FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
karanvyas
Staff
Staff
Article Id 266237

Description

 

This article describes optimal ways to strengthen security and improve operational efficiency with FortiGate admin profiles, enabling customized access control and privileges for different administrators.

 

Scope

 

FortiGate running v7.2.5 or above.

 

Solution

 

FortiGate's admin profiles offer a robust method for managing administrative access to the FortiGate device, granting the flexibility to customize privileges for different administrators. Follow these steps to optimize the configuration of admin profiles for improved security and efficient management:

  1. Navigate to System -> Admin Profiles.
  2. Create a new admin profile: select the '+ Create New' button to initiate the setup of a new admin profile.
  3. In the admin profile configuration page, provide the following information:
  • Name: Use a clear and descriptive name for the admin profile, such as 'Full Access Admin' or 'Read-Only Admin'.
  • Comments (optional): Include relevant notes or details to help identify the purpose or scope of the profile.
  • Under the 'Permissions' section, there are three main options. Choose one:
  1. None Access: No permissions to view or configure settings.
  2. Read-Only Access: View-only privilege, no modifications allowed.
  3. Read/Write Access: Full privilege to view and modify settings.
  • Fine-tune admin 'Access Permissions': Under the 'Access Control' section, carefully customize access permissions for different administrative functions:
  1. Security Fabric: For all the features under Security Fabric in the GUI.
  2. FortiView: Permission to view various things under FortiView, which is under the dashboard in the GUI.
  3. User & Device: For all the features under User & Device in the GUI.
  4. Firewall: For all the features under Policy & Objects in the GUI.

If 'Custom' is chosen, granular control can be gained.

Note: To provide clearer explanations, each section under 'Custom' is enabled individually while keeping all other sections disabled in all the access control features.

 

Policy:

 

jkb.png

 

se5r.png

 

Address:

 

asd.png

 

sed.png

 

Service:

 

wqed.png

 

awd.png

 

Schedule:

 

ssssssssssss.png

 

wwwwwwwwwwwwwwwwwwwwwwwwwwww.png

 

Others:

 

c.png

 

dd.png

 

eeeeeee.png

 

  1. Log & Report: For all the features under Log & Report on the GUI.

Configuration:

sd.png

 

sdc.png

 

Data Access:

 

wqddddddddddd.png

 

sssssssssssssssssssssssss.png

 

Report Access:

 

sddddddddd.png

 

ss.png

 

Threat Weight:

 

sddddddddddddddddddddddddddd.png

 

qwswswdsssssssssssssssss.png

 

 

  1. Network: For all the features under Network in the GUI.

Configuration:

 

ewf.png

 

f.png

 

Packet Capture:

 

sad.png

 

asxd.png

 

Router:

 

sac.png

 

asd.png

 

 

  1. System: For all the features under System in the GUI.

Administrator Users:

 

sdf.png

 

d.png

 

cdsacwscw.png

 

FortiGuard Updates:

 

sef.png

 

saef.png

 

Configuration:

 

wr.png

 

a.png

 

b.png

 

c.png

 

Maintenance:

 

Only Dashboard Status would be visible. The rest of the things under Dashboard will not be displayed.   

 

 sdfc.png

 

  1. Security Profile: For all the features under Security Profile in the GUI.

    In similar ways, the Custom feature can be used for Security Profile as well.

 

  1. VPN: For SSL and IPsec VPN.

changedoc.png

 

 

 

asdfcsdc.png

 

csacscwcecwc.png

 

  1.  WiFi & Switch: For all the features under WiFi & Switch in the GUI.

wef.png

 

sdcsdc.png

 

Configure Administrative Services: Under the 'Administrative Services' section, enable or disable specific administrative services based on security policies. For example, restrict SSH access to trusted IPs only.

 

Assign Administrators to the Profile: Go to 'System -> Administrators' and select an existing administrator or create a new one. In the administrator's settings, associate the admin profile that was created with the respective administrator.

 

Save and Validate the Configuration: After configuring the admin profile and associating it with administrators, thoroughly review the settings to ensure they align with the organization's security and operational requirements. Then, select the 'OK' or 'Apply' button to save the changes.