Description |
This article describes the risks of keeping unnecessary TCP or UDP ports open on FortiGate public IPs. It also explains how to check which ports are open or exposed to the Internet and how to block those that are not needed. Regularly monitoring and reviewing these ports and blocking any that are not truly necessary helps improve security and reduces the risk of unauthorized access, denial-of-service attacks, or system compromise. |
||||||||||||||||||||||||||||||||||||||||
Scope | FortiGate | ||||||||||||||||||||||||||||||||||||||||
Solution |
Common Open Ports and Associated Risks:
High-Risk Ports and Services:
Technical Impact on FortiGate:
Examples of how to check exposed ports, the consequences, and how to mitigate them:
nmap <IP FortiGate>
sudo hping3 -S -p 2000 --flood <IP FortiGate>
Technical Tip: Restrict IPSec VPN access to certain countries Technical Tip: How to block unauthorized connections to IPsec VPN Technical Tip: Hardening FortiGate SSL VPN - Best Practices for Enhanced Security Technical Tip: How to close port TCP/UDP 5060 and TCP 2000 Technical Tip: How to configure IPv4 DOS policy Technical Tip: How to block IoT scans from Shodan
Conclusion: Each unnecessary TCP/UDP port that is open/exposed represents a potential entry point for exploitation. Regular scanning, restriction, and closure of unnecessary ports are critical measures for maintaining a secure and resilient environment.
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.