FortiDDoS Admin Guide
FortiDDoS Admin Guide
2 CVE Updates
FortiDDoS 4.2.1
Release Notes
Technical Documentation
Knowledge Base
Forums
Customer Service & Support
Training
FortiGuard Threat Research & Response
License Agreement
Document Feedback
http://docs.fortinet.com
http://kb.fortinet.com
https://support.fortinet.com/forums
https://support.fortinet.com
http://training.fortinet.com
http://www.fortiguard.com
http://www.fortinet.com/doc/legal/EULA.pdf
Email: [email protected]
Table of contents
Introduction ........................................................................................................ 4
Whats new ........................................................................................................ 5
Hardware support .............................................................................................. 6
Image checksums .............................................................................................. 7
Upgrading .......................................................................................................... 8
Supported upgrade paths.......................................................................................... 8
Section 1: Upgrading from 4.1.5 and later with the web UI ........................................ 8
Section 2: Upgrading from 4.1.5 and later with the CLI ........................................... 10
Section 3: Upgrading from 4.1.x to 4.1.5 ................................................................. 14
Section 4: Upgrading from 4.0.x to 4.1.5 ................................................................. 16
Downgrading .................................................................................................... 20
Supported downgrade paths ................................................................................... 20
Downgrading from 4.1.9 and later ........................................................................... 20
Fortinet
Introduction
This document provides a list of new/changed features, upgrade instructions and caveats, resolved
issues, and known issues for FortiDDoS 4.2.1, build 0304. The TP2ASIC version is:
4201006a Date: Mar 31, 2016.
FortiDDoS is a network behavior anomaly (NBA) prevention system that detects and blocks
network attacks that are characterized by excessive use of network resources. These attacks are
known as distributed denial of service (DDoS) attacks.
For additional documentation, please visit:
http://docs.fortinet.com/fortiddos
Fortinet
Whats new
Bug fixes only.
Fortinet
Hardware support
This release supports the following hardware models:
FortiDDoS 200B
FortiDDoS 400B
FortiDDoS 600B
FortiDDoS 800B
FortiDDoS 900B
FortiDDoS 1000B
FortiDDoS 1000B-DC
FortiDDoS 1200B
FortiDDoS 2000B
FortiDDoS 2000B-USG
FortiDDoS A series models are not supported.
Fortinet
Image checksums
To verify the integrity of the firmware file, use a checksum tool to compute the firmware files MD5
checksum. Compare it with the checksum indicated by Fortinet. If the checksums match, the file is
intact.
MD5 checksums for software releases are available from Fortinet Customer Service & Support:
https://support.fortinet.com
Figure 1: Customer Service & Support image checksum tool
After logging in to the web site, in the menus at the top of the page, click Download, and then click
Firmware Image Checksums.
Alternatively, near the bottom of the page, click the Firmware Image Checksums button. (The
button appears only if one or more of your devices have a current support contract.) In the Image
File Name field, enter the firmware image file name including its extension, then click Get
Checksum Code.
Fortinet
Upgrading
Use the following instructions to upgrade to 4.2.1.
Note 1: In all cases, after upgrading, clear you browser cache so that new and changed
functionality displays correctly.
Note 2: FortiDDoS 4.2.x adds additional parameter monitoring and Thresholds for DNS Features.
In order to activate these Thresholds, FortiDDoS needs to operate for several hours to several
days. Then you need to run Traffic Statistics Reports and System Recommendations to create
Thresholds. It is recommended that DNS servers be placed in a separate SPP to facilitate this.
Upgrade directly using the web UI or CLI. Follow the procedure in Section 1
or Section 2 below.
1. Upgrade to 4.1.5. You must use BIOS option G to copy the 4.1.5 image
from a TFTP server. Follow the procedure in Section 3 below.
2. Then, upgrade to 4.2.1 using the web UI or CLI. Follow the procedure in
Section 1 or Section 2 below.
From 4.0.x
1. Upgrade to 4.1.5. You must use two BIOS options: Option F to format
the boot device and then option G to copy the 4.1.5 image from a TFTP
server. Follow the procedure in Section 4 below.
2. Then upgrade to 4.2.1 using the web UI or CLI. Follow the procedure in
Section 1 or Section 2 below.
Direct upgrade is supported only from 4.1.5 and later. If you have not already done so,
upgrade to 4.1.5 using the procedures provided.
Download the firmware file from the Fortinet Technical Support website:
https://support.fortinet.com/
Back up your configuration before beginning this procedure. If you later revert to an earlier
firmware version, the active configuration is deleted, and you will want to restore the
configuration that worked well with the earlier version.
Make a note of configurations that are disabled in your active configuration. Configurations
that are not enabled are not preserved in the upgrade to 4.2.1. For example, if a custom
HTTP service port, log remote port, or event log port have been configured and then disabled
in an earlier version, the port information is not preserved in the upgrade to 4.2.1.
Make a note of threshold configurations that have been manually set (thresholds that are not
named "sys_reco...."). Do this for all SPPs. Improvements have been made to the system
recommended thresholds. After you upgrade, you will regenerate system recommended
thresholds, and you must re-enter your manual threshold settings.
You must have super user permission (user admin) to upgrade firmware.
To install firmware:
1. Go to System > Maintenance > Backup & Restore.
2. Under Firmware Upgrade/Downgrade, in the row for Partition 2, click Upload and Reboot to
display the upload file controls.
3. Use the upload file controls to select the firmware image file.
4. Click OK to upload the file, install the firmware, and restart the system. The reboot takes a few
minutes but there is no progress indicator.
5. Clear your browser cache to avoid potential issues that can be caused by caching.
Note: Release 4.1.8 included improvements to system recommended thresholds. If you already
upgraded to 4.1.8, you do not need to reset your baseline thresholds. If your upgrade path is from a
release prior to 4.1.8, take the following additional steps after the upgrade to 4.2.1 has completed
and the system has restarted:
1. For each SPP, immediately go to Protection Profiles > Traffic Statistics > Generate and
generate statistics for the longest known period with no major attack traffic (8-hours, 1-day, 1week (recommended), 1-month).
2. Go to Protection Profiles > Thresholds > System Recommendation and set the thresholds
based on the generated statistics.
3. Go to Protection Profiles > Thresholds > Thresholds and re-enter the manual threshold settings
you want to continue using from your previous configuration.
Fortinet
10
System is started.
FortiASIC-TP.0: update started. Reconfigure process takes a few
minutes
FortiASIC-TP.1:
0% Complete
FortiASIC-TP.0:
0% Complete
FortiASIC-TP.2: 10% Complete
Fortinet
11
12
Enabling cache...Done.
Scanning PCI bus...Done.
Allocating PCI resources...Done.
Enabling PCI resources...Done.
Zeroing IRQ settings...Done.
Verifying PIRQ tables...Done.
Boot up, boot device capacity: 15272MB.
Press any key to display configuration menu...
......
Reading boot image 2791175 bytes.
Initializing FortiDDoS...
System is started.
To verify that the firmware was successfully installed, login and use the get system status
command:
FI900BXXXXXXXXX login: admin
Password:
Welcome!
FI900BXXXXXXXXX # get sy st
Version:
FortiDDoS-900B v4.2.1,build0304,160427
TP2ASIC Version:
410a0065 Date: Dec 30, 2015
IP Reputation DB:
Not enabled
Serial-Number:
FI900B3915000043
BIOS version:
05000002
Log disk:
Capacity 62 GB, Used 204 MB ( 0.32%), Free 62 GB
RRD disk:
Capacity 369 GB, Used 163 GB (44.20%), Free 206
GB
Hostname:
137-900B
HA configured mode: active-passive
HA effective mode: Master
Distribution:
International
License Type:
Uptime:
0 days 2 hours 28 minutes
Last reboot:
Wed Apr 13 10:52:01 PDT 2016
System time:
Wed Apr 13 13:20:57 PDT 2016
Note: Release 4.1.8 included improvements to system recommended thresholds. If you already
upgraded to 4.1.8, you do not need to reset your baseline thresholds. If your upgrade path is from a
release prior to 4.1.8, take the following additional steps after the upgrade to 4.2.1 has completed
and the system has restarted:
1. For each SPP, immediately go to Protection Profiles > Traffic Statistics > Generate and
generate statistics for the longest known period with no major attack traffic (8-hours, 1-day, 1week (recommended), 1-month).
2. Go to Protection Profiles > Thresholds > System Recommendation and set the thresholds
based on the generated statistics.
3. Go to Protection Profiles > Thresholds > Thresholds and re-enter the manual threshold settings
you want to continue using from your previous configuration.
Fortinet
13
14
System is started.
3. Set the management port IP address and gateway IP address using the console.
Fortinet
15
4. If you saved and edited the configuration file, restore it using the CLI or web UI.
5. If you did not save a configuration file, you must reconfigure the user accounts and system
options.
16
17
18
System is started.
3. Set the management port IP address and gateway IP address using the console.
4. If you saved and edited the configuration file, restore it using the CLI or web UI.
5. Re-enter any ICMP Type/Code services and SPP ACLs that you deleted in the earlier step.
Important: In FortiDDoS 4.2.x, the system recommended thresholds are determined differently
from previous firmware versions. After you upgrade to 4.2.x, Fortinet recommends that you
regenerate traffic statistics and then review and reset the thresholds using Protection Profiles >
Thresholds > System Recommendation.
Fortinet
19
Downgrading
Use the following instructions to downgrade, if necessary, from 4.2.1 or other Releases.
200B
400B
600B
800B
900B
1000B
1200B
4.2.1
304
Y
Y
Y
Y
Y
Y
Y
4.2.0
302
Y
Y
Y
Y
Y
Y
Y
2000B
4.1.8
163
Y
Y
Y
Y
Y
Y
N
4.1.7 ->
Not Recommended
Model
20
########################################################################
Get image from tftp server OK.
Verifying the integrity of the firmware image.This operation will downgrade the current
firmware version! You will lose your existing configuration
Do you want to continue? (y/n)y
137-900B #
3. The system will reboot and reprogram the FPGA.
This takes about 10-15 min based on what appliance you are using.
WARNING: Reboot or power fail during this process will result in unusable product, requiring
RMA.
4. Once the system is up, assign the IP address and restore the saved configuration.
System will reboot and apply the config.
The system should be ready to use.
Fortinet
21
Resolved issues
The following list of issues does not include every bug corrected with this release. For inquires
about a particular bug, please contact Fortinet Customer Service & Support.
Table 2: Resolved issues
Bug ID
Description
292504
299008
354664
356164
356532
356714
307938
363327
363332
363476
365207
365329
365662
369106
369279
369537
370216
366653
366888
366454
367019
366887
Fortinet
After a Protocol flood, the corresponding Protocol graph might not show normal packet
rates.
UDP drops seen in Attack Log/Monitor graphs/Executive Summary are not seen in Attack
Graphs > Top Attacked UDP Ports
GUI menu items sometimes only show partial orange highlighting
Device shows "not registered" after RMA entitlements transfer on FortiCare.
SYN drop counters may double-count under some conditions
DNS Query Graph failed to show TCP Queries
Network Interface page error dialog box had extra wording
FDD-1200B does not show any data ports on the Dashboard portlet
HTTP Partial requests may still be blocked when Global Settings > Slow Connection feature
is disabled.
SPP Settings > Source Tracking > Source and Layer 7 Multipliers are modified in GUI to show
the correct multiplied relationship between the two thresholds
22
Known issues
The following list of issues for this release is not complete. For inquires about a particular bug,
please contact Fortinet Customer Service & Support.
Table 3: Known issues
Bug ID
Description
246209
Upgrade from 4.0.x to 4.1.5 cannot be performed with the web UI. Upgrade from 4.1.5 can
be performed with the Web UI.
The link status reported in the web UI is the detected link state. This is working as designed.
The link status shown in the show system interface and get system
interface configuration commands is the configured status. This is also working as
designed.
To display the detected link state with the CLI, use the following command:
FI-2K# diagnose hardware get deviceinfo data-port
260686
port1
port2
port3
275873
277768
365454
366044
355068
356749
356404
356036
310258
370857
down
down
down
10G FD
10G FD
10G FD
SW
SW
SW
No
No
No
Forward
Forward
Forward
TX RX
TX RX
TX RX
None
None
None
F
F
F
XGMII 16356
XGMII 16356
XGMII 16356
Layer 7 SIP thresholds and graphs are not working correctly and have been removed.
Triple-tagged VLAN packets will bypass in Detection or Prevention mode. Tripletagged VLAN packets are unlikely to be seen in deployments outside the firewall.
While system inspects VLAN and QinQ traffic, any system generated packets (RSTs, SYNACKs, etc.) are sent without tagging.
Under rare conditions, the fragment graph may stop displaying after an attack.
With a very large data, save as pdf sometimes doesn't work
Under highly variable traffic load the Port Statistics graph may understate the pps rates.
Deleting large numbers of ACLs from GUI may not work.
When adding or removing an HTTP service port, the GUI and CLI (correct) rate may not
match.
Under some conditions, system will not send RSTs to server under L7 DNS TCP floods.
For DNS mitigation, when Outbound is in Prevention Mode, Outbound Source Thresholds
are low and Inbound Sources are sending both UDP and TCP Queries, Queries can be
blocked when below Inbound Source Thresholds. Set Outbound Thresholds high or set
Outbound to Detection Mode.
Fortinet
23
Fortinet
24