UCF STIG Viewer Logo

The FortiGate device must enforce the limit of three consecutive invalid logon attempts, after which time it must lock out the user account from accessing the device for 15 minutes.


Overview

Finding ID Version Rule ID IA Controls Severity
V-234168 FGFW-ND-000045 SV-234168r611693_rule Medium
Description
By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.
STIG Date
Fortinet FortiGate Firewall NDM Security Technical Implementation Guide 2022-09-12

Details

Check Text ( C-37353r611691_chk )
Log in to the FortiGate GUI with Super-Admin privilege.

1. Open a CLI console, via SSH or available from the GUI.
2. Confirm the output from the following command:
# show full-configuration system global | grep -i admin-lockout
The output should be:
set admin-lockout-duration 900
set admin-lockout-threshold 3

If the admin-lockout-duration is not set to 900 and admin-lockout-threshold is not set to 3, this is a finding.
Fix Text (F-37318r611692_fix)
Log in to the FortiGate GUI with Super-Admin privilege.

1. Open a CLI console, via SSH or available from the GUI.
2. Run the following commands:
# config system global
# set admin-lockout-duration 900
# set admin-lockout-threshold 3
# end