Authentication
Use this command to configure the authentication options for the GLB settings of the FQDN.
Before you begin:
- You must have read-write permission for global load balancing settings.
Syntax
config global-load-balance setting
set auth-type {none|TCP_MD5SIG|auth_verify}
set password <string>
set user-defined-certificate {enable|disable}
set cert <datasource>
set ca-verify {enable|disable}
set ca-group <datasource>
set intermediate-ca-group <datasource>
end
|
auth-type |
Select the authentication type:
|
|
password |
The password option is available if auth-type is TCP_MD5SIG or auth_verify. Enter the password to authenticate the key. This password is used for authentication between the GLB and the server. The same password must be set on both, otherwise the two will not be able to synchronize. |
|
user-defined-certificate |
Enable or disable the use of a user-uploaded certificate for SLB authentication. Enable this option if you want the SLB to present a certificate signed by your corporate CA or another trusted issuer during TLS handshakes with the GLB. When disabled, FortiADC uses the built-in default certificate. This is disabled by default. |
|
cert |
The cert option is available if user-defined-certificate is enabled. Select the uploaded certificate that the SLB presents to the GLB. The selected certificate must already be imported into FortiADC. In VDOM deployments, only certificates within the same VDOM are available. |
|
ca-verify |
Enable/disable the root CA verification when synchronizing the SLB information to the GSLB server. |
|
ca-group |
The ca-group option is available if ca-verify is enabled. Select a trusted CA group to verify the peer certificate. |
|
intermediate-ca-group |
The intermediate-ca-group option is available if ca-verify is enabled. Select a trusted intermediate CA group to verify the peer certificate. |
Example
FortiADC-docs # config global-load-balance setting
FortiADC-docs (setting) # get
password : *
proximity-detect-protocol : icmp
proximity-detect-retry-count : 3
proximity-cache-mask-length : 24
proximity-cache-mask-length6 : 64
proximity-detect-interval : 3
proximity-cache-aging-period : 86400
persistence-mask-length : 24
persistence-mask-length6 : 64
persistence-timeout : 60
set auth-type TCP_MD5SIG
FortiADC-docs (setting) #set password *
FortiADC-docs (setting) # end