FGFW-ND-000045 - The FortiGate device must enforce the limit of three consecutive invalid logon attempts, after which time it must lock out the user account from accessing the device for 15 minutes

Information

By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.

Solution

Log in to the FortiGate GUI with Super-Admin privilege.

1. Open a CLI console, via SSH or available from the GUI.
2. Run the following commands:
# config system global
# set admin-lockout-duration 900
# set admin-lockout-threshold 3
# end

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_FN_FortiGate_Firewall_Y23M07_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-7a., CAT|II, CCI|CCI-000044, Rule-ID|SV-234168r879546_rule, STIG-ID|FGFW-ND-000045, Vuln-ID|V-234168

Plugin: FortiGate

Control ID: 443fe7026cd2b0d6ced7fb4e8150e15a30e4e2eeccc5749ce0f1520e12da11c2