{"id":135,"date":"2020-12-03T12:55:47","date_gmt":"2020-12-03T11:55:47","guid":{"rendered":"https:\/\/whatifsecu.tech\/?p=135"},"modified":"2020-12-03T12:55:47","modified_gmt":"2020-12-03T11:55:47","slug":"fortigate-finding-mtu-of-an-interface","status":"publish","type":"post","link":"https:\/\/whatifsecu.tech\/?p=135","title":{"rendered":"Fortigate \u2013 Finding MTU of an interface"},"content":{"rendered":"\n<p>Recently I had the need to show the MTU of an Fortinet Fortigate firewall interface. By default, if there are no changes the MTU will be 1500. But in this case I needed to be able to show that the MTU was 1500.<\/p>\n\n\n\n<p>Few commands I tried did not show the exact info I needed, for example-&nbsp;<strong>Get hardware nic port1<\/strong>&nbsp;\u2013 showed lots of great info but not the MTU.<\/p>\n\n\n\n<p>To get this info I needed to do an Ifconfig from the Fortigate. to do this I ran the command:<\/p>\n\n\n\n<p><strong>fnsysctl ifconfig -a port1<\/strong>&nbsp;&nbsp;&nbsp;&nbsp; Port1 being the port I needed to get the info for. Check out the screenshot below. Lots of other great info such as dropped packets and MAC.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/i2.wp.com\/travelingpacket.com\/wp-content\/uploads\/2017\/08\/mtu.jpg?resize=630%2C213&amp;ssl=1\" alt=\"MTU\" class=\"wp-image-2328\"\/><\/figure>\n\n\n\n<p>source: <a href=\"https:\/\/travelingpacket.com\/2017\/08\/25\/fortigate-finding-mtu-of-an-interface\/\">https:\/\/travelingpacket.com\/2017\/08\/25\/fortigate-finding-mtu-of-an-interface\/<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently I had the need to show the MTU of an Fortinet Fortigate firewall interface. By default, if there are no changes the MTU will be 1500. But in this case I needed to be able to show that the&hellip; <a href=\"https:\/\/whatifsecu.tech\/?p=135\" class=\"more-link\">Continue Reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-135","post","type-post","status-publish","format-standard","hentry","category-non-classe"],"_links":{"self":[{"href":"https:\/\/whatifsecu.tech\/index.php?rest_route=\/wp\/v2\/posts\/135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/whatifsecu.tech\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/whatifsecu.tech\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/whatifsecu.tech\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/whatifsecu.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=135"}],"version-history":[{"count":1,"href":"https:\/\/whatifsecu.tech\/index.php?rest_route=\/wp\/v2\/posts\/135\/revisions"}],"predecessor-version":[{"id":136,"href":"https:\/\/whatifsecu.tech\/index.php?rest_route=\/wp\/v2\/posts\/135\/revisions\/136"}],"wp:attachment":[{"href":"https:\/\/whatifsecu.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/whatifsecu.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/whatifsecu.tech\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}