Created on 03-31-2010 05:37 PM Edited on 10-29-2024 06:45 AM By Jean-Philippe_P
Description
This article describes that a brute force attempt (or attack) to the administrator account login may be diagnosed by the following logs events, seen repetitively and/or in quantity (assuming Event log and Admin events are enabled) :
Administrator root login failed from ssh(xxx.xxx.xxx.xxx) because of invalid user name
After a few failed log messages the following message will be seen:
Login disabled from IP xxxx for 60 seconds because of too many bad attempts
In most cases, these logon attempts are generated by automatic hacker tools running on many compromised computers and scanning for live SSH targets to exploit known vulnerabilities or/and perform password brute force.
This article provides some tips as to how to avoid this.
Scope
FortiGate.
Solution
From the GUI, go to System -> Settings -> Edit SSH port (set for example to 2223).
Increase the lockout time to deter the less patient.
Run from the CLI:
config system global
set admin-lockout-duration 600
end
(Default value is 60 seconds).
Use long and complex passwords.
Do not use dictionary words and trivial key combinations such as 'qwerty'.
Force strong admin passwords by setting password policy from System -> Settings -> Password Policy.
Remove the account named 'admin' after having created other account(s) with a super_admin profile.
Related article:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.