FortiNAC
NOTE: FortiNAC is now named FortiNAC-F. For post-9.4 articles, see FortiNAC-F. FortiNAC is a zero-trust network access solution that provides users with enhanced visibility into the Internet of Things (IoT) devices on their enterprise networks.
cmaheu
Staff
Staff
Article Id 196348

Description

 
This article describes that by default, modeled devices are accessed via CLI using SSH port 22 and Telnet port 23. Configure the appliance to use different ports for SSH and Telnet access. 

Scope
 
FortiNAC.

Solution
 
There are two methods of implementation:
  • Global: Applies to all device models in Topology and persists through a product upgrade. 
    CLI access is required for configuration. It requires a system restart to apply changes. Contact Support for assistance. 

 

Instructions:
 
  1. Log in to CLI and modify the following file:

/bsc/campusMgr/master_loader/.masterPropertyFile

 
Add the following content and save:
 
FILE_NAME=./properties_plugin/telnetServer.properties

{
com.bsc.plugin.telnet.TelnetServer.telnetPort=23
com.bsc.plugin.telnet.TelnetServer.sshPort=22
}

 

  1. Restart processes to apply changes.

     
shutdownNAC
 
<wait 30 sec>
 
startupNAC



  • Per Model: Applies to individual device models in Topology and persists through a product upgrade. 

CLI access is required for configuration. It does not require a system restart to apply changes. Contact Support for assistance. 


Instructions:
 

Login to CLI and run the following command:
 

Device -setAttr -ip <device IP> -name SSH_Port -value 4422

 

It does not require a system restart.

On FortiNAC-F the above commands needs to be executed on shell using the following command:


execute enter-shell

 

Related article:

Technical Note: Modify Telnet and SSH port settings for device models