Configuring the management interface
The management interface should be used exclusively by the FortiADC administrator to manage the devices, physical or virtual (such as configuring or debugging it). It should be an interface through which FortiADC's management traffic (such as license authenticating) can traverse at any time without affecting normal network traffic. It is especially useful for secondary devices in HA active-passive mode. The management interface has the highest access permissions, and the FortiADC administrator should make sure that it is used for management traffic only, and avoid using it for normal traffic.
You can configure the management interface from either the GUI or the CLI. This section discusses how to configure the management interface from the GUI. For instructions on how to configure management interface using the CLI, see the section Configuring the management interface at the end of this section.
|
To configure the management interface:
- From FortiADC's global interface, go to Networking > Interface to open the interface configuration page.
- In the Management Interface section, click the edit button, the pencil, in the top right corner to enable the management interface. The fields for management interface configuration appear on the page.
- Make the desired selections and entries as described in Management interface configuration.
- Click Save when done.
Option | Guidelines |
---|---|
Management Status |
Enable this option. |
Management Interface |
Select an interface (port) from the list menu. Note: The management interface handles all incoming and outgoing management traffic. Note: It must be promiscuous mode to work. Promiscuous mode is required because dedicated management interface is a virtual interface and does not share the physical port mac address. |
Management IP |
Enter the IP address of the management interface. Note: Once enabled, the management network IP becomes active in all each modes (i.e., standalone, active-passive, active-active, and VRRP). Therefore, the management interface IP address must be unique and must NOT be used in regular functions, such as the virtual server IP addresses, source NAT pool IP addresses, source NAT pool trans-to IP addresses, 1-to-1 NAT external/mapped IP addresses, and all the other IP addresses configured on the interface. Otherwise. it will conflict with the HA functions. |
Management IP Allow Access |
Select the type or types of management traffic that are allows to access the Management interface. |
Management Trust IP |
Enable/disable the Trust IPs Access Control (TIAC) feature to restrict access to the management interface according to the Trust IP Address List. If the source IP is not on the Management Trust IP Address List, the device will refuse the client directly. To add IP addresses to the Management Trust IP Address List, enable the feature and save the configuration. After you have saved it the first time, you can edit it to add IPs to the list. Note: For HA configurations, the Management Trust IP Address list will not be synchronized to peer nodes. |
Management Trust IP Address List |
|
Name |
Configuration name. Valid characters are A -Z , a -z , 0 -9 , _ , and - . No spaces. After you initially save the configuration, you cannot edit the name. |
Type |
Select the IP address type:
|
IPv4/Netmask |
Specify the IP address that can access the interface. |
Address Range |
Specify a range of IP addresses that can access the interface. |
"Dedicated HA Management IP" vs. "Management Interface"
In pre-FortiADC 4.8.1 releases, the GUI had an option in interface configuration (Networking > Interface > Add) which allows you to set an interface as the "Dedicated HA Management IP", which functions exactly the same as the "Management Interface" in 4.8.1. With the 4.8.1 release, that option is removed from the GUI (even though it is still available in the Console) is replaced by the "Management Interface". If you have a dedicated HA management IP configured on a pre-4.8.1 version of FortiADC, we highly recommend that you delete it, and then configure a management interface instead, after you've upgraded to 4.8.1. This will help streamline your interface configuration and make system management easier.
All this can be done through FortiADC's Console only. The following instructions show how to delete your old "Dedicated HA Management IP" and configure the "Management Interface" using the Console in FortiADC 4.8.1:
Step 1: Remove the "Dedicate HA Management IP"
Execute the following commands:
config system interface
edit "port1"
set dedicate-to-mgmt disable
unset ip
next
end
Step 2: Configure the "Management Interface":
Execute the following commands:
config system ha
set mgmt-status enable
set mgmt-interface port1
set mgmt-ip 10.106.129.120/24
set mgmt-ip-allowaccess https ping ssh snmp http telnet
end