Skip to Content

How to configure administrative access on FortiGate interface

This article describes configuring administrative access to a FortiGate interface on the CLI and the GUI.

Scope

FortiGate.

Solution

On the CLI the ‘allowaccess setting is used to configure administrative access. The command ‘set allowaccess’ can use the following arguments to allow different types of access:

ping PING access.
https HTTPS access.
ssh SSH access.
snmp SNMP access.
http HTTP access.
telnet TELNET access.
fgfm FortiManager access.
radius-acct RADIUS accounting access.
probe-response Probe access.
fabric Security Fabric access.
ftm FTM access.
speed-test Speed test access.

For example:

config system interface
edit "port1"
set allowaccess ping https http telnet fgfm
next
end

This will allow ping, https, http, telnet, and fgfm access on the port1 interface.

Alternatively, if there are already administrative options configured, ‘append’ can be used instead of ‘set’. The ‘append’ command allows the updating of one or more options to an existing list.

In this example, using ‘append’ to add ‘ssh’ to the already configured options:

config system interface
edit "port1"
append allowaccess ssh
next
end

The result would be the interface port1 that would now be configured as:

config system interface
edit "port1"
set allowaccess ping https ssh http telnet fgfm
next
end

To configure administrative access on the GUI, navigate to Network > Interfaces, select the interface, and ‘Edit’. Select the check boxes for the desired administrative access and select ‘OK’ to save.

To configure administrative access on the GUI, navigate to Network, Interfaces, select the interface, and 'Edit'. Select the check boxes for the desired administrative access and select 'OK' to save.