The remote host appears to be a Fortinet Fortigate Firewall. Connections are allowed to the web console management. Letting attackers know that you are using this software will help them to focus their attack or will make them change their strategy. In addition to this, an attacker may set up a brute force attack against the remote interface.
Filter incoming traffic to this port