That it' s possible is good to know, but sadly not very helpful to the great majority of users. We purchase UTM products in order to avoid having to invent our own Snort rules and otherwise spend time developing and exercising highly technical skills. (I' ve been working in this field for fifteen years; I *can* do these things; I don' t have time to).
That FortiNet hasn' t included this, as a built-in option even if not enabled by default, is disappointing.
Systems have, for decades now, had the ability to automatically block repeated failed login attempts. (5 tries to login with that user ID and password, and then block the account for a few minutes).
That FortiOS in its current age and maturity still doesn' t have this built in seems to be a significant failure on FortiNet' s part.
are these logs regarding a Dial VPN IPsec connection? Because the FortiGate locks out every user account for 5 minutes I think by default, after 3 faulty attempts.
But you posted IPsec vpn logs, so I' m not sure about what you are exactly talking.
I' m not sure I know the difference between a " Dial" IPsec connection and any other type of IPsec connection.
Maybe this will answer; we do not have any network-to-network VPNs. All of our VPNs are for end-users on PCs, Macs, Linux machines or mobile devices to connect as-needed.
Is there some particular piece of the configuration which would help?
Also, Where is the automatic lockout after some number of failed login attempts configured? Searching, I find this only for Administrator logins, not for VPNs :-/
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.