12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Interface<br />

System Network<br />

Inter-vdom interface<br />

Virtual domains (VDOMs) help to separate traffic based on your needs. The intervdom<br />

interface is used to connect two virtual domains without using a physical<br />

interface. VDOMs must be enabled before you can create an inter-vdom interface.<br />

Traffic between VDOMs over an inter-vdom interface has to leave and re-enter<br />

through the firewall maintaining the established level of security of physical<br />

interfaces on your <strong>FortiGate</strong> unit.<br />

Before inter-vdom interfaces, the number of physical interfaces limited the<br />

possible configurations. Inter-vdom links are virtual interfaces, removing that limit.<br />

If your <strong>FortiGate</strong> unit has many VDOMs, inter-vdom interfaces allow you to<br />

configure things however you need from a simple stand alone VDOM<br />

configuration to a <strong>com</strong>plex meshed VDOM configuration. For more information,<br />

see the <strong>FortiGate</strong> VLANs and VDOMs User <strong>Guide</strong>.<br />

When creating the inter-vdom interface, there are two ends to configure - one<br />

connects to each VDOM.The CLI <strong>com</strong>mand to configure an inter-vdom interface<br />

or link interface called link1 that connects root VDOM to vdom1:<br />

config global<br />

config system vdom-link<br />

edit link1<br />

config system interface<br />

edit link10<br />

set vdom root<br />

next<br />

edit link11<br />

set vdom vdom1<br />

next<br />

end<br />

For more information, see config system interface in the <strong>FortiGate</strong> CLI Reference.<br />

Additional configuration for interfaces<br />

Once the interface is selected with the basic settings configured, some additional<br />

configuration may be considered. Additional configuration for an interface consists<br />

of setting:<br />

• Administrative access to an interface<br />

• Interface MTU packet size<br />

• Traffic logging for an interface<br />

• Secondary IP Addresses<br />

Administrative access to an interface<br />

For a VDOM running in NAT/Route mode, you can control administrative access<br />

to the interfaces in that VDOM.<br />

You can allow remote administration of the <strong>FortiGate</strong> unit. However, allowing<br />

remote administration from the Internet could <strong>com</strong>promise the security of the<br />

<strong>FortiGate</strong> unit. You should avoid this unless it is required for your configuration. To<br />

improve the security of a <strong>FortiGate</strong> unit that allows remote administration from the<br />

Internet:<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

94 01-30005-0203-20070830

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!