Check: FGFW-ND-000045
Fortinet FortiGate Firewall NDM STIG:
FGFW-ND-000045
(in versions v1 r4 through v1 r1)
Title
The FortiGate device must enforce the limit of three consecutive invalid logon attempts, after which time it must lock out the user account from accessing the device for 15 minutes. (Cat II impact)
Discussion
By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.
Check Content
Log in to the FortiGate GUI with Super-Admin privilege. 1. Open a CLI console, via SSH or available from the GUI. 2. Confirm the output from the following command: # show full-configuration system global | grep -i admin-lockout The output should be: set admin-lockout-duration 900 set admin-lockout-threshold 3 If the admin-lockout-duration is not set to 900 and admin-lockout-threshold is not set to 3, this is a finding.
Fix Text
Log in to the FortiGate GUI with Super-Admin privilege. 1. Open a CLI console, via SSH or available from the GUI. 2. Run the following commands: # config system global # set admin-lockout-duration 900 # set admin-lockout-threshold 3 # end
Additional Identifiers
Rule ID: SV-234168r879546_rule
Vulnerability ID: V-234168
Group Title: SRG-APP-000065-NDM-000214
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000044 |
The information system enforces the organization-defined limit of consecutive invalid logon attempts by a user during the organization-defined time period. |
Controls
Number | Title |
---|---|
AC-7 |
Unsuccessful Logon Attempts |