DOCUMENT LIBRARY
DOCUMENT LIBRARY
Products
Best Practices
Hardware Guides
Products A-Z
Summary
By Solution
By 4D Pillars
By Cloud
Secure Networking
Unified SASE
Security Operations
Secure SD-WAN
Secure Access Service Edge (SASE)
ZTNA
LAN Edge
Identity and Access Management
Next Generation Firewall
Public Cloud
Private Cloud
FortiCloud
Secure Networking
Hybrid Mesh Firewall
FortiGate/ FortiOS
FortiGate-5000
/
6000
/
7000
NOC Management
FortiManager
/
FortiManager Cloud
Managed Fortigate Service
LAN
FortiSwitch
FortiAP / FortiWiFi
FortiEdge Cloud
FortiNAC-F
WAN
Secure SD-WAN
FortiExtender
More >>
Unified SASE
Single Vendor SASE
FortiSASE
Secure SD-WAN
Zero Trust Network Access (ZTNA)
FortiProxy
FortiMonitor
Cloud Network Security
FortiGate Public Cloud
FortiGate Private Cloud
FortiGate CNF
FortiFlex
Lacework FortiCNAPP
Secure Endpoint Connectivity
FortiClient
/
FortiClient Cloud
Web Application / API Protection
FortiWeb
FortiADC
FortiDAST
More >>
Security Operations
Security Operations Automation
FortiAnalyzer
/
FortiAnalyzer Cloud
FortiSIEM
/
FortiSIEM Cloud
FortiSOAR
SOC-as-a-Service (SOCaaS)
Identity
FortiAuthenticator
FortiTrust Identity
FortiPAM
Early Detection & Prevention
FortiSandbox
/
FortiSandbox Cloud
FortiNDR
FortiDeceptor
FortiRecon
More >>
Secure Networking
Hybrid Mesh Firewall
FortiGate/ FortiOS
FortiGate-5000
/
6000
/
7000
NOC Management
FortiManager
/
FortiManager Cloud
Managed Fortigate Service
FortiAIOps
LAN
FortiSwitch
FortiAP / FortiWiFi
FortiAP-U Series
FortiEdge Cloud
FortiNAC-F
WAN
Secure SD-WAN
FortiExtender
Communication & Surveillance
FortiVoice
/
FortiVoice Cloud
FortiFone
FortiCamera
FortiRecorder
FortiCentral
Unified SASE
Single Vendor SASE
FortiSASE
Secure SD-WAN
Zero Trust Network Access (ZTNA)
FortiProxy
FortiMonitor
Secure Endpoint Connectivity
FortiClient
/
FortiClient Cloud
Cloud Network Security
FortiGate Public Cloud
FortiGate Private Cloud
FortiGate CNF
FortiFlex
Cloud-Native Security
Lacework FortiCNAPP
FortiDevSec
Web Application / API Protection
FortiWeb
FortiADC
FortiDAST
Security Operations
Security Operations Automation
FortiAnalyzer
/
FortiAnalyzer Cloud
FortiSIEM
/
FortiSIEM Cloud
FortiSOAR
Endpoint
FortiClient
/
FortiClient Cloud
FortiEDR/XDR
Data Protection
FortiDLP
FortiDLP Agent
FortiDLP Policies
Identity
FortiAuthenticator
FortiTrust Identity
FortiToken
/
FortiToken Cloud
FortiPAM
Email
FortiMail
FortiPhish
Early Detection & Prevention
FortiSandbox
/
FortiSandbox Cloud
FortiNDR
FortiDeceptor
FortiRecon
Expert Services
SOC-as-a-Service (SOCaaS)
Edge Firewall
FortiGate/FortiOS
FortiGate-5000
/
6000
/
7000
FortiGate Public Cloud
FortiGate Private Cloud
Orchestration & management
FortiManager
/
FortiManager Cloud
FortiAnalyzer
/
FortiAnalyzer Cloud
Overlay-as-a-Service
SD Branch
FortiSwitch
FortiAP / FortiWiFi
FortiExtender
/
FortiExtender Cloud
Application Delivery
FortiADC
/
FortiGSLB
Single Vendor SASE
FortiSASE
Secure Endpoint Connectivity
FortiClient
/
FortiClient Cloud
Secure Private Access
Secure SD-WAN
Zero Trust Network Access (ZTNA)
Thin Edge
FortiGate/ FortiOS
FortiAP / FortiWiFi
FortiExtender
/
FortiExtender Cloud
Identity
FortiAuthenticator
FortiTrust Identity
FortiToken Cloud
FortiToken
Application Gateway
FortiGate/ FortiOS
FortiProxy
FortiADC
/
FortiGSLB
Enterprise Asset Management
FortiClient EMS
Endpoint Agent
FortiClient
/
FortiClient Cloud
Agentless Security Posture
FortiNAC-F
FortiSIEM
/
FortiSIEM Cloud
Identity
FortiAuthenticator
FortiTrust Identity
FortiToken Cloud
FortiToken
Wireless
FortiAP / FortiWiFi
FortiAP-U Series
FortiGate Cloud
Switching
FortiSwitch
FortiEdge Cloud
FortiNAC-F
Identity
FortiAuthenticator
FortiTrust Identity
FortiToken Cloud
FortiToken
Privilege Acccess Management
FortiPAM
Next Generation Firewall
FortiGate / FortiOS
FortiGate-5000
/
6000
/
7000
FortiGate Public Cloud
FortiGate Private Cloud
Orchestration & management
FortiManager
/
FortiManager Cloud
FortiAnalyzer
/
FortiAnalyzer Cloud
Expert Services
SOC-as-a-Service (SOCaaS)
Managed Fortigate Service
All
FortiADC Public Cloud
FortiAnalyzer Public Cloud
FortiAuthenticator Public Cloud
FortiDeceptor Public Cloud
FortiGate Public Cloud
FortiIsolator Public Cloud
FortiManager Public Cloud
FortiNDR Public Cloud
FortiPAM Public Cloud
FortiPortal Public Cloud
FortiProxy Public Cloud
FortiSandbox Public Cloud
FortiTester Public Cloud
FortiVoice Public Cloud
FortiWeb Manager Public Cloud
FortiWeb Public Cloud
All
FortiADC Private Cloud
FortiAnalyzer BigData Private Cloud
FortiAnalyzer Private Cloud
FortiAuthenticator Private Cloud
FortiDeceptor Private Cloud
FortiGate Private Cloud
FortiManager Private Cloud
FortiNDR Private Cloud
FortiPAM Private Cloud
FortiProxy Private Cloud
FortiSandbox Private Cloud
FortiTester Private Cloud
FortiVoice Private Cloud
FortiWeb Manager Private Cloud
FortiWeb Private Cloud
Account Management
FortiCloud Services
SAAS Management
FortiGate Cloud
FortiEdge Cloud
FortiEdge Cloud
FortiExtender Cloud
FortiPresence Cloud
FortiToken Cloud
FortiTrust Identity
FortiZTP
FortiCamera Cloud
SAAS Application Security
FortiWeb Cloud
FortiGSLB
FortiCASB
FortiCNP
FortiInsight
FortiPhish
FortiGate CNF
Managed Services
SOC-as-a-Service (SOCaaS)
Managed Fortigate Service
Platform as a service (PAAS)
FortiSASE
FortiAnalyzer Cloud
FortiManager Cloud
FortiClient Cloud
FortiSandbox Cloud
FortiMail Cloud
FortiSOAR Cloud
Other SAAS Services
Overlay-as-a-Service
FortiRecon
FortiConverter
ForiIPAM
FortiFlex
FortiCare Elite
4D Resources
Solution Hubs
Define, design, deploy, demo
4D Pillars
Secure SD-WAN
Zero Trust Network Access
Wireless
Switching
Secure Access Service Edge
Identity and Access Management
Next Generation Firewall
Curated Links by Solution
Cloud
FortiCloud
Public & Private Cloud
Popular Solutions
Secure SD-WAN
Zero Trust Network Access
Secure Access
Security Fabric
Tele-Working
Multi-Factor Authentication
FortiASIC
Operational Technology
MSSP
Next Generation Firewall
FortiAnalyzer
FortiAnalyzer Big-Data
FortiADC
FortiAP / FortiWiFi
FortiAP U-Series
FortiAuthenticator
FortiCache
FortiCarrier
FortiController
FortiDDoS
FortiDDoS-F
FortiDeceptor
FortiExtender
FortiGate-5000
FortiGate-6000
FortiGate-7000
FortiHypervisor
FortiIsolator
FortiMail
FortiManager
FortiNAC
FortiNDR
FortiProxy
FortiRecorder
FortiGate
FortiRPS
FortiSandbox
FortiSIEM
FortiSwitch
FortiTester
FortiToken
FortiVoice
FortiWAN
FortiWeb
FortiWLC
FortiWLM
AscenLink
AV Engine
AWS Firewall Rules
Container FortiOS
FortiADC
FortiADC E Series
FortiADC Manager
FortiADC Private Cloud
FortiADC Public Cloud
FortiAIOps
FortiAnalyzer
FortiAnalyzer BigData
FortiAnalyzer BigData Private Cloud
FortiAnalyzer Cloud
FortiAnalyzer Private Cloud
FortiAnalyzer Public Cloud
FortiAP / FortiWiFi
FortiAP-U Series
FortiAuthenticator
FortiAuthenticator Private Cloud
FortiAuthenticator Public Cloud
FortiAuthProxy
FortiBalancer
FortiBranchSASE
FortiBridge
FortiCache
FortiCamera
FortiCamera Cloud
FortiCare Elite
FortiCarrier
FortiCASB
FortiCentral
FortiClient
FortiClient Cloud
FortiCloud Services
FortiCNP
FortiConnect
FortiController
FortiConverter Service
FortiConverter Tool
FortiCore
FortiCSPM
FortiCWP
FortiDAST
FortiDB
FortiDDoS
FortiDDoS-F
FortiDeceptor
FortiDeceptor DaaS
FortiDeceptor Private Cloud
FortiDeceptor Public Cloud
FortiDevSec
FortiDLP
FortiDLP Agent
FortiDLP Policies
FortiDNS
FortiEdge Cloud
FortiEDR/XDR
FortiEndpoint
FortiExplorer
FortiExplorer Go
FortiExtender
FortiFlex
FortiFone
FortiGate / FortiOS
FortiGate Cloud
FortiGate CNF
FortiGate Private Cloud
FortiGate Public Cloud
FortiGate-5000
FortiGate-6000
FortiGate-7000
FortiGate-as-a-Service
FortiGSLB
FortiGuard Advanced Bot Protection
FortiGuest
FortiHypervisor
FortiInsight
FortiInsight Cloud
FortiIPAM
FortiIsolator
FortiIsolator Public Cloud
FortiLAN Cloud
FortiMail
FortiMail Cloud
FortiManager
FortiManager Cloud
FortiManager Private Cloud
FortiManager Public Cloud
FortiMonitor
FortiNAC
FortiNAC-F
FortiNDR
FortiNDR (on-premise) Private Cloud
FortiNDR (on-premise) Public Cloud
FortiNDR Cloud
FortiNDR Cloud Sensors
FortiPAM
FortiPAM Private Cloud
FortiPAM Public Cloud
FortiPhish
FortiPlanner
FortiPolicy
FortiPortal
FortiPortal Public Cloud
FortiPresence
FortiPresence VM
FortiProxy
FortiProxy Private Cloud
FortiProxy Public Cloud
FortiRecon
FortiRecorder
FortiRPS
FortiSandbox
FortiSandbox Cloud
FortiSandbox Private Cloud
FortiSandbox Public Cloud
FortiSASE
FortiScanner
FortiSIEM
FortiSIEM Cloud
FortiSOAR
FortiSOAR Cloud
FortiSRA
FortiSwitch
FortiSwitch Manager
FortiTap
FortiTester
FortiTester Private Cloud
FortiTester Public Cloud
FortiToken
FortiToken Cloud
FortiTrust Identity
FortiVoice
FortiVoice Cloud
FortiVoice Private Cloud
FortiVoice Public Cloud
FortiWAN
FortiWAN Controller
FortiWeb
FortiWeb Cloud
FortiWeb Manager Private Cloud
FortiWeb Manager Public Cloud
FortiWeb Private Cloud
FortiWeb Public Cloud
FortiWLM
FortiZTP
IPS Engine
Lacework FortiCNAPP
Managed FortiGate Service
Overlay-as-a-Service
Security Awareness and Training
SOCaaS
Wireless Controller
Search documents and hardware ...
Handbook
Introduction
Product features
Deployment topology
Document Scope
What’s New
What's New in FortiDDoS 6.x
Key Concepts
DDoS attack overview
DDoS attack mitigation mechanisms
DDoS mitigation techniques overview
Understanding FortiDDoS rate limiting thresholds
Using FortiDDoS ACLs
Understanding FortiDDoS protocol anomaly protection
Understanding FortiDDoS Detection Mode
Understanding FortiDDoS Prevention Mode
Understanding FortiDDoS Asymmetric Mode
Understanding FortiDDoS DNS attack mitigation
Using FortiDDoS SPPs
Working with the FortiDDoS Monitor graphs
Working with the FortiDDoS attack log
A typical workflow for investigating FortiDDoS attack events
Getting Started
Step 1: Install the appliance
Step 2: Configure the management interface
Step 3: Configure basic network settings
Step 4: Test connectivity
Step 5: Complete product registration, licensing, and upgrades
Step 6: Define SPPs and subnets
Step 7: Deploy the system in Detection Mode
Step 8: Generate traffic statistics and set the configured minimum thresholds
Step 9: Monitor the system and become familiar with logs and reports
Step 10: Deploy the system in Prevention Mode
Step 11: Back up the configuration
Dashboard
Status
Top Attacks
CLI Console
Configuring the hostname
Rebooting, shutting down, and resetting the system
FortiView
Threat Map
SPP
System Management
High Availability Deployments
HA feature overview
HA system requirements
Deploying an active-passive cluster
HA synchronization
Configuring HA settings
Operational tasks
Monitoring an HA cluster
Updating firmware on an HA cluster
Modifying system or report settings on HA Secondary
Managing administrator users
Configuring RADIUS authentication
Configuring LDAP authentication
Configuring TACACS+ authentication
Configuring SNMP for remote alarm event trap reporting and MIB queries
Configuring SNMP system information
Managing local certificates
Generating system reports for offline analysis
Updating firmware
Backing up and restoring the configuration
Configuring system time
Setting configuration auto-backup
FortiGuard
Address and Service
Debug
Network
Configuring network interfaces
Configuring static routes
Configuring DNS
Packet Capture
Global Settings
Deployment
Proxy IP
Cloud Signaling
Configuring blocklisted IPv4 addresses
Configuring blocklisted domains
Configuring Do Not Track / Track and Allow policies
Configuring GRE tunnel endpoint addresses
Service Protection
Service Protection Policy Overview
Configuring Service Protection Policies
Service Protection Policy Feature Settings
Source tracking
Blocking settings
Service port settings
Protection profile settings
Protection subnets
ACLs
Thresholds
Thresholds Overview
Thresholds View
Threshold Settings
Generate Traffic Statistics
System Recommendations
Manual Threshold Setting
Emergency Setup
Factory Default
Protection subnets list
SPP Profiles Overview
IP Profile
ICMP Profile
TCP Profile
HTTP Profile
SSL/TLS Profile
NTP Profile
DNS Profile
DTLS Profile
Monitor Graphs
Monitor graphs overview
Reading Monitor graphs
Using Interface graphs
Using the SPP Traffic graphs
Using Subnets graphs
Using Drops Monitor graphs
Global Monitor Graphs
Using the Global > Aggregate Drops graph
Using the Global > ACL Drops graphs
SPP Monitor Graphs
Using the Aggregate Drops graph
Using the Flood Drops graphs
Using the ACL Drops graphs
Using the Anomaly Drops graphs
Using the Out of Memory Drops graphs
Using Traffic Monitor Layer 3/4/7 graphs
Using the Layer 3 graphs
Using the Layer 4 graphs
Using the Layer 7 graphs
Logs and Reports
Log Configuration
Logs and reports overview
Configuring local log settings
Configuring remote log settings
Configuring remote log server settings for event logs
Configuring remote log server settings for DDoS attack log
Using FortiAnalyzer to collect DDoS attack logs
Using FortiSIEM to collect DDoS attack and event logs
Configuring alert email settings
Configuring Attack Log purge settings
Configuring SNMP trap receivers for remote DDoS attack reporting
Log Access
Using the DDoS attack log table
Using the event log table
Attack Log Backup
Login Events
Reports
Reports Overview
Configuring reports
Configuring report purge settings
Using Report Browse
Configuring Flowspec
Deployment Topologies
Basic Inline deployment
Built-in fail-open bypass
External bypass
Tap Mode deployments
Troubleshooting
Logs
Tools
Solutions by issue type
Resetting profile data or the system configuration
Restoring firmware ('clean install')
Additional resources
Appendix
Appendix A: DDoS Attack Log Reference
Appendix B: Remote Syslog Reference
Appendix C: Management Information Base (MIB)
Appendix D: Port Numbers
Appendix E: Capturing Packets
Appendix F: Deleting Service Protection Policies (SPPs)
Change Log
Home
FortiDDoS-F 6.2.1
Handbook
6.2.1
7.0.3
7.0.1
7.0.0
6.6.3
6.6.3
6.6.1
6.6.0
6.5.1
6.5.0
6.4.1
6.4.0
6.3.3
6.3.2
6.3.1
6.2.3
6.2.2
6.2.1
6.2.0
6.1.1
Using Drops Monitor graphs
Using Drops Monitor graphs
Previous
Next
Using Drops Monitor graphs
Using Drops Monitor graphs
Previous
Next
Home
Product Pillars
Network Security
Network Security
FortiGate / FortiOS
FortiGate 5000
FortiGate 6000
FortiGate 7000
FortiProxy
NOC & SOC Management
FortiManager
FortiManager Cloud
FortiAnalyzer
FortiAnalyzer Cloud
FortiMonitor
FortiGate Cloud
Enterprise Networking
Secure SD-WAN
FortiLAN Cloud
FortiSwitch
FortiAP / FortiWiFi
FortiAP-U Series
FortiNAC-F
FortiExtender
FortiExtender Cloud
FortiAIOps
Business Communications
FortiFone
FortiVoice
FortiVoice Cloud
FortiRecorder
FortiCamera
Zero Trust Access
ZTNA
Zero Trust Network Access
FortiClient EMS
SASE
FortiSASE
Identity
FortiAuthenticator
FortiTrust Identity
FortiToken Cloud
FortiToken
Cloud Security
Hybrid Cloud Security
FortiGate Public Cloud
FortiGate Private Cloud
FortiFlex
Cloud Native Protection
FortiCNP
FortiDevSec
Web Application / API Protection
FortiWeb
FortiWeb Cloud
FortiADC
FortiGSLB
FortiGuard ABP
SAAS Security
FortiMail
FortiMail Cloud
FortiCASB
Security Operations
SOC Platform
FortiAnalyzer
FortiAnalyzer Cloud
FortiSIEM
/
FortiSIEM Cloud
FortiSOAR
FortiPhish
Advanced Threat Protection
FortiSandbox
FortiSandbox Cloud
FortiNDR
FortiNDR Cloud
FortiDeceptor
FortiInsight
FortiInsight Cloud
FortiIsolator
Endpoint Security
FortiClient
FortiClient Cloud
FortiEDR
Best Practices
Solution Hubs
Cloud
FortiCloud
Public & Private Cloud
Popular Solutions
Secure SD-WAN
Zero Trust Network Access
Secure Access
Next Generation Firewall
Security Fabric
Tele-Working
Multi-Factor Authentication
FortiASIC
Operational Technology
MSSP
4-D Resources
Secure SD-WAN
Zero Trust Network Access
Wireless
Switching
Secure Access Service Edge
Identity and Access Management
Next Generation Firewall
Hardware Guides
FortiAnalyzer
FortiAnalyzer Big-Data
FortiADC
FortiAP / FortiWiFi
FortiAP U-Series
FortiAuthenticator
FortiCache
FortiCarrier
FortiController
FortiDDoS
FortiDDoS-F
FortiDeceptor
FortiExtender
FortiGate
FortiGate-5000
FortiGate-6000
FortiGate-7000
FortiHypervisor
FortiIsolator
FortiMail
FortiManager
FortiNAC
FortiNDR
FortiProxy
FortiRecorder
FortiRPS
FortiSandbox
FortiSIEM
FortiSwitch
FortiTester
FortiToken
FortiVoice
FortiWAN
FortiWeb
FortiWLC
FortiWLM
Product A-Z
AscenLink
AV Engine
AWS Firewall Rules
Container FortiOS
FortiADC
FortiADC E Series
FortiADC Manager
FortiADC Private Cloud
FortiADC Public Cloud
FortiAIOps
FortiAnalyzer
FortiAnalyzer BigData
FortiAnalyzer BigData Private Cloud
FortiAnalyzer Cloud
FortiAnalyzer Private Cloud
FortiAnalyzer Public Cloud
FortiAP / FortiWiFi
FortiAP-U Series
FortiAuthenticator
FortiAuthenticator Private Cloud
FortiAuthenticator Public Cloud
FortiAuthProxy
FortiBalancer
FortiBranchSASE
FortiBridge
FortiCache
FortiCamera
FortiCamera Cloud
FortiCare Elite
FortiCarrier
FortiCASB
FortiCentral
FortiClient
FortiClient Cloud
FortiCloud Services
FortiCNP
FortiConnect
FortiController
FortiConverter Service
FortiConverter Tool
FortiCore
FortiCSPM
FortiCWP
FortiDAST
FortiDB
FortiDDoS
FortiDDoS-F
FortiDeceptor
FortiDeceptor DaaS
FortiDeceptor Private Cloud
FortiDeceptor Public Cloud
FortiDevSec
FortiDLP
FortiDLP Agent
FortiDLP Policies
FortiDNS
FortiEdge Cloud
FortiEDR/XDR
FortiEndpoint
FortiExplorer
FortiExplorer Go
FortiExtender
FortiFlex
FortiFone
FortiGate / FortiOS
FortiGate Cloud
FortiGate CNF
FortiGate Private Cloud
FortiGate Public Cloud
FortiGate-5000
FortiGate-6000
FortiGate-7000
FortiGate-as-a-Service
FortiGSLB
FortiGuard Advanced Bot Protection
FortiGuest
FortiHypervisor
FortiInsight
FortiInsight Cloud
FortiIPAM
FortiIsolator
FortiIsolator Public Cloud
FortiLAN Cloud
FortiMail
FortiMail Cloud
FortiManager
FortiManager Cloud
FortiManager Private Cloud
FortiManager Public Cloud
FortiMonitor
FortiNAC
FortiNAC-F
FortiNDR
FortiNDR (on-premise) Private Cloud
FortiNDR (on-premise) Public Cloud
FortiNDR Cloud
FortiNDR Cloud Sensors
FortiPAM
FortiPAM Private Cloud
FortiPAM Public Cloud
FortiPhish
FortiPlanner
FortiPolicy
FortiPortal
FortiPortal Public Cloud
FortiPresence
FortiPresence VM
FortiProxy
FortiProxy Private Cloud
FortiProxy Public Cloud
FortiRecon
FortiRecorder
FortiRPS
FortiSandbox
FortiSandbox Cloud
FortiSandbox Private Cloud
FortiSandbox Public Cloud
FortiSASE
FortiScanner
FortiSIEM
FortiSIEM Cloud
FortiSOAR
FortiSOAR Cloud
FortiSRA
FortiSwitch
FortiSwitch Manager
FortiTap
FortiTester
FortiTester Private Cloud
FortiTester Public Cloud
FortiToken
FortiToken Cloud
FortiTrust Identity
FortiVoice
FortiVoice Cloud
FortiVoice Private Cloud
FortiVoice Public Cloud
FortiWAN
FortiWAN Controller
FortiWeb
FortiWeb Cloud
FortiWeb Manager Private Cloud
FortiWeb Manager Public Cloud
FortiWeb Private Cloud
FortiWeb Public Cloud
FortiWLM
FortiZTP
IPS Engine
Lacework FortiCNAPP
Managed FortiGate Service
Overlay-as-a-Service
Security Awareness and Training
SOCaaS
Wireless Controller
Ordering Guides
Download PDF
Table of Contents
Introduction
Product features
Deployment topology
Document Scope
What’s New
What's New in FortiDDoS 6.x
Key Concepts
DDoS attack overview
DDoS attack mitigation mechanisms
DDoS mitigation techniques overview
Understanding FortiDDoS rate limiting thresholds
Using FortiDDoS ACLs
Understanding FortiDDoS protocol anomaly protection
Understanding FortiDDoS Detection Mode
Understanding FortiDDoS Prevention Mode
Understanding FortiDDoS Asymmetric Mode
Understanding FortiDDoS DNS attack mitigation
Using FortiDDoS SPPs
Working with the FortiDDoS Monitor graphs
Working with the FortiDDoS attack log
A typical workflow for investigating FortiDDoS attack events
Getting Started
Step 1: Install the appliance
Step 2: Configure the management interface
Step 3: Configure basic network settings
Step 4: Test connectivity
Step 5: Complete product registration, licensing, and upgrades
Step 6: Define SPPs and subnets
Step 7: Deploy the system in Detection Mode
Step 8: Generate traffic statistics and set the configured minimum thresholds
Step 9: Monitor the system and become familiar with logs and reports
Step 10: Deploy the system in Prevention Mode
Step 11: Back up the configuration
Dashboard
Status
Top Attacks
CLI Console
Configuring the hostname
Rebooting, shutting down, and resetting the system
FortiView
Threat Map
SPP
System Management
High Availability Deployments
HA feature overview
HA system requirements
Deploying an active-passive cluster
HA synchronization
Configuring HA settings
Operational tasks
Monitoring an HA cluster
Updating firmware on an HA cluster
Modifying system or report settings on HA Secondary
Managing administrator users
Configuring RADIUS authentication
Configuring LDAP authentication
Configuring TACACS+ authentication
Configuring SNMP for remote alarm event trap reporting and MIB queries
Configuring SNMP system information
Managing local certificates
Generating system reports for offline analysis
Updating firmware
Backing up and restoring the configuration
Configuring system time
Setting configuration auto-backup
FortiGuard
Address and Service
Debug
Network
Configuring network interfaces
Configuring static routes
Configuring DNS
Packet Capture
Global Settings
Deployment
Proxy IP
Cloud Signaling
Configuring blocklisted IPv4 addresses
Configuring blocklisted domains
Configuring Do Not Track / Track and Allow policies
Configuring GRE tunnel endpoint addresses
Service Protection
Service Protection Policy Overview
Configuring Service Protection Policies
Service Protection Policy Feature Settings
Source tracking
Blocking settings
Service port settings
Protection profile settings
Protection subnets
ACLs
Thresholds
Thresholds Overview
Thresholds View
Threshold Settings
Generate Traffic Statistics
System Recommendations
Manual Threshold Setting
Emergency Setup
Factory Default
Protection subnets list
SPP Profiles Overview
IP Profile
ICMP Profile
TCP Profile
HTTP Profile
SSL/TLS Profile
NTP Profile
DNS Profile
DTLS Profile
Monitor Graphs
Monitor graphs overview
Reading Monitor graphs
Using Interface graphs
Using the SPP Traffic graphs
Using Subnets graphs
Using Drops Monitor graphs
Global Monitor Graphs
Using the Global > Aggregate Drops graph
Using the Global > ACL Drops graphs
SPP Monitor Graphs
Using the Aggregate Drops graph
Using the Flood Drops graphs
Using the ACL Drops graphs
Using the Anomaly Drops graphs
Using the Out of Memory Drops graphs
Using Traffic Monitor Layer 3/4/7 graphs
Using the Layer 3 graphs
Using the Layer 4 graphs
Using the Layer 7 graphs
Logs and Reports
Log Configuration
Logs and reports overview
Configuring local log settings
Configuring remote log settings
Configuring remote log server settings for event logs
Configuring remote log server settings for DDoS attack log
Using FortiAnalyzer to collect DDoS attack logs
Using FortiSIEM to collect DDoS attack and event logs
Configuring alert email settings
Configuring Attack Log purge settings
Configuring SNMP trap receivers for remote DDoS attack reporting
Log Access
Using the DDoS attack log table
Using the event log table
Attack Log Backup
Login Events
Reports
Reports Overview
Configuring reports
Configuring report purge settings
Using Report Browse
Configuring Flowspec
Deployment Topologies
Basic Inline deployment
Built-in fail-open bypass
External bypass
Tap Mode deployments
Troubleshooting
Logs
Tools
Solutions by issue type
Resetting profile data or the system configuration
Restoring firmware ('clean install')
Additional resources
Appendix
Appendix A: DDoS Attack Log Reference
Appendix B: Remote Syslog Reference
Appendix C: Management Information Base (MIB)
Appendix D: Port Numbers
Appendix E: Capturing Packets
Appendix F: Deleting Service Protection Policies (SPPs)
Change Log