Best Practices / Security
Setup default fortswitch password
config switch-controller switch-profile
edit default
set login-passwd-override enable
set login-passwd <password>
next
end
Setup MGMT and Internal access: By default https, ping and ssh are allowed. Add SNMP.
config switch-controller security-policy local-access
edit "default"
set mgmt-allowaccess https ping ssh snmp
set internal-allowaccess https ping ssh snmp
next
end
Optionally increase logging level to information or debug:
config switch-controller switch-log
set status enable
set severity information
end
Disable LLDP ISL Profiles on non FortiLink ports to prevent VLAN-hopping attack
SNMP Configuration / Monitoring
Monitor core switches and tier switches. ICLs, connections between tiers and FortiLink.
config switch-controller snmp-community
edit 1
set name "SNMPMonitor"
config hosts
edit 1
set ip 10.1.2.3 255.255.255.255
next
end
set trap-v1-status disable
set trap-v2c-status disable
set events cpu-high mem-low log-full intf-ip ent-conf-change
next
end
config switch-controller snmp-sysinfo
set status enable
end
config switch-controller security-policy local-access
edit "default"
set internal-allowaccess https ping ssh snmp radius-acct
next
end
Enable storm control policy: Default rate is 500, adjust rate to your BUM-Traffic rate.
config switch-controller storm-control
set rate 2000
set unknown-unicast enable
set unknown-multicast enable
set broadcast enable
end
Enable network-assisted device detection
LLDP / CDP packets can't reach the Fortigate for additional device detection information. That's why it's recommended to enable it on the switches.
Last updated
Was this helpful?