FortiGate : 5 Admin Access Security Hardening Tips
Video Statistics and Information
Channel: Fortinet Guru
Views: 11,209
Rating: undefined out of 5
Keywords: fortigate security hardening, harden security, fortigate hardening, admin rename
Id: myZOfLeBx6E
Channel Id: undefined
Length: 9min 38sec (578 seconds)
Published: Mon Jun 01 2020
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.
Fyi, the need to rename the default admin account before you can delete it was removed at some point in 6.2.x
Also, there is a hardening guide on the docs site that covers these tips and some more for every FortiOS release for anyone that's interested.
6.4
https://docs.fortinet.com/document/fortigate/6.4.0/hardening-your-fortigate/612504/hardening-your-fortigate
6.2
https://docs.fortinet.com/document/fortigate/6.2.0/hardening-your-fortigate/612504/hardening-your-fortigate
6.0
https://docs.fortinet.com/document/fortigate/6.0.0/hardening-your-fortigate/612504/hardening-your-fortigate
There's also a good best practices guide to review.
What about local in policy? I never been a fan of trusted host IP because it makes the firewall listen to requests from unauthorized IP addresses.
2fa is the minimum, but if you want something good, site2site IPSec from your home office to work than use another additional tunnel to a jump station (ssh tunneling is good) that has access to a tightly controlled and monitored management network. The key word is monitored, use something like tripwire to catch brute force attempts. The point of the jump station is to air gap your management network.
Friendly warning/tip regarding 2FA for admin access.
When setting it up, make absolutely certain that you have a working alternative login method (different admin with already functional 2FA or no 2FA) until you have verified that your newly 2FA-ed admin login is actually functional.
People keep regularly cutting themselves off (either due to failing to activate the token, or just losing the activated token/phone) and the recovery is not fun.
1.) lock admin access down
2.) Use non-standard ports for access
3.) Configured trusted host addresses on accounts
4.) Delete default admin account
5.) enable mfa
Never been a fan of #2. And 10433 isn't very obscure either. Something like that is also a standard non-standard port like 8843, 8443, 7443, 4433 are.
Porting scanning is nothing and the effort it takes is the same. nmap is -F (fast) or -p- for (all ports). Typing both is 3 button presses. Once you are in, doing internal range across all 65k ports is no big deal either and doesn't take long. When I am told to use "obscure" ports on public IP addresses I typically get a shodan.io email within a week or two.
Security through obscurity isn't security, and using any port you want is fruit already on the ground whether it's 443 or 49854. And you are still gonna get scanned reguardless.
#2 should be strong passwords and use keys/MFA whenever allowed.
then #5 could be to setup an alert whenever someone logs into the firewall or makes a change.
Is there any difference between renaming the account and deleting it? I always rename the default admin account which takes care of someone trying to hit an account called 'admin'. Is there functionally any other risk beyond just the name?
Great video, thanks for sharing.
You can also leverage Security Rating in FortiOS to pick up several of these cases:
Enabling Two-Factor authentication will be supported in a future release.