config

FortiSwitch-5003A CLI reference

switch fabric-channel interface

Use this command to configure the VLANs allowed on FortiSwitch-5003A fabric channel interfaces. You can also change the native VLAN for each interface and disable or enable MSTP for each interface.

Syntax

config switch fabric-channel interface edit <interface_name>

set native-vlan <id_number> set allowed-vlans <id_numbers> set stp-state {disable enable}

end

Variables

Description

Default

 

 

 

edit <interface_name>

Enter the name of the FortiSwitch-5003A fabric channel

 

 

interface or trunk to configure. The interfaces added to a trunk

 

 

do not appear in this list. You cannot edit an interface that has

 

 

been added to a trunk.

 

 

For the fabric channel <interface_name> can be:

 

 

slot-2/1used to connect the fabric channels of two

 

 

FortiSwitch-5003A boards installed in the same chassis.

 

 

slot-3FortiGate chassis slot 3.

 

 

slot-4FortiGate chassis slot 4.

 

 

slot-5FortiGate chassis slot 5.

 

 

slot-6FortiGate-5140 chassis slot 6.

 

 

slot-7FortiGate-5140 chassis slot 7.

 

 

slot-8FortiGate-5140 chassis slot 8.

 

 

slot-9FortiGate-5140 chassis slot 9.

 

 

slot-10FortiGate-5140 chassis slot 10.

 

 

slot-11FortiGate-5140 chassis slot 11.

 

 

slot-12FortiGate-5140 chassis slot 12.

 

 

slot-13FortiGate-5140 chassis slot 13.

 

 

slot-14/f8FortiGate-5140 chassis slot 14 or

 

 

FortiSwitch-5003A front panel slot 14/F8.

 

 

f7 FortiSwitch-5003A front panel slot F7.

 

 

f6 FortiSwitch-5003A front panel slot F6.

 

 

f5 FortiSwitch-5003A front panel slot F5.

 

 

f4 FortiSwitch-5003A front panel slot F4.

 

 

f3 FortiSwitch-5003A front panel slot F3.

 

 

f2 FortiSwitch-5003A front panel slot F2.

 

 

f1 FortiSwitch-5003A front panel slot F1.

 

native-vlan <id_number>

Change the IEEE 802.1Q native VLAN ID for this interface.

1

 

Packets tagged with the native VLAN ID are not modified when

 

 

sent or received by the interface. If an untagged packet is

 

 

received by the interface, the packet is tagged with the native

 

 

VLAN ID.

 

 

 

 

allowed-vlans

Specify the IEEE 802.1Q VLAN IDs that can be added to

 

<id_numbers>

VLAN-tagged packets that this interface can receive and

 

transmit. Packets tagged with other VLAN IDs are dropped by

 

 

the interface. Untagged packets are not affected.

 

 

You can enter any combination of single VLAN IDs and ranges

 

 

of VLAN IDs. Use a hyphen to specify ranges. Separate each

 

 

single ID or range with a comma. Do not include spaces. For

 

 

example: 1,3-4,6,7,9-100.

 

stp-state {disable

Enable or disable Multi-Spanning Tree Protocol (MSTP) for this

enable

enable}

interface. If MSTP is disabled you cannot use this interface in

 

 

MSTP configurations.

 

 

FortiSwitch-5003A and 5003 Fabric and Base Backplane Communications Guide

94

01-30000-85717-20081205

Page 94
Image 94
Fortinet 5003A manual Switch fabric-channel interface, Edit interfacename

5003, 5003A specifications

Fortinet's FortiGate 5003 and 5003A are high-capacity, next-generation firewalls designed for enterprises that require advanced security solutions with a strong focus on performance and scalability. These models are part of Fortinet's expansive line of FortiGate appliances, which leverage innovative technologies to provide robust protection against a variety of cyber threats while maintaining seamless network operations.

One of the standout features of the FortiGate 5003 and 5003A is their impressive throughput capabilities. With multiple high-speed network interfaces, these firewalls can handle substantial amounts of traffic, ensuring that data flows smoothly without creating bottlenecks. This makes them ideal for organizations that operate large-scale networks or have significant bandwidth demands.

The FortiGate 5003 series is equipped with Fortinet's proprietary FortiOS, an intuitive operating system that integrates firewall, VPN, antivirus, intrusion prevention, web filtering, and application control functionalities. This comprehensive approach to security allows organizations to protect their networks from an array of cyber threats while simplifying management and reducing operational costs.

Another key characteristic of these models is their use of Fortinet's purpose-built security processing units (SPUs). These hardware-accelerated security chips enable accelerated threat detection and prevention, allowing the 5003 and 5003A to deliver high performance even when advanced security features are enabled. The SPUs play a crucial role in ensuring that organizations can enforce security policies without compromising on speed or efficiency.

Furthermore, the FortiGate 5003 and 5003A support advanced networking features, including Virtual Routing and Forwarding (VRF), which allows for better traffic management and segmentation. This capability is essential in multi-tenant environments, enabling organizations to create isolated networks while maintaining centralized security management.

In addition to their performance and feature set, both models support centralized management through Fortinet's FortiManager platform, providing a unified view of network security across multiple devices. This simplifies configuration, updates, and policy compliance, significantly reducing administrative overhead.

Finally, the FortiGate 5003 and 5003A are designed with redundancy and high availability in mind. They include failover capabilities and support for clustering, ensuring that network operations remain uninterrupted even in the event of hardware failure. This level of reliability is vital for mission-critical applications where downtime can lead to significant operational disruption.

In summary, Fortinet's FortiGate 5003 and 5003A are powerful solutions that combine high performance, advanced security technologies, and robust management features to meet the needs of large enterprises. With their focus on scalability and reliability, these firewalls are poised to protect organizations against evolving cyber threats while ensuring optimal network performance.