Fortinet white logo
Fortinet white logo

Administration Guide

Interfaces

Interfaces

To view the interface list, go to System > Network > Interfaces.

The following information is shown:

Edit

Select to edit the selected interface.

Search

Enter a search term in the search text box then select Search to search the interface list.

Interface

The names of the physical interfaces on your FortiAuthenticator unit. The name, including number, of a physical interface depends on the model.

IPv4

The IPv4 address of the interface.

IPv6

The IPv6 address of the interface, if applicable.

Link status

The link status of the interface.

To edit an interface:
  1. In the interfaces list, select the interface you need to edit and select the Edit button, or select the interface name. The Edit Network Interface window opens.
  2. Edit the following settings as required.
    InterfaceThe interface name is displayed.

    Status

    The interface's current link status is displayed.

    IP Address / Netmask
    IPv4Enter the IPv4 address and netmask associated with this interface.
    IPv6Enter the IPv6 address associated with this interface.
    Access Rights
    Admin access

    Select the allowed administrative service protocols from: Telnet, SSH, HTTP, and SNMP.

    For HTTPS, you can also specify GUI (TCP/443), REST API (/api), and/or Fabric (/api/vi/fabric) access.

    Services

    Enable the services that you want FortiAuthenticator to act as a server for:

    HTTPS, HTTP, RADIUS Accounting Monitor, RADIUS Auth, RADUS Accounting SSO, RADSEC, TACACS+ Auth, LDAP, LDAPS, FortiGate FSSO, OCSP, FortiClient FSSO, Hierarchical FSSO, DC/TS Agent FSSO, Syslog, Syslog over TLS (TCP/6514), and/or SAML IdP SSO.

    When HTTPS is enabled, you can also specify Legacy Self-service Portal (/login), Captive Portals (/guests, /portals), SAML IdP (/saml-idp), SAML SP SSO (/saml-sp, /login/saml-auth), Kerberos SSO (/login/kerb-auth), SCEP (/cert/scep), CRL Downloads (/cert/crl), FortiToken Mobile API (/api/v1/pushauthresp, /api/v1/transfertoken), and/or OAuth Service API (/api/v1/oauth) access.

    When HTTP is enabled, you can also specify SCEP (/app/cert/scep/), CRL Downloads (/app/cert/crl/), SAML IdP (/saml-idp/), and/or Kerberos SSO (/login/kerb-auth) access.

    Note that Syslog is only available if Syslog SSO has been enabled. See General settings for more information.

    A disabled service will not answer queries as it is not active. Enabling the service but leaving it unconfigured will make the service respond to queries, even with incorrect responses. This will use resources and may cause a potential attack.

  3. Select Save to apply the edits to the network interface.

Interfaces

Interfaces

To view the interface list, go to System > Network > Interfaces.

The following information is shown:

Edit

Select to edit the selected interface.

Search

Enter a search term in the search text box then select Search to search the interface list.

Interface

The names of the physical interfaces on your FortiAuthenticator unit. The name, including number, of a physical interface depends on the model.

IPv4

The IPv4 address of the interface.

IPv6

The IPv6 address of the interface, if applicable.

Link status

The link status of the interface.

To edit an interface:
  1. In the interfaces list, select the interface you need to edit and select the Edit button, or select the interface name. The Edit Network Interface window opens.
  2. Edit the following settings as required.
    InterfaceThe interface name is displayed.

    Status

    The interface's current link status is displayed.

    IP Address / Netmask
    IPv4Enter the IPv4 address and netmask associated with this interface.
    IPv6Enter the IPv6 address associated with this interface.
    Access Rights
    Admin access

    Select the allowed administrative service protocols from: Telnet, SSH, HTTP, and SNMP.

    For HTTPS, you can also specify GUI (TCP/443), REST API (/api), and/or Fabric (/api/vi/fabric) access.

    Services

    Enable the services that you want FortiAuthenticator to act as a server for:

    HTTPS, HTTP, RADIUS Accounting Monitor, RADIUS Auth, RADUS Accounting SSO, RADSEC, TACACS+ Auth, LDAP, LDAPS, FortiGate FSSO, OCSP, FortiClient FSSO, Hierarchical FSSO, DC/TS Agent FSSO, Syslog, Syslog over TLS (TCP/6514), and/or SAML IdP SSO.

    When HTTPS is enabled, you can also specify Legacy Self-service Portal (/login), Captive Portals (/guests, /portals), SAML IdP (/saml-idp), SAML SP SSO (/saml-sp, /login/saml-auth), Kerberos SSO (/login/kerb-auth), SCEP (/cert/scep), CRL Downloads (/cert/crl), FortiToken Mobile API (/api/v1/pushauthresp, /api/v1/transfertoken), and/or OAuth Service API (/api/v1/oauth) access.

    When HTTP is enabled, you can also specify SCEP (/app/cert/scep/), CRL Downloads (/app/cert/crl/), SAML IdP (/saml-idp/), and/or Kerberos SSO (/login/kerb-auth) access.

    Note that Syslog is only available if Syslog SSO has been enabled. See General settings for more information.

    A disabled service will not answer queries as it is not active. Enabling the service but leaving it unconfigured will make the service respond to queries, even with incorrect responses. This will use resources and may cause a potential attack.

  3. Select Save to apply the edits to the network interface.