Created on
10-14-2020
04:56 AM
Edited on
01-21-2026
11:54 PM
By
Jean-Philippe_P
Description
This article describes how to configure a management IP on the FortiGate when operating in Transparent mode.
Scope
FortiGate, Transparent Mode.
Solution
A FortiGate in transparent mode can be assigned a single IP address for remote access management, and multiple static routes can be configured. This can be used if in-band management needs to be applied.
When out-of-band management is desired (dedicated interface for remote management access), it is recommended to use a separate VDOM in NAT mode.
In-band management details and an example:
The management IP address is bound to all ports or VLANs belonging to the same VDOM (manageip parameter creates a virtual interface '<vdom_name>.b' for this purpose).
Remote access services are subject to the same rules as in NAT mode and have to be enabled/disabled on each port.
Example of management IP configuration in transparent mode.
config system settings
set manageip 10.1.1.100/255.255.255.0
set gateway 10.1.1.254
end
Note that the gateway setting is optional:
Additionally:
config system interface
edit <interface>
set allowaccess ping ssh https snmp
next
end
It is also possible to add a second IP address for management and additional default routes:
config system settings
set opmode transparent
set manageip 192.168.182.136/255.255.254.0 10.1.1.1/255.255.255.0
end
config router static
edit 1
set gateway 192.168.183.254
next
edit 2
set gateway 10.1.1.254
next
end
Note: ping-server (dead gateway detection) is not supported in transparent mode.
Out-of-band management details and example:
When VDOM is enabled, and the VDOMs are operating in transparent mode, it is recommended to avoid L2 loops and allow more routing flexibility, to keep one VDOM (generally the root VDOM) in NAT mode, with one or more VLAN or physical interface as out-of-band management.
The management VDOM has to have IP connectivity to the Internet to allow communication with the FDS and retrieve service information (antivirus, IPS, FortiGuard, FortiCare, etc).
All Syslog and FortiManager communication also goes through the management VDOM.
Note:
The MAC address of the gateway can be validated by running the commands below:
FortiGate # show system settings
config system settings
set opmode transparent
set manageip 192.168.2.2/255.255.255.0
set gateway 192.168.2.1
end
FortiGate # get system arp
Address Age(min) Hardware Addr Interface
192.168.2.1 0 e0:23:ff:fc:bc:07 root.b
FortiGate # diagnose ip arp list
index=23 ifname=root.b 192.168.2.1 e0:23:ff:fc:bc:07 state=00000002 use=307 confirm=307 update=602 ref=14
The Layer2 forwarding table can be viewed by running this command:
FortiGate # diagnose netlink brctl name host root.b
2 5 wan1 e0:23:ff:fc:bc:07 0 Hit(0)
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.