Description |
This article explains how to manage untagged traffic on a FortiGate interface. By default, untagged traffic arriving on a FortiGate interface is processed by the physical interface itself. This means that the physical interface handles the untagged traffic directly. |
Scope | FortiGate. |
Solution |
To manage untagged traffic, configure the physical interface where the untagged traffic is expected. No additional VLAN configuration is required.
If the native VLAN uses the 192.168.x.x/24 network, the interface can be configured as follows:
Command line:
config system interface
In this example, the physical interface 'port1' is configured to handle untagged traffic with the IP address 192.168.1.1. If the native VLAN does not have an IP address, configure the interface with 0.0.0.0/0 to allow all traffic.
Command line:
config system interface
Untagged traffic on 'port1' is treated as part of the regular interface network. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.