Time-limited containment

  • Reduces manual intervention for high-volume scenarios

  • Auto-expires to prevent indefinite blocking of remediated hosts


Public Preview Notes and Limitations

This feature is currently in Public Preview. The following capabilities are not yet available but are slated to be available in the production release:

Not Available in Preview

  • API status check to programmatically query Traffic Lockdown status


General Limitations

The following capabilities are not available in the initial release but will be added in a future release:

Authentication

  • HTTP Basic Authentication is not supported for firewall access to the blocklist URL

  • Access control is enforced via IP address allowlisting only (Authorized Firewall IPs)

Testing & Validation

  • Test button to add a non-user impacting address to the block list to validate communication with the firewall

  • Audit output to view the status of the last five attempts to access the threat feed

IP Address Format Requirements

The blocklist feed supports:

  • Single IP addresses in dotted decimal notation (e.g., 192.168.1.100)

  • One IP address per line

  • Fully qualified IPv4 addresses (all four octets required)

The blocklist feed does NOT support:

  • CIDR notation in the feed output (e.g., 10.0.0.0/24)

  • IP ranges (e.g., 192.168.1.1-192.168.1.254)

  • Hostnames or FQDNs

Note: While CIDR notation is supported for the Authorized Firewall IPs configuration field (to authorize multiple firewalls), the blocklist feed itself only contains individual IP addresses.

Compatibility

The plain-text blocklist format is compatible with:

  • Palo Alto Networks External Dynamic Lists (EDL)

  • Fortinet External IP Address objects

  • Juniper Dynamic Address IP Blocklists

  • Any firewall vendor supporting text-based external IP lists for source address blocking


Firewall Configuration Examples

This section includes configuration examples for some common firewalls. This should be used for guidance only. Always refer to your firewall documentation corresponding to the firewall version in use.

Fortinet

Fortinet employs an IP Address External Feed to support this capability.

IP Address External Feed https://docs.fortinet.com/document/fortigate/7.6.4/administration-guide/891236/ip-address-external-feedarrow-up-right

User Interface

1. Go to _Security Fabric > External Connectors_ and click _Create New_. 2. In the External Feeds section, click IP Address_. &#xNAN;3. Set the _Name to Vectra_SourceIP_Blocklist_. &#xNAN;4. Set the _Update method to External Feed_. &#xNAN;5. Set the _URL of external resource to the URL provided in Vectra configuration. 6. Configure the remaining settings as required, then click OK_. &#xNAN;7. Edit the connector, then click _View Entries to view the IP addresses in the feed.

Command Line

config system external-resource edit "_Vectra_SourceIP_Blocklist_" set type address set resource "https://<vectra-ip>/firewall_mgmt/source_ips" set server-identity-check {none | basic | full} next end

Apply this feed as a source in a policy to restrict connectivity as appropriate. In most cases, this would be a policy near the top denying this source group to communicate with Internet thus preventing a potentially compromised host from communicating externally. This can also be used in IN-to-IN policies where appropriate.

dyn-add-session-check is a FortiGate feature that enables the firewall to check existing sessions against dynamically updated threat feeds (External Connectors/Threat Feeds) and block them when new IPs are added.

When enabled, dyn-add-session-check causes FortiGate to:

  • Check existing active sessions against newly added IPs in External Connectors

  • Automatically block/drop existing sessions when the source or destination IP matches a newly blocked entry

  • Apply the block action defined in your firewall policy (deny, reset, etc.)

Without this setting, FortiGate only blocks new connection attempts while existing sessions continue unaffected.

This is configured at the firewall policy level, not globally:

Palo Alto NGFW

Palo Alto employs an External Dynamic List (EDL) to support this capability.

External Dynamic List https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-listarrow-up-right

https://docs.paloaltonetworks.com/ngfw/help/12-1/objects/objects-external-dynamic-listsarrow-up-right

User Interface

  1. Log into the Palo Alto firewall web interface

  2. Navigate to **Objects → External Dynamic Lists**

  3. Click **Add** to create a new list

  4. Configure the EDL: - Name: Give it a descriptive name (e.g., "Threat-Feed-BlockList") - Type: Select **IP List** - Description: Optional but recommended - Source: Enter your URL (https://<vectra-ip>/firewall_mgmt/source_ips) - Check for updates: Choose frequency - **Five Minute** (most frequent) - **Hourly** (recommended for most feeds) - **Daily** - **Weekly** - **Monthly** - Certificate Profile: (Optional) If HTTPS URL requires certificate validation - Exception List: (Optional) IPs to exclude from the block list

  5. Click **OK**

  6. Commit changes

Command Line

admin@PA-VM> configure admin@PA-VM# set external-list Vectra_SourceIP_Block_List type ip url "https://<vectra-ip>/firewall_mgmt/source_ips" admin@PA-VM# set external-list Vectra_SourceIP_Block_List recurring custom-time interval 5 admin@PA-VM# set external-list Vectra_SourceIP_Block_List type ip recurring five-minute admin@PA-VM# commit

Important Notes

  • The EDL MUST be referenced by a policy or else it won't populate.

  • If the certificate on Vectra is self-signed then you may need to update the Palo Alto configuration to not require server verification. This can be set using the cli:

configure set deviceconfig system server-verification no commit exit


Troubleshooting

Firewall Cannot Access Blocklist URL

Symptoms: Firewall shows connection errors or timeout when attempting to retrieve the blocklist

Resolution:

  1. Verify firewall IP is listed in Authorized Firewall IPs (or 0.0.0.0/0 is configured)

  2. Confirm network connectivity between firewall and Vectra appliance

  3. Check firewall logs for specific error messages

  4. Test connectivity: curl https://<vectra-ip>/firewall_mgmt/source_ips from firewall

Host IP Not Appearing in Blocklist

Symptoms: Host added to Traffic Lockdown but IP not in feed

Resolution:

  1. It can take up to five minutes for the host IP to appear in the block list

  2. Verify host has a valid IP address assigned in Vectra

  3. Check that IP is in supported format (single IPv4 address)

  4. Allow time for firewall polling cycle (feeds are typically polled every 5-60 minutes)

  5. Manually refresh/test the feed URL to confirm IP is present

Automatic Lockdown Not Triggering

Symptoms: High-risk hosts not being automatically added to lockdown

Resolution:

  1. Verify "Enable Automatic Traffic Lockdown" toggle is On

  2. Confirm host urgency score meets or exceeds threshold

  3. Confirm host importance level meets or exceeds threshold

  4. Remember: Both urgency and importance thresholds must be exceeded

  5. It can take up to five minutes for the host IP to appear in the block list


  • Host Lockdown: EDR-based endpoint isolation

  • Account Lockdown: Identity-based account disablement


Last updated

Was this helpful?