Created on
11-30-2022
08:33 PM
Edited on
08-08-2025
05:44 AM
By
Jean-Philippe_P
This article describes how to check interface information (for example, link status) via CLI.
There are times when it is required to check the interface link status via the command line interface (CLI) only.
FortiGate interface management.
Use the command indicated in the related document to list the FortiGate's physical network interface's information, such as IP address, physical link status, speed, and duplex mode:
The original command, get system interface shows more details on the interface's information. Furthermore, the output shows all logical interfaces such as SSL VPN, VPN, VLAN, and software switch interfaces.
FGT #get system interface
Example output:
== [ wan1 ]
name: wan1 mode: dhcp ip: 192.168.1.3 255.255.255.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable
== [ wan2 ]
name: wan2 mode: dhcp ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable
== [ modem ]
name: modem mode: pppoe ip: 0.0.0.0 0.0.0.0 netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable
== [ ssl.root ]
name: ssl.root ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: tunnel netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable
== [ lan ]
name: lan mode: static ip: 192.200.202.1 255.255.255.0 status: up netbios-forward: disable type: hard-switch netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable
== [ p1-VPN ]
name: p1-VPN ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: tunnel netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable
== [ VLAN]
name: VLAN mode: static ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: vlan netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable switch-controller-feature: none mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable
The command below provides the physical interface link state information:
FGT # diagnose hardware device nic <interface name>
Example output:
diagnose hard deviceinfo nic wan1
========== Link Status ==========
Admin :up
netdev status :up
autonego_setting:1
link_setting :1
speed_setting :10
duplex_setting :0
Speed :1000
Duplex :Full
link_status :Up
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.