# config system interface
edit "port1"
set vdom "root"
set ip 192.168.175.230 255.255.255.0
set allowaccess https http <----- No SSH access allowed on this port.
set type physical
set device-identification enable
set role lan
set snmp-index 10
next
end
# nmap –sV 192.168.175.202Despite the port closed on the interface, it shows up as filtered.
PORT STATE SERVICE
22/tcp filtered ssh
80/tcp open http
443/tcp open https
FGT # diag sniff packet any 'host 192.168.175.202 and port 22' 4
interfaces=[any]
filters=[host 192.168.175.202 and port 22]
7.886505 port1 in 192.168.175.202.56080 -> 192.168.175.230.22: syn 332225684
8.886468 port1 in 192.168.175.202.56080 -> 192.168.175.230.22: syn 332225684
10.890375 port1 in 192.168.175.202.56080 -> 192.168.175.230.22: syn 332225684
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.