config router ospfRouter

virtual-link command keywords and variables

Keywords and

Description

Default

Availability

variables

 

 

 

authentication

Set the authentication type.

none

All models.

{md5 none

Use the authentication keyword

 

 

text}

to define the authentication used for

 

 

OSPF packets sent and received

 

 

 

over this virtual link. If you select

 

 

 

none, no authentication is used. If

 

 

 

you select text, the authentication

 

 

 

key is sent as plain text. If you select

 

 

 

md5, an authentication key is used to

 

 

 

generate an MD5 hash.

 

 

 

Both text mode and MD5 mode only

 

 

 

guarantee the authenticity of the

 

 

 

OSPF packet, not the confidentiality

 

 

 

of the information in the packet.

 

 

 

In text mode the key is sent in clear

 

 

 

text over the network. Text mode is

 

 

 

usually used only to prevent network

 

 

 

problems that can occur if an

 

 

 

unwanted or misconfigured router is

 

 

 

mistakenly added to the area.

 

 

authentication-key

Enter the password to use for text

No

All models.

<password_str>

authentication.

default.

authentication

 

The authentication-key must

 

must be set to

 

be the same on both ends of the

 

text.

 

virtual link.

 

 

 

The maximum length for the

 

 

 

authentication-key is 15

 

 

 

characters.

 

 

dead-interval

The time, in seconds, to wait for a

40

All models.

<seconds_integer>

hello packet before declaring a

 

 

 

router down. The value of the dead-

 

 

 

interval should be four times the

 

 

 

value of the hello-interval.

 

 

 

Both ends of the virtual link must use

 

 

 

the same value for dead-

 

 

 

interval.

 

 

 

The valid range for

 

 

 

seconds_integer is 1 to 65535.

 

 

hello-interval

The time, in seconds, between hello

10

All models.

<seconds_integer>

packets.

 

 

 

Both ends of the virtual link must use

 

 

 

the same value for hello-

 

 

 

interval.

 

 

 

The valid range for

 

 

 

seconds_integer is 1 to 65535.

 

 

md5-key

Enter the key ID and password to

No

All models.

<id_integer><key_s

use for MD5 authentication. Both

default.

authentication

tr>

ends of the virtual link must use the

 

must be set to md5.

same key ID and key.

 

 

The valid range for id_integer is 1

 

 

 

to 255. key_str is an alphanumeric

 

 

 

string of up to 16 characters.

 

 

peer

The router id of the remote ABR.

No

All models.

<address_ipv4>

0.0.0.0 is not allowed.

default.

 

174

01-28007-0068-20041203

Fortinet Inc.

Page 174
Image 174
Fortinet 100A manual Virtual-link command keywords and variables, 174

100A specifications

Fortinet 100A is a versatile network security device designed to provide comprehensive protection against various cyber threats while ensuring optimal network performance. As part of the FortiGate series, the 100A combines advanced security features with powerful hardware capabilities, making it suitable for small to medium-sized businesses.

One of the key features of the Fortinet 100A is its deep packet inspection technology. This capability allows the firewall to analyze both the header and payload of packets traversing the network, enabling it to detect and block malicious content effectively. The 100A can identify and mitigate a wide range of threats, including malware, intrusions, and application-layer attacks.

The FortiOS operating system powers the Fortinet 100A, offering a robust and user-friendly interface for configuration and management. With its unified security management console, administrators can efficiently monitor network traffic and enforce security policies across the organization. The system provides centralized logging and reporting features, enabling users to gain valuable insights into their security posture and respond swiftly to incidents.

The 100A supports multiple deployment modes, including transparent, NAT, and route modes. This flexibility allows organizations to integrate the device into their existing network architecture with ease. The firewall's high throughput capabilities ensure that network performance remains unaffected, even under heavy load from multiple users and devices.

Another notable aspect of the Fortinet 100A is its support for various VPN technologies, including IPsec and SSL VPN. This feature facilitates secure remote access for employees, enabling them to connect to the corporate network safely, regardless of their location. As remote work continues to be a norm in many sectors, this capability is critical for maintaining productivity and security.

In addition to these features, the Fortinet 100A provides comprehensive web filtering capabilities, protecting users from harmful websites and inappropriate content. This protection is essential for organizations looking to maintain a secure and productive environment.

With its combination of powerful security features, flexible deployment options, and robust performance, the Fortinet 100A stands out as an ideal solution for organizations seeking to bolster their cybersecurity measures while ensuring seamless connectivity for users. As cyber threats continue to evolve, investing in a capable device like the FortiGate 100A is crucial for maintaining a secure network infrastructure.