FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
dbabic
Staff
Staff
Article Id 193699

Description

 
This article explains the purpose and functionality of the dedicated-mgmt feature also known as FortiGate Out-of-band Management.
 
Out-of-band: separate from the user traffic: separate routing table, separate routing altogether. 
 
This is done in two ways:
- dedicating an interface in HA for individual management of FortiGates (up to 4 interfaces).
- on select models, a separate interface comes factory set-up with a 'dedicated-to management' configuration.

Note: both can be used at the same time!
This article refers to the 'dedicated-to management' part.

By default, SNMP trap and syslog/remote log should go out of a FortiGate from the dedicated management port. The dedicated management port is useful for IT management regulation.
 
Two units of HA cluster should be able to send out logs, SNMP traps, and radius/LDAP packets initially on the management port individually. This management traffic should support communication in the dedicated network.
 
The feature can also be used in standalone mode allowing a dedicated port used for management.

The feature might also be useful when using two management channels in the case when the primary in-band management port is unreachable making it possible to reach the FortiGate and receive logs by the secondary out-of-band channel.

For example, if using the wan1 port as the primary port for management, and the dedicated-mgmt feature is enabled by using for example mgmt1 port for out-of-band management, there will be a redundant management port which is useful if the port wan1 becomes unavailable.
 
Such implementation needs to be used with consideration because it means that the logs such as SNMP traps will be sent out simultaneously from both port wan1 and port mgmt1.


Scope

 

All FortiGate models with mgmt interface running supported FortiOS versions 

(FortiGate 100D, 200D, 900D, 1000D and 3040C running FortiOS 5.0, 5.2 or 5.4).

Solution

 

Dedicating an interface to management can be done in GUI as well as CLI:

 
AlexCFTNT_0-1668505716939.png

 

config system interface
    set dedicated-to management
end

 

When the mgmt interface is already set up with 'dedicated-to management', it will not be shown up in the interface selection in firewall policies (it is 'out-of-band' now) which means that normal internet access traffic from this interface is not possible.
For example: If firewall management access is taken on the dedicated-to-management interface from the user's PC, th
en that user's PC cannot access the internet via the dedicated-to-management interface from which firewall access is taken.
 
 
Further changes in the implementation of the dedicated-mgmt feature (adding DHCP server) are possible through CLI.
The mgmt interface must not be referenced elsewhere in order to be used here.
 
To check first, this command should not return anything, only then mgmt can be used:
 
diagnose sys cmdb refcnt show system.interface.name mgmt
 
Configuration CLI:
 
config system dedicated-mgmt
    edit {name}
        set status {enable | disable}
        set interface [mgmt | mgmt1 | mgmt2 ]
        set default-gateway x.x.x.x
        set dhcp-server {enable | disable}
        set dhcp-netmask
        set dhcp-start-ip
        set dhcp-end-ip
end

 

Related article:

Technical Tip: FortiGate SNMP polling via the dedicated HA management port - HA status MIB OID