FortiDDoS
FortiDDoS protects from both known and zero day attacks with very low latency. It’s easy to deploy and manage, and includes comprehensive reporting and analysis tools.
arleniscg
Staff
Staff
Article Id 373003
Description This article describes how to manually adjust the sys_reco threshold settings to modify the custom port for SSL VPN traffic.
Scope FortiDDoS-F.
Solution

Topology:

 

Remote SSL VPN user (custom port 20443) --->   ISP link  ---->   FortiDDoS  -----> FortiGate  ---> (Internal network).

 

  1. By default, FortiGate uses port 443, and FortiDDoS does not configure any threshold setting for this port. 

 

0FDD.png

 

  1. Verify whether there are drops on port 443/UDP and monitor the traffic:

Monitor -> Layer 3/4/7 (Traffic Monitor) ->  select (SPP and Layer 4, examine the UDP graphic). If some drops are present, set a large threshold for Layer 4/ UDP Ports.

 

1FDD.png

If FortiGate uses dtls on the connection, disable it on the FortiDDoS DLTS and SSL Profile:

 

3FDD.png

4FDD.png

To verify whether it is enabled on FortiClient:

 

2FDD.png

 

To verify whether it is enabled on FortiGate through the CLI:

 

config vpn ssl setting
    set dtls-tunnel enable

 

  1. Locate the sys_reco that contains the custom SSL port:
                                                    
5FDD.png

  1. Break the sys_reco:

6FDD.png

 

  1. Delete the original sys_reco and re-create the 3 custom sys_recs:
 
7FDD.png

8FDD.png

9FDD.png

Validate traffic Monitor -> Layer 3/4/7 -> to see if there is any other drop and if an increase is required in the threshold on the custom port. Optionally, use Wireshark on the Remote user's PC when replicating the SSL VPN connection to confirm the traffic/ports in use.