Interfaces
To view the interface list, go to System > Network > Interfaces.
The following information is shown:
Edit |
Select to edit the selected interface. |
Search |
Enter a search term in the search text box then select Search to search the interface list. |
Interface |
The names of the physical interfaces on your FortiAuthenticator unit. The name, including number, of a physical interface depends on the model. |
IPv4 |
The IPv4 address of the interface. |
IPv6 |
The IPv6 address of the interface, if applicable. |
Link status |
The link status of the interface. |
To edit an interface:
- In the interfaces list, select the interface you need to edit and select the Edit button, or select the interface name. The Edit Network Interface window opens.
- Edit the following settings as required.
Interface The interface name is displayed. Status
The interface's current link status is displayed.
IP Address / Netmask IPv4 Enter the IPv4 address and netmask associated with this interface. IPv6 Enter the IPv6 address associated with this interface. Access Rights Admin access Select the allowed administrative service protocols from: Telnet, SSH, HTTP, and SNMP.
For HTTPS, you can also specify GUI (TCP/443), REST API (/api), and/or Fabric (/api/vi/fabric) access.
Services Enable the services that you want FortiAuthenticator to act as a server for:
HTTPS, HTTP, RADIUS Accounting Monitor, RADIUS Auth, RADUS Accounting SSO, RADSEC, TACACS+ Auth, LDAP, LDAPS, FortiGate FSSO, OCSP, FortiClient FSSO, Hierarchical FSSO, DC/TS Agent FSSO, Syslog, Syslog over TLS (TCP/6514), and/or SAML IdP SSO.
When HTTPS is enabled, you can also specify Legacy Self-service Portal (/login), Captive Portals (/guests, /portals), SAML IdP (/saml-idp), SAML SP SSO (/saml-sp, /login/saml-auth), Kerberos SSO (/login/kerb-auth), SCEP (/cert/scep), CRL Downloads (/cert/crl), FortiToken Mobile API (/api/v1/pushauthresp, /api/v1/transfertoken), and/or OAuth Service API (/api/v1/oauth) access.
When HTTP is enabled, you can also specify SCEP (/app/cert/scep/), CRL Downloads (/app/cert/crl/), SAML IdP (/saml-idp/), and/or Kerberos SSO (/login/kerb-auth) access.
Note that Syslog is only available if Syslog SSO has been enabled. See General settings for more information.
A disabled service will not answer queries as it is not active. Enabling the service but leaving it unconfigured will make the service respond to queries, even with incorrect responses. This will use resources and may cause a potential attack.
- Select Save to apply the edits to the network interface.