Managing the FortiLog unit Config
FortiLog Administration Guide 05-16000-0082-20050115 47
Figure 19:Admin
Configure Administrator access
Configure administrative access to allow remote administration of the FortiLog unit.
However, allowing remote administration could compromise the security of your
FortiLog unit. To improve the security of a FortiLog unit use the following principles
when configuring administrative access:
Use secure administrator passwords,
Change these passwords regularly,
Enable secure administrative access to this interface using only HTTPS or SSH,
Do not change the system idle timeout from the default value of 5 minutes.
Create New Select Create New to add an administrator account.
Name The login name for the administrator account.
Trusted host The trusted host IP address for the location from which the administrator can
log into the web-based manager. If Trusted Host is 0.0.0.0 the administrator
can log in from any IP address.
Netmask The trusted host netmask for the location from which the administrator can log
into the web-based manager. If Netmask is 0.0.0.0 there is no restriction on the
netmask.
Permission The permission level for the administrator. Permission can be all, read & write,
or read only.
Modify Select Edit to change an administrator account. Select Change Password to
change an administrator account password.
Administrative
Access
Configure administrative access to control how administrators access the
FortiLog unit.
HTTPS To allow secure HTTPS connections to the FortiLog web-based manager.
PING If you want the FortiLog unit to respond to pings. Use this setting to verify your
installation and for testing.
HTTP To allow HTTP connections to the FortiLog web-based manager. HTTP
connections are not secure and can be intercepted by a third party.
SSH To allow secure SSH connections to the FortiLog CLI.
SNMP To allow a remote SNMP manager to request SNMP information by connecting
to this interface.
TELNET To allow Telnet connections to the FortiLog CLI. Telnet connections are not
secure and can be intercepted by a third party.