Created on
10-02-2022
11:14 AM
Edited on
07-22-2025
05:56 AM
By
Jean-Philippe_P
Description | This article describes how to configure a TTL security policy for BGP. |
Scope | FortiGate. |
Solution |
Problem. Referring to the image below, even though 10.122.2.155 is not a valid eBGP neighbor, 10.1.1.1 still responded with SYN-ACK packets to the SYN packet sent by the former. This opens up the device for CPU-utilization-based attacks.
To avoid such vulnerability from being exploited, one method is to use the TTL Security Policy.
In this example, BGP communication below TTL 253 is not to be expected. However, it is notable that the rogue router has a TTL of 251.
Considering the scenario, the following has been configured to mitigate this vulnerability.
config firewall ttl-policy
10.1.1.1 is not responding to the SYN packets anymore sent by the rogue router.
Note: The 'ttl-policy' is not used for forwarding traffic. The 'ttl-policy' only applied to the local-in traffic, whose destination IP is FortiGate itself.
For more information regarding the TTL Security Mechanism, refer to: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.