FortiDDoS config

Author
iulian.bucur
New Member
  • Total Posts : 2
  • Scores: 0
  • Reward points: 0
  • Joined: 2016/12/26 01:27:25
  • Status: offline
2019/11/07 06:27:46 (permalink)
0

FortiDDoS config

Hi
we own in the company a new FortiDDoS 600B
In order to be configured, our partner request us to simulate a big traffic on all the ports, otherwise the policy created will not help.
Is not quite strange this kind of approach?
 
Thnaks for your time
#1

3 Replies Related Threads

    AtiT
    Platinum Member
    • Total Posts : 469
    • Scores: 42
    • Reward points: 0
    • Joined: 2012/04/18 12:13:27
    • Location: Prague / Czech Republic
    • Status: offline
    Re: FortiDDoS config 2019/11/07 07:00:26 (permalink)
    0
    Hello,
    I would not recommend to generate high traffic.
    During the initial learning period you need to have normal traffic wihtout any attacks. After this period you will generate the system recommended thresholds + manually create some thresholds like for TCP 20-23, 443 etc.
    Next you will monitor the thresholds and do a fine tuning of these thersholds for some days. After that you can go and put the SPPs into the prevention mode.
     
    Generating high amount of traffic will cause to generate wrong thresholds for FortiDDoS and it can happen that you will bypass the protection.
     

    AtiT
    --------------------
    NSE 8, CCNP R+S
    #2
    SteveDDoS_FTNT
    New Member
    • Total Posts : 14
    • Scores: 2
    • Reward points: 0
    • Joined: 2016/06/13 08:04:49
    • Status: offline
    Re: FortiDDoS config 2019/11/07 07:02:23 (permalink)
    0
    Hello,
    In this case, ignore what your VAR told you. Your instincts were correct.
     
    Normally you need to attach the system to your Internet link(s). Note Odd ports (1,3,5..) must face your firewall or "inside" network and even ports (2,4,6..) must face the Internet. FortiDDoS is completely transparent -- it has no MAC nor IP addresses in the data path so it has no impact on the network when cabled in.
    BUT - before cabling, connect to Mgmt 1 port, set up credentials and set up NTP (critical) and time-zone. Each of NTP and Time Zone settings causes a system reboot which will impact traffic if the system is cabled. FDD-600B has no bypass/fail-open capability.
     
    You need to configure the public IPs you use for different services into Service Protection Profiles. Normally we suggest the following:
    - Firewall, proxies, Wifi gateways or any predominantly outbound service
    - Web servers
    - VPN or other authenticating inbound servers
    - DNS if you have a publically-accessible DNS server
    First you define the Service Protection Policies (SPPs) - the categories above that are relevant to you.  Then you define the SPP Policies (subnets or /32s) that fit into each SPP.
    - Be sure to include your full public subnet in an SPP.  If you have a /24, for example, and the above services only use 15 or 20 IPs, enter the full /24 in an SPP called "Full_Subnet" or similar.  You do not need to worry about a /24 and multiple /32s in the same /24 - the system figures that out. Attackers will attack any IP address that is routed to your network link, even addresses that are not in use.
     
    Once you have the SPPs and subnets defined, you need to leave the system for about a week of learning. It will be transparent to all traffic but if you look at some graphs you will see "drops". When the SPPs are in Detection Mode (default) the system reports on bad packets it sees (showing "drops") but it never drops a packet.
     
    The next step is setting System Thresholds.  There are 230,000 of these per SPP in each direction, so you cannot do that manually.  The system has a process.  If you get that far, either return to the forum for help or:
     
    If the system is registered and you have any warranty available you can create a TAC ticket asking for implementation help.
     
    Regards,
    Steve Robinson
    #3
    iulian.bucur
    New Member
    • Total Posts : 2
    • Scores: 0
    • Reward points: 0
    • Joined: 2016/12/26 01:27:25
    • Status: offline
    Re: FortiDDoS config 2019/11/07 07:03:34 (permalink)
    0
    thank you very much
    #4
    Jump to:
    © 2019 APG vNext Commercial Version 5.5