Description | This article describes why port 541 is seen open on a FortiGate interface when a Port Scan is completed. |
Scope | FortiGate. |
Solution |
When FMG-Access is enabled under Administrative Access on an interface it will open port 541 which is used for Management traffic from FortiManager and FortiGate Cloud Management.
Interface example to enable FGFM:
config system interface set ip 10.35.1.1 255.255.255.0
This can be checked in the CLI by using the following commands:
diag sys tcpsock | grep 541 ... 0.0.0.0:541->0.0.0.0:0->state=listen err=983048 socktype=0 rma=0 wma=0 fma=0 tma=0 inode=154839222 process=24547/fgfm
diagnose firewall iprope list 010000e | grep 541 -B 11
Example configuration:
config firewall address
config firewall local-in-policy
In the above example, policy 3 allows traffic only from the FortiManger IP address while policy 4 will block all other traffic.
NMAP test from non FortiManager server:
The ports shows as filtered (FortiGate drops the packet - no RST is sent).
The FortiManager FGFM tunnel is up, however: diag fgfm session-list
If policy 3 from above is disabled, the FortiManager will be blocked as well as all traffic will match policy4. Once disabled, the FGFM tunnel drops:
diag fgfm session-list
Related document: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.