Adding A Ping Server To An Interface; Controlling Management Access To An Interface - Fortinet FortiGate 100 Installation & Configuration Manual

Fortinet network device installation and configuration guide
Hide thumbs Also See for FortiGate 100:
Table of Contents

Advertisement

Network configuration

Adding a ping server to an interface

Controlling management access to an interface

FortiGate-100 Installation and Configuration Guide
You can also configure management access and add a ping server to the secondary
IP address.
set system interface <intf_str> config secallowaccess ping
https ssh snmp http telnet
set system interface <intf_str> config secgwdetect enable
Add a ping server to an interface if you want the FortiGate unit to confirm connectivity
with the next hop router on the network connected to the interface. Adding a ping
server is required for routing failover. See
routing table" on page
1
Go to System > Network > Interface.
2
Select Modify
3
Set Ping Server to the IP address of the next hop router on the network connected to
the interface.
4
Select Enable.
The FortiGate unit uses dead gateway detection to ping the Ping Server IP address to
make sure that the FortiGate unit can connect to the this IP address. To configure
dead gateway detection, see
page
131.
5
Select OK to save your changes.
1
Go to System > Network > Interface.
2
Select Modify
3
Select the management Access methods for the interface.
HTTPS
To allow HTTPS connections to the web-based manager through this interface.
PING
If you want this interface to respond to pings. Use this setting to verify your
installation and for testing.
HTTP
To allow HTTP connections to the web-based manager through this interface.
HTTP connections are not secure and can be intercepted by a third party.
SSH
To allow secure SSH connections to the CLI through this interface.
SNMP
To allow a remote SNMP manager to request SNMP information by connecting to
this interface. See
TELNET
To allow Telnet connections to the CLI through this interface. Telnet connections
are not secure and can be intercepted by a third party.
Configuring management access for an interface connected to the Internet allows
remote administration of the FortiGate unit from any location on the Internet. Allowing
management access from the Internet could compromise the security of your
FortiGate unit. You should avoid allowing management access for an interface
connected to the Internet unless this is required for your configuration. To improve the
security of a FortiGate unit that allows remote management from the Internet, add
secure administrative user passwords, change these passwords regularly, and only
enable secure management access using HTTPS or SSH.
4
Select OK to save your changes.
116.
for the interface to which to add a Ping server.
"To modify the Dead Gateway Detection settings" on
for the interface for which to configure management access.
"Configuring SNMP" on page
Adding a ping server to an interface
"Adding destination-based routes to the
134.
111

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents