hi there,
need help,
can interface on FG-60D change into individual interface, not act as switch?
I've 100D, and the interface can be changed to individual port or act as a switch, or both.
if can, how to do that?
thank you
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
hi,
yes, you can split the 'internal' switch into individual ports 'internal1'...'internal7'.
First, you have to remove all references to the 'internal' port. This includes
- policies
- static routes
- DHCP servers
- any port-associated address objects and VIPs
Then, you enter
config sys globalThe FGT will reboot after that.
set internal-switch-mode interface
end
Make sure before you begin that you either connect to the FGT on the console port or any other port which is not 'internal'.
Hello,
Don't forget to remove policies, dhcp server and objects that refer to the switch ports. Then you can switch to interface mode. Also there might be a referal to use ntp on the switchport.
Grtz. Ralph
ede_pfau wrote:hi,
yes, you can split the 'internal' switch into individual ports 'internal1'...'internal7'.
First, you have to remove all references to the 'internal' port. This includes
- policies
- static routes
- DHCP servers
- any port-associated address objects and VIPs
Then, you enter
config sys globalThe FGT will reboot after that.
set internal-switch-mode interface
endMake sure before you begin that you either connect to the FGT on the console port or any other port which is not 'internal'.
Hi all
This what is normaly used on every device as long it can be configured in interface mode is following:
config firewall policy
purge
NOTE with purge everything within the policy container will be deleted meaning every policy will be deleted. Answer with yes!
config firewall dhcp server
purge
NOTE with purge everything within the dhcp server container will be deleted meaning every entry will be deleted. Answer with yes!
# config sys global # set internal-switch-mode interface # end changing switch mode will reboot the system! Do you want to continue? (y/n)y
PLEASE NOTE For the newest release of FortiGate 60D you will recognize that the interface mode is ALREADY in interface mode. If you look deeper into it you will recognized that latest revision of FortiGate 60D (first time recognized in January 2015) has a Hardware Switch like the FG-100D up to Revision/Generation 3. If you have such a device you have to splitt out the interface's over the gui. If you do so you will note that the last two interfaces can not be splitted out. The reason is behind this is configured a virtuelle hardware switch which helds the interfaces together. But also this one can be deleted which means:
# config system virtual-switch # get == [ lan ] name: lan # del lan # get # end
Thats it...have fun
Andrea
hi,
yes, you can split the 'internal' switch into individual ports 'internal1'...'internal7'.
First, you have to remove all references to the 'internal' port. This includes
- policies
- static routes
- DHCP servers
- any port-associated address objects and VIPs
Then, you enter
config sys globalThe FGT will reboot after that.
set internal-switch-mode interface
end
Make sure before you begin that you either connect to the FGT on the console port or any other port which is not 'internal'.
Hello,
Don't forget to remove policies, dhcp server and objects that refer to the switch ports. Then you can switch to interface mode. Also there might be a referal to use ntp on the switchport.
Grtz. Ralph
ede_pfau wrote:hi,
yes, you can split the 'internal' switch into individual ports 'internal1'...'internal7'.
First, you have to remove all references to the 'internal' port. This includes
- policies
- static routes
- DHCP servers
- any port-associated address objects and VIPs
Then, you enter
config sys globalThe FGT will reboot after that.
set internal-switch-mode interface
endMake sure before you begin that you either connect to the FGT on the console port or any other port which is not 'internal'.
hi there.
Just arrive my device. forticare later will be sent.
anyway, I've tried with usb management, but return an error.
Interface internal is in use attribute set operator error, -23, discard the setting Command fail. Return code -23
I access via fortiexplorer. I long not to use the fortigate. may be I make mistake.
need help please.
thanks.
Hi all
This what is normaly used on every device as long it can be configured in interface mode is following:
config firewall policy
purge
NOTE with purge everything within the policy container will be deleted meaning every policy will be deleted. Answer with yes!
config firewall dhcp server
purge
NOTE with purge everything within the dhcp server container will be deleted meaning every entry will be deleted. Answer with yes!
# config sys global # set internal-switch-mode interface # end changing switch mode will reboot the system! Do you want to continue? (y/n)y
PLEASE NOTE For the newest release of FortiGate 60D you will recognize that the interface mode is ALREADY in interface mode. If you look deeper into it you will recognized that latest revision of FortiGate 60D (first time recognized in January 2015) has a Hardware Switch like the FG-100D up to Revision/Generation 3. If you have such a device you have to splitt out the interface's over the gui. If you do so you will note that the last two interfaces can not be splitted out. The reason is behind this is configured a virtuelle hardware switch which helds the interfaces together. But also this one can be deleted which means:
# config system virtual-switch # get == [ lan ] name: lan # del lan # get # end
Thats it...have fun
Andrea
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1679 | |
1085 | |
752 | |
446 | |
226 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.