Configure Interface Management Profile

  1. Navigate to: Network > Network Profiles > Interface Mgmt and click Add.
  2. Name the Profile: Enter a unique, descriptive name (e.g., Mgmt_Profile_L3).
  3. Enable Administrative Management Services:
    • SSH: Enable for secure CLI access.
    • HTTPS: Enable for secure web interface access.
    • Telnet and HTTP: Do not enable as they transmit data in plaintext.
  4. Enable Network Services:
    • Ping: Enable to allow ICMP echo requests for connectivity testing.
    • SNMP: Enable if SNMP monitoring is required.
    • HTTP OCSP: Enable if using the firewall as an OCSP responder.
  5. Enable Response Pages:
    • Authentication Portal: Enable to serve authentication pages for user identification.
    • URL Admin Override: Enable to allow administrators to override URL filtering blocks.
  6. Enable User-ID Services:
    • User-ID: Enable to allow redistribution of user mappings.
    • User-ID Syslog Listener-SSL: Enable if collecting syslog messages over SSL.
    • User-ID Syslog Listener-UDP: Enable if collecting syslog messages over UDP.
  7. Restrict Access by IP Address:
    • In the Permitted IP Addresses section, specify the IPv4 or IPv6 addresses or subnets that are allowed to access the interface (e.g., 192.168.1.0/24).
    • If no addresses are specified, access is denied by default.
  8. Assign the Profile to Interfaces:
    • Navigate to Network > Interfaces.
    • Select the desired interface (e.g., Ethernet, VLAN, Loopback, or Tunnel).
    • Under the Advanced tab, in the Other Info section, select the newly created Interface Management Profile from the dropdown.
  9. Commit the Configuration: Click Commit to apply the changes.

Best Practices for Interface Management Profiles

🔐 Administrative Interfaces (e.g., MGT or dedicated Layer 3 interfaces)

These interfaces are intended exclusively for firewall administration.

🌐 User-Facing Interfaces (e.g., Interfaces in Security Zones)

These interfaces handle regular user traffic and should have minimal management exposure.

🧩 Summary Table

Setting Administrative Interfaces User-Facing Interfaces
Permitted IP Addresses Trusted Admin IPs Specific User Subnets
HTTPS/SSH Enable Disable
HTTP/Telnet Disable Disable
Ping Optional Optional
Response Pages Optional Enable if needed
User-ID Services Optional Enable if needed
SNMP Optional Optional
Role-Based Access Implement Not Applicable
Session Security Settings Configure Not Applicable

References: