Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
PCNSE
NSE
StrongSwan
Wouldn' t sending a TCP Reset in response to an Ident packet tell the sender that there is a network present at the IP address targeted? Is this any different than having the router return a Port Closed response? You have this backwards, with ident enable it won' t send a tcp-reset. You enable it per interface and the default is disable . With it disable, it sends a tcp-reset response such as this from probes; sudo tcpdump -nnnn -vvv -i ppp0 src net 192.16.153 tcpdump: listening on ppp0, link-type PPP (PPP), capture size 65535 bytes 06:03:40.001204 IP (tos 0x0, ttl 32, id 40446, offset 0, flags [none], proto TCP (6), length 40) 192.16.153.5.113 > 10.1.49.98.50534: Flags [R.], cksum 0x3a1e (correct), seq 0, ack 3493808439, win 0, length 0 By exposed, I was referring to having my network completely hidden from port scans or probes from the WAN side. I am not hosting any servers and do not want any ports exposed to the Internet. Will in that case , you want to drop port 541 also, than the fortigate will sit quietly With 514/tcp open 06:13:22.551278 IP (tos 0x80, ttl 56, id 49378, offset 0, flags [DF], proto TCP (6), length 52) 192.16.153.5.541 > 10.1.49.98.50621: Flags [.], cksum 0xd812 (correct), seq 85, ack 6, win 5792, options [nop,nop,TS val 97668268 ecr 294822558], length 0 06:13:22.552171 IP (tos 0x80, ttl 56, id 49379, offset 0, flags [DF], proto TCP (6), length 59) 192.16.153.5.541 > 10.1.49.98.50621: Flags [P.], cksum 0x7b0c (correct), seq 85:92, ack 6, win 5792, options [nop,nop,TS val 97668268 ecr 294822558], length 7 06:13:22.552202 IP (tos 0x80, ttl 56, id 49380, offset 0, flags [DF], proto TCP (6), length 52) 192.16.153.5.541 > 10.1.49.98.50621: Flags [F.], cksum 0xd80a (correct), seq 92, ack 6, win 5792, options [nop,nop,TS val 97668268 ecr 294822558], length 0 06:13:22.857135 IP (tos 0x80, ttl 56, id 34511, offset 0, flags [none], proto TCP (6), length 40) 192.16.153.5.541 > 10.1.49.98.50621: FlagsNot sure what you mean by SPI, but typically a router is not a firewall unless it' s running some type of stateless-firewall ( e.g cisco ZBFW advancesecurity , etc… ) I would not compare the 2. What you should be more concern with are the policies that you active have open allow traffic inbound and securing the hosts that are using such fwpolicies. A firewall no matter how good it is, don' t fix host specific problems or weak secure practices :) Any have good person can figure out a firewall is in place via traceroute. Just following that link, it provides some good practices. And no matter if it' s a fortigate/cisco/juniper or iptables., cksum 0xe61f (correct), seq 3787753917, win 0, length 0 ( you disable it here ) config system central-management set status disable set type fortimanager set auto-backup disable set schedule-config-restore enable set schedule-script-restore enable set allow-push-configuration enable set allow-pushd-firmware enable set allow-remote-firmware-upgrade enable set allow-monitor enable set fmg ' ' set vdom " root" set authorized-manager-only enable unset serial-number end FWIW: To validate, open a telnet to a unused port on your firewall, monitor for any noise such as reset or icmp port unreachables using tcpdump or a portscanner On other lesser SPI routers, as I mentioned in my original post, I can accomplish this with a single check-box. I am concerned that with all the configuration options available, I will not be able to properly lock-down my environment.
PCNSE
NSE
StrongSwan
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1710 | |
1093 | |
752 | |
446 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.