FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
fgilloteau_FTNT
Article Id 192995
Description
The article provides information on how DDoS logs are generated when a sensor is matched.

Solution
The attack logs are generated every 30 seconds after the beginning of the attack or before 30 seconds if the traffic does not last for more than 30 seconds.

The first number xxx in "xxx > threshold yyy" is the number of packets received in the latest second at the time the log is triggered.

The repeat number aaa in "repeats aaa times" is how many entries are aggregated, that is the number of packets that meet the threshold, during the period of last log and the current log were generated.

The following examples illustrate:
  • An UDP flood attack was generated on port 3000.
  • The UDP_flood sensor was limited to 1 PPS.

Example 1

The test was made with the following hping command:
hping3 --udp -p 3000 10.129.3.186 --fast -c 3000

fgilloteau_FD37066_tn_FD37066-1.jpg

Example 2

The same test was made from 2 different IP sources: 10.129.0.25 and 10.129.0.30.

fgilloteau_FD37066_tn_FD37066-2.jpg

Note that the log entry contains only the last seen @IPsrc, @IPdest et PortDest.

Contributors