Using the Layer 4 graphs
Example Layer 4 graph
Before you begin:
• You must have Read permission for the Monitor menu.
• Refer to Reading Monitor graphs to understand the graphs in detail.
To display the graphs:
- Go to Monitor / Traffic Monitor / > Layer 3/4/7 > Layer 4 > [SPP] [Sources / Destinations / Protocols / Other] [Y-Axis view] [Direction] [Reporting Period].
The follow table summarizes the statistics displayed in each graph.
Statistic |
Description |
---|---|
SYN Tab |
|
SYN |
Displays SYN Traffic, Threshold, Estimated Threshold and per-5-minute Drop information for:
Note: SYN Validation option in the TCP Profile assigned to this SPP must be enabled for any SYN mitigation. If source IPs are successfully validated, SYNs may be allowed to exceed the threshold. |
SYN Per Source |
Displays SYN per Source Traffic, Threshold, Estimated Threshold and per-5-minute Drop information for:
Note: SYN Validation is not performed on identified Sources that exceed the SYN per Source rate – Sources are rate-limited to the SYN per Source threshold. |
SYN Per Destination |
Displays SYN per Destination Traffic, Threshold, Estimated Threshold and per-5-minute Drop information for:
Note: SYN Validation option in the TCP Profile assigned to this SPP must be enabled for any SYN per Destination mitigation. If source IPs are successfully validated, SYN per Destination may be allowed to exceed the threshold. |
SYN/ACK |
Displays SYN/ACK Traffic, Threshold, and per-5-minute Drop information for:
Note:
|
SYN/ACK Per Destination |
Displays SYN/ACK per Destination Traffic, Threshold, and per-5-minute Drop information for:
Note:
|
Ports Tab |
|
TCP |
Displays TCP Port Traffic, Threshold, Estimated Threshold and per-5-minute Drop information for:
Note:
|
UDP |
Displays UDP Port Traffic, Threshold, Estimated Threshold and per-5-minute Drop information for:
Note: FortiDDoS is primarily interested in protecting TCP “service” ports. Traditionally “service” ports have been the well-known ports below port 1024. As applications expanded, many ports over 1024 are used for well-known services such as MSSQL (1433) or RDP (3389). FortiDDoS treats all TCP ports under 10,000 as “service” ports. When a client connects to a service port all the inbound traffic to that port and outbound traffic from that port is associated with the port and the ephemeral client port is ignored. |
Other Tab |
|
Concurrent Connections per Source |
Displays Concurrent Connections per Source count, Threshold, Estimated Threshold and per-5-minute Drop information for:
|
New Connections |
Displays New Connections count, Threshold, Estimated Threshold and per-5-minute Drop information for:
|
Non-Spoofed IPs |
Displays the number of entries in the global Legitimate IP (LIP) Table. The Legitimate IP table displays the count of Source IP addresses that have been successfully validated by one of the 2 SYN Validation parameters (SYN or SYN per Destination). This table will only be populated during SYN Floods and thus if the graph is showing non-zero numbers there has been a SYN or SYN per Destination Flood in one or more of the SPPs. The legitimate IP address table is maintained and reported as a global count. The graph is identical for all SPPs, when a SYN flood occurs in any SPP. |
TCP Sessions |
TCP Sessions is an information-only graph that displays counts of the following parameters:
Note: The TCP Sessions graph is a global count. It will show identical counts for all SPPs. If this graph looks abnormal, check the three SYN graphs for each SPP. |
ICMP |
Displays traffic and drops information for ICMP Types and Codes. Because there are 255 x 255 (65,536) possible Types and Codes there are 2 additional fields on this graph for Type (0-255) and Code (0-255). When a Type/Code is entered, the system converts this to an index number, which appears in the label of each subgraph. For example Type 8 / Code 0 (ping) is index 2048. Look in Dashboard > Top Attacks: Top Attacked ICMP Type/Codes to see if any Types/Codes are displayed. Enter those in this graph to see the activity.
Note:
|