Interfaces
To view the interface list, go to System > Network > Interfaces.
The following information is shown:
|
Edit |
Select to edit the selected interface. |
|
Search |
Enter a search term in the search text box then select Search to search the interface list. |
|
Interface |
The names of the physical interfaces on your FortiAuthenticator unit. The name, including number, of a physical interface depends on the model. |
|
IPv4 |
The IPv4 address of the interface. |
|
IPv6 |
The IPv6 address of the interface, if applicable. |
|
Link status |
The link status of the interface. |
To edit an interface:
- In the interfaces list, select the interface you need to edit and select the Edit button, or select the interface name. The Edit Network Interface window opens.
- Edit the following settings as required.
Interface The interface name is displayed. Status
The interface's current link status is displayed.
IP Address / Netmask IPv4 Enter the IPv4 address and netmask associated with this interface. IPv6 Enter the IPv6 address associated with this interface.

FortiAuthenticator only offers limited support for IPv6.
FortiAuthenticator does not support incoming communication over IPv6 for most features.
IPv6 support is available only for the following features:
Admin GUI access over IPv6.
FSSO:
Extract end-user IPv6 addresses from Syslog messages (received over IPv4).
Extract end-user IPv6 addresses from RADIUS accounting messages (received over IPv4).
Extract end-user IPv6 addresses from Windows event logs polling.
Create active end-user sessions for IPv6 addresses and send them to FortiGates.
Access Rights Admin access Select the allowed administrative service protocols from: SSH (TCP/22), SNMP (UDP/161), Web Interface (TCP/443), RESTful API (/api/), and Security Fabric (/api/v1/fabric/).

By default, only SSH (TCP/22), Web Interface (TCP/443), and RESTful API (/api/) are enabled on
port1.Services Enable the services that you want FortiAuthenticator to act as a server for:
HTTPS (TCP/443)
HTTP (TCP/80)
RADIUS Accounting Monitor (UDP/1646)
RADIUS Auth (UDP/1812)
RADIUS Accounting SSO (UDP/1813)
RADSEC (TCP/2083)
TACACS+ Auth (TCP/49)
LDAP (TCP/389)
LDAPS (TCP/636)
FortiGate FSSO (TCP/8000)
OCSP (TCP/2560)
FortiClient FSSO (TCP/8001)
Hierarchical FSSO (TCP/8003)
DC/TS Agent FSSO (TCP/8002)
Syslog (UDP/514)
Syslog over TLS (TCP/6514)
SAML IdP SSO (TCP/8143)
SAML IdP Reverse Proxy: Enable/disable the IdP reverse proxy port on the selected network interface.
When HTTPS is enabled, you can also specify access for the following services:
Legacy Self-service Portal (/login/)
Captive Portals (/guests, /portal)
SAML IdP (/saml-idp)
SAML SP SSO (/saml-sp, /login/saml-auth)
Kerberos SSO (/login/kerb-auth)
SCEP (/app/cert/scep)
CRL Downloads (/app/cert/crl)
CMP (/app/cert/cmp2/)
SCIM (/scim)
FortiToken Mobile API (/api/v1/pushauthresp, /api/v1/transfertoken)
OAuth Service (/api/v1/oauth, /api/v1/pushpoll, /guests, /portal)
When HTTP is enabled, you can also specify access for the following services:
SCEP (/app/cert/scep)
CRL Downloads (/app/cert/crl)
CMP (/app/cert/cmp2/)
SAML IdP metadata (/saml-idp)
Kerberos SSO (/login/kerb-auth)
Note that Syslog (UDP/514) is only available if Syslog SSO has been enabled. See Methods for more information.

A disabled service will not answer queries as it is not active. Enabling the service but leaving it unconfigured will make the service respond to queries, even with incorrect responses. This will use resources and may cause a potential attack.
- Select Save to apply the edits to the network interface.