01 28007 0080 20041130 FortiGate IPS Guide
01 28007 0080 20041130 FortiGate IPS Guide
Version 1.0
30 November 2004
01-28007-0080-20041130
© Copyright 2004 Fortinet Inc. All rights reserved.
No part of this publication including text, examples, diagrams or illustrations may be reproduced,
transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical or
otherwise, for any purpose, without prior written permission of Fortinet Inc.
Trademarks
Products mentioned in this document are trademarks or registered trademarks of their respective
holders.
Send information about errors or omissions in this document or any Fortinet technical documentation to
techdoc@fortinet.com.
Contents
Table of Contents
Introduction ............................................................................................................ 5
FortiGate documentation .................................................................................................... 6
Fortinet Knowledge Center ............................................................................................. 6
Comments on Fortinet technical documentation............................................................. 6
Customer service and technical support............................................................................. 7
Glossary ............................................................................................................... 47
Index ...................................................................................................................... 51
Introduction
Spam and viruses are not the only threats facing enterprises and small businesses.
Sophisticated, automated attack tools are prevalent on the Internet today, making
intrusion detection and prevention vital to securing corporate networks. An attack or
intrusion can be launched to steal confidential information, force a costly web site
crash, or use network resources to launch other attacks.
The FortiGate Intrusion Prevention System (IPS) detects intrusions using attack
signatures for known intrusion methods and detects anomalies in network traffic to
identify new or unknown intrusions. Not only can the IPS detect and log attacks, users
can choose one of eight actions to take on the session when an attack is detected.
This Guide describes how to configure and use the IPS and the IPS response to some
common attacks.
This Guide describes:
• Configuring and Using the IPS
• SYN Flood Attacks
• ICMP Sweep Attacks
• Custom Signatures
FortiGate documentation
Information about FortiGate products is available from the following guides:
• FortiGate QuickStart Guide
Provides basic information about connecting and installing a FortiGate unit.
• FortiGate Installation Guide
Describes how to install a FortiGate unit. Includes a hardware reference, default
configuration information, installation procedures, connection procedures, and
basic configuration procedures. Choose the guide for your product model number.
• FortiGate Administration Guide
Provides basic information about how to configure a FortiGate unit, including how
to define FortiGate protection profiles and firewall policies; how to apply intrusion
prevention, antivirus protection, web content filtering, and spam filtering; and how
to configure a VPN.
• FortiGate online help
Provides a context-sensitive and searchable version of the Administration Guide in
HTML format. You can access online help from the web-based manager as you
work.
• FortiGate CLI Reference Guide
Describes how to use the FortiGate CLI and contains a reference to all FortiGate
CLI commands.
• FortiGate Log Message Reference Guide
Describes the structure of FortiGate log messages and provides information about
the log messages that are generated by FortiGate units.
• FortiGate High Availability Guide
Contains in-depth information about the FortiGate high availability feature and the
FortiGate clustering protocol.
• FortiGate VPN Guide
Explains how to configure VPNs using the web-based manager.
What is an IPS?
An IPS is an Intrusion Prevention System for networks. While early systems focused
on intrusion detection, the continuing rapid growth of the Internet and the potential for
the theft of sensitive data has resulted in the need for not only detection, but
prevention.
For detailed information on individual signatures and anomalies, see the Attack
Encyclopedia in the FortiProtect Center available on the Fortinet web site at
https://www.fortinet.com/FortiProtectCenter/.
IPS configuration
This section describes:
• Predefined signatures
• Custom signatures
• Anomalies
• Network performance
Predefined signatures
The FortiGate IPS matches network traffic against patterns contained in attack
signatures. Attack signatures reliably protect your network from known attacks.
Fortinet’s FortiProtect infrastructure ensures the rapid identification of new threats and
fast deployment of new attack signatures.
The FortiGate IPS contains an ever-increasing number of predefined signatures
divided into groups. For information about individual signatures visit the Attack
Encyclopedia in the FortiProtect Center.
This section describes:
• Signature updates
• Signature groups
• Attack responses
• Logging attacks
• Viewing the predefined signature list
• Configuring individual signature settings
• Changing the status of predefined signature groups
• Configuring parameters for signature groups
Signature updates
You can configure the FortiGate unit to automatically check for and download an
updated attack definition file containing the latest signatures, or you can manually
download the updated attack definition file. You can also configure the FortiGate unit
to allow push updates of new attack definition files as soon as they are available from
the FortiProtect Distribution Network. For details, see the FortiGate Administration
Guide.
When the FortiGate unit installs an updated attack definition file, it checks to see if the
default configuration for any existing signatures has changed. If the default
configuration has changed, the changes are preserved.
Signature groups
Signatures are arranged into groups based on the type of attack. By default, all
signature groups are enabled, although some individual signatures are disabled.
You can enable or disable signature groups or individual signatures. Disabling
unneeded signatures can improve system performance and reduce the number of log
messages and alert emails that the IPS generates. For example, the IPS detects a
large number of web server attacks. If you do not provide access to a web server
behind your FortiGate unit, you should disable all web server attack signatures.
Some signature groups include configurable parameters. The parameters depend on
the type of signatures in the signature group. When you configure these parameters
for a signature group, the parameters apply to all of the signatures in the group.
Attack responses
For each signature, you can pass (let through) or block attacks by configuring the
action the FortiGate IPS takes when it detects an attack. The FortiGate IPS can pass,
drop, reset or clear packets or sessions. IPS actions are described in “Configuring
individual signature settings” on page 13.
Logging attacks
You can also enable or disable logging of the attack. See “Configuring logging and
alert email” on page 25.
Note: The Reset icon is only displayed if the settings for the signature have been changed from
the default settings.
4 Select OK.
idle_timeout If a session is idle for longer than this number of seconds, the session will
not be maintained by tcp_reassembler.
min_ttl A packet with a higher ttl number in its IP header than the number specified
here is not processed by tcp_reassembler.
port_list A comma separated list of ports. The dissector can decode these TCP
ports.
bad_flag_list A comma separated list of bad TCP flags.
direction Valid settings are from-server, from-client, or both.
codepoint A number from 0 to 63. Used for differentiated services tagging. When the
action for p2p and im signatures is set to Pass, the FortiGate unit checks the
codepoint. If the codepoint is set to a number from 1 to 63, the codepoint for
the session is changed to the specified value. If the codepoint is set to -1
(the default) no change is made to the codepoint in the IP header.
Custom signatures
Custom signatures provide the power and flexibility to customize the FortiGate IPS for
diverse network environments. The FortiGate predefined signatures cover common
attacks. If you are using an unusual or specialized application or an uncommon
platform, you can add custom signatures based on the security alerts released by the
application and platform vendors.
See “Custom Signatures” on page 37 for information on custom signature syntax.
This section describes:
• Viewing custom signatures
• Adding custom signatures
• Backing up and restoring the custom signature list
Note: Custom signatures are an advanced feature. This document assumes the user has
previous experience creating intrusion detection signatures.
Enable custom Select to enable the custom signature group or clear to disable the custom
signature signature group.
Create New Select Create New to create a new custom signature.
Clear all custom Remove all the custom signatures from the custom signature group.
signatures
Reset to Reset all the custom signatures to the recommended settings.
recommended
settings?
Name The custom signature names.
Revision The revision number for each custom signature. The signature revision
number is updated when you revise a signature.
Enable The status of each custom signature. A white check mark in a green circle
indicates the signature is enabled. A white X in a grey circle indicates the
signature is disabled.
Selecting the box at the top of the Enable column enables all the custom
signatures. Clearing the box at the top of the Enable column disables all the
custom signatures.
Logging The logging status of each custom signature. A white check mark in a green
circle indicates logging is enabled for the custom signature. A white X in a
grey circle indicates logging is disabled for the custom signature.
Action The action set for each custom signature. Action can be Pass, Drop, Reset,
Reset Client, Reset Server, Drop Session, Clear Session, or Pass Session.
Modify The Delete and Edit/View icons.
! Caution: Restoring the custom signature list overwrites the existing file.
Anomalies
The FortiGate IPS uses anomaly detection to identify network traffic that does not fit
known or preset traffic patterns. The FortiGate IPS identifies the four statistical
anomaly types for the TCP, UDP, and ICMP protocols.
You can enable or disable logging for each anomaly, and you can control the IPS
action in response to detecting an anomaly. In many cases you can also configure the
thresholds that the anomaly uses to detect traffic patterns that could represent an
attack.
Note: It is important to estimate the normal and expected traffic on your network before
changing the default anomaly thresholds. Setting the thresholds too low could cause false
positives, and setting the thresholds too high could miss some attacks.
You can also configure session control based on source and destination network
address. This is a CLI only command available for tcp_src_session,
tcp_dst_session, icmp_src_session, icmp_dst_session,
udp_src_session, udp_dst_session. For more information, see the FortiGate
CLI Reference Guide.
The anomaly detection list can be updated only when the FortiGate firmware is
upgraded.
This section describes:
• Viewing the anomaly list
• Configuring an anomaly
Configuring an anomaly
Each anomaly is preset with a recommended configuration. By default all anomaly
signatures are enabled. You can use the recommended configurations or you can
modify the configurations to match the requirements of the network.
Action Select the action for the FortiGate unit to take when traffic triggers this
anomaly.
Pass The FortiGate unit lets the packet that triggered the anomaly pass
through the firewall. If logging is disabled and action is set to Pass, the
anomaly is effectively disabled.
Drop The FortiGate unit drops the packet that triggered the anomaly. Fortinet
recommends using an action other than Drop for TCP connection based
attacks.
Reset The FortiGate unit drops the packet that triggered the anomaly, sends a
reset to both the client and the server, and removes the session from
the FortiGate session table. Used for TCP connections only. If you set
this action for non-TCP connection based attacks, the action will behave
as Clear Session. If the Reset action is triggered before the TCP
connection is fully established it acts as Clear Session.
Reset The FortiGate unit drops the packet that triggered the anomaly, sends a
Client reset to the client, and removes the session from the FortiGate session
table. Used for TCP connections only. If you set this action for non-TCP
connection based attacks, the action will behave as Clear Session. If the
Reset Client action is triggered before the TCP connection is fully
established it acts as Clear Session.
Reset The FortiGate unit drops the packet that triggered the anomaly, sends a
Server reset to the server, and removes the session from the FortiGate session
table. Used for TCP connections only. If you set this action for non-TCP
connection based attacks, the action will behave as Clear Session. If the
Reset Server action is triggered before the TCP connection is fully
established it acts as Clear Session.
Drop The FortiGate unit drops the packet that triggered the anomaly and
Session drops any other packets in the same session.
Clear The FortiGate unit drops the packet that triggered the anomaly,
Session removes the session from the FortiGate session table, and does not
send a reset.
Pass The FortiGate unit lets the packet that triggered the anomaly and all
Session other packets in the session pass through the firewall.
Threshold Traffic over the specified threshold triggers the anomaly.
end
To restore the default settings of an anomaly
1 Go to IPS > Anomaly.
2 Select Reset for the anomaly you want to restore to default.
The Reset icon is displayed only if the settings for the anomaly have been changed
from defaults.
3 Select OK.
Network performance
The FortiGate IPS is extremely accurate and reliable as an in-line network device.
Independent testing shows that the FortiGate IPS successfully detects and blocks
attacks even under high traffic loads, while keeping latency within expected limits.
The following options are available for IPS through the protection profile.
Note: Some popular email clients cannot filter messages based on the MIME header. Check
your email client features before deciding how to tag spam.
Note: Attack and intrusion attempts occur frequently on networks connected to the Internet.
You can reduce the number of log messages and alert email by disabling signatures for attacks
that your system is not vulnerable to (for example, web attacks when you are not running a web
server).
To configure logging and alert email for IPS events using the web-based
manager
1 Go to Log&Report > Log Config > Log Setting.
2 Select and configure the settings for any logging locations you want to use.
3 Select Apply.
4 Go to Log&Report > Log Config > Alert Email.
5 Select and configure authentication if required and enter the email addresses that will
receive the alert email.
6 Enter the time interval to wait before sending log messages for each logging severity
level.
Note: If more than one log message is collected before an interval is reached, the messages
are combined and sent out as one alert email.
7 Select Apply.
8 Go to Log&Report > Log Config > Log Filter.
9 Enable signature and anomaly Attack Filter Log options, and enable logging for the
appropriate traffic types to each log location and for alert email.
10 Select Apply.
To access log messages from memory or on the local disk
You can view and download log messages stored in memory or on the FortiGate local
disk from the web-based manager. Go to Log&Report > Log Access and select the
log type you want to view.
See the FortiGate Administration Guide and the FortiGate Log Message Reference
Guide for more logging procedures.
Signature
The following log message is generated when an attack signature is found.
Anomaly
The following log message is generated when an attack anomaly is detected.
You can type in the name or ID of the attack, or copy and paste the URL from the log
message or alert email into your browser.
1 The originator of the connection sends a SYN packet (a packet with the SYN flag set
in the TCP header) to initiate the connection.
2 The receiver sends a SYN/ACK packet (a packet with the SYN and ACK flags set in
the TCP header) back to the originator to acknowledge the connection attempt.
3 The originator then sends an ACK packet (a packet with the ACK flag set in the TCP
header) back to the receiver to open the connection.
Once the handshaking process is complete the connection is open and data
exchange can begin between the originator and the receiver, in this case the web
browser and the web server.
Between steps 2 and 3 however, the web server keeps a record of any incomplete
connections until it receives the ACK packet. A SYN flood attacker sends many SYN
packets but never replies with the final ACK packet.
Since most systems have only a limited amount of space for TCP/IP connection
records, a flood of incomplete connections will quickly block legitimate users from
accessing the server. Most TCP/IP implementations use a fairly long timeout before
incomplete connections are cleared from the connection table and traffic caused by a
SYN flood is much higher than normal network traffic.
30 Fortinet Inc.
SYN Flood Attacks The FortiGate IPS Response to SYN Flood Attacks
A true SYN proxy approach requires that all three packets (SYN, SYN/ACK, and ACK)
are cached and replayed even before it is known if a TCP connection request is
legitimate. The FortiGate IPS pseudo SYN proxy retransmits every TCP packet
immediately from the packet source to the packet destination as soon as it records the
necessary information for SYN flood detection.
Since the pseudo SYN proxy in the IPS uses a “best effect” algorithm to determine
whether a TCP connection is legitimate or not, some legitimate connections may be
falsely detected as incomplete TCP connection requests and dropped. However, the
ratio of the pseudo SYN proxy dropping legitimate TCP connection is quite small.
Figure 18 illustrates the operation behavior of FGT IPS Engine before the SYN Flood
threshold is reached. Figure 19 illustrates the operation behavior of FGT IPS Engine
after the SYN Flood threshold is reached.
32 Fortinet Inc.
Intrusion Prevention System Guide Version 1.0
Note: The predefined signature descriptions in Table 1 are accurate as of the IPS Guide
publication date. Predefined signatures may be added or changed with each Attack Definition
update.
34 Fortinet Inc.
ICMP Sweep Attacks The FortiGate IPS response to ICMP sweep attacks
Figure 21: Some of the ICMP signatures in the predefined signature list
36 Fortinet Inc.
Intrusion Prevention System Guide Version 1.0
Custom Signatures
Custom signatures provide the power and flexibility to customize the FortiGate IPS for
diverse network environments. The FortiGate predefined signatures cover common
attacks. If you are using an unusual or specialized application or an uncommon
platform, you can add custom signatures based on the security alerts released by the
application and platform vendors.
You can also use custom signatures to block or allow specific traffic.
Example
The following example signature checks that the ip_flag header in TCP packets has
the Don’t Fragment bit set:
F-SBID(--name testflag; --protocol tcp; --ip_flag D;)
The example signature generates the following traffic:
# sendip -p ipv4 -p tcp -is 192.168.5.37 -ifd 1 -ts 5566 -td 1234 -tfs 1 192.168.5.40
If logging is enabled, when the signature is triggered the IPS records an attack log
message similar to the following:
1 2004-09-02 01:19:52 log_id=0420070000 type=ips subtype=signature pri=alert
attack_id=113770497 src=192.168.5.37 dst=192.168.5.40 src_port=5598
dst_port=1234 src_int=ha dst_int=dmz status=detected proto=6 service=1234/tcp
msg="custom: testflag"
Set the action to Drop Session.
38 Fortinet Inc.
Custom Signatures Custom signature syntax
40 Fortinet Inc.
Custom Signatures Custom signature syntax
42 Fortinet Inc.
Custom Signatures Custom signature syntax
44 Fortinet Inc.
Custom Signatures Custom signature syntax
46 Fortinet Inc.
Intrusion Prevention System Guide Version 1.0
Glossary
Connection: A link between machines, applications, Internal interface: The FortiGate interface that is
processes, and so on that can be logical, physical, or connected to an internal (private) network.
both.
Internet: A collection of networks connected together
DMZ, Demilitarized Zone: Used to host Internet that span the entire globe using the NFSNET as their
services without allowing unauthorized access to an backbone. As a generic term, it refers to any collection
internal (private) network. Typically, the DMZ contains of interdependent networks.
servers accessible to Internet traffic, such as Web
(HTTP) servers, FTP servers, SMTP (email) servers ICMP, Internet Control Message Protocol: Part of the
and DNS servers. Internet Protocol (IP) that allows for the generation of
DMZ interface: The FortiGate interface that is error messages, test packets, and information
connected to a DMZ network. messages relating to IP. This is the protocol used by
the ping function when sending ICMP Echo Requests
DNS, Domain Name Service: A service that converts to a network host.
symbolic node names to IP addresses.
IKE, Internet Key Exchange: A method of
Ethernet: A local-area network (LAN) architecture that
automatically exchanging authentication and
uses a bus or star topology and supports data transfer
encryption keys between two secure servers.
rates of 10 Mbps. Ethernet is one of the most widely
implemented LAN standards. A newer version of IMAP, Internet Message Access Protocol: An
Ethernet, called 100 Base-T (or Fast Ethernet), Internet email protocol that allows access to your email
supports data transfer rates of 100 Mbps. And the from any IMAP compatible browser. With IMAP, your
newest version, Gigabit Ethernet, supports data rates mail resides on the server.
of 1 gigabit (1,000 megabits) per second.
IP, Internet Protocol: The component of TCP/IP that
External interface: The FortiGate interface that is
handles routing.
connected to the Internet. For the FortiGate-60 the
external interface is WAN1 or WAN2. IP Address: An identifier for a computer or device on a
FTP, File transfer Protocol: An application and TCP/ TCP/IP network. An IP address is a 32-bit numeric
IP protocol used to upload or download files. address written as four numbers separated by periods.
Each number can be zero to 255.
Gateway: A combination of hardware and software that
links different networks. Gateways between TCP/IP L2TP, Layer Two (2) Tunneling Protocol: An
networks, for example, can link different subnetworks. extension to the PPTP protocol that enables ISPs to
HTTP, Hyper Text Transfer Protocol: The protocol operate Virtual Private Networks (VPNs). L2TP merges
used by the World Wide Web. HTTP defines how PPTP from Microsoft and L2F from Cisco Systems. To
messages are formatted and transmitted, and what create an L2TP VPN, your ISP’s routers must support
actions Web servers and browsers should take in L2TP.
response to various commands.
IPSec, Internet Protocol Security: A set of protocols
HTTPS: The SSL protocol for transmitting private that support secure exchange of packets at the IP
documents over the Internet using a Web browser. layer. IPSec is most often used to support VPNs.
LAN, Local Area Network: A computer network that PPP, Point-to-Point Protocol: A TCP/IP protocol that
spans a relatively small area. Most LANs connect provides host-to-network and router-to-router
workstations and personal computers. Each computer connections.
on a LAN is able to access data and devices anywhere
on the LAN. This means that many users can share PPTP, Point-to-Point Tunneling Protocol: A
data as well as physical resources such as printers. Windows-based technology for creating VPNs. PPTP
is supported by Windows 98, 2000, and XP. To create a
MAC address, Media Access Control address: A PPTP VPN, your ISP's routers must support PPTP.
hardware address that uniquely identifies each node of
a network. Port: In TCP/IP and UDP networks, a port is an
endpoint to a logical connection. The port number
MIB, Management Information Base: A database of identifies what type of port it is. For example, port 80 is
objects that can be monitored by an SNMP network used for HTTP traffic.
manager.
Protocol: An agreed-upon format for transmitting data
Modem: A device that converts digital signals into between two devices. The protocol determines the type
analog signals and back again for transmission over of error checking to be used, the data compression
telephone lines. method (if any), how the sending device indicates that
it has finished sending a message, and how the
MTU, Maximum Transmission Unit: The largest
receiving device indicates that it has received a
physical packet size, measured in bytes, that a network
message.
can transmit. Any packets larger than the MTU are
divided into smaller packets before being sent. Ideally, RADIUS, Remote Authentication Dial-In User
you want the MTU your network produces to be the Service: An authentication and accounting system
same as the smallest MTU of all the networks between used by many Internet Service Providers (ISPs). When
your machine and a message's final destination. If your users dial into an ISP they enter a user name and
messages are larger than one of the intervening MTUs, password. This information is passed to a RADIUS
they get broken up (fragmented), which slows down server, which checks that the information is correct,
transmission speeds. and then authorizes access to the ISP system.
Netmask: Also called subnet mask. A set of rules for Router: A device that connects LANs into an internal
omitting parts of a complete IP address to reach a network and routes traffic between them.
target destination without using a broadcast message.
It can indicate a subnetwork portion of a larger network Routing: The process of determining a path to use to
in TCP/IP. Sometimes referred to as an Address Mask. send data to its destination.
NTP, Network Time Protocol: Used to synchronize Routing table: A list of valid paths through which data
the time of a computer to an NTP server. NTP provides can be transmitted.
accuracies to within tens of milliseconds across the
Server: An application that answers requests from
Internet relative to Coordinated Universal Time (UTC).
other devices (clients). Used as a generic term for any
Packet: A piece of a message transmitted over a device that provides services to the rest of the network
packet-switching network. One of the key features of a such as printing, high capacity storage, and network
packet is that it contains the destination address in access.
addition to the data. In IP networks, packets are often
SMTP, Simple Mail Transfer Protocol: In TCP/IP
called datagrams.
networks, this is an application for providing mail
Ping, Packet Internet Grouper: A utility used to delivery services.
determine whether a specific IP address is accessible.
SNMP, Simple Network Management Protocol: A set
It works by sending a packet to the specified address
of protocols for managing networks. SNMP works by
and waiting for a reply.
sending messages to different parts of a network.
POP3, Post Office Protocol: A protocol used to SNMP-compliant devices, called agents, store data
transfer e-mail from a mail server to a mail client across about themselves in Management Information Bases
the Internet. Most e-mail clients use POP. (MIBs) and return this data to the SNMP requesters.
SSH, Secure shell: A secure Telnet replacement that UDP, User Datagram Protocol: A connectionless
you can use to log into another computer over a protocol that, like TCP, runs on top of IP networks.
network and run commands. SSH provides strong Unlike TCP, UDP provides very few error recovery
secure authentication and secure communications services, offering instead a direct way to send and
over insecure channels. receive datagrams over an IP network. It is used
primarily for broadcasting messages over a network.
Subnet: A portion of a network that shares a common
address component. On TCP/IP networks, subnets are VPN, Virtual Private Network: A network that links
defined as all devices whose IP addresses have the private networks over the Internet. VPNs use
same prefix. For example, all devices with IP encryption and other security mechanisms to ensure
addresses that start with 100.100.100. would be part of that only authorized users can access the network and
the same subnet. Dividing a network into subnets is that data cannot be intercepted.
useful for both security and performance reasons. Virus: A computer program that attaches itself to other
IP networks are divided using a subnet mask. programs, spreading itself through computers or
networks by this mechanism usually with harmful
Subnet Address: The part of the IP address that intent.
identifies the subnetwork.
Worm: A program or algorithm that replicates itself
TCP, Transmission Control Protocol: One of the over a computer network, usually through email, and
main protocols in TCP/IP networks. TCP guarantees performs malicious actions, such as using up the
delivery of data and also guarantees that packets will computer's resources and possibly shutting the system
be delivered in the same order in which they were sent. down.
Index
A L
alert email logging
configuring 25 attack messages 26
anomalies 19 configuring 25
configuring 20
log messages 27 M
viewing 20
messages
attack log messages 26
attack log 26
anomalies 27
signature 26
attacks
N
logging 11 network performance 23
responses 11
P
C
performance 23
custom signatures 16 predefined signatures 10
adding 18 configuring 13
backing up 19 groups 14
viewing 17 viewing 11
customer service 7 protection profiles 23
creating 24
D options 24
default settings 23 S
F signature attack log messages 26
signatures
fail open 23 configuring predefined 13
firewall profiles 23 custom 16
Fortinet customer service 7 groups 11
FortiProtect Attack Encyclopedia 27 predefined 10
FortiProtect center 27 predefined groups 14
updates 11
G viewing predefined 11
SYN flood 29
groups 11 configuring protection 31, 32
diagrams 31
I FortiGate response to 30
prevention 30
ICMP SYN proxy 30
definition 47
SYN threshold 30
ICMP attack signatures 33
ICMP sweep T
anomalies 36
configuring protection 36 technical support 7
U
updates 11