I enable just icmp_flood anomaly here and change the threshold to 10 packets per second sent to destination of 12.12.12.3 :Įdit 1 set interface "port1" set srcaddr "all" set dstaddr "12.12.12. For small networks, and those that do not have accessible from the outside servers, it may be a nice to have feature.
You would need then to fix the thresholds, then again. The false positives, especially for TCP SYN and alike protections, would block legitimate clients to the internal servers available from the Internet due to sudden surge of the client requests.
Thresholds for anomalies are configurable and do what they say - once traffic matched by this policy exceeds the threshold, it gets blocked.You can (actually must) specify: source/destination IPs to match the DoS policy ( all can be used), service ( ALL can be used), and incoming interface to apply the DoS policy to.On Fortigates with hardware NP modules, you also have Proxy as an action in tcp_syn_flood protection to enable, which makes Fortigate to proxy SYN connections. All anomalies are set by default to Pass the offending traffic and are disabled, so make sure under the given anomaly to set status enable and action to block.You only have the choice which ones to enable and which ones not to. The list of anomalies is pre-set in any policy you create.You use Dos protection by creating Dos policy ( Policy & Objects -> IPv4/Ipv6 DoS Policy) in which you enable/modify anomalies.