FortiNAC
NOTE: FortiNAC is now named FortiNAC-F. For post-9.4 articles, see FortiNAC-F. FortiNAC is a zero-trust network access solution that provides users with enhanced visibility into the Internet of Things (IoT) devices on their enterprise networks.
cmaheu
Staff
Staff
Article Id 196348
Description
By default, modeled devices are accessed via CLI using SSH port 22 and Telnet port 23.  Configure the appliance to use different ports for SSH and Telnet access. 





Scope
Version: 8.6.1 or greater
Solution
The are two methods of implementation:
  • Global: Applies to all device models in Topology and persists through a product upgrade.  
CLI access is required for configuration.  Requires a system restart to apply changes.  Contact Support for assistance. 

Instructions

1.  Login to CLI and modify the following file:
/bsc/campusMgr/master_loader/.masterPropertyFile

Add the following content and save:

FILE_NAME=./properties_plugin/telnetServer.properties
{
com.bsc.plugin.telnet.TelnetServer.telnetPort=23
com.bsc.plugin.telnet.TelnetServer.sshPort=22
}


2.  Restart processes to apply changes.
shutdownCampusMgr

<wait 30 sec>

startupCampusMgr





  • Per ModelApplies to individual device models in Topology and persists through a product upgrade.  
CLI access is required for configuration.  Does not require a system restart to apply changes. Contact Support for assistance

Instructions
 
Login to CLI and run the following command:
Device -setAttr -ip <device IP> -name SSH_Port -value 4422

Does not require a system restart.


Contributors