Best Practices / Security
Setup default fortswitch password
config switch-controller switch-profile
edit default
set login-passwd-override enable
set login-passwd <password>
next
endSetup MGMT and Internal access: By default https, ping and ssh are allowed. Add SNMP.
config switch-controller security-policy local-access
edit "default"
set mgmt-allowaccess https ping ssh snmp
set internal-allowaccess https ping ssh snmp
next
endOptionally increase logging level to information or debug:
config switch-controller switch-log
set status enable
set severity information
endDisable LLDP ISL Profiles on non FortiLink ports to prevent VLAN-hopping attack
SNMP Configuration / Monitoring
Monitor core switches and tier switches. ICLs, connections between tiers and FortiLink.
Enable storm control policy: Default rate is 500, adjust rate to your BUM-Traffic rate.
Enable network-assisted device detection
LLDP / CDP packets can't reach the Fortigate for additional device detection information. That's why it's recommended to enable it on the switches.
Last updated
Was this helpful?