Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
mlacomb-Lucid
New Contributor

Limit access by ip

All:

 

I understand the admin access restrictions - but I don't want anyone to even see that the device is a Fortigate on the WAN.  How to do this simply?  And - if it's involving CLI mangling of the local policy - is this something on target to be usable in the GUI in the future?

 

Thanks!

1 Solution
mlacomb-Lucid

Right - so worked with a colleague on this, trusted networks have to be applied to every System Administrator - or else the system will show the page to other addresses.  My mistake for not checking that - thanks for all the help!

Also - we use trusted networks as well for interior management sources (i.e. not allowing certain subnets on the LAN to come in either.)

View solution in original post

3 REPLIES 3
AEK
SuperUser
SuperUser

Then the best thing to do is always disable any management access (ping as well) on WAN interface.

AEK
AEK
JonasV
New Contributor III

Agree with @AEK 
Disable any allowaccess on the WAN facing interfaces, I.E WAN1 & WAN2.
If you do need remote management access, you could lock it down to trusted networks with local in policies.

Kind regards
Kind regards
mlacomb-Lucid

Right - so worked with a colleague on this, trusted networks have to be applied to every System Administrator - or else the system will show the page to other addresses.  My mistake for not checking that - thanks for all the help!

Also - we use trusted networks as well for interior management sources (i.e. not allowing certain subnets on the LAN to come in either.)

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors