Best Practices / Security
Setup default fortswitch password
Setup MGMT and Internal access: By default https, ping and ssh are allowed. Add SNMP.
Optionally increase logging level to information or debug:
Disable LLDP ISL Profiles on non FortiLink ports to prevent VLAN-hopping attack
SNMP Configuration / Monitoring
Monitor core switches and tier switches. ICLs, connections between tiers and FortiLink.
Enable storm control policy: Default rate is 500, adjust rate to your BUM-Traffic rate.
Enable network-assisted device detection
LLDP / CDP packets can't reach the Fortigate for additional device detection information. That's why it's recommended to enable it on the switches.
Last updated
Was this helpful?