FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
tana
Staff
Staff
Article Id 231854
Description

 

This article describes how to check interface information (e.g link status) via CLI

 

There are times when it is required to check interface link status via the command line interface (CLI) only.

 

Scope

 

FortiGate interface management.

 

Solution

 

Use the command indicated in the related document to list the FortiGate's physical network interface's information such as IP address, physical link status, speed, and duplex mode:

https://docs.fortinet.com/document/fortigate/6.0.0/cli-reference/790821/system-interface-physical


The original command # get system interface shows more details on interface's information. Furthermore, the output shows all logical interfaces such as SSL VPN, VPN, VLAN, and software switch interfaces.


FGT #get system interfac

 

Example output:

== [ wan1 ]
name: wan1 mode: dhcp ip: 192.168.1.3 255.255.255.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable
== [ wan2 ]
name: wan2 mode: dhcp ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable
== [ modem ]
name: modem mode: pppoe ip: 0.0.0.0 0.0.0.0 netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable

== [ ssl.root ]
name: ssl.root ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: tunnel netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable
== [ lan ]
name: lan mode: static ip: 192.200.202.1 255.255.255.0 status: up netbios-forward: disable type: hard-switch netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable
== [ p1-VPN ]
name: p1-VPN ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: tunnel netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable

== [ VLAN]
name: VLAN mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: vlan netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable switch-controller-feature: none mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable

Contributors