2.4.8 Virtual patching on the local-in management interface

Information

Allow virtual patching to be applied to traffic destined to the FortiGate by applying IPS signatures to the local in interface using local in policies. Attacks geared towards GUI and SSH management access, for example, can be mitigated using IPS signatures pushed from FortiGuard, thereby virtually patching these vulnerabilities.

The FortiGate must have a valid FMWR (Firmware) license to install the FMWP database. The FMWP database can be viewed by running the diagnose autoupdate versions command.

Patches require scheduling of downtime, which means there is some attack window from the time Fortinet announced the vulnerability to when patch is applied. To minimise the risk, virtual patching on GUI and SSH management access is needed.

Solution

On CLI:

config firewall local-in-policy
edit <id>
set virtual-patch enable
next
end

See Also

https://workbench.cisecurity.org/benchmarks/24708

Item Details

Category: RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|RA-5, 800-53|SI-2, 800-53|SI-2(2), CSCv7|3.5

Plugin: FortiGate

Control ID: 8904ac52844790ca87dd7df75662cbd27ed011a940de5c4fee6a6d49a7da6e57