Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
New Contributor

Invalid Logons last night from



We run a network of about 100 fortigates, last night we had an attempted SSH logon from on about half of them. These all occured on 11/12 at exactly 6:14pm CT. We are trying to determine if we were targeted (but I have no idea how someone would get a hold of our IPs since there are no publicly accessible servers behind them) or if any other Fortigate sys admins noticed the same thing?

Esteemed Contributor III

My terse  response below


lock down ssh access if required

better yet , define a ssh port other  22 ( I use 2022 or 2222 )


block cbc base ciphers if you can

use  MFA for admin access &  if you can't lock it down and must allow ssh open

delete any references to "admin"  and create  system accounts that has NO admin in the name or root

or force  user to use ipsec/sslvpn into the  appliance  and then ssh once secured thru that tunnel to maybe a local-loopback


e.g here's one approach YMMV



Now go drink a  wheat beer and don't worry about it ;)



Seriously,  brute-force attacks or  ssh-login is nothing new. And as long as you have tcp.port22 open to the world, you will always seen failed logins. Why all your  devices at at the same time, tells me it a admin of your network or somebody that was testing something and knows your addresses.






PCNSE NSE StrongSwan

Can you copy paste the syslog message?


Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Top Kudoed Authors