config system : config system interface
 
config system interface
Use this command to configure network interfaces.
Before you begin:
You must have read-write permission for system settings.
Syntax
config system interface
edit <name>
set allowaccess {http https ping snmp ssh telnet}
set ip <ip&netmask>
set ip6 <ip&netmask>
set mac-addr <xx:xx:xx:xx:xx:xx>
set mode {static|ppoe}
set disc-retry-timeout <integer>
set dns-server-override {enable|disable}
set idle-timeout <integer>
set lcp-echo-interval <integer>
set lcp-max-echo-fails <integer>
set pppoe-default-gateway {enable|disable}
set username <string>
set password <passwd>
set mtu <integer>
set speed {10full | 10half | 100full | 100half | 1000full | 1000half | auto}
set status {down | up}
set vdom <datasource>
set type {vlan|aggregate}
set vlanid <integer>
set interface <datasource>
set aggregate-algorithm {layer2 | layer2-3 | layer3-4}
set aggregate-mode {802.3ad | balance-alb | balance-rr | balance-tlb | balance-xor| broadcast}
set member <datasource>
set secondary-ip {enable|disable}
config secondary-ip-list
edit <No.>
set allowaccess {http https ping snmp ssh telnet}
set ip <ip&netmask>
next
end
config ha-node-ip-list
edit <No.>
set ip <ip&netmask>
set node <integer>
next
end
next
end
 
allowaccess
Allow inbound service traffic. Select from the following options:
HTTP—Enables connections to the web UI. We recommend this option only for network interfaces connected to a trusted private network, or directly to your management computer.
HTTPS—Enables secure connections to the web UI. We recommend this option instead of HTTP.
Ping—Enables ping and traceroute to be received on this network interface. When it receives an ECHO_REQUEST (“ping”), FortiADC will reply with ICMP type 0 (ECHO_RESPONSE or “pong”).
SNMP—Enables SNMP queries to this network interface.
SSH—Enables SSH connections to the CLI. We recommend this option instead of Telnet.
Telnet—Enables Telnet connections to the CLI. We recommend this option only for network interfaces connected to a trusted private network, or directly to your management computer.
mac-addr
The MAC address is read from the interface. If necessary, you can set the MAC address.
mtu
The default is 1500. We recommend you maintain the default.
speed
Select one of the following speed/duplex settings:
Auto—Speed and duplex are negotiated automatically. Recommended.
10half—10 Mbps, half duplex.
10full—10 Mbps, full duplex.
100half—100 Mbps, half duplex.
100full—100 Mbps, full duplex.
1000half—1000 Mbps, half duplex.
1000full—1000 Mbps, full duplex.
status
This Status column is not the detected physical link status; it is the administrative status (Up/Down) that indicates whether you permit the network interface to receive and/or transmit packets.
vdom
If applicable, select the virtual domain to which the configuration applies.
mode
Static—Specify a static IP address. The IP address must be on the same subnet as the network to which the interface connects. Two network interfaces cannot have IP addresses on the same subnet (i.e. overlapping subnets).
PPPoE—Use PPPoE to retrieve a configuration for the IP address, gateway, and DNS server. For example, if this interface uses a DSL connection to the Internet, your ISP may require this option.
type
If you are editing the configuration for a physical interface, you cannot set the type.
If you are configuring a logical interface, you can select from the following options:
Aggregate—A logical interface you create to support the aggregation of multiple physical interfaces.
VLAN—A logical interface you create to VLAN subinterfaces on a single physical interface.
set mode static
ip
Specify the IP address and CIDR-formatted subnet mask, separated by a forward slash ( / ), such as 192.0.2.5/24. Dotted quad formatted subnet masks are not accepted.
ip6
Specify the IP address and CIDR-formatted subnet mask, separated by a forward slash ( / ), such as 2001:0db8:85a3:::8a2e:0370:7334/64. Dotted quad formatted subnet masks are not accepted.
set mode pppoe
disc-retry-timeout
Seconds the system waits before it retries to discover the PPPoE server.
dns-server-override
Use the DNS addresses retrieved from the PPPoE server instead of the one configured in the FortiADC system settings.
idle-timeout
Disconnect after idle timeout in seconds. The default is 0. The valid range is 0 to 32,000.
lcp-echo-interval
LCP echo interval in seconds. The default is 5. The valid range is 1 to 255.
lcp-max-echo-fails
Maximum missed LCP echo messages before disconnect. The default is 3. The valid range is 1 to 255.
pppoe-default-gateway
Use the default gateway retrieved from the PPPoE server instead of the one configured in the FortiADC system settings.
username
PPPoE account user name.
password
PPPoE account password.
set type vlan
vlanid
VLAN ID of packets that belong to this VLAN.
If one physical network port (that is, a VLAN trunk) will handle multiple VLANs, create multiple VLAN subinterfaces on that port, one for each VLAN ID that will be received.
If multiple different physical network ports will handle the same VLANs, on each of the ports, create VLAN subinterfaces that have the same VLAN IDs.
The valid range is between 1 and 4094. The value you specify must match the VLAN ID added by the IEEE 802.1q-compliant router or switch connected to the VLAN subinterface.
interface
Physical interface associated with the VLAN; for example, port2.
set type aggregate
aggregate-algorithm
Connectivity layers that will be considered when distributing frames among the aggregated physical ports:
Layer 2
Layer 2-3
Layer 3-4
aggregate-mode
Link aggregation type:
802.3ad
Balance-alb
Balance-rr
Balance-tlb
Balance-xor
Broadcast
member
Select the physical interfaces that are included in the aggregation.
config secondary-ip-list
allowaccess
Allow inbound service traffic. Select from the following options:
HTTP—Enables connections to the web UI. We recommend this option only for network interfaces connected to a trusted private network, or directly to your management computer.
HTTPS—Enables secure connections to the web UI. We recommend this option instead of HTTP.
Ping—Enables ping and traceroute to be received on this network interface. When it receives an ECHO_REQUEST (“ping”), FortiADC will reply with ICMP type 0 (ECHO_RESPONSE or “pong”).
SNMP—Enables SNMP queries to this network interface.
SSH—Enables SSH connections to the CLI. We recommend this option instead of Telnet.
Telnet—Enables Telnet connections to the CLI. We recommend this option only for network interfaces connected to a trusted private network, or directly to your management computer.
ip
Secondary IP addresses can be used when you deploy the system so that it belongs to multiple logical subnets. If you assign multiple IP addresses to an interface, you must assign them static addresses.
To add secondary IP addresses, enable the feature and save the configuration. After you have saved it the first time, you can edit it to add secondary IP addresses and enable inbound traffic to that address.
config ha-node-ip-list
ip
You use the HA node IP list configuration in an HA active-active deployment. For each HA cluster node, configure an HA node IP list that includes an entry for each cluster node. When the appliance is in standalone mode, it uses the physical port IP address; when it is in HA mode, it uses the HA node IP address.
For each address, specify an IP address using the CIDR-formatted subnet mask, separated by a forward slash ( / ), such as 192.0.2.5/24.
node
ID of the corresponding node.
Example
The following example configures port1 (the management interface):
FortiADC-VM # get system interface port1
type : physical
mode : static
vdom : root
redundant-master :
ip : 192.168.1.99/24
ip6 : ::/0
allowaccess : https ping ssh snmp http telnet
mtu : 1500
speed : auto
status : up
mac-addr : 00:0c:29:e8:a0:86
secondary-ip : enable
 
FortiADC-VM # config system interface
FortiADC-VM (interface) # edit port1
FortiADC-VM (port1) # set ip 192.0.2.5/24
FortiADC-VM (port1) # end
 
FortiADC-VM # get system interface port1
type : physical
mode : static
vdom : root
redundant-master :
ip : 192.0.2.5/24
ip6 : ::/0
allowaccess : https ping ssh snmp http telnet
mtu : 1500
speed : auto
status : up
mac-addr : 00:0c:29:e8:a0:86
secondary-ip : enable
 
The following example configures vlan interfaces on port7:
FortiADC-VM # config system interface
FortiADC-VM (interface) # edit vlan102
Add new entry 'vlan102' for node 1
FortiADC-VM (vlan102) # set type vlan
FortiADC-VM (vlan102) # set vlanid 102
FortiADC-VM (vlan102) # set ip 10.10.100.102/32
FortiADC-VM (vlan102) # set interface port7
FortiADC-VM (vlan102) # next
 
FortiADC-VM (interface) # edit vlan103
Add new entry 'vland103' for node 1
FortiADC-VM (vland103) # set type vlan
FortiADC-VM (vland103) # set vlanid 103
FortiADC-VM (vland103) # set ip 10.10.103.102/32
FortiADC-VM (vland103) # set interface port7
FortiADC-VM (vland103) # end
 
FortiADC-VM # get system interface
 
== [ vlan102 ]
type: vlan
vdom: root
redundant-master: 0
ip: 10.10.100.102/32
ip6: ::/0
allowaccess:
status: up
interface: port7
== [ vlan103 ]
type: vlan
vdom: root
redundant-master: 0
ip: 10.10.103.102/32
ip6: ::/0
allowaccess:
status: up
interface: port7