FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Not applicable
Article Id 196941
Article
DescriptionIPS anomaly thresholds.
Components
  • All FortiGate units.
Steps or Commands

Some Anomaly attacks have a threshold associated with it. The administrator can fine-tune anomaly settings by giving different thresholds for different connections based on source subnet, destination subnet and service (destination port) of the connection. Multiple entries can be configured to one anomaly. For any new connection, the threshold of the best-match entry is applied.

To configure the anomaly threshold, use the following CLI command as an example:

config ips anomaly syn_flood
   config limit
     edit 1
        set dst_ip 10.1.1.0/24
        set service 80
        set threshold 500
     end
end

The table below includes the anomalies and their units for each threshold.

syn_floodSYN packets rate (pps) of new TCP connections, including retransmission, to one destination IP
portscanSYN packets rate (pps) of new TCP connections, including retransmission, from one source IP
tcp_dst_session# of Concurrent TCP connections to one destination IP
tcp_src_session# of Concurrent TCP connections from one source IP
udp_floodUDP packets rate (pps) to one destination IP
udp_scanUDP session creation rate (pps) from one source IP
udp_dst_session# of Concurrent UDP connections to one destination IP
udp_src_session# of Concurrent UDP connections from one source IP
icmp_floodICMP packets rate (pps) to one destination IP
icmp_sweepICMP session creation rate (pps) from one source IP
icmp_dst_session# of Concurrent ICMP connections to one destination IP
icmp_src_session# of Concurrent ICMP connections from one source IP