EasyManuals Logo

Fortinet Fortigate-5000 series User Manual

Fortinet Fortigate-5000 series
458 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #74 background imageLoading...
Page #74 background image
FortiGate Version 3.0 MR4 Administration Guide
74 01-30004-0203-20070102
Interface System Network
Configuring an ADSL interface
The information that you need to provide for the ADSL interface depends on the
addressing mode your ISP requires you to use. Static addressing using IPOA or
EOA requires only an IP address and netmask. If you are using dynamic
addressing, you need to configure it as described in “Configuring DHCP on an
interface” on page 78 or “Configuring an interface for PPPoE or PPPoA” on
page 80.
To configure an ADSL interface, your FortiGate unit cannot be in Transparent
mode.
Go to System > Network > Interface. Select Create New or select the Edit icon
of an existing interface. In the Addressing mode section, select IPoA or EoA.
PING Interface responds to pings. Use this setting to verify your installation
and for testing.
HTTP Allow HTTP connections to the web-based manager through this
interface. HTTP connections are not secure and can be intercepted by a
third party.
SSH Allow SSH connections to the CLI through this interface.
SNMP Allow a remote SNMP manager to request SNMP information by
connecting to this interface. See “Configuring SNMP” on page 127.
TELNET Allow Telnet connections to the CLI through this interface. Telnet
connections are not secure and can be intercepted by a third party.
MTU To change the MTU, select Override default MTU value (1 500) and
enter the MTU size based on the addressing mode of the interface
68 to 1 500 bytes for static mode
576 to 1 500 bytes for DHCP mode
576 to 1 492 bytes for PPPoE mode
up to 16 110 bytes for jumbo frames (FortiGate models numbered
3000 and higher)
This field is available only on physical interfaces. VLANs inherit the
parent interface MTU size by default.
For more information on MTU and jumbo frames, see “Interface MTU
packet size” on page 84.
Log Select Log to record logs for any traffic to or from the interface. To record
logs you must also enable traffic log for a logging location and set the
logging severity level to Notification or lower. Go to Log&Report > Log
Config to configure logging locations and types. For information about
logging see “Log&Report” on page 407.
Secondary IP
Address
Select the blue arrow to expand or hide this section and add additional
IP addresses to this interface. See “Secondary IP Addresses” on
page 85.
Description Optionally, enter a description up to 63 characters long.
Note: In Transparent mode, if you change the MTU of an interface, you must change the
MTU of all interfaces to match the new MTU.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Fortinet Fortigate-5000 series and is the answer not in the manual?

Fortinet Fortigate-5000 series Specifications

General IconGeneral
BrandFortinet
ModelFortigate-5000 series
CategoryFirewall
LanguageEnglish

Related product manuals