Created on
02-08-2024
09:35 PM
Edited on
10-30-2024
06:12 AM
By
Jean-Philippe_P
Description |
This article describes how to configure an IPv4 Dos Policy on FortiGate for use with Zoom meetings. Zoom meetings generate a large amount of UDP packets. Due to the large volume of UDP packets the, udp_flood on an IPv4 Dos policy can easily be triggered. This can cause a number of issues resulting in poor quality communication. |
Scope | FortiGate. |
Solution |
Zoom requires TCP ports 80,443 and UDP ports 3478, 3479, 8801 - 8810. See the Zoom network firewall or proxy server settings:
If the IPv4 DoS policy is causing Zoom UDP packets to drop by triggering the udp_flood, it is necessary to allow the UDP ports that Zoom uses.
This can be done in a separate IPv4 DoS policy so that the normal DoS policy is still effective.
Here is an example of how the service object should be configured:
CLI configuration of the service:
In this example, port1 was used. The interface needs to be the Internet-facing WAN interface.
CLI configuration of the IPv4DoS policy and udp_flood anomaly:
edit 2 set name "Zoom-bypass" set interface "port1" set srcaddr "all" set dstaddr "all" set service "Zoom UDP Ports" config anomaly edit "udp_flood" set status enable set log enable set action pass set threshold 2000 next end next end
To move the IPv4 DoS policy on the CLI use the following command:
move 2 before 1
The result will be that traffic from Zoom servers will hit the Zoom-bypass DoS policy and not trigger the udp_flood. If the action is set to 'monitor' the traffic will pass through but will be shown in the Anomaly logs as 'detected'. |