Description | This article describes the steps to take in case FortiGate is affected by a DoS / DDoS attack. |
Scope | FortiGate, DoS, DDoS. |
Solution |
In a DoS (Denial of Service) / DDoS (Distributed Denial of Service) attack, the attacker / bad actor overwhelms the network resources thereby preventing legitimate users from accessing network resources such as servers, databases, applications, services, etc.
Symptoms of DoS / DDoS attack on FortiGate could be but are not limited to high CPU/Memory/bandwidth utilization, higher session count than usual, unable to access FortiGate via GUI/SSH/console, SSH/GUI session getting hung, incomplete output after running a command as FortiGate is too busy to handle legitimate traffic, performance issues, etc. In such scenarios, an HA Failover will not help as well as the sessions are synchronized among devices within an HA Cluster.
To identify the source of the DoS / DDoS attack, the following steps could be helpful:
If these measures are taken, it will enhance FortiGate's resilience against DoS / DDoS attacks. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.