Created on 04-07-2023 12:30 AM Edited on 09-16-2024 12:15 AM By Anthony_E
Description |
This article explains how to use Microsoft Teams with IPv4 DOS Policy on FortiGate. Meetings/conferences held on Teams involve the communication of a large number of UDP packets. Due to the large number of UDP Packets, this can be picked up as a UDP Flood attack.
This can easily trigger the UDP Flood threshold on the default settings of Fortigate's IPv4 DOS Policy causing FortiGate to drop the UDP sessions. When these sessions are dropped, Microsoft Teams will run into issues such as call freezing, drops, immense stutter, etc. |
Scope |
FortiGate v6.2.x, v6.4.x, v7.0.x, v7.2.x and above. For FortiOS versions that are End of Support, upgrade. |
Solution |
Microsoft Teams requires TCP ports 80,443 and UDP ports 3478-3481. Refer here:
As the DOS Policy is seen dropping UDP sessions for Teams, it will be necessary to Allow the UDP ports that Microsoft Teams uses through the DOS Policy without sacrificing DOS Protection.
By default, it is 49152-65535. Here is an example of what it should look like:
In this DOS policy, ensure UDP Flood is set to Disable or Monitor.
Put this policy above the general block policy:
This means that only traffic that matches UDP Port 3478-3481 will hit this DOS Policy and get permitted. Other traffic that does not match these criteria will hit the DOS Policies below it.
Note: DOS policies are not bidirectional, it will only take care of traffic coming into the FortiGate interface where the DOS policy is configured. Make sure to apply appropriate source/destination ports and IPs coming into the firewall.
Result:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.