Users Guide

Table Of Contents
586 | External Services Interface Dell PowerConnect ArubaOS 5.0 | [User Guide
1. Navigate to the Configuration > Advanced Services > External Services page.
2. Click Add in the Server Groups section.
3. Provide the following details:
a. Enter a Group Name. Enter fortinet.)
b. In the drop-down list, select default as the health check profile.
4. Click Done when you are finished.
5. To apply the configuration (changes), click Apply. (The configuration will not take effect until you click
Apply.)
In the CLI
Use these CLI commands to configure an ESI server group, identify its associated ping health-check method, and
associate a server with this group:
esi group name
ping profile_name
server server_identity
For example:
esi group fortinet
ping default
server forti_1
Redirection Policies and User Role
The following sections describe how to configure the redirection policies and user role using the WebUI and CLI.
In the WebUI
To configure user roles to redirect the required traffic to the server(s), navigate to the Configuration > Access
Control > User Roles view (see 1.).
1. To add a new role, click Add.The WebUI displays the Add Role view.
Role Name. Enter “guest” as the name for the role.
2. To add a policy for the new role, click Add in the Firewall Policies section. The WebUI expands the Firewall
Policies section.
Choose from existing configured policies, create a new policy based on existing policies, or create a new policy.
a. If you elect to create a new policy, click on the radio button for Create New Policy and then click Create.
The WebUI displays the Policies tab.
b. In the Policies tab:
Policy Name. Enter the policy name fortinet and the IPv4 Session policy type.) Click Add to proceed. The
WebUI expands the Policies tab.
In the drop-down lists, choose parameters such as source, destination, service in the same way as other
firewall policy rules. (This example uses any source, any destination, service type svc-http (tcp 80),
For certain choices, the WebUI expands and adds drop-down lists.
c. In the Action drop-down menu, select the redirect to ESI group option.
Select fortinet as the appropriate ESI group.
The three steps above translate to “for any incoming HTTP traffic, going to any destination, redirect the
traffic to servers in the ESI group named fortinet.”)
Select both as the traffic direction. Forward refers to the direction of traffic from the (untrusted) client or
user to the (trusted) server (such as the HTTP server or email server).
To add this rule to the policy, click Add.