Created on
‎05-28-2025
03:10 AM
Edited on
‎09-22-2025
05:24 AM
By
Jean-Philippe_P
| Description |
This article describes the risks of keeping unnecessary TCP or UDP ports open on FortiGate public IPs. It also explains how to check which ports are open or exposed to the Internet and how to block those that are not needed. Regularly monitoring and reviewing these ports and blocking any that are not truly necessary helps improve security and reduce the risk of unauthorized access, denial-of-service attacks, or system compromise. |
||||||||||||||||||||||||||||||||||||||||
| Scope | FortiGate. | ||||||||||||||||||||||||||||||||||||||||
| Solution |
Common Open Ports and Associated Risks: Leaving the following ports open on FortiGate public IPs significantly increases the attack surface.
High-Risk Ports and Services:
Technical Impact on FortiGate:
Examples of how to check exposed ports, the consequences, and how to mitigate them:
nmap <IP FortiGate>
To test denial-of-service attacks for ethical testing, simulating traffic patterns, and crafting custom TCP/IP packets for protocol analysis, a tool such as hping3 can be used to generate traffic.
https://linux.die.net/man/8/hping3
sudo hping3 -S -p 2000 --flood <IP FortiGate>
Technical Tip: Restrict IPSec VPN access to certain countries Technical Tip: How to block unauthorized connections to IPsec VPN Technical Tip: Hardening FortiGate SSL VPN - Best Practices for Enhanced Security Technical Tip: How to close port TCP/UDP 5060 and TCP 2000 Technical Tip: How to configure IPv4 DOS policy Technical Tip: How to block IoT scans from Shodan
Conclusion: Each unnecessary TCP/UDP port that is open/exposed represents a potential entry point for exploitation. Regular scanning, restriction, and closure of unnecessary ports are critical measures for maintaining a secure and resilient environment.
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.