Zone - Fortinet FortiGate FortiGate-1000 Administration Manual

Fortinet fortigate fortigate-1000: user guide
Hide thumbs Also See for FortiGate FortiGate-1000:
Table of Contents

Advertisement

System network

Zone

FortiGate-1000 Administration Guide
Controlling administrative access for an interface connected to the Internet allows
remote administration of the FortiGate unit from any location on the Internet. However,
allowing remote administration from the Internet could compromise the security of
your FortiGate unit. You should avoid allowing administrative access for an interface
connected to the Internet unless this is required for your configuration. To improve the
security of a FortiGate unit that allows remote administration from the Internet:
Use secure administrative user passwords,
Change these passwords regularly,
Enable secure administrative access to this interface using only HTTPS or SSH,
Do not change the system idle timeout from the default value of 5 minutes (see
set the system idle timeout" on page
To configure administrative access in Transparent mode, see
management interface" on page
1
Go to System > Network > Interface.
2
Choose an interface and select Edit.
3
Select the Administrative Access methods for the interface.
4
Select OK to save the changes.
To change the MTU size of the packets leaving an interface
1
Go to System > Network > Interface.
2
Choose an interface and select Edit.
3
Select Override default MTU value (1500).
4
Set the MTU size.
Note: You cannot set the MTU of a VLAN larger than the MTU of its physical interface. Nor can
you set the MTU of a physical interface smaller than the MTU of any VLAN on that interface.
To configure traffic logging for connections to an interface
1
Go to System > Network > Interface.
2
Choose an interface and select Edit.
3
Select the Log check box to record log messages whenever a firewall policy accepts a
connection to this interface.
4
Select OK to save the changes.
You can use zones to group related interfaces and VLAN subinterfaces. Grouping
interfaces and VLAN subinterfaces into zones simplifies policy creation. If you group
interfaces and VLAN subinterfaces into a zone, you can configure policies for
connections to and from this zone, rather than to and from each interface and VLAN
subinterface.
60.
01-28006-0009-20041105
83).
"To configure the
Zone
"To
57

Advertisement

Table of Contents
loading

Table of Contents