Hi AndyDuoc,
I checked the logs you uploaded, as you can see from the logs, the ICMP unreachable attack source is internal IP, and destination IP is external IP, what should pay attenation to is the total packets field, almost all the ICMP unreachable attack total packets field value is very low, which doesn't match the attacking behavior(usually massive attack packets).
Instead of the ICMP unreachable attack logs, you should pay attenation to the udp bandwidth-limit attack logs. As the log below shows, firewall receives over 900 packets in a short time.
(#Oct 26 2020 11:45:58+07:00 FW-1 %ATK/4/FIREWALLATCK(l)[41]:AttackType="udp bandwidth-limit", slot=" ", cpu="0", receive interface="GE1/0/4 ", proto="UDP", ip="113.171.212.77:443->192.168.39.22:64389", begin time=2020/10/26 11:45:29, end time=2020/10/26 11:45:34, total packets="913", max speed="53705", Action="discard".)
You can refer the @DDSN's answer to configure the UDP flood attack defense.