So the security rating suggests that I apply an interface Classification for all interfaces including FortiLink. What if the FortiLink contains different interfaces that each have their own classification?
What should the classification be set to for the parent FortiLink object?
Same problem here
81F 6.4.13
Clasified all the VLAN's under my fortilink. run security rating again and still asking to set clasification for fotilink.
When editing the fortilink in gui the option to clasifie the interface is hiden. - probably makes sens as fortinet should set the fortilink clasisfication at time of creation for a "system type interface".
from the security rating chose DMZ > not sure if it's right - will update when i know more
Would be great if the defaukt VLAN's like "fortilink", "video.fortilink", "ssl.root" etc. that are auto created could receive they're interface clasification directly when generate.
Why do we need to clasify fortilink it's dedicated to fortiswitch only...
81F > v6.4.14 build2093 (GA)
problem still present
I guess you still need to identify them as LAN or DMZ (7.2.4), you can have multiple FortiLink interfaces on the same FGT. VLAN interfaces still can be used for different purposes independently.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1737 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.