Best Practices / Security

  • Setup default fortswitch password

config switch-controller switch-profile
 edit default
   set login-passwd-override enable
   set login-passwd <password>
 next
end
  • Setup MGMT and Internal access: By default https, ping and ssh are allowed. Add SNMP.

config switch-controller security-policy local-access
    edit "default"
        set mgmt-allowaccess https ping ssh snmp
        set internal-allowaccess https ping ssh snmp
    next
end
  • Optionally increase logging level to information or debug:

config switch-controller switch-log
    set status enable
    set severity information
end
  • Disable LLDP ISL Profiles on non FortiLink ports to prevent VLAN-hopping attack

  • SNMP Configuration / Monitoring

Monitor core switches and tier switches. ICLs, connections between tiers and FortiLink.

  • Enable storm control policy: Default rate is 500, adjust rate to your BUM-Traffic rate.

  • Enable network-assisted device detection

LLDP / CDP packets can't reach the Fortigate for additional device detection information. That's why it's recommended to enable it on the switches.

Last updated

Was this helpful?