Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

CLI Reference

interface

Use this command to edit the configuration of a FortiAnalyzer network interface.

Syntax

config system interface

edit <port_string>

set status {enable | disable}

set ip <ipv4address_mask>

set allowaccess {fgfm http https https-logging ping snmp soc-fabric ssh webservice}

set speed {1000full | 100full | 100half | 10full | 10half | auto}

set description <string>

set alias <string>

set mtu <integer>

set type {aggregate | physical}

config member

edit <interface-name>

end

set lacp-mode

set lacp-speed {fast | slow}

set min-links <integer>

set min-links-down {administrative | operational}

set link-up-delay <integer>

set aggregate

set camera-discovery {enable | disable}

config ipv6

set ip6-address <IPv6address prefix>

set ip6-allowaccess {fgfm http https https-logging ping snmp ssh webservice}

set ip6-autoconf {enable | disable}

end

end

Variable

Description

<port>

The port can be set to a port number such as port1, port2, port3, or port4. Different FortiAnalyzer models have different numbers of ports.

status {enable | disable}

Enable/disable the interface (default = enable). If the interface is disabled it does not accept or send packets. If you disable a physical interface, VLAN interfaces associated with it are also disabled.

ip <ipv4_mask>

Enter the interface IPv4 address and netmask. The IPv4 address cannot be on the same subnet as any other interface.

allowaccess {fgfm http https https-logging ping snmp soc-fabric ssh webservice}

Enter the types of management access permitted on this interface. Separate multiple selected types with spaces.

If you want to add or remove an option from the list, retype the list as required.

speed {1000full 100full 100half 10full 10half auto}

Enter the speed and duplexing the network port uses:

  • 100full: 100M full-duplex
  • 100half: 100M half-duplex
  • 10full: 10M full-duplex
  • 10half: 10M half-duplex
  • auto: Automatically negotiate the fastest common speed (default)

description <string>

Enter a description of the interface (character limit = 63).

alias <string>

Enter an alias for the interface.

mtu <integer>

Set the maximum transportation unit (68 - 9000, default = 1500).

type {aggregate | physical}

Set the type of interface (default = aggregate).

member

Physical interfaces that belong to the aggregate or the redundant interface.

lacp-mode

Set the mode for LACP messages (default = active).

lacp-speed {fast | slow}

Set how often the interface sends LACP messages:

  • fast: Send LACP message every second.

  • slow: Send LACP message every 30 seconds (default).

min-links <integer>

Set the minimum number of aggregated ports that must be up (default = 1).

min-links-down {administrative | operational}

Action to take when less than the configured minimum number of links are active:

  • administrative: Set the aggregate administratively down.

  • operational: Set the aggregate operationally down (default).

link-up-delay <integer>

Set the number of milliseconds to wait before considering a link is up (default = 50).

aggregate

 

camera-discovery {enable | disable}

Enable/disable camera discovery (default = enable).

This option is only available on hardware devices that support FortiRecorder.

ipv6

IPv6 of the interface.

Variables for member subcommand:

<interface-name>

Enter the interface name.

Variables for ipv6 subcommand:

ip6-address <ipv6 prefix>

IPv6 address/prefix of interface.

ip6-allowaccess {fgfm http https https-logging ping snmp ssh webservice}

Allow management access to the interface.

ip6-autoconf {enable | disable}

Enable/disable address automatic configuration (SLAAC) (default = enable).

Example

This example shows how to set the FortiAnalyzer port1 interface IPv4 address and network mask to 192.168.100.159 255.255.255.0, and the management access to ping, https, and ssh.

config system interface

edit port1

set allowaccess ping https ssh

set ip 192.168.110.26 255.255.255.0

set status up

end

interface

Use this command to edit the configuration of a FortiAnalyzer network interface.

Syntax

config system interface

edit <port_string>

set status {enable | disable}

set ip <ipv4address_mask>

set allowaccess {fgfm http https https-logging ping snmp soc-fabric ssh webservice}

set speed {1000full | 100full | 100half | 10full | 10half | auto}

set description <string>

set alias <string>

set mtu <integer>

set type {aggregate | physical}

config member

edit <interface-name>

end

set lacp-mode

set lacp-speed {fast | slow}

set min-links <integer>

set min-links-down {administrative | operational}

set link-up-delay <integer>

set aggregate

set camera-discovery {enable | disable}

config ipv6

set ip6-address <IPv6address prefix>

set ip6-allowaccess {fgfm http https https-logging ping snmp ssh webservice}

set ip6-autoconf {enable | disable}

end

end

Variable

Description

<port>

The port can be set to a port number such as port1, port2, port3, or port4. Different FortiAnalyzer models have different numbers of ports.

status {enable | disable}

Enable/disable the interface (default = enable). If the interface is disabled it does not accept or send packets. If you disable a physical interface, VLAN interfaces associated with it are also disabled.

ip <ipv4_mask>

Enter the interface IPv4 address and netmask. The IPv4 address cannot be on the same subnet as any other interface.

allowaccess {fgfm http https https-logging ping snmp soc-fabric ssh webservice}

Enter the types of management access permitted on this interface. Separate multiple selected types with spaces.

If you want to add or remove an option from the list, retype the list as required.

speed {1000full 100full 100half 10full 10half auto}

Enter the speed and duplexing the network port uses:

  • 100full: 100M full-duplex
  • 100half: 100M half-duplex
  • 10full: 10M full-duplex
  • 10half: 10M half-duplex
  • auto: Automatically negotiate the fastest common speed (default)

description <string>

Enter a description of the interface (character limit = 63).

alias <string>

Enter an alias for the interface.

mtu <integer>

Set the maximum transportation unit (68 - 9000, default = 1500).

type {aggregate | physical}

Set the type of interface (default = aggregate).

member

Physical interfaces that belong to the aggregate or the redundant interface.

lacp-mode

Set the mode for LACP messages (default = active).

lacp-speed {fast | slow}

Set how often the interface sends LACP messages:

  • fast: Send LACP message every second.

  • slow: Send LACP message every 30 seconds (default).

min-links <integer>

Set the minimum number of aggregated ports that must be up (default = 1).

min-links-down {administrative | operational}

Action to take when less than the configured minimum number of links are active:

  • administrative: Set the aggregate administratively down.

  • operational: Set the aggregate operationally down (default).

link-up-delay <integer>

Set the number of milliseconds to wait before considering a link is up (default = 50).

aggregate

 

camera-discovery {enable | disable}

Enable/disable camera discovery (default = enable).

This option is only available on hardware devices that support FortiRecorder.

ipv6

IPv6 of the interface.

Variables for member subcommand:

<interface-name>

Enter the interface name.

Variables for ipv6 subcommand:

ip6-address <ipv6 prefix>

IPv6 address/prefix of interface.

ip6-allowaccess {fgfm http https https-logging ping snmp ssh webservice}

Allow management access to the interface.

ip6-autoconf {enable | disable}

Enable/disable address automatic configuration (SLAAC) (default = enable).

Example

This example shows how to set the FortiAnalyzer port1 interface IPv4 address and network mask to 192.168.100.159 255.255.255.0, and the management access to ping, https, and ssh.

config system interface

edit port1

set allowaccess ping https ssh

set ip 192.168.110.26 255.255.255.0

set status up

end