Fortinet black logo
7.2.0

Configuring the Cisco ACI connector

Configuring the Cisco ACI connector

To configure the Cisco ACI Universal Connector:
  1. Go to Management Extensions > Universal Connector.
  2. Click Create New on the toolbar, and select Cisco ACI.
  3. Enter the connector settings.
  4. Click Save & Continue, and then set the Status toggle to the on position to enable the connector.
  5. You can manually enter the update Interval for FortiManager to communicate with the Cisco APIC. The default is 60 seconds.
  6. FortiManager will authenticate against Cisco APIC using the credentials provided by the administrator on this page. Only once the authentication is successful can the connector can be enabled.
  7. You can enable/disable the certificate verification check for the remote Cisco APIC server.
    The behavior for certificate verification is as follows:
    • If the remote certificate is valid and we enable the certificate verification, login succeeds.
    • If the remote certificate is valid and we disable the certificate verification, login succeeds.
    • If the remote certificate is invalid and we enable the certificate verification, login fails.
    • If the remote certificate is invalid and we disable the certificate verification, login succeeds.
  8. Enable the connector in Policy & Objects. See Enabling Universal Connector MEA in Policy & Objects.

Configuring the Cisco ACI connector

To configure the Cisco ACI Universal Connector:
  1. Go to Management Extensions > Universal Connector.
  2. Click Create New on the toolbar, and select Cisco ACI.
  3. Enter the connector settings.
  4. Click Save & Continue, and then set the Status toggle to the on position to enable the connector.
  5. You can manually enter the update Interval for FortiManager to communicate with the Cisco APIC. The default is 60 seconds.
  6. FortiManager will authenticate against Cisco APIC using the credentials provided by the administrator on this page. Only once the authentication is successful can the connector can be enabled.
  7. You can enable/disable the certificate verification check for the remote Cisco APIC server.
    The behavior for certificate verification is as follows:
    • If the remote certificate is valid and we enable the certificate verification, login succeeds.
    • If the remote certificate is valid and we disable the certificate verification, login succeeds.
    • If the remote certificate is invalid and we enable the certificate verification, login fails.
    • If the remote certificate is invalid and we disable the certificate verification, login succeeds.
  8. Enable the connector in Policy & Objects. See Enabling Universal Connector MEA in Policy & Objects.