- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
web services posts on fortigate
Good morning friends, a question.
I have several web services posts on fortigate. According to a report, I see that the attack events are related to the http port.
What considerations should I have before removing the http port in the publication?
Is it simply changing the port in the VIP? Or is it also required to make changes to the web servers?
- Labels:
-
FortiGate
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @unknown1020,
If you don't want port 80 to be exposed, you can remove the VIP that forward port 80.
Regards,
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello, thank you for responding, but the port change must be made in the VIP and also on the server, right?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Unknown
You can change to HTTPS but this will not prevent attacks. Best solution to block the attacks is to use a separate WAF appliance between FG and the back-end server.
If the server is just for test purpose or you can't use a separate WAF than you may use FortiGate's WAF profile with a virtual server object.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
As mentioned by AEK changing the port number is not a solution.
Besides the WAF have a look on DoS policies inside the FGT as well. Might help you to prevent some of the attacks.
https://docs.fortinet.com/document/fortigate/7.4.4/administration-guide/771644/dos-policy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks for the response, a question, when configuring DOS Policy, could that configuration increase the firewall CPU consumption? I have planned to first put it in monitor mode to view the events, then apply the respective locks.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I think DoS policy will consume the same CPU either in monitor mode or in block mode. As per my experience with it it doesn't consume significant processing (nothing visible).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi unknown1020
A good strategy is to record a base line regarding memory, CPU and sessions on busy and normal business days for the firewall operation.
Having that it will help you in the future to identify if a feature (not only DoS Policies) or any change on the network has affected the environment.
As mentioned by my colleague AEK I don't think enabling DoS policy will add significant CPU usage.
Of course, every feature that you enable will always consume an amount of CPU and memory even it is not in use. As a good practice always disable features that you don't need.
Cheers
