Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

Administration Guide

Indirect device database editing

When you use the following central management modules to configure managed devices, the changes affect Device Manager, and you are indirectly editing the device database:

  • Policy & Objects
  • AP Manager
  • VPN Manager
  • FortiSwitch Manager
  • Extender Manager

In the central management modules, you can make changes and apply the changes to one or more managed devices. For example, you can use AP Manager to create settings, and then apply the settings to every FortiGate that manages an AP.

Each of the central management modules utilizes the Object Database to access shared objects, such as Address Objects, Security Profiles, and Services.

Any configuration done by using one of the central management modules generates settings that are then "pushed" to the device database on the next policy package install. This push overwrites the existing configuration in the device's database for that setting.

After the device database has been updated by the policy package push, an install of the device database takes place in the same way as if you edited directly.

Indirect device database editing

When you use the following central management modules to configure managed devices, the changes affect Device Manager, and you are indirectly editing the device database:

  • Policy & Objects
  • AP Manager
  • VPN Manager
  • FortiSwitch Manager
  • Extender Manager

In the central management modules, you can make changes and apply the changes to one or more managed devices. For example, you can use AP Manager to create settings, and then apply the settings to every FortiGate that manages an AP.

Each of the central management modules utilizes the Object Database to access shared objects, such as Address Objects, Security Profiles, and Services.

Any configuration done by using one of the central management modules generates settings that are then "pushed" to the device database on the next policy package install. This push overwrites the existing configuration in the device's database for that setting.

After the device database has been updated by the policy package push, an install of the device database takes place in the same way as if you edited directly.