FortiGate units by default do not accept TCP or UDP connections on any port (except TCP port 443 HTTPS connections on the default internal interface for administration). This reduces the possibility of attacks such as Denial of Service (DoS) as the unit's ports cannot be discovered by probing.
An exception to this "stealth" configuration is TCP port 113 (Ident/Auth). By default, this port returns a RST packet to reset the connection. This avoids the delay that occurs if the server making the ident request waits for the request to time out.
The ident port is less used today. If you would prefer to have your FortiGate unit completely invisible to probes at the cost of occasional delays, you can turn off the automatic reset of TCP port 113 connections.
-
FortiGate unit - all models
-
FortiOS firmware - version 2.8 MR11 and later, version 3.0
Execute the set ident-accept enable CLI command on each interface where you want to turn off the automatic reset of TCP port 113 connections. For example, to do this on port1: -
config system interface edit port1 set ident-accept enable end end