Description
- Dedicating an interface in HA for individual management of FortiGates (up to 4 interfaces).
- On select models, a separate interface comes factory set-up with a 'dedicated-to management' configuration.
Note: both can be used at the same time.
This article refers to the 'dedicated-to management' part.
By default, the SNMP trap and Syslog/remote log should go out of a FortiGate from the dedicated management port. The dedicated management port is useful for IT management regulation.
For example, if using the wan1 port as the primary port for management, and the dedicated-mgmt feature is enabled by using for example mgmt1 port for out-of-band management, there will be a redundant management port which is useful if the port wan1 becomes unavailable.
Scope
This feature is available on models with mgmt/mgmt1/mgmt2 ports, such as the following:
- FGT_120G/121G
- FGT_200F/201F
- FGT_900G/901G
- FGT_1000F/1001F
- FGT_200F/201F
- FGT_3000F/3001F
- FGT_3200F/3201F
- FGT_3500F/3501F
- FGT_3700F/3701F
- FGT_4800F/4801F
- FGT_6000F
- FGT_7000E/7000F
- FFW_1801F
- FFW_2600F
- FFW_3980E
- FFW_4200F
- FFW_4400F/4401F
- FFW_4801F
- FFW_3980E
Solution
Dedicating an interface to management can be done in the GUI as well as the CLI:
config system interface
edit mgmt
set dedicated-to management
end
For example: if firewall management access is taken on the dedicated-to-management interface from the user's PC, then that user's PC cannot access the internet via the dedicated-to-management interface from which firewall access is taken.
edit {name}
set status {enable | disable}
set interface [mgmt | mgmt1 | mgmt2 ]
set default-gateway x.x.x.x
set dhcp-server {enable | disable}
set dhcp-netmask
set dhcp-start-ip
set dhcp-end-ip
end
set ip 10.24.3.199 255.255.252.0
set allowaccess ping https ssh http telnet
set type physical
set dedicated-to management
set role lan
set snmp-index 27
next
end
execute enter dmgmt-vdom
current vdom=dmgmt-vdom:3
get router info routing-table all
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
V - BGP VPNv4
* - candidate default
Routing table for VRF=0
S* 0.0.0.0/0 [10/0] via 10.24.3.200, mgmt1, [1/0] <-- Default route via mgmt1 created in dmgmt-vdom.
C 10.24.0.0/22 is directly connected, mgmt1
config system dedicated-mgmt
set status disable
end
config system interface
edit "mgmt1"
set vdom "root"
set vrf 1
set ip 10.24.3.199 255.255.252.0
set allowaccess ping https ssh http telnet
set type physical
set dedicated-to management
set role lan
set snmp-index 27
next
end
config router static
edit 0
set gateway 10.24.3.200
set device "mgmt1"
next
get router info routing-table database
Routing table for VRF=1
S *> 0.0.0.0/0 [10/0] via 10.24.3.200, mgmt1, [1/0]
C *> 10.24.0.0/22 is directly connected, mgmt1
Note:
When configuring a VM FortiGate, use HA reserved management interface when configuring VM due to a limited number of available interfaces.
Related article:
Technical Tip: FortiGate SNMP polling via the dedicated HA management port - HA status MIB OID