Fortinet black logo

Administration Guide

Supported connectors overview

Supported connectors overview

The following is an overview of how to add supported connectors to the Security Fabric:

  1. In FortiOS, ensure Security Fabric is enabled, and prepare the root FortiGate for communication with supported Security Fabric devices. See Preparing FortiGate for supported Security Fabric devices.

  2. (Optional) Configure pre-authorization of the supported Security Fabric device. See Configuring pre-authorization of supported Security Fabric devices.

  3. On the supported Security Fabric device, configure the device to join the Security Fabric. See:

  4. Wait for the supported Security Fabric device to establish a connection with the root FortiGate in the Security Fabric.

  5. In FortiOS, authorize the supported Security Fabric device. See Authorizing supported connectors.

    If the supported device is pre-authorized, you can skip this step.

  6. In FortiOS, go to Security Fabric > Physical Topology or Security Fabric > Logical Topology to view information about the authorized device.

Supported connectors overview

The following is an overview of how to add supported connectors to the Security Fabric:

  1. In FortiOS, ensure Security Fabric is enabled, and prepare the root FortiGate for communication with supported Security Fabric devices. See Preparing FortiGate for supported Security Fabric devices.

  2. (Optional) Configure pre-authorization of the supported Security Fabric device. See Configuring pre-authorization of supported Security Fabric devices.

  3. On the supported Security Fabric device, configure the device to join the Security Fabric. See:

  4. Wait for the supported Security Fabric device to establish a connection with the root FortiGate in the Security Fabric.

  5. In FortiOS, authorize the supported Security Fabric device. See Authorizing supported connectors.

    If the supported device is pre-authorized, you can skip this step.

  6. In FortiOS, go to Security Fabric > Physical Topology or Security Fabric > Logical Topology to view information about the authorized device.