Description | This article describes how to block an external Port Scan of the public IP address or a private IP address being NAT on use on the upstream port of the FortiGate to Internet. |
Scope | FortiOS. |
Solution |
One of the first steps to perform a brute force attack or attack a service is to know what port is in use for each service. In this case, if the configuration (such as an SSL VPN configuration) is using the TCP port 8443, there is no way to know that this port is in use and open until a port scan is performed.
In order to perform a port scan, the most common tool is NMAP. This scan can be performed to private IP addresses and public IP addresses, and most of the services on a FortiGate use a public IP address or a private IP address being NAT translated.
As is shown on this scan using NMAP, the public IP address of this FortiGate is being NAT translated from a private IP address. This FortiGate does not have a static public IP address, but is reachable from the public address. The scan also shows the same result if the ISP upstream port is using a static IP public address.
On this scan, NMAP found one port in use: 8443 (used on this FortiGate for SSL VPN service). This is the first step to try to brute force the port and a service on it using HTTPS, because NMAP also identifies something using HTTPS.
From this scan, an attacker could try to brute force the port, and the logs on a FortiGate could be inflated by having a lot of failed attempts at accessing this port and the SSL VPN portal.
In order to avoid and block this port scan, follow these steps:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.