Hardening Administrative Access on FortiOS 7.4.2

Поделиться
HTML-код
  • Опубликовано: 1 янв 2024
  • I love when viewers help guide the way! Security Hardening of the Administrative Access was certainly not covered in the basic configuration video. So here we go!
    Buy Hardware: bit.ly/2QZVeqh
    Get Consulting: bit.ly/36FinSU
    My Other Projects:
    Office Of The CISO: bit.ly/3HGMH1o
    Packet Llama: bit.ly/3SEX3H4
    ###### SOCIAL LINKS ######
    Twitter: bit.ly/2WXiRAv
    Facebook: bit.ly/3eigz4D
    Instagram: bit.ly/3cZneAz
    ######################

Комментарии • 48

  • @FortinetGuru
    @FortinetGuru  6 месяцев назад +4

    Securing your device administratively is paramount in being successful.

  • @JakeGuptill
    @JakeGuptill 6 месяцев назад +1

    All great suggestions, Michael!
    I work for a service provider/consulting company. I do sevaral things for FGTs that I have https open on the outside (I don't turn it on on all my fortigates, but some that I get in frequently, I do). I will set max login attempts to 3 with a lockout duration of 24hrs. That way a bad actor only gets 3 trys a day.
    config user setting
    set auth-lockout-threshold 3
    set auth-lockout-duration 86400
    end
    Also, we have a geoblock list that we created with about 20 foreign contries (all the worst offenders) that we create firewall policies to block in and out.
    If it's a 100 series and above, (more specifically if the box has the additional NP6/NP7 processor) we will add the geoblock list to the IPv4 access control list in and out. Boxes with this extra processor offload ipv4 ACL's to this processor. So, traffic denied by these ACL's gets dropped before it even hits your firewall policies - saving your cpu from having to process it.
    The other big thing I suggest, if you are going to open https on your outside interface, is to set up an automation stitch to email you if there is a failed login attempt or lockout. Set up an automation trigger for Event IDs "Admin Login Disabled" and "Admin Login Failed". Then create a stitch with that trigger and your email. That way you get notified of any bad attempts. This will probably cause you to turn off https managment on the outside, lol. The first time you get 400-700 emails overnight from some bot trying to hit your outside interface from all over the world, you will probably end up disabling outside access! They get creative.. they'll use 10-20 different IP's from all over, and try all kinds of diffrent usernames. I've got a running list so far of about 60 IP's that I block in addition to my geoblocking. These are IP's that I've seen across multiple disperate fortigates with multple login attempts.
    For clients with tighter security concerns, we will disable management on the outside interface and use the fortigate cloud remote access function to tunnel into the Fortigate management.

  • @m.lappin4107
    @m.lappin4107 6 месяцев назад +3

    Risks and mitigating those risks of having the ACME engine for letsencryot certs. And limiting acme access with local-in

  • @ko_3x335
    @ko_3x335 6 месяцев назад +1

    Nice to see you're so active again. Very good Video. Thanks for sharing your Knowledge.

  • @schmoofadoop
    @schmoofadoop 6 месяцев назад +1

    You are loved too Mike! Man I could feel it in your voice dude, that was heart felt and I know who you were thinking of when you said it. To ANYONE reading this, your life matters and is important! If you are watching Mike's videos and reading comments like mine, you are already way cooler than most people I know!!! :)
    Local in policy locking down remote access 100%! you also prob. wouldn't cover it on this channel but maybe on Packet Llama, but using a proper segmented management network would be a great video... locking down all the botnets from remotely reaching your FortiGate is huge of course (use that Botnet C&C DNS filter!) but not allowing just anyone on your internal interfaces to reach your firewall is also important and I find more often than not it's overlooked. Remember plenty of "incidents" are caused by human error and it's not all just malicious actors trying to get to your infrastructure.
    one last tip i like to use, run a full 65k port scan remotely (run once occasionally will not flag anything typically) and document all known / non-stealth (aka responding) ports... you should know what they ALL are doing and why they are responding / open... do this again any time you make any major changes / update your firmware / etc...
    shodan.io can be pretty eye opening too

  • @BradMottram
    @BradMottram 6 месяцев назад +1

    Thanks Mike! I attempted Local-In Policy a while ago but screwed it up, and forgot about it! This has been massively helpful. Thank you!

  • @jakubcejka5411
    @jakubcejka5411 3 месяца назад

    You are loved too, man. Great video

  • @zeinabfarhat2473
    @zeinabfarhat2473 6 месяцев назад

    Thank you for sharing! Love your channel, keep up the hard work Michael!

  • @AllegraPruett
    @AllegraPruett 6 месяцев назад +1

    Great info! Thanks!

  • @njfirewall
    @njfirewall 6 месяцев назад

    Another amazing video, would love to see some videos on FortiManager v7.2! 🙏Thank you!

  • @EverythingEvo
    @EverythingEvo 6 месяцев назад +3

    In addition to local in policies, I do SAML SSO for admin accounts (Entra ID) and it works great 👌

    • @FortinetGuru
      @FortinetGuru  6 месяцев назад

      I love Azure tie in! Gives you a lot more including conditional access and more!

    • @EverythingEvo
      @EverythingEvo 6 месяцев назад

      @@FortinetGuru Agreed!

    • @m.lappin4107
      @m.lappin4107 6 месяцев назад

      How to set this up would be great!

    • @ericcorvers75
      @ericcorvers75 6 месяцев назад

      Can you access your firewall when the internet is down then?

    • @FortinetGuru
      @FortinetGuru  6 месяцев назад

      Absolutely, as long as you have all possible space listed in the trusted hosts and the local in policy it will accept from the sources mentioned.

  • @jimcootsj
    @jimcootsj 6 месяцев назад

    Ha, the lack of face fuzz threw me off a bit. Great video as always. Thank you sir.

  • @jaywill1978
    @jaywill1978 6 месяцев назад

    Thx dude for the content!

  • @IamtheUli
    @IamtheUli 6 месяцев назад +2

    MSP here we use localIn policy for SSH / Admin UI to limit remote access to the box only for our Datacenter IP / Jumphost :)
    Totally annoying that you can't configure this in the GUI.

    • @FortinetGuru
      @FortinetGuru  6 месяцев назад

      I agree. It should be brought to the GUI ASAP IMO

  • @---tr9qg
    @---tr9qg 6 месяцев назад +3

    Thanks. Do you planned to make tutorials about ZTNA? 😁

  • @strausstechnik1896
    @strausstechnik1896 6 месяцев назад +1

    Nice!

  • @BrianGladfelter
    @BrianGladfelter 6 месяцев назад +1

    Great review!

  • @dutchdiver5323
    @dutchdiver5323 6 месяцев назад +1

    Great video!! 👍

  • @imapadlock
    @imapadlock 6 месяцев назад +1

    Happy new year! Great video. Can you do a video on SAML /entra based web filtering please?

  • @wg2060
    @wg2060 6 месяцев назад

    Good stuff

  • @goelhimanshu500
    @goelhimanshu500 4 месяца назад

    Hi,
    I'm facing an issue with my Fortigate device. Since upgraded my firewall with FortiOS 7.4.2, the SD-WAN rules are visible in CLI but GUI is showing a loading page only. Please help.

  • @guentherschreiner
    @guentherschreiner 6 месяцев назад

    Great video!!! 👍 Any hint for protecting services like Explicit Proxy, Virtual IPs or Virtual Servers?

  • @mirei9750
    @mirei9750 3 месяца назад

    Hey Mike, I cannot confirm that the Fortigate will respond to HTTP/S requests if ALL Admin users have TrustedHost active. Packets will get dropped. From my understanding, all IPs from trusted host will be granted access to the GUI/SSH

  • @Wisdomisgood448
    @Wisdomisgood448 5 месяцев назад

    Question regarding FortiToken - I was thinking of how it can be applied in a multi-user team environment. If you have a team of multiple engineers that would need access to the Box, how can you utilize the FortiToken if its tied to a Mobile device? Is there a way to 'fudge' the FortiToken App in a web Browser extension in some manner?

    • @FortinetGuru
      @FortinetGuru  5 месяцев назад

      Never tried. Token should be assigned to a user. Sharing wouldn't be feasible.

  • @AllMilloyAdventures
    @AllMilloyAdventures 6 месяцев назад

    Enjoying the videos, can you please share what software you as to record these, it would be great to do in house training videos like this for my staff. Cheers

  • @vewo234
    @vewo234 6 месяцев назад

    Thank you for the video. I‘ve run into far too many FGTs that aren‘t adequately secured for the systems they protect.
    Can RADIUS accounts (wildcard / all in matched group) be limited to trusted hosts as well? I‘m in the pocess of moving from all local accounts to FortiAuthenticator with Radius on some FGT clusters and I can‘t come up with a way to match trusted hosts per user with wildcard Radius accounts.

    • @FortinetGuru
      @FortinetGuru  6 месяцев назад

      They can. You can do individual radius accounts with trusted hosts on them.

    • @vewo234
      @vewo234 6 месяцев назад

      Thanks for the quick reply. Do I need to configure these as individual Radius accounts (Match a user on a remote server group) on every FGT or can it be done with „Match all users in a remote server group“ by configuring the trusted hosts on the FortiAuthenticator somehow? I want to set the trusted hosts per account (only that persons office-pc) but preferrably still match all users of the radius group to avoid having to configure every account on every FGT.

    • @toolboy3555
      @toolboy3555 6 месяцев назад

      @@FortinetGuru one of the issues I found doing this is trying to ssh into a box. I could never figure out how to get the Fortitoken prompt to work in Putty or Moba. So for now I just use trusted hosts and local in's. Would love to figure this out. Also I changed my admin-sport, ssh, and telnet ports to various obscure ports.

    • @toolboy3555
      @toolboy3555 6 месяцев назад

      @@vewo234 You can do this via user groups on the gates that match the admin user groups on the authenticator. Each gate would need the group attached to the authenticator(Radius server, unless utilizing LDAP). This way, all your admins and 2FA's are managed by the Authenticator. If you see my comment about accessing a gate via ssh, I can't seem to get the Tokens to work in Putty or Moba. If you do, please let me know.