Setting administrative access for ssh or telnet, Connecting to the fortimail cli using ssh – Fortinet FortiMail 3.0 MR4 User Manual
Page 23
Using the CLI
Connecting to the CLI
FortiMail™ Secure Messaging Platform Version 3.0 MR4 CLI Reference
06-30004-0420-20080814
23
7
Press Enter to connect to the FortiMail CLI.
8
A prompt appears:
FortiMail-400 login:
9
Type a valid administrator name and press Enter.
10
Type the password for this administrator and press Enter.
The following prompt appears:
Welcome!
You have connected to the FortiLog CLI, and you can enter CLI commands.
Setting administrative access for SSH or Telnet
To configure the FortiMail unit to accept SSH or Telnet connections, you must set
administrative access to SSH or Telnet for the FortiMail interface to which your
management computer connects. To use the web-based manager to configure
FortiMail interfaces for SSH or Telnet access, see “Interface settings” in the
“Configuring FortiMail system settings” chapter of
.
To use the CLI to configure SSH or Telnet access
1
Connect and log into the CLI using the FortiMail console port and your terminal
emulation software.
2
Use the following command to configure an interface to accept SSH connections:
set system interface
end
3
Use the following command to configure an interface to accept Telnet
connections:
set system interface
telnet
4
To confirm that you have configured SSH or Telnet access correctly, enter the
following command to view the access settings for the interface:
get system interface
The CLI displays the settings, including the management access settings, for the
configured interfaces.
Connecting to the FortiMail CLI using SSH
Secure Shell (SSH) provides strong secure authentication and secure
communications to the FortiMail CLI from your internal network or the internet.
Once the FortiMail unit is configured to accept SSH connections, you can run an
SSH client on your management computer and use this client to connect to the
FortiMail CLI.
Stop bits
1
Flow control
None
Note: The FortiMail unit supports the following encryption algorithms for SSH access:
3DES and Blowfish.