Hi, thanks for your help! If you prefere screenshots instead, please let me know, it was just quicker that way 😉
To enable SynDefender: fwaccel synakt -e (enable on external iface, monitor on internal - attacker comes from external(defined in topology)) I have not enabled the SYN Protection in SmartConsole, it is set to inactive.
fwaccel synatk config get:
enabled 1
enforce 1
global_high_threshold 1000
periodic_updates 1
cookie_resolution_shift 6
min_frag_sz 80
high_threshold 500
low_threshold 100
score_alpha 100
monitor_log_interval (msec) 60000
grace_timeout (msec) 30000
min_time_in_active (msec) 60000
To enable Penalty Box: fwaccel dos config set --enable-pbox
fwaccel dos config get:
rate limit: enabled (without policy)
rule cache: enabled
pbox: enabled
deny list: enabled (without policy)
drop frags: disabled
drop opts: disabled
internal: disabled
monitor: disabled
log drops: enabled
log pbox: enabled
notif rate: 100 notifications/second
pbox rate: 500 packets/second
pbox tmo: 180 seconds
I have no rate limit rule configured
[Expert@FW_01_DDOS:0]# fwaccel dos rate get
No DOS/Rate Limiting policy rules found
(0 rules found)
Dos white & blacklist is not configured:
[Expert@FW_01_DDOS:0]# fwaccel dos allow -s
[Expert@FW_01_DDOS:0]# fwaccel dos deny -s
The deny list is empty
Penalty Box whitelist is not configured:
[Expert@FW_01_DDOS:0]# fwaccel dos pbox allow -s
[Expert@FW_01_DDOS:0]#
fwaccel dos stats get:
[Expert@FW_01_DDOS:0]# fwaccel dos stats get
Firewall Instances in Aggregate:
Memory Usage: 0
Total Active Connections: 0
Number of Elements in Tables:
Penalty Box Violating IPs: 3 (size: 8192)
Rate Limit Source Only Tracks: 0 (size: 0)
Rate Limit Source and Service Tracks: 0 (size: 0)
SecureXL:
Memory Usage: 0
New Connections/Second: 0
Packets/Second: 0
Bytes/Second: 0
Reasons Packets Dropped:
IP Fragment: 0
IP Option: 0
Penalty Box: 5736148
Deny list: 0
Rate Limit: 0
Number of Elements in Tables:
Penalty Box: 0 (size: 937432)
Non-Empty Deny lists: 0 (size: 0)
Deny List IPs: 0 (size: 0)
Rate Limit Matches: 0 (size: 0)
Rate Limit Source Only Tracks: 0 (size: 0)
Rate Limit Source and Service Tracks: 0 (size: 0)
Rate Limit Dest Only Tracks: 0 (size: 0)
Rate Limit Dest and Service Tracks: 0 (size: 0)
I also checked the penalty box table with "fwaccel tab -t dos_pbox -f" and it the original IP always lands in there.
Behind the firewall I have an Ubuntu VM which is running a webserver, which I can also browse without any issues.