The FortiGate device must enforce the limit of three consecutive invalid logon attempts, after which time it must lock out the user account from accessing the device for 15 minutes.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
---|---|---|---|---|---|---|
medium | V-234168 | SRG-APP-000065-NDM-000214 | FGFW-ND-000045 | SV-234168r879546_rule | 2023-06-01 | 1 |
Description |
---|
By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. |
ℹ️ Check |
---|
Log in to the FortiGate GUI with Super-Admin privilege. 1. Open a CLI console, via SSH or available from the GUI. 2. Confirm the output from the following command: # show full-configuration system global | grep -i admin-lockout The output should be: set admin-lockout-duration 900 set admin-lockout-threshold 3 If the admin-lockout-duration is not set to 900 and admin-lockout-threshold is not set to 3, this is a finding. |
✔️ Fix |
---|
Log in to the FortiGate GUI with Super-Admin privilege. 1. Open a CLI console, via SSH or available from the GUI. 2. Run the following commands: # config system global # set admin-lockout-duration 900 # set admin-lockout-threshold 3 # end |