12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Administrators<br />

System Administrators<br />

To configure an administrator account<br />

1 Go to System > Admin > Administrators.<br />

2 Select Create New to add an administrator account or select the Edit icon to make<br />

changes to an existing administrator account.<br />

3 In the Administrator field, type a login name for the administrator account.<br />

If you are using RADIUS authentication for this administrator but not using the<br />

wildcard option, the administrator name must match an account on the RADIUS<br />

server.<br />

4 Select the type of authentication:<br />

If you are using RADIUS authentication for this administrator:<br />

• Select RADIUS.<br />

• Select Wildcard if you want all accounts on the RADIUS server to be<br />

administrators of this <strong>FortiGate</strong> unit.<br />

• Select the administrators user group from the User Group list.<br />

If you are using PKI certificate-based authentication for this administrator:<br />

• Select PKI.<br />

• Select the administrators user group from the User Group list.<br />

5 Type and confirm the password for the administrator account.<br />

This step does not apply if you are using RADIUS Wildcard or PKI certificatebased<br />

authentication.<br />

6 Optionally, type a Trusted Host IP address and netmask from which the<br />

administrator can log into the web-based manager.<br />

7 Select the access profile for the administrator.<br />

8 Select OK.<br />

Using trusted hosts<br />

Setting trusted hosts for all of your administrators increases the security of your<br />

network by further restricting administrative access. In addition to knowing the<br />

password, an administrator must connect only through the subnet or subnets you<br />

specify. You can even restrict an administrator to a single IP address if you define<br />

only one trusted host IP address with a netmask of 255.255.255.255.<br />

When you set trusted hosts for all administrators, the <strong>FortiGate</strong> unit does not<br />

respond to administrative access attempts from any other hosts. This provides the<br />

highest security. If you leave even one administrator unrestricted, the unit accepts<br />

administrative access attempts on any interface that has administrative access<br />

enabled, potentially exposing the unit to attempts to gain unauthorized access.<br />

The trusted hosts you define apply both to the web-based manager and to the CLI<br />

when accessed through telnet or SSH. CLI access through the console connector<br />

is not affected.<br />

The trusted host addresses all default to 0.0.0.0/0. If you set one of the 0.0.0.0/0<br />

addresses to a non-zero address, the other 0.0.0.0/0 will be ignored. The only way<br />

to use a wildcard entry is to leave the trusted hosts at 0.0.0.0/0. However, this is<br />

an unsecure configuration.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

168 01-30005-0203-20070830

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!