Skip to main content

Safety tips for working with FortiGate

Last update:

Recommendations that will improve safety.

Use secure access protocols

Deny HTTP or Telnet administrative access to the FortiGate unit. We recommend leaving only HTTPS and SSH access.

You can change these settings for individual interfaces on the NetworkInterfaces tab.

Enable redirection to HTTPS

Redirect all HTTP connection attempts to HTTPS.

  1. Go to SystemSettingsAdministrator Settings
  2. Enable Redirect to HTTPS.

Change the default access ports

Change the default ports for administrator access via HTTPS and SSH to non-standard ports. Before changing, make sure that the ports are not used for other services.

  1. Go to SystemSettingsAdministrator Settings
  2. Change the HTTPS and SSH ports.

Configure short entry timeouts

Set the idle time to a short time to avoid unauthorized access when the administrator is not present.

  1. Go to SystemSettings.
  2. Enter the Idle timeout value. The recommended time is five minutes.

Configure login for trusted addresses

Allow login only from trusted addresses.

  1. Go to SystemAdministrators.
  2. Edit the account, enable Restrict login to trusted hosts.
  3. Add trusted addresses or networks.

Create multiple administrator accounts

For security reasons, it is recommended to have a separate account for each administrator. Create multiple administrator accounts.

Configure account lockout

For password protection , set the account to lock after entering an incorrect password. The default number of failed password attempts is three.

Rename the administrator account

Rename the administrator account. This makes it more difficult for an attacker to log in to FortiOS.

Disable unused interfaces

  1. Go to NetworkInterfaces.
  2. Edit the interface and set Interface Status to Disabled.

Disable unused protocols

You can disable unused protocols that attackers can use to gather information. Many of these protocols are disabled by default.

To change via the CLI, enter:

    config system interface
edit <interface_name>
set dhcp-relay-service disable
set pptp-client disable
set arpforward disable
set broadcast-forward disable
set l2forward disable
set icmp-redirect disable
set vlanforward disable
set stpforward disable
set ident-accept disable
set ipmac disable
set netbios-forward disable
set security-mode none
set device-identification disable
set lldp-transmission disable
end