This article describes how to SSH from the controller to the other Hosts or Blades in FortiAnalyzer BigData by using the internal blade subnet.
FortiAnalyzer BigData 4500F.
For our example here, the external facing controller IP address is 172.16.100.99.
[root@blade-10-0-1-3 ~]$ fazbdctl show members
Management IP/Mask is 172.16.100.99/24
Chassis Blade Role Address Ext Address Host Name State Status
1 2 member 10.0.1.2 blade-10-0-1-2 joined alive
1 3 controller 10.0.1.3 blade-10-0-1-3 joined alive
1 4 member 10.0.1.4 blade-10-0-1-4 joined alive
1 5 member 10.0.1.5 blade-10-0-1-5 joined alive
1 6 member 10.0.1.6 blade-10-0-1-6 joined alive
1 7 member 10.0.1.7 blade-10-0-1-7 joined alive
1 8 member 10.0.1.8 blade-10-0-1-8 joined alive
1 9 member 10.0.1.9 blade-10-0-1-9 joined alive
1 10 member 10.0.1.10 blade-10-0-1-10 joined alive
1 11 member 10.0.1.11 blade-10-0-1-11 joined alive
1 12 member 10.0.1.12 blade-10-0-1-12 joined alive
1 13 member 10.0.1.13 blade-10-0-1-13 joined alive
1 14 member 10.0.1.14 blade-10-0-1-14 joined alive
For the example here, the user is trying to access Blade 14, and SSH from the controller (10.0.1.3) into Blade 14 (10.0.1.14) will be visible.
[root@blade-10-0-1-3 ~]$ ssh 10.0.1.14
Last login: Thu Aug 24 10:46:43 2023 from 10.0.1.3
[root@blade-10-0-1-14 ~]$
For the example here, the user is logged from the controller (10.0.1.3) to the FortiAnalyzer blade (10.0.1.1)
[root@blade-10-0-1-3 ~]$ ssh admin@10.0.1.1
(admin@10.0.1.1) Password: ********
FAZ-BD #
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.