Making FortiGate completely invisible to probes

默认情况下,FortiGate设备除TCP 443端口外不接受任何TCP或UDP连接,以增强安全性。本文介绍如何通过CLI命令在指定接口上禁用TCP 113端口的自动重置功能,以提高隐身性。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

FortiGate units by default do not accept TCP or UDP connections on any port (except TCP port 443 HTTPS connections on the default internal interface for administration). This reduces the possibility of attacks such as Denial of Service (DoS) as the unit's ports cannot be discovered by probing.

An exception to this "stealth" configuration is TCP port 113 (Ident/Auth). By default, this port returns a RST packet to reset the connection. This avoids the delay that occurs if the server making the ident request waits for the request to time out.

The ident port is less used today. If you would prefer to have your FortiGate unit completely invisible to probes at the cost of occasional delays, you can turn off the automatic reset of TCP port 113 connections.

  • FortiGate unit - all models

  • FortiOS firmware - version 2.8 MR11 and later, version 3.0

    Execute the set ident-accept enable CLI command on each interface where you want to turn off the automatic reset of TCP port 113 connections. For example, to do this on port1:

  •   config system interface
        edit port1
          set ident-accept enable
        end
      end
     
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值