Created on 04-14-2005 12:00 AM
You can define Trusted Hosts by going to System>Admin>Administrators. A user of “admin is included as a default with a Trusted Host of 0.0.0.0/0.0.0.0. When selecting Edit, the Trusted Host #1, Trusted Host #2 and Trusted Host #3 entries are blank. This allows all IP addresses to connect with the “admin” account. As of FortiOS2.8 MR9, a blank Trusted Host (#1 and #2) entry is set to 0.0.0.0/0.0.0.0 and Trusted Host #3 is set to 127.0.0.1/255.255.255.255. The 127.0.0.1/255.255.255.255 entry is required to allow access to the Web GUI console, should any restrictive entries be added to position #1 and #2. The first configured Trusted Host entry must be entered in position #1. Examples1. No Trusted Hosts configured (default)Trusted Host #1: 0.0.0.0/0.0.0.0.0 Any host can connect. Trusted Host #1 contains 0.0.0.0/0.0.0.0.0. All hosts (web-based manager console included) will be able to connect to the FortiGate unit. 2. One Trusted Host entry configured in position #2Trusted Host #1: 0.0.0.0/0.0.0.0.0 Here Trusted Host #1 contains 0.0.0.0/0.0.0.0.0 and Trusted Host #2 a subnet value. The first entry will override the second and all hosts (Web -based console included) will be able to connect to the FortiGate unit. This example is essentially the same as example 1. This is a configuration mistake. 3. Only one host allowed to connectTrusted Host #1: 10.100.0.3/255.255.255.255 Here Trusted Host #1 contains a host value, and Trusted Host #2 contains 0.0.0.0/0.0.0.0. The first entry will override the second and only the 10.100.0.3/32 host will be able to connect to the FortiGate unit. The web-based console will not be able to connect to the FortiGate since the Trusted Host #3 is explicitly denied. This example also shows that having a 0.0.0.0/0.0.0.0.0 entry for Trusted Host #2 is not relevant and will not open access to all hosts. 4. One subnet and the web-based console allowed to connectTrusted Host #1: 10.100.0.0/255.255.255.0 This scenario is nearly the same as case 3. The only difference is that the web-based console will be able to connect to the FortiGate unit. 5. Two subnets and the web-based console allowed to connectTrusted Host #1: 10.100.0.0/255.255.255.0 6. Two entire subnets and one specific host allowed to connectTrusted Host #1: 10.100.0.0/255.255.255.0 Here, the web-based console access is denied, as it is not included in the list. |
Related Articles
Troubleshooting Tip: Cannot access the FortiGate web admin interface (GUI)
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.