Fortinet black logo

Administration Guide

FortiTester

FortiTester

FortiTester can be added to the Security Fabric and authorized from the Security Fabric topology views. Once added, the FortiTester will appear in the Security Fabric widget on the dashboard. A FortiTester can be added to the dashboard as a Fabric device widget.

To add FortiTester to the Security Fabric in the GUI:
  1. Enable the Security Fabric and configure the interface to allow other Security Fabric devices to join (see Configuring the root FortiGate and downstream FortiGates).

  2. In FortiTester, enable the Security Fabric:
    1. Go to System Settings > Security Fabric > Settings.
    2. Click the toggle to enable the device (Enable Security Fabric).
    3. Enter the FortiGate Root IP Address.

    4. Click Apply.
  3. Authorize the FortiTester in FortiOS:
    1. Go to Security Fabric > Fabric Connectors.
    2. In the topology tree, click the highlighted FortiTester serial number and select Authorize.

      The authorized device appears in the topology tree. Hover over the device name to view the tooltip.

      The Security Fabric widget on the dashboard also updates when the FortiTester is authorized.

  4. Go to Security Fabric > Physical Topology or Security Fabric > Logical Topology to view more information.

    Physical topology view:

    Logical topology view:

To add FortiTester to the Security Fabric in the CLI:
  1. Configure the interface to allow other Security Fabric devices to join:
    config system interface
        edit "port8"
            ...
            set allowaccess ping https ssh http fgfm fabric
            ...
        next
    end
  2. Enable the Security Fabric:
    config system csf
        set status enable
        set group-name "CSF_F"
    end
  3. In FortiTester, enable the Security Fabric:
    config system csf
        set ip 172.16.116.230
        set port 8013
        set status enable
    end
  4. Authorize the FortiTester in FortiOS:
    config system csf
        set status enable
        set group-name "CSF_F"
        config trusted-list
            edit "FTSV320000200000"
                set authorization-type certificate
                set certificate "*******************"
            next
        end
    end

FortiTester

FortiTester can be added to the Security Fabric and authorized from the Security Fabric topology views. Once added, the FortiTester will appear in the Security Fabric widget on the dashboard. A FortiTester can be added to the dashboard as a Fabric device widget.

To add FortiTester to the Security Fabric in the GUI:
  1. Enable the Security Fabric and configure the interface to allow other Security Fabric devices to join (see Configuring the root FortiGate and downstream FortiGates).

  2. In FortiTester, enable the Security Fabric:
    1. Go to System Settings > Security Fabric > Settings.
    2. Click the toggle to enable the device (Enable Security Fabric).
    3. Enter the FortiGate Root IP Address.

    4. Click Apply.
  3. Authorize the FortiTester in FortiOS:
    1. Go to Security Fabric > Fabric Connectors.
    2. In the topology tree, click the highlighted FortiTester serial number and select Authorize.

      The authorized device appears in the topology tree. Hover over the device name to view the tooltip.

      The Security Fabric widget on the dashboard also updates when the FortiTester is authorized.

  4. Go to Security Fabric > Physical Topology or Security Fabric > Logical Topology to view more information.

    Physical topology view:

    Logical topology view:

To add FortiTester to the Security Fabric in the CLI:
  1. Configure the interface to allow other Security Fabric devices to join:
    config system interface
        edit "port8"
            ...
            set allowaccess ping https ssh http fgfm fabric
            ...
        next
    end
  2. Enable the Security Fabric:
    config system csf
        set status enable
        set group-name "CSF_F"
    end
  3. In FortiTester, enable the Security Fabric:
    config system csf
        set ip 172.16.116.230
        set port 8013
        set status enable
    end
  4. Authorize the FortiTester in FortiOS:
    config system csf
        set status enable
        set group-name "CSF_F"
        config trusted-list
            edit "FTSV320000200000"
                set authorization-type certificate
                set certificate "*******************"
            next
        end
    end