mirror of
https://github.com/yuriskinfo/cheat-sheets.git
synced 2025-12-21 21:33:25 +01:00
Added 2 new recommendations to the Fortigate SSL VPN Hardening Guide
This commit is contained in:
@@ -4,7 +4,7 @@
|
|||||||
:date: 2023-03-15 09:55:25+00:00
|
:date: 2023-03-15 09:55:25+00:00
|
||||||
:toc:
|
:toc:
|
||||||
|
|
||||||
Last updated: 16.03.2023
|
Last updated: 19.03.2023
|
||||||
|
|
||||||
== Introduction
|
== Introduction
|
||||||
This guide is the result of closely following Fortigate VPN SSL vulnerabilities
|
This guide is the result of closely following Fortigate VPN SSL vulnerabilities
|
||||||
@@ -42,6 +42,7 @@ config vpn ssl settings
|
|||||||
set port 13123
|
set port 13123
|
||||||
----
|
----
|
||||||
|
|
||||||
|
|
||||||
== Do not use local users for authentication, and if using - keep passwords elsewhere or/and enable MFA
|
== Do not use local users for authentication, and if using - keep passwords elsewhere or/and enable MFA
|
||||||
In general, keeping all the security info in one box (Fortigate here) is a bad
|
In general, keeping all the security info in one box (Fortigate here) is a bad
|
||||||
practice. The mentioned vulnerability CVE-2018-13379 affected only Fortigates
|
practice. The mentioned vulnerability CVE-2018-13379 affected only Fortigates
|
||||||
@@ -244,6 +245,38 @@ end
|
|||||||
----
|
----
|
||||||
|
|
||||||
|
|
||||||
|
== Create a no-access portal and set it as default in the VPN settings
|
||||||
|
Once you have VPN SSL enabled, you *have* to specify the default portal
|
||||||
|
to which all unmapped to portals user will be assigned. To prevent unintended
|
||||||
|
users/groups connecting via default portal, create the one disabling all access
|
||||||
|
inside it and then set it as the default.
|
||||||
|
|
||||||
|
* Create a portal with no factual access:
|
||||||
|
|
||||||
|
----
|
||||||
|
config vpn ssl web portal
|
||||||
|
edit DefaultNoAccess
|
||||||
|
set tunnel-mode disable
|
||||||
|
set web-mode disable
|
||||||
|
set ipv6-tunnel-mode disable
|
||||||
|
next
|
||||||
|
end
|
||||||
|
----
|
||||||
|
|
||||||
|
|
||||||
|
* Make it the default portal:
|
||||||
|
|
||||||
|
----
|
||||||
|
config vpn ssl setting
|
||||||
|
set default-portal DefaultNoAccess
|
||||||
|
end
|
||||||
|
----
|
||||||
|
|
||||||
|
IMPORTANT: Make sure you have the relevant users/groups mapped to other, working portals, before doing this.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
== Block offending IP after _n_ failed attempts
|
== Block offending IP after _n_ failed attempts
|
||||||
This slows down brute-force and scanning attacks on VPN SSL. This feature is on
|
This slows down brute-force and scanning attacks on VPN SSL. This feature is on
|
||||||
@@ -318,6 +351,24 @@ remember of no single critical CVE for the IPSec daemon in Fortigate. Yes, it is
|
|||||||
involved in configuring it, but it may well be worth the effort. You use on the
|
involved in configuring it, but it may well be worth the effort. You use on the
|
||||||
client side the same Forticlient.
|
client side the same Forticlient.
|
||||||
|
|
||||||
|
|
||||||
|
== Consider moving VPN SSL into its own VDOM
|
||||||
|
This is a measure against the worst case scenario - remotely executable 0-day
|
||||||
|
happens in the SSL VPN daemon, and attackers break into your Fortigate. In this
|
||||||
|
scenario the attackers will most probably create their own admin users for
|
||||||
|
persistence, set up VPN for remote access with rules permitting _Any_ to the
|
||||||
|
internal LAN, and if not trying to hide - will delete/remove your admin user to
|
||||||
|
block you access to the Fortigate. If this happens with the Fortigate that all
|
||||||
|
your DMZ/LAN/Storage/Backup networks are connected to, the game is over. But if
|
||||||
|
the same happens to the Internet-facing VDOM that has only SSL VPN configs and
|
||||||
|
rules, well, maximum they will have access to is anything you explicitly allowed
|
||||||
|
in rules between VDOMs. And if you implemented specific rules to allow specific
|
||||||
|
protocols to specific hosts, that would be not much of a gain to the attackers.
|
||||||
|
And all Fortigate models except the smallest ones, have hardware acceleration on
|
||||||
|
their inter-VDOM links, so perfomance-wise you lose nothing as well.
|
||||||
|
And price-wise, every Fortigate (even the smallest 40F) includes 10 VDOMs for free.
|
||||||
|
|
||||||
|
|
||||||
== Additional Resources to follow
|
== Additional Resources to follow
|
||||||
* https://www.fortiguard.com/psirt Fortinet announcements on new vulnerabilities.
|
* https://www.fortiguard.com/psirt Fortinet announcements on new vulnerabilities.
|
||||||
* https://yurisk.info/category/fortigate.html My blog's Fortigate category, has RSS feed
|
* https://yurisk.info/category/fortigate.html My blog's Fortigate category, has RSS feed
|
||||||
|
|||||||
10778
cheat-sheets/fortigate-ssl-vpn-hardening-guide.pdf
Normal file
10778
cheat-sheets/fortigate-ssl-vpn-hardening-guide.pdf
Normal file
File diff suppressed because it is too large
Load Diff
BIN
cheat-sheets/x-fortigate-ssl-rule-to-specific-services.png
Normal file
BIN
cheat-sheets/x-fortigate-ssl-rule-to-specific-services.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 33 KiB |
BIN
cheat-sheets/x-fortigate-vpn-ssl-allow-specific-ips.png
Normal file
BIN
cheat-sheets/x-fortigate-vpn-ssl-allow-specific-ips.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 67 KiB |
Reference in New Issue
Block a user