Configuring a DNS Reverse Flood Protection policy
The DNS Reverse Flood Protection policy can limit the number of ANY type DNS requests per second to mitigate against DNS reverse flood attacks.
Using the DNS Reverse Flood Protection policy, you can set a ANY Query Rate Limit to restrict the number of all types (ANY) of DNS queries that can be made per second. Once the query rate exceeds the limit, it will trigger a corresponding action (Pass or Deny).
After you have configured a DNS Reverse Flood Protection policy, you can apply it in a DoS Protection Profile.
To configure a DNS Reverse Flood Protection policy:
- Go to DoS Protection > Application.
- Click the DNS Reverse Flood Protection tab.
- Click Create New to display the configuration editor.
- Configure the following DNS Reverse Flood Protection settings:
Setting
Description
Name Specify a name for the DNS Reverse Flood Protection policy.
Valid characters areA
-Z
,a
-z
,0
-9
,_
, and-
. No spaces. The configuration name cannot be edited once it has been saved.Status Enable/disable the status of this DNS Reverse Flood Protection policy.
ANY Query Rate Limit Specify the allowable number of DNS requests per second, with query type ANY. The range is 0 to 1048567. The default is 0, which means that no limit is placed on the number of DNS queries that can be made per second.
Note:
Multiple "rate limit" type of operations may be executed through various configurations, however, they cannot be executed all at once. Priority is given to certain rate limit operations. The following lists the execution sequence.Transaction Rate Limit (from the virtual server configuration).
DNS Query Rate Limit (from DNS Query Flood Protection policy).
ANY Query Rate Limit (from DNS Reverse Flood Protection policy).
Action Select the corresponding action to take when the ANY Query Rate Limit is exceeded:
Pass — Allow the traffic.
Deny — Drop the traffic, send a 400 Bad request to the client.
Deny is the default option.
Log Enable/disable logging for the Action. This is disabled by default. Severity Select the event severity to log when the DNS Reverse Flood Protection policy is triggered:
- High — Log as high severity events.
- Medium — Log as a medium severity events.
- Low — Log as low severity events.
The default is High.
-
Click Save.
After the new DNS Reverse Flood Protection policy has been saved, it will appear in the DNS Reverse Flood Protection page. You can now apply this DNS Reverse Flood Protection policy to a DoS Protection Profile configuration.
Statistical data of DNS Reverse Flood attacks are recorded in Security logs in detail (from FortiView and Log & Report), and in the Dashboard Security widget as event counts. Typically, Security logs provide the attack count as well, however, due to the speed at which DNS Reverse Flood attacks can occur (within milliseconds), the Security logs cannot accurately count each attack as the logs are counted every 1 second. This means that when a DNS Reverse Flood attack occurs, Security logs can only capture the attack details but not the accurate count of the number of packets that has exceeded the ANY Query Rate Limit. To view the correct count of each ANY Query Rate Limit excess event, you can reference the Security widget from the Dashboard that is a dedicated security event counter. |