Created on
08-28-2024
08:26 AM
Edited on
08-27-2025
02:42 AM
By
Jean-Philippe_P
Description |
This article describes how to configure FortiSandbox to prevent it from responding with TCP timestamps. It covers best practices for securing FortiSandbox against TCP timestamp-based attacks, along with troubleshooting tips to ensure proper configuration and functionality. |
Scope |
FortiSandbox. |
Solution |
set-tcp-timestamp-response -L
Note: TCP timestamp is enabled by default on FortiSandbox.
Test using the hping3 tool from the penetration system and check packet capture output at the same time: the TCP option time stamp will be shown with the TSval and TSecr values.
To test denial-of-service attacks for ethical testing, simulating traffic patterns, and crafting custom TCP/IP packets for protocol analysis, a tool such as hping3 can be used to generate traffic:
set-tcp-timestamp-response -D
Note: The same process is supported on v5.0.x. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.