CLI Reference for FortiOS 5.4.1
Transcription
CLI Reference for FortiOS 5.4.1
# FortiOS - CLI Reference VERSION 5.4.1 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT https://support.fortinet.com http://cookbook.fortinet.com/how-to-work-with-fortinet-support/ FORTIGATE COOKBOOK http://cookbook.fortinet.com FORTINET TRAINING SERVICES http://www.fortinet.com/training FORTIGUARD CENTER http://www.fortiguard.com END USER LICENSE AGREEMENT http://www.fortinet.com/doc/legal/EULA.pdf FEEDBACK Email: techdocs@fortinet.com June 3, 2016 FortiOS - CLI Reference 01-541-99686-20160603 Change Log Change Log Date Change Description June 3, 2016 Updated for FortiOS 5.4.1. December 16, 2015 New FortiOS 5.4.0 release. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 3 How this guide is organized Introduction Introduction This document describes FortiOS 5.4 CLI commands used to configure and manage a FortiGate unit from the command line interface (CLI). How this guide is organized This document contains the following sections: Managing Firmware with the FortiGate BIOS describes how to change firmware at the console during FortiGate unit boot-up. config describes the commands for each configuration branch of the FortiOS CLI. The command branches and commands are in alphabetical order. The information in this section has been extracted and formatted from FortiOS source code. The extracted information includes the command syntax, command descriptions (extracted from CLI help) and default values. This is the first version of this content produced in this way. You can send comments about this content to techdoc@fortinet.com. execute describes execute commands. get describes get commands. tree describes the tree command. Availability of commands and options Some FortiOS™ CLI commands and options are not available on all FortiGate units. The CLI displays an error message if you attempt to enter a command or option that is not available. You can use the question mark ‘?’ to verify the commands and options that are available. Commands and options may not be available for the following reasons: FortiGate model All commands are not available on all FortiGate models. For example, low-end FortiGate models do not support the aggregate interface type option of the config system interface command. Hardware configuration For example, some AMC module commands are only available when an AMC module is installed. FortiOS Carrier, FortiGate Voice, FortiWiFi, etc Commands for extended functionality are not available on all FortiGate models. The CLI Reference includes commands only available for FortiWiFi units, FortiOS Carrier, and FortiGate Voice units. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 4 Managing Firmware with the FortiGate BIOS Accessing the BIOS Managing Firmware with the FortiGate BIOS FortiGate units are shipped with firmware installed. Usually firmware upgrades are performed through the webbased manager or by using the CLI execute restore command. From the console, you can also interrupt the FortiGate unit’s boot-up process to load firmware using the BIOS firmware that is a permanent part of the unit. Using the BIOS, you can: l view system information l format the boot device l load firmware and reboot (see ) l reboot the FortiGate unit from the backup firmware, which then becomes the default firmware (see ) Accessing the BIOS The BIOS menu is available only through direct connection to the FortiGate unit’s Console port. During boot-up, “Press any key” appears briefly. If you press any keyboard key at this time, boot-up is suspended and the BIOS menu appears. If you are too late, the boot-up process continues as usual. Navigating the menu The main BIOS menu looks like this: [C]: [R]: [T]: [F]: [Q]: [I]: [B]: [Q]: [H]: Configure TFTP parameters Review TFTP paramters Initiate TFTP firmware transfer Format boot device Quit menu and continue to boot System Information Boot with backup firmare and set as default Quit menu and continue to boot Display this list of options Enter C,R,T,F,I,B,Q,or H: Typing the bracketed letter selects the option. Input is case-sensitive. Most options present a submenu. An option value in square brackets at the end of the “Enter” line is the default value which you can enter simply by pressing Return. For example, Enter image download port number [WAN1]: In most menus, typing H re-lists the menu options and typing Q returns to the previous menu. Loading firmware The BIOS can download firmware from a TFTP server that is reachable from a FortiGate unit network interface. You need to know the IP address of the server and the name of the firmware file to download. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 5 Loading firmware Managing Firmware with the FortiGate BIOS The downloaded firmware can be saved as either the default or backup firmware. It is also possible to boot the downloaded firmware without saving it. Configuring TFTP parameters Starting from the main BIOS menu [C]: Configure TFTP parameters. Selecting the VLAN (if VLANs are used) [V]: Set local VLAN ID. Choose port and whether to use DHCP [P]: Set firmware download port. The options listed depend on the FortiGate model. Choose the network interface through which the TFTP server can be reached. For example: [0]: Any of port 1 - 7 [1]: WAN1 [2]: WAN2 Enter image download port number [WAN1]: [D]: Set DHCP mode. Please select DHCP setting [1]: Enable DHCP [2]: Disable DHCP If there is a DHCP server on the network, select [1]. This simplifies configuration. Otherwise, select [2]. Non-DHCP steps [I]: Set local IP address. Enter local IP address [192.168.1.188]: This is a temporary IP address for the FortiGate unit network interface. Use a unique address on the same subnet to which the network interface connects. [S]: Set local subnet mask. Enter local subnet mask [255.255.252.0]: [G]: Set local gateway. The local gateway IP address is needed if the TFTP server is on a different subnet than the one to which the FortiGate unit is connected. TFTP and filename [T]: Set Enter [F]: Set Enter remote TFTP server IP address. remote TFTP server IP address [192.168.1.145]: firmware file name. firmware file name [image.out]: Enter [Q] to return to the main menu. Initiating TFTP firmware transfer Starting from the main BIOS menu [T]: Initiate TFTP firmware transfer. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 6 Managing Firmware with the FortiGate BIOS Booting the backup firmware Please connect TFTP server to Ethernet port 'WAN1'. MAC: 00:09:0f:b5:55:28 Connect to tftp server 192.168.1.145 ... ########################################################## Image Received. Checking image... OK Save as Default firmware/Backup firmware/Run image without saving:[D/B/R]? After you choose any option, the FortiGate unit reboots. If you choose [D] or [B], there is first a pause while the firmware is copied: Programming the boot device now. ................................................................ ................................................................ Booting the backup firmware You can reboot the FortiGate unit from the backup firmware, which then becomes the default firmware. Starting from the main BIOS menu [B]: Boot with backup firmware and set as default. If the boot device contains backup firmware, the FortiGate unit reboots. Otherwise the unit responds: Failed to mount filesystem. . . Mount back up partition failed. Back up image open failed. Press ‘Y’ or ‘y’ to boot default image. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 7 Booting the backup firmware config config Use the config commands to change your FortiGate's configuration. The command branches and commands are in alphabetical order. The information in this section has been extracted and formatted from FortiOS source code. The extracted information includes the command syntax, command descriptions (extracted from CLI help) and default values. This is the first version of this content produced in this way. You can send comments about this content to techdoc@fortinet.com CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 8 alertemail/setting CLI Syntax config alertemail setting edit <name_str> set username <string> set mailto1 <string> set mailto2 <string> set mailto3 <string> set filter-mode {category | threshold} set email-interval <integer> set IPS-logs {enable | disable} set firewall-authentication-failure-logs {enable | disable} set HA-logs {enable | disable} set IPsec-errors-logs {enable | disable} set FDS-update-logs {enable | disable} set PPP-errors-logs {enable | disable} set sslvpn-authentication-errors-logs {enable | disable} set antivirus-logs {enable | disable} set webfilter-logs {enable | disable} set configuration-changes-logs {enable | disable} set violation-traffic-logs {enable | disable} set admin-login-logs {enable | disable} set FDS-license-expiring-warning {enable | disable} set log-disk-usage-warning {enable | disable} set fortiguard-log-quota-warning {enable | disable} set amc-interface-bypass-mode {enable | disable} set FIPS-CC-errors {enable | disable} set FDS-license-expiring-days <integer> set local-disk-usage <integer> set emergency-interval <integer> set alert-interval <integer> set critical-interval <integer> set error-interval <integer> set warning-interval <integer> set notification-interval <integer> set information-interval <integer> set debug-interval <integer> set severity {emergency | alert | critical | error | warning | notification | info rmation | debug} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 9 Description Configuration Description Default Value username Email from address. (Empty) mailto1 Destination email address 1. (Empty) mailto2 Destination email address 2. (Empty) mailto3 Destination email address 3. (Empty) filter-mode Filter mode. category email-interval Interval between each email. 5 IPS-logs Enable/disable IPS Logs. disable firewall-authenticationfailure-logs Enable/disable logging of firewall authentication failures. disable HA-logs Enable/disable HA Logs. disable IPsec-errors-logs Enable/disable IPsec errors logs. disable FDS-update-logs Enable/disable FortiGuard update logs. disable PPP-errors-logs Enable/disable PPP errors logs. disable sslvpn-authenticationerrors-logs Enable/disable logging of SSL-VPN authentication error. disable antivirus-logs Enable/disable antivirus logs. disable webfilter-logs Enable/disable web filter logging. disable configuration-changeslogs Enable/disable logging of configuration changes. disable violation-traffic-logs Enable/disable logging of violation traffic. disable admin-login-logs Enable/disable logging of administrator login/logouts. disable FDS-license-expiringwarning Enable/disable FortiGuard license expiration warning. disable log-disk-usage-warning Enable/disable logging of disk usage warning. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 10 fortiguard-log-quotawarning Enable/disable warning of FortiCloud log quota. disable amc-interface-bypassmode Enable/disable Fortinet Advanced Mezzanine Card (AMC) interface bypass mode. disable FIPS-CC-errors Enable/disable FIPS and Common Criteria errors. disable FDS-license-expiringdays Number of days to end alert email prior to FortiGuard license expiration (1 - 100 days). 15 local-disk-usage Percentage at which to send alert email prior to disk usage exceeding this threshold (1 - 99 percent). 75 emergency-interval Emergency alert interval in minutes. 1 alert-interval Alert alert interval in minutes. 2 critical-interval Critical alert interval in minutes. 3 error-interval Error alert interval in minutes. 5 warning-interval Warning alert interval in minutes. 10 notification-interval Notification alert interval in minutes. 20 information-interval Information alert interval in minutes. 30 debug-interval Debug alert interval in minutes. 60 severity Lowest severity level to log. alert CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 11 antivirus/heuristic CLI Syntax config antivirus heuristic edit <name_str> set mode {pass | block | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 12 Description Configuration Description Default Value mode Mode to use for heuristics. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 13 antivirus/profile CLI Syntax config antivirus profile edit <name_str> set name <string> set comment <var-string> set replacemsg-group <string> set inspection-mode {proxy | flow-based} set ftgd-analytics {disable | suspicious | everything} set analytics-max-upload <integer> set analytics-wl-filetype <integer> set analytics-bl-filetype <integer> set analytics-db {disable | enable} set mobile-malware-db {disable | enable} config http edit <name_str> set options {scan | avmonitor | avquery | quarantine} set archive-block {encrypted | corrupted | multipart | nested andled} set archive-log {encrypted | corrupted | multipart | nested | dled} set emulator {enable | disable} end config ftp edit <name_str> set options {scan | avmonitor | avquery | quarantine} set archive-block {encrypted | corrupted | multipart | nested andled} set archive-log {encrypted | corrupted | multipart | nested | dled} set emulator {enable | disable} end config imap edit <name_str> set options {scan | avmonitor | avquery | quarantine} set archive-block {encrypted | corrupted | multipart | nested andled} set archive-log {encrypted | corrupted | multipart | nested | dled} set emulator {enable | disable} set executables {default | virus} end config pop3 edit <name_str> set options {scan | avmonitor | avquery | quarantine} set archive-block {encrypted | corrupted | multipart | nested andled} set archive-log {encrypted | corrupted | multipart | nested | dled} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. | mailbomb | unh mailbomb | unhan | mailbomb | unh mailbomb | unhan | mailbomb | unh mailbomb | unhan | mailbomb | unh mailbomb | unhan 14 set emulator {enable | disable} set executables {default | virus} end config smtp edit <name_str> set options {scan | avmonitor | avquery | quarantine} set archive-block {encrypted | corrupted | multipart | nested andled} set archive-log {encrypted | corrupted | multipart | nested | dled} set emulator {enable | disable} set executables {default | virus} end config mapi edit <name_str> set options {scan | avmonitor | avquery | quarantine} set archive-block {encrypted | corrupted | multipart | nested andled} set archive-log {encrypted | corrupted | multipart | nested | dled} set emulator {enable | disable} set executables {default | virus} end config nntp edit <name_str> set options {scan | avmonitor | avquery | quarantine} set archive-block {encrypted | corrupted | multipart | nested andled} set archive-log {encrypted | corrupted | multipart | nested | dled} set emulator {enable | disable} end config smb edit <name_str> set options {scan | avmonitor | avquery | quarantine} set archive-block {encrypted | corrupted | multipart | nested andled} set archive-log {encrypted | corrupted | multipart | nested | dled} set emulator {enable | disable} end config nac-quar edit <name_str> set infected {none | quar-src-ip | quar-interface} set expiry <user> set log {enable | disable} end set av-virus-log {enable | disable} set av-block-log {enable | disable} set scan-mode {quick | full} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. | mailbomb | unh mailbomb | unhan | mailbomb | unh mailbomb | unhan | mailbomb | unh mailbomb | unhan | mailbomb | unh mailbomb | unhan 15 Description Configuration Description Default Value name Profile name. (Empty) comment Comment. (Empty) replacemsg-group Replacement message group. (Empty) inspection-mode Inspection mode. flow-based ftgd-analytics Submit suspicious or supposedly clean files to FortiSandbox. disable analytics-max-upload Maximum upload size to FortiSandbox (in MB). 10 analytics-wl-filetype Do not submit files matching this file-pattern table to the FortiSandbox. 0 analytics-bl-filetype Only submit files matching this file-pattern table to the FortiSandbox. 0 analytics-db Use signature database from FortiSandbox to supplement the AV signature databases. disable mobile-malware-db Use mobile malware signature database. enable http HTTP. Details below Configuration options archive-block archive-log emulator ftp Default Value (Empty) (Empty) (Empty) enable FTP. Configuration options archive-block archive-log emulator imap Default Value (Empty) (Empty) (Empty) enable IMAP. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Details below Details below 16 Configuration options archive-block archive-log emulator executables pop3 Default Value (Empty) (Empty) (Empty) enable default POP3. Configuration options archive-block archive-log emulator executables smtp Details below Default Value (Empty) (Empty) (Empty) enable default SMTP. Configuration options archive-block archive-log emulator executables mapi Details below Default Value (Empty) (Empty) (Empty) enable default MAPI. Configuration options archive-block archive-log emulator executables nntp Details below Default Value (Empty) (Empty) (Empty) enable default NNTP. Configuration options archive-block archive-log emulator smb Default Value (Empty) (Empty) (Empty) enable SMB. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Details below Details below 17 Configuration options archive-block archive-log emulator nac-quar Configuration infected expiry log Default Value (Empty) (Empty) (Empty) enable Quarantine settings. Details below Default Value none 5m disable av-virus-log Enable/disable logging for antivirus scanning. enable av-block-log Enable/disable logging for antivirus file blocking. enable scan-mode Choose between full scan mode and quick scan mode. full CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 18 antivirus/quarantine CLI Syntax config antivirus quarantine edit <name_str> set agelimit <integer> set maxfilesize <integer> set quarantine-quota <integer> set drop-infected {imap | smtp | pop3 | http | ftp | nntp | imaps | smtps | pop3s | https | ftps | mapi | mm1 | mm3 | mm4 | mm7} set store-infected {imap | smtp | pop3 | http | ftp | nntp | imaps | smtps | pop3s | https | ftps | mapi | mm1 | mm3 | mm4 | mm7} set drop-blocked {imap | smtp | pop3 | http | ftp | nntp | imaps | smtps | pop3s | ftps | mapi | mm1 | mm3 | mm4 | mm7} set store-blocked {imap | smtp | pop3 | http | ftp | nntp | imaps | smtps | pop3s | ftps | mapi | mm1 | mm3 | mm4 | mm7} set drop-heuristic {imap | smtp | pop3 | http | ftp | nntp | imaps | smtps | pop3s | https | ftps | mapi | mm1 | mm3 | mm4 | mm7} set store-heuristic {imap | smtp | pop3 | http | ftp | nntp | imaps | smtps | pop3 s | https | ftps | mapi | mm1 | mm3 | mm4 | mm7} set lowspace {drop-new | ovrw-old} set destination {NULL | disk | FortiAnalyzer} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 19 Description Configuration Description Default Value agelimit Age limit for quarantined files. 0 maxfilesize Maximum file size to quarantine. 0 quarantine-quota Quarantine quota. 0 drop-infected Ignore infected files from a protocol. (Empty) store-infected Quarantine infected files from a protocol. imap smtp pop3 http ftp nntp imaps smtps pop3s https ftps mapi drop-blocked Drop blocked files from a protocol. (Empty) store-blocked Quarantine blocked files from a protocol. imap smtp pop3 http ftp nntp imaps smtps pop3s ftps mapi drop-heuristic Ignore heuristically caught files from a protocol. (Empty) store-heuristic Quarantine heuristically caught files from a protocol. imap smtp pop3 http ftp nntp imaps smtps pop3s https ftps mapi lowspace Action when the disk is almost full. ovrw-old destination Quarantine destination: disk/FortiAnalyzer. disk CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 20 antivirus/settings CLI Syntax config antivirus settings edit <name_str> set default-db {normal | extended | extreme} set grayware {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 21 Description Configuration Description Default Value default-db Select AV database to be used for AV scanning. extended grayware Enable/disable detection of grayware. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 22 application/custom CLI Syntax config application custom edit <name_str> set tag <string> set name <string> set id <integer> set comment <string> set signature <string> set category <integer> set protocol <user> set technology <user> set behavior <user> set vendor <user> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 23 Description Configuration Description Default Value tag Signature tag. (Empty) name Application name. (Empty) id Application ID. 0 comment Comment. (Empty) signature Signature text. (Empty) category Application category ID. 0 protocol Application protocol. (Empty) technology Application technology. (Empty) behavior Application behavior. (Empty) vendor Application vendor. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 24 application/list CLI Syntax config application list edit <name_str> set name <string> set comment <var-string> set replacemsg-group <string> set other-application-action {pass | block} set app-replacemsg {disable | enable} set other-application-log {disable | enable} set unknown-application-action {pass | block} set unknown-application-log {disable | enable} set p2p-black-list {skype | edonkey | bittorrent} set deep-app-inspection {disable | enable} set options {allow-dns | allow-icmp | allow-http | allow-ssl} config entries edit <name_str> set id <integer> config risk edit <name_str> set level <integer> end config category edit <name_str> set id <integer> end config sub-category edit <name_str> set id <integer> end config application edit <name_str> set id <integer> end set protocols <user> set vendor <user> set technology <user> set behavior <user> set popularity {1 | 2 | 3 | 4 | 5} config tags edit <name_str> set name <string> end config parameters edit <name_str> set id <integer> set value <string> end set action {pass | block | reset} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 25 set set set set set set set set set set set set set end log {disable | enable} log-packet {disable | enable} rate-count <integer> rate-duration <integer> rate-mode {periodical | continuous} rate-track {none | src-ip | dest-ip | dhcp-client-mac | dns-domain} session-ttl <integer> shaper <string> shaper-reverse <string> per-ip-shaper <string> quarantine {none | attacker | both | interface} quarantine-expiry <user> quarantine-log {disable | enable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 26 Description Configuration Description Default Value name List name. (Empty) comment comments (Empty) replacemsg-group Replacement message group. (Empty) other-application-action Action for other applications. pass app-replacemsg Enable/disable replacement messages for blocked applications. enable other-application-log Enable/disable logging of other applications. disable unknown-applicationaction Action for unknown applications. pass unknown-applicationlog Enable/disable logging of unknown applications. disable p2p-black-list Action for p2p black list. (Empty) deep-app-inspection Enable/disable deep application inspection. disable options Options. allow-dns entries Application list entries. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 27 application/name CLI Syntax config application name edit <name_str> set name <string> set id <integer> set category <integer> set sub-category <integer> set popularity <integer> set risk <integer> set protocol <user> set technology <user> set behavior <user> set vendor <user> set parameter <string> config metadata edit <name_str> set id <integer> set metaid <integer> set valueid <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 28 Description Configuration Description Default Value name Application name. (Empty) id Application ID. 0 category Application category ID. 0 sub-category Application sub-category ID. 0 popularity Application popularity. 0 risk Application risk. 0 protocol Application protocol. (Empty) technology Application technology. (Empty) behavior Application behavior. (Empty) vendor Application vendor. (Empty) parameter Application parameter name. (Empty) metadata Meta data. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 29 application/rule-settings CLI Syntax config application rule-settings edit <name_str> set id <integer> config tags edit <name_str> set name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 30 Description Configuration Description Default Value id Rule ID. 0 tags Applied object tags. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 31 certificate/ca CLI Syntax config certificate ca edit <name_str> set name <string> set ca <user> set range {global | vdom} set source {factory | user | bundle | fortiguard} set trusted {enable | disable} set scep-url <string> set auto-update-days <integer> set auto-update-days-warning <integer> set source-ip <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 32 Description Configuration Description Default Value name Name. (Empty) ca CA certificate. (Empty) range CA certificate range. global source CA certificate source. user trusted Enable/disable trusted CA. enable scep-url URL of SCEP server. (Empty) auto-update-days Days to auto-update before expired, 0=disabled. 0 auto-update-dayswarning Days to send update before auto-update (0=disabled). 0 source-ip Source IP for communications to SCEP server. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 33 certificate/crl CLI Syntax config certificate crl edit <name_str> set name <string> set crl <user> set range {global | vdom} set source {factory | user | bundle | fortiguard} set update-vdom <string> set ldap-server <string> set ldap-username <string> set ldap-password <password> set http-url <string> set scep-url <string> set scep-cert <string> set update-interval <integer> set source-ip <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 34 Description Configuration Description Default Value name Name. (Empty) crl Certificate Revocation List. (Empty) range CRL range. global source CRL source. user update-vdom Virtual domain for CRL update. root ldap-server LDAP server. (Empty) ldap-username Login name for LDAP server. (Empty) ldap-password Login password for LDAP server. (Empty) http-url URL of HTTP server for CRL update. (Empty) scep-url URL of CA server for CRL update via SCEP. (Empty) scep-cert Local certificate used for CRL update via SCEP. Fortinet_CA_SSL update-interval Second between updates, 0=disabled. 0 source-ip Source IP for communications to CA (HTTP/SCEP) server. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 35 certificate/local CLI Syntax config certificate local edit <name_str> set name <string> set password <password> set comments <string> set private-key <user> set certificate <user> set csr <user> set state <user> set scep-url <string> set range {global | vdom} set source {factory | user | bundle | fortiguard} set auto-regenerate-days <integer> set auto-regenerate-days-warning <integer> set scep-password <password> set ca-identifier <string> set name-encoding {printable | utf8} set source-ip <ipv4-address> set ike-localid <string> set ike-localid-type {asn1dn | fqdn} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 36 Description Configuration Description Default Value name Name. (Empty) password Password. (Empty) comments Comment. (Empty) private-key Private key. (Empty) certificate Certificate. (Empty) csr Certificate Signing Request. (Empty) state Certificate Signing Request State. (Empty) scep-url URL of SCEP server. (Empty) range Certificate range. global source Certificate source. user auto-regenerate-days Days to auto-regenerate before expired, 0=disabled. 0 auto-regenerate-dayswarning Days to send warning before auto-regeneration, 0=disabled. 0 scep-password SCEP server challenge password for autoregeneration. (Empty) ca-identifier CA identifier of the CA server for signing via SCEP. (Empty) name-encoding Name encoding for auto-regeneration. printable source-ip Source IP for communications to SCEP server. 0.0.0.0 ike-localid IKE local ID. (Empty) ike-localid-type IKE local ID type. asn1dn CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 37 dlp/filepattern CLI Syntax config dlp filepattern edit <name_str> set id <integer> set name <string> set comment <var-string> config entries edit <name_str> set filter-type {pattern | type} set pattern <string> set file-type {7z | arj | cab | lzh | rar | tar | zip | bzip | gzip | bzip2 | xz | bat | msc | uue | mime | base64 | binhex | bin | elf | exe | hta | html | jad | c lass | cod | javascript | msoffice | msofficex | fsg | upx | petite | aspack | prc | s is | hlp | activemime | jpeg | gif | tiff | png | bmp | ignored | unknown | mpeg | mov | mp3 | wma | wav | pdf | avi | rm | torrent | hibun} end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 38 Description Configuration Description Default Value id ID. 0 name Name of table. (Empty) comment Comment. (Empty) entries Configure file patterns used by DLP blocking. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 39 dlp/fp-doc-source CLI Syntax config dlp fp-doc-source edit <name_str> set name <string> set server-type {samba} set server <string> set period {none | daily | weekly | monthly} set vdom {mgmt | current} set scan-subdirectories {enable | disable} set scan-on-creation {enable | disable} set remove-deleted {enable | disable} set keep-modified {enable | disable} set username <string> set password <password> set file-path <string> set file-pattern <string> set sensitivity <string> set tod-hour <integer> set tod-min <integer> set weekday {sunday | monday | tuesday | wednesday | thursday | friday | saturday} set date <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 40 Description Configuration Description Default Value name DLP Server. (Empty) server-type DLP Server. samba server Server location (can be IP or IPv6 address). (Empty) period Select periodic server checking. none vdom Select source on management or current VDOM. mgmt scan-subdirectories Enable/disable scanning of subdirectories. enable scan-on-creation Enable/disable force scan of server to happen when document source is created or edited. enable remove-deleted Enable/disable removing chunks of files deleted from the server. enable keep-modified Enable/disable retaining old chunks of modified files. enable username Login username. (Empty) password Login password. (Empty) file-path File path on server. (Empty) file-pattern File patterns to fingerprint (wildcard). * sensitivity DLP fingerprint sensitivity defined for these files. (Empty) tod-hour Time of day to run scans (hour part, 24 hour clock). 1 tod-min Time of day to run scans (min). 0 weekday Day of week to run scans. sunday date Date within a month to run scans. 1 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 41 dlp/fp-sensitivity CLI Syntax config dlp fp-sensitivity edit <name_str> set name <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 42 Description Configuration Description Default Value name DLP Sensitivity Levels. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 43 dlp/sensor CLI Syntax config dlp sensor edit <name_str> set name <string> set comment <var-string> set replacemsg-group <string> config filter edit <name_str> set id <integer> set name <string> set severity {info | low | medium | high | critical} set type {file | message} set proto {smtp | pop3 | imap | http-get | http-post | ftp | nntp | mapi | mm1 | mm3 | mm4 | mm7} set filter-by {credit-card | ssn | regexp | file-type | file-size | fingerprin t | watermark | encrypted} set file-size <integer> set company-identifier <string> config fp-sensitivity edit <name_str> set name <string> end set match-percentage <integer> set file-type <integer> set regexp <string> set archive {disable | enable} set action {allow | log-only | block | ban | quarantine-ip | quarantine-port} set expiry <user> end set dlp-log {enable | disable} set nac-quar-log {enable | disable} set flow-based {enable | disable} set options {} set full-archive-proto {smtp | pop3 | imap | http-get | http-post | ftp | nntp | m api | mm1 | mm3 | mm4 | mm7} set summary-proto {smtp | pop3 | imap | http-get | http-post | ftp | nntp | mapi | mm1 | mm3 | mm4 | mm7} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 44 Description Configuration Description Default Value name Name. (Empty) comment Comment. (Empty) replacemsg-group Replacement message group. (Empty) filter Configure DLP filters. (Empty) dlp-log Enable/disable logging for data leak prevention. enable nac-quar-log Enable/disable logging for NAC quarantine creation. disable flow-based Enable/disable flow-based data leak prevention. disable options options full-archive-proto Protocols to always content archive. (Empty) summary-proto Protocols to always log summary. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 45 dlp/settings CLI Syntax config dlp settings edit <name_str> set storage-device <string> set size <integer> set db-mode {stop-adding | remove-modified-then-oldest | remove-oldest} set cache-mem-percent <integer> set chunk-size <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 46 Description Configuration Description Default Value storage-device Storage name. (Empty) size Maximum total size of files within the storage (MB). 16 db-mode Method of maintaining database size. stop-adding cache-mem-percent Maximum percentage of available memory allocated to caching (1 - 15%). 2 chunk-size Maximum fingerprint chunk size. **Changing will flush the entire database**. 2800 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 47 dnsfilter/profile CLI Syntax config dnsfilter profile edit <name_str> set name <string> set comment <var-string> config urlfilter edit <name_str> set urlfilter-table <integer> end config ftgd-dns edit <name_str> set options {error-allow | ftgd-disable} config filters edit <name_str> set id <integer> set category <integer> set action {block | monitor} set log {enable | disable} end end set log-all-url {enable | disable} set sdns-ftgd-err-log {enable | disable} set sdns-url-log {enable | disable} set block-action {block | redirect} set redirect-portal <ipv4-address> set block-botnet {disable | enable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 48 Description Configuration Description Default Value name Profile name. (Empty) comment Comment. (Empty) urlfilter URL filter settings. Details below Configuration urlfilter-table ftgd-dns Configuration options filters Default Value 0 FortiGuard DNS Filter settings. Details below Default Value (Empty) (Empty) log-all-url Enable/disable log all URLs visited. disable sdns-ftgd-err-log Enable/disable logging of FortiGuard SDNS rating errors. enable sdns-url-log Enable/disable logging of URL filtering and botnet domains. enable block-action Action to take for blocked domains. redirect redirect-portal IP address of the SDNS portal. 0.0.0.0 block-botnet Enable/disable block of botnet C&C. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 49 dnsfilter/urlfilter CLI Syntax config dnsfilter urlfilter edit <name_str> set id <integer> set name <string> set comment <var-string> config entries edit <name_str> set id <integer> set url <string> set type {simple | regex | wildcard} set action {block | allow | monitor} set status {enable | disable} end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 50 Description Configuration Description Default Value id ID. 0 name Name of table. (Empty) comment Comment. (Empty) entries DNS URL filter. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 51 endpoint-control/client CLI Syntax config endpoint-control client edit <name_str> set id <integer> set ftcl-uid <string> set src-ip <ipv4-address-any> set src-mac <mac-address> set info <user> set ad-groups <var-string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 52 Description Configuration Description Default Value id Endpoint client ID. 0 ftcl-uid Endpoint FortiClient UID. (Empty) src-ip Endpoint client IP address. 0.0.0.0 src-mac Endpoint client MAC address. 00:00:00:00:00:00 info Endpoint client information. (Empty) ad-groups Endpoint client AD logon groups. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 53 endpoint-control/forticlient-registration-sync CLI Syntax config endpoint-control forticlient-registration-sync edit <name_str> set peer-name <string> set peer-ip <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 54 Description Configuration Description Default Value peer-name Peer name. (Empty) peer-ip Peer connecting IP. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 55 endpoint-control/profile CLI Syntax config endpoint-control profile edit <name_str> set profile-name <string> config forticlient-winmac-settings edit <name_str> set compliance-action {block | warning | auto-update} set forticlient-av {enable | disable} set av-realtime-protection {enable | disable} set av-signature-up-to-date {enable | disable} set sandbox-analysis {enable | disable} set sandbox-address <string> set forticlient-application-firewall {enable | disable} set forticlient-application-firewall-list <string> set forticlient-system-compliance {enable | disable} set forticlient-minimum-software-version {enable | disable} set forticlient-win-ver <string> set forticlient-mac-ver <string> set os-av-software-installed {enable | disable} config forticlient-operating-system edit <name_str> set id <integer> set os-type {custom | mac_os | win_10 | win_svr_10 | win_81 | win_svr_2012 _r2 | win_80 | win_svr_2012 | win_7 | win_svr_2008_r2 | win_vista | win_svr_2008 | win _svr_2003_r2 | win_sto_svr_2003 | win_home_svr | win_svr_2003 | win_xp | win_2000} set os-name <string> end config forticlient-running-app edit <name_str> set id <integer> set app-name <string> set process-name <string> set app-sha256-signature <string> set process-name2 <string> set app-sha256-signature2 <string> set process-name3 <string> set app-sha256-signature3 <string> set process-name4 <string> set app-sha256-signature4 <string> end config forticlient-registry-entry edit <name_str> set id <integer> set registry-entry <string> end config forticlient-own-file edit <name_str> set id <integer> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 56 set file <string> end set forticlient-log-upload {enable | disable} set forticlient-log-upload-level {traffic | vulnerability | event} set forticlient-log-upload-server <string> set forticlient-wf {enable | disable} set forticlient-wf-profile <string> set forticlient-vuln-scan {enable | disable} set forticlient-vuln-scan-enforce {critical | high | medium | low} set forticlient-vuln-scan-enforce-grace <integer> end config forticlient-android-settings edit <name_str> set forticlient-wf {enable | disable} set forticlient-wf-profile <string> set disable-wf-when-protected {enable | disable} set forticlient-vpn-provisioning {enable | disable} set forticlient-advanced-vpn {enable | disable} set forticlient-advanced-vpn-buffer <var-string> config forticlient-vpn-settings edit <name_str> set name <string> set type {ipsec | ssl} set remote-gw <string> set sslvpn-access-port <integer> set sslvpn-require-certificate {enable | disable} set auth-method {psk | certificate} set preshared-key <password> end end config forticlient-ios-settings edit <name_str> set forticlient-wf {enable | disable} set forticlient-wf-profile <string> set disable-wf-when-protected {enable | disable} set client-vpn-provisioning {enable | disable} config client-vpn-settings edit <name_str> set name <string> set type {ipsec | ssl} set vpn-configuration-name <string> set vpn-configuration-content <var-string> set remote-gw <string> set sslvpn-access-port <integer> set sslvpn-require-certificate {enable | disable} set auth-method {psk | certificate} set preshared-key <password> end set distribute-configuration-profile {enable | disable} set configuration-name <string> set configuration-content <var-string> end set description <var-string> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 57 set description <var-string> config src-addr edit <name_str> set name <string> end config device-groups edit <name_str> set name <string> end config users edit <name_str> set name <string> end config user-groups edit <name_str> set name <string> end config on-net-addr edit <name_str> set name <string> end set replacemsg-override-group <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 58 Description Configuration Description Default Value profile-name Profile name. (Empty) forticlient-winmacsettings FortiClient settings for Windows/Mac platform. Details below Configuration compliance-action forticlient-av av-realtime-protection av-signature-up-to-date sandbox-analysis sandbox-address forticlient-application-firewall forticlient-application-firewall-list forticlient-system-compliance forticlient-minimum-software-version forticlient-win-ver forticlient-mac-ver os-av-software-installed forticlient-operating-system forticlient-running-app forticlient-registry-entry forticlient-own-file forticlient-log-upload forticlient-log-upload-level forticlient-log-upload-server forticlient-wf forticlient-wf-profile forticlient-vuln-scan forticlient-vuln-scan-enforce forticlient-vuln-scan-enforce-grace forticlient-androidsettings CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Default Value auto-update disable disable disable disable (Empty) disable (Empty) enable disable 5.4.1 5.4.1 disable (Empty) (Empty) (Empty) (Empty) enable traffic vulnerability event (Empty) disable default enable high 1 FortiClient settings for Android platform. Details below 59 Configuration forticlient-wf forticlient-wf-profile disable-wf-when-protected forticlient-vpn-provisioning forticlient-advanced-vpn forticlient-advanced-vpn-buffer forticlient-vpn-settings forticlient-ios-settings Default Value disable (Empty) enable disable disable (Empty) (Empty) FortiClient settings for iOS platform. Configuration forticlient-wf forticlient-wf-profile disable-wf-when-protected client-vpn-provisioning client-vpn-settings distribute-configuration-profile configuration-name configuration-content Details below Default Value disable (Empty) enable disable (Empty) disable (Empty) (Empty) description Description. (Empty) src-addr Source addresses. (Empty) device-groups Device groups. (Empty) users Users. (Empty) user-groups User groups. (Empty) on-net-addr Addresses for on-net detection. (Empty) replacemsg-overridegroup Specify endpoint control replacement message override group. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 60 endpoint-control/registered-forticlient CLI Syntax config endpoint-control registered-forticlient edit <name_str> set uid <string> set vdom <string> set ip <ipv4-address-any> set mac <mac-address> set status <integer> set flag <integer> set reg-fortigate <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 61 Description Configuration Description Default Value uid FortiClient UID. (Empty) vdom Registering vdom. (Empty) ip Endpoint IP address. 0.0.0.0 mac Endpoint MAC address. 00:00:00:00:00:00 status FortiClient registration status. 1 flag FortiClient registration flag. 0 reg-fortigate Registering FortiGate SN. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 62 endpoint-control/settings CLI Syntax config endpoint-control settings edit <name_str> set forticlient-reg-key-enforce {enable | disable} set forticlient-reg-key <password> set forticlient-reg-timeout <integer> set download-custom-link <string> set download-location {fortiguard | custom} set forticlient-keepalive-interval <integer> set forticlient-sys-update-interval <integer> set forticlient-avdb-update-interval <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 63 Description Configuration Description Default Value forticlient-reg-keyenforce Enable/disable enforcement of FortiClient registration key. disable forticlient-reg-key FortiClient registration key. (Empty) forticlient-reg-timeout FortiClient registration license timeout (days, min = 1, max = 180, 0 = unlimited). 7 download-custom-link Customized URL for downloading FortiClient. (Empty) download-location FortiClient download location. fortiguard forticlient-keepaliveinterval Interval between two KeepAlive messages from FortiClient (in seconds). 60 forticlient-sys-updateinterval Interval between two system update messages from FortiClient (in minutes). 720 forticlient-avdb-updateinterval Hours between FortiClient AntiVirus database updates (0 - 24, default = 8) 8 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 64 extender-controller/extender CLI Syntax config extender-controller extender edit <name_str> set id <string> set admin {disable | discovered | enable} set ifname <string> set vdom <integer> set role {none | primary | secondary} set mode {standalone | redundant} set dial-mode {dial-on-demand | always-connect} set redial {none | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10} set redundant-intf <string> set dial-status <integer> set conn-status <integer> set ext-name <string> set description <string> set quota-limit-mb <integer> set billing-start-day <integer> set at-dial-script <string> set modem-passwd <password> set initiated-update {enable | disable} set modem-type {cdma | gsm/lte | wimax} set ppp-username <string> set ppp-password <password> set ppp-auth-protocol {auto | pap | chap} set ppp-echo-request {enable | disable} set wimax-carrier <string> set wimax-realm <string> set wimax-auth-protocol {tls | ttls} set sim-pin <password> set access-point-name <string> set multi-mode {auto | auto-3g | force-lte | force-3g | force-2g} set roaming {enable | disable} set cdma-nai <string> set aaa-shared-secret <password> set ha-shared-secret <password> set primary-ha <string> set secondary-ha <string> set cdma-aaa-spi <string> set cdma-ha-spi <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 65 Description Configuration Description Default Value id FortiExtender serial number. (Empty) admin FortiExtender Administration (enable or disable). disable ifname FortiExtender interface name. (Empty) vdom VDOM 0 role FortiExtender work role(Primary, Secondary, None). none mode FortiExtender mode. standalone dial-mode Dial mode (dial-on-demand or always-connect). always-connect redial Number of redials allowed based on failed attempts. none redundant-intf Redundant interface. (Empty) dial-status Dial status. 0 conn-status Connection status. 0 ext-name FortiExtender name. (Empty) description Description. (Empty) quota-limit-mb Monthly quota limit (MB). 0 billing-start-day Billing start day. 1 at-dial-script Initialization AT commands specific to the MODEM. (Empty) modem-passwd MODEM password. (Empty) initiated-update Allow/disallow network initiated updates to the MODEM. disable modem-type MODEM type (CDMA, GSM/LTE or WIMAX). gsm/lte ppp-username PPP username. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 66 ppp-password PPP password. (Empty) ppp-auth-protocol PPP authentication protocol (PAP,CHAP or auto). auto ppp-echo-request Enable/disable PPP echo request. disable wimax-carrier WiMax carrier. (Empty) wimax-realm WiMax realm. (Empty) wimax-auth-protocol WiMax authentication protocol(TLS or TTLS). tls sim-pin SIM PIN. (Empty) access-point-name Access point name(APN). (Empty) multi-mode MODEM mode of operation(3G,LTE,etc). auto roaming Enable/disable MODEM roaming. disable cdma-nai NAI for CDMA MODEMS. (Empty) aaa-shared-secret AAA shared secret. (Empty) ha-shared-secret HA shared secret. (Empty) primary-ha Primary HA. (Empty) secondary-ha Secondary HA. (Empty) cdma-aaa-spi CDMA AAA SPI. (Empty) cdma-ha-spi CDMA HA SPI. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 67 firewall.ipmacbinding/setting CLI Syntax config firewall.ipmacbinding setting edit <name_str> set bindthroughfw {enable | disable} set bindtofw {enable | disable} set undefinedhost {allow | block} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 68 Description Configuration Description Default Value bindthroughfw Enable/disable going through firewall. disable bindtofw Enable/disable going to firewall. disable undefinedhost Allow/block traffic for undefined hosts. block CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 69 firewall.ipmacbinding/table CLI Syntax config firewall.ipmacbinding table edit <name_str> set seq-num <integer> set ip <ipv4-address> set mac <mac-address> set name <string> set status {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 70 Description Configuration Description Default Value seq-num Entry number. 0 ip IP address. 0.0.0.0 mac MAC address. 00:00:00:00:00:00 name Name (optional, default = no name). noname status Enable/disable IP-mac binding. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 71 firewall.schedule/group CLI Syntax config firewall.schedule group edit <name_str> set name <string> config member edit <name_str> set name <string> end set color <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 72 Description Configuration Description Default Value name Schedule group name. (Empty) member Schedule group member. (Empty) color GUI icon color. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 73 firewall.schedule/onetime CLI Syntax config firewall.schedule onetime edit <name_str> set name <string> set start <user> set end <user> set color <integer> set expiration-days <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 74 Description Configuration Description Default Value name Onetime schedule name. (Empty) start Start time and date. 00:00 2001/01/01 end End time and date. 00:00 2001/01/01 color GUI icon color. 0 expiration-days Generate event log before schedule expires (1100 days, 0 = disable). 3 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 75 firewall.schedule/recurring CLI Syntax config firewall.schedule recurring edit <name_str> set name <string> set start <user> set end <user> set day {sunday | monday | tuesday | wednesday | thursday | friday | saturday | no ne} set color <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 76 Description Configuration Description Default Value name Recurring schedule name. (Empty) start Start time. 00:00 end End time. 00:00 day weekday none color GUI icon color. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 77 firewall.service/category CLI Syntax config firewall.service category edit <name_str> set name <string> set comment <var-string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 78 Description Configuration Description Default Value name Service category name. (Empty) comment Comment. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 79 firewall.service/custom CLI Syntax config firewall.service custom edit <name_str> set name <string> set explicit-proxy {enable | disable} set category <string> set protocol {TCP/UDP/SCTP | ICMP | ICMP6 | IP | HTTP | FTP | CONNECT | SOCKS | SO CKS-TCP | SOCKS-UDP | ALL} set iprange <user> set fqdn <string> set protocol-number <integer> set icmptype <integer> set icmpcode <integer> set tcp-portrange <user> set udp-portrange <user> set sctp-portrange <user> set tcp-halfclose-timer <integer> set tcp-halfopen-timer <integer> set tcp-timewait-timer <integer> set udp-idle-timer <integer> set session-ttl <integer> set check-reset-range {disable | strict | default} set comment <var-string> set color <integer> set visibility {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 80 Description Configuration Description Default Value name Custom service name. (Empty) explicit-proxy Enable/disable explicit web proxy service. disable category Service category. (Empty) protocol Protocol type. TCP/UDP/SCTP iprange Start IP-End IP. 0.0.0.0 fqdn Fully qualified domain name. (Empty) protocol-number IP protocol number. 0 icmptype ICMP type. (Empty) icmpcode ICMP code. (Empty) tcp-portrange Multiple TCP port ranges. (Empty) udp-portrange Multiple UDP port ranges. (Empty) sctp-portrange Multiple SCTP port ranges. (Empty) tcp-halfclose-timer TCP half close timeout (1 - 86400 sec, 0 = default). 0 tcp-halfopen-timer TCP half close timeout (1 - 86400 sec, 0 = default). 0 tcp-timewait-timer TCP half close timeout (1 - 300 sec, 0 = default). 0 udp-idle-timer TCP half close timeout (0 - 86400 sec, 0 = default). 0 session-ttl Session TTL (300 - 604800, 0 = default). 0 check-reset-range Enable/disable RST check. default comment Comment. (Empty) color GUI icon color. 0 visibility Enable/disable service visibility. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 81 firewall.service/group CLI Syntax config firewall.service group edit <name_str> set name <string> config member edit <name_str> set name <string> end set explicit-proxy {enable | disable} set comment <var-string> set color <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 82 Description Configuration Description Default Value name Address group name. (Empty) member Address group member. (Empty) explicit-proxy Enable/disable explicit web proxy service group. disable comment Comment. (Empty) color GUI icon color. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 83 firewall.shaper/per-ip-shaper CLI Syntax config firewall.shaper per-ip-shaper edit <name_str> set name <string> set max-bandwidth <integer> set bandwidth-unit {kbps | mbps | gbps} set max-concurrent-session <integer> set diffserv-forward {enable | disable} set diffserv-reverse {enable | disable} set diffservcode-forward <user> set diffservcode-rev <user> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 84 Description Configuration Description Default Value name Traffic shaper name. (Empty) max-bandwidth Maximum bandwidth value (0 - 16776000). 0 bandwidth-unit Bandwidth unit (default = kbps). kbps max-concurrentsession Maximum concurrent session (0 - 2097000). 0 diffserv-forward Forward (original) traffic DiffServ. disable diffserv-reverse Reverse (reply) traffic DiffServ. disable diffservcode-forward Forward (original) traffic DiffServ code point value. 000000 diffservcode-rev Reverse (reply) traffic DiffServ code point value. 000000 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 85 firewall.shaper/traffic-shaper CLI Syntax config firewall.shaper traffic-shaper edit <name_str> set name <string> set guaranteed-bandwidth <integer> set maximum-bandwidth <integer> set bandwidth-unit {kbps | mbps | gbps} set priority {low | medium | high} set per-policy {disable | enable} set diffserv {enable | disable} set diffservcode <user> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 86 Description Configuration Description Default Value name Traffic shaper name. (Empty) guaranteed-bandwidth Guaranteed bandwidth value (0 - 16776000). 0 maximum-bandwidth Maximum bandwidth value (0 - 16776000). 0 bandwidth-unit Bandwidth unit (default = kbps). kbps priority Traffic priority. high per-policy Enable/disable use a separate shaper for each policy. disable diffserv Enable/disable traffic DiffServ. disable diffservcode Traffic DiffServ code point value. 000000 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 87 firewall.ssl/setting CLI Syntax config firewall.ssl setting edit <name_str> set proxy-connect-timeout <integer> set ssl-dh-bits {768 | 1024 | 1536 | 2048} set ssl-send-empty-frags {enable | disable} set no-matching-cipher-action {bypass | drop} set cert-cache-capacity <integer> set cert-cache-timeout <integer> set session-cache-capacity <integer> set session-cache-timeout <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 88 Description Configuration Description Default Value proxy-connect-timeout Time limit to make an internal connection to the appropriate proxy process (1 - 60 sec). 30 ssl-dh-bits Size of Diffie-Hellman prime used in DHE-RSA negotiation. 2048 ssl-send-empty-frags Send empty fragments to avoid attack on CBC IV (SSL 3.0 & TLS 1.0 only). enable no-matching-cipheraction Bypass or drop the connection when no matching cipher was found. bypass cert-cache-capacity Maximum capacity of the host certificate cache (0 - 500). 200 cert-cache-timeout Minutes to keep certificate cache (1 - 120 min). 10 session-cache-capacity Obsolete. 500 session-cache-timeout Number of minutes to keep SSL session state. 20 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 89 firewall/address CLI Syntax config firewall address edit <name_str> set name <string> set uuid <uuid> set subnet <ipv4-classnet-any> set type {ipmask | iprange | fqdn | geography | wildcard | wildcard-fqdn} set start-ip <ipv4-address-any> set end-ip <ipv4-address-any> set fqdn <string> set country <string> set wildcard-fqdn <string> set cache-ttl <integer> set wildcard <ipv4-classnet-any> set comment <var-string> set visibility {enable | disable} set associated-interface <string> set color <integer> config tags edit <name_str> set name <string> end set allow-routing {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 90 Description Configuration Description Default Value name Address name. (Empty) uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 subnet IP address and netmask. 0.0.0.0 0.0.0.0 type Type. ipmask start-ip Start IP. 0.0.0.0 end-ip End IP. 0.0.0.0 fqdn Fully qualified domain name. (Empty) country Country name. (Empty) wildcard-fqdn Wildcard FQDN. (Empty) cache-ttl Minimal TTL of individual IP addresses in FQDN cache. 0 wildcard IP address and wildcard netmask. 0.0.0.0 0.0.0.0 comment Comment. (Empty) visibility Enable/disable address visibility. enable associated-interface Associated interface name. (Empty) color GUI icon color. 0 tags Applied object tags. (Empty) allow-routing Enable/disable use of this address in the static route configuration. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 91 firewall/address6 CLI Syntax config firewall address6 edit <name_str> set name <string> set uuid <uuid> set type {ipprefix | iprange} set ip6 <ipv6-network> set start-ip <ipv6-address> set end-ip <ipv6-address> set visibility {enable | disable} set color <integer> config tags edit <name_str> set name <string> end set comment <var-string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 92 Description Configuration Description Default Value name Address name. (Empty) uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 type Type. ipprefix ip6 IPv6 address prefix. ::/0 start-ip Start IP. :: end-ip End IP. :: visibility Enable/disable address visibility. enable color GUI icon color. 0 tags Applied object tags. (Empty) comment Comment. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 93 firewall/addrgrp CLI Syntax config firewall addrgrp edit <name_str> set name <string> set uuid <uuid> config member edit <name_str> set name <string> end set comment <var-string> set visibility {enable | disable} set color <integer> config tags edit <name_str> set name <string> end set allow-routing {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 94 Description Configuration Description Default Value name Address group name. (Empty) uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 member Address group member. (Empty) comment Comment. (Empty) visibility Enable/disable address group visibility. enable color GUI icon color. 0 tags Applied object tags. (Empty) allow-routing Enable/disable use of this group in the static route disable configuration. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 95 firewall/addrgrp6 CLI Syntax config firewall addrgrp6 edit <name_str> set name <string> set uuid <uuid> set visibility {enable | disable} set color <integer> set comment <var-string> config member edit <name_str> set name <string> end config tags edit <name_str> set name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 96 Description Configuration Description Default Value name IPv6 address group name. (Empty) uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 visibility Enable/disable address group6 visibility. enable color GUI icon color. 0 comment Comment. (Empty) member IPv6 address group member. (Empty) tags Applied object tags. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 97 firewall/auth-portal CLI Syntax config firewall auth-portal edit <name_str> config groups edit <name_str> set name <string> end set portal-addr <string> set portal-addr6 <string> set identity-based-route <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 98 Description Configuration Description Default Value groups Group name. (Empty) portal-addr Address (or domain name) of authentication portal. (Empty) portal-addr6 IPv6 address (or domain name) of authentication portal. (Empty) identity-based-route Name of identity-based routing rule. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 99 firewall/central-snat-map CLI Syntax config firewall central-snat-map edit <name_str> set policyid <integer> set status {enable | disable} config orig-addr edit <name_str> set name <string> end config dst-addr edit <name_str> set name <string> end config nat-ippool edit <name_str> set name <string> end set protocol <integer> set orig-port <integer> set nat-port <user> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 100 Description Configuration Description Default Value policyid Policy ID. 0 status Enable/disable policy status. enable orig-addr Original address. (Empty) dst-addr Destination address. (Empty) nat-ippool IP pool names for translated address. (Empty) protocol Protocol (0 - 255). 0 orig-port Original port. 0 nat-port Translated port or port range. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 101 firewall/dnstranslation CLI Syntax config firewall dnstranslation edit <name_str> set id <integer> set src <ipv4-address> set dst <ipv4-address> set netmask <ipv4-netmask> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 102 Description Configuration Description Default Value id ID. 0 src Source IP. 0.0.0.0 dst Destination IP. 0.0.0.0 netmask Network mask. 255.255.255.255 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 103 firewall/DoS-policy CLI Syntax config firewall DoS-policy edit <name_str> set policyid <integer> set status {enable | disable} set interface <string> config srcaddr edit <name_str> set name <string> end config dstaddr edit <name_str> set name <string> end config service edit <name_str> set name <string> end config anomaly edit <name_str> set name <string> set status {disable | enable} set log {enable | disable} set action {pass | block | proxy} set quarantine {none | attacker | both | interface} set quarantine-expiry <user> set quarantine-log {disable | enable} set threshold <integer> set threshold(default) <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 104 Description Configuration Description Default Value policyid Policy ID. 0 status Enable/disable policy status. enable interface Interface name. (Empty) srcaddr Source address name. (Empty) dstaddr Destination address name. (Empty) service Service name. (Empty) anomaly Anomaly. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 105 firewall/DoS-policy6 CLI Syntax config firewall DoS-policy6 edit <name_str> set policyid <integer> set status {enable | disable} set interface <string> config srcaddr edit <name_str> set name <string> end config dstaddr edit <name_str> set name <string> end config service edit <name_str> set name <string> end config anomaly edit <name_str> set name <string> set status {disable | enable} set log {enable | disable} set action {pass | block | proxy} set quarantine {none | attacker | both | interface} set quarantine-expiry <user> set quarantine-log {disable | enable} set threshold <integer> set threshold(default) <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 106 Description Configuration Description Default Value policyid Policy ID. 0 status Enable/disable policy status. enable interface Interface name. (Empty) srcaddr Source address name. (Empty) dstaddr Destination address name. (Empty) service Service name. (Empty) anomaly Anomaly. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 107 firewall/explicit-proxy-address CLI Syntax config firewall explicit-proxy-address edit <name_str> set name <string> set uuid <uuid> set type {host-regex | url | category | method | ua | header | src-advanced | dstadvanced} set host <string> set host-regex <string> set path <string> config category edit <name_str> set id <integer> end set method {get | post | put | head | connect | trace | options | delete} set ua {chrome | ms | firefox | safari | other} set header-name <string> set header <string> set case-sensitivity {disable | enable} config header-group edit <name_str> set id <integer> set header-name <string> set header <string> set case-sensitivity {disable | enable} end set color <integer> config tags edit <name_str> set name <string> end set comment <var-string> set visibility {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 108 Description Configuration Description Default Value name Address name. (Empty) uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 type Address type. url host Host address (Empty) host-regex Host regular expression. (Empty) path URL path regular expression. (Empty) category FortiGuard category ID. (Empty) method HTTP methods. (Empty) ua User agent. (Empty) header-name HTTP header. (Empty) header HTTP header regular expression. (Empty) case-sensitivity Case sensitivity in pattern. disable header-group HTTP header group. (Empty) color GUI icon color. 0 tags Applied object tags. (Empty) comment Comment. (Empty) visibility Enable/disable address visibility. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 109 firewall/explicit-proxy-addrgrp CLI Syntax config firewall explicit-proxy-addrgrp edit <name_str> set name <string> set type {src | dst} set uuid <uuid> config member edit <name_str> set name <string> end set color <integer> config tags edit <name_str> set name <string> end set comment <var-string> set visibility {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 110 Description Configuration Description Default Value name Address group name. (Empty) type Address group type. src uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 member Address group members. (Empty) color GUI icon color. 0 tags Applied object tags. (Empty) comment Comment. (Empty) visibility Enable/disable address visibility. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 111 firewall/explicit-proxy-policy CLI Syntax config firewall explicit-proxy-policy edit <name_str> set uuid <uuid> set policyid <integer> set proxy {web | ftp | wanopt} config dstintf edit <name_str> set name <string> end config srcaddr edit <name_str> set name <string> end config dstaddr edit <name_str> set name <string> end config service edit <name_str> set name <string> end set srcaddr-negate {enable | disable} set dstaddr-negate {enable | disable} set service-negate {enable | disable} set action {accept | deny} set status {enable | disable} set schedule <string> set logtraffic {all | utm | disable} config srcaddr6 edit <name_str> set name <string> end config dstaddr6 edit <name_str> set name <string> end set identity-based {enable | disable} set ip-based {enable | disable} set active-auth-method {ntlm | basic | digest | form | negotiate | none} set sso-auth-method {fsso | rsso | none} set require-tfa {enable | disable} set web-auth-cookie {enable | disable} set transaction-based {enable | disable} config identity-based-policy edit <name_str> set id <integer> set schedule <string> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 112 set logtraffic {all | utm | disable} set logtraffic-start {enable | disable} set scan-botnet-connections {disable | block | monitor} set utm-status {enable | disable} set profile-type {single | group} set profile-group <string> set av-profile <string> set webfilter-profile <string> set spamfilter-profile <string> set dlp-sensor <string> set ips-sensor <string> set application-list <string> set casi-profile <string> set icap-profile <string> set waf-profile <string> set profile-protocol-options <string> set ssl-ssh-profile <string> config groups edit <name_str> set name <string> end config users edit <name_str> set name <string> end set disclaimer {disable | domain | policy | user} set replacemsg-override-group <string> end set webproxy-forward-server <string> set webproxy-profile <string> set transparent {enable | disable} set webcache {enable | disable} set webcache-https {disable | any | enable} set disclaimer {disable | domain | policy | user} set utm-status {enable | disable} set profile-type {single | group} set profile-group <string> set av-profile <string> set webfilter-profile <string> set spamfilter-profile <string> set dlp-sensor <string> set ips-sensor <string> set application-list <string> set casi-profile <string> set icap-profile <string> set waf-profile <string> set profile-protocol-options <string> set ssl-ssh-profile <string> set replacemsg-override-group <string> set logtraffic-start {enable | disable} config tags edit <name_str> set name <string> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 113 set name <string> end set label <string> set global-label <string> set scan-botnet-connections {disable | block | monitor} set comments <var-string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 114 Description Configuration Description Default Value uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 policyid Policy ID. 0 proxy Explicit proxy type. (Empty) dstintf Destination interface name. (Empty) srcaddr Source address name. [srcaddr or srcaddr6(web proxy only) must be set]. (Empty) dstaddr Destination address name. [dstaddr or dstaddr6(web proxy only) must be set]. (Empty) service Service name. (Empty) srcaddr-negate Enable/disable negated source address match. disable dstaddr-negate Enable/disable negated destination address match. disable service-negate Enable/disable negated service match. disable action Policy action. deny status Enable/disable policy status. enable schedule Schedule name. (Empty) logtraffic Enable/disable policy log traffic. utm srcaddr6 IPv6 source address (web proxy only). [srcaddr6 or srcaddr must be set]. (Empty) dstaddr6 IPv6 destination address (web proxy only). [dstaddr6 or dstaddr must be set]. (Empty) identity-based Enable/disable identity-based policy. disable ip-based Enable/disable IP-based authentication. disable active-auth-method Active authentication method. basic CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 115 sso-auth-method SSO authentication method. none require-tfa Enable/disable requirement of 2-factor authentication. disable web-auth-cookie Enable/disable Web authentication cookie. disable transaction-based Enable/disable transaction based authentication. disable identity-based-policy Identity-based policy. (Empty) webproxy-forwardserver Web proxy forward server. (Empty) webproxy-profile Web proxy profile. (Empty) transparent Use IP address of client to connect to server. disable webcache Enable/disable web cache. disable webcache-https Enable/disable web cache for HTTPS. disable disclaimer Web proxy disclaimer setting. disable utm-status Enable AV/web/IPS protection profile. disable profile-type profile type single profile-group profile group (Empty) av-profile Antivirus profile. (Empty) webfilter-profile Web filter profile. (Empty) spamfilter-profile Spam filter profile. (Empty) dlp-sensor DLP sensor. (Empty) ips-sensor IPS sensor. (Empty) application-list Application list. (Empty) casi-profile CASI profile. (Empty) icap-profile ICAP profile. (Empty) waf-profile Web application firewall profile. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 116 profile-protocol-options Profile protocol options. (Empty) ssl-ssh-profile SSL SSH Profile. (Empty) replacemsg-overridegroup Specify authentication replacement message override group. (Empty) logtraffic-start Enable/disable policy log traffic start. disable tags Applied object tags. (Empty) label Label for section view. (Empty) global-label Label for global view. (Empty) scan-botnetconnections Enable/disable scanning of connections to Botnet servers. disable comments Comment. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 117 firewall/identity-based-route CLI Syntax config firewall identity-based-route edit <name_str> set name <string> set comments <string> config rule edit <name_str> set id <integer> set gateway <ipv4-address> set device <string> config groups edit <name_str> set name <string> end end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 118 Description Configuration Description Default Value name Name. (Empty) comments Description/comments. (Empty) rule Rule. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 119 firewall/interface-policy CLI Syntax config firewall interface-policy edit <name_str> set policyid <integer> set status {enable | disable} set logtraffic {all | utm | disable} set address-type {ipv4 | ipv6} set interface <string> config srcaddr edit <name_str> set name <string> end config dstaddr edit <name_str> set name <string> end config service edit <name_str> set name <string> end set application-list-status {enable | disable} set application-list <string> set casi-profile-status {enable | disable} set casi-profile <string> set ips-sensor-status {enable | disable} set ips-sensor <string> set dsri {enable | disable} set av-profile-status {enable | disable} set av-profile <string> set webfilter-profile-status {enable | disable} set webfilter-profile <string> set spamfilter-profile-status {enable | disable} set spamfilter-profile <string> set dlp-sensor-status {enable | disable} set dlp-sensor <string> set scan-botnet-connections {disable | block | monitor} set label <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 120 Description Configuration Description Default Value policyid Policy ID. 0 status Enable/disable policy status. enable logtraffic Enable/disable interface log traffic. utm address-type Policy address type. ipv4 interface Interface name. (Empty) srcaddr Source address name. (Empty) dstaddr Destination address name. (Empty) service Service name. (Empty) application-list-status Enable/disable application control. disable application-list Application list name. (Empty) casi-profile-status Enable/disable CASI. disable casi-profile CASI profile name. (Empty) ips-sensor-status Enable/disable IPS sensor. disable ips-sensor IPS sensor name. (Empty) dsri Enable/disable DSRI. disable av-profile-status Enable/disable antivirus. disable av-profile Antivirus profile. (Empty) webfilter-profile-status Enable/disable web filter profile. disable webfilter-profile Web filter profile. (Empty) spamfilter-profile-status Enable/disable spam filter. disable spamfilter-profile Spam filter profile. (Empty) dlp-sensor-status Enable/disable DLP sensor. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 121 dlp-sensor DLP sensor. (Empty) scan-botnetconnections Enable/disable scanning of connections to Botnet servers. disable label Label. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 122 firewall/interface-policy6 CLI Syntax config firewall interface-policy6 edit <name_str> set policyid <integer> set status {enable | disable} set logtraffic {all | utm | disable} set address-type {ipv4 | ipv6} set interface <string> config srcaddr6 edit <name_str> set name <string> end config dstaddr6 edit <name_str> set name <string> end config service6 edit <name_str> set name <string> end set application-list-status {enable | disable} set application-list <string> set casi-profile-status {enable | disable} set casi-profile <string> set ips-sensor-status {enable | disable} set ips-sensor <string> set dsri {enable | disable} set av-profile-status {enable | disable} set av-profile <string> set webfilter-profile-status {enable | disable} set webfilter-profile <string> set spamfilter-profile-status {enable | disable} set spamfilter-profile <string> set dlp-sensor-status {enable | disable} set dlp-sensor <string> set scan-botnet-connections {disable | block | monitor} set label <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 123 Description Configuration Description Default Value policyid Policy ID. 0 status Enable/disable policy status. enable logtraffic Enable/disable interface log traffic. utm address-type Policy address type. ipv6 interface Interface name. (Empty) srcaddr6 IPv6 source address name. (Empty) dstaddr6 IPv6 destination address name. (Empty) service6 Service name. (Empty) application-list-status Enable/disable application control. disable application-list Application list name. (Empty) casi-profile-status Enable/disable CASI. disable casi-profile CASI profile name. (Empty) ips-sensor-status Enable/disable IPS sensor. disable ips-sensor IPS sensor name. (Empty) dsri Enable/disable DSRI. disable av-profile-status Enable/disable antivirus. disable av-profile Antivirus profile. (Empty) webfilter-profile-status Enable/disable web filter profile. disable webfilter-profile Web filter profile. (Empty) spamfilter-profile-status Enable/disable spam filter. disable spamfilter-profile Spam filter profile. (Empty) dlp-sensor-status Enable/disable DLP sensor. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 124 dlp-sensor DLP sensor. (Empty) scan-botnetconnections Enable/disable scanning of connections to Botnet servers. disable label Label. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 125 firewall/ip-translation CLI Syntax config firewall ip-translation edit <name_str> set transid <integer> set type {SCTP} set startip <ipv4-address-any> set endip <ipv4-address-any> set map-startip <ipv4-address-any> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 126 Description Configuration Description Default Value transid IP translation ID. 0 type IP translation type. SCTP startip Start IP. 0.0.0.0 endip End IP. 0.0.0.0 map-startip Mapped start IP. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 127 firewall/ippool CLI Syntax config firewall ippool edit <name_str> set name <string> set type {overload | one-to-one | fixed-port-range | port-block-allocation} set startip <ipv4-address-any> set endip <ipv4-address-any> set source-startip <ipv4-address-any> set source-endip <ipv4-address-any> set block-size <integer> set num-blocks-per-user <integer> set permit-any-host {disable | enable} set arp-reply {disable | enable} set arp-intf <string> set comments <var-string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 128 Description Configuration Description Default Value name IP pool name. (Empty) type IP pool type. overload startip Start IP. 0.0.0.0 endip End IP. 0.0.0.0 source-startip Source start IP. 0.0.0.0 source-endip Source end IP. 0.0.0.0 block-size Block size. 128 num-blocks-per-user Number of blocks per user (1 - 128). 8 permit-any-host Enable/disable full cone. disable arp-reply Enable/disable ARP reply. enable arp-intf ARP reply interface. Any if unset. (Empty) comments Comment. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 129 firewall/ippool6 CLI Syntax config firewall ippool6 edit <name_str> set name <string> set startip <ipv6-address> set endip <ipv6-address> set comments <var-string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 130 Description Configuration Description Default Value name IPv6 pool name. (Empty) startip Start IP. :: endip End IP. :: comments Comment. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 131 firewall/ipv6-eh-filter CLI Syntax config firewall ipv6-eh-filter edit <name_str> set hop-opt {enable | disable} set dest-opt {enable | disable} set hdopt-type <integer> set routing {enable | disable} set routing-type <integer> set fragment {enable | disable} set auth {enable | disable} set no-next {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 132 Description Configuration Description Default Value hop-opt Block packets with Hop-by-Hop Options header. disable dest-opt Block packets with Destination Options header. disable hdopt-type Block specific Hop-by-Hop and/or Destination Option types (maximum 7 types, each between 0 and 255). (Empty) routing Block packets with Routing header. enable routing-type Block specific Routing header types (maximum 7 types, each between 0 and 255). 0 fragment Block packets with Fragment header. disable auth Block packets with Authentication header. disable no-next Block packets with No Next header. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 133 firewall/ldb-monitor CLI Syntax config firewall ldb-monitor edit <name_str> set name <string> set type {ping | tcp | http | passive-sip} set interval <integer> set timeout <integer> set retry <integer> set port <integer> set http-get <string> set http-match <string> set http-max-redirects <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 134 Description Configuration Description Default Value name Monitor name. (Empty) type Monitor type. (Empty) interval Detect interval. 10 timeout Detect request timeout. 2 retry Number of detect tries before bring server down. 3 port Service port. 0 http-get HTTP get URL string. (Empty) http-match String for matching HTTP-get response. (Empty) http-max-redirects The maximum number of HTTP redirects to be allowed. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 135 firewall/local-in-policy CLI Syntax config firewall local-in-policy edit <name_str> set policyid <integer> set ha-mgmt-intf-only {enable | disable} set intf <string> config srcaddr edit <name_str> set name <string> end config dstaddr edit <name_str> set name <string> end set action {accept | deny} config service edit <name_str> set name <string> end set schedule <string> set status {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 136 Description Configuration Description Default Value policyid User defined local in policy ID. 0 ha-mgmt-intf-only Enable/disable dedication of HA management interface only for local-in policy. disable intf Source interface name. (Empty) srcaddr Source address name. (Empty) dstaddr Destination address name. (Empty) action Local-In policy action. deny service Service name. (Empty) schedule Schedule name. (Empty) status Enable/disable policy status. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 137 firewall/local-in-policy6 CLI Syntax config firewall local-in-policy6 edit <name_str> set policyid <integer> set intf <string> config srcaddr edit <name_str> set name <string> end config dstaddr edit <name_str> set name <string> end set action {accept | deny} config service edit <name_str> set name <string> end set schedule <string> set status {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 138 Description Configuration Description Default Value policyid User defined local in policy ID. 0 intf Source interface name. (Empty) srcaddr Source address name. (Empty) dstaddr Destination address name. (Empty) action Local-In policy action. deny service Service name. (Empty) schedule Schedule name. (Empty) status Enable/disable policy status. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 139 firewall/multicast-address CLI Syntax config firewall multicast-address edit <name_str> set name <string> set type {multicastrange | broadcastmask} set subnet <ipv4-classnet-any> set start-ip <ipv4-address-any> set end-ip <ipv4-address-any> set comment <var-string> set visibility {enable | disable} set associated-interface <string> set color <integer> config tags edit <name_str> set name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 140 Description Configuration Description Default Value name Multicast address name. (Empty) type type multicastrange subnet Broadcast address and subnet. 0.0.0.0 0.0.0.0 start-ip Start IP. 0.0.0.0 end-ip End IP. 0.0.0.0 comment Comment. (Empty) visibility Enable/disable multicast address visibility. enable associated-interface Associated interface name. (Empty) color GUI icon color. 0 tags Applied object tags. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 141 firewall/multicast-address6 CLI Syntax config firewall multicast-address6 edit <name_str> set name <string> set ip6 <ipv6-network> set comment <var-string> set visibility {enable | disable} set color <integer> config tags edit <name_str> set name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 142 Description Configuration Description Default Value name IPv6 multicast address name. (Empty) ip6 IPv6 address prefix. ::/0 comment Comment. (Empty) visibility Enable/disable multicast address visibility. enable color GUI icon color. 0 tags Applied object tags. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 143 firewall/multicast-policy CLI Syntax config firewall multicast-policy edit <name_str> set id <integer> set status {enable | disable} set logtraffic {enable | disable} set srcintf <string> set dstintf <string> config srcaddr edit <name_str> set name <string> end config dstaddr edit <name_str> set name <string> end set snat {enable | disable} set snat-ip <ipv4-address> set dnat <ipv4-address-any> set action {accept | deny} set protocol <integer> set start-port <integer> set end-port <integer> set auto-asic-offload {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 144 Description Configuration Description Default Value id Policy ID. 0 status Enable/disable policy status. enable logtraffic Enable/disable policy log traffic. disable srcintf Source interface name. (Empty) dstintf Destination interface name. (Empty) srcaddr Source address name. (Empty) dstaddr Destination address name. (Empty) snat Enable/disable NAT source address. disable snat-ip NAT source address. 0.0.0.0 dnat NAT destination address. 0.0.0.0 action Policy action. accept protocol Protocol number. 0 start-port Start port number. 1 end-port End port number. 65535 auto-asic-offload Enable/disable policy traffic ASIC offloading. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 145 firewall/multicast-policy6 CLI Syntax config firewall multicast-policy6 edit <name_str> set id <integer> set status {enable | disable} set logtraffic {enable | disable} set srcintf <string> set dstintf <string> config srcaddr edit <name_str> set name <string> end config dstaddr edit <name_str> set name <string> end set action {accept | deny} set protocol <integer> set start-port <integer> set end-port <integer> set auto-asic-offload {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 146 Description Configuration Description Default Value id Policy ID. 0 status Enable/disable multicast IPv6 policy status. enable logtraffic Enable/disable multicast IPv6 policy log traffic. disable srcintf IPv6 source interface name. (Empty) dstintf IPv6 destination interface name. (Empty) srcaddr IPv6 source address name. (Empty) dstaddr IPv6 destination address name. (Empty) action Policy action. accept protocol Protocol number. 0 start-port Start port number. 1 end-port End port number. 65535 auto-asic-offload Enable/disable policy traffic ASIC offloading. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 147 firewall/policy CLI Syntax config firewall policy edit <name_str> set policyid <integer> set name <string> set uuid <uuid> config srcintf edit <name_str> set name <string> end config dstintf edit <name_str> set name <string> end config srcaddr edit <name_str> set name <string> end config dstaddr edit <name_str> set name <string> end set rtp-nat {disable | enable} config rtp-addr edit <name_str> set name <string> end set learning-mode {enable | disable} set action {accept | deny | ipsec | ssl-vpn} set send-deny-packet {disable | enable} set firewall-session-dirty {check-all | check-new} set status {enable | disable} set schedule <string> set schedule-timeout {enable | disable} config service edit <name_str> set name <string> end set utm-status {enable | disable} set profile-type {single | group} set profile-group <string> set av-profile <string> set webfilter-profile <string> set dnsfilter-profile <string> set spamfilter-profile <string> set dlp-sensor <string> set ips-sensor <string> set application-list <string> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 148 set casi-profile <string> set voip-profile <string> set icap-profile <string> set waf-profile <string> set profile-protocol-options <string> set ssl-ssh-profile <string> set logtraffic {all | utm | disable} set logtraffic-start {enable | disable} set capture-packet {enable | disable} set auto-asic-offload {enable | disable} set wanopt {enable | disable} set wanopt-detection {active | passive | off} set wanopt-passive-opt {default | transparent | non-transparent} set wanopt-profile <string> set wanopt-peer <string> set webcache {enable | disable} set webcache-https {disable | ssl-server | any | enable} set traffic-shaper <string> set traffic-shaper-reverse <string> set per-ip-shaper <string> set nat {enable | disable} set permit-any-host {enable | disable} set permit-stun-host {enable | disable} set fixedport {enable | disable} set ippool {enable | disable} config poolname edit <name_str> set name <string> end set session-ttl <integer> set vlan-cos-fwd <integer> set vlan-cos-rev <integer> set inbound {enable | disable} set outbound {enable | disable} set natinbound {enable | disable} set natoutbound {enable | disable} set wccp {enable | disable} set ntlm {enable | disable} set ntlm-guest {enable | disable} config ntlm-enabled-browsers edit <name_str> set user-agent-string <string> end set fsso {enable | disable} set wsso {enable | disable} set rsso {enable | disable} set fsso-agent-for-ntlm <string> config groups edit <name_str> set name <string> end config users edit <name_str> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 149 edit <name_str> set name <string> end config devices edit <name_str> set name <string> end set auth-path {enable | disable} set disclaimer {enable | disable} set vpntunnel <string> set natip <ipv4-classnet> set match-vip {enable | disable} set diffserv-forward {enable | disable} set diffserv-reverse {enable | disable} set diffservcode-forward <user> set diffservcode-rev <user> set tcp-mss-sender <integer> set tcp-mss-receiver <integer> set comments <var-string> set label <string> set global-label <string> set auth-cert <string> set auth-redirect-addr <string> set redirect-url <string> set identity-based-route <string> set block-notification {enable | disable} config custom-log-fields edit <name_str> set field-id <string> end config tags edit <name_str> set name <string> end set replacemsg-override-group <string> set srcaddr-negate {enable | disable} set dstaddr-negate {enable | disable} set service-negate {enable | disable} set timeout-send-rst {enable | disable} set captive-portal-exempt {enable | disable} set ssl-mirror {enable | disable} config ssl-mirror-intf edit <name_str> set name <string> end set scan-botnet-connections {disable | block | monitor} set dsri {enable | disable} set delay-tcp-npu-sessoin {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 150 Description Configuration Description Default Value policyid Policy ID. 0 name Policy name. (Empty) uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 srcintf Source interface name. (Empty) dstintf Destination interface name. (Empty) srcaddr Source address name. (Empty) dstaddr Destination address name. (Empty) rtp-nat Enable/disable use of this policy for RTP NAT. disable rtp-addr RTP NAT address name. (Empty) learning-mode Enable/disable learning mode for policy. disable action Policy action. deny send-deny-packet Enable/disable deny-packet sending. disable firewall-session-dirty Packet session management. check-all status Enable/disable policy status. enable schedule Schedule name. (Empty) schedule-timeout Enable/disable schedule timeout. disable service Service name. (Empty) utm-status Enable AV/web/IPS protection profile. disable profile-type profile type single profile-group profile group (Empty) av-profile Antivirus profile. (Empty) webfilter-profile Web filter profile. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 151 dnsfilter-profile DNS filter profile. (Empty) spamfilter-profile Spam filter profile. (Empty) dlp-sensor DLP sensor. (Empty) ips-sensor IPS sensor. (Empty) application-list Application list. (Empty) casi-profile CASI profile. (Empty) voip-profile VoIP profile. (Empty) icap-profile ICAP profile. (Empty) waf-profile Web application firewall profile. (Empty) profile-protocol-options Profile protocol options. (Empty) ssl-ssh-profile SSL SSH Profile. (Empty) logtraffic Enable/disable policy log traffic. utm logtraffic-start Enable/disable policy log traffic start. disable capture-packet Enable/disable capture packets. disable auto-asic-offload Enable/disable policy traffic ASIC offloading. enable wanopt Enable/disable WAN optimization. disable wanopt-detection WAN optimization auto-detection mode. active wanopt-passive-opt WAN optimization passive mode options. This option decides what IP address will be used to connect server. default wanopt-profile WAN optimization profile. (Empty) wanopt-peer WAN optimization peer. (Empty) webcache Enable/disable web cache. disable webcache-https Enable/disable web cache for HTTPS. disable traffic-shaper Traffic shaper. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 152 traffic-shaper-reverse Traffic shaper. (Empty) per-ip-shaper Per-IP shaper. (Empty) nat Enable/disable policy NAT. disable permit-any-host Enable/disable permit any host in. disable permit-stun-host Enable/disable permit stun host in. disable fixedport Enable/disable policy fixed port. disable ippool Enable/disable policy IP pool. disable poolname Policy IP pool names. (Empty) session-ttl Session TTL. 0 vlan-cos-fwd VLAN forward direction user priority. 255 vlan-cos-rev VLAN reverse direction user priority. 255 inbound Enable/disable policy inbound. disable outbound Enable/disable policy outbound. disable natinbound Enable/disable policy NAT inbound. disable natoutbound Enable/disable policy NAT outbound. disable wccp Enable/disable Web Cache Coordination Protocol (WCCP). disable ntlm Enable/disable NTLM authentication. disable ntlm-guest Enable/disable guest user for NTLM authentication. disable ntlm-enabled-browsers User agent strings for NTLM enabled browsers. (Empty) fsso Enable/disable Fortinet Single Sign-On. disable wsso Enable/disable WiFi Single Sign-On. enable rsso Enable/disable RADIUS Single Sign-On. disable fsso-agent-for-ntlm Specify FSSO agent for NTLM authentication. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 153 groups User authentication groups. (Empty) users User name. (Empty) devices Devices or device groups. (Empty) auth-path Enable/disable authentication-based routing. disable disclaimer Enable/disable user authentication disclaimer. disable vpntunnel Policy VPN tunnel. (Empty) natip NAT address. 0.0.0.0 0.0.0.0 match-vip Enable/disable match DNATed packet. disable diffserv-forward Enable/disable forward (original) traffic DiffServ. disable diffserv-reverse Enable/disable reverse (reply) traffic DiffServ. disable diffservcode-forward Forward (original) traffic DiffServ code point value. 000000 diffservcode-rev Reverse (reply) traffic DiffServ code point value. 000000 tcp-mss-sender TCP MSS value of sender. 0 tcp-mss-receiver TCP MSS value of receiver. 0 comments Comment. (Empty) label Label for section view. (Empty) global-label Label for global view. (Empty) auth-cert HTTPS server certificate for policy authentication. (Empty) auth-redirect-addr HTTP-to-HTTPS redirect address for firewall authentication. (Empty) redirect-url URL redirection after disclaimer/authentication. (Empty) identity-based-route Name of identity-based routing rule. (Empty) block-notification Enable/disable block notification. disable custom-log-fields Custom log fields. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 154 tags Applied object tags. (Empty) replacemsg-overridegroup Specify authentication replacement message override group. (Empty) srcaddr-negate Enable/disable negated source address match. disable dstaddr-negate Enable/disable negated destination address match. disable service-negate Enable/disable negated service match. disable timeout-send-rst Enable/disable sending of RST packet upon TCP session expiration. disable captive-portal-exempt Enable/disable exemption of captive portal. disable ssl-mirror Enable/disable SSL mirror. disable ssl-mirror-intf Mirror interface name. (Empty) scan-botnetconnections Enable/disable scanning of connections to Botnet servers. disable dsri Enable/disable DSRI. disable delay-tcp-npu-sessoin Enable/disable TCP NPU session delay in order to guarantee packet order of 3-way handshake. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 155 firewall/policy46 CLI Syntax config firewall policy46 edit <name_str> set permit-any-host {enable | disable} set policyid <integer> set uuid <uuid> set srcintf <string> set dstintf <string> config srcaddr edit <name_str> set name <string> end config dstaddr edit <name_str> set name <string> end set action {accept | deny} set status {enable | disable} set schedule <string> config service edit <name_str> set name <string> end set logtraffic {enable | disable} set traffic-shaper <string> set traffic-shaper-reverse <string> set per-ip-shaper <string> set fixedport {enable | disable} set tcp-mss-sender <integer> set tcp-mss-receiver <integer> set comments <var-string> config tags edit <name_str> set name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 156 Description Configuration Description Default Value permit-any-host Enable/disable permit any host in. disable policyid Policy ID. 0 uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 srcintf Source interface name. (Empty) dstintf Destination interface name. (Empty) srcaddr Source address name. (Empty) dstaddr Destination address name. (Empty) action Policy action. deny status Policy status. enable schedule Schedule name. (Empty) service Service name. (Empty) logtraffic Enable/disable traffic log. disable traffic-shaper Traffic shaper. (Empty) traffic-shaper-reverse Reverse traffic shaper. (Empty) per-ip-shaper Per IP traffic shaper. (Empty) fixedport Enable/disable policy fixed port. disable tcp-mss-sender TCP MSS value of sender. 0 tcp-mss-receiver TCP MSS value of receiver. 0 comments Comment. (Empty) tags Applied object tags. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 157 firewall/policy6 CLI Syntax config firewall policy6 edit <name_str> set policyid <integer> set name <string> set uuid <uuid> config srcintf edit <name_str> set name <string> end config dstintf edit <name_str> set name <string> end config srcaddr edit <name_str> set name <string> end config dstaddr edit <name_str> set name <string> end set action {accept | deny | ipsec | ssl-vpn} set firewall-session-dirty {check-all | check-new} set status {enable | disable} set vlan-cos-fwd <integer> set vlan-cos-rev <integer> set schedule <string> config service edit <name_str> set name <string> end set utm-status {enable | disable} set profile-type {single | group} set profile-group <string> set av-profile <string> set webfilter-profile <string> set spamfilter-profile <string> set dlp-sensor <string> set ips-sensor <string> set application-list <string> set casi-profile <string> set voip-profile <string> set icap-profile <string> set profile-protocol-options <string> set ssl-ssh-profile <string> set logtraffic {all | utm | disable} set logtraffic-start {enable | disable} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 158 set auto-asic-offload {enable | disable} set traffic-shaper <string> set traffic-shaper-reverse <string> set per-ip-shaper <string> set nat {enable | disable} set fixedport {enable | disable} set ippool {enable | disable} config poolname edit <name_str> set name <string> end set session-ttl <integer> set inbound {enable | disable} set outbound {enable | disable} set natinbound {enable | disable} set natoutbound {enable | disable} set send-deny-packet {enable | disable} set vpntunnel <string> set diffserv-forward {enable | disable} set diffserv-reverse {enable | disable} set diffservcode-forward <user> set diffservcode-rev <user> set tcp-mss-sender <integer> set tcp-mss-receiver <integer> set comments <var-string> set label <string> set global-label <string> set rsso {enable | disable} config custom-log-fields edit <name_str> set field-id <string> end config tags edit <name_str> set name <string> end set replacemsg-override-group <string> set srcaddr-negate {enable | disable} set dstaddr-negate {enable | disable} set service-negate {enable | disable} config groups edit <name_str> set name <string> end config users edit <name_str> set name <string> end config devices edit <name_str> set name <string> end set timeout-send-rst {enable | disable} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 159 set timeout-send-rst {enable | disable} set ssl-mirror {enable | disable} config ssl-mirror-intf edit <name_str> set name <string> end set dsri {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 160 Description Configuration Description Default Value policyid Policy ID. 0 name Policy name. (Empty) uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 srcintf Source interface name. (Empty) dstintf Destination interface name. (Empty) srcaddr Source address name. (Empty) dstaddr Destination address name. (Empty) action Policy action. deny firewall-session-dirty Packet session management. check-all status Enable/disable policy status. enable vlan-cos-fwd VLAN forward direction user priority. 255 vlan-cos-rev VLAN reverse direction user priority. 255 schedule Schedule name. (Empty) service Service name. (Empty) utm-status Enable AV/web/ips protection profile. disable profile-type profile type single profile-group profile group (Empty) av-profile Antivirus profile. (Empty) webfilter-profile Web filter profile. (Empty) spamfilter-profile Spam filter profile. (Empty) dlp-sensor DLP sensor. (Empty) ips-sensor IPS sensor. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 161 application-list Application list. (Empty) casi-profile CASI profile. (Empty) voip-profile VoIP profile. (Empty) icap-profile ICAP profile. (Empty) profile-protocol-options Profile protocol options. (Empty) ssl-ssh-profile SSL SSH Profile. (Empty) logtraffic Enable/disable policy log traffic. utm logtraffic-start Enable/disable policy log traffic start. disable auto-asic-offload Enable/disable policy traffic ASIC offloading. enable traffic-shaper Traffic shaper. (Empty) traffic-shaper-reverse Traffic shaper. (Empty) per-ip-shaper Per-IP shaper. (Empty) nat Enable/disable policy NAT. disable fixedport Enable/disable policy fixed port. disable ippool Enable/disable policy IP pool. disable poolname Policy IP pool names. (Empty) session-ttl Session TTL. 0 inbound Enable/disable policy inbound. disable outbound Enable/disable policy outbound. disable natinbound Enable/disable policy NAT inbound. disable natoutbound Enable/disable policy NAT outbound. disable send-deny-packet Enable/disable return of deny-packet. disable vpntunnel Policy VPN tunnel. (Empty) diffserv-forward Enable/disable forward (original) traffic DiffServ. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 162 diffserv-reverse Enable/disable reverse (reply) traffic DiffServ. disable diffservcode-forward Forward (original) Traffic DiffServ code point value. 000000 diffservcode-rev Reverse (reply) Traffic DiffServ code point value. 000000 tcp-mss-sender TCP MSS value of sender. 0 tcp-mss-receiver TCP MSS value of receiver. 0 comments Comment. (Empty) label Label for section view. (Empty) global-label Label for global view. (Empty) rsso Enable/disable RADIUS Single Sign-On. disable custom-log-fields Custom log fields. (Empty) tags Applied object tags. (Empty) replacemsg-overridegroup Specify authentication replacement message override group. (Empty) srcaddr-negate Enable/disable negated source address match. disable dstaddr-negate Enable/disable negated destination address match. disable service-negate Enable/disable negated service match. disable groups User authentication groups. (Empty) users User name. (Empty) devices Devices or device groups. (Empty) timeout-send-rst Enable/disable sending of RST packet upon TCP session expiration. disable ssl-mirror Enable/disable SSL mirror. disable ssl-mirror-intf Mirror interface name. (Empty) dsri Enable/disable DSRI. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 163 firewall/policy64 CLI Syntax config firewall policy64 edit <name_str> set policyid <integer> set uuid <uuid> set srcintf <string> set dstintf <string> config srcaddr edit <name_str> set name <string> end config dstaddr edit <name_str> set name <string> end set action {accept | deny} set status {enable | disable} set schedule <string> config service edit <name_str> set name <string> end set logtraffic {enable | disable} set permit-any-host {enable | disable} set traffic-shaper <string> set traffic-shaper-reverse <string> set per-ip-shaper <string> set fixedport {enable | disable} set ippool {enable | disable} config poolname edit <name_str> set name <string> end set tcp-mss-sender <integer> set tcp-mss-receiver <integer> set comments <var-string> config tags edit <name_str> set name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 164 Description Configuration Description Default Value policyid Policy ID. 0 uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 srcintf Source interface name. (Empty) dstintf Destination interface name. (Empty) srcaddr Source address name. (Empty) dstaddr Destination address name. (Empty) action Policy action. deny status Enable/disable policy status. enable schedule Schedule name. (Empty) service Service name. (Empty) logtraffic Enable/disable policy log traffic. disable permit-any-host Enable/disable permit any host in. disable traffic-shaper Traffic shaper. (Empty) traffic-shaper-reverse Reverse traffic shaper. (Empty) per-ip-shaper Per-IP traffic shaper. (Empty) fixedport Enable/disable policy fixed port. disable ippool Enable/disable policy64 IP pool. disable poolname Policy IP pool names. (Empty) tcp-mss-sender TCP MSS value of sender. 0 tcp-mss-receiver TCP MSS value of receiver. 0 comments Comment. (Empty) tags Applied object tags. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 165 firewall/profile-group CLI Syntax config firewall profile-group edit <name_str> set name <string> set av-profile <string> set webfilter-profile <string> set dnsfilter-profile <string> set spamfilter-profile <string> set dlp-sensor <string> set ips-sensor <string> set application-list <string> set casi-profile <string> set voip-profile <string> set icap-profile <string> set waf-profile <string> set profile-protocol-options <string> set ssl-ssh-profile <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 166 Description Configuration Description Default Value name Profile group name. (Empty) av-profile Antivirus profile. (Empty) webfilter-profile Web filter profile. (Empty) dnsfilter-profile DNS filter profile. (Empty) spamfilter-profile Spam filter profile. (Empty) dlp-sensor DLP sensor. (Empty) ips-sensor IPS sensor. (Empty) application-list Application list. (Empty) casi-profile CASI profile. (Empty) voip-profile VoIP profile. (Empty) icap-profile ICAP profile. (Empty) waf-profile Web application firewall profile. (Empty) profile-protocol-options Profile protocol options. (Empty) ssl-ssh-profile SSL SSH Profile. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 167 firewall/profile-protocol-options CLI Syntax config firewall profile-protocol-options edit <name_str> set name <string> set comment <var-string> set replacemsg-group <string> set oversize-log {disable | enable} set switching-protocols-log {disable | enable} config http edit <name_str> set ports <integer> set status {enable | disable} set inspect-all {enable | disable} set options {clientcomfort | servercomfort | oversize | no-content-summary | c hunkedbypass} set comfort-interval <integer> set comfort-amount <integer> set range-block {disable | enable} set post-lang {jisx0201 | jisx0208 | jisx0212 | gb2312 | ksc5601-ex | euc-jp | sjis | iso2022-jp | iso2022-jp-1 | iso2022-jp-2 | euc-cn | ces-gbk | hz | ces-big5 | euc-kr | iso2022-jp-3 | iso8859-1 | tis620 | cp874 | cp1252 | cp1251} set fortinet-bar {enable | disable} set fortinet-bar-port <integer> set streaming-content-bypass {enable | disable} set switching-protocols {bypass | block} set oversize-limit <integer> set uncompressed-oversize-limit <integer> set uncompressed-nest-limit <integer> set scan-bzip2 {enable | disable} set block-page-status-code <integer> set retry-count <integer> end config ftp edit <name_str> set ports <integer> set status {enable | disable} set inspect-all {enable | disable} set options {clientcomfort | oversize | no-content-summary | splice | bypass-r est-command | bypass-mode-command} set comfort-interval <integer> set comfort-amount <integer> set oversize-limit <integer> set uncompressed-oversize-limit <integer> set uncompressed-nest-limit <integer> set scan-bzip2 {enable | disable} end config imap edit <name_str> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 168 set ports <integer> set status {enable | disable} set inspect-all {enable | disable} set options {fragmail | oversize | no-content-summary} set oversize-limit <integer> set uncompressed-oversize-limit <integer> set uncompressed-nest-limit <integer> set scan-bzip2 {enable | disable} end config mapi edit <name_str> set ports <integer> set status {enable | disable} set options {fragmail | oversize | no-content-summary} set oversize-limit <integer> set uncompressed-oversize-limit <integer> set uncompressed-nest-limit <integer> set scan-bzip2 {enable | disable} end config pop3 edit <name_str> set ports <integer> set status {enable | disable} set inspect-all {enable | disable} set options {fragmail | oversize | no-content-summary} set oversize-limit <integer> set uncompressed-oversize-limit <integer> set uncompressed-nest-limit <integer> set scan-bzip2 {enable | disable} end config smtp edit <name_str> set ports <integer> set status {enable | disable} set inspect-all {enable | disable} set options {fragmail | oversize | no-content-summary | splice} set oversize-limit <integer> set uncompressed-oversize-limit <integer> set uncompressed-nest-limit <integer> set scan-bzip2 {enable | disable} set server-busy {enable | disable} end config nntp edit <name_str> set ports <integer> set status {enable | disable} set inspect-all {enable | disable} set options {oversize | no-content-summary | splice} set oversize-limit <integer> set uncompressed-oversize-limit <integer> set uncompressed-nest-limit <integer> set scan-bzip2 {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 169 end config dns edit <name_str> set ports <integer> set status {enable | disable} end config mail-signature edit <name_str> set status {disable | enable} set signature <string> end set rpc-over-http {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 170 Description Configuration Description Default Value name Name. (Empty) comment Comment. (Empty) replacemsg-group Replacement message group. (Empty) oversize-log Enable/disable logging for antivirus oversize file blocking. disable switching-protocols-log Enable/disable logging of HTTP/HTTPS switching protocols. disable http HTTP. Details below Configuration ports status inspect-all options comfort-interval comfort-amount range-block post-lang fortinet-bar fortinet-bar-port streaming-content-bypass switching-protocols oversize-limit uncompressed-oversize-limit uncompressed-nest-limit scan-bzip2 block-page-status-code retry-count ftp FTP. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Default Value (Empty) enable disable (Empty) 10 1 disable (Empty) disable 8011 enable bypass 10 10 12 enable 200 0 Details below 171 Configuration ports status inspect-all options comfort-interval comfort-amount oversize-limit uncompressed-oversize-limit uncompressed-nest-limit scan-bzip2 imap Default Value (Empty) enable disable (Empty) 10 1 10 10 12 enable IMAP. Configuration ports status inspect-all options oversize-limit uncompressed-oversize-limit uncompressed-nest-limit scan-bzip2 mapi Details below Default Value (Empty) enable disable (Empty) 10 10 12 enable MAPI Configuration ports status options oversize-limit uncompressed-oversize-limit uncompressed-nest-limit scan-bzip2 pop3 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. POP3. Details below Default Value (Empty) enable (Empty) 10 10 12 enable Details below 172 Configuration ports status inspect-all options oversize-limit uncompressed-oversize-limit uncompressed-nest-limit scan-bzip2 smtp Default Value (Empty) enable disable (Empty) 10 10 12 enable SMTP. Configuration ports status inspect-all options oversize-limit uncompressed-oversize-limit uncompressed-nest-limit scan-bzip2 server-busy nntp Details below Default Value (Empty) enable disable (Empty) 10 10 12 enable disable NNTP. Configuration ports status inspect-all options oversize-limit uncompressed-oversize-limit uncompressed-nest-limit scan-bzip2 dns Details below Default Value (Empty) enable disable (Empty) 10 10 12 enable DNS. Configuration ports status mail-signature CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Details below Default Value (Empty) enable Mail signature. Details below 173 Configuration status signature rpc-over-http CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Default Value disable (Empty) Enable/disable inspection of RPC over HTTP. enable 174 firewall/shaping-policy CLI Syntax config firewall shaping-policy edit <name_str> set id <integer> set status {enable | disable} set ip-version {4 | 6} config srcaddr edit <name_str> set name <string> end config dstaddr edit <name_str> set name <string> end config srcaddr6 edit <name_str> set name <string> end config dstaddr6 edit <name_str> set name <string> end config service edit <name_str> set name <string> end config users edit <name_str> set name <string> end config groups edit <name_str> set name <string> end config application edit <name_str> set id <integer> end config app-category edit <name_str> set id <integer> end config url-category edit <name_str> set id <integer> end config dstintf edit <name_str> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 175 set name <string> end set traffic-shaper <string> set traffic-shaper-reverse <string> set per-ip-shaper <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 176 Description Configuration Description Default Value id Shaping policy ID. 0 status Enable/disable traffic shaping policy. enable ip-version IP version. 4 srcaddr Source address. (Empty) dstaddr Destination address. (Empty) srcaddr6 IPv6 source address. (Empty) dstaddr6 IPv6 destination address. (Empty) service Service name. (Empty) users User name. (Empty) groups User authentication groups. (Empty) application Application ID list. (Empty) app-category Application category ID list. (Empty) url-category URL category ID list. (Empty) dstintf Destination interface list. (Empty) traffic-shaper Forward traffic shaper. (Empty) traffic-shaper-reverse Reverse traffic shaper. (Empty) per-ip-shaper Per IP shaper. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 177 firewall/sniffer CLI Syntax config firewall sniffer edit <name_str> set id <integer> set status {enable | disable} set logtraffic {all | utm | disable} set ipv6 {enable | disable} set non-ip {enable | disable} set interface <string> set host <string> set port <string> set protocol <string> set vlan <string> set application-list-status {enable | disable} set application-list <string> set casi-profile-status {enable | disable} set casi-profile <string> set ips-sensor-status {enable | disable} set ips-sensor <string> set dsri {enable | disable} set av-profile-status {enable | disable} set av-profile <string> set webfilter-profile-status {enable | disable} set webfilter-profile <string> set spamfilter-profile-status {enable | disable} set spamfilter-profile <string> set dlp-sensor-status {enable | disable} set dlp-sensor <string> set ips-dos-status {enable | disable} config anomaly edit <name_str> set name <string> set status {disable | enable} set log {enable | disable} set action {pass | block | proxy} set quarantine {none | attacker | both | interface} set quarantine-expiry <user> set quarantine-log {disable | enable} set threshold <integer> set threshold(default) <integer> end set scan-botnet-connections {disable | block | monitor} set max-packet-count <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 178 Description Configuration Description Default Value id Sniffer ID. 0 status Enable/disable sniffer status. enable logtraffic Enable/disable sniffer log traffic. utm ipv6 Enable/disable sniffer for IPv6 packets. disable non-ip Enable/disable sniffer for non-IP packets. disable interface Interface name. (Empty) host Host list (IP or IP/mask or IP range). (Empty) port Port list. (Empty) protocol IP protocol list. (Empty) vlan VLAN list. (Empty) application-list-status Enable/disable application control. disable application-list Application list name. (Empty) casi-profile-status Enable/disable CASI. disable casi-profile CASI profile name. (Empty) ips-sensor-status Enable/disable IPS sensor. disable ips-sensor IPS sensor name. (Empty) dsri Enable/disable DSRI. disable av-profile-status Enable/disable antivirus. disable av-profile Antivirus profile. (Empty) webfilter-profile-status Enable/disable web filter. disable webfilter-profile Web filter profile. (Empty) spamfilter-profile-status Enable/disable spam filter. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 179 spamfilter-profile Spam filter profile. (Empty) dlp-sensor-status Enable/disable DLP sensor. disable dlp-sensor DLP sensor. (Empty) ips-dos-status Enable/disable IPS DoS anomaly detection. disable anomaly Configure anomaly. (Empty) scan-botnetconnections Enable/disable scanning of connections to Botnet servers. disable max-packet-count Maximum packet count. 4000 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 180 firewall/ssl-server CLI Syntax config firewall ssl-server edit <name_str> set name <string> set ip <ipv4-address-any> set port <integer> set ssl-mode {half | full} set add-header-x-forwarded-proto {enable | disable} set mapped-port <integer> set ssl-cert <string> set ssl-dh-bits {768 | 1024 | 1536 | 2048} set ssl-algorithm {high | medium | low} set ssl-client-renegotiation {allow | deny | secure} set ssl-min-version {ssl-3.0 | tls-1.0 | tls-1.1 | tls-1.2} set ssl-max-version {ssl-3.0 | tls-1.0 | tls-1.1 | tls-1.2} set ssl-send-empty-frags {enable | disable} set url-rewrite {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 181 Description Configuration Description Default Value name Server name. (Empty) ip Server IP address. 0.0.0.0 port Server service port. 443 ssl-mode SSL/TLS mode for encryption & decryption of traffic. full add-header-xforwarded-proto Enable/disable add X-Forwarded-Proto header to forwarded requests. enable mapped-port Mapped server service port. 80 ssl-cert Name of certificate for SSL connections to this server. Fortinet_CA_SSL ssl-dh-bits Size of Diffie-Hellman prime used in DHE-RSA negotiation. 2048 ssl-algorithm Relative strength of encryption algorithms accepted in negotiation. high ssl-client-renegotiation Allow/block client renegotiation by server. allow ssl-min-version Lowest SSL/TLS version to negotiate. tls-1.0 ssl-max-version Highest SSL/TLS version to negotiate. tls-1.2 ssl-send-empty-frags Enable/disable send empty fragments to avoid attack on CBC IV. enable url-rewrite Enable/disable rewrite URL. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 182 firewall/ssl-ssh-profile CLI Syntax config firewall ssl-ssh-profile edit <name_str> set name <string> set comment <var-string> config ssl edit <name_str> set inspect-all {disable | certificate-inspection | deep-inspection | enable} set client-cert-request {bypass | inspect | block} set unsupported-ssl {bypass | inspect | block} set allow-invalid-server-cert {enable | disable} set untrusted-cert {allow | block | ignore} end config https edit <name_str> set ports <integer> set status {disable | certificate-inspection | deep-inspection | enable} set client-cert-request {bypass | inspect | block} set unsupported-ssl {bypass | inspect | block} set allow-invalid-server-cert {enable | disable} set untrusted-cert {allow | block | ignore} end config ftps edit <name_str> set ports <integer> set status {disable | deep-inspection | enable} set client-cert-request {bypass | inspect | block} set unsupported-ssl {bypass | inspect | block} set allow-invalid-server-cert {enable | disable} set untrusted-cert {allow | block | ignore} end config imaps edit <name_str> set ports <integer> set status {disable | deep-inspection | enable} set client-cert-request {bypass | inspect | block} set unsupported-ssl {bypass | inspect | block} set allow-invalid-server-cert {enable | disable} set untrusted-cert {allow | block | ignore} end config pop3s edit <name_str> set ports <integer> set status {disable | deep-inspection | enable} set client-cert-request {bypass | inspect | block} set unsupported-ssl {bypass | inspect | block} set allow-invalid-server-cert {enable | disable} set untrusted-cert {allow | block | ignore} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 183 end config smtps edit <name_str> set ports <integer> set status {disable | deep-inspection | enable} set client-cert-request {bypass | inspect | block} set unsupported-ssl {bypass | inspect | block} set allow-invalid-server-cert {enable | disable} set untrusted-cert {allow | block | ignore} end config ssh edit <name_str> set ports <integer> set status {disable | deep-inspection | enable} set inspect-all {disable | deep-inspection | enable} set block {x11-filter | ssh-shell | exec | port-forward} set log {x11-filter | ssh-shell | exec | port-forward} end set whitelist {enable | disable} config ssl-exempt edit <name_str> set id <integer> set type {fortiguard-category | address | address6} set fortiguard-category <integer> set address <string> set address6 <string> end set server-cert-mode {re-sign | replace} set use-ssl-server {disable | enable} set caname <string> set untrusted-caname <string> set certname <string> set server-cert <string> config ssl-server edit <name_str> set id <integer> set ip <ipv4-address-any> set https-client-cert-request {bypass | inspect | block} set smtps-client-cert-request {bypass | inspect | block} set pop3s-client-cert-request {bypass | inspect | block} set imaps-client-cert-request {bypass | inspect | block} set ftps-client-cert-request {bypass | inspect | block} set ssl-other-client-cert-request {bypass | inspect | block} end set ssl-invalid-server-cert-log {disable | enable} set rpc-over-https {enable | disable} set mapi-over-https {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 184 Description Configuration Description Default Value name Name. (Empty) comment Comment. (Empty) ssl ssl Details below Configuration inspect-all client-cert-request unsupported-ssl allow-invalid-server-cert untrusted-cert https Default Value disable bypass bypass disable allow https Configuration ports status client-cert-request unsupported-ssl allow-invalid-server-cert untrusted-cert ftps Details below Default Value (Empty) deep-inspection bypass bypass disable allow ftps Configuration ports status client-cert-request unsupported-ssl allow-invalid-server-cert untrusted-cert imaps Configuration ports status client-cert-request unsupported-ssl allow-invalid-server-cert untrusted-cert CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Details below Default Value (Empty) deep-inspection bypass bypass disable allow imaps Details below Default Value (Empty) deep-inspection inspect bypass disable allow 185 pop3s pop3s Configuration ports status client-cert-request unsupported-ssl allow-invalid-server-cert untrusted-cert smtps Default Value (Empty) deep-inspection inspect bypass disable allow smtps Configuration ports status client-cert-request unsupported-ssl allow-invalid-server-cert untrusted-cert ssh Details below Details below Default Value (Empty) deep-inspection inspect bypass disable allow ssh Configuration ports status inspect-all block log Details below Default Value (Empty) deep-inspection disable (Empty) (Empty) whitelist Enable/disable exempt servers by FortiGuard whitelist. disable ssl-exempt Servers to exempt from SSL inspection. (Empty) server-cert-mode Re-sign or replace the server's certificate. re-sign use-ssl-server Enable/disable to use SSL server table for SSL offloading. disable caname CA certificate used by SSL Inspection. Fortinet_CA_SSL untrusted-caname Untrusted CA certificate used by SSL Inspection. Fortinet_CA_Untrusted certname Certificate containing the key to use when resigning server certificates for SSL inspection. Fortinet_SSL CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 186 server-cert Certificate used by SSL Inspection to replace server certificate. Fortinet_SSL ssl-server SSL servers. (Empty) ssl-invalid-server-certlog Enable/disable SSL server certificate validation logging. disable rpc-over-https Enable/disable inspection of RPC over HTTPS. enable mapi-over-https Enable/disable inspection of MAPI over HTTPS. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 187 firewall/ttl-policy CLI Syntax config firewall ttl-policy edit <name_str> set id <integer> set status {enable | disable} set action {accept | deny} set srcintf <string> config srcaddr edit <name_str> set name <string> end config service edit <name_str> set name <string> end set schedule <string> set ttl <user> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 188 Description Configuration Description Default Value id ID. 0 status status enable action Action. deny srcintf Source interface name. (Empty) srcaddr Source address name. (Empty) service Service name. (Empty) schedule Schedule name. (Empty) ttl TTL range. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 189 firewall/vip CLI Syntax config firewall vip edit <name_str> set name <string> set id <integer> set uuid <uuid> set comment <var-string> set type {static-nat | load-balance | server-load-balance | dns-translation | fqdn } set dns-mapping-ttl <integer> set ldb-method {static | round-robin | weighted | least-session | least-rtt | firs t-alive | http-host} config src-filter edit <name_str> set range <string> end set extip <user> config mappedip edit <name_str> set range <string> end set mapped-addr <string> set extintf <string> set arp-reply {disable | enable} set server-type {http | https | imaps | pop3s | smtps | ssl | tcp | udp | ip} set persistence {none | http-cookie | ssl-session-id} set nat-source-vip {disable | enable} set portforward {disable | enable} set protocol {tcp | udp | sctp | icmp} set extport <user> set mappedport <user> set gratuitous-arp-interval <integer> config srcintf-filter edit <name_str> set interface-name <string> end set portmapping-type {1-to-1 | m-to-n} config realservers edit <name_str> set id <integer> set ip <ipv4-address-any> set port <integer> set status {active | standby | disable} set weight <integer> set holddown-interval <integer> set healthcheck {disable | enable | vip} set http-host <string> set max-connections <integer> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 190 set monitor <string> set client-ip <user> end set http-cookie-domain-from-host {disable | enable} set http-cookie-domain <string> set http-cookie-path <string> set http-cookie-generation <integer> set http-cookie-age <integer> set http-cookie-share {disable | same-ip} set https-cookie-secure {disable | enable} set http-multiplex {enable | disable} set http-ip-header {enable | disable} set http-ip-header-name <string> set outlook-web-access {disable | enable} set weblogic-server {disable | enable} set websphere-server {disable | enable} set ssl-mode {half | full} set ssl-certificate <string> set ssl-dh-bits {768 | 1024 | 1536 | 2048 | 3072 | 4096} set ssl-algorithm {high | medium | low | custom} config ssl-cipher-suites edit <name_str> set priority <integer> set cipher {TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256 | TLS-ECDHE-ECDSA-WITH -CHACHA20-POLY1305-SHA256 | TLS-DHE-RSA-WITH-CHACHA20-POLY1305-SHA256 | TLS-DHE-RSA-WI TH-AES-128-CBC-SHA | TLS-DHE-RSA-WITH-AES-256-CBC-SHA | TLS-DHE-RSA-WITH-AES-128-CBC-S HA256 | TLS-DHE-RSA-WITH-AES-128-GCM-SHA256 | TLS-DHE-RSA-WITH-AES-256-CBC-SHA256 | TL S-DHE-RSA-WITH-AES-256-GCM-SHA384 | TLS-DHE-DSS-WITH-AES-128-CBC-SHA | TLS-DHE-DSS-WIT H-AES-256-CBC-SHA | TLS-DHE-DSS-WITH-AES-128-CBC-SHA256 | TLS-DHE-DSS-WITH-AES-128-GCM -SHA256 | TLS-DHE-DSS-WITH-AES-256-CBC-SHA256 | TLS-DHE-DSS-WITH-AES-256-GCM-SHA384 | TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA | TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA256 | TLS-ECDHE -RSA-WITH-AES-128-GCM-SHA256 | TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA | TLS-ECDHE-RSA-WITH -AES-256-CBC-SHA384 | TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384 | TLS-ECDHE-ECDSA-WITH-AES -128-CBC-SHA | TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256 | TLS-ECDHE-ECDSA-WITH-AES-128GCM-SHA256 | TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384 | TLS-ECDHE-ECDSA-WITH-AES-256-GC M-SHA384 | TLS-RSA-WITH-AES-128-CBC-SHA | TLS-RSA-WITH-AES-256-CBC-SHA | TLS-RSA-WITHAES-128-CBC-SHA256 | TLS-RSA-WITH-AES-128-GCM-SHA256 | TLS-RSA-WITH-AES-256-CBC-SHA256 | TLS-RSA-WITH-AES-256-GCM-SHA384 | TLS-RSA-WITH-CAMELLIA-128-CBC-SHA | TLS-RSA-WITHCAMELLIA-256-CBC-SHA | TLS-RSA-WITH-CAMELLIA-128-CBC-SHA256 | TLS-RSA-WITH-CAMELLIA-25 6-CBC-SHA256 | TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA | TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-S HA | TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA | TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA | T LS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA | TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA256 | TLSDHE-DSS-WITH-CAMELLIA-128-CBC-SHA256 | TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA256 | TLSDHE-DSS-WITH-CAMELLIA-256-CBC-SHA256 | TLS-DHE-RSA-WITH-SEED-CBC-SHA | TLS-DHE-DSS-WIT H-SEED-CBC-SHA | TLS-DHE-RSA-WITH-ARIA-128-CBC-SHA256 | TLS-DHE-RSA-WITH-ARIA-256-CBCSHA384 | TLS-DHE-DSS-WITH-ARIA-128-CBC-SHA256 | TLS-DHE-DSS-WITH-ARIA-256-CBC-SHA384 | TLS-RSA-WITH-SEED-CBC-SHA | TLS-RSA-WITH-ARIA-128-CBC-SHA256 | TLS-RSA-WITH-ARIA-256CBC-SHA384 | TLS-ECDHE-RSA-WITH-ARIA-128-CBC-SHA256 | TLS-ECDHE-RSA-WITH-ARIA-256-CBCSHA384 | TLS-ECDHE-ECDSA-WITH-ARIA-128-CBC-SHA256 | TLS-ECDHE-ECDSA-WITH-ARIA-256-CBCSHA384 | TLS-ECDHE-RSA-WITH-RC4-128-SHA | TLS-ECDHE-RSA-WITH-3DES-EDE-CBC-SHA | TLS-DH E-DSS-WITH-3DES-EDE-CBC-SHA | TLS-RSA-WITH-3DES-EDE-CBC-SHA | TLS-RSA-WITH-RC4-128-MD5 | TLS-RSA-WITH-RC4-128-SHA | TLS-DHE-RSA-WITH-DES-CBC-SHA | TLS-DHE-DSS-WITH-DES-CBCSHA | TLS-RSA-WITH-DES-CBC-SHA} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 191 SHA | TLS-RSA-WITH-DES-CBC-SHA} set versions {ssl-3.0 | tls-1.0 | tls-1.1 | tls-1.2} end set ssl-server-algorithm {high | medium | low | custom | client} config ssl-server-cipher-suites edit <name_str> set priority <integer> set cipher {TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256 | TLS-ECDHE-ECDSA-WITH -CHACHA20-POLY1305-SHA256 | TLS-DHE-RSA-WITH-CHACHA20-POLY1305-SHA256 | TLS-DHE-RSA-WI TH-AES-128-CBC-SHA | TLS-DHE-RSA-WITH-AES-256-CBC-SHA | TLS-DHE-RSA-WITH-AES-128-CBC-S HA256 | TLS-DHE-RSA-WITH-AES-128-GCM-SHA256 | TLS-DHE-RSA-WITH-AES-256-CBC-SHA256 | TL S-DHE-RSA-WITH-AES-256-GCM-SHA384 | TLS-DHE-DSS-WITH-AES-128-CBC-SHA | TLS-DHE-DSS-WIT H-AES-256-CBC-SHA | TLS-DHE-DSS-WITH-AES-128-CBC-SHA256 | TLS-DHE-DSS-WITH-AES-128-GCM -SHA256 | TLS-DHE-DSS-WITH-AES-256-CBC-SHA256 | TLS-DHE-DSS-WITH-AES-256-GCM-SHA384 | TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA | TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA256 | TLS-ECDHE -RSA-WITH-AES-128-GCM-SHA256 | TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA | TLS-ECDHE-RSA-WITH -AES-256-CBC-SHA384 | TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384 | TLS-ECDHE-ECDSA-WITH-AES -128-CBC-SHA | TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256 | TLS-ECDHE-ECDSA-WITH-AES-128GCM-SHA256 | TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384 | TLS-ECDHE-ECDSA-WITH-AES-256-GC M-SHA384 | TLS-RSA-WITH-AES-128-CBC-SHA | TLS-RSA-WITH-AES-256-CBC-SHA | TLS-RSA-WITHAES-128-CBC-SHA256 | TLS-RSA-WITH-AES-128-GCM-SHA256 | TLS-RSA-WITH-AES-256-CBC-SHA256 | TLS-RSA-WITH-AES-256-GCM-SHA384 | TLS-RSA-WITH-CAMELLIA-128-CBC-SHA | TLS-RSA-WITHCAMELLIA-256-CBC-SHA | TLS-RSA-WITH-CAMELLIA-128-CBC-SHA256 | TLS-RSA-WITH-CAMELLIA-25 6-CBC-SHA256 | TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA | TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-S HA | TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA | TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA | T LS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA | TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA256 | TLSDHE-DSS-WITH-CAMELLIA-128-CBC-SHA256 | TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA256 | TLSDHE-DSS-WITH-CAMELLIA-256-CBC-SHA256 | TLS-DHE-RSA-WITH-SEED-CBC-SHA | TLS-DHE-DSS-WIT H-SEED-CBC-SHA | TLS-DHE-RSA-WITH-ARIA-128-CBC-SHA256 | TLS-DHE-RSA-WITH-ARIA-256-CBCSHA384 | TLS-DHE-DSS-WITH-ARIA-128-CBC-SHA256 | TLS-DHE-DSS-WITH-ARIA-256-CBC-SHA384 | TLS-RSA-WITH-SEED-CBC-SHA | TLS-RSA-WITH-ARIA-128-CBC-SHA256 | TLS-RSA-WITH-ARIA-256CBC-SHA384 | TLS-ECDHE-RSA-WITH-ARIA-128-CBC-SHA256 | TLS-ECDHE-RSA-WITH-ARIA-256-CBCSHA384 | TLS-ECDHE-ECDSA-WITH-ARIA-128-CBC-SHA256 | TLS-ECDHE-ECDSA-WITH-ARIA-256-CBCSHA384 | TLS-ECDHE-RSA-WITH-RC4-128-SHA | TLS-ECDHE-RSA-WITH-3DES-EDE-CBC-SHA | TLS-DH E-DSS-WITH-3DES-EDE-CBC-SHA | TLS-RSA-WITH-3DES-EDE-CBC-SHA | TLS-RSA-WITH-RC4-128-MD5 | TLS-RSA-WITH-RC4-128-SHA | TLS-DHE-RSA-WITH-DES-CBC-SHA | TLS-DHE-DSS-WITH-DES-CBCSHA | TLS-RSA-WITH-DES-CBC-SHA} set versions {ssl-3.0 | tls-1.0 | tls-1.1 | tls-1.2} end set ssl-pfs {require | deny | allow} set ssl-min-version {ssl-3.0 | tls-1.0 | tls-1.1 | tls-1.2} set ssl-max-version {ssl-3.0 | tls-1.0 | tls-1.1 | tls-1.2} set ssl-server-min-version {ssl-3.0 | tls-1.0 | tls-1.1 | tls-1.2 | client} set ssl-server-max-version {ssl-3.0 | tls-1.0 | tls-1.1 | tls-1.2 | client} set ssl-send-empty-frags {enable | disable} set ssl-client-fallback {disable | enable} set ssl-client-renegotiation {allow | deny | secure} set ssl-client-session-state-type {disable | time | count | both} set ssl-client-session-state-timeout <integer> set ssl-client-session-state-max <integer> set ssl-server-session-state-type {disable | time | count | both} set ssl-server-session-state-timeout <integer> set ssl-server-session-state-max <integer> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 192 set set set set set set end ssl-server-session-state-max <integer> ssl-http-location-conversion {enable | disable} ssl-http-match-host {enable | disable} monitor <string> max-embryonic-connections <integer> color <integer> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 193 Description Configuration Description Default Value name Virtual IP name. (Empty) id Custom defined ID. 0 uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 comment Comment. (Empty) type VIP type: static NAT, load balance., server load balance static-nat dns-mapping-ttl DNS mapping TTL (Set to zero to use TTL in DNS response, default = 0). 0 ldb-method Load balance method. static src-filter Source IP filter (x.x.x.x/x x.x.x.x-y.y.y.y). (Empty) extip Start external IP - end external IP. 0.0.0.0 mappedip Mapped IP (x.x.x.x/x x.x.x.x-y.y.y.y). (Empty) mapped-addr Mapped address. (Empty) extintf External interface. (Empty) arp-reply Enable/disable ARP reply. enable server-type Server type. (Empty) persistence Persistence. none nat-source-vip Enable/disable force NAT as VIP when server goes out. disable portforward Enable/disable port forward. disable protocol Mapped port protocol. tcp extport External service port. 0 mappedport Mapped service port. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 194 gratuitous-arp-interval Interval between sending gratuitous ARPs in seconds (0 = disable). 0 srcintf-filter Source interface filter. (Empty) portmapping-type Port mapping type. 1-to-1 realservers Real servers. (Empty) http-cookie-domainfrom-host Enable/disable use of HTTP cookie domain from host field in HTTP. disable http-cookie-domain HTTP cookie domain. (Empty) http-cookie-path HTTP cookie path. (Empty) http-cookie-generation Generation of HTTP cookie to be accepted. Changing invalidates all existing cookies. 0 http-cookie-age Number of minutes the web browser should keep cookie (0 = forever). 60 http-cookie-share Share HTTP cookies across different virtual servers. same-ip https-cookie-secure Enable/disable verification of cookie inserted into HTTPS is marked as secure. disable http-multiplex Enable/disable multiplex HTTP requests/responses over a single TCP connection. disable http-ip-header Add additional HTTP header containing client's original IP address. disable http-ip-header-name Name of HTTP header containing client's IP address (X-Forwarded-For is used if empty). (Empty) outlook-web-access Enable/disable adding HTTP header indicating SSL offload for Outlook Web Access server. disable weblogic-server Enable/disable adding HTTP header indicating SSL offload for WebLogic server. disable websphere-server Enable/disable adding HTTP header indicating SSL offload for WebSphere server. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 195 ssl-mode SSL/TLS mode for encryption & decryption of traffic. half ssl-certificate Name of Certificate to offer in every SSL connection. (Empty) ssl-dh-bits Size of Diffie-Hellman prime used in DHE-RSA negotiation. 2048 ssl-algorithm Relative strength of encryption algorithms accepted in negotiation with client. high ssl-cipher-suites SSL/TLS cipher suites acceptable from a client, ordered by priority. (Empty) ssl-server-algorithm Relative strength of encryption algorithms accepted in negotiation with server. client ssl-server-cipher-suites SSL/TLS cipher suites to offer to a server, ordered by priority. (Empty) ssl-pfs SSL Perfect Forward Secrecy. allow ssl-min-version Lowest SSL/TLS version acceptable from a client. tls-1.0 ssl-max-version Highest SSL/TLS version acceptable from a client. tls-1.2 ssl-server-min-version Lowest SSL/TLS version acceptable from a server. client ssl-server-max-version Highest SSL/TLS version acceptable from a server. client ssl-send-empty-frags Send empty fragments to avoid attack on CBC IV (SSL 3.0 & TLS 1.0 only). enable ssl-client-fallback Enable/disable support for preventing Downgrade Attacks on client connections (RFC 7507). enable ssl-client-renegotiation Allow/block client renegotiation by server. allow ssl-client-session-statetype Control Client to FortiGate SSL session state preservation. both CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 196 ssl-client-session-statetimeout Number of minutes to keep client to FortiGate SSL session state. 30 ssl-client-session-statemax Maximum number of client to FortiGate SSL session states to keep. 1000 ssl-server-sessionstate-type Control FortiGate to server SSL session state preservation. both ssl-server-sessionstate-timeout Number of minutes to keep FortiGate to Server SSL session state. 60 ssl-server-sessionstate-max Maximum number of FortiGate to Server SSL session states to keep. 100 ssl-http-locationconversion Enable/disable location conversion on HTTP response header. disable ssl-http-match-host Enable/disable HTTP host matching for location conversion. disable monitor Health monitors. (Empty) max-embryonicconnections Maximum number of incomplete connections. 1000 color GUI icon color. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 197 firewall/vip46 CLI Syntax config firewall vip46 edit <name_str> set name <string> set id <integer> set uuid <uuid> set comment <var-string> config src-filter edit <name_str> set range <string> end set extip <user> set mappedip <user> set arp-reply {disable | enable} set portforward {disable | enable} set protocol {tcp | udp} set extport <user> set mappedport <user> set color <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 198 Description Configuration Description Default Value name VIP46 name. (Empty) id Custom defined id. 0 uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 comment Comment. (Empty) src-filter Source IP filter (x.x.x.x/x). (Empty) extip Start-external-IP [-end-external-IP]. 0.0.0.0 mappedip Start-mapped-IP [-end mapped-IP]. :: arp-reply Enable ARP reply. enable portforward Enable port forward. disable protocol Mapped port protocol. tcp extport External service port. 0 mappedport Mapped service port. 0 color GUI icon color. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 199 firewall/vip6 CLI Syntax config firewall vip6 edit <name_str> set name <string> set id <integer> set uuid <uuid> set comment <var-string> set type {static-nat} config src-filter edit <name_str> set range <string> end set extip <user> set mappedip <user> set arp-reply {disable | enable} set portforward {disable | enable} set protocol {tcp | udp | sctp} set extport <user> set mappedport <user> set color <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 200 Description Configuration Description Default Value name Virtual ip6 name. (Empty) id Custom defined ID. 0 uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 comment Comment. (Empty) type VIP type: static NAT. static-nat src-filter Source IP6 filter (x:x:x:x:x:x:x:x/x). (Empty) extip Start external IP - end external IP. :: mappedip Start mapped IP -end mapped IP. :: arp-reply Enable/disable ARP reply. enable portforward Enable/disable port forward. disable protocol Mapped port protocol. tcp extport External service port. 0 mappedport Mapped service port. 0 color GUI icon color. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 201 firewall/vip64 CLI Syntax config firewall vip64 edit <name_str> set name <string> set id <integer> set uuid <uuid> set comment <var-string> config src-filter edit <name_str> set range <string> end set extip <user> set mappedip <user> set arp-reply {disable | enable} set portforward {disable | enable} set protocol {tcp | udp} set extport <user> set mappedport <user> set color <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 202 Description Configuration Description Default Value name VIP64 name. (Empty) id Custom defined id. 0 uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 comment Comment. (Empty) src-filter Source IP6 filter (x:x:x:x:x:x:x:x/x). (Empty) extip Start-external-IP [-End-external-IP]. :: mappedip Start-mapped-IP [-End-mapped-IP]. 0.0.0.0 arp-reply Enable ARP reply. enable portforward Enable port forward. disable protocol Mapped port protocol. tcp extport External service port. 0 mappedport Mapped service port. 0 color GUI icon color. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 203 firewall/vipgrp CLI Syntax config firewall vipgrp edit <name_str> set name <string> set uuid <uuid> set interface <string> set color <integer> set comments <var-string> config member edit <name_str> set name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 204 Description Configuration Description Default Value name VIP group name. (Empty) uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 interface interface (Empty) color GUI icon color. 0 comments Comment. (Empty) member VIP group member. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 205 firewall/vipgrp46 CLI Syntax config firewall vipgrp46 edit <name_str> set name <string> set uuid <uuid> set color <integer> set comments <var-string> config member edit <name_str> set name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 206 Description Configuration Description Default Value name VIP46 group name. (Empty) uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 color GUI icon color. 0 comments Comment. (Empty) member VIP46 group member. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 207 firewall/vipgrp6 CLI Syntax config firewall vipgrp6 edit <name_str> set name <string> set uuid <uuid> set color <integer> set comments <var-string> config member edit <name_str> set name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 208 Description Configuration Description Default Value name IPv6 VIP group name. (Empty) uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 color GUI icon color. 0 comments Comment. (Empty) member VIP group6 member. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 209 firewall/vipgrp64 CLI Syntax config firewall vipgrp64 edit <name_str> set name <string> set uuid <uuid> set color <integer> set comments <var-string> config member edit <name_str> set name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 210 Description Configuration Description Default Value name VIP64 group name. (Empty) uuid Universally Unique IDentifier. 00000000-0000-00000000-000000000000 color GUI icon color. 0 comments Comment. (Empty) member VIP64 group member. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 211 ftp-proxy/explicit CLI Syntax config ftp-proxy explicit edit <name_str> set status {enable | disable} set incoming-port <integer> set incoming-ip <ipv4-address-any> set outgoing-ip <ipv4-address-any> set sec-default-action {accept | deny} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 212 Description Configuration Description Default Value status Enable/disable explicit ftp proxy. disable incoming-port Accept incoming FTP requests on ports other than port 21. 21 incoming-ip accept incoming ftp requests from this ip. An interface must have this IP address. 0.0.0.0 outgoing-ip outgoing FTP requests will leave this ip. An interface must have this IP address. (Empty) sec-default-action Default action to allow or deny when no ftp-proxy firewall policy exists. deny CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 213 gui/console CLI Syntax config gui console edit <name_str> set preferences <user> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 214 Description Configuration Description Default Value preferences Preferences. Binary file, 0 bytes. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 215 icap/profile CLI Syntax config icap profile edit <name_str> set replacemsg-group <string> set name <string> set request {disable | enable} set response {disable | enable} set streaming-content-bypass {disable | enable} set request-server <string> set response-server <string> set request-failure {error | bypass} set response-failure {error | bypass} set request-path <string> set response-path <string> set methods {delete | get | head | options | post | put | trace | other} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 216 Description Configuration Description Default Value replacemsg-group Replacement message group. (Empty) name ICAP profile name. (Empty) request Enable/disable whether an HTTP request is passed to an ICAP server. disable response Enable/disable whether an HTTP response is passed to an ICAP server. disable streaming-contentbypass Enable/disable bypassing of ICAP server for streaming content. disable request-server ICAP server to use for an HTTP request. (Empty) response-server ICAP server to use for an HTTP response. (Empty) request-failure Action to take if the ICAP server cannot be contacted when processing an HTTP request. error response-failure Action to take if the ICAP server cannot be contacted when processing an HTTP response. error request-path Path component of the ICAP URI that identifies the HTTP request processing service. (Empty) response-path Path component of the ICAP URI that identifies the HTTP response processing service. (Empty) methods The allowed HTTP methods that will be sent to ICAP server for further processing. delete get head options post put trace other CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 217 icap/server CLI Syntax config icap server edit <name_str> set name <string> set ip-version {4 | 6} set ip-address <ipv4-address-any> set ip6-address <ipv6-address> set port <integer> set max-connections <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 218 Description Configuration Description Default Value name Server name. (Empty) ip-version IP version. 4 ip-address IPv4 address of the ICAP server. 0.0.0.0 ip6-address IPv6 address of the ICAP server. :: port ICAP server port. 1344 max-connections Maximum number of concurrent connections to ICAP server. 100 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 219 ips/custom CLI Syntax config ips custom edit <name_str> set tag <string> set signature <string> set sig-name <string> set rule-id <integer> set severity <user> set location <user> set os <user> set application <user> set protocol <user> set status {disable | enable} set log {disable | enable} set log-packet {disable | enable} set action {pass | block} set comment <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 220 Description Configuration Description Default Value tag Signature tag. (Empty) signature Signature text. (Empty) sig-name Signature name. (Empty) rule-id Signature ID. 0 severity severity (Empty) location Vulnerable location. (Empty) os Vulnerable operating systems. (Empty) application Vulnerable applications. (Empty) protocol Vulnerable service. (Empty) status Enable/disable status. enable log Enable/disable logging. enable log-packet Enable/disable packet logging. disable action Action. pass comment Comment. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 221 ips/dbinfo CLI Syntax config ips dbinfo edit <name_str> set version <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 222 Description Configuration Description Default Value version Internal category version. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 223 ips/decoder CLI Syntax config ips decoder edit <name_str> set name <string> config parameter edit <name_str> set name <string> set value <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 224 Description Configuration Description Default Value name Decoder name. (Empty) parameter IPS group parameters. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 225 ips/global CLI Syntax config ips global edit <name_str> set fail-open {enable | disable} set database {regular | extended} set traffic-submit {enable | disable} set anomaly-mode {periodical | continuous} set session-limit-mode {accurate | heuristic} set intelligent-mode {enable | disable} set socket-size <integer> set engine-count <integer> set algorithm {engine-pick | low | high | super} set sync-session-ttl {enable | disable} set np-accel-mode {none | basic} set ips-reserve-cpu {disable | enable} set cp-accel-mode {none | basic | advanced} set skype-client-public-ipaddr <var-string> set default-app-cat-mask <user> set deep-app-insp-timeout <integer> set deep-app-insp-db-limit <integer> set exclude-signatures {none | industrial} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 226 Description Configuration Description Default Value fail-open Enable/disable IPS fail open option. disable database IPS database selection. extended traffic-submit Enable/disable submit attack characteristics to FortiGuard Service. disable anomaly-mode Blocking mode for rate-based anomaly. continuous session-limit-mode Counter mode for session-limit anomaly. heuristic intelligent-mode Enable/disable intelligent scan mode. enable socket-size IPS socket buffer size. 128 engine-count Number of engines (0: use recommended setting). 0 algorithm Signature matching algorithm. engine-pick sync-session-ttl Enable/disable use of kernel session TTL for IPS sessions. disable np-accel-mode Network Processor acceleration mode. basic ips-reserve-cpu Enable/disable IPS daemon's use of CPUs other than CPU 0 disable cp-accel-mode Content Processor acceleration mode. advanced skype-client-publicipaddr Comma-separated client external IP address for decrypting Skype protocol. (Empty) default-app-cat-mask Default enabled application category mask. 1844674407370955161 5 deep-app-insp-timeout Timeout for Deep application inspection (1 2147483647 sec., 0 = use recommended setting). 0 deep-app-insp-db-limit Limit on number of entries in deep application inspection database (1 - 2147483647, 0 = use recommended setting) 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 227 exclude-signatures CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Excluded signatures. industrial 228 ips/rule CLI Syntax config ips rule edit <name_str> set name <string> set status {disable | enable} set log {disable | enable} set log-packet {disable | enable} set action {pass | block} set group <string> set severity {} set location {} set os <user> set application <user> set service <user> set rule-id <integer> set rev <integer> set date <integer> config metadata edit <name_str> set id <integer> set metaid <integer> set valueid <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 229 Description Configuration Description Default Value name Rule name. (Empty) status Enable/disable status. enable log Enable/disable logging. enable log-packet Enable/disable packet logging. disable action Action. pass group Group. (Empty) severity Severity. (Empty) location Vulnerable location. (Empty) os Vulnerable operation systems. (Empty) application Vulnerable applications. (Empty) service Vulnerable service. (Empty) rule-id Rule ID. 0 rev Revision. 0 date Date. 0 metadata Meta data. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 230 ips/rule-settings CLI Syntax config ips rule-settings edit <name_str> set id <integer> config tags edit <name_str> set name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 231 Description Configuration Description Default Value id Rule ID. 0 tags Applied object tags. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 232 ips/sensor CLI Syntax config ips sensor edit <name_str> set name <string> set comment <var-string> set replacemsg-group <string> set block-malicious-url {disable | enable} config entries edit <name_str> set id <integer> config rule edit <name_str> set id <integer> end set location <user> set severity <user> set protocol <user> set os <user> set application <user> config tags edit <name_str> set name <string> end set status {disable | enable | default} set log {disable | enable} set log-packet {disable | enable} set log-attack-context {disable | enable} set action {pass | block | reset | default} set rate-count <integer> set rate-duration <integer> set rate-mode {periodical | continuous} set rate-track {none | src-ip | dest-ip | dhcp-client-mac | dns-domain} config exempt-ip edit <name_str> set id <integer> set src-ip <ipv4-classnet> set dst-ip <ipv4-classnet> end set quarantine {none | attacker | both | interface} set quarantine-expiry <user> set quarantine-log {disable | enable} end config filter edit <name_str> set name <string> set location <user> set severity <user> set protocol <user> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 233 set os <user> set application <user> set status {disable | enable | default} set log {disable | enable} set log-packet {disable | enable} set action {pass | block | reset | default} set quarantine {none | attacker | both | interface} set quarantine-expiry <integer> set quarantine-log {disable | enable} end config override edit <name_str> set rule-id <integer> set status {disable | enable} set log {disable | enable} set log-packet {disable | enable} set action {pass | block | reset} set quarantine {none | attacker | both | interface} set quarantine-expiry <integer> set quarantine-log {disable | enable} config exempt-ip edit <name_str> set id <integer> set src-ip <ipv4-classnet> set dst-ip <ipv4-classnet> end end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 234 Description Configuration Description Default Value name Sensor name. (Empty) comment Comment. (Empty) replacemsg-group Replacement message group. (Empty) block-malicious-url Enable/disable malicious URL blocking. disable entries IPS sensor filter. (Empty) filter IPS sensor filter. (Empty) override IPS override rule. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 235 ips/settings CLI Syntax config ips settings edit <name_str> set packet-log-history <integer> set packet-log-post-attack <integer> set packet-log-memory <integer> set ips-packet-quota <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 236 Description Configuration Description Default Value packet-log-history Number of packets to be recorded before alert (1 - 255). 1 packet-log-post-attack Number of packets to be recorded after attack (0 - 255). 0 packet-log-memory Maximum memory can be used by packet log (64 - 8192 kB). 256 ips-packet-quota IPS packet quota. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 237 log.disk/filter CLI Syntax config log.disk filter edit <name_str> set severity {emergency | alert | critical | error | warning | notification | info rmation | debug} set forward-traffic {enable | disable} set local-traffic {enable | disable} set multicast-traffic {enable | disable} set sniffer-traffic {enable | disable} set anomaly {enable | disable} set netscan-discovery {} set netscan-vulnerability {} set voip {enable | disable} set dlp-archive {enable | disable} set gtp {enable | disable} set event {enable | disable} set system {enable | disable} set radius {enable | disable} set ipsec {enable | disable} set dhcp {enable | disable} set ppp {enable | disable} set admin {enable | disable} set ha {enable | disable} set auth {enable | disable} set pattern {enable | disable} set sslvpn-log-auth {enable | disable} set sslvpn-log-adm {enable | disable} set sslvpn-log-session {enable | disable} set vip-ssl {enable | disable} set ldb-monitor {enable | disable} set wan-opt {enable | disable} set wireless-activity {enable | disable} set cpu-memory-usage {enable | disable} set filter <string> set filter-type {include | exclude} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 238 Description Configuration Description Default Value severity Lowest severity level to log. information forward-traffic Enable/disable log through traffic messages. enable local-traffic Enable/disable log local in or out traffic messages. enable multicast-traffic Enable/disable log multicast traffic messages. enable sniffer-traffic Enable/disable log sniffer traffic messages. enable anomaly Enable/disable log anomaly messages. enable netscan-discovery Enable/disable log netscan discovery events. netscan-vulnerability Enable/disable log netscan vulnerability events. voip Enable/disable log VoIP messages. enable dlp-archive Enable/disable log DLP archive. enable gtp Enable/disable log GTP messages. enable event Enable/disable log event messages. enable system Enable/disable log system activity messages. enable radius Enable/disable log RADIUS messages. enable ipsec Enable/disable log IPsec negotiation messages. enable dhcp Enable/disable log DHCP service messages. enable ppp Enable/disable log L2TP/PPTP/PPPoE messages. enable admin Enable/disable log admin login/logout messages. enable ha Enable/disable log HA activity messages. enable auth Enable/disable log firewall authentication messages. enable pattern Enable/disable log pattern update messages. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 239 sslvpn-log-auth Enable/disable log SSL user authentication. enable sslvpn-log-adm Enable/disable log SSL administration. enable sslvpn-log-session Enable/disable log SSL session. enable vip-ssl Enable/disable log VIP SSL messages. enable ldb-monitor Enable/disable log VIP real server health monitoring messages. enable wan-opt Enable/disable log WAN optimization messages. enable wireless-activity Enable/disable log wireless activity. enable cpu-memory-usage Enable/disable log CPU & memory usage every 5 minutes. disable filter Log filter for the log device. (Empty) filter-type Include/exclude logs that match the filter setting. include CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 240 log.disk/setting CLI Syntax config log.disk setting edit <name_str> set status {enable | disable} set ips-archive {enable | disable} set max-log-file-size <integer> set max-policy-packet-capture-size <integer> set roll-schedule {daily | weekly} set roll-day {sunday | monday | tuesday | wednesday | thursday | friday | saturday } set roll-time <user> set diskfull {overwrite | nolog} set log-quota <integer> set dlp-archive-quota <integer> set report-quota <integer> set maximum-log-age <integer> set upload {enable | disable} set upload-destination {ftp-server} set uploadip <ipv4-address> set uploadport <integer> set source-ip <ipv4-address> set uploaduser <string> set uploadpass <password> set uploaddir <string> set uploadtype {traffic | event | virus | webfilter | IPS | spamfilter | dlp-archi ve | anomaly | voip | dlp | app-ctrl | waf | netscan | gtp} set uploadzip {disable | enable} set uploadsched {disable | enable} set uploadtime <integer> set upload-delete-files {enable | disable} set upload-ssl-conn {default | high | low | disable} set full-first-warning-threshold <integer> set full-second-warning-threshold <integer> set full-final-warning-threshold <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 241 Description Configuration Description Default Value status Enable/disable local disk log. disable ips-archive Enable/disable IPS packet archive. enable max-log-file-size Maximum log file size in MB before rolling. 20 max-policy-packetcapture-size Maximum size of policy sniffer in MB (0 = unlimited). 10 roll-schedule Frequency to check log file for rolling. daily roll-day Days of week to roll logs. sunday roll-time Time to roll logs (hh:mm). 00:00 diskfull Policy to apply when disk is full. overwrite log-quota Disk log quota (MB). 0 dlp-archive-quota DLP archive quota (MB). 0 report-quota Report quota (MB). 0 maximum-log-age Delete log files older than (days). 7 upload Enable/disable upload of log files upon rolling. disable upload-destination Server type. ftp-server uploadip IP address of log uploading server. 0.0.0.0 uploadport Port of the log uploading server. 21 source-ip Source IP address of the disk log uploading. 0.0.0.0 uploaduser User account in the uploading server. (Empty) uploadpass Password of the user account in the uploading server. (Empty) uploaddir Log file uploading remote directory. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 242 uploadtype Types of log files that need to be uploaded. traffic event virus webfilter IPS spamfilter dlp-archive anomaly voip dlp app-ctrl waf netscan gtp uploadzip Enable/disable compression of uploaded logs. disable uploadsched Scheduled upload (disable = upload when rolling). disable uploadtime Time of scheduled upload. 0 upload-delete-files Delete log files after uploading (default=enable). enable upload-ssl-conn Enable/disable SSL communication when uploading. default full-first-warningthreshold Log full first warning threshold (1 - 98, default = 75). 75 full-second-warningthreshold Log full second warning threshold (2 - 99, default = 90). 90 full-final-warningthreshold Log full final warning threshold (3 - 100, default = 95). 95 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 243 log.fortianalyzer/filter CLI Syntax config log.fortianalyzer filter edit <name_str> set severity {emergency | alert | critical | error | warning | notification | info rmation | debug} set forward-traffic {enable | disable} set local-traffic {enable | disable} set multicast-traffic {enable | disable} set sniffer-traffic {enable | disable} set anomaly {enable | disable} set netscan-discovery {} set netscan-vulnerability {} set voip {enable | disable} set dlp-archive {enable | disable} set gtp {enable | disable} set filter <string> set filter-type {include | exclude} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 244 Description Configuration Description Default Value severity Lowest severity level to log. information forward-traffic Enable/disable log through traffic messages. enable local-traffic Enable/disable log local in or out traffic messages. enable multicast-traffic Enable/disable log multicast traffic messages. enable sniffer-traffic Enable/disable log sniffer traffic messages. enable anomaly Enable/disable log anomaly messages. enable netscan-discovery Enable/disable log netscan discovery events. netscan-vulnerability Enable/disable log netscan vulnerability events. voip Enable/disable log VoIP messages. enable dlp-archive Enable/disable log DLP archive. enable gtp Enable/disable log GTP messages. enable filter Log filter for the log device. (Empty) filter-type Include/exclude logs that match the filter setting. include CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 245 log.fortianalyzer/override-filter CLI Syntax config log.fortianalyzer override-filter edit <name_str> set severity {emergency | alert | critical | error | warning | notification | info rmation | debug} set forward-traffic {enable | disable} set local-traffic {enable | disable} set multicast-traffic {enable | disable} set sniffer-traffic {enable | disable} set anomaly {enable | disable} set netscan-discovery {} set netscan-vulnerability {} set voip {enable | disable} set dlp-archive {enable | disable} set gtp {enable | disable} set filter <string> set filter-type {include | exclude} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 246 Description Configuration Description Default Value severity Lowest severity level to log. information forward-traffic Enable/disable log through traffic messages. enable local-traffic Enable/disable log local in or out traffic messages. enable multicast-traffic Enable/disable log multicast traffic messages. enable sniffer-traffic Enable/disable log sniffer traffic messages. enable anomaly Enable/disable log anomaly messages. enable netscan-discovery Enable/disable log netscan discovery events. netscan-vulnerability Enable/disable log netscan vulnerability events. voip Enable/disable log VoIP messages. enable dlp-archive Enable/disable log DLP archive. enable gtp Enable/disable log GTP messages. enable filter Log filter for the log device. (Empty) filter-type Include/exclude logs that match the filter setting. include CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 247 log.fortianalyzer/override-setting CLI Syntax config log.fortianalyzer override-setting edit <name_str> set override {enable | disable} set use-management-vdom {enable | disable} set status {enable | disable} set ips-archive {enable | disable} set server <string> set hmac-algorithm {sha256 | sha1} set enc-algorithm {default | high | low | disable} set conn-timeout <integer> set monitor-keepalive-period <integer> set monitor-failure-retry-period <integer> set mgmt-name <string> set faz-type <integer> set source-ip <string> set __change_ip <integer> set upload-option {store-and-upload | realtime} set upload-interval {daily | weekly | monthly} set upload-day <user> set upload-time <user> set reliable {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 248 Description Configuration Description Default Value override Enable/disable override FortiAnalyzer settings or use the global settings. disable use-managementvdom Enable/disable use of management VDOM IP address as source IP for logs sent to FortiAnalyzer. disable status Enable/disable FortiAnalyzer. disable ips-archive Enable/disable IPS packet archive. enable server IPv4 or IPv6 address of the remote FortiAnalyzer. (Empty) hmac-algorithm FortiAnalyzer IPsec tunnel HMAC algorithm. sha256 enc-algorithm Enable/disable sending of FortiAnalyzer log data with SSL encryption. high conn-timeout FortiAnalyzer connection time-out in seconds (for status and log buffer). 10 monitor-keepaliveperiod Time between OFTP keepalives in seconds (for status and log buffer). 5 monitor-failure-retryperiod Time between FortiAnalyzer connection retries in seconds (for status and log buffer). 5 mgmt-name Hidden management name of FortiAnalyzer. (Empty) faz-type Hidden setting index of FortiAnalyzer. 4 source-ip Source IPv4 or IPv6 address used to communicate with FortiAnalyzer. (Empty) __change_ip Hidden attribute. 0 upload-option Enable/disable logging to hard disk and then upload to FortiAnalyzer. realtime upload-interval Frequency to check log file for upload. daily upload-day Days of week (month) to upload logs. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 249 upload-time Time to upload logs (hh:mm). 00:59 reliable Enable/disable reliable logging to FortiAnalyzer. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 250 log.fortianalyzer/setting CLI Syntax config log.fortianalyzer setting edit <name_str> set status {enable | disable} set ips-archive {enable | disable} set server <string> set hmac-algorithm {sha256 | sha1} set enc-algorithm {default | high | low | disable} set conn-timeout <integer> set monitor-keepalive-period <integer> set monitor-failure-retry-period <integer> set mgmt-name <string> set faz-type <integer> set source-ip <string> set __change_ip <integer> set upload-option {store-and-upload | realtime} set upload-interval {daily | weekly | monthly} set upload-day <user> set upload-time <user> set reliable {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 251 Description Configuration Description Default Value status Enable/disable FortiAnalyzer. disable ips-archive Enable/disable IPS packet archive. enable server IPv4 or IPv6 address of the remote FortiAnalyzer. (Empty) hmac-algorithm FortiAnalyzer IPsec tunnel HMAC algorithm. sha256 enc-algorithm Enable/disable sending of FortiAnalyzer log data with SSL encryption. high conn-timeout FortiAnalyzer connection time-out in seconds (for status and log buffer). 10 monitor-keepaliveperiod Time between OFTP keepalives in seconds (for status and log buffer). 5 monitor-failure-retryperiod Time between FortiAnalyzer connection retries in seconds (for status and log buffer). 5 mgmt-name Hidden management name of FortiAnalyzer. FGh_Log1 faz-type Hidden setting index of FortiAnalyzer. 1 source-ip Source IPv4 or IPv6 address used to communicate with FortiAnalyzer. (Empty) __change_ip Hidden attribute. 0 upload-option Enable/disable logging to hard disk and then upload to FortiAnalyzer. realtime upload-interval Frequency to check log file for upload. daily upload-day Days of week (month) to upload logs. (Empty) upload-time Time to upload logs (hh:mm). 00:59 reliable Enable/disable reliable logging to FortiAnalyzer. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 252 log.fortianalyzer2/filter CLI Syntax config log.fortianalyzer2 filter edit <name_str> set severity {emergency | alert | critical | error | warning | notification | info rmation | debug} set forward-traffic {enable | disable} set local-traffic {enable | disable} set multicast-traffic {enable | disable} set sniffer-traffic {enable | disable} set anomaly {enable | disable} set netscan-discovery {} set netscan-vulnerability {} set voip {enable | disable} set dlp-archive {enable | disable} set gtp {enable | disable} set filter <string> set filter-type {include | exclude} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 253 Description Configuration Description Default Value severity Lowest severity level to log. information forward-traffic Enable/disable log through traffic messages. enable local-traffic Enable/disable log local in or out traffic messages. enable multicast-traffic Enable/disable log multicast traffic messages. enable sniffer-traffic Enable/disable log sniffer traffic messages. enable anomaly Enable/disable log anomaly messages. enable netscan-discovery Enable/disable log netscan discovery events. netscan-vulnerability Enable/disable log netscan vulnerability events. voip Enable/disable log VoIP messages. enable dlp-archive Enable/disable log DLP archive. enable gtp Enable/disable log GTP messages. enable filter Log filter for the log device. (Empty) filter-type Include/exclude logs that match the filter setting. include CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 254 log.fortianalyzer2/setting CLI Syntax config log.fortianalyzer2 setting edit <name_str> set status {enable | disable} set ips-archive {enable | disable} set server <string> set hmac-algorithm {sha256 | sha1} set enc-algorithm {default | high | low | disable} set conn-timeout <integer> set monitor-keepalive-period <integer> set monitor-failure-retry-period <integer> set mgmt-name <string> set faz-type <integer> set source-ip <string> set __change_ip <integer> set upload-option {store-and-upload | realtime} set upload-interval {daily | weekly | monthly} set upload-day <user> set upload-time <user> set reliable {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 255 Description Configuration Description Default Value status Enable/disable FortiAnalyzer. disable ips-archive Enable/disable IPS packet archive. enable server IPv4 or IPv6 address of the remote FortiAnalyzer. (Empty) hmac-algorithm FortiAnalyzer IPsec tunnel HMAC algorithm. sha256 enc-algorithm Enable/disable sending of FortiAnalyzer log data with SSL encryption. high conn-timeout FortiAnalyzer connection time-out in seconds (for status and log buffer). 10 monitor-keepaliveperiod Time between OFTP keepalives in seconds (for status and log buffer). 5 monitor-failure-retryperiod Time between FortiAnalyzer connection retries in seconds (for status and log buffer). 5 mgmt-name Hidden management name of FortiAnalyzer. FGh_Log2 faz-type Hidden setting index of FortiAnalyzer. 2 source-ip Source IPv4 or IPv6 address used to communicate with FortiAnalyzer. (Empty) __change_ip Hidden attribute. 0 upload-option Enable/disable logging to hard disk and then upload to FortiAnalyzer. realtime upload-interval Frequency to check log file for upload. daily upload-day Days of week (month) to upload logs. (Empty) upload-time Time to upload logs (hh:mm). 00:59 reliable Enable/disable reliable logging to FortiAnalyzer. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 256 log.fortianalyzer3/filter CLI Syntax config log.fortianalyzer3 filter edit <name_str> set severity {emergency | alert | critical | error | warning | notification | info rmation | debug} set forward-traffic {enable | disable} set local-traffic {enable | disable} set multicast-traffic {enable | disable} set sniffer-traffic {enable | disable} set anomaly {enable | disable} set netscan-discovery {} set netscan-vulnerability {} set voip {enable | disable} set gtp {enable | disable} set filter <string> set filter-type {include | exclude} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 257 Description Configuration Description Default Value severity Lowest severity level to log. information forward-traffic Enable/disable log through traffic messages. enable local-traffic Enable/disable log local in or out traffic messages. enable multicast-traffic Enable/disable log multicast traffic messages. enable sniffer-traffic Enable/disable log sniffer traffic messages. enable anomaly Enable/disable log anomaly messages. enable netscan-discovery Enable/disable log netscan discovery events. netscan-vulnerability Enable/disable log netscan vulnerability events. voip Enable/disable log VoIP messages. enable gtp Enable/disable log GTP messages. enable filter Log filter for the log device. (Empty) filter-type Include/exclude logs that match the filter setting. include CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 258 log.fortianalyzer3/setting CLI Syntax config log.fortianalyzer3 setting edit <name_str> set status {enable | disable} set ips-archive {enable | disable} set server <string> set hmac-algorithm {sha256 | sha1} set enc-algorithm {default | high | low | disable} set conn-timeout <integer> set monitor-keepalive-period <integer> set monitor-failure-retry-period <integer> set mgmt-name <string> set faz-type <integer> set source-ip <string> set __change_ip <integer> set upload-option {store-and-upload | realtime} set upload-interval {daily | weekly | monthly} set upload-day <user> set upload-time <user> set reliable {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 259 Description Configuration Description Default Value status Enable/disable FortiAnalyzer. disable ips-archive Enable/disable IPS packet archive. enable server IPv4 or IPv6 address of the remote FortiAnalyzer. (Empty) hmac-algorithm FortiAnalyzer IPsec tunnel HMAC algorithm. sha256 enc-algorithm Enable/disable sending of FortiAnalyzer log data with SSL encryption. high conn-timeout FortiAnalyzer connection time-out in seconds (for status and log buffer). 10 monitor-keepaliveperiod Time between OFTP keepalives in seconds (for status and log buffer). 5 monitor-failure-retryperiod Time between FortiAnalyzer connection retries in seconds (for status and log buffer). 5 mgmt-name Hidden management name of FortiAnalyzer. FGh_Log3 faz-type Hidden setting index of FortiAnalyzer. 3 source-ip Source IPv4 or IPv6 address used to communicate with FortiAnalyzer. (Empty) __change_ip Hidden attribute. 0 upload-option Enable/disable logging to hard disk and then upload to FortiAnalyzer. realtime upload-interval Frequency to check log file for upload. daily upload-day Days of week (month) to upload logs. (Empty) upload-time Time to upload logs (hh:mm). 00:59 reliable Enable/disable reliable logging to FortiAnalyzer. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 260 log.fortiguard/filter CLI Syntax config log.fortiguard filter edit <name_str> set severity {emergency | alert | critical | error | warning | notification | info rmation | debug} set forward-traffic {enable | disable} set local-traffic {enable | disable} set multicast-traffic {enable | disable} set sniffer-traffic {enable | disable} set anomaly {enable | disable} set netscan-discovery {} set netscan-vulnerability {} set voip {enable | disable} set dlp-archive {enable | disable} set gtp {enable | disable} set filter <string> set filter-type {include | exclude} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 261 Description Configuration Description Default Value severity Lowest severity level to log. information forward-traffic Enable/disable log through traffic messages. enable local-traffic Enable/disable log local in or out traffic messages. enable multicast-traffic Enable/disable log multicast traffic messages. enable sniffer-traffic Enable/disable log sniffer traffic messages. enable anomaly Enable/disable log anomaly messages. enable netscan-discovery Enable/disable log netscan discovery events. netscan-vulnerability Enable/disable log netscan vulnerability events. voip Enable/disable log VoIP messages. enable dlp-archive Enable/disable log DLP archive. enable gtp Enable/disable log GTP messages. enable filter Log filter for the log device. (Empty) filter-type Include/exclude logs that match the filter setting. include CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 262 log.fortiguard/override-filter CLI Syntax config log.fortiguard override-filter edit <name_str> set severity {emergency | alert | critical | error | warning | notification | info rmation | debug} set forward-traffic {enable | disable} set local-traffic {enable | disable} set multicast-traffic {enable | disable} set sniffer-traffic {enable | disable} set anomaly {enable | disable} set netscan-discovery {} set netscan-vulnerability {} set voip {enable | disable} set dlp-archive {enable | disable} set gtp {enable | disable} set filter <string> set filter-type {include | exclude} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 263 Description Configuration Description Default Value severity Lowest severity level to log. information forward-traffic Enable/disable log through traffic messages. enable local-traffic Enable/disable log local in or out traffic messages. enable multicast-traffic Enable/disable log multicast traffic messages. enable sniffer-traffic Enable/disable log sniffer traffic messages. enable anomaly Enable/disable log anomaly messages. enable netscan-discovery Enable/disable log netscan discovery events. netscan-vulnerability Enable/disable log netscan vulnerability events. voip Enable/disable log VoIP messages. enable dlp-archive Enable/disable log DLP archive. enable gtp Enable/disable log GTP messages. enable filter Log filter for the log device. (Empty) filter-type Include/exclude logs that match the filter setting. include CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 264 log.fortiguard/override-setting CLI Syntax config log.fortiguard override-setting edit <name_str> set override {enable | disable} set status {enable | disable} set upload-option {store-and-upload | realtime} set upload-interval {daily | weekly | monthly} set upload-day <user> set upload-time <user> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 265 Description Configuration Description Default Value override Enable/disable override FortiGuard settings or use the global settings. disable status Enable FortiCloud. disable upload-option Enable/disable logging to hard disk and then upload to FortiCloud. realtime upload-interval Frequency to check log file for upload. daily upload-day Days of week to roll logs. (Empty) upload-time Time to roll logs (hh:mm). 00:00 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 266 log.fortiguard/setting CLI Syntax config log.fortiguard setting edit <name_str> set status {enable | disable} set upload-option {store-and-upload | realtime} set upload-interval {daily | weekly | monthly} set upload-day <user> set upload-time <user> set enc-algorithm {default | high | low | disable} set source-ip <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 267 Description Configuration Description Default Value status Enable FortiCloud. disable upload-option Enable/disable logging to hard disk and then upload to FortiCloud. realtime upload-interval Frequency to check log file for upload. daily upload-day Days of week to roll logs. (Empty) upload-time Time to roll logs (hh:mm). 00:00 enc-algorithm Enable/disable sending of FortiCloud log data with SSL encryption. high source-ip Source IP address used to connect FortiCloud. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 268 log.memory/filter CLI Syntax config log.memory filter edit <name_str> set severity {emergency | alert | critical | error | warning | notification | info rmation | debug} set forward-traffic {enable | disable} set local-traffic {enable | disable} set multicast-traffic {enable | disable} set sniffer-traffic {enable | disable} set anomaly {enable | disable} set netscan-discovery {} set netscan-vulnerability {} set voip {enable | disable} set gtp {enable | disable} set event {enable | disable} set system {enable | disable} set radius {enable | disable} set ipsec {enable | disable} set dhcp {enable | disable} set ppp {enable | disable} set admin {enable | disable} set ha {enable | disable} set auth {enable | disable} set pattern {enable | disable} set sslvpn-log-auth {enable | disable} set sslvpn-log-adm {enable | disable} set sslvpn-log-session {enable | disable} set vip-ssl {enable | disable} set ldb-monitor {enable | disable} set wan-opt {enable | disable} set wireless-activity {enable | disable} set cpu-memory-usage {enable | disable} set filter <string> set filter-type {include | exclude} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 269 Description Configuration Description Default Value severity Lowest severity level to log. information forward-traffic Enable/disable log through traffic messages. enable local-traffic Enable/disable log local in or out traffic messages. enable multicast-traffic Enable/disable log multicast traffic messages. enable sniffer-traffic Enable/disable log sniffer traffic messages. enable anomaly Enable/disable log anomaly messages. enable netscan-discovery Enable/disable log netscan discovery events. netscan-vulnerability Enable/disable log netscan vulnerability events. voip Enable/disable log VoIP messages. enable gtp Enable/disable log GTP messages. enable event Enable/disable log event messages. enable system Enable/disable log system activity messages. enable radius Enable/disable log RADIUS messages. enable ipsec Enable/disable log IPsec negotiation messages. enable dhcp Enable/disable log DHCP service messages. enable ppp Enable/disable log L2TP/PPTP/PPPoE messages. enable admin Enable/disable log admin login/logout messages. enable ha Enable/disable log HA activity messages. enable auth Enable/disable log firewall authentication messages. enable pattern Enable/disable log pattern update messages. enable sslvpn-log-auth Enable/disable log SSL user authentication. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 270 sslvpn-log-adm Enable/disable log SSL administration. enable sslvpn-log-session Enable/disable log SSL session. enable vip-ssl Enable/disable log VIP SSL messages. enable ldb-monitor Enable/disable log VIP real server health monitoring messages. enable wan-opt Enable/disable log WAN optimization messages. enable wireless-activity Enable/disable log wireless activity. enable cpu-memory-usage Enable/disable log CPU & memory usage every 5 minutes. disable filter Log filter for the log device. (Empty) filter-type Include/exclude logs that match the filter setting. include CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 271 log.memory/global-setting CLI Syntax config log.memory global-setting edit <name_str> set max-size <integer> set full-first-warning-threshold <integer> set full-second-warning-threshold <integer> set full-final-warning-threshold <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 272 Description Configuration Description Default Value max-size Maximum memory buffer size for log (byte). 163840 full-first-warningthreshold Log full first warning threshold (1 - 98, default = 75). 75 full-second-warningthreshold Log full second warning threshold (2 - 99, default = 90). 90 full-final-warningthreshold Log full final warning threshold (3 - 100, default = 95). 95 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 273 log.memory/setting CLI Syntax config log.memory setting edit <name_str> set status {enable | disable} set diskfull {overwrite} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 274 Description Configuration Description Default Value status Enable/disable memory buffer log. enable diskfull Action when memory is full. overwrite CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 275 log.syslogd/filter CLI Syntax config log.syslogd filter edit <name_str> set severity {emergency | alert | critical | error | warning | notification | info rmation | debug} set forward-traffic {enable | disable} set local-traffic {enable | disable} set multicast-traffic {enable | disable} set sniffer-traffic {enable | disable} set anomaly {enable | disable} set netscan-discovery {} set netscan-vulnerability {} set voip {enable | disable} set gtp {enable | disable} set filter <string> set filter-type {include | exclude} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 276 Description Configuration Description Default Value severity Lowest severity level to log. information forward-traffic Enable/disable log through traffic messages. enable local-traffic Enable/disable log local in or out traffic messages. enable multicast-traffic Enable/disable log multicast traffic messages. enable sniffer-traffic Enable/disable log sniffer traffic messages. enable anomaly Enable/disable log anomaly messages. enable netscan-discovery Enable/disable log netscan discovery events. netscan-vulnerability Enable/disable log netscan vulnerability events. voip Enable/disable log VoIP messages. enable gtp Enable/disable log GTP messages. enable filter Log filter for the log device. (Empty) filter-type Include/exclude logs that match the filter setting. include CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 277 log.syslogd/override-filter CLI Syntax config log.syslogd override-filter edit <name_str> set severity {emergency | alert | critical | error | warning | notification | info rmation | debug} set forward-traffic {enable | disable} set local-traffic {enable | disable} set multicast-traffic {enable | disable} set sniffer-traffic {enable | disable} set anomaly {enable | disable} set netscan-discovery {} set netscan-vulnerability {} set voip {enable | disable} set gtp {enable | disable} set filter <string> set filter-type {include | exclude} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 278 Description Configuration Description Default Value severity Lowest severity level to log. information forward-traffic Enable/disable log through traffic messages. enable local-traffic Enable/disable log local in or out traffic messages. enable multicast-traffic Enable/disable log multicast traffic messages. enable sniffer-traffic Enable/disable log sniffer traffic messages. enable anomaly Enable/disable log anomaly messages. enable netscan-discovery Enable/disable log netscan discovery events. netscan-vulnerability Enable/disable log netscan vulnerability events. voip Enable/disable log VoIP messages. enable gtp Enable/disable log GTP messages. enable filter Log filter for the log device. (Empty) filter-type Include/exclude logs that match the filter setting. include CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 279 log.syslogd/override-setting CLI Syntax config log.syslogd override-setting edit <name_str> set override {enable | disable} set status {enable | disable} set server <string> set reliable {enable | disable} set port <integer> set csv {enable | disable} set facility {kernel | user | mail | daemon | auth | syslog | lpr | news | uucp | cron | authpriv | ftp | ntp | audit | alert | clock | local0 | local1 | local2 | local 3 | local4 | local5 | local6 | local7} set source-ip <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 280 Description Configuration Description Default Value override Enable/disable override syslog settings. disable status Enable/disable remote syslog logging. disable server Address of remote syslog server. (Empty) reliable Enable/disable reliable logging (RFC3195). disable port Server listen port. 514 csv Enable/disable CSV formatting of logs. disable facility Remote syslog facility. local7 source-ip Source IP address of syslog. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 281 log.syslogd/setting CLI Syntax config log.syslogd setting edit <name_str> set status {enable | disable} set server <string> set reliable {enable | disable} set port <integer> set csv {enable | disable} set facility {kernel | user | mail | daemon | auth | syslog | lpr | news | uucp | cron | authpriv | ftp | ntp | audit | alert | clock | local0 | local1 | local2 | local 3 | local4 | local5 | local6 | local7} set source-ip <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 282 Description Configuration Description Default Value status Enable/disable remote syslog logging. disable server Address of remote syslog server. (Empty) reliable Enable/disable reliable logging (RFC3195). disable port Server listen port. 514 csv Enable/disable CSV formatting of logs. disable facility Remote syslog facility. local7 source-ip Source IP address of syslog. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 283 log.syslogd2/filter CLI Syntax config log.syslogd2 filter edit <name_str> set severity {emergency | alert | critical | error | warning | notification | info rmation | debug} set forward-traffic {enable | disable} set local-traffic {enable | disable} set multicast-traffic {enable | disable} set sniffer-traffic {enable | disable} set anomaly {enable | disable} set netscan-discovery {} set netscan-vulnerability {} set voip {enable | disable} set gtp {enable | disable} set filter <string> set filter-type {include | exclude} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 284 Description Configuration Description Default Value severity Lowest severity level to log. information forward-traffic Enable/disable log through traffic messages. enable local-traffic Enable/disable log local in or out traffic messages. enable multicast-traffic Enable/disable log multicast traffic messages. enable sniffer-traffic Enable/disable log sniffer traffic messages. enable anomaly Enable/disable log anomaly messages. enable netscan-discovery Enable/disable log netscan discovery events. netscan-vulnerability Enable/disable log netscan vulnerability events. voip Enable/disable log VoIP messages. enable gtp Enable/disable log GTP messages. enable filter Log filter for the log device. (Empty) filter-type Include/exclude logs that match the filter setting. include CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 285 log.syslogd2/setting CLI Syntax config log.syslogd2 setting edit <name_str> set status {enable | disable} set server <string> set reliable {enable | disable} set port <integer> set csv {enable | disable} set facility {kernel | user | mail | daemon | auth | syslog | lpr | news | uucp | cron | authpriv | ftp | ntp | audit | alert | clock | local0 | local1 | local2 | local 3 | local4 | local5 | local6 | local7} set source-ip <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 286 Description Configuration Description Default Value status Enable/disable remote syslog logging. disable server Address of remote syslog server. (Empty) reliable Enable/disable reliable logging (RFC3195). disable port Server listen port. 514 csv Enable/disable CSV formatting of logs. disable facility Remote syslog facility. local7 source-ip Source IP address of syslog. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 287 log.syslogd3/filter CLI Syntax config log.syslogd3 filter edit <name_str> set severity {emergency | alert | critical | error | warning | notification | info rmation | debug} set forward-traffic {enable | disable} set local-traffic {enable | disable} set multicast-traffic {enable | disable} set sniffer-traffic {enable | disable} set anomaly {enable | disable} set netscan-discovery {} set netscan-vulnerability {} set voip {enable | disable} set gtp {enable | disable} set filter <string> set filter-type {include | exclude} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 288 Description Configuration Description Default Value severity Lowest severity level to log. information forward-traffic Enable/disable log through traffic messages. enable local-traffic Enable/disable log local in or out traffic messages. enable multicast-traffic Enable/disable log multicast traffic messages. enable sniffer-traffic Enable/disable log sniffer traffic messages. enable anomaly Enable/disable log anomaly messages. enable netscan-discovery Enable/disable log netscan discovery events. netscan-vulnerability Enable/disable log netscan vulnerability events. voip Enable/disable log VoIP messages. enable gtp Enable/disable log GTP messages. enable filter Log filter for the log device. (Empty) filter-type Include/exclude logs that match the filter setting. include CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 289 log.syslogd3/setting CLI Syntax config log.syslogd3 setting edit <name_str> set status {enable | disable} set server <string> set reliable {enable | disable} set port <integer> set csv {enable | disable} set facility {kernel | user | mail | daemon | auth | syslog | lpr | news | uucp | cron | authpriv | ftp | ntp | audit | alert | clock | local0 | local1 | local2 | local 3 | local4 | local5 | local6 | local7} set source-ip <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 290 Description Configuration Description Default Value status Enable/disable remote syslog logging. disable server Address of remote syslog server. (Empty) reliable Enable/disable reliable logging (RFC3195). disable port Server listen port. 514 csv Enable/disable CSV formatting of logs. disable facility Remote syslog facility. local7 source-ip Source IP address of syslog. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 291 log.syslogd4/filter CLI Syntax config log.syslogd4 filter edit <name_str> set severity {emergency | alert | critical | error | warning | notification | info rmation | debug} set forward-traffic {enable | disable} set local-traffic {enable | disable} set multicast-traffic {enable | disable} set sniffer-traffic {enable | disable} set anomaly {enable | disable} set netscan-discovery {} set netscan-vulnerability {} set voip {enable | disable} set gtp {enable | disable} set filter <string> set filter-type {include | exclude} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 292 Description Configuration Description Default Value severity Lowest severity level to log. information forward-traffic Enable/disable log through traffic messages. enable local-traffic Enable/disable log local in or out traffic messages. enable multicast-traffic Enable/disable log multicast traffic messages. enable sniffer-traffic Enable/disable log sniffer traffic messages. enable anomaly Enable/disable log anomaly messages. enable netscan-discovery Enable/disable log netscan discovery events. netscan-vulnerability Enable/disable log netscan vulnerability events. voip Enable/disable log VoIP messages. enable gtp Enable/disable log GTP messages. enable filter Log filter for the log device. (Empty) filter-type Include/exclude logs that match the filter setting. include CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 293 log.syslogd4/setting CLI Syntax config log.syslogd4 setting edit <name_str> set status {enable | disable} set server <string> set reliable {enable | disable} set port <integer> set csv {enable | disable} set facility {kernel | user | mail | daemon | auth | syslog | lpr | news | uucp | cron | authpriv | ftp | ntp | audit | alert | clock | local0 | local1 | local2 | local 3 | local4 | local5 | local6 | local7} set source-ip <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 294 Description Configuration Description Default Value status Enable/disable remote syslog logging. disable server Address of remote syslog server. (Empty) reliable Enable/disable reliable logging (RFC3195). disable port Server listen port. 514 csv Enable/disable CSV formatting of logs. disable facility Remote syslog facility. local7 source-ip Source IP address of syslog. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 295 log.webtrends/filter CLI Syntax config log.webtrends filter edit <name_str> set severity {emergency | alert | critical | error | warning | notification | info rmation | debug} set forward-traffic {enable | disable} set local-traffic {enable | disable} set multicast-traffic {enable | disable} set sniffer-traffic {enable | disable} set anomaly {enable | disable} set netscan-discovery {} set netscan-vulnerability {} set voip {enable | disable} set gtp {enable | disable} set filter <string> set filter-type {include | exclude} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 296 Description Configuration Description Default Value severity Lowest severity level to log. information forward-traffic Enable/disable log through traffic messages. enable local-traffic Enable/disable log local in or out traffic messages. enable multicast-traffic Enable/disable log multicast traffic messages. enable sniffer-traffic Enable/disable log sniffer traffic messages. enable anomaly Enable/disable log anomaly messages. enable netscan-discovery Enable/disable log netscan discovery events. netscan-vulnerability Enable/disable log netscan vulnerability events. voip Enable/disable log VoIP messages. enable gtp Enable/disable log GTP messages. enable filter Log filter for the log device. (Empty) filter-type Include/exclude logs that match the filter setting. include CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 297 log.webtrends/setting CLI Syntax config log.webtrends setting edit <name_str> set status {enable | disable} set server <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 298 Description Configuration Description Default Value status Enable/disable WebTrends logging. disable server Address of the remote WebTrends. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 299 log/custom-field CLI Syntax config log custom-field edit <name_str> set id <string> set name <string> set value <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 300 Description Configuration Description Default Value id ID. (Empty) name Field name. (Empty) value Field value. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 301 log/eventfilter CLI Syntax config log eventfilter edit <name_str> set event {enable | disable} set system {enable | disable} set vpn {enable | disable} set user {enable | disable} set router {enable | disable} set wireless-activity {enable | disable} set wan-opt {enable | disable} set endpoint {enable | disable} set ha {enable | disable} set compliance-check {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 302 Description Configuration Description Default Value event Enable/disable log event messages. enable system Enable/disable log system activity messages. enable vpn Enable/disable log VPN messages. enable user Enable/disable log user activity messages. enable router Enable/disable log router activity. enable wireless-activity Enable/disable log wireless activity. enable wan-opt Enable/disable log WAN optimization messages. enable endpoint Enable/disable log for endpoint events. enable ha Enable/disable log for ha events. enable compliance-check Enable/disable log for PCI DSS compliance check. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 303 log/gui-display CLI Syntax config log gui-display edit <name_str> set resolve-hosts {enable | disable} set resolve-apps {enable | disable} set fortiview-unscanned-apps {enable | disable} set fortiview-local-traffic {enable | disable} set location {memory | disk | fortianalyzer | fortiguard} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 304 Description Configuration Description Default Value resolve-hosts Resolve IP addresses to hostnames on the GUI using reverse DNS lookup. enable resolve-apps Resolve unknown applications on the GUI using remote application database. enable fortiview-unscannedapps Enable/disable inclusion of unscanned traffic in FortiView application charts. disable fortiview-local-traffic Enable/disable inclusion of local-in traffic in FortiView realtime charts. disable location GUI log location display. memory CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 305 log/setting CLI Syntax config log setting edit <name_str> set resolve-ip {enable | disable} set resolve-port {enable | disable} set log-user-in-upper {enable | disable} set fwpolicy-implicit-log {enable | disable} set fwpolicy6-implicit-log {enable | disable} set log-invalid-packet {enable | disable} set local-in-allow {enable | disable} set local-in-deny-unicast {enable | disable} set local-in-deny-broadcast {enable | disable} set local-out {enable | disable} set daemon-log {enable | disable} set neighbor-event {enable | disable} set brief-traffic-format {enable | disable} set user-anonymize {enable | disable} set fortiview-weekly-data {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 306 Description Configuration Description Default Value resolve-ip Add resolved domain name into traffic log if possible. disable resolve-port Add resolved service name into traffic log if possible. enable log-user-in-upper Enable/disable collect log with user-in-upper. disable fwpolicy-implicit-log Enable/disable collect firewall implicit policy log. disable fwpolicy6-implicit-log Enable/disable collect firewall implicit policy6 log. disable log-invalid-packet Enable/disable collect invalid packet traffic log. disable local-in-allow Enable/disable collect local-in-allow log. disable local-in-deny-unicast Enable/disable collect local-in-deny-unicast log. disable local-in-deny-broadcast Enable/disable collect local-in-deny-broadcast log. disable local-out Enable/disable collect local-out log. disable daemon-log Enable/disable collect daemon log. disable neighbor-event Enable/disable collect neighbor event log. disable brief-traffic-format Enable/disable use of brief format for traffic log. disable user-anonymize Enable/disable anonymize log user name. disable fortiview-weekly-data Enable/disable FortiView weekly data. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 307 log/threat-weight CLI Syntax config log threat-weight edit <name_str> set status {enable | disable} config level edit <name_str> set low <integer> set medium <integer> set high <integer> set critical <integer> end set blocked-connection {disable | low | medium | high | critical} set failed-connection {disable | low | medium | high | critical} set malware-detected {disable | low | medium | high | critical} set url-block-detected {disable | low | medium | high | critical} set botnet-connection-detected {disable | low | medium | high | critical} config ips edit <name_str> set info-severity {disable | low | medium | high | critical} set low-severity {disable | low | medium | high | critical} set medium-severity {disable | low | medium | high | critical} set high-severity {disable | low | medium | high | critical} set critical-severity {disable | low | medium | high | critical} end config web edit <name_str> set id <integer> set category <integer> set level {disable | low | medium | high | critical} end config geolocation edit <name_str> set id <integer> set country <string> set level {disable | low | medium | high | critical} end config application edit <name_str> set id <integer> set category <integer> set level {disable | low | medium | high | critical} end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 308 Description Configuration Description Default Value status Enable/disable threat weight status. enable level Level to score mapping. Details below Configuration low medium high critical Default Value 5 10 30 50 blocked-connection Score level for blocked connections for threat weight. high failed-connection Score level for failed connections for threat weight. low malware-detected Score level for detected malware for threat weight. critical url-block-detected Score level for URL blocking for threat weight. high botnet-connectiondetected Score level for detected botnet connection for threat weight. critical ips IPS reputation settings. Details below Configuration info-severity low-severity medium-severity high-severity critical-severity Default Value disable low medium high critical web Web-based threat weight settings. (Empty) geolocation Geolocation-based threat weight settings. (Empty) application Application-control based threat weight settings. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 309 netscan/assets CLI Syntax config netscan assets edit <name_str> set asset-id <integer> set name <string> set scheduled {disable | enable} set addr-type {ip | range} set start-ip <ipv4-address-any> set end-ip <ipv4-address-any> set auth-windows {disable | enable} set auth-unix {disable | enable} set win-username <string> set win-password <password> set unix-username <string> set unix-password <password> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 310 Description Configuration Description Default Value asset-id Asset ID. 0 name Name of this asset. (Empty) scheduled Enable/disable including this asset in scheduled vulnerability scan. disable addr-type IP address or range. ip start-ip IP address of asset or start of asset range. 0.0.0.0 end-ip End of asset range. 0.0.0.0 auth-windows Enable/disable authentication on Windows hosts. disable auth-unix Enable/disable authentication on UNIX hosts. disable win-username User name for Windows hosts. (Empty) win-password Password for Windows hosts. (Empty) unix-username User name for Unix hosts. (Empty) unix-password Password for Unix hosts. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 311 netscan/settings CLI Syntax config netscan settings edit <name_str> set scan-mode {quick | standard | full} set scheduled-pause {disable | enable} set time <user> set pause-from <user> set pause-to <user> set recurrence {daily | weekly | monthly} set day-of-week {sunday | monday | tuesday | wednesday | thursday | friday | satur day} set day-of-month <integer> set tcp-ports <user> set udp-ports <user> set tcp-scan {auto | enable | disable} set udp-scan {auto | enable | disable} set service-detection {auto | enable | disable} set os-detection {auto | enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 312 Description Configuration Description Default Value scan-mode Level of vulnerability scanning to perform on ports. quick scheduled-pause Enable/disable set time during which scanning should pause. disable time Time of day to start the scan. 00:00 pause-from Time of day to pause scanning. 00:00 pause-to Time of day to resume scanning. 00:00 recurrence Frequency at which the scans should recur. weekly day-of-week Day of the week on which to run the scan. sunday day-of-month Day of the month on which to run the scan. 1 tcp-ports TCP ports scanned. (Empty) udp-ports UDP ports scanned. (Empty) tcp-scan Enable/disable TCP port scan. auto udp-scan Enable/disable UDP port scan. auto service-detection Enable/disable service detection. auto os-detection Enable/disable OS detection. auto CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 313 report/chart CLI Syntax config report chart edit <name_str> set name <string> set policy <integer> set type {graph | table} set period {last24h | last7d} config drill-down-charts edit <name_str> set id <integer> set chart-name <string> set status {enable | disable} end set comments <string> set dataset <string> set category {misc | traffic | event | virus | webfilter | attack | spam | dlp | a pp-ctrl | vulnerability} set favorite {no | yes} set graph-type {none | bar | pie | line | flow} set style {auto | manual} set dimension {2D | 3D} config x-series edit <name_str> set databind <string> set caption <string> set caption-font-size <integer> set font-size <integer> set label-angle {45-degree | vertical | horizontal} set is-category {yes | no} set scale-unit {minute | hour | day | month | year} set scale-step <integer> set scale-direction {decrease | increase} set scale-format {YYYY-MM-DD-HH-MM | YYYY-MM-DD HH | YYYY-MM-DD | YYYY-MM | YY YY | HH-MM | MM-DD} set unit <string> end config y-series edit <name_str> set databind <string> set caption <string> set caption-font-size <integer> set font-size <integer> set label-angle {45-degree | vertical | horizontal} set group <string> set unit <string> set extra-y {enable | disable} set extra-databind <string> set y-legend <string> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 314 set extra-y-legend <string> end config category-series edit <name_str> set databind <string> set font-size <integer> end config value-series edit <name_str> set databind <string> end set title <string> set title-font-size <integer> set background <string> set color-palette <string> set legend {enable | disable} set legend-font-size <integer> config column edit <name_str> set id <integer> set header-value <string> set detail-value <string> set footer-value <string> set detail-unit <string> set footer-unit <string> config mapping edit <name_str> set id <integer> set op {none | greater | greater-equal | less | less-equal | equal | betwe en} set set set set end value-type {integer | string} value1 <string> value2 <string> displayname <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 315 Description Configuration Description Default Value name Chart Widget Name (Empty) policy Used by monitor policy. 0 type Chart type. graph period Time period. last24h drill-down-charts Drill down charts. (Empty) comments Comment. (Empty) dataset Bind dataset to chart. (Empty) category Category. misc favorite Favorite. no graph-type Graph type. none style Style. auto dimension Dimension. 3D x-series X-series of chart. Details below Configuration databind caption caption-font-size font-size label-angle is-category scale-unit scale-step scale-direction scale-format unit y-series CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Default Value (Empty) (Empty) 0 0 45-degree yes day 1 decrease YYYY-MM-DD-HH-MM (Empty) Y-series of chart. Details below 316 Configuration databind caption caption-font-size font-size label-angle group unit extra-y extra-databind y-legend extra-y-legend category-series Default Value (Empty) (Empty) 0 0 horizontal (Empty) (Empty) disable (Empty) (Empty) (Empty) Category series of pie chart. Configuration databind font-size value-series Details below Default Value (Empty) 0 Value series of pie chart. Configuration databind Details below Default Value (Empty) title Chart title. (Empty) title-font-size Font size of chart title. 0 background Chart background. (Empty) color-palette Color palette (system will pick color automatically by default). (Empty) legend Enable/Disable Legend area. enable legend-font-size Font size of legend area. 0 column Table column definition. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 317 report/dataset CLI Syntax config report dataset edit <name_str> set name <string> set policy <integer> set query <string> config field edit <name_str> set id <integer> set type {text | integer | double} set name <string> set displayname <string> end config parameters edit <name_str> set id <integer> set display-name <string> set field <string> set data-type {text | integer | double | long-integer | date-time} end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 318 Description Configuration Description Default Value name Name. (Empty) policy Used by monitor policy. 0 query SQL query statement. (Empty) field Fields. (Empty) parameters Parameters. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 319 report/layout CLI Syntax config report layout edit <name_str> set name <string> set title <string> set subtitle <string> set description <string> set style-theme <string> set options {include-table-of-content | auto-numbering-heading | view-chart-as-hea ding | show-html-navbar-before-heading | dummy-option} set format {html | pdf} set schedule-type {demand | daily | weekly} set day {sunday | monday | tuesday | wednesday | thursday | friday | saturday} set time <user> set cutoff-option {run-time | custom} set cutoff-time <user> set email-send {enable | disable} set email-recipients <string> set max-pdf-report <integer> config page edit <name_str> set paper {a4 | letter} set column-break-before {heading1 | heading2 | heading3} set page-break-before {heading1 | heading2 | heading3} set options {header-on-first-page | footer-on-first-page} config header edit <name_str> set style <string> config header-item edit <name_str> set id <integer> set description <string> set type {text | image} set style <string> set content <string> set img-src <string> end end config footer edit <name_str> set style <string> config footer-item edit <name_str> set id <integer> set description <string> set type {text | image} set style <string> set content <string> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 320 set img-src <string> end end end config body-item edit <name_str> set id <integer> set description <string> set type {text | image | chart | misc} set style <string> set top-n <integer> set hide {enable | disable} config parameters edit <name_str> set id <integer> set name <string> set value <string> end set text-component {text | heading1 | heading2 | heading3} set content <string> set img-src <string> set list-component {bullet | numbered} config list edit <name_str> set id <integer> set content <string> end set chart <string> set chart-options {include-no-data | hide-title | show-caption} set drill-down-items <string> set drill-down-types <string> set table-column-widths <string> set table-caption-style <string> set table-head-style <string> set table-odd-row-style <string> set table-even-row-style <string> set misc-component {hline | page-break | column-break | section-start} set column <integer> set title <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 321 Description Configuration Description Default Value name Report layout name. (Empty) title Report title. (Empty) subtitle Report subtitle. (Empty) description Description. (Empty) style-theme Report style theme. (Empty) options Report layout options. include-table-of-content auto-numberingheading view-chart-asheading format Report format. html schedule-type Report schedule type. daily day Schedule days of week to generate report. sunday time Schedule time to generate report [hh:mm]. 00:00 cutoff-option Cutoff-option is either run-time or custom. run-time cutoff-time Custom cutoff time to generate report [hh:mm]. 00:00 email-send Enable/disable sending emails after reports are generated. disable email-recipients Email recipients for generated reports. (Empty) max-pdf-report Maximum number of PDF reports to keep at one time (oldest report is overwritten). 31 page Configure report page. Details below CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 322 Configuration paper column-break-before page-break-before options header footer body-item CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Default Value a4 (Empty) (Empty) (Empty) {"style":"","header-item":[]} {"style":"","footer-item":[]} Configure report body item. (Empty) 323 report/setting CLI Syntax config report setting edit <name_str> set pdf-report {enable | disable} set fortiview {enable | disable} set report-source {forward-traffic | sniffer-traffic} set web-browsing-threshold <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 324 Description Configuration Description Default Value pdf-report Enable/disable PDF report. enable fortiview Enable/disable historical FortiView. enable report-source Report log source. forward-traffic web-browsingthreshold Web browsing time calculation threshold (3 - 15 min). 3 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 325 report/style CLI Syntax config report style edit <name_str> set name <string> set options {font | text | color | align | size | margin | border | padding | colu mn} set font-family {Verdana | Arial | Helvetica | Courier | Times} set font-style {normal | italic} set font-weight {normal | bold} set font-size <string> set line-height <string> set fg-color <string> set bg-color <string> set align {left | center | right | justify} set width <string> set height <string> set margin-top <string> set margin-right <string> set margin-bottom <string> set margin-left <string> set border-top <user> set border-right <user> set border-bottom <user> set border-left <user> set padding-top <string> set padding-right <string> set padding-bottom <string> set padding-left <string> set column-span {none | all} set column-gap <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 326 Description Configuration Description Default Value name Report style name. (Empty) options Report style options. (Empty) font-family Font family. (Empty) font-style Font style. normal font-weight Font weight. normal font-size Font size. (Empty) line-height Text line height. (Empty) fg-color Foreground color. (Empty) bg-color Background color. (Empty) align Alignment. (Empty) width Width. (Empty) height Height. (Empty) margin-top Margin top. (Empty) margin-right Margin right. (Empty) margin-bottom Margin bottom. (Empty) margin-left Margin left. (Empty) border-top Border top. " none " border-right Border right. " none " border-bottom Border bottom. " none " border-left Border left. " none " padding-top Padding top. (Empty) padding-right Padding right. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 327 padding-bottom Padding bottom. (Empty) padding-left Padding left. (Empty) column-span Column span. none column-gap Column gap. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 328 report/theme CLI Syntax config report theme edit <name_str> set name <string> set page-orient {portrait | landscape} set column-count {1 | 2 | 3} set default-html-style <string> set default-pdf-style <string> set page-style <string> set page-header-style <string> set page-footer-style <string> set report-title-style <string> set report-subtitle-style <string> set toc-title-style <string> set toc-heading1-style <string> set toc-heading2-style <string> set toc-heading3-style <string> set toc-heading4-style <string> set heading1-style <string> set heading2-style <string> set heading3-style <string> set heading4-style <string> set normal-text-style <string> set bullet-list-style <string> set numbered-list-style <string> set image-style <string> set hline-style <string> set graph-chart-style <string> set table-chart-style <string> set table-chart-caption-style <string> set table-chart-head-style <string> set table-chart-odd-row-style <string> set table-chart-even-row-style <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 329 Description Configuration Description Default Value name Report theme name. (Empty) page-orient Report page orientation. portrait column-count Report page column count. 1 default-html-style Default HTML report style. (Empty) default-pdf-style Default PDF report style. (Empty) page-style Report page style. (Empty) page-header-style Report page header style. (Empty) page-footer-style Report page footer style. (Empty) report-title-style Report title style. (Empty) report-subtitle-style Report subtitle style. (Empty) toc-title-style Table of contents title style. (Empty) toc-heading1-style Table of contents heading style. (Empty) toc-heading2-style Table of contents heading style. (Empty) toc-heading3-style Table of contents heading style. (Empty) toc-heading4-style Table of contents heading style. (Empty) heading1-style Report heading style. (Empty) heading2-style Report heading style. (Empty) heading3-style Report heading style. (Empty) heading4-style Report heading style. (Empty) normal-text-style Normal text style. (Empty) bullet-list-style Bullet list style. (Empty) numbered-list-style Numbered list style. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 330 image-style Image style. (Empty) hline-style Horizontal line style. (Empty) graph-chart-style Graph chart style. (Empty) table-chart-style Table chart style. (Empty) table-chart-captionstyle Table chart caption style. (Empty) table-chart-head-style Table chart head row style. (Empty) table-chart-odd-rowstyle Table chart odd row style. (Empty) table-chart-even-rowstyle Table chart even row style. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 331 router/access-list CLI Syntax config router access-list edit <name_str> set name <string> set comments <string> config rule edit <name_str> set id <integer> set action {permit | deny} set prefix <user> set wildcard <user> set exact-match {enable | disable} set flags <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 332 Description Configuration Description Default Value name Name. (Empty) comments Comment. (Empty) rule Rule. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 333 router/access-list6 CLI Syntax config router access-list6 edit <name_str> set name <string> set comments <string> config rule edit <name_str> set id <integer> set action {permit | deny} set prefix6 <user> set exact-match {enable | disable} set flags <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 334 Description Configuration Description Default Value name Name. (Empty) comments Comment. (Empty) rule Rule. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 335 router/aspath-list CLI Syntax config router aspath-list edit <name_str> set name <string> config rule edit <name_str> set id <integer> set action {deny | permit} set regexp <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 336 Description Configuration Description Default Value name AS path list name. (Empty) rule AS path list rule. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 337 router/auth-path CLI Syntax config router auth-path edit <name_str> set name <string> set device <string> set gateway <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 338 Description Configuration Description Default Value name Name of the entry. (Empty) device Output interface. (Empty) gateway Gateway IP address. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 339 router/bfd CLI Syntax config router bfd edit <name_str> config neighbor edit <name_str> set ip <ipv4-address> set interface <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 340 Description Configuration Description Default Value neighbor neighbor (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 341 router/bgp CLI Syntax config router bgp edit <name_str> set as <integer> set router-id <ipv4-address-any> set keepalive-timer <integer> set holdtime-timer <integer> set always-compare-med {enable | disable} set bestpath-as-path-ignore {enable | disable} set bestpath-cmp-confed-aspath {enable | disable} set bestpath-cmp-routerid {enable | disable} set bestpath-med-confed {enable | disable} set bestpath-med-missing-as-worst {enable | disable} set client-to-client-reflection {enable | disable} set dampening {enable | disable} set deterministic-med {enable | disable} set ebgp-multipath {enable | disable} set ibgp-multipath {enable | disable} set enforce-first-as {enable | disable} set fast-external-failover {enable | disable} set log-neighbour-changes {enable | disable} set network-import-check {enable | disable} set ignore-optional-capability {enable | disable} set cluster-id <ipv4-address-any> set confederation-identifier <integer> config confederation-peers edit <name_str> set peer <string> end set dampening-route-map <string> set dampening-reachability-half-life <integer> set dampening-reuse <integer> set dampening-suppress <integer> set dampening-max-suppress-time <integer> set dampening-unreachability-half-life <integer> set default-local-preference <integer> set scan-time <integer> set distance-external <integer> set distance-internal <integer> set distance-local <integer> set synchronization {enable | disable} set graceful-restart {enable | disable} set graceful-restart-time <integer> set graceful-stalepath-time <integer> set graceful-update-delay <integer> config aggregate-address edit <name_str> set id <integer> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 342 set prefix <ipv4-classnet-any> set as-set {enable | disable} set summary-only {enable | disable} end config aggregate-address6 edit <name_str> set id <integer> set prefix6 <ipv6-prefix> set as-set {enable | disable} set summary-only {enable | disable} end config neighbor edit <name_str> set ip <string> set advertisement-interval <integer> set allowas-in-enable {enable | disable} set allowas-in-enable6 {enable | disable} set allowas-in <integer> set allowas-in6 <integer> set attribute-unchanged {as-path | med | next-hop} set attribute-unchanged6 {as-path | med | next-hop} set activate {enable | disable} set activate6 {enable | disable} set bfd {enable | disable} set capability-dynamic {enable | disable} set capability-orf {none | receive | send | both} set capability-orf6 {none | receive | send | both} set capability-graceful-restart {enable | disable} set capability-graceful-restart6 {enable | disable} set capability-route-refresh {enable | disable} set capability-default-originate {enable | disable} set capability-default-originate6 {enable | disable} set dont-capability-negotiate {enable | disable} set ebgp-enforce-multihop {enable | disable} set next-hop-self {enable | disable} set next-hop-self6 {enable | disable} set override-capability {enable | disable} set passive {enable | disable} set remove-private-as {enable | disable} set remove-private-as6 {enable | disable} set route-reflector-client {enable | disable} set route-reflector-client6 {enable | disable} set route-server-client {enable | disable} set route-server-client6 {enable | disable} set shutdown {enable | disable} set soft-reconfiguration {enable | disable} set soft-reconfiguration6 {enable | disable} set as-override {enable | disable} set as-override6 {enable | disable} set strict-capability-match {enable | disable} set default-originate-routemap <string> set default-originate-routemap6 <string> set description <string> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 343 set description <string> set distribute-list-in <string> set distribute-list-in6 <string> set distribute-list-out <string> set distribute-list-out6 <string> set ebgp-multihop-ttl <integer> set filter-list-in <string> set filter-list-in6 <string> set filter-list-out <string> set filter-list-out6 <string> set interface <string> set maximum-prefix <integer> set maximum-prefix6 <integer> set maximum-prefix-threshold <integer> set maximum-prefix-threshold6 <integer> set maximum-prefix-warning-only {enable | disable} set maximum-prefix-warning-only6 {enable | disable} set prefix-list-in <string> set prefix-list-in6 <string> set prefix-list-out <string> set prefix-list-out6 <string> set remote-as <integer> set retain-stale-time <integer> set route-map-in <string> set route-map-in6 <string> set route-map-out <string> set route-map-out6 <string> set send-community {standard | extended | both | disable} set send-community6 {standard | extended | both | disable} set keep-alive-timer <integer> set holdtime-timer <integer> set connect-timer <integer> set unsuppress-map <string> set unsuppress-map6 <string> set update-source <string> set weight <integer> set restart-time <integer> set password <password> config conditional-advertise edit <name_str> set advertise-routemap <string> set condition-routemap <string> set condition-type {exist | non-exist} end end config neighbor-group edit <name_str> set name <string> set advertisement-interval <integer> set allowas-in-enable {enable | disable} set allowas-in-enable6 {enable | disable} set allowas-in <integer> set allowas-in6 <integer> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 344 set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set allowas-in6 <integer> attribute-unchanged {as-path | med | next-hop} attribute-unchanged6 {as-path | med | next-hop} activate {enable | disable} activate6 {enable | disable} bfd {enable | disable} capability-dynamic {enable | disable} capability-orf {none | receive | send | both} capability-orf6 {none | receive | send | both} capability-graceful-restart {enable | disable} capability-graceful-restart6 {enable | disable} capability-route-refresh {enable | disable} capability-default-originate {enable | disable} capability-default-originate6 {enable | disable} dont-capability-negotiate {enable | disable} ebgp-enforce-multihop {enable | disable} next-hop-self {enable | disable} next-hop-self6 {enable | disable} override-capability {enable | disable} passive {enable | disable} remove-private-as {enable | disable} remove-private-as6 {enable | disable} route-reflector-client {enable | disable} route-reflector-client6 {enable | disable} route-server-client {enable | disable} route-server-client6 {enable | disable} shutdown {enable | disable} soft-reconfiguration {enable | disable} soft-reconfiguration6 {enable | disable} as-override {enable | disable} as-override6 {enable | disable} strict-capability-match {enable | disable} default-originate-routemap <string> default-originate-routemap6 <string> description <string> distribute-list-in <string> distribute-list-in6 <string> distribute-list-out <string> distribute-list-out6 <string> ebgp-multihop-ttl <integer> filter-list-in <string> filter-list-in6 <string> filter-list-out <string> filter-list-out6 <string> interface <string> maximum-prefix <integer> maximum-prefix6 <integer> maximum-prefix-threshold <integer> maximum-prefix-threshold6 <integer> maximum-prefix-warning-only {enable | disable} maximum-prefix-warning-only6 {enable | disable} prefix-list-in <string> prefix-list-in6 <string> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 345 set prefix-list-in6 <string> set prefix-list-out <string> set prefix-list-out6 <string> set remote-as <integer> set retain-stale-time <integer> set route-map-in <string> set route-map-in6 <string> set route-map-out <string> set route-map-out6 <string> set send-community {standard | extended | both | disable} set send-community6 {standard | extended | both | disable} set keep-alive-timer <integer> set holdtime-timer <integer> set connect-timer <integer> set unsuppress-map <string> set unsuppress-map6 <string> set update-source <string> set weight <integer> set restart-time <integer> end config neighbor-range edit <name_str> set id <integer> set prefix <ipv4-classnet> set max-neighbor-num <integer> set neighbor-group <string> end config network edit <name_str> set id <integer> set prefix <ipv4-classnet> set backdoor {enable | disable} set route-map <string> end config network6 edit <name_str> set id <integer> set prefix6 <ipv6-network> set backdoor {enable | disable} set route-map <string> end config redistribute edit <name_str> set name <string> set status {enable | disable} set route-map <string> end config redistribute6 edit <name_str> set name <string> set status {enable | disable} set route-map <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 346 end config admin-distance edit <name_str> set id <integer> set neighbour-prefix <ipv4-classnet> set route-list <string> set distance <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 347 Description Configuration Description Default Value as Router AS number. 0 router-id Router ID. 0.0.0.0 keepalive-timer Frequency to send keep alive requests. 60 holdtime-timer Number of seconds to mark peer as dead. 180 always-compare-med Enable/disable always compare MED. disable bestpath-as-pathignore Enable/disable ignore AS path. disable bestpath-cmp-confedaspath Enable/disable compare federation AS path length. disable bestpath-cmp-routerid Enable/disable compare router ID for identical EBGP paths. disable bestpath-med-confed Enable/disable compare MED among confederation paths. disable bestpath-med-missingas-worst Enable/disable treat missing MED as least preferred. disable client-to-clientreflection Enable/disable client-to-client route reflection. enable dampening Enable/disable route-flap dampening. disable deterministic-med Enable/disable enforce deterministic comparison of MED. disable ebgp-multipath Enable/disable EBGP multi-path. disable ibgp-multipath Enable/disable IBGP multi-path. disable enforce-first-as Enable/disable enforce first AS for EBGP routes. enable fast-external-failover Enable/disable reset peer BGP session if link goes down. enable log-neighbour-changes Enable logging of BGP neighbour's changes enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 348 network-import-check Enable/disable ensure BGP network route exists in IGP. enable ignore-optionalcapability Don't send unknown optional capability notification message enable cluster-id Route reflector cluster ID. 0.0.0.0 confederation-identifier Confederation identifier. 0 confederation-peers Confederation peers. (Empty) dampening-route-map Criteria for dampening. (Empty) dampeningreachability-half-life Reachability half-life time for penalty (min). 15 dampening-reuse Threshold to reuse routes. 750 dampening-suppress Threshold to suppress routes. 2000 dampening-maxsuppress-time Maximum minutes a route can be suppressed. 60 dampeningunreachability-half-life Unreachability half-life time for penalty (min). 15 default-localpreference Default local preference. 100 scan-time Background scanner interval (sec). 60 distance-external Distance for routes external to the AS. 20 distance-internal Distance for routes internal to the AS. 200 distance-local Distance for routes local to the AS. 200 synchronization Enable/disable only advertise routes from iBGP if routes present in an IGP. disable graceful-restart Enable/disable BGP graceful restart capabilities. disable graceful-restart-time Time needed for neighbors to restart (sec). 120 graceful-stalepath-time Time to hold stale paths of restarting neighbor (sec). 360 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 349 graceful-update-delay Route advertisement/selection delay after restart (sec). 120 aggregate-address BGP aggregate address table. (Empty) aggregate-address6 BGP IPv6 aggregate address table. (Empty) neighbor BGP neighbor table. (Empty) neighbor-group BGP neighbor group table. (Empty) neighbor-range BGP neighbor range table. (Empty) network BGP network table. (Empty) network6 BGP IPv6 network table. (Empty) redistribute BGP IPv4 redistribute table. (Empty) redistribute6 BGP IPv6 redistribute table. (Empty) admin-distance Administrative distance modifications. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 350 router/community-list CLI Syntax config router community-list edit <name_str> set name <string> set type {standard | expanded} config rule edit <name_str> set id <integer> set action {deny | permit} set regexp <string> set match <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 351 Description Configuration Description Default Value name Community list name. (Empty) type Community list type. standard rule Community list rule. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 352 router/isis CLI Syntax config router isis edit <name_str> set is-type {level-1-2 | level-1 | level-2-only} set auth-mode-l1 {password | md5} set auth-mode-l2 {password | md5} set auth-password-l1 <password> set auth-password-l2 <password> set auth-keychain-l1 <string> set auth-keychain-l2 <string> set auth-sendonly-l1 {enable | disable} set auth-sendonly-l2 {enable | disable} set ignore-lsp-errors {enable | disable} set lsp-gen-interval-l1 <integer> set lsp-gen-interval-l2 <integer> set lsp-refresh-interval <integer> set max-lsp-lifetime <integer> set spf-interval-exp-l1 <user> set spf-interval-exp-l2 <user> set dynamic-hostname {enable | disable} set adjacency-check {enable | disable} set overload-bit {enable | disable} set overload-bit-suppress {external | interlevel} set overload-bit-on-startup <integer> set default-originate {enable | disable} set metric-style {narrow | narrow-transition | narrow-transition-l1 | narrow-trans ition-l2 | wide | wide-l1 | wide-l2 | wide-transition | wide-transition-l1 | wide-tran sition-l2 | transition | transition-l1 | transition-l2} set redistribute-l1 {enable | disable} set redistribute-l1-list <string> set redistribute-l2 {enable | disable} set redistribute-l2-list <string> config isis-net edit <name_str> set id <integer> set net <user> end config isis-interface edit <name_str> set name <string> set status {enable | disable} set network-type {broadcast | point-to-point} set circuit-type {level-1-2 | level-1 | level-2} set csnp-interval-l1 <integer> set csnp-interval-l2 <integer> set hello-interval-l1 <integer> set hello-interval-l2 <integer> set hello-multiplier-l1 <integer> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 353 set hello-multiplier-l2 <integer> set hello-padding {enable | disable} set lsp-interval <integer> set lsp-retransmit-interval <integer> set metric-l1 <integer> set metric-l2 <integer> set wide-metric-l1 <integer> set wide-metric-l2 <integer> set auth-password-l1 <password> set auth-password-l2 <password> set auth-keychain-l1 <string> set auth-keychain-l2 <string> set auth-send-only-l1 {enable | disable} set auth-send-only-l2 {enable | disable} set auth-mode-l1 {md5 | password} set auth-mode-l2 {md5 | password} set priority-l1 <integer> set priority-l2 <integer> set mesh-group {enable | disable} set mesh-group-id <integer> end config summary-address edit <name_str> set id <integer> set prefix <ipv4-classnet-any> set level {level-1-2 | level-1 | level-2} end config redistribute edit <name_str> set protocol <string> set status {enable | disable} set metric <integer> set metric-type {external | internal} set level {level-1-2 | level-1 | level-2} set routemap <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 354 Description Configuration Description Default Value is-type IS type. level-1-2 auth-mode-l1 Level 1 authentication mode. password auth-mode-l2 Level 2 authentication mode. password auth-password-l1 Authentication password for level 1 PDUs. (Empty) auth-password-l2 Authentication password for level 2 PDUs. (Empty) auth-keychain-l1 Authentication key-chain for level 1 PDUs. (Empty) auth-keychain-l2 Authentication key-chain for level 2 PDUs. (Empty) auth-sendonly-l1 Enable/disable level 1 authentication send-only. disable auth-sendonly-l2 Enable/disable level 2 authentication send-only. disable ignore-lsp-errors Enable/disable ignoring of LSP errors with bad checksums. disable lsp-gen-interval-l1 Minimum interval for level 1 LSP regenerating. 30 lsp-gen-interval-l2 Minimum interval for level 2 LSP regenerating. 30 lsp-refresh-interval LSP refresh time in seconds. 900 max-lsp-lifetime Maximum LSP lifetime in seconds. 1200 spf-interval-exp-l1 Level 1 SPF calculation delay. 500 50000 spf-interval-exp-l2 Level 2 SPF calculation delay. 500 50000 dynamic-hostname Enable/disable dynamic hostname. disable adjacency-check Enable/disable adjacency check. disable overload-bit Enable/disable signal other routers not to use us in SPF. disable overload-bit-suppress Suppress overload-bit for the specific prefixes. (Empty) overload-bit-on-startup Overload-bit only temporarily after reboot. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 355 default-originate Enable/disable control distribution of default information. disable metric-style Use old-style (ISO 10589) or new-style packet formats narrow redistribute-l1 Enable/disable redistribute level 1 routes into level 2. disable redistribute-l1-list Access-list for redistribute l1 to l2. (Empty) redistribute-l2 Enable/disable redistribute level 2 routes into level 1. disable redistribute-l2-list Access-list for redistribute l2 to l1. (Empty) isis-net IS-IS net configuration. (Empty) isis-interface IS-IS interface configuration. (Empty) summary-address IS-IS summary addresses. (Empty) redistribute IS-IS redistribute protocols. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 356 router/key-chain CLI Syntax config router key-chain edit <name_str> set name <string> config key edit <name_str> set id <integer> set accept-lifetime <user> set send-lifetime <user> set key-string <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 357 Description Configuration Description Default Value name Key-chain name. (Empty) key Key. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 358 router/multicast CLI Syntax config router multicast edit <name_str> set route-threshold <integer> set route-limit <integer> set multicast-routing {enable | disable} config pim-sm-global edit <name_str> set message-interval <integer> set join-prune-holdtime <integer> set accept-register-list <string> set bsr-candidate {enable | disable} set bsr-interface <string> set bsr-priority <integer> set bsr-hash <integer> set bsr-allow-quick-refresh {enable | disable} set cisco-register-checksum {enable | disable} set cisco-register-checksum-group <string> set cisco-crp-prefix {enable | disable} set cisco-ignore-rp-set-priority {enable | disable} set register-rp-reachability {enable | disable} set register-source {disable | interface | ip-address} set register-source-interface <string> set register-source-ip <ipv4-address> set register-supression <integer> set null-register-retries <integer> set rp-register-keepalive <integer> set spt-threshold {enable | disable} set spt-threshold-group <string> set ssm {enable | disable} set ssm-range <string> set register-rate-limit <integer> config rp-address edit <name_str> set id <integer> set ip-address <ipv4-address> set group <string> end end config interface edit <name_str> set name <string> set ttl-threshold <integer> set pim-mode {sparse-mode | dense-mode} set passive {enable | disable} set bfd {enable | disable} set neighbour-filter <string> set hello-interval <integer> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 359 set hello-holdtime <integer> set cisco-exclude-genid {enable | disable} set dr-priority <integer> set propagation-delay <integer> set state-refresh-interval <integer> set rp-candidate {enable | disable} set rp-candidate-group <string> set rp-candidate-priority <integer> set rp-candidate-interval <integer> set multicast-flow <string> set static-group <string> config join-group edit <name_str> set address <ipv4-address-any> end config igmp edit <name_str> set access-group <string> set version {3 | 2 | 1} set immediate-leave-group <string> set last-member-query-interval <integer> set last-member-query-count <integer> set query-max-response-time <integer> set query-interval <integer> set query-timeout <integer> set router-alert-check {enable | disable} end end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 360 Description Configuration Description Default Value route-threshold Generate warnings when number of multicast routes exceeds this number. 2147483647 route-limit Maximum number of multicast routes. 2147483647 multicast-routing Enable/disable multicast routing. disable pim-sm-global PIM sparse-mode global settings. Details below Configuration message-interval join-prune-holdtime accept-register-list bsr-candidate bsr-interface bsr-priority bsr-hash bsr-allow-quick-refresh cisco-register-checksum cisco-register-checksum-group cisco-crp-prefix cisco-ignore-rp-set-priority register-rp-reachability register-source register-source-interface register-source-ip register-supression null-register-retries rp-register-keepalive spt-threshold spt-threshold-group ssm ssm-range register-rate-limit rp-address interface CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Default Value 60 210 (Empty) disable (Empty) 0 10 disable disable (Empty) disable disable enable disable (Empty) 0.0.0.0 60 1 185 enable (Empty) disable (Empty) 0 (Empty) PIM interfaces. (Empty) 361 router/multicast-flow CLI Syntax config router multicast-flow edit <name_str> set name <string> set comments <string> config flows edit <name_str> set id <integer> set group-addr <ipv4-address-any> set source-addr <ipv4-address-any> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 362 Description Configuration Description Default Value name Name. (Empty) comments Comment. (Empty) flows Multicast-flow entries. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 363 router/multicast6 CLI Syntax config router multicast6 edit <name_str> set multicast-routing {enable | disable} config interface edit <name_str> set name <string> set hello-interval <integer> set hello-holdtime <integer> end config pim-sm-global edit <name_str> set register-rate-limit <integer> config rp-address edit <name_str> set id <integer> set ip6-address <ipv6-address> end end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 364 Description Configuration Description Default Value multicast-routing Enable/disable multicast routing. disable interface PIM interfaces. (Empty) pim-sm-global PIM sparse-mode global settings. Details below Configuration register-rate-limit rp-address CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Default Value 0 (Empty) 365 router/ospf CLI Syntax config router ospf edit <name_str> set abr-type {cisco | ibm | shortcut | standard} set auto-cost-ref-bandwidth <integer> set distance-external <integer> set distance-inter-area <integer> set distance-intra-area <integer> set database-overflow {enable | disable} set database-overflow-max-lsas <integer> set database-overflow-time-to-recover <integer> set default-information-originate {enable | always | disable} set default-information-metric <integer> set default-information-metric-type {1 | 2} set default-information-route-map <string> set default-metric <integer> set distance <integer> set rfc1583-compatible {enable | disable} set router-id <ipv4-address-any> set spf-timers <user> set bfd {enable | disable} set log-neighbour-changes {enable | disable} set distribute-list-in <string> set distribute-route-map-in <string> set restart-mode {none | lls | graceful-restart} set restart-period <integer> config area edit <name_str> set id <ipv4-address-any> set shortcut {disable | enable | default} set authentication {none | text | md5} set default-cost <integer> set nssa-translator-role {candidate | never | always} set stub-type {no-summary | summary} set type {regular | nssa | stub} set nssa-default-information-originate {enable | always | disable} set nssa-default-information-originate-metric <integer> set nssa-default-information-originate-metric-type {1 | 2} set nssa-redistribution {enable | disable} config range edit <name_str> set id <integer> set prefix <ipv4-classnet-any> set advertise {disable | enable} set substitute <ipv4-classnet-any> set substitute-status {enable | disable} end config virtual-link CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 366 edit <name_str> set name <string> set authentication {none | text | md5} set authentication-key <password> set md5-key <user> set dead-interval <integer> set hello-interval <integer> set retransmit-interval <integer> set transmit-delay <integer> set peer <ipv4-address-any> end config filter-list edit <name_str> set id <integer> set list <string> set direction {in | out} end end config ospf-interface edit <name_str> set name <string> set interface <string> set ip <ipv4-address> set authentication {none | text | md5} set authentication-key <password> set md5-key <user> set prefix-length <integer> set retransmit-interval <integer> set transmit-delay <integer> set cost <integer> set priority <integer> set dead-interval <integer> set hello-interval <integer> set hello-multiplier <integer> set database-filter-out {enable | disable} set mtu <integer> set mtu-ignore {enable | disable} set network-type {broadcast | non-broadcast | point-to-point | point-to-multip oint | point-to-multipoint-non-broadcast} set bfd {global | enable | disable} set status {disable | enable} set resync-timeout <integer> end config network edit <name_str> set id <integer> set prefix <ipv4-classnet> set area <ipv4-address-any> end config neighbor edit <name_str> set id <integer> set ip <ipv4-address> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 367 set ip <ipv4-address> set poll-interval <integer> set cost <integer> set priority <integer> end config passive-interface edit <name_str> set name <string> end config summary-address edit <name_str> set id <integer> set prefix <ipv4-classnet> set tag <integer> set advertise {disable | enable} end config distribute-list edit <name_str> set id <integer> set access-list <string> set protocol {connected | static | rip} end config redistribute edit <name_str> set name <string> set status {enable | disable} set metric <integer> set routemap <string> set metric-type {1 | 2} set tag <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 368 Description Configuration Description Default Value abr-type Area border router type. standard auto-cost-ref-bandwidth Reference bandwidth in terms of megabits per second. 1000 distance-external Administrative external distance. 110 distance-inter-area Administrative inter-area distance. 110 distance-intra-area Administrative intra-area distance. 110 database-overflow Enable/disable database overflow. disable database-overflowmax-lsas Database overflow maximum LSAs. 10000 database-overflowtime-to-recover Database overflow time to recover (sec). 300 default-informationoriginate Enable/disable generation of default route. disable default-informationmetric Default information metric. 10 default-informationmetric-type Default information metric type. 2 default-informationroute-map Default information route map. (Empty) default-metric Default metric of redistribute routes. 10 distance Distance of the route. 110 rfc1583-compatible Enable/disable RFC1583 compatibility. disable router-id Router ID. 0.0.0.0 spf-timers SPF calculation frequency. 5 10 bfd Bidirectional Forwarding Detection (BFD). disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 369 log-neighbour-changes Enable logging of OSPF neighbour's changes enable distribute-list-in Filter incoming routes. (Empty) distribute-route-map-in Filter incoming external routes by route-map. (Empty) restart-mode OSPF restart mode (graceful or LLS). none restart-period Graceful restart period. 120 area OSPF area configuration. (Empty) ospf-interface OSPF interface configuration. (Empty) network OSPF network configuration. (Empty) neighbor OSPF neighbor configuration are used when OSPF runs on non-broadcast media (Empty) passive-interface Passive interface configuration. (Empty) summary-address IP address summary configuration. (Empty) distribute-list Distribute list configuration. (Empty) redistribute Redistribute configuration. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 370 router/ospf6 CLI Syntax config router ospf6 edit <name_str> set abr-type {cisco | ibm | standard} set auto-cost-ref-bandwidth <integer> set default-information-originate {enable | always | disable} set log-neighbour-changes {enable | disable} set default-information-metric <integer> set default-information-metric-type {1 | 2} set default-information-route-map <string> set default-metric <integer> set router-id <ipv4-address-any> set spf-timers <user> config area edit <name_str> set id <ipv4-address-any> set default-cost <integer> set nssa-translator-role {candidate | never | always} set stub-type {no-summary | summary} set type {regular | nssa | stub} set nssa-default-information-originate {enable | disable} set nssa-default-information-originate-metric <integer> set nssa-default-information-originate-metric-type {1 | 2} set nssa-redistribution {enable | disable} config range edit <name_str> set id <integer> set prefix6 <ipv6-network> set advertise {disable | enable} end config virtual-link edit <name_str> set name <string> set dead-interval <integer> set hello-interval <integer> set retransmit-interval <integer> set transmit-delay <integer> set peer <ipv4-address-any> end end config ospf6-interface edit <name_str> set name <string> set area-id <ipv4-address-any> set interface <string> set retransmit-interval <integer> set transmit-delay <integer> set cost <integer> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 371 set priority <integer> set dead-interval <integer> set hello-interval <integer> set status {disable | enable} set network-type {broadcast | non-broadcast | point-to-point | point-to-multip oint | point-to-multipoint-non-broadcast} config neighbor edit <name_str> set ip6 <ipv6-address> set poll-interval <integer> set cost <integer> set priority <integer> end end config passive-interface edit <name_str> set name <string> end config redistribute edit <name_str> set name <string> set status {enable | disable} set metric <integer> set routemap <string> set metric-type {1 | 2} end config summary-address edit <name_str> set id <integer> set prefix6 <ipv6-network> set advertise {disable | enable} set tag <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 372 Description Configuration Description Default Value abr-type Area border router type. standard auto-cost-ref-bandwidth Reference bandwidth in terms of megabits per second. 1000 default-informationoriginate Enable/disable generation of default route. disable log-neighbour-changes Enable logging of OSPFv3 neighbour's changes enable default-informationmetric Default information metric. 10 default-informationmetric-type Default information metric type. 2 default-informationroute-map Default information route map. (Empty) default-metric Default metric of redistribute routes. 20 router-id A.B.C.D, in IPv4 address format. 0.0.0.0 spf-timers SPF calculation frequency. 5 10 area OSPF6 area configuration. (Empty) ospf6-interface OSPF6 interface configuration. (Empty) passive-interface Passive interface configuration. (Empty) redistribute Redistribute configuration. (Empty) summary-address IPv6 address summary configuration. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 373 router/policy CLI Syntax config router policy edit <name_str> set seq-num <integer> config input-device edit <name_str> set name <string> end config src edit <name_str> set subnet <string> end config srcaddr edit <name_str> set name <string> end set src-negate {enable | disable} config dst edit <name_str> set subnet <string> end config dstaddr edit <name_str> set name <string> end set dst-negate {enable | disable} set action {deny | permit} set protocol <integer> set start-port <integer> set end-port <integer> set start-source-port <integer> set end-source-port <integer> set gateway <ipv4-address> set output-device <string> set tos <user> set tos-mask <user> set status {enable | disable} set comments <var-string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 374 Description Configuration Description Default Value seq-num Sequence number. 0 input-device Incoming interface name. (Empty) src Source IP and mask (x.x.x.x/x). (Empty) srcaddr Source address name. (Empty) src-negate Enable/disable negated source address match. disable dst Destination IP and mask (x.x.x.x/x). (Empty) dstaddr Destination address name. (Empty) dst-negate Enable/disable negated destination address match. disable action Action of the policy route. permit protocol Protocol number. 0 start-port Start destination port number. 1 end-port End destination port number. 65535 start-source-port Start source port number. 1 end-source-port End source port number. 65535 gateway IP address of gateway. 0.0.0.0 output-device Outgoing interface name. (Empty) tos Type of service bit pattern. 0x00 tos-mask Type of service evaluated bits. 0x00 status Enable/disable policy route. enable comments Comment. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 375 router/policy6 CLI Syntax config router policy6 edit <name_str> set seq-num <integer> set input-device <string> set src <ipv6-network> set dst <ipv6-network> set protocol <integer> set start-port <integer> set end-port <integer> set gateway <ipv6-address> set output-device <string> set tos <user> set tos-mask <user> set status {enable | disable} set comments <var-string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 376 Description Configuration Description Default Value seq-num Sequence number. 0 input-device Incoming interface name. (Empty) src Source IPv6 prefix. ::/0 dst Destination IPv6 prefix. ::/0 protocol Protocol number. 0 start-port Start port number. 1 end-port End port number. 65535 gateway IPv6 address of gateway. :: output-device Outgoing interface name. (Empty) tos Type of service bit pattern. 0x00 tos-mask Type of service evaluated bits. 0x00 status Enable/disable policy route. enable comments Comment. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 377 router/prefix-list CLI Syntax config router prefix-list edit <name_str> set name <string> set comments <string> config rule edit <name_str> set id <integer> set action {permit | deny} set prefix <user> set ge <integer> set le <integer> set flags <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 378 Description Configuration Description Default Value name Name. (Empty) comments Comment. (Empty) rule Rule. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 379 router/prefix-list6 CLI Syntax config router prefix-list6 edit <name_str> set name <string> set comments <string> config rule edit <name_str> set id <integer> set action {permit | deny} set prefix6 <user> set ge <integer> set le <integer> set flags <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 380 Description Configuration Description Default Value name Name. (Empty) comments Comment. (Empty) rule Rule. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 381 router/rip CLI Syntax config router rip edit <name_str> set default-information-originate {enable | disable} set default-metric <integer> set max-out-metric <integer> set recv-buffer-size <integer> config distance edit <name_str> set id <integer> set prefix <ipv4-classnet-any> set distance <integer> set access-list <string> end config distribute-list edit <name_str> set id <integer> set status {enable | disable} set direction {in | out} set listname <string> set interface <string> end config neighbor edit <name_str> set id <integer> set ip <ipv4-address> end config network edit <name_str> set id <integer> set prefix <ipv4-classnet> end config offset-list edit <name_str> set id <integer> set status {enable | disable} set direction {in | out} set access-list <string> set offset <integer> set interface <string> end config passive-interface edit <name_str> set name <string> end config redistribute edit <name_str> set name <string> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 382 set status {enable | disable} set metric <integer> set routemap <string> set flags <integer> end set update-timer <integer> set timeout-timer <integer> set garbage-timer <integer> set version {1 | 2} config interface edit <name_str> set name <string> set auth-keychain <string> set auth-mode {none | text | md5} set auth-string <password> set receive-version {1 | 2} set send-version {1 | 2} set send-version2-broadcast {disable | enable} set split-horizon-status {enable | disable} set split-horizon {poisoned | regular} set flags <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 383 Description Configuration Description Default Value default-informationoriginate Enable/disable generation of default route. disable default-metric Default metric. 1 max-out-metric Maximum metric allowed to output(0 means 'not set'). 0 recv-buffer-size Receiving buffer size. 655360 distance distance (Empty) distribute-list Distribute list. (Empty) neighbor neighbor (Empty) network network (Empty) offset-list Offset list. (Empty) passive-interface Passive interface configuration. (Empty) redistribute Redistribute configuration. (Empty) update-timer Update timer. 30 timeout-timer Timeout timer. 180 garbage-timer Garbage timer. 120 version RIP version. 2 interface RIP interface configuration. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 384 router/ripng CLI Syntax config router ripng edit <name_str> set default-information-originate {enable | disable} set default-metric <integer> set max-out-metric <integer> config distance edit <name_str> set id <integer> set distance <integer> set prefix6 <ipv6-prefix> set access-list6 <string> end config distribute-list edit <name_str> set id <integer> set status {enable | disable} set direction {in | out} set listname <string> set interface <string> end config neighbor edit <name_str> set id <integer> set ip6 <ipv6-address> set interface <string> end config network edit <name_str> set id <integer> set prefix <ipv6-prefix> end config aggregate-address edit <name_str> set id <integer> set prefix6 <ipv6-prefix> end config offset-list edit <name_str> set id <integer> set status {enable | disable} set direction {in | out} set access-list6 <string> set offset <integer> set interface <string> end config passive-interface edit <name_str> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 385 set name <string> end config redistribute edit <name_str> set name <string> set status {enable | disable} set metric <integer> set routemap <string> set flags <integer> end set update-timer <integer> set timeout-timer <integer> set garbage-timer <integer> config interface edit <name_str> set name <string> set split-horizon-status {enable | disable} set split-horizon {poisoned | regular} set flags <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 386 Description Configuration Description Default Value default-informationoriginate Enable/disable generation of default route. disable default-metric Default metric. 1 max-out-metric Maximum metric allowed to output(0 means 'not set'). 0 distance distance (Empty) distribute-list Distribute list. (Empty) neighbor neighbor (Empty) network Network. (Empty) aggregate-address Aggregate address. (Empty) offset-list Offset list. (Empty) passive-interface Passive interface configuration. (Empty) redistribute Redistribute configuration. (Empty) update-timer Update timer. 30 timeout-timer Timeout timer. 180 garbage-timer Garbage timer. 120 interface RIPng interface configuration. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 387 router/route-map CLI Syntax config router route-map edit <name_str> set name <string> set comments <string> config rule edit <name_str> set id <integer> set action {permit | deny} set match-as-path <string> set match-community <string> set match-community-exact {enable | disable} set match-origin {none | egp | igp | incomplete} set match-interface <string> set match-ip-address <string> set match-ip6-address <string> set match-ip-nexthop <string> set match-ip6-nexthop <string> set match-metric <integer> set match-route-type {1 | 2 | none} set match-tag <integer> set set-aggregator-as <integer> set set-aggregator-ip <ipv4-address-any> set set-aspath-action {prepend | replace} config set-aspath edit <name_str> set as <string> end set set-atomic-aggregate {enable | disable} set set-community-delete <string> config set-community edit <name_str> set community <string> end set set-community-additive {enable | disable} set set-dampening-reachability-half-life <integer> set set-dampening-reuse <integer> set set-dampening-suppress <integer> set set-dampening-max-suppress <integer> set set-dampening-unreachability-half-life <integer> config set-extcommunity-rt edit <name_str> set community <string> end config set-extcommunity-soo edit <name_str> set community <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 388 set set set set set set set set set set set set end set-ip-nexthop <ipv4-address> set-ip6-nexthop <ipv6-address> set-ip6-nexthop-local <ipv6-address> set-local-preference <integer> set-metric <integer> set-metric-type {1 | 2 | none} set-originator-id <ipv4-address-any> set-origin {none | egp | igp | incomplete} set-tag <integer> set-weight <integer> set-flags <integer> match-flags <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 389 Description Configuration Description Default Value name Name. (Empty) comments Comment. (Empty) rule Rule. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 390 router/setting CLI Syntax config router setting edit <name_str> set show-filter <string> set hostname <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 391 Description Configuration Description Default Value show-filter Prefix-list as filter for showing routes. (Empty) hostname Hostname for this virtual domain router. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 392 router/static CLI Syntax config router static edit <name_str> set seq-num <integer> set status {enable | disable} set dst <ipv4-classnet> set gateway <ipv4-address> set distance <integer> set weight <integer> set priority <integer> set device <string> set comment <var-string> set blackhole {enable | disable} set dynamic-gateway {enable | disable} set virtual-wan-link {enable | disable} set dstaddr <string> set internet-service <integer> set internet-service-custom <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 393 Description Configuration Description Default Value seq-num Entry number. 0 status Enable/disable static route. enable dst Destination IP and mask for this route. 0.0.0.0 0.0.0.0 gateway Gateway IP for this route. 0.0.0.0 distance Administrative distance (1 - 255). 10 weight Administrative weight (0 - 255). 0 priority Administrative priority (0 - 4294967295). 0 device Enable/disable gateway out interface. (Empty) comment Comment. (Empty) blackhole Enable/disable black hole. disable dynamic-gateway Enable use of dynamic gateway retrieved from a DHCP or PPP server. disable virtual-wan-link Enable/disable egress through the virtual-wanlink. disable dstaddr Name of firewall address or address group. (Empty) internet-service Application ID in the Internet service database. 0 internet-service-custom Application name in the Internet service custom database. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 394 router/static6 CLI Syntax config router static6 edit <name_str> set seq-num <integer> set status {enable | disable} set dst <ipv6-network> set gateway <ipv6-address> set device <string> set devindex <integer> set distance <integer> set priority <integer> set comment <var-string> set blackhole {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 395 Description Configuration Description Default Value seq-num Sequence number. 0 status Enable/disable static route. enable dst Destination IPv6 prefix for this route. ::/0 gateway Gateway IPv6 address for this route. :: device Gateway out interface or tunnel. (Empty) devindex Device index (0 - 4294967295). 0 distance Administrative distance (1 - 255). 10 priority Administrative priority (0 - 4294967295). 0 comment Comment. (Empty) blackhole Enable/disable black hole. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 396 spamfilter/bwl CLI Syntax config spamfilter bwl edit <name_str> set id <integer> set name <string> set comment <var-string> config entries edit <name_str> set status {enable | disable} set id <integer> set type {ip | email} set action {reject | spam | clear} set addr-type {ipv4 | ipv6} set ip4-subnet <ipv4-classnet> set ip6-subnet <ipv6-network> set pattern-type {wildcard | regexp} set email-pattern <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 397 Description Configuration Description Default Value id ID. 0 name Name of table. (Empty) comment Comment. (Empty) entries Anti-spam black/white list entries. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 398 spamfilter/bword CLI Syntax config spamfilter bword edit <name_str> set id <integer> set name <string> set comment <var-string> config entries edit <name_str> set status {enable | disable} set id <integer> set pattern <string> set pattern-type {wildcard | regexp} set action {spam | clear} set where {subject | body | all} set language {western | simch | trach | japanese | korean | french | thai | sp anish} set score <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 399 Description Configuration Description Default Value id ID. 0 name Name of table. (Empty) comment Comment. (Empty) entries Spam filter banned word. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 400 spamfilter/dnsbl CLI Syntax config spamfilter dnsbl edit <name_str> set id <integer> set name <string> set comment <var-string> config entries edit <name_str> set status {enable | disable} set id <integer> set server <string> set action {reject | spam} end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 401 Description Configuration Description Default Value id ID. 0 name Name of table. (Empty) comment Comment. (Empty) entries Spam filter DNSBL and ORBL server. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 402 spamfilter/fortishield CLI Syntax config spamfilter fortishield edit <name_str> set spam-submit-srv <string> set spam-submit-force {enable | disable} set spam-submit-txt2htm {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 403 Description Configuration Description Default Value spam-submit-srv Hostname of the spam submission server. www.nospammer.net spam-submit-force Enable/disable force insertion of a new mime entity for the submission text. enable spam-submit-txt2htm Enable/disable conversion of text email to HTML email. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 404 spamfilter/iptrust CLI Syntax config spamfilter iptrust edit <name_str> set id <integer> set name <string> set comment <var-string> config entries edit <name_str> set status {enable | disable} set id <integer> set addr-type {ipv4 | ipv6} set ip4-subnet <ipv4-classnet> set ip6-subnet <ipv6-network> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 405 Description Configuration Description Default Value id ID. 0 name Name of table. (Empty) comment Comment. (Empty) entries Spam filter trusted IP addresses. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 406 spamfilter/mheader CLI Syntax config spamfilter mheader edit <name_str> set id <integer> set name <string> set comment <var-string> config entries edit <name_str> set status {enable | disable} set id <integer> set fieldname <string> set fieldbody <string> set pattern-type {wildcard | regexp} set action {spam | clear} end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 407 Description Configuration Description Default Value id ID. 0 name Name of table. (Empty) comment Comment. (Empty) entries Spam filter mime header content. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 408 spamfilter/options CLI Syntax config spamfilter options edit <name_str> set dns-timeout <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 409 Description Configuration Description Default Value dns-timeout DNS query time out (1 - 30 sec). 7 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 410 spamfilter/profile CLI Syntax config spamfilter profile edit <name_str> set name <string> set comment <var-string> set flow-based {enable | disable} set replacemsg-group <string> set spam-log {disable | enable} set spam-log-fortiguard-response {disable | enable} set spam-filtering {enable | disable} set external {enable | disable} set options {bannedword | spambwl | spamfsip | spamfssubmit | spamfschksum | spamf surl | spamhelodns | spamraddrdns | spamrbl | spamhdrcheck | spamfsphish} config imap edit <name_str> set log {enable | disable} set action {pass | tag} set tag-type {subject | header | spaminfo} set tag-msg <string> end config pop3 edit <name_str> set log {enable | disable} set action {pass | tag} set tag-type {subject | header | spaminfo} set tag-msg <string> end config smtp edit <name_str> set log {enable | disable} set action {pass | tag | discard} set tag-type {subject | header | spaminfo} set tag-msg <string> set hdrip {enable | disable} set local-override {enable | disable} end config mapi edit <name_str> set log {enable | disable} set action {pass | discard} end config msn-hotmail edit <name_str> set log {enable | disable} end config yahoo-mail edit <name_str> set log {enable | disable} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 411 end config gmail edit <name_str> set log {enable | disable} end set spam-bword-threshold <integer> set spam-bword-table <integer> set spam-bwl-table <integer> set spam-mheader-table <integer> set spam-rbl-table <integer> set spam-iptrust-table <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 412 Description Configuration Description Default Value name Profile name. (Empty) comment Comment. (Empty) flow-based Enable/disable flow-based spam filtering. disable replacemsg-group Replacement message group. (Empty) spam-log Enable/disable spam logging for email filtering. enable spam-log-fortiguardresponse Enable/disable logging FortiGuard spam response. disable spam-filtering Enable/disable spam filtering. disable external Enable/disable external Email inspection. disable options Options. (Empty) imap IMAP. Details below Configuration log action tag-type tag-msg pop3 Default Value disable tag subject spaminfo Spam POP3. Configuration log action tag-type tag-msg smtp Default Value disable tag subject spaminfo Spam SMTP. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Details below Details below 413 Configuration log action tag-type tag-msg hdrip local-override mapi Default Value disable discard subject spaminfo Spam disable disable MAPI. Configuration log action msn-hotmail Default Value disable discard MSN Hotmail. Configuration log yahoo-mail Configuration log Details below Default Value disable Yahoo! Mail. Configuration log gmail Details below Details below Default Value disable Gmail. Details below Default Value disable spam-bword-threshold Spam banned word threshold. 10 spam-bword-table Anti-spam banned word table ID. 0 spam-bwl-table Anti-spam black/white list table ID. 0 spam-mheader-table Anti-spam MIME header table ID. 0 spam-rbl-table Anti-spam DNSBL table ID. 0 spam-iptrust-table Anti-spam IP trust table ID. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 414 system.autoupdate/push-update CLI Syntax config system.autoupdate push-update edit <name_str> set status {enable | disable} set override {enable | disable} set address <ipv4-address-any> set port <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 415 Description Configuration Description Default Value status Enable/disable push updates. disable override Enable/disable push update override server. disable address Push update override server. 0.0.0.0 port Push update override port. 9443 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 416 system.autoupdate/schedule CLI Syntax config system.autoupdate schedule edit <name_str> set status {enable | disable} set frequency {every | daily | weekly} set time <user> set day {Sunday | Monday | Tuesday | Wednesday | Thursday | Friday | Saturday} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 417 Description Configuration Description Default Value status Enable/disable scheduled updates. enable frequency Update frequency. every time Update time. 02:60 day Update day. Monday CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 418 system.autoupdate/tunneling CLI Syntax config system.autoupdate tunneling edit <name_str> set status {enable | disable} set address <string> set port <integer> set username <string> set password <password> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 419 Description Configuration Description Default Value status Enable/disable web proxy tunnelling. disable address Web proxy IP address or FQDN. (Empty) port Web proxy port. 0 username Web proxy username. (Empty) password Web proxy password. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 420 system.dhcp/server CLI Syntax config system.dhcp server edit <name_str> set id <integer> set status {disable | enable} set lease-time <integer> set mac-acl-default-action {assign | block} set forticlient-on-net-status {disable | enable} set dns-service {local | default | specify} set dns-server1 <ipv4-address> set dns-server2 <ipv4-address> set dns-server3 <ipv4-address> set wifi-ac1 <ipv4-address> set wifi-ac2 <ipv4-address> set wifi-ac3 <ipv4-address> set ntp-service {local | default | specify} set ntp-server1 <ipv4-address> set ntp-server2 <ipv4-address> set ntp-server3 <ipv4-address> set domain <string> set wins-server1 <ipv4-address> set wins-server2 <ipv4-address> set default-gateway <ipv4-address> set next-server <ipv4-address> set netmask <ipv4-netmask> set interface <string> config ip-range edit <name_str> set id <integer> set start-ip <ipv4-address> set end-ip <ipv4-address> end set timezone-option {disable | default | specify} set timezone {01 | 02 | 03 | 04 | 05 | 81 | 06 | 07 | 08 | 09 | 10 | 11 | 12 | 13 | 74 | 14 | 77 | 15 | 16 | 17 | 18 | 19 | 20 | 75 | 21 | 22 | 23 | 24 | 80 | 79 | 25 | 26 | 27 | 28 | 78 | 29 | 30 | 31 | 85 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 83 | 84 | 40 | 41 | 42 | 43 | 39 | 44 | 46 | 47 | 51 | 48 | 45 | 49 | 50 | 52 | 53 | 54 | 55 | 5 6 | 57 | 58 | 59 | 60 | 62 | 63 | 61 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 00 | 82 | 73 | 86 | 76} set tftp-server <string> set filename <string> config options edit <name_str> set id <integer> set code <integer> set type {hex | string | ip} set value <string> set ip <user> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 421 end set server-type {regular | ipsec} set ip-mode {range | usrgrp} set conflicted-ip-timeout <integer> set ipsec-lease-hold <integer> set auto-configuration {disable | enable} set ddns-update {disable | enable} set ddns-update-override {disable | enable} set ddns-server-ip <ipv4-address> set ddns-zone <string> set ddns-auth {disable | tsig} set ddns-keyname <string> set ddns-key <user> set ddns-ttl <integer> set vci-match {disable | enable} config vci-string edit <name_str> set vci-string <string> end config exclude-range edit <name_str> set id <integer> set start-ip <ipv4-address> set end-ip <ipv4-address> end config reserved-address edit <name_str> set id <integer> set ip <ipv4-address> set mac <mac-address> set action {assign | block | reserved} set description <var-string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 422 Description Configuration Description Default Value id ID. 0 status Enable/disable use this DHCP configuration. enable lease-time Lease time in seconds. 604800 mac-acl-default-action MAC access control default action. assign forticlient-on-net-status Sending FortiGate serial number as a DHCP option. enable dns-service DNS service option. specify dns-server1 DNS server 1. 0.0.0.0 dns-server2 DNS server 2. 0.0.0.0 dns-server3 DNS server 3. 0.0.0.0 wifi-ac1 WiFi AC 1. 0.0.0.0 wifi-ac2 WiFi AC 2. 0.0.0.0 wifi-ac3 WiFi AC 3. 0.0.0.0 ntp-service NTP service option. specify ntp-server1 NTP server 1. 0.0.0.0 ntp-server2 NTP server 2. 0.0.0.0 ntp-server3 NTP server 3. 0.0.0.0 domain Domain name. (Empty) wins-server1 WINS server 1. 0.0.0.0 wins-server2 WINS server 2. 0.0.0.0 default-gateway Enable/disable default gateway. 0.0.0.0 next-server Next bootstrap server. 0.0.0.0 netmask Netmask. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 423 interface Interface name. (Empty) ip-range DHCP IP range configuration. (Empty) timezone-option Time zone settings. disable timezone Time zone. 00 tftp-server Hostname or IP address of the TFTP server. (Empty) filename Boot file name. (Empty) options DHCP options. (Empty) server-type Type of DHCP service to provide. regular ip-mode Method used to assign client IP. range conflicted-ip-timeout Time conflicted IP is removed from the range (seconds). 1800 ipsec-lease-hold DHCP over IPsec leases expire this many seconds after tunnel down (0 to disable forcedexpiry). 60 auto-configuration Enable/disable auto configuration. enable ddns-update Enable/disable DDNS update for DHCP. disable ddns-update-override Enable/disable DDNS update override for DHCP. disable ddns-server-ip DDNS server IP. 0.0.0.0 ddns-zone Zone of your domain name (ex. DDNS.com). (Empty) ddns-auth DDNS authentication mode. disable ddns-keyname DDNS update key name. (Empty) ddns-key DDNS update key (base 64 encoding). 'ENC isr0V46YyB8yJjNbUYA s/vUYxB1aL6ALCHlEb Pq6PJBZtDpbY7N1pqs liSaL2Fw4Jz0bZklu47K 49hcFNvrKsIh9YC2uAi mJqm9qGNuxRLsBAi/ +1yyNDp0Hjjc=' CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 424 ddns-ttl TTL. 300 vci-match Enable/disable VCI matching. disable vci-string VCI strings. (Empty) exclude-range DHCP exclude range configuration. (Empty) reserved-address DHCP reserved IP address. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 425 system.dhcp6/server CLI Syntax config system.dhcp6 server edit <name_str> set id <integer> set status {disable | enable} set rapid-commit {disable | enable} set lease-time <integer> set dns-service {delegated | default | specify} set dns-server1 <ipv6-address> set dns-server2 <ipv6-address> set dns-server3 <ipv6-address> set domain <string> set subnet <ipv6-prefix> set interface <string> set option1 <user> set option2 <user> set option3 <user> set upstream-interface <string> set ip-mode {range | delegated} config ip-range edit <name_str> set id <integer> set start-ip <ipv6-address> set end-ip <ipv6-address> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 426 Description Configuration Description Default Value id ID. 0 status Enable/disable use this DHCP configuration. enable rapid-commit Enable/disable allow/disallow rapid commit. disable lease-time Lease time in seconds. 604800 dns-service DNS service option. specify dns-server1 DNS server 1. :: dns-server2 DNS server 2. :: dns-server3 DNS server 3. :: domain Domain name. (Empty) subnet Subnet or subnet-id if the IP mode is delegated. ::/0 interface Interface name. (Empty) option1 Option 1. 0 option2 Option 2. 0 option3 Option 3. 0 upstream-interface Interface name from where delegated information is provided. (Empty) ip-mode Method used to assign client IP. range ip-range DHCP IP range configuration. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 427 system.replacemsg/admin CLI Syntax config system.replacemsg admin edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | wml} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 428 Description Configuration Description Default Value msg-type Message type. (Empty) buffer Message string. (Empty) header Header flag. none format Format flag. none CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 429 system.replacemsg/alertmail CLI Syntax config system.replacemsg alertmail edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | wml} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 430 Description Configuration Description Default Value msg-type Message type. (Empty) buffer Message string. (Empty) header Header flag. none format Format flag. none CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 431 system.replacemsg/auth CLI Syntax config system.replacemsg auth edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | wml} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 432 Description Configuration Description Default Value msg-type Message type. (Empty) buffer Message string. (Empty) header Header flag. none format Format flag. none CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 433 system.replacemsg/device-detection-portal CLI Syntax config system.replacemsg device-detection-portal edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | wml} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 434 Description Configuration Description Default Value msg-type Message type. (Empty) buffer Message string. (Empty) header Header flag. none format Format flag. none CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 435 system.replacemsg/ec CLI Syntax config system.replacemsg ec edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | wml} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 436 Description Configuration Description Default Value msg-type Message type. (Empty) buffer Message string. (Empty) header Header flag. none format Format flag. none CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 437 system.replacemsg/fortiguard-wf CLI Syntax config system.replacemsg fortiguard-wf edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | wml} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 438 Description Configuration Description Default Value msg-type Message type. (Empty) buffer Message string. (Empty) header Header flag. none format Format flag. none CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 439 system.replacemsg/ftp CLI Syntax config system.replacemsg ftp edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | wml} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 440 Description Configuration Description Default Value msg-type Message type. (Empty) buffer Message string. (Empty) header Header flag. none format Format flag. none CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 441 system.replacemsg/http CLI Syntax config system.replacemsg http edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | wml} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 442 Description Configuration Description Default Value msg-type Message type. (Empty) buffer Message string. (Empty) header Header flag. none format Format flag. none CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 443 system.replacemsg/mail CLI Syntax config system.replacemsg mail edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | wml} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 444 Description Configuration Description Default Value msg-type Message type. (Empty) buffer Message string. (Empty) header Header flag. none format Format flag. none CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 445 system.replacemsg/nac-quar CLI Syntax config system.replacemsg nac-quar edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | wml} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 446 Description Configuration Description Default Value msg-type Message type. (Empty) buffer Message string. (Empty) header Header flag. none format Format flag. none CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 447 system.replacemsg/nntp CLI Syntax config system.replacemsg nntp edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | wml} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 448 Description Configuration Description Default Value msg-type Message type. (Empty) buffer Message string. (Empty) header Header flag. none format Format flag. none CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 449 system.replacemsg/spam CLI Syntax config system.replacemsg spam edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | wml} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 450 Description Configuration Description Default Value msg-type Message type. (Empty) buffer Message string. (Empty) header Header flag. none format Format flag. none CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 451 system.replacemsg/sslvpn CLI Syntax config system.replacemsg sslvpn edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | wml} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 452 Description Configuration Description Default Value msg-type Message type. (Empty) buffer Message string. (Empty) header Header flag. none format Format flag. none CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 453 system.replacemsg/traffic-quota CLI Syntax config system.replacemsg traffic-quota edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | wml} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 454 Description Configuration Description Default Value msg-type Message type. (Empty) buffer Message string. (Empty) header Header flag. none format Format flag. none CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 455 system.replacemsg/utm CLI Syntax config system.replacemsg utm edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | wml} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 456 Description Configuration Description Default Value msg-type Message type. (Empty) buffer Message string. (Empty) header Header flag. none format Format flag. none CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 457 system.replacemsg/webproxy CLI Syntax config system.replacemsg webproxy edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | wml} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 458 Description Configuration Description Default Value msg-type Message type. (Empty) buffer Message string. (Empty) header Header flag. none format Format flag. none CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 459 system.snmp/community CLI Syntax config system.snmp community edit <name_str> set id <integer> set name <string> set status {enable | disable} config hosts edit <name_str> set id <integer> set source-ip <ipv4-address> set ip <user> set interface <string> set ha-direct {enable | disable} set host-type {any | query | trap} end config hosts6 edit <name_str> set id <integer> set source-ipv6 <ipv6-address> set ipv6 <ipv6-prefix> set ha-direct {enable | disable} set interface <string> set host-type {any | query | trap} end set query-v1-status {enable | disable} set query-v1-port <integer> set query-v2c-status {enable | disable} set query-v2c-port <integer> set trap-v1-status {enable | disable} set trap-v1-lport <integer> set trap-v1-rport <integer> set trap-v2c-status {enable | disable} set trap-v2c-lport <integer> set trap-v2c-rport <integer> set events {cpu-high | mem-low | log-full | intf-ip | vpn-tun-up | vpn-tun-down | ha-switch | ha-hb-failure | ips-signature | ips-anomaly | av-virus | av-oversize | avpattern | av-fragmented | fm-if-change | fm-conf-change | bgp-established | bgp-backwa rd-transition | ha-member-up | ha-member-down | ent-conf-change | av-conserve | av-byp ass | av-oversize-passed | av-oversize-blocked | ips-pkg-update | ips-fail-open | temp erature-high | voltage-alert | power-supply-failure | faz-disconnect | fan-failure | w c-ap-up | wc-ap-down | fswctl-session-up | fswctl-session-down | load-balance-real-ser ver-down | device-new} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 460 Description Configuration Description Default Value id Community ID. 0 name Community name. (Empty) status Enable/disable this community. enable hosts Allow hosts configuration. (Empty) hosts6 Allow hosts configuration for IPv6. (Empty) query-v1-status Enable/disable SNMP v1 query. enable query-v1-port SNMP v1 query port. 161 query-v2c-status Enable/disable SNMP v2c query. enable query-v2c-port SNMP v2c query port. 161 trap-v1-status Enable/disable SNMP v1 trap. enable trap-v1-lport SNMP v1 trap local port. 162 trap-v1-rport SNMP v1 trap remote port. 162 trap-v2c-status Enable/disable SNMP v2c trap. enable trap-v2c-lport SNMP v2c trap local port. 162 trap-v2c-rport SNMP v2c trap remote port. 162 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 461 events CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. SNMP trap events. cpu-high mem-low logfull intf-ip vpn-tun-up vpn-tun-down haswitch ha-hb-failure ips-signature ipsanomaly av-virus avoversize av-pattern avfragmented fm-ifchange bgpestablished bgpbackward-transition hamember-up hamember-down entconf-change avconserve av-bypass av-oversize-passed avoversize-blocked ipspkg-update ips-failopen temperature-high voltage-alert powersupply-failure fazdisconnect fan-failure wc-ap-up wc-ap-down fswctl-session-up fswctl-session-down load-balance-realserver-down 462 system.snmp/sysinfo CLI Syntax config system.snmp sysinfo edit <name_str> set status {enable | disable} set engine-id <string> set description <string> set contact-info <string> set location <string> set trap-high-cpu-threshold <integer> set trap-low-memory-threshold <integer> set trap-log-full-threshold <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 463 Description Configuration Description Default Value status Enable/disable SNMP. disable engine-id Local SNMP engineID string (maximum 24 characters). (Empty) description System description. (Empty) contact-info Contact information. (Empty) location System location. (Empty) trap-high-cpu-threshold CPU usage when trap is sent. 80 trap-low-memorythreshold Memory usage when trap is sent. 80 trap-log-full-threshold Log disk usage when trap is sent. 90 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 464 system.snmp/user CLI Syntax config system.snmp user edit <name_str> set name <string> set status {enable | disable} set trap-status {enable | disable} set trap-lport <integer> set trap-rport <integer> set queries {enable | disable} set query-port <integer> set notify-hosts <ipv4-address> set notify-hosts6 <ipv6-address> set source-ip <ipv4-address> set source-ipv6 <ipv6-address> set ha-direct {enable | disable} set events {cpu-high | mem-low | log-full | intf-ip | vpn-tun-up | vpn-tun-down | ha-switch | ha-hb-failure | ips-signature | ips-anomaly | av-virus | av-oversize | avpattern | av-fragmented | fm-if-change | fm-conf-change | bgp-established | bgp-backwa rd-transition | ha-member-up | ha-member-down | ent-conf-change | av-conserve | av-byp ass | av-oversize-passed | av-oversize-blocked | ips-pkg-update | ips-fail-open | temp erature-high | voltage-alert | power-supply-failure | faz-disconnect | fan-failure | w c-ap-up | wc-ap-down | fswctl-session-up | fswctl-session-down | load-balance-real-ser ver-down | device-new} set security-level {no-auth-no-priv | auth-no-priv | auth-priv} set auth-proto {md5 | sha} set auth-pwd <password> set priv-proto {aes | des | aes256 | aes256cisco} set priv-pwd <password> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 465 Description Configuration Description Default Value name SNMP user name. (Empty) status Enable/disable this user. enable trap-status Enable/disable traps for this user. enable trap-lport SNMPv3 trap local port. 162 trap-rport SNMPv3 trap remote port. 162 queries Enable/disable queries for this user. enable query-port SNMPv3 query port. 161 notify-hosts Hosts to send notifications (traps) to. (Empty) notify-hosts6 IPv6 hosts to send notifications (traps) to. (Empty) source-ip Source IP for SNMP trap. 0.0.0.0 source-ipv6 Source IPv6 for SNMP trap. :: ha-direct Enable/disable direct management of HA cluster members. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 466 events SNMP notifications (traps) to send. cpu-high mem-low logfull intf-ip vpn-tun-up vpn-tun-down haswitch ha-hb-failure ips-signature ipsanomaly av-virus avoversize av-pattern avfragmented fm-ifchange bgpestablished bgpbackward-transition hamember-up hamember-down entconf-change avconserve av-bypass av-oversize-passed avoversize-blocked ipspkg-update ips-failopen temperature-high voltage-alert powersupply-failure fazdisconnect fan-failure wc-ap-up wc-ap-down fswctl-session-up fswctl-session-down load-balance-realserver-down security-level Security level for message authentication and encryption. no-auth-no-priv auth-proto Authentication protocol. sha auth-pwd Password for authentication protocol. (Empty) priv-proto Privacy (encryption) protocol. aes priv-pwd Password for privacy (encryption) protocol. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 467 system/accprofile CLI Syntax CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 468 config system accprofile edit <name_str> set name <string> set scope {vdom | global} set comments <var-string> set mntgrp {none | read | read-write} set admingrp {none | read | read-write} set updategrp {none | read | read-write} set authgrp {none | read | read-write} set sysgrp {none | read | read-write} set netgrp {none | read | read-write} set loggrp {none | read | read-write | custom | w | r | rw} set routegrp {none | read | read-write} set fwgrp {none | read | read-write | custom | w | r | rw} set vpngrp {none | read | read-write} set utmgrp {none | read | read-write | custom | w | r | rw} set wanoptgrp {none | read | read-write} set endpoint-control-grp {none | read | read-write} set wifi {none | read | read-write} config fwgrp-permission edit <name_str> set policy {none | read | read-write} set address {none | read | read-write} set service {none | read | read-write} set schedule {none | read | read-write} set packet-capture {none | read | read-write} set others {none | read | read-write} end config loggrp-permission edit <name_str> set config {none | read | read-write} set data-access {none | read | read-write} set report-access {none | read | read-write} set threat-weight {none | read | read-write} end config utmgrp-permission edit <name_str> set antivirus {none | read | read-write} set ips {none | read | read-write} set webfilter {none | read | read-write} set spamfilter {none | read | read-write} set data-loss-prevention {none | read | read-write} set application-control {none | read | read-write} set icap {none | read | read-write} set casi {none | read | read-write} set voip {none | read | read-write} set waf {none | read | read-write} set dnsfilter {none | read | read-write} end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 469 Description Configuration Description Default Value name Profile name. (Empty) scope Global or single VDOM access restriction. vdom comments Comment. (Empty) mntgrp Maintenance. none admingrp Administrator Users. none updategrp FortiGuard Update. none authgrp User & Device. none sysgrp System Configuration. none netgrp Network Configuration. none loggrp Log & Report. none routegrp Router Configuration. none fwgrp Firewall Configuration. none vpngrp VPN Configuration. none utmgrp Security Profile Configuration. none wanoptgrp WAN Opt & Cache. none endpoint-control-grp Endpoint Security. none wifi Wireless controller. none fwgrp-permission Custom firewall permission. Details below Configuration policy address service schedule packet-capture others CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Default Value none none none none none none 470 loggrp-permission Configuration config data-access report-access threat-weight utmgrp-permission Configuration antivirus ips webfilter spamfilter data-loss-prevention application-control icap casi voip waf dnsfilter CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Custom Log & Report permission. Details below Default Value none none none none Custom UTM permission. Details below Default Value none none none none none none none none none none none 471 system/admin CLI Syntax config system admin edit <name_str> set name <string> set wildcard {enable | disable} set remote-auth {enable | disable} set remote-group <string> set password <password-2> set peer-auth {enable | disable} set peer-group <string> set trusthost1 <ipv4-classnet> set trusthost2 <ipv4-classnet> set trusthost3 <ipv4-classnet> set trusthost4 <ipv4-classnet> set trusthost5 <ipv4-classnet> set trusthost6 <ipv4-classnet> set trusthost7 <ipv4-classnet> set trusthost8 <ipv4-classnet> set trusthost9 <ipv4-classnet> set trusthost10 <ipv4-classnet> set ip6-trusthost1 <ipv6-prefix> set ip6-trusthost2 <ipv6-prefix> set ip6-trusthost3 <ipv6-prefix> set ip6-trusthost4 <ipv6-prefix> set ip6-trusthost5 <ipv6-prefix> set ip6-trusthost6 <ipv6-prefix> set ip6-trusthost7 <ipv6-prefix> set ip6-trusthost8 <ipv6-prefix> set ip6-trusthost9 <ipv6-prefix> set ip6-trusthost10 <ipv6-prefix> set accprofile <string> set allow-remove-admin-session {enable | disable} set comments <var-string> set hidden <integer> config vdom edit <name_str> set name <string> end set is-admin <integer> set ssh-public-key1 <user> set ssh-public-key2 <user> set ssh-public-key3 <user> set ssh-certificate <string> set schedule <string> set accprofile-override {enable | disable} set radius-vdom-override {enable | disable} set password-expire <user> set force-password-change {enable | disable} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 472 config dashboard edit <name_str> set id <integer> set widget-type {sysinfo | licinfo | sysop | sysres | alert | jsconsole | raid | tr-history | analytics | usb-modem} set name <string> set column <integer> set refresh-interval <integer> set time-period <integer> set chart-color <integer> set top-n <integer> set sort-by {bytes | msg-counts | packets | bandwidth | sessions} set report-by {source | destination | application | dlp-rule | dlp-sensor | po licy | protocol | web-category | web-domain | all | profile} set ip-version {ipboth | ipv4 | ipv6} set resolve-host {enable | disable} set resolve-service {enable | disable} set aggregate-hosts {enable | disable} set resolve-apps {enable | disable} set display-format {chart | table | line} set view-type {real-time | historical} set cpu-display-type {average | each} set interface <string> set dst-interface <string> set tr-history-period1 <integer> set tr-history-period2 <integer> set tr-history-period3 <integer> set vdom <string> set refresh {enable | disable} set status {close | open} set protocols <integer> set show-system-restart {enable | disable} set show-conserve-mode {enable | disable} set show-firmware-change {enable | disable} set show-fds-update {enable | disable} set show-device-update {enable | disable} set show-fds-quota {enable | disable} set show-disk-failure {enable | disable} set show-power-supply {enable | disable} set show-admin-auth {enable | disable} set show-fgd-alert {enable | disable} set show-fcc-license {enable | disable} set show-policy-overflow {enable | disable} end set two-factor {disable | fortitoken | email | sms} set fortitoken <string> set email-to <string> set sms-server {fortiguard | custom} set sms-custom-server <string> set sms-phone <string> set guest-auth {disable | enable} config guest-usergroups edit <name_str> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 473 edit <name_str> set name <string> end set guest-lang <string> set history0 <password-2> set history1 <password-2> config login-time edit <name_str> set usr-name <string> set last-login <datetime> set last-failed-login <datetime> end config gui-global-menu-favorites edit <name_str> set id <string> end config gui-vdom-menu-favorites edit <name_str> set id <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 474 Description Configuration Description Default Value name User name. (Empty) wildcard Enable/disable wildcard RADIUS authentication. disable remote-auth Enable/disable remote authentication. disable remote-group User group name used for remote auth. (Empty) password Admin user password. ENC XXUp2ozpdysrQ peer-auth Enable/disable peer authentication. disable peer-group Peer group name. (Empty) trusthost1 Admin user trust host IP, default 0.0.0.0 0.0.0.0 for all. 0.0.0.0 0.0.0.0 trusthost2 Admin user trust host IP, default 0.0.0.0 0.0.0.0 for all. 0.0.0.0 0.0.0.0 trusthost3 Admin user trust host IP, default 0.0.0.0 0.0.0.0 for all. 0.0.0.0 0.0.0.0 trusthost4 Admin user trust host IP, default 0.0.0.0 0.0.0.0 for all. 0.0.0.0 0.0.0.0 trusthost5 Admin user trust host IP, default 0.0.0.0 0.0.0.0 for all. 0.0.0.0 0.0.0.0 trusthost6 Admin user trust host IP, default 0.0.0.0 0.0.0.0 for all. 0.0.0.0 0.0.0.0 trusthost7 Admin user trust host IP, default 0.0.0.0 0.0.0.0 for all. 0.0.0.0 0.0.0.0 trusthost8 Admin user trust host IP, default 0.0.0.0 0.0.0.0 for all. 0.0.0.0 0.0.0.0 trusthost9 Admin user trust host IP, default 0.0.0.0 0.0.0.0 for all. 0.0.0.0 0.0.0.0 trusthost10 Admin user trust host IP, default 0.0.0.0 0.0.0.0 for all. 0.0.0.0 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 475 ip6-trusthost1 Admin user IPv6 trust host IP, default ::/0 for all. ::/0 ip6-trusthost2 Admin user IPv6 trust host IP, default ::/0 for all. ::/0 ip6-trusthost3 Admin user IPv6 trust host IP, default ::/0 for all. ::/0 ip6-trusthost4 Admin user IPv6 trust host IP, default ::/0 for all. ::/0 ip6-trusthost5 Admin user IPv6 trust host IP, default ::/0 for all. ::/0 ip6-trusthost6 Admin user IPv6 trust host IP, default ::/0 for all. ::/0 ip6-trusthost7 Admin user IPv6 trust host IP, default ::/0 for all. ::/0 ip6-trusthost8 Admin user IPv6 trust host IP, default ::/0 for all. ::/0 ip6-trusthost9 Admin user IPv6 trust host IP, default ::/0 for all. ::/0 ip6-trusthost10 Admin user IPv6 trust host IP, default ::/0 for all. ::/0 accprofile Admin user access profile. (Empty) allow-remove-adminsession Enable/disable allow admin session to be removed by privileged admin users. enable comments Comment. (Empty) hidden Admin user hidden attribute. 0 vdom Virtual domains. (Empty) is-admin Is user admin. 0 ssh-public-key1 SSH public key1. (Empty) ssh-public-key2 SSH public key2. (Empty) ssh-public-key3 SSH public key3. (Empty) ssh-certificate SSH certificate. (Empty) schedule Schedule name. (Empty) accprofile-override Enable/disable allow access profile to be overridden from remote auth server. disable radius-vdom-override Enable/disable allow VDOM to be overridden from RADIUS. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 476 password-expire Password expire time. 0000-00-00 00:00:00 force-password-change Enable/disable force password change on next login. disable dashboard GUI custom dashboard. (Empty) two-factor Enable/disable two-factor authentication. disable fortitoken Two-factor recipient's FortiToken serial number. (Empty) email-to Two-factor recipient's email address. (Empty) sms-server Send SMS through FortiGuard or other external server. fortiguard sms-custom-server Two-factor recipient's SMS server. (Empty) sms-phone Two-factor recipient's mobile phone number. (Empty) guest-auth Enable/disable guest authentication. disable guest-usergroups Select guest user groups. (Empty) guest-lang Guest management portal language. (Empty) history0 history0 ENC history1 history1 ENC login-time Record user login time. (Empty) gui-global-menufavorites Favorite GUI menu IDs for the global VDOM. (Empty) gui-vdom-menufavorites Favorite GUI menu IDs for VDOMs. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 477 system/alarm CLI Syntax config system alarm edit <name_str> set status {enable | disable} set audible {enable | disable} set sequence <integer> config groups edit <name_str> set id <integer> set period <integer> set admin-auth-failure-threshold <integer> set admin-auth-lockout-threshold <integer> set user-auth-failure-threshold <integer> set user-auth-lockout-threshold <integer> set replay-attempt-threshold <integer> set self-test-failure-threshold <integer> set log-full-warning-threshold <integer> set encryption-failure-threshold <integer> set decryption-failure-threshold <integer> config fw-policy-violations edit <name_str> set id <integer> set threshold <integer> set src-ip <ipv4-address> set dst-ip <ipv4-address> set src-port <integer> set dst-port <integer> end set fw-policy-id <integer> set fw-policy-id-threshold <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 478 Description Configuration Description Default Value status Enable/disable alarm. disable audible Enable/disable audible alarm. disable sequence Sequence ID of alarms. 0 groups Alarm groups. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 479 system/arp-table CLI Syntax config system arp-table edit <name_str> set id <integer> set interface <string> set ip <ipv4-address> set mac <mac-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 480 Description Configuration Description Default Value id Unique integer ID of the entry. 0 interface Interface name. (Empty) ip IP address. 0.0.0.0 mac MAC address. 00:00:00:00:00:00 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 481 system/auto-install CLI Syntax config system auto-install edit <name_str> set auto-install-config {enable | disable} set auto-install-image {enable | disable} set default-config-file <string> set default-image-file <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 482 Description Configuration Description Default Value auto-install-config Enable/disable auto install the config in USB disk. disable auto-install-image Enable/disable auto install the image in USB disk. disable default-config-file Default config file name in USB disk. fgt_system.conf default-image-file Default image file name in USB disk. image.out CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 483 system/auto-script CLI Syntax config system auto-script edit <name_str> set name <string> set interval <integer> set repeat <integer> set start {manual | auto} set script <var-string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 484 Description Configuration Description Default Value name Auto script name. (Empty) interval Repeat interval in seconds. 0 repeat Number of times to repeat this script (0 = infinite). 1 start Script starting mode. manual script List of FortiOS CLI commands to repeat. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 485 system/central-management CLI Syntax config system central-management edit <name_str> set mode {normal | backup} set type {fortimanager | fortiguard | none} set schedule-config-restore {enable | disable} set schedule-script-restore {enable | disable} set allow-push-configuration {enable | disable} set allow-pushd-firmware {enable | disable} set allow-remote-firmware-upgrade {enable | disable} set allow-monitor {enable | disable} set serial-number <user> set fmg <string> set fmg-source-ip <ipv4-address> set fmg-source-ip6 <ipv6-address> set vdom <string> config server-list edit <name_str> set id <integer> set server-type {update | rating} set addr-type {ipv4 | ipv6 | fqdn} set server-address <ipv4-address> set server-address6 <ipv6-address> set fqdn <string> end set include-default-servers {enable | disable} set enc-algorithm {default | high | low} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 486 Description Configuration Description Default Value mode Normal/backup management mode. normal type Type of management server. none schedule-config-restore Enable/disable scheduled configuration restore. enable schedule-script-restore Enable/disable scheduled script restore. enable allow-pushconfiguration Enable/disable push configuration. enable allow-pushd-firmware Enable/disable push firmware. enable allow-remote-firmwareupgrade Enable/disable remote firmware upgrade. enable allow-monitor Enable/disable remote monitoring of device. enable serial-number Serial number. (Empty) fmg Address of FortiManager (IP or FQDN name). (Empty) fmg-source-ip Source IPv4 address to use when connecting to FortiManager. 0.0.0.0 fmg-source-ip6 Source IPv6 address to use when connecting to FortiManager. :: vdom Virtual domain name. root server-list FortiGuard override server list. (Empty) include-default-servers Enable/disable inclusion of public FortiGuard servers in the override server list. enable enc-algorithm Use SSL encryption. high CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 487 system/cluster-sync CLI Syntax config system cluster-sync edit <name_str> set sync-id <integer> set peervd <string> set peerip <ipv4-address> config syncvd edit <name_str> set name <string> end config session-sync-filter edit <name_str> set srcintf <string> set dstintf <string> set srcaddr <ipv4-classnet-any> set dstaddr <ipv4-classnet-any> set srcaddr6 <ipv6-network> set dstaddr6 <ipv6-network> config custom-service edit <name_str> set id <integer> set src-port-range <user> set dst-port-range <user> end end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 488 Description Configuration Description Default Value sync-id Sync ID. 0 peervd Peer connecting VDOM. root peerip Peer connecting IP. 0.0.0.0 syncvd VDOM of which sessions need to be synced. (Empty) session-sync-filter Session sync filter. Details below Configuration srcintf dstintf srcaddr dstaddr srcaddr6 dstaddr6 custom-service CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Default Value (Empty) (Empty) 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 ::/0 ::/0 (Empty) 489 system/console CLI Syntax config system console edit <name_str> set mode {batch | line} set baudrate {9600 | 19200 | 38400 | 57600 | 115200} set output {standard | more} set login {enable | disable} set fortiexplorer {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 490 Description Configuration Description Default Value mode Console mode. line baudrate Console baud rate. 9600 output Console output mode. more login Enable/disable serial console and FortiExplorer. enable fortiexplorer Enable/disable access for FortiExplorer. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 491 system/custom-language CLI Syntax config system custom-language edit <name_str> set name <string> set filename <string> set comments <var-string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 492 Description Configuration Description Default Value name Name. (Empty) filename Custom language file path. (Empty) comments Comment. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 493 system/ddns CLI Syntax config system ddns edit <name_str> set ddnsid <integer> set ddns-server {dyndns.org | dyns.net | ods.org | tzo.com | vavic.com | dipdns.ne t | now.net.cn | dhs.org | easydns.com | genericDDNS | FortiGuardDDNS} set ddns-server-ip <ipv4-address> set ddns-zone <string> set ddns-ttl <integer> set ddns-auth {disable | tsig} set ddns-keyname <string> set ddns-key <user> set ddns-domain <string> set ddns-username <string> set ddns-sn <string> set ddns-password <password> set use-public-ip {disable | enable} set clear-text {disable | enable} set ssl-certificate <string> set bound-ip <ipv4-address> config monitor-interface edit <name_str> set interface-name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 494 Description Configuration Description Default Value ddnsid DDNS ID. 0 ddns-server DDNS server. (Empty) ddns-server-ip Generic DDNS server IP. 0.0.0.0 ddns-zone Zone of your domain name (ex. DDNS.com). (Empty) ddns-ttl TTL. 300 ddns-auth DDNS authentication mode. disable ddns-keyname DDNS update key name. (Empty) ddns-key DDNS update key (base 64 encoding). 'ENC ws+aR7RX+Kk/g41Bs0 SWGbHac+vOTiv271H XGJTNf9n+sPaprfG5u bPEPH+8ZxccOuEMm sLafbDZ/F1ySfgOMVa RSxojcUfjSLNndHqBK YANZsnuAxu47RJMJ4 A=' ddns-domain Your domain name (ex. yourname.DDNS.com). (Empty) ddns-username DDNS user name. (Empty) ddns-sn DDNS Serial Number. (Empty) ddns-password DDNS password. (Empty) use-public-ip Enable/disable use of public IP address. disable clear-text Enable/disable use of clear text connection. enable ssl-certificate Name of local certificate for SSL connection. Fortinet_Factory bound-ip Bound IP address. 0.0.0.0 monitor-interface Monitored interface. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 495 system/dedicated-mgmt CLI Syntax config system dedicated-mgmt edit <name_str> set status {enable | disable} set interface <string> set default-gateway <ipv4-address> set dhcp-server {enable | disable} set dhcp-netmask <ipv4-netmask> set dhcp-start-ip <ipv4-address> set dhcp-end-ip <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 496 Description Configuration Description Default Value status Enable/disable dedicated management. disable interface Dedicated management interface. (Empty) default-gateway Default gateway for dedicated management interface. 0.0.0.0 dhcp-server Enable/disable DHCP server on management interface. disable dhcp-netmask DHCP netmask. 0.0.0.0 dhcp-start-ip DHCP start IP for dedicated management. 0.0.0.0 dhcp-end-ip DHCP end IP for dedicated management. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 497 system/dns CLI Syntax config system dns edit <name_str> set primary <ipv4-address> set secondary <ipv4-address> set domain <string> set ip6-primary <ipv6-address> set ip6-secondary <ipv6-address> set dns-cache-limit <integer> set dns-cache-ttl <integer> set cache-notfound-responses {disable | enable} set source-ip <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 498 Description Configuration Description Default Value primary Primary DNS IP. 0.0.0.0 secondary Secondary DNS IP. 0.0.0.0 domain Local domain name. (Empty) ip6-primary IPv6 primary DNS IP. :: ip6-secondary IPv6 secondary DNS IP. :: dns-cache-limit Maximum number of entries in DNS cache. 5000 dns-cache-ttl TTL in DNS cache. 1800 cache-notfoundresponses Enable/disable cache NOTFOUND responses from DNS server. disable source-ip Source IP for communications to DNS server. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 499 system/dns-database CLI Syntax config system dns-database edit <name_str> set name <string> set status {enable | disable} set domain <string> set allow-transfer <user> set type {master | slave} set view {shadow | public} set ip-master <ipv4-address-any> set primary-name <string> set contact <string> set ttl <integer> set authoritative {enable | disable} set forwarder <user> set source-ip <ipv4-address> config dns-entry edit <name_str> set id <integer> set status {enable | disable} set type {A | NS | CNAME | MX | AAAA | PTR | PTR_V6} set ttl <integer> set preference <integer> set ip <ipv4-address-any> set ipv6 <ipv6-address> set hostname <string> set canonical-name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 500 Description Configuration Description Default Value name Zone name. (Empty) status Enable/disable DNS zone status. enable domain Domain name. (Empty) allow-transfer DNS zone transfer IP address list. (Empty) type Zone type ('master' to manage entries directly, 'slave' to import entries from outside). master view Zone view ('public' to serve public clients, 'shadow' to serve internal clients). shadow ip-master IP address of master DNS server to import entries of this zone. 0.0.0.0 primary-name Domain name of the default DNS server for this zone. dns contact Email address of the administrator for this zone. You can specify only the username (e.g. admin) or full email address (e.g. admin.ca@test.com) When using simple username, the domain of the email will be this zone. hostmaster ttl Default time-to-live value in units of seconds for the entries of this zone (0 - 2147483647). 86400 authoritative Enable/disable authoritative zone. enable forwarder DNS zone forwarder IP address list. (Empty) source-ip Source IP for forwarding to DNS server. 0.0.0.0 dns-entry DNS entry. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 501 system/dns-server CLI Syntax config system dns-server edit <name_str> set name <string> set mode {recursive | non-recursive | forward-only} set dnsfilter-profile <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 502 Description Configuration Description Default Value name DNS server name. (Empty) mode DNS server mode. recursive dnsfilter-profile DNS filter profile. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 503 system/dscp-based-priority CLI Syntax config system dscp-based-priority edit <name_str> set id <integer> set ds <integer> set priority {low | medium | high} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 504 Description Configuration Description Default Value id Item ID. 0 ds DSCP(DiffServ) DS value (0 - 63). 0 priority DSCP based priority level. high CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 505 system/email-server CLI Syntax config system email-server edit <name_str> set type {custom} set reply-to <string> set server <string> set port <integer> set source-ip <ipv4-address> set source-ip6 <ipv6-address> set authenticate {enable | disable} set validate-server {enable | disable} set username <string> set password <password> set security {none | starttls | smtps} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 506 Description Configuration Description Default Value type Use FortiGuard Message service or custom server. custom reply-to Reply-To email address. (Empty) server SMTP server IP address or hostname. (Empty) port SMTP server port. 25 source-ip SMTP server source IP. 0.0.0.0 source-ip6 SMTP server source IPv6. :: authenticate Enable/disable authentication. disable validate-server Enable/disable validation of server certificate. disable username SMTP server user name for authentication. (Empty) password SMTP server user password for authentication. (Empty) security Connection security. none CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 507 system/fips-cc CLI Syntax config system fips-cc edit <name_str> set status {enable | disable} set entropy-token {enable | disable | dynamic} set error-flag {error-mode | exit-ready} set error-cause {none | memory | disk | syslog} set self-test-period <integer> set key-generation-self-test {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 508 Description Configuration Description Default Value status Enable/disable FIPS-CC mode. disable entropy-token Enable/disable/dynamic entropy token. enable error-flag Hidden CC error flag. (Empty) error-cause Hidden CC error cause. none self-test-period Self test period. 1440 key-generation-self-test Enable/disable self tests after key generation. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 509 system/fm CLI Syntax config system fm edit <name_str> set status {enable | disable} set id <string> set ip <ipv4-address> set vdom <string> set auto-backup {enable | disable} set scheduled-config-restore {enable | disable} set ipsec {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 510 Description Configuration Description Default Value status Enable/disable FM. disable id ID. (Empty) ip IP address. 0.0.0.0 vdom VDOM. root auto-backup Enable/disable automatic backup. disable scheduled-configrestore Enable/disable scheduled configuration restore. disable ipsec Enable/disable IPsec. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 511 system/fortiguard CLI Syntax config system fortiguard edit <name_str> set port {53 | 8888 | 80} set service-account-id <string> set load-balance-servers <integer> set antispam-force-off {enable | disable} set antispam-cache {enable | disable} set antispam-cache-ttl <integer> set antispam-cache-mpercent <integer> set antispam-license <integer> set antispam-expiration <integer> set antispam-timeout <integer> set avquery-force-off {} set avquery-cache {} set avquery-cache-ttl <integer> set avquery-cache-mpercent <integer> set avquery-license <integer> set avquery-timeout <integer> set webfilter-force-off {enable | disable} set webfilter-cache {enable | disable} set webfilter-cache-ttl <integer> set webfilter-license <integer> set webfilter-expiration <integer> set webfilter-timeout <integer> set sdns-server-ip <user> set sdns-server-port <integer> set source-ip <ipv4-address> set source-ip6 <ipv6-address> set ddns-server-ip <ipv4-address> set ddns-server-port <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 512 Description Configuration Description Default Value port Port used to communicate with the FortiGuard servers. 53 service-account-id Service account ID. (Empty) load-balance-servers Number of servers to alternate between as first FortiGuard option. 1 antispam-force-off Enable/disable forcibly disable the service. disable antispam-cache Enable/disable FortiGuard antispam cache. enable antispam-cache-ttl Time-to-live for cache entries in seconds (300 86400). 1800 antispam-cachempercent Maximum percent of memory the cache is allowed to use (1 - 15%). 2 antispam-license License type. 4294967295 antispam-expiration License expiration. 0 antispam-timeout Query time out (1 - 30 sec). 7 avquery-force-off avquery-force-off avquery-cache avquery-cache avquery-cache-ttl avquery-cache-ttl avquery-cachempercent avquery-cache-mpercent avquery-license avquery-license avquery-timeout avquery-timeout webfilter-force-off Enable/disable forcibly disable the service. disable webfilter-cache Enable/disable FortiGuard webfilter cache. enable webfilter-cache-ttl Time-to-live for cache entries in seconds (300 86400). 3600 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 513 webfilter-license License type. 4294967295 webfilter-expiration License expiration. 0 webfilter-timeout Query time out (1 - 30 sec). 15 sdns-server-ip IP address of the FortiDNS server. (Empty) sdns-server-port Port used to communicate with the FortiDNS servers. 53 source-ip Source IPv4 address used to communicate with the FortiGuard service. 0.0.0.0 source-ip6 Source IPv6 address used to communicate with the FortiGuard service. :: ddns-server-ip IP address of the FortiDDNS server. 0.0.0.0 ddns-server-port Port used to communicate with the FortiDDNS servers. 443 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 514 system/fortimanager CLI Syntax config system fortimanager edit <name_str> set ip <ipv4-address-any> set vdom <string> set ipsec {enable | disable} set central-management {enable | disable} set central-mgmt-auto-backup {enable | disable} set central-mgmt-schedule-config-restore {enable | disable} set central-mgmt-schedule-script-restore {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 515 Description Configuration Description Default Value ip IP address. 0.0.0.0 vdom Virtual domain name. root ipsec Enable/disable FortiManager IPsec tunnel. disable central-management Enable/disable FortiManager central management. disable central-mgmt-autobackup Enable/disable central management auto backup. disable central-mgmt-scheduleconfig-restore Enable/disable central management schedule config restore. disable central-mgmt-schedulescript-restore Enable/disable central management schedule script restore. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 516 system/fortisandbox CLI Syntax config system fortisandbox edit <name_str> set status {enable | disable} set server <ipv4-address-any> set source-ip <ipv4-address> set enc-algorithm {default | high | low | disable} set email <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 517 Description Configuration Description Default Value status Enable/disable FortiSandbox. disable server Server IP. 0.0.0.0 source-ip Source IP for communications to FortiSandbox. 0.0.0.0 enc-algorithm Enable/disable sending of FortiSandbox data with SSL encryption. default email Notifier email address. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 518 system/fsso-polling CLI Syntax config system fsso-polling edit <name_str> set status {enable | disable} set listening-port <integer> set authentication {enable | disable} set auth-password <password> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 519 Description Configuration Description Default Value status Enable/disable FSSO Polling Mode status. enable listening-port Listening port to accept clients. 8000 authentication Enable/disable FSSO Agent Authentication status. disable auth-password Password to connect to FSSO Agent. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 520 system/geoip-override CLI Syntax config system geoip-override edit <name_str> set name <string> set description <string> set country-id <string> config ip-range edit <name_str> set id <integer> set start-ip <ipv4-address> set end-ip <ipv4-address> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 521 Description Configuration Description Default Value name Location name. (Empty) description Description. (Empty) country-id Country ID. (Empty) ip-range IP range. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 522 system/global CLI Syntax config system global edit <name_str> set language {english | french | spanish | portuguese | japanese | trach | simch | korean} set gui-ipv6 {enable | disable} set gui-certificates {enable | disable} set gui-custom-language {enable | disable} set gui-wireless-opensecurity {enable | disable} set gui-display-hostname {enable | disable} set gui-lines-per-page <integer> set admin-https-ssl-versions {tlsv1-0 | tlsv1-1 | tlsv1-2 | sslv3} set admin-https-banned-cipher {rc4 | low} set admintimeout <integer> set admin-console-timeout <integer> set admin-concurrent {enable | disable} set admin-lockout-threshold <integer> set admin-lockout-duration <integer> set refresh <integer> set interval <integer> set failtime <integer> set daily-restart {enable | disable} set restart-time <user> set radius-port <integer> set admin-login-max <integer> set remoteauthtimeout <integer> set ldapconntimeout <integer> set batch-cmdb {enable | disable} set max-dlpstat-memory <integer> set dst {enable | disable} set timezone {01 | 02 | 03 | 04 | 05 | 81 | 06 | 07 | 08 | 09 | 10 | 11 | 12 | 13 | 74 | 14 | 77 | 15 | 16 | 17 | 18 | 19 | 20 | 75 | 21 | 22 | 23 | 24 | 80 | 79 | 25 | 26 | 27 | 28 | 78 | 29 | 30 | 31 | 85 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 83 | 84 | 40 | 41 | 42 | 43 | 39 | 44 | 46 | 47 | 51 | 48 | 45 | 49 | 50 | 52 | 53 | 54 | 55 | 5 6 | 57 | 58 | 59 | 60 | 62 | 63 | 61 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 00 | 82 | 73 | 86 | 76} set ntpserver <string> set ntpsync {enable | disable} set syncinterval <integer> set traffic-priority {tos | dscp} set traffic-priority-level {low | medium | high} set anti-replay {disable | loose | strict} set send-pmtu-icmp {enable | disable} set honor-df {enable | disable} set split-port <user> set revision-image-auto-backup {enable | disable} set revision-backup-on-logout {enable | disable} set management-vdom <string> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 523 set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set hostname <string> alias <string> strong-crypto {enable | disable} ssh-cbc-cipher {enable | disable} ssh-hmac-md5 {enable | disable} snat-route-change {enable | disable} cli-audit-log {enable | disable} dh-params {1024 | 1536 | 2048 | 3072 | 4096 | 6144 | 8192} fds-statistics {enable | disable} fds-statistics-period <integer> multicast-forward {enable | disable} mc-ttl-notchange {enable | disable} asymroute {enable | disable} tcp-option {enable | disable} phase1-rekey {enable | disable} lldp-transmission {enable | disable} explicit-proxy-auth-timeout <integer> sys-perf-log-interval <integer> check-protocol-header {loose | strict} vip-arp-range {unlimited | restricted} optimize {antivirus | session-setup | throughput} reset-sessionless-tcp {enable | disable} allow-traffic-redirect {enable | disable} strict-dirty-session-check {enable | disable} tcp-halfclose-timer <integer> tcp-halfopen-timer <integer> tcp-timewait-timer <integer> udp-idle-timer <integer> block-session-timer <integer> ip-src-port-range <user> pre-login-banner {enable | disable} post-login-banner {disable | enable} tftp {enable | disable} av-failopen {pass | idledrop | off | one-shot} av-failopen-session {enable | disable} check-reset-range {strict | disable} vdom-admin {enable | disable} admin-port <integer> admin-sport <integer> admin-https-redirect {enable | disable} admin-ssh-password {enable | disable} admin-ssh-port <integer> admin-ssh-grace-time <integer> admin-ssh-v1 {enable | disable} admin-telnet-port <integer> admin-maintainer {enable | disable} admin-server-cert <string> user-server-cert <string> admin-https-pki-required {enable | disable} wifi-certificate <string> wifi-ca-certificate <string> auth-http-port <integer> auth-https-port <integer> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 524 set auth-https-port <integer> set auth-keepalive {enable | disable} set policy-auth-concurrent <integer> set auth-cert <string> set clt-cert-req {enable | disable} set fortiservice-port <integer> set endpoint-control-portal-port <integer> set endpoint-control-fds-access {enable | disable} set tp-mc-skip-policy {enable | disable} set cfg-save {automatic | manual | revert} set cfg-revert-timeout <integer> set reboot-upon-config-restore {enable | disable} set admin-scp {enable | disable} set registration-notification {enable | disable} set service-expire-notification {enable | disable} set wireless-controller {enable | disable} set wireless-controller-port <integer> set fortiextender-data-port <integer> set fortiextender {enable | disable} set switch-controller {disable | enable} set switch-controller-reserved-network <ipv4-classnet> set proxy-worker-count <integer> set scanunit-count <integer> set ssl-worker-count <integer> set proxy-kxp-hardware-acceleration {disable | enable} set proxy-cipher-hardware-acceleration {disable | enable} set fgd-alert-subscription {advisory | latest-threat | latest-virus | latest-attac k | new-antivirus-db | new-attack-db} set ipsec-hmac-offload {enable | disable} set ipv6-accept-dad <integer> set csr-ca-attribute {enable | disable} set wimax-4g-usb {enable | disable} set cert-chain-max <integer> set sslvpn-max-worker-count <integer> set sslvpn-kxp-hardware-acceleration {enable | disable} set sslvpn-cipher-hardware-acceleration {enable | disable} set sslvpn-plugin-version-check {enable | disable} set two-factor-ftk-expiry <integer> set two-factor-email-expiry <integer> set two-factor-sms-expiry <integer> set two-factor-fac-expiry <integer> set two-factor-ftm-expiry <integer> set per-user-bwl {enable | disable} set virtual-server-count <integer> set virtual-server-hardware-acceleration {disable | enable} set wad-worker-count <integer> set login-timestamp {enable | disable} set miglogd-children <integer> set special-file-23-support {disable | enable} set log-uuid {disable | policy-only | extended} set arp-max-entry <integer> set ips-affinity <string> set av-affinity <string> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 525 set set set set set set set set set set set set set set set set end av-affinity <string> miglog-affinity <string> ndp-max-entry <integer> br-fdb-max-entry <integer> max-route-cache-size <integer> ipsec-asic-offload {enable | disable} device-idle-timeout <integer> device-identification-active-scan-delay <integer> compliance-check {enable | disable} compliance-check-time <time> gui-device-latitude <string> gui-device-longitude <string> private-data-encryption {disable | enable} auto-auth-extension-device {enable | disable} gui-theme {green | red | blue | melongene | mariner} igmp-state-limit <integer> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 526 Description Configuration Description Default Value language GUI display language. english gui-ipv6 Enable/disable IPv6 settings in GUI. disable gui-certificates Enable/disable certificates configuration in GUI. enable gui-custom-language Enable/disable custom languages in GUI. disable gui-wirelessopensecurity Enable/disable wireless open security option in GUI. disable gui-display-hostname Enable/disable display of hostname on GUI login page. disable gui-lines-per-page Number of lines to display per page for web administration. 50 admin-https-sslversions Allowed SSL/TLS versions for web administration. tlsv1-1 tlsv1-2 admin-https-bannedcipher Banned ciphers for web administration. rc4 low admintimeout Idle time-out for firewall administration. 5 admin-console-timeout Idle time-out for console. 0 admin-concurrent Enable/disable admin concurrent login. enable admin-lockoutthreshold Lockout threshold for firewall administration. 3 admin-lockout-duration Lockout duration (sec) for firewall administration. 60 refresh Statistics refresh interval in GUI. 0 interval Dead gateway detection interval. 5 failtime Fail-time for server lost. 5 daily-restart Enable/disable firewall daily reboot. disable restart-time Daily restart time (hh:mm). 00:00 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 527 radius-port RADIUS service port number. 1812 admin-login-max Maximum number admin users logged in at one time (1 - 100). 100 remoteauthtimeout Remote authentication (RADIUS/LDAP) time-out. 5 ldapconntimeout LDAP connection time-out (0 - 4294967295 milliseconds). 500 batch-cmdb Enable/disable batch mode to execute in CMDB server. enable max-dlpstat-memory Maximum DLP stat memory (0 - 4294967295). dst Enable/disable daylight saving time. enable timezone Time zone. 00 ntpserver IP address/hostname of NTP Server. (Empty) ntpsync Enable/disable synchronization with NTP Server. disable syncinterval NTP synchronization interval. 0 traffic-priority Traffic priority type. tos traffic-priority-level Default TOS/DSCP priority level. medium anti-replay Anti-replay control. strict send-pmtu-icmp Enable/disable sending of PMTU ICMP destination unreachable packet. enable honor-df Enable/disable honoring Don't-Fragment flag. enable split-port Split port(s) to multiple 10Gbps ports. (Empty) revision-image-autobackup Enable/disable revision image backup automatically when upgrading image. disable revision-backup-onlogout Enable/disable revision config backup automatically when logout. disable management-vdom Management virtual domain name. root hostname Firewall hostname. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 528 alias Device alias. (Empty) strong-crypto Enable/disable strong crypto for HTTPS/SSH access. enable ssh-cbc-cipher Enable/disable CBC cipher for SSH access. enable ssh-hmac-md5 Enable/disable HMAC-MD5 for SSH access. enable snat-route-change Enable/disable SNAT route change. disable cli-audit-log Enable/disable CLI audit log. disable dh-params Minimum size of Diffie-Hellman prime for HTTPS/SSH. 2048 fds-statistics Enable/disable FortiGuard statistics. enable fds-statistics-period FortiGuard statistics update period (1 - 1440 min, default = 60 min). 60 multicast-forward Enable/disable multicast forwarding. enable mc-ttl-notchange Enable/disable no modification of multicast TTL. disable asymroute Enable/disable asymmetric route. disable tcp-option Enable/disable TCP option. enable phase1-rekey Enable/disable phase1 rekey. enable lldp-transmission Enable/disable Link Layer Discovery Protocol (LLDP) transmission. disable explicit-proxy-authtimeout Authentication timeout (sec) for idle sessions in explicit web proxy. 300 sys-perf-log-interval The interval of performance statistics logging. 5 check-protocol-header Level of checking protocol header. loose vip-arp-range Control ARP behavior for VIP ranges. restricted optimize Firmware optimization option. antivirus reset-sessionless-tcp Enable/disable reset session-less TCP. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 529 allow-traffic-redirect Enable/disable allow traffic redirect. enable strict-dirty-sessioncheck Enable/disable strict dirty-session check. enable tcp-halfclose-timer TCP half close timeout (1 - 86400 sec, default = 120). 120 tcp-halfopen-timer TCP half open timeout (1 - 86400 sec, default = 10). 10 tcp-timewait-timer TCP time wait timeout (0 - 300 sec, default = 1). 1 udp-idle-timer UDP idle timeout (1 - 86400 sec, default = 180). 180 block-session-timer Block-session timeout (1-300 sec, default = 30 sec). 30 ip-src-port-range IP source port range for firewall originated traffic. 1024-25000 pre-login-banner Enable/disable pre-login-banner. disable post-login-banner Enable/disable post-login-banner. disable tftp Enable/disable TFTP. enable av-failopen AV fail open option. pass av-failopen-session Enable/disable AV fail open session option. disable check-reset-range Drop RST packets if out-of-window. disable vdom-admin Enable/disable multiple VDOMs mode. disable admin-port Admin access HTTP port (1 - 65535). 80 admin-sport Admin access HTTPS port (1 - 65535). 443 admin-https-redirect Enable/disable redirection of HTTP admin traffic to HTTPS. enable admin-ssh-password Enable/disable password authentication for SSH admin access. enable admin-ssh-port Admin access SSH port (1 - 65535). 22 admin-ssh-grace-time Admin access login grace time (10 - 3600 sec). 120 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 530 admin-ssh-v1 Enable/disable SSH v1 compatibility. disable admin-telnet-port Admin access TELNET port (1 - 65535). 23 admin-maintainer Enable/disable login of maintainer user. enable admin-server-cert Admin HTTPS server certificate. Fortinet_Factory user-server-cert User HTTPS server certificate. Fortinet_Factory admin-https-pkirequired Enable/disable require HTTPS login page when PKI is enabled. disable wifi-certificate WiFi certificate for WPA. Fortinet_Wifi wifi-ca-certificate WiFi CA certificate for WPA. Fortinet_Wifi_CA auth-http-port Authentication HTTP port (1 - 65535). 1000 auth-https-port Authentication HTTPS port (1 - 65535). 1003 auth-keepalive Enable/disable use of keep alive to extend authentication. disable policy-auth-concurrent Concurrent user to pass firewall authentication. 0 auth-cert HTTPS server certificate for policy authentication. Fortinet_Factory clt-cert-req Enable/disable require client certificate for GUI login. disable fortiservice-port FortiService port number (default = 8013). 8013 endpoint-control-portalport Endpoint control portal port (1 - 65535). 8009 endpoint-control-fdsaccess Enable/disable access to FortiGuard servers for non-compliant endpoints. enable tp-mc-skip-policy Enable/disable skip policy check and allow multicast through. disable cfg-save Configuration file save mode for changes made using the CLI. automatic cfg-revert-timeout Time-out for reverting to the last saved configuration. 600 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 531 reboot-upon-configrestore Enable/disable reboot of system upon restoring configuration. enable admin-scp Enable/disable allow system configuration download by SCP. disable registration-notification Enable/disable allow license registration notification. enable service-expirenotification Enable/disable service expiration notification. enable wireless-controller Enable/disable wireless controller. enable wireless-controller-port Local wireless controller port (1024 - 49150). 5246 fortiextender-data-port Fortiextender controller data port (1024 - 49150). 25246 fortiextender Enable/disable FortiExtender controller. disable switch-controller Enable/disable switch controller feature. disable switch-controllerreserved-network Reserved network for switch-controller. 169.254.0.0 255.255.0.0 proxy-worker-count Proxy worker count. 16 scanunit-count Scanunit count. 39 ssl-worker-count SSL worker count (0 - 4294967295). proxy-kxp-hardwareacceleration Enable/disable use of content processor to encrypt or decrypt traffic. enable proxy-cipher-hardwareacceleration Enable/disable use of content processor to encrypt or decrypt traffic. enable fgd-alert-subscription FortiGuard alert subscription. (Empty) ipsec-hmac-offload Enable/disable offload HMAC to hardware for IPsec VPN. enable ipv6-accept-dad Enable/disable acceptance of IPv6 DAD (Duplicate Address Detection). 0: Disable DAD; 1: Enable DAD (default); 2: Enable DAD, and disable IPv6 operation if MAC-based duplicate link-local address has been found. 1 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 532 csr-ca-attribute Enable/disable CSR CA attribute. enable wimax-4g-usb Enable/disable WiMAX USB device. disable cert-chain-max Maximum depth for certificate chain. 8 sslvpn-max-workercount Maximum number of worker processes for SSLVPN. 39 sslvpn-kxp-hardwareacceleration Enable/disable KXP SSL-VPN hardware acceleration. disable sslvpn-cipherhardware-acceleration Enable/disable SSL-VPN cipher hardware acceleration. disable sslvpn-plugin-versioncheck Enable/disable SSL-VPN automatic checking of browser plug-in version. enable two-factor-ftk-expiry Expiration time for FortiToken authentication (60 600 sec, default = 60 sec). 60 two-factor-email-expiry Expiration time for email token authentication (30 - 300 sec, default = 60 sec). 60 two-factor-sms-expiry Expiration time for SMS token authentication (30 - 300 sec, default = 60 sec). 60 two-factor-fac-expiry Expiration time for FortiAuthenticator token authentication (10 - 3600 sec, default = 60 sec). 60 two-factor-ftm-expiry Expiration time for FortiToken mobile provision (1 - 168 hr, default = 72 hr). 72 per-user-bwl Enable/disable per-user black/white list filter. disable virtual-server-count Number of concurrent virtual server workers. 20 virtual-serverhardware-acceleration Enable/disable use of content processor to encrypt or decrypt traffic. enable wad-worker-count Number of concurrent WAD workers. 20 login-timestamp Enable/disable login time recording. disable miglogd-children Number of miglog children. 0 special-file-23-support Enable/disable support for special file 23. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 533 log-uuid Universally Unique Identifier (UUID) log option. policy-only arp-max-entry Maximum number of ARP table entries (set to 131,072 or higher). 131072 ips-affinity Affinity setting for IPS (64-bit hexadecimal value in the format of xxxxxxxxxxxxxxxx; allowed CPUs must be less than total number of IPS engine daemons). 0 av-affinity Affinity setting for AV scanning (64-bit hexadecimal value in the format of xxxxxxxxxxxxxxxx). 0 miglog-affinity Affinity setting for logging (64-bit hexadecimal value in the format of xxxxxxxxxxxxxxxx). 0 ndp-max-entry Maximum number of NDP table entries (set to 65,536 or higher; if set to 0, kernel holds 65,536 entries). 0 br-fdb-max-entry Maximum number of bridge forwarding database entries (set to 8192 or higher). 8192 max-route-cache-size Maximum number of IP route cache entries (0 2147483647). 0 ipsec-asic-offload Enable/disable ASIC offload for IPsec VPN. enable device-idle-timeout Device idle timeout (30 - 31536000 sec, default = 300 sec). 300 device-identificationactive-scan-delay How many seconds (20 - 3600, default 90) to passively scan a device before performing an active scan. 90 compliance-check Enable/disable global PCI DSS compliance check. enable compliance-check-time PCI DSS compliance check time. 00:00:00 gui-device-latitude Physical device latitude coordinate. (Empty) gui-device-longitude Physical device longitude coordinate. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 534 private-data-encryption Enable/disable private data encryption using an AES 128-bit key. disable auto-auth-extensiondevice Enable/disable automatic authorization of dedicated Fortinet extension device globally. enable gui-theme Color scheme to use for the administration GUI. green igmp-state-limit Maximum IGMP memberships (96 - 64000, default = 3200). 3200 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 535 system/gre-tunnel CLI Syntax config system gre-tunnel edit <name_str> set name <string> set interface <string> set remote-gw <ipv4-address> set local-gw <ipv4-address-any> set sequence-number-transmission {disable | enable} set sequence-number-reception {disable | enable} set checksum-transmission {disable | enable} set checksum-reception {disable | enable} set key-outbound <integer> set key-inbound <integer> set dscp-copying {disable | enable} set auto-asic-offload {enable | disable} set keepalive-interval <integer> set keepalive-failtimes <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 536 Description Configuration Description Default Value name Tunnel name. (Empty) interface Interface name. (Empty) remote-gw IP address of the remote gateway. 0.0.0.0 local-gw IP address of the local gateway. 0.0.0.0 sequence-numbertransmission Enable/disable inclusion of sequence number in transmitted GRE packets. disable sequence-numberreception Enable/disable validation of sequence number in received GRE packets. disable checksum-transmission Enable/disable inclusion of checksum in transmitted GRE packets. disable checksum-reception Enable/disable validation of checksum in received GRE packets. disable key-outbound Include this key in transmitted GRE packets (0 4294967295). 0 key-inbound Require received GRE packets contain this key (0 - 4294967295). 0 dscp-copying Enable/disable DSCP copying. disable auto-asic-offload Enable/disable tunnel ASIC offloading. enable keepalive-interval Keepalive message interval (0 - 32767, 0 = disabled). 0 keepalive-failtimes Number of consecutive unreturned keepalive messages before GRE connection is considered down (1 - 255). 10 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 537 system/ha CLI Syntax config system ha edit <name_str> set group-id <integer> set group-name <string> set mode {standalone | a-a | a-p} set password <password> set key <password> set hbdev <user> set session-sync-dev <user> set route-ttl <integer> set route-wait <integer> set route-hold <integer> set load-balance-all {enable | disable} set sync-config {enable | disable} set encryption {enable | disable} set authentication {enable | disable} set hb-interval <integer> set hb-lost-threshold <integer> set helo-holddown <integer> set gratuitous-arps {enable | disable} set arps <integer> set arps-interval <integer> set session-pickup {enable | disable} set session-pickup-connectionless {enable | disable} set session-pickup-expectation {enable | disable} set session-pickup-nat {enable | disable} set session-pickup-delay {enable | disable} set session-sync-daemon-number <integer> set link-failed-signal {enable | disable} set uninterruptible-upgrade {enable | disable} set standalone-mgmt-vdom {enable | disable} set ha-mgmt-status {enable | disable} set ha-mgmt-interface <string> set ha-mgmt-interface-gateway <ipv4-address> set ha-mgmt-interface-gateway6 <ipv6-address> set ha-eth-type <string> set hc-eth-type <string> set l2ep-eth-type <string> set ha-uptime-diff-margin <integer> set standalone-config-sync {enable | disable} set vcluster2 {enable | disable} set vcluster-id <integer> set override {enable | disable} set priority <integer> set override-wait-time <integer> set schedule {none | hub | leastconnection | round-robin | weight-round-robin | ra ndom | ip | ipport} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 538 set weight <user> set cpu-threshold <user> set memory-threshold <user> set http-proxy-threshold <user> set ftp-proxy-threshold <user> set imap-proxy-threshold <user> set nntp-proxy-threshold <user> set pop3-proxy-threshold <user> set smtp-proxy-threshold <user> set monitor <user> set pingserver-monitor-interface <user> set pingserver-failover-threshold <integer> set pingserver-slave-force-reset {enable | disable} set pingserver-flip-timeout <integer> set vdom <user> config secondary-vcluster edit <name_str> set vcluster-id <integer> set override {enable | disable} set priority <integer> set override-wait-time <integer> set monitor <user> set pingserver-monitor-interface <user> set pingserver-failover-threshold <integer> set pingserver-slave-force-reset {enable | disable} set vdom <user> end set ha-direct {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 539 Description Configuration Description Default Value group-id Group ID (0 - 255). 0 group-name Group name. (Empty) mode Mode. standalone password password (Empty) key key (Empty) hbdev Heartbeat interfaces. "port1" 50 "mgmt1" 50 session-sync-dev Session sync interfaces. (Empty) route-ttl HA route TTL on master (5 - 3600 sec). 10 route-wait Route update wait time (0 - 3600 sec). 0 route-hold Wait time between route updates (0 - 3600 sec). 10 load-balance-all Enable/disable load balance. disable sync-config Enable/disable configuration synchronization. enable encryption Enable/disable HA message encryption. disable authentication Enable/disable HA message authentication. disable hb-interval Configure heartbeat interval (1 - 20 (100*ms)). 2 hb-lost-threshold Lost heartbeat threshold (1 - 60). 6 helo-holddown Configure hello state hold-down time (5 - 300 sec). 20 gratuitous-arps Enable/disable gratuitous ARPs. enable arps Configure number of gratuitous ARPs (1 - 60). 5 arps-interval Configure gratuitous ARPs interval (1 - 20 sec). 8 session-pickup Enable/disable session pickup. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 540 session-pickupconnectionless Enable/disable pickup non-TCP sessions. disable session-pickupexpectation Enable/disable pickup expectation sessions. disable session-pickup-nat Enable/disable pickup of NATed sessions. disable session-pickup-delay Enable/disable delay session sync by 30 seconds. disable session-sync-daemonnumber Session sync daemon process number. 1 link-failed-signal Enable/disable link failed signal. disable uninterruptible-upgrade Enable/disable uninterruptible HA upgrade. enable standalone-mgmt-vdom Enable/disable standalone management VDOM. disable ha-mgmt-status Enable/disable HA management interface reservation. disable ha-mgmt-interface Reserved interface of HA management. (Empty) ha-mgmt-interfacegateway Gateway for reserved interface of HA management. 0.0.0.0 ha-mgmt-interfacegateway6 IPv6 gateway for reserved interface of HA management. :: ha-eth-type HA Ethernet type (4-digit hex). 8890 hc-eth-type HC Ethernet type (4-digit hex). 8891 l2ep-eth-type L2EP Ethernet type (4-digit hex). 8893 ha-uptime-diff-margin HA uptime difference margin (sec). 300 standalone-config-sync Enable/disable standalone config sync. disable vcluster2 Enable/disable secondary virtual cluster. disable vcluster-id Cluster ID. 0 override Enable/disable master HA unit overriding. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 541 priority Priority value (0 - 255). 128 override-wait-time Override wait time (0 - 3600 sec). 0 schedule Schedule. round-robin weight Weight for weight-round-robin schedule. 40 cpu-threshold CPU threshold weight. 500 memory-threshold Memory threshold weight. 500 http-proxy-threshold HTTP proxy threshold. 500 ftp-proxy-threshold FTP proxy threshold. 500 imap-proxy-threshold IMAP proxy threshold. 500 nntp-proxy-threshold NNTP proxy threshold. 500 pop3-proxy-threshold POP3 proxy threshold. 500 smtp-proxy-threshold SMTP proxy threshold. 500 monitor Interfaces to monitor. (Empty) pingserver-monitorinterface Monitor interfaces that has PING server enabled. (Empty) pingserver-failoverthreshold Threshold at which HA failover occurs upon PING server failure (0 - 50). 0 pingserver-slave-forcereset Enable/disable force reset of slave after PING server failure. enable pingserver-flip-timeout Minutes to wait before HA failover flip-flop. 60 vdom VDOM members. (Empty) secondary-vcluster Secondary virtual cluster. Details below CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 542 Configuration vcluster-id override priority override-wait-time monitor pingserver-monitor-interface pingserver-failover-threshold pingserver-slave-force-reset vdom ha-direct CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Default Value 1 enable 128 0 (Empty) (Empty) 0 enable (Empty) Enable/disable sending of messages (logs, SNMP, RADIUS) directly from ha-mgmt interface. disable 543 system/ha-monitor CLI Syntax config system ha-monitor edit <name_str> set monitor-vlan {enable | disable} set vlan-hb-interval <integer> set vlan-hb-lost-threshold <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 544 Description Configuration Description Default Value monitor-vlan Enable/disable monitor VLAN interfaces. disable vlan-hb-interval Configure heartbeat interval (seconds). 5 vlan-hb-lost-threshold VLAN lost heartbeat threshold (1 - 60). 3 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 545 system/interface CLI Syntax config system interface edit <name_str> set name <string> set vdom <string> set cli-conn-status <integer> set mode {static | dhcp | pppoe} set distance <integer> set priority <integer> set dhcp-relay-service {disable | enable} set dhcp-relay-ip <user> set dhcp-relay-type {regular | ipsec} set ip <ipv4-classnet-host> set allowaccess {ping | https | ssh | snmp | http | telnet | fgfm | auto-ipsec | r adius-acct | probe-response | capwap} set gwdetect {enable | disable} set ping-serv-status <integer> set detectserver <user> set detectprotocol {ping | tcp-echo | udp-echo} set ha-priority <integer> set fail-detect {enable | disable} set fail-detect-option {detectserver | link-down} set fail-alert-method {link-failed-signal | link-down} set fail-action-on-extender {soft-restart | hard-restart | reboot} config fail-alert-interfaces edit <name_str> set name <string> end set dhcp-client-identifier <string> set ipunnumbered <ipv4-address> set username <string> set pppoe-unnumbered-negotiate {enable | disable} set password <password> set idle-timeout <integer> set detected-peer-mtu <integer> set disc-retry-timeout <integer> set padt-retry-timeout <integer> set service-name <string> set ac-name <string> set lcp-echo-interval <integer> set lcp-max-echo-fails <integer> set defaultgw {enable | disable} set dns-server-override {enable | disable} set auth-type {auto | pap | chap | mschapv1 | mschapv2} set pptp-client {enable | disable} set pptp-user <string> set pptp-password <password> set pptp-server-ip <ipv4-address> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 546 set pptp-auth-type {auto | pap | chap | mschapv1 | mschapv2} set pptp-timeout <integer> set arpforward {enable | disable} set ndiscforward {enable | disable} set broadcast-forward {enable | disable} set bfd {global | enable | disable} set bfd-desired-min-tx <integer> set bfd-detect-mult <integer> set bfd-required-min-rx <integer> set l2forward {enable | disable} set icmp-redirect {enable | disable} set vlanforward {enable | disable} set stpforward {enable | disable} set stpforward-mode {rpl-all-ext-id | rpl-bridge-ext-id | rpl-nothing} set ips-sniffer-mode {enable | disable} set ident-accept {enable | disable} set ipmac {enable | disable} set subst {enable | disable} set macaddr <mac-address> set substitute-dst-mac <mac-address> set speed {auto | 10full | 10half | 100full | 100half | 1000full | 1000half | 1000 auto | 10000full | 10000auto | 40000full} set status {up | down} set netbios-forward {disable | enable} set wins-ip <ipv4-address> set type {physical | vlan | aggregate | redundant | tunnel | vdom-link | loopback | switch | hard-switch | vap-switch | wl-mesh | fext-wan | hdlc | switch-vlan} set dedicated-to {none | management} set trust-ip-1 <ipv4-classnet-any> set trust-ip-2 <ipv4-classnet-any> set trust-ip-3 <ipv4-classnet-any> set trust-ip6-1 <ipv6-prefix> set trust-ip6-2 <ipv6-prefix> set trust-ip6-3 <ipv6-prefix> set mtu-override {enable | disable} set mtu <integer> set wccp {enable | disable} set netflow-sampler {disable | tx | rx | both} set sflow-sampler {enable | disable} set drop-overlapped-fragment {enable | disable} set drop-fragment {enable | disable} set scan-botnet-connections {disable | block | monitor} set sample-rate <integer> set polling-interval <integer> set sample-direction {tx | rx | both} set explicit-web-proxy {enable | disable} set explicit-ftp-proxy {enable | disable} set tcp-mss <integer> set mediatype {serdes-sfp | sgmii-sfp | serdes-copper-sfp} set fp-anomaly {pass_winnuke | pass_tcpland | pass_udpland | pass_icmpland | pass_ ipland | pass_iprr | pass_ipssrr | pass_iplsrr | pass_ipstream | pass_ipsecurity | pas s_iptimestamp | pass_ipunknown_option | pass_ipunknown_prot | pass_icmp_frag | pass_tc p_no_flag | pass_tcp_fin_noack | drop_winnuke | drop_tcpland | drop_udpland | drop_icm CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 547 p_no_flag | pass_tcp_fin_noack | drop_winnuke | drop_tcpland | drop_udpland | drop_icm pland | drop_ipland | drop_iprr | drop_ipssrr | drop_iplsrr | drop_ipstream | drop_ips ecurity | drop_iptimestamp | drop_ipunknown_option | drop_ipunknown_prot | drop_icmp_f rag | drop_tcp_no_flag | drop_tcp_fin_noack} set inbandwidth <integer> set outbandwidth <integer> set spillover-threshold <integer> set ingress-spillover-threshold <integer> set weight <integer> set interface <string> set external {enable | disable} set vlanid <integer> set forward-domain <integer> set remote-ip <ipv4-address-any> config member edit <name_str> set interface-name <string> end set lacp-mode {static | passive | active} set lacp-ha-slave {enable | disable} set lacp-speed {slow | fast} set min-links <integer> set min-links-down {operational | administrative} set algorithm {L2 | L3 | L4} set link-up-delay <integer> set priority-override {enable | disable} set aggregate <string> set redundant-interface <string> config managed-device edit <name_str> set name <string> end set devindex <integer> set vindex <integer> set switch <string> set description <var-string> set alias <string> set security-mode {none | captive-portal | 802.1X} set security-mac-auth-bypass {enable | disable} set security-external-web <string> set security-external-logout <string> set replacemsg-override-group <string> set security-redirect-url <string> set security-exempt-list <string> config security-groups edit <name_str> set name <string> end set device-identification {enable | disable} set device-user-identification {enable | disable} set device-identification-active-scan {enable | disable} set device-access-list <string> set device-netscan {disable | enable} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 548 set device-netscan {disable | enable} set lldp-transmission {enable | disable | vdom} set fortiheartbeat {enable | disable} set broadcast-forticlient-discovery {enable | disable} set endpoint-compliance {enable | disable} set estimated-upstream-bandwidth <integer> set estimated-downstream-bandwidth <integer> set vrrp-virtual-mac {enable | disable} config vrrp edit <name_str> set vrid <integer> set vrgrp <integer> set vrip <ipv4-address-any> set priority <integer> set adv-interval <integer> set start-time <integer> set preempt {enable | disable} set vrdst <ipv4-address-any> set status {enable | disable} end set role {lan | wan | dmz | undefined} set snmp-index <integer> set secondary-IP {enable | disable} config secondaryip edit <name_str> set id <integer> set ip <ipv4-classnet-host> set allowaccess {ping | https | ssh | snmp | http | telnet | fgfm | auto-ipsec | radius-acct | probe-response | capwap} set gwdetect {enable | disable} set ping-serv-status <integer> set detectserver <user> set detectprotocol {ping | tcp-echo | udp-echo} set ha-priority <integer> end set auto-auth-extension-device {enable | disable} set ap-discover {enable | disable} set fortilink {enable | disable} set fortilink-stacking {enable | disable} set fortilink-split-interface {enable | disable} set internal <integer> set fortilink-backup-link <integer> set color <integer> config ipv6 edit <name_str> set ip6-mode {static | dhcp | pppoe | delegated} set ip6-dns-server-override {enable | disable} set ip6-address <ipv6-prefix> config ip6-extra-addr edit <name_str> set prefix <ipv6-prefix> end set ip6-allowaccess {ping | https | ssh | snmp | http | telnet | fgfm | capwap CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 549 set ip6-allowaccess {ping | https | ssh | snmp | http | telnet | fgfm | capwap } set ip6-send-adv {enable | disable} set ip6-manage-flag {enable | disable} set ip6-other-flag {enable | disable} set ip6-max-interval <integer> set ip6-min-interval <integer> set ip6-link-mtu <integer> set ip6-reachable-time <integer> set ip6-retrans-time <integer> set ip6-default-life <integer> set ip6-hop-limit <integer> set autoconf {enable | disable} set ip6-upstream-interface <string> set ip6-subnet <ipv6-prefix> config ip6-prefix-list edit <name_str> set prefix <ipv6-network> set autonomous-flag {enable | disable} set onlink-flag {enable | disable} set valid-life-time <integer> set preferred-life-time <integer> end config ip6-delegated-prefix-list edit <name_str> set prefix-id <integer> set upstream-interface <string> set autonomous-flag {enable | disable} set onlink-flag {enable | disable} set subnet <ipv6-network> end set dhcp6-relay-service {disable | enable} set dhcp6-relay-type {regular} set dhcp6-relay-ip <user> set dhcp6-client-options {rapid | iapd | iana | dns | dnsname} set dhcp6-prefix-delegation {enable | disable} set dhcp6-prefix-hint <ipv6-network> set dhcp6-prefix-hint-plt <integer> set dhcp6-prefix-hint-vlt <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 550 Description Configuration Description Default Value name Name. (Empty) vdom Virtual domain name. (Empty) cli-conn-status CLI connection status. 0 mode Addressing mode (static, DHCP, PPPoE). static distance Distance of learned routes. 5 priority Priority of learned routes. 0 dhcp-relay-service Enable/disable use DHCP relay service. disable dhcp-relay-ip DHCP relay IP address. (Empty) dhcp-relay-type DHCP relay type. regular ip IP address of interface. 0.0.0.0 0.0.0.0 allowaccess Allow management access to the interface. (Empty) gwdetect Enable/disable detect gateway alive for first. disable ping-serv-status PING server status. 0 detectserver Gateway's ping server for this IP. (Empty) detectprotocol Protocols used to detect the server. ping ha-priority HA election priority for the PING server. 1 fail-detect Enable/disable interface failed option status. disable fail-detect-option Interface fail detect option. link-down fail-alert-method Interface fail alert. link-down fail-action-on-extender Action on extender when interface fail . soft-restart fail-alert-interfaces Physical interfaces that will be alerted. (Empty) dhcp-client-identifier DHCP client identifier. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 551 ipunnumbered PPPoE unnumbered IP. 0.0.0.0 username User name. (Empty) pppoe-unnumberednegotiate Enable/disable PPPoE unnumbered negotiation. enable password Password (Empty) idle-timeout PPPoE auto disconnect after idle timeout seconds. 0 detected-peer-mtu MTU of detected peer (0 - 4294967295). 0 disc-retry-timeout PPPoE discovery init timeout value in sec. 1 padt-retry-timeout PPPoE terminate timeout value in sec. 1 service-name PPPoE service name. (Empty) ac-name PPPoE AC name. (Empty) lcp-echo-interval PPPoE LCP echo interval (sec). 5 lcp-max-echo-fails Maximum missed LCP echo messages before disconnect. 3 defaultgw Enable/disable default gateway. enable dns-server-override Enable/disable use DNS acquired by DHCP or PPPoE. enable auth-type PPP authentication type to use. auto pptp-client Enable/disable PPTP client. disable pptp-user PPTP user name. (Empty) pptp-password PPTP password. (Empty) pptp-server-ip PPTP server IP address. 0.0.0.0 pptp-auth-type PPTP authentication type. auto pptp-timeout Idle timer in minutes (0 for disabled). 0 arpforward Enable/disable ARP forwarding. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 552 ndiscforward Enable/disable NDISC forwarding. enable broadcast-forward Enable/disable broadcast forwarding. disable bfd Bidirectional Forwarding Detection (BFD). global bfd-desired-min-tx BFD desired minimal transmit interval. 250 bfd-detect-mult BFD detection multiplier. 3 bfd-required-min-rx BFD required minimal receive interval. 250 l2forward Enable/disable l2 forwarding. disable icmp-redirect Enable/disable ICMP redirect. enable vlanforward Enable/disable VLAN forwarding. disable stpforward Enable/disable STP forwarding. disable stpforward-mode Configure STP forwarding mode. rpl-all-ext-id ips-sniffer-mode Enable/disable IPS sniffer mode. disable ident-accept Enable/disable accept ident protocol. disable ipmac Enable/disable IP/MAC binding status. disable subst Enable/disable substitute MAC. disable macaddr MAC address. 00:00:00:00:00:00 substitute-dst-mac Substitute destination MAC address. 00:00:00:00:00:00 speed Speed auto status Interface status. up netbios-forward Enable/disable NETBIOS forwarding. disable wins-ip WINS server IP. 0.0.0.0 type Interface type. vlan dedicated-to Configure interface for single purpose. none trust-ip-1 Trusted host for dedicated management traffic (0.0.0.0/24 for all hosts). 0.0.0.0 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 553 trust-ip-2 Trusted host for dedicated management traffic (0.0.0.0/24 for all hosts). 0.0.0.0 0.0.0.0 trust-ip-3 Trusted host for dedicated management traffic (0.0.0.0/24 for all hosts). 0.0.0.0 0.0.0.0 trust-ip6-1 Trusted IPv6 host for dedicated management traffic (::/0 for all hosts). ::/0 trust-ip6-2 Trusted IPv6 host for dedicated management traffic (::/0 for all hosts). ::/0 trust-ip6-3 Trusted IPv6 host for dedicated management traffic (::/0 for all hosts). ::/0 mtu-override Enable/disable use custom MTU. disable mtu Maximum transportation unit. 1500 wccp Enable/disable WCCP protocol on this interface. disable netflow-sampler NetFlow measurement status. disable sflow-sampler Enable/disable sFlow protocol. disable drop-overlappedfragment Enable/disable drop overlapped fragment packets. disable drop-fragment Enable/disable drop fragment packets. disable scan-botnetconnections Enable/disable scanning of connections to Botnet servers. disable sample-rate sFlow sampler sample rate. 2000 polling-interval sFlow sampler counter polling interval. 20 sample-direction sFlow sample direction. both explicit-web-proxy Enable/disable explicit Web proxy. disable explicit-ftp-proxy Enable/disable explicit FTP proxy. disable tcp-mss Maximum sending TCP packet size. 0 mediatype Select SFP media interface type serdes-sfp CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 554 fp-anomaly Pass or drop different types of anomalies using Fastpath (Empty) inbandwidth Bandwidth limit for incoming traffic (0 - 16776000 kbps). 0 outbandwidth Bandwidth limit for outgoing traffic (0 - 16776000 kbps). 0 spillover-threshold Egress Spillover threshold (0 - 16776000 kbps). 0 ingress-spilloverthreshold Ingress Spillover threshold (0 - 16776000 kbps). 0 weight Default weight for static routes (if route has no weight configured). 0 interface Interface name. (Empty) external Enable/disable identifying interface as connected to external side. disable vlanid VLAN ID. 0 forward-domain TP mode forward domain. 0 remote-ip Remote IP address of tunnel. 0.0.0.0 member Physical interfaces that belong to the aggregate/redundant interface. (Empty) lacp-mode LACP mode. active lacp-ha-slave LACP HA slave. enable lacp-speed LACP speed. slow min-links Minimum number of aggregated ports that must be up. 1 min-links-down Action to take when there are less than min-links active members. operational algorithm Frame distribution algorithm. L4 link-up-delay Number of milliseconds to wait before considering a link is up. 50 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 555 priority-override Enable/disable fail back to higher priority port once recovered. enable aggregate Aggregate interface. (Empty) redundant-interface Redundant interface. (Empty) managed-device FortiLink interface managed device. (Empty) devindex Device Index. 0 vindex Switch control interface VLAN ID. 0 switch Contained in switch. (Empty) description Description. (Empty) alias Alias. (Empty) security-mode Security mode. none security-mac-authbypass Enable/disable MAC authentication bypass. disable security-external-web URL of external authentication web server. (Empty) security-external-logout URL of external authentication logout server. (Empty) replacemsg-overridegroup Specify replacement message override group. (Empty) security-redirect-url URL redirection after disclaimer/authentication. (Empty) security-exempt-list Name of security-exempt-list. (Empty) security-groups Group name. (Empty) device-identification Enable/disable passive gathering of identity information about source hosts on this interface. disable device-useridentification Enable/disable passive gathering of user identity information about source hosts on this interface. enable device-identificationactive-scan Enable/disable active gathering of identity information about source hosts on this interface. enable device-access-list Device access list. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 556 device-netscan Enable/disable inclusion of devices detected on this interface in network vulnerability scans. lldp-transmission Enable/disable Link Layer Discovery Protocol (LLDP) transmission. vdom fortiheartbeat Enable/disable FortiHeartBeat (FortiTelemetry on GUI). disable broadcast-forticlientdiscovery Enable/disable broadcast FortiClient discovery messages. disable endpoint-compliance Enable/disable endpoint compliance enforcement. disable estimated-upstreambandwidth Estimated maximum upstream bandwidth (kbps). Used to estimate link utilization. 0 estimated-downstreambandwidth Estimated maximum downstream bandwidth (kbps). Used to estimate link utilization. 0 vrrp-virtual-mac Enable/disable use of virtual MAC for VRRP. disable vrrp VRRP configuration. (Empty) role Interface role. undefined snmp-index Permanent SNMP Index of the interface. 0 secondary-IP Enable/disable secondary IP. disable secondaryip Second IP address of interface. (Empty) auto-auth-extensiondevice Enable/disable automatic authorization of dedicated Fortinet extension device on this interface. disable ap-discover Enable/disable automatic registration of unknown FortiAP devices. enable fortilink Enable/disable FortiLink to dedicated interface for managing FortiSwitch devices. disable fortilink-stacking Enable/disable FortiLink switch-stacking on this interface. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 557 fortilink-split-interface Enable/disable FortiLink split interface to connect member link to different FortiSwitch in stack for uplink redundancy (maximum 2 interfaces in the "members" command). disable internal Implicitly created. 0 fortilink-backup-link fortilink split interface backup link. 0 color GUI icon color. 0 ipv6 IPv6 of interface. Details below Configuration ip6-mode ip6-dns-server-override ip6-address ip6-extra-addr ip6-allowaccess ip6-send-adv ip6-manage-flag ip6-other-flag ip6-max-interval ip6-min-interval ip6-link-mtu ip6-reachable-time ip6-retrans-time ip6-default-life ip6-hop-limit autoconf ip6-upstream-interface ip6-subnet ip6-prefix-list ip6-delegated-prefix-list dhcp6-relay-service dhcp6-relay-type dhcp6-relay-ip dhcp6-client-options dhcp6-prefix-delegation dhcp6-prefix-hint dhcp6-prefix-hint-plt dhcp6-prefix-hint-vlt CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Default Value static enable ::/0 (Empty) (Empty) disable disable disable 600 198 0 0 0 1800 0 disable (Empty) ::/0 (Empty) (Empty) disable regular (Empty) dns disable ::/0 604800 2592000 558 system/ipip-tunnel CLI Syntax config system ipip-tunnel edit <name_str> set name <string> set interface <string> set remote-gw <ipv4-address> set local-gw <ipv4-address-any> set auto-asic-offload {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 559 Description Configuration Description Default Value name IPIP Tunnel name. (Empty) interface Interface name. (Empty) remote-gw IP address of the remote gateway. 0.0.0.0 local-gw Enable/disable IP address of the local gateway. 0.0.0.0 auto-asic-offload Enable/disable tunnel ASIC offloading. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 560 system/ips-urlfilter-dns CLI Syntax config system ips-urlfilter-dns edit <name_str> set address <ipv4-address> set status {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 561 Description Configuration Description Default Value address DNS server IP address. 0.0.0.0 status Enable/disable this server for queries. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 562 system/ipv6-neighbor-cache CLI Syntax config system ipv6-neighbor-cache edit <name_str> set id <integer> set interface <string> set ipv6 <ipv6-address> set mac <mac-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 563 Description Configuration Description Default Value id Unique integer ID of the entry. 0 interface Interface name. (Empty) ipv6 IPv6 address. :: mac MAC address. 00:00:00:00:00:00 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 564 system/ipv6-tunnel CLI Syntax config system ipv6-tunnel edit <name_str> set name <string> set source <ipv6-address> set destination <ipv6-address> set interface <string> set auto-asic-offload {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 565 Description Configuration Description Default Value name Tunnel name. (Empty) source Local IPv6 address of tunnel. :: destination Remote IPv6 address of tunnel. :: interface Interface name. (Empty) auto-asic-offload Enable/disable tunnel ASIC offloading. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 566 system/link-monitor CLI Syntax config system link-monitor edit <name_str> set name <string> set srcintf <string> config server edit <name_str> set address <string> end set protocol {ping | tcp-echo | udp-echo | http | twamp} set port <integer> set gateway-ip <ipv4-address-any> set source-ip <ipv4-address-any> set http-get <string> set http-match <string> set interval <integer> set timeout <integer> set failtime <integer> set recoverytime <integer> set security-mode {none | authentication} set password <password> set packet-size <integer> set ha-priority <integer> set update-cascade-interface {enable | disable} set update-static-route {enable | disable} set status {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 567 Description Configuration Description Default Value name Link monitor name. (Empty) srcintf Interface where the monitor traffic is sent. (Empty) server Server address(es). (Empty) protocol Protocols used to detect the server. ping port Port number to poll. 80 gateway-ip Gateway IP used to PING the server. 0.0.0.0 source-ip Source IP used in packet to the server. 0.0.0.0 http-get HTTP GET URL string. / http-match Response value from detected server in http-get. (Empty) interval Detection interval. 5 timeout Detect request timeout. 1 failtime Number of retry attempts before bringing server down. 5 recoverytime Number of retry attempts before bringing server up. 5 security-mode Twamp controller security mode. none password Twamp controller password in authentication mode (Empty) packet-size Packet size of a twamp test session, 64 ha-priority HA election priority (1 - 50). 1 update-cascadeinterface Enable/disable update cascade interface. enable update-static-route Enable/disable update static route. enable status Enable/disable Link monitor administrative status. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 568 system/mac-address-table CLI Syntax config system mac-address-table edit <name_str> set mac <mac-address> set interface <string> set reply-substitute <mac-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 569 Description Configuration Description Default Value mac MAC address. 00:00:00:00:00:00 interface Interface name. (Empty) reply-substitute New MAC for reply traffic. 00:00:00:00:00:00 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 570 system/management-tunnel CLI Syntax config system management-tunnel edit <name_str> set status {enable | disable} set allow-config-restore {enable | disable} set allow-push-configuration {enable | disable} set allow-push-firmware {enable | disable} set allow-collect-statistics {enable | disable} set authorized-manager-only {enable | disable} set serial-number <user> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 571 Description Configuration Description Default Value status Enable/disable FGFM tunnel. enable allow-config-restore Enable/disable allow config restore. enable allow-pushconfiguration Enable/disable push configuration. enable allow-push-firmware Enable/disable push firmware. enable allow-collect-statistics Enable/disable collection of run time statistics. enable authorized-manageronly Enable/disable restriction of authorized manager only. enable serial-number Serial number. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 572 system/mobile-tunnel CLI Syntax config system mobile-tunnel edit <name_str> set name <string> set status {disable | enable} set roaming-interface <string> set home-agent <ipv4-address> set home-address <ipv4-address> set renew-interval <integer> set lifetime <integer> set reg-interval <integer> set reg-retry <integer> set n-mhae-spi <integer> set n-mhae-key-type {ascii | base64} set n-mhae-key <user> set hash-algorithm {hmac-md5} set tunnel-mode {gre} config network edit <name_str> set id <integer> set interface <string> set prefix <ipv4-classnet> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 573 Description Configuration Description Default Value name Tunnel name. (Empty) status Enable/disable this mobile tunnel. enable roaming-interface Roaming interface name. (Empty) home-agent IP address of the NEMO HA. 0.0.0.0 home-address Home IP address. 0.0.0.0 renew-interval Time before lifetime expiraton to send NMMO HA re-registration. 60 lifetime NMMO HA registration request lifetime. 65535 reg-interval NMMO HA registration interval. 5 reg-retry NMMO HA registration maximal retries. 3 n-mhae-spi NEMO authentication spi. 256 n-mhae-key-type NEMO authentication key type. ascii n-mhae-key NEMO authentication key. 'ENC AQAAAMfMADGjaE1u XnMNcglZAOU1olJLaQ Tpy1cUY+iM/eyN61pZ cd9q4u4lzUZ7Ar7ptVw gtfiB3PJBXT+jqecFU7F l7T9EREz21rRkr3XeQ A6OfVhpJuk3/ZQ=' hash-algorithm Hash Algorithm. hmac-md5 tunnel-mode NEMO tunnnel mode. gre network NEMO network configuration. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 574 system/nat64 CLI Syntax config system nat64 edit <name_str> set status {enable | disable} set nat64-prefix <ipv6-prefix> set always-synthesize-aaaa-record {enable | disable} set generate-ipv6-fragment-header {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 575 Description Configuration Description Default Value status Enable/disable NAT64. disable nat64-prefix NAT64 prefix must be ::/96. 64:ff9b::/96 always-synthesizeaaaa-record Enable/disable AAAA record synthesis. enable generate-ipv6fragment-header Enable/disable IPv6 fragment header generation. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 576 system/netflow CLI Syntax config system netflow edit <name_str> set collector-ip <ipv4-address> set collector-port <integer> set source-ip <ipv4-address> set active-flow-timeout <integer> set inactive-flow-timeout <integer> set template-tx-timeout <integer> set template-tx-counter <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 577 Description Configuration Description Default Value collector-ip Collector IP. 0.0.0.0 collector-port NetFlow collector port. 2055 source-ip Source IP for NetFlow agent. 0.0.0.0 active-flow-timeout Timeout to report active flows (min). 30 inactive-flow-timeout Timeout for periodic report of finished flows (sec). 15 template-tx-timeout Timeout for periodic template flowset transmission (min). 30 template-tx-counter Counter of flowset records before resending a template flowset record. 20 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 578 system/network-visibility CLI Syntax config system network-visibility edit <name_str> set destination-visibility {disable | enable} set source-location {disable | enable} set destination-hostname-visibility {disable | enable} set hostname-ttl <integer> set hostname-limit <integer> set destination-location {disable | enable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 579 Description Configuration Description Default Value destination-visibility Enable/disable logging of destination visibility. enable source-location Enable/disable logging of source geographical location visibility. enable destination-hostnamevisibility Enable/disable logging of destination hostname visibility. enable hostname-ttl TTL of hostname table entries. 86400 hostname-limit Limit of hostname table entries. 5000 destination-location Enable/disable logging of destination geographical location visibility. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 580 system/ntp CLI Syntax config system ntp edit <name_str> set ntpsync {enable | disable} set type {fortiguard | custom} set syncinterval <integer> config ntpserver edit <name_str> set id <integer> set server <string> set ntpv3 {enable | disable} set authentication {enable | disable} set key <password> set key-id <integer> end set source-ip <ipv4-address> set server-mode {enable | disable} config interface edit <name_str> set interface-name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 581 Description Configuration Description Default Value ntpsync Enable/disable synchronization with NTP Server. disable type FortiGuard or custom NTP Server. fortiguard syncinterval NTP synchronization interval. 1 ntpserver NTP Server. (Empty) source-ip Source IP for communications to NTP server. 0.0.0.0 server-mode Enable/disable NTP Server Mode. disable interface List of interfaces with NTP server mode enabled. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 582 system/object-tag CLI Syntax config system object-tag edit <name_str> set name <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 583 Description Configuration Description Default Value name Tag name. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 584 system/password-policy CLI Syntax config system password-policy edit <name_str> set status {enable | disable} set apply-to {admin-password | ipsec-preshared-key} set minimum-length <integer> set min-lower-case-letter <integer> set min-upper-case-letter <integer> set min-non-alphanumeric <integer> set min-number <integer> set change-4-characters {enable | disable} set expire-status {enable | disable} set expire-day <integer> set reuse-password {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 585 Description Configuration Description Default Value status Enable/disable password policy. disable apply-to Apply password policy to. admin-password minimum-length Minimum password length. 8 min-lower-case-letter Minimum number of lowercase characters in password. 0 min-upper-case-letter Minimum number of uppercase characters in password. 0 min-non-alphanumeric Minimum number of non-alphanumeric characters in password. 0 min-number Minimum number of numeric characters in password. 0 change-4-characters Enable/disable changing at least 4 characters for new password. disable expire-status Enable/disable password expiration. disable expire-day Number of days after which admin users' password will expire. 90 reuse-password Enable/disable reuse of password. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 586 system/probe-response CLI Syntax config system probe-response edit <name_str> set port <integer> set http-probe-value <string> set ttl-mode {reinit | decrease | retain} set mode {none | http-probe | twamp} set security-mode {none | authentication} set password <password> set timeout <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 587 Description Configuration Description Default Value port Port number to response. 8008 http-probe-value Value to respond to the monitoring server. OK ttl-mode Mode for TWAMP packet TTL modification. retain mode SLA response mode. none security-mode Twamp respondor security mode. none password Twamp respondor password in authentication mode (Empty) timeout An inactivity timer for a twamp test session. 300 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 588 system/proxy-arp CLI Syntax config system proxy-arp edit <name_str> set id <integer> set interface <string> set ip <ipv4-address> set end-ip <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 589 Description Configuration Description Default Value id Unique integer ID of the entry. 0 interface Interface acting proxy-ARP. (Empty) ip IP address or start IP to be proxied. 0.0.0.0 end-ip End IP of IP range to be proxied. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 590 system/replacemsg-group CLI Syntax config system replacemsg-group edit <name_str> set name <string> set comment <var-string> set group-type {default | utm config mail edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | set format {none | text | end config http edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | set format {none | text | end config webproxy edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | set format {none | text | end config ftp edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | set format {none | text | end config nntp edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | set format {none | text | end config fortiguard-wf edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | set format {none | text | end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. | auth | ec} 8bit} html | wml} 8bit} html | wml} 8bit} html | wml} 8bit} html | wml} 8bit} html | wml} 8bit} html | wml} 591 config spam edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | end config alertmail edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | end config admin edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | end config auth edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | end config sslvpn edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | end config ec edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | end config device-detection-portal edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http | 8bit} set format {none | text | html | end config nac-quar edit <name_str> set msg-type <string> set buffer <var-string> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. wml} wml} wml} wml} wml} wml} wml} 592 set buffer <var-string> set header {none | http set format {none | text end config traffic-quota edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http set format {none | text end config utm edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http set format {none | text end config custom-message edit <name_str> set msg-type <string> set buffer <var-string> set header {none | http set format {none | text end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. | 8bit} | html | wml} | 8bit} | html | wml} | 8bit} | html | wml} | 8bit} | html | wml} 593 Description Configuration Description Default Value name Group name. (Empty) comment Comment. (Empty) group-type Group type. default mail Replacement message table entries. (Empty) http Replacement message table entries. (Empty) webproxy Replacement message table entries. (Empty) ftp Replacement message table entries. (Empty) nntp Replacement message table entries. (Empty) fortiguard-wf Replacement message table entries. (Empty) spam Replacement message table entries. (Empty) alertmail Replacement message table entries. (Empty) admin Replacement message table entries. (Empty) auth Replacement message table entries. (Empty) sslvpn Replacement message table entries. (Empty) ec Replacement message table entries. (Empty) device-detection-portal Replacement message table entries. (Empty) nac-quar Replacement message table entries. (Empty) traffic-quota Replacement message table entries. (Empty) utm Replacement message table entries. (Empty) custom-message Replacement message table entries. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 594 system/replacemsg-image CLI Syntax config system replacemsg-image edit <name_str> set name <string> set image-type {gif | jpg | tiff | png} set image-base64 <var-string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 595 Description Configuration Description Default Value name Image name. (Empty) image-type Image type. (Empty) image-base64 Image data. (null) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 596 system/resource-limits CLI Syntax config system resource-limits edit <name_str> set session <integer> set ipsec-phase1 <integer> set ipsec-phase2 <integer> set dialup-tunnel <integer> set firewall-policy <integer> set firewall-address <integer> set firewall-addrgrp <integer> set custom-service <integer> set service-group <integer> set onetime-schedule <integer> set recurring-schedule <integer> set user <integer> set user-group <integer> set sslvpn <integer> set proxy <integer> set log-disk-quota <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 597 Description Configuration Description Default Value session Maximum number of sessions. 0 ipsec-phase1 Maximum number of VPN IPsec phase1 tunnels. 0 ipsec-phase2 Maximum number of VPN IPsec phase2 tunnels. 0 dialup-tunnel Maximum number of dial-up tunnels. 0 firewall-policy Maximum number of firewall policies. 0 firewall-address Maximum number of firewall addresses. 0 firewall-addrgrp Maximum number of firewall address groups. 0 custom-service Maximum number of firewall custom services. 0 service-group Maximum number of firewall service groups. 0 onetime-schedule Maximum number of firewall one-time schedules. 0 recurring-schedule Maximum number of firewall recurring schedules. 0 user Maximum number of local users. 0 user-group Maximum number of user groups. 0 sslvpn Maximum number of SSL-VPN. 0 proxy Maximum number of concurrent explicit proxy users. 0 log-disk-quota Log disk quota in MB. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 598 system/session-helper CLI Syntax config system session-helper edit <name_str> set id <integer> set name {ftp | tftp | ras | h323 | h245O | h245I | tns | mms | sip | pptp | rtsp | dns-udp | dns-tcp | pmap | rsh | dcerpc | mgcp | gtp-c | gtp-u | gtp-b} set protocol <integer> set port <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 599 Description Configuration Description Default Value id Session helper ID. 0 name Helper name. (Empty) protocol Protocol number. 0 port Protocol port. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 600 system/session-ttl CLI Syntax config system session-ttl edit <name_str> set default <user> config port edit <name_str> set id <integer> set protocol <integer> set start-port <integer> set end-port <integer> set timeout <user> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 601 Description Configuration Description Default Value default Default timeout. 3600 port Session TTL port. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 602 system/settings CLI Syntax config system settings edit <name_str> set comments <var-string> set opmode {nat | transparent} set inspection-mode {proxy | flow} set http-external-dest {fortiweb | forticache} set firewall-session-dirty {check-all | check-new | check-policy-option} set manageip <user> set gateway <ipv4-address> set ip <ipv4-classnet-host> set manageip6 <ipv6-prefix> set gateway6 <ipv6-address> set ip6 <ipv6-prefix> set device <string> set bfd {enable | disable} set bfd-desired-min-tx <integer> set bfd-required-min-rx <integer> set bfd-detect-mult <integer> set bfd-dont-enforce-src-port {enable | disable} set utf8-spam-tagging {enable | disable} set wccp-cache-engine {enable | disable} set vpn-stats-log {ipsec | pptp | l2tp | ssl} set vpn-stats-period <integer> set v4-ecmp-mode {source-ip-based | weight-based | usage-based | source-dest-ip-ba sed} set mac-ttl <integer> set fw-session-hairpin {enable | disable} set snat-hairpin-traffic {enable | disable} set dhcp-proxy {enable | disable} set dhcp-server-ip <user> set dhcp6-server-ip <user> set central-nat {enable | disable} config gui-default-policy-columns edit <name_str> set name <string> end set lldp-transmission {enable | disable | global} set asymroute {enable | disable} set asymroute-icmp {enable | disable} set tcp-session-without-syn {enable | disable} set ses-denied-traffic {enable | disable} set strict-src-check {enable | disable} set asymroute6 {enable | disable} set asymroute6-icmp {enable | disable} set sip-helper {enable | disable} set sip-nat-trace {enable | disable} set status {enable | disable} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 603 set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set sip-tcp-port <integer> sip-udp-port <integer> sip-ssl-port <integer> sccp-port <integer> multicast-forward {enable | disable} multicast-ttl-notchange {enable | disable} multicast-skip-policy {enable | disable} allow-subnet-overlap {enable | disable} deny-tcp-with-icmp {enable | disable} ecmp-max-paths <integer> discovered-device-timeout <integer> email-portal-check-dns {disable | enable} default-voip-alg-mode {proxy-based | kernel-helper-based} gui-icap {enable | disable} gui-nat46-64 {enable | disable} gui-implicit-policy {enable | disable} gui-dns-database {enable | disable} gui-load-balance {enable | disable} gui-multicast-policy {enable | disable} gui-dos-policy {enable | disable} gui-object-colors {enable | disable} gui-replacement-message-groups {enable | disable} gui-voip-profile {enable | disable} gui-ap-profile {enable | disable} gui-dynamic-profile-display {enable | disable} gui-ipsec-manual-key {enable | disable} gui-local-in-policy {enable | disable} gui-local-reports {enable | disable} gui-wanopt-cache {enable | disable} gui-explicit-proxy {enable | disable} gui-dynamic-routing {enable | disable} gui-dlp {enable | disable} gui-sslvpn-personal-bookmarks {enable | disable} gui-sslvpn-realms {enable | disable} gui-policy-based-ipsec {enable | disable} gui-threat-weight {enable | disable} gui-multiple-utm-profiles {enable | disable} gui-spamfilter {enable | disable} gui-application-control {enable | disable} gui-casi {enable | disable} gui-ips {enable | disable} gui-endpoint-control {enable | disable} gui-endpoint-on-net {enable | disable} gui-dhcp-advanced {enable | disable} gui-vpn {enable | disable} gui-wireless-controller {enable | disable} gui-switch-controller {enable | disable} gui-fortiap-split-tunneling {enable | disable} gui-webfilter-advanced {enable | disable} gui-traffic-shaping {enable | disable} gui-wan-load-balancing {enable | disable} gui-antivirus {enable | disable} gui-webfilter {enable | disable} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 604 set set set set set set set set set set set set set end gui-webfilter {enable | disable} gui-dnsfilter {enable | disable} gui-waf-profile {enable | disable} gui-fortiextender-controller {enable | disable} gui-advanced-policy {enable | disable} gui-allow-unnamed-policy {enable | disable} gui-email-collection {enable | disable} gui-domain-ip-reputation {enable | disable} gui-multiple-interface-policy {enable | disable} gui-policy-learning {enable | disable} compliance-check {enable | disable} ike-session-resume {enable | disable} ike-quick-crash-detect {enable | disable} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 605 Description Configuration Description Default Value comments VDOM comments. (Empty) opmode Firewall operation mode. nat inspection-mode Inspection mode. proxy http-external-dest HTTP service external inspection destination. fortiweb firewall-session-dirty Packet session management. check-all manageip IP address and netmask. (Empty) gateway Default gateway IP address. 0.0.0.0 ip IP address and netmask. 0.0.0.0 0.0.0.0 manageip6 Management IPv6 address prefix for transparent mode. ::/0 gateway6 Default gateway IPv6 address. :: ip6 IPv6 address prefix for NAT mode. ::/0 device Interface. (Empty) bfd Enable/disable Bi-directional Forwarding Detection (BFD) on all interfaces. disable bfd-desired-min-tx BFD desired minimal transmit interval. 250 bfd-required-min-rx BFD required minimal receive interval. 250 bfd-detect-mult BFD detection multiplier. 3 bfd-dont-enforce-srcport Enable/disable verify source port of BFD Packets. disable utf8-spam-tagging Convert spam tags to UTF-8 for better non-ASCII character support. enable wccp-cache-engine Enable/disable WCCP cache engine. disable vpn-stats-log Enable/disable periodic VPN log statistics. ipsec pptp l2tp ssl CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 606 vpn-stats-period Period to send VPN log statistics (sec). 600 v4-ecmp-mode IPv4 ECMP mode. source-ip-based mac-ttl Bridge MAC address expiration time (sec). 300 fw-session-hairpin Check every cross. disable snat-hairpin-traffic Enable/disable SNAT hairpin traffic. enable dhcp-proxy Enable/disable DHCP Proxy. disable dhcp-server-ip DHCP Server IP address. (Empty) dhcp6-server-ip DHCPv6 server IP address. (Empty) central-nat Enable/disable central NAT. disable gui-default-policycolumns Default columns to display for firewall policy list on GUI. (Empty) lldp-transmission Enable/disable Link Layer Discovery Protocol (LLDP) transmission. global asymroute Enable/disable asymmetric route. disable asymroute-icmp Enable/disable asymmetric ICMP route. disable tcp-session-without-syn Enable/disable creation of TCP session without SYN flag. disable ses-denied-traffic Enable/disable insertion of denied traffic into session table. disable strict-src-check Enable/disable strict source verification. disable asymroute6 Enable/disable asymmetric IPv6 route. disable asymroute6-icmp Enable/disable asymmetric ICMPv6 route. disable sip-helper Enable/disable helper to add dynamic SIP firewall allow rule. enable sip-nat-trace Enable/disable adding original IP if NATed. enable status Enable/disable this VDOM. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 607 sip-tcp-port TCP port the SIP proxy will monitor for SIP traffic. 5060 sip-udp-port UDP port the SIP proxy will monitor for SIP traffic. 5060 sip-ssl-port TCP SSL port the SIP proxy will monitor for SIP traffic. 5061 sccp-port TCP port the SCCP proxy will monitor for SCCP traffic. 2000 multicast-forward Enable/disable multicast forwarding. enable multicast-ttl-notchange Enable/disable modification of multicast TTL. disable multicast-skip-policy Enable/disable skip policy check and allow multicast through. disable allow-subnet-overlap Enable/disable allow one interface subnet overlap with other interfaces. disable deny-tcp-with-icmp Enable/disable deny TCP with ICMP. disable ecmp-max-paths Maximum number of ECMP next-hops. 10 discovered-devicetimeout Discard discovered devices after N days of inactivity. 28 email-portal-check-dns Enable/disable DNS to validate domain names used in the email address collection captive portal. enable default-voip-alg-mode Default ALG mode for VoIP traffic (when no VoIP profile on firewall policy). proxy-based gui-icap Enable/disable ICAP settings in GUI. disable gui-nat46-64 Enable/disable NAT46 and NAT64 settings in GUI. disable gui-implicit-policy Enable/disable implicit firewall policies in GUI. enable gui-dns-database Enable/disable DNS database in GUI. disable gui-load-balance Enable/disable load balance in GUI. disable gui-multicast-policy Enable/disable multicast firewall policies in GUI. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 608 gui-dos-policy Enable/disable DoS policy display in GUI. enable gui-object-colors Enable/disable object colors in GUI. enable gui-replacementmessage-groups Enable/disable replacement message groups in GUI. disable gui-voip-profile Enable/disable VoIP profiles in GUI. disable gui-ap-profile Enable/disable AP profiles in GUI. enable gui-dynamic-profiledisplay Enable/disable dynamic profiles in GUI. disable gui-ipsec-manual-key Enable/disable IPsec manual Key configuration in GUI. disable gui-local-in-policy Enable/disable Local-In policies in GUI. disable gui-local-reports Enable/disable local reports in the GUI. disable gui-wanopt-cache Enable/disable WAN Opt & Cache configuration in GUI. disable gui-explicit-proxy Enable/disable explicit proxy configuration in GUI. disable gui-dynamic-routing Enable/disable dynamic routing menus in GUI. enable gui-dlp Enable/disable DLP settings in GUI. disable gui-sslvpn-personalbookmarks Enable/disable SSL-VPN personal bookmark management in GUI. disable gui-sslvpn-realms Enable/disable SSL-VPN custom login pages in GUI. disable gui-policy-based-ipsec Enable/disable policy-based IPsec VPN. disable gui-threat-weight Enable/disable threat weight feature in GUI. enable gui-multiple-utmprofiles Enable/disable multiple UTM profiles in GUI. enable gui-spamfilter Enable/disable spamfilter profiles in GUI. disable gui-application-control Enable/disable application control profiles in GUI. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 609 gui-casi Enable/disable CASI profiles in GUI. enable gui-ips Enable/disable IPS sensors in GUI. enable gui-endpoint-control Enable/disable endpoint control in GUI. enable gui-endpoint-on-net Enable/disable endpoint on-net/off-net options in GUI. disable gui-dhcp-advanced Enable/disable advanced DHCP configuration in GUI. enable gui-vpn Enable/disable VPN tunnels in GUI. enable gui-wireless-controller Enable/disable wireless controller in GUI. enable gui-switch-controller Enable/disable switch controller in GUI. enable gui-fortiap-splittunneling Enable/disable FortiAP split tunneling in GUI. disable gui-webfilter-advanced Enable/disable advanced web filter configuration in GUI. disable gui-traffic-shaping Enable/disable traffic shaping in GUI. enable gui-wan-load-balancing Enable/disable WAN link load balancing in GUI. enable gui-antivirus Enable/disable AntiVirus profile display in GUI. enable gui-webfilter Enable/disable WebFilter profile display in GUI. enable gui-dnsfilter Enable/disable DNS Filter profile display in GUI. enable gui-waf-profile Enable/disable Web Application Firewall Profile display in GUI. disable gui-fortiextendercontroller Enable/disable FortiExtender controller in GUI. disable gui-advanced-policy Enable/disable advanced policy configuration in GUI. disable gui-allow-unnamedpolicy Enable/disable relaxation of requirement for policy to have a name when created in GUI. disable gui-email-collection Enable/disable email collection feature. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 610 gui-domain-ipreputation Enable/disable Domain and IP Reputation feature. disable gui-multiple-interfacepolicy Enable/disable the ability to configure multiple interfaces in a policy in the GUI. disable gui-policy-learning Enable/disable learning mode for firewall policies in the GUI. enable compliance-check Enable/disable PCI DSS compliance check. disable ike-session-resume Enable/disable IKEv2 session resumption (RFC 5723). disable ike-quick-crash-detect Enable/disable IKE quick crash detection (RFC 6290). disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 611 system/sflow CLI Syntax config system sflow edit <name_str> set collector-ip <ipv4-address> set collector-port <integer> set source-ip <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 612 Description Configuration Description Default Value collector-ip Collector IP. 0.0.0.0 collector-port sFlow collector port. 6343 source-ip Source IP for sFlow agent. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 613 system/sit-tunnel CLI Syntax config system sit-tunnel edit <name_str> set name <string> set source <ipv4-address> set destination <ipv4-address> set ip6 <ipv6-prefix> set interface <string> set auto-asic-offload {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 614 Description Configuration Description Default Value name Tunnel name. (Empty) source Source IP address of tunnel. 0.0.0.0 destination Destination IP address of tunnel. 0.0.0.0 ip6 IPv6 address of tunnel. ::/0 interface Interface name. (Empty) auto-asic-offload Enable/disable tunnel ASIC offloading. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 615 system/sms-server CLI Syntax config system sms-server edit <name_str> set name <string> set mail-server <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 616 Description Configuration Description Default Value name Name of SMS server. (Empty) mail-server Email-to-SMS server domain name. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 617 system/storage CLI Syntax config system storage edit <name_str> set name <string> set partition <string> set media-type <string> set device <string> set size <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 618 Description Configuration Description Default Value name Storage name. default_n partition Label of underlying partition. <unknown> media-type Media of underlying disk. ? device Partition device. ? size Partition size. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 619 system/switch-interface CLI Syntax config system switch-interface edit <name_str> set name <string> set vdom <string> set span-dest-port <string> config span-source-port edit <name_str> set interface-name <string> end config member edit <name_str> set interface-name <string> end set type {switch | hub} set intra-switch-policy {implicit | explicit} set span {disable | enable} set span-direction {rx | tx | both} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 620 Description Configuration Description Default Value name Interface name. (Empty) vdom VDOM. (Empty) span-dest-port Span destination port. (Empty) span-source-port Span source ports. (Empty) member Interfaces compose the virtual switch. (Empty) type Type. switch intra-switch-policy Enable/disable policies between the members of the switch interface. implicit span Enable/disable span port. disable span-direction SPAN direction. both CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 621 system/tos-based-priority CLI Syntax config system tos-based-priority edit <name_str> set id <integer> set tos <integer> set priority {low | medium | high} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 622 Description Configuration Description Default Value id Item ID. 0 tos IP ToS value (0 - 15). 0 priority ToS based priority level. high CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 623 system/vdom CLI Syntax config system vdom edit <name_str> set name <string> set vcluster-id <integer> set temporary <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 624 Description Configuration Description Default Value name VDOM name. (Empty) vcluster-id Virtual cluster ID (0 - 4294967295). 0 temporary Temporary. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 625 system/vdom-dns CLI Syntax config system vdom-dns edit <name_str> set vdom-dns {enable | disable} set primary <ipv4-address> set secondary <ipv4-address> set ip6-primary <ipv6-address> set ip6-secondary <ipv6-address> set source-ip <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 626 Description Configuration Description Default Value vdom-dns Enable/disable DNS per VDOM. disable primary VDOM primary DNS IP. 0.0.0.0 secondary VDOM secondary DNS IP. 0.0.0.0 ip6-primary VDOM IPv6 primary DNS IP. :: ip6-secondary VDOM IPv6 Secondary DNS IP. :: source-ip Source IP for communications to DNS server. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 627 system/vdom-link CLI Syntax config system vdom-link edit <name_str> set name <string> set vcluster {vcluster1 | vcluster2} set type {ppp | ethernet} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 628 Description Configuration Description Default Value name VDOM link name. (Empty) vcluster Virtual cluster. vcluster1 type Type. ppp CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 629 system/vdom-netflow CLI Syntax config system vdom-netflow edit <name_str> set vdom-netflow {enable | disable} set collector-ip <ipv4-address> set collector-port <integer> set source-ip <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 630 Description Configuration Description Default Value vdom-netflow Enable/disable NetFlow per VDOM. disable collector-ip Collector IP. 0.0.0.0 collector-port NetFlow collector port. 2055 source-ip Source IP for NetFlow agent. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 631 system/vdom-property CLI Syntax config system vdom-property edit <name_str> set name <string> set description <string> set snmp-index <integer> set session <user> set ipsec-phase1 <user> set ipsec-phase2 <user> set dialup-tunnel <user> set firewall-policy <user> set firewall-address <user> set firewall-addrgrp <user> set custom-service <user> set service-group <user> set onetime-schedule <user> set recurring-schedule <user> set user <user> set user-group <user> set sslvpn <user> set proxy <user> set log-disk-quota <user> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 632 Description Configuration Description Default Value name VDOM name. (Empty) description Description. (Empty) snmp-index Permanent SNMP Index of the virtual domain. 0 session Maximum number (guaranteed number) of sessions. 00 ipsec-phase1 Maximum number (guaranteed number) of VPN IPsec phase1 tunnels. 00 ipsec-phase2 Maximum number (guaranteed number) of VPN IPsec phase2 tunnels. 00 dialup-tunnel Maximum number (guaranteed number) of dialup tunnels. 00 firewall-policy Maximum number (guaranteed number) of firewall policies. 00 firewall-address Maximum number (guaranteed number) of firewall addresses. 00 firewall-addrgrp Maximum number (guaranteed number) of firewall address groups. 00 custom-service Maximum number (guaranteed number) of firewall custom services. 00 service-group Maximum number (guaranteed number) of firewall service groups. 00 onetime-schedule Maximum number (guaranteed number) of firewall one-time schedules. 00 recurring-schedule Maximum number (guaranteed number) of firewall recurring schedules. 00 user Maximum number (guaranteed number) of local users. 00 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 633 user-group Maximum number (guaranteed number) of user groups. 00 sslvpn Maximum number (guaranteed number) of SSLVPN. 00 proxy Maximum number (guaranteed number) of concurrent proxy users. 00 log-disk-quota Log disk quota in MB. 00 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 634 system/vdom-radius-server CLI Syntax config system vdom-radius-server edit <name_str> set name <string> set status {enable | disable} set radius-server-vdom <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 635 Description Configuration Description Default Value name Name of virtual domain for server settings. (Empty) status Enable/disable or disable the entry. disable radius-server-vdom Virtual domain of dynamic profile radius server to use for dynamic profile traffic in the current vdom. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 636 system/vdom-sflow CLI Syntax config system vdom-sflow edit <name_str> set vdom-sflow {enable | disable} set collector-ip <ipv4-address> set collector-port <integer> set source-ip <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 637 Description Configuration Description Default Value vdom-sflow Enable/disable sFlow per VDOM. disable collector-ip Collector IP. 0.0.0.0 collector-port sFlow collector port. 6343 source-ip Source IP for sFlow agent. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 638 system/virtual-wan-link CLI Syntax config system virtual-wan-link edit <name_str> set status {disable | enable} set load-balance-mode {source-ip-based | weight-based | usage-based | source-destip-based | measured-volume-based} set fail-detect {enable | disable} config fail-alert-interfaces edit <name_str> set name <string> end config members edit <name_str> set seq-num <integer> set interface <string> set gateway <ipv4-address> set weight <integer> set priority <integer> set spillover-threshold <integer> set ingress-spillover-threshold <integer> set volume-ratio <integer> set status {disable | enable} end config health-check edit <name_str> set name <string> set server <string> set protocol {ping | tcp-echo | udp-echo | http | twamp} set port <integer> set security-mode {none | authentication} set password <password> set packet-size <integer> set http-get <string> set http-match <string> set interval <integer> set timeout <integer> set failtime <integer> set recoverytime <integer> set update-cascade-interface {enable | disable} set update-static-route {enable | disable} set threshold-warning-packetloss <integer> set threshold-alert-packetloss <integer> set threshold-warning-latency <integer> set threshold-alert-latency <integer> set threshold-warning-jitter <integer> set threshold-alert-jitter <integer> end config service CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 639 edit <name_str> set name <string> set id <integer> set mode {auto | manual | priority} set quality-link <integer> set member <integer> set tos <user> set tos-mask <user> set protocol <integer> set start-port <integer> set end-port <integer> config dst edit <name_str> set name <string> end config src edit <name_str> set name <string> end config users edit <name_str> set name <string> end config groups edit <name_str> set name <string> end set internet-service {enable | disable} config internet-service-custom edit <name_str> set name <string> end config internet-service-id edit <name_str> set id <integer> end set health-check <string> set link-cost-factor {latency | jitter | packet-loss} set link-cost-threshold <integer> config priority-members edit <name_str> set seq-num <integer> end set status {disable | enable} end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 640 Description Configuration Description Default Value status Enable/disable using the virtual-wan-link settings. disable load-balance-mode Load balance mode among virtual WAN link members. source-ip-based fail-detect Enable/disable fail detection. disable fail-alert-interfaces Physical interfaces that will be alerted. (Empty) members Members belong to the virtual-wan-link. (Empty) health-check Health check. (Empty) service Service to be distributed. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 641 system/virtual-wire-pair CLI Syntax config system virtual-wire-pair edit <name_str> set name <string> config member edit <name_str> set interface-name <string> end set wildcard-vlan {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 642 Description Configuration Description Default Value name virtual-wire-pair name. (Empty) member Interfaces belong to the port pair. (Empty) wildcard-vlan Enable/disable wildcard VLAN. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 643 system/wccp CLI Syntax config system wccp edit <name_str> set service-id <string> set router-id <ipv4-address> set cache-id <ipv4-address> set group-address <ipv4-address-multicast> set server-list <user> set router-list <user> set ports-defined {source | destination} set ports <user> set authentication {enable | disable} set password <password> set forward-method {GRE | L2 | any} set cache-engine-method {GRE | L2} set service-type {auto | standard | dynamic} set primary-hash {src-ip | dst-ip | src-port | dst-port} set priority <integer> set protocol <integer> set assignment-weight <integer> set assignment-bucket-format {wccp-v2 | cisco-implementation} set return-method {GRE | L2 | any} set assignment-method {HASH | MASK | any} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 644 Description Configuration Description Default Value service-id Service ID. (Empty) router-id IP address which is known by all web cache servers. 0.0.0.0 cache-id IP address which is known by all routers. 0.0.0.0 group-address IP multicast address. 0.0.0.0 server-list Addresses of potential cache servers. (Empty) router-list Addresses of potential routers. (Empty) ports-defined Match method. (Empty) ports Service ports. (Empty) authentication Enable/disable MD5 authentication. disable password Password of MD5 authentication. (Empty) forward-method Method traffic is forwarded to cache servers. GRE cache-engine-method Method traffic is forwarded to route or returned to cache engine. GRE service-type Service type auto/standard/dynamic. auto primary-hash Hash method. dst-ip priority Service priority. 0 protocol Service protocol. 0 assignment-weight Cache server hash weight. 0 assignment-bucketformat Hash table bucket format. cisco-implementation return-method Method traffic is returned back to firewall. GRE assignment-method Assignment method preference. HASH CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 645 system/zone CLI Syntax config system zone edit <name_str> set name <string> set intrazone {allow | deny} config interface edit <name_str> set interface-name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 646 Description Configuration Description Default Value name Zone name. (Empty) intrazone Intra-zone traffic. deny interface Interfaces belong to the zone. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 647 user/adgrp CLI Syntax config user adgrp edit <name_str> set name <string> set server-name <string> set polling-id <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 648 Description Configuration Description Default Value name Name. (Empty) server-name FSSO agent name. (Empty) polling-id FSSO polling ID. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 649 user/device CLI Syntax config user device edit <name_str> set alias <string> set mac <mac-address> set user <string> set master-device <string> set comment <var-string> set avatar <var-string> set type {android-phone | android-tablet | blackberry-phone | blackberry-playbook | forticam | fortifone | fortinet-device | gaming-console | ip-phone | ipad | iphone | linux-pc | mac | media-streaming | printer | router-nat-device | windows-pc | windows -phone | windows-tablet | other-network-device} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 650 Description Configuration Description Default Value alias Device alias. (Empty) mac Device MAC address(es). 00:00:00:00:00:00 user User name. (Empty) master-device Master device (optional). (Empty) comment Comment. (Empty) avatar Image file for avatar (maximum 4K base64 encoded). (Empty) type Device type. other-network-device CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 651 user/device-access-list CLI Syntax config user device-access-list edit <name_str> set name <string> set default-action {accept | deny} config device-list edit <name_str> set id <integer> set device <string> set action {accept | deny} end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 652 Description Configuration Description Default Value name Device access list name. (Empty) default-action Allow or block unknown devices. accept device-list Device list. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 653 user/device-category CLI Syntax config user device-category edit <name_str> set name <string> set desc <var-string> set comment <var-string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 654 Description Configuration Description Default Value name Device category name. (Empty) desc Device category description. (Empty) comment Comment. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 655 user/device-group CLI Syntax config user device-group edit <name_str> set name <string> config member edit <name_str> set name <string> end set comment <var-string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 656 Description Configuration Description Default Value name Device group name. (Empty) member Device group member. (Empty) comment Comment. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 657 user/fortitoken CLI Syntax config user fortitoken edit <name_str> set serial-number <string> set status {active | lock} set seed <string> set comments <var-string> set license <string> set activation-code <string> set activation-expire <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 658 Description Configuration Description Default Value serial-number Serial number. (Empty) status Status active seed Token seed. (Empty) comments Comment. (Empty) license Mobile token license. (Empty) activation-code Mobile token user activation-code. (Empty) activation-expire Mobile token user activation-code expire time. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 659 user/fsso CLI Syntax config user fsso edit <name_str> set name <string> set server <string> set port <integer> set password <password> set server2 <string> set port2 <integer> set password2 <password> set server3 <string> set port3 <integer> set password3 <password> set server4 <string> set port4 <integer> set password4 <password> set server5 <string> set port5 <integer> set password5 <password> set ldap-server <string> set source-ip <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 660 Description Configuration Description Default Value name Name. (Empty) server Address of the 1st FSSO agent. (Empty) port Port of the 1st FSSO agent. 8000 password Password of the 1st FSSO agent. (Empty) server2 Address of the 2nd FSSO agent. (Empty) port2 Port of the 2nd FSSO agent. 8000 password2 Password of the 2nd FSSO agent. (Empty) server3 Address of the 3rd FSSO agent. (Empty) port3 Port of the 3rd FSSO agent. 8000 password3 Password of the 3rd FSSO agent. (Empty) server4 Address of the 4th FSSO agent. (Empty) port4 Port of the 4th FSSO agent. 8000 password4 Password of the 4th FSSO agent. (Empty) server5 Address of the 5th FSSO agent. (Empty) port5 Port of the 5th FSSO agent. 8000 password5 Password of the 5th FSSO agent. (Empty) ldap-server LDAP server to get group information. (Empty) source-ip Source IP for communications to FSSO agent. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 661 user/fsso-polling CLI Syntax config user fsso-polling edit <name_str> set id <integer> set status {enable | disable} set server <string> set default-domain <string> set port <integer> set user <string> set password <password> set ldap-server <string> set logon-history <integer> set polling-frequency <integer> config adgrp edit <name_str> set name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 662 Description Configuration Description Default Value id Active Directory server ID. 0 status Enable/disable poll Active Directory status. enable server Active Directory server name/IP address. (Empty) default-domain Default domain in this server. (Empty) port Port of the Active Directory server. 0 user Active Directory server user account. (Empty) password Password to connect to Active Directory server. (Empty) ldap-server LDAP Server NAME for group name and users. (Empty) logon-history hours to keep as an active logon. 0 means keeping forever 8 polling-frequency Polling frequency (1 - 30 s). 10 adgrp LDAP Group Info. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 663 user/group CLI Syntax CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 664 config user group edit <name_str> set name <string> set group-type {firewall | sslvpn | fsso-service | directory-service | active-dire ctory | rsso | guest} set authtimeout <integer> set auth-concurrent-override {enable | disable} set auth-concurrent-value <integer> set http-digest-realm <string> set sso-attribute-value <string> config member edit <name_str> set name <string> end config match edit <name_str> set id <integer> set server-name <string> set group-name <string> end set user-id {email | auto-generate | specify} set password {auto-generate | specify | disable} set user-name {disable | enable} set sponsor {optional | mandatory | disabled} set company {optional | mandatory | disabled} set email {disable | enable} set mobile-phone {disable | enable} set sms-server {fortiguard | custom} set sms-custom-server <string> set expire-type {immediately | first-successful-login} set expire <integer> set max-accounts <integer> set multiple-guest-add {disable | enable} config guest edit <name_str> set user-id <string> set name <string> set group <string> set password <password> set mobile-phone <string> set sponsor <string> set company <string> set email <string> set expiration <user> set comment <var-string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 665 Description Configuration Description Default Value name Group name. (Empty) group-type Type of user group. firewall authtimeout Authentication timeout. 0 auth-concurrentoverride Enable/disable concurrent authentication override. disable auth-concurrent-value Maximum number of concurrent authenticated connections per user (0 - 100). 0 http-digest-realm Realm attribute for MD5-digest authentication. (Empty) sso-attribute-value Single Sign On Attribute Value. (Empty) member Group members. (Empty) match Group matches. (Empty) user-id User ID. email password Password. auto-generate user-name Enable/disable user name. disable sponsor Sponsor. optional company Company. optional email Enable/disable email address. enable mobile-phone Enable/disable mobile phone. disable sms-server Send SMS through FortiGuard or other external server. fortiguard sms-custom-server SMS server. (Empty) expire-type Point at which expiration count down begins. immediately expire Expiration (1 - 31536000 sec). 14400 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 666 max-accounts Maximum number of guest accounts that can be created for this group (0 = unlimited). 0 multiple-guest-add Enable/disable addition of multiple guests. disable guest Guest User. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 667 user/ldap CLI Syntax config user ldap edit <name_str> set name <string> set server <string> set secondary-server <string> set tertiary-server <string> set source-ip <ipv4-address> set cnid <string> set dn <string> set type {simple | anonymous | regular} set username <string> set password <password> set group-member-check {user-attr | group-object | posix-group-object} set group-object-filter <string> set group-object-search-base <string> set secure {disable | starttls | ldaps} set ca-cert <string> set port <integer> set password-expiry-warning {enable | disable} set password-renewal {enable | disable} set member-attr <string> set search-type {nested} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 668 Description Configuration Description Default Value name LDAP server entry name. (Empty) server LDAP server CN domain name or IP. (Empty) secondary-server Secondary LDAP server CN domain name or IP. (Empty) tertiary-server Tertiary LDAP server CN domain name or IP. (Empty) source-ip Source IP for communications to LDAP server. 0.0.0.0 cnid Common Name Identifier (default = "cn"). cn dn Distinguished Name. (Empty) type Type of LDAP binding. simple username Username (full DN) for initial binding. (Empty) password Password for initial binding. (Empty) group-member-check Group member checking options. user-attr group-object-filter Filter used for group searching. (& (objectcategory=group) (member=*)) group-object-searchbase Search base used for group searching. (Empty) secure SSL connection. disable ca-cert CA certificate name. (Empty) port Port number of the LDAP server (default = 389). 389 password-expirywarning Enable/disable password expiry warnings. disable password-renewal Enable/disable online password renewal. disable member-attr Name of attribute from which to get group membership. memberOf search-type Search type. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 669 user/local CLI Syntax config user local edit <name_str> set name <string> set status {enable | disable} set type {password | radius | tacacs+ | ldap} set passwd <password> set ldap-server <string> set radius-server <string> set tacacs+-server <string> set two-factor {disable | fortitoken | email | sms} set fortitoken <string> set email-to <string> set sms-server {fortiguard | custom} set sms-custom-server <string> set sms-phone <string> set passwd-policy <string> set passwd-time <user> set authtimeout <integer> set workstation <string> set auth-concurrent-override {enable | disable} set auth-concurrent-value <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 670 Description Configuration Description Default Value name User name. (Empty) status Enable/disable user. enable type Authentication type. (Empty) passwd User password. (Empty) ldap-server LDAP server name. (Empty) radius-server RADIUS server name. (Empty) tacacs+-server TACACS+ server name. (Empty) two-factor Enable/disable two-factor authentication. disable fortitoken Two-factor recipient's FortiToken serial number. (Empty) email-to Two-factor recipient's email address. (Empty) sms-server Send SMS through FortiGuard or other external server. fortiguard sms-custom-server Two-factor recipient's SMS server. (Empty) sms-phone Two-factor recipient's mobile phone number. (Empty) passwd-policy Password policy. (Empty) passwd-time Password last update time. 0000-00-00 00:00:00 authtimeout Authentication timeout. 0 workstation Name of remote user workstation. (Empty) auth-concurrentoverride Enable/disable concurrent authentication override. disable auth-concurrent-value Maximum number of concurrent authenticated connections per user. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 671 user/password-policy CLI Syntax config user password-policy edit <name_str> set name <string> set expire-days <integer> set warn-days <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 672 Description Configuration Description Default Value name Password policy name. (Empty) expire-days Number of days password will expire. 180 warn-days Number of days to warn before password expires. 15 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 673 user/peer CLI Syntax config user peer edit <name_str> set name <string> set mandatory-ca-verify {enable | disable} set ca <string> set subject <string> set cn <string> set cn-type {string | email | FQDN | ipv4 | ipv6} set ldap-server <string> set ldap-username <string> set ldap-password <password> set ldap-mode {password | principal-name} set ocsp-override-server <string> set two-factor {enable | disable} set passwd <password> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 674 Description Configuration Description Default Value name Peer name. (Empty) mandatory-ca-verify Enable/disable mandatory CA verify. enable ca Peer certificate CA (CA name in local). (Empty) subject Peer certificate name constraints. (Empty) cn Peer certificate common name. (Empty) cn-type Peer certificate common name type. string ldap-server LDAP server for access rights check. (Empty) ldap-username Username for LDAP server bind. (Empty) ldap-password Password for LDAP server bind. (Empty) ldap-mode Peer LDAP mode. password ocsp-override-server OSCP server. (Empty) two-factor Enable/disable 2-factor authentication (certificate + password). disable passwd User password. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 675 user/peergrp CLI Syntax config user peergrp edit <name_str> set name <string> config member edit <name_str> set name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 676 Description Configuration Description Default Value name Peer group name. (Empty) member Peer group members. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 677 user/pop3 CLI Syntax config user pop3 edit <name_str> set name <string> set server <string> set port <integer> set secure {none | starttls | pop3s} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 678 Description Configuration Description Default Value name POP3 server entry name. (Empty) server {<name_str|ip_str>} server domain name or IP. (Empty) port POP3 service port number. 0 secure SSL connection. starttls CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 679 user/radius CLI Syntax config user radius edit <name_str> set name <string> set server <string> set secret <password> set secondary-server <string> set secondary-secret <password> set tertiary-server <string> set tertiary-secret <password> set timeout <integer> set all-usergroup {disable | enable} set use-management-vdom {enable | disable} set nas-ip <ipv4-address> set acct-interim-interval <integer> set radius-coa {enable | disable} set radius-port <integer> set h3c-compatibility {enable | disable} set auth-type {auto | ms_chap_v2 | ms_chap | chap | pap} set source-ip <ipv4-address> set username-case-sensitive {enable | disable} config class edit <name_str> set name <string> end set password-renewal {enable | disable} set rsso {enable | disable} set rsso-radius-server-port <integer> set rsso-radius-response {enable | disable} set rsso-validate-request-secret {enable | disable} set rsso-secret <password> set rsso-endpoint-attribute {User-Name | User-Password | CHAP-Password | NAS-IP-Ad dress | NAS-Port | Service-Type | Framed-Protocol | Framed-IP-Address | Framed-IP-Netm ask | Framed-Routing | Filter-Id | Framed-MTU | Framed-Compression | Login-IP-Host | L ogin-Service | Login-TCP-Port | Reply-Message | Callback-Number | Callback-Id | Framed -Route | Framed-IPX-Network | State | Class | Session-Timeout | Idle-Timeout | Termina tion-Action | Called-Station-Id | Calling-Station-Id | NAS-Identifier | Proxy-State | Login-LAT-Service | Login-LAT-Node | Login-LAT-Group | Framed-AppleTalk-Link | FramedAppleTalk-Network | Framed-AppleTalk-Zone | Acct-Status-Type | Acct-Delay-Time | AcctInput-Octets | Acct-Output-Octets | Acct-Session-Id | Acct-Authentic | Acct-Session-Ti me | Acct-Input-Packets | Acct-Output-Packets | Acct-Terminate-Cause | Acct-Multi-Sess ion-Id | Acct-Link-Count | CHAP-Challenge | NAS-Port-Type | Port-Limit | Login-LAT-Por t} set rsso-endpoint-block-attribute {User-Name | User-Password | CHAP-Password | NAS -IP-Address | NAS-Port | Service-Type | Framed-Protocol | Framed-IP-Address | Framed-I P-Netmask | Framed-Routing | Filter-Id | Framed-MTU | Framed-Compression | Login-IP-Ho st | Login-Service | Login-TCP-Port | Reply-Message | Callback-Number | Callback-Id | Framed-Route | Framed-IPX-Network | State | Class | Session-Timeout | Idle-Timeout | T CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 680 ermination-Action | Called-Station-Id | Calling-Station-Id | NAS-Identifier | Proxy-St ate | Login-LAT-Service | Login-LAT-Node | Login-LAT-Group | Framed-AppleTalk-Link | F ramed-AppleTalk-Network | Framed-AppleTalk-Zone | Acct-Status-Type | Acct-Delay-Time | Acct-Input-Octets | Acct-Output-Octets | Acct-Session-Id | Acct-Authentic | Acct-Sess ion-Time | Acct-Input-Packets | Acct-Output-Packets | Acct-Terminate-Cause | Acct-Mult i-Session-Id | Acct-Link-Count | CHAP-Challenge | NAS-Port-Type | Port-Limit | Login-L AT-Port} set sso-attribute {User-Name | User-Password | CHAP-Password | NAS-IP-Address | NA S-Port | Service-Type | Framed-Protocol | Framed-IP-Address | Framed-IP-Netmask | Fram ed-Routing | Filter-Id | Framed-MTU | Framed-Compression | Login-IP-Host | Login-Servi ce | Login-TCP-Port | Reply-Message | Callback-Number | Callback-Id | Framed-Route | F ramed-IPX-Network | State | Class | Session-Timeout | Idle-Timeout | Termination-Actio n | Called-Station-Id | Calling-Station-Id | NAS-Identifier | Proxy-State | Login-LATService | Login-LAT-Node | Login-LAT-Group | Framed-AppleTalk-Link | Framed-AppleTalkNetwork | Framed-AppleTalk-Zone | Acct-Status-Type | Acct-Delay-Time | Acct-Input-Octe ts | Acct-Output-Octets | Acct-Session-Id | Acct-Authentic | Acct-Session-Time | AcctInput-Packets | Acct-Output-Packets | Acct-Terminate-Cause | Acct-Multi-Session-Id | A cct-Link-Count | CHAP-Challenge | NAS-Port-Type | Port-Limit | Login-LAT-Port} set sso-attribute-key <string> set sso-attribute-value-override {enable | disable} set rsso-context-timeout <integer> set rsso-log-period <integer> set rsso-log-flags {protocol-error | profile-missing | accounting-stop-missed | ac counting-event | endpoint-block | radiusd-other | none} set rsso-flush-ip-session {enable | disable} config accounting-server edit <name_str> set id <integer> set status {enable | disable} set server <string> set secret <password> set port <integer> set source-ip <ipv4-address> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 681 Description Configuration Description Default Value name RADIUS server entry name. (Empty) server {<name_str|ip_str>} primary server CN domain name or IP. (Empty) secret Secret key to access the primary server. (Empty) secondary-server {<name_str|ip_str>} secondary RADIUS CN domain name or IP. (Empty) secondary-secret Secret key to access the secondary server. (Empty) tertiary-server {<name_str|ip_str>} tertiary RADIUS CN domain name or IP. (Empty) tertiary-secret Secret key to access the tertiary server. (Empty) timeout Authentication time-out. 5 all-usergroup Enable/disable automatically include this RADIUS server to all user groups. disable use-managementvdom Enable/disable using management VDOM to send requests. disable nas-ip NAS IP address. 0.0.0.0 acct-interim-interval Number of seconds between each accouting interim update message (600 - 86400 sec). 0 radius-coa Enable/Disable RADIUS CoA. disable radius-port RADIUS service port number. 0 h3c-compatibility Enable/disable H3C compatibility. disable auth-type Authentication Protocol. auto source-ip Source IP for communications to RADIUS server. 0.0.0.0 username-casesensitive Enable/disable username case sensitive. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 682 class Class name(s). (Empty) password-renewal Enable/disable password renewal. disable rsso Enable/disable RADIUS based single sign on feature. disable rsso-radius-server-port UDP port to listen on for RADIUS accounting packets. 1813 rsso-radius-response Enable/disable sending RADIUS response packets. disable rsso-validate-requestsecret Enable/disable validating RADIUS request shared secret. disable rsso-secret RADIUS shared secret for responses / validating requests. (Empty) rsso-endpoint-attribute RADIUS Attribute used to hold End Point name. Calling-Station-Id rsso-endpoint-blockattribute RADIUS Attribute used to hold endpoint to block. (Empty) sso-attribute RADIUS Attribute used to match the single sign on group value. Class sso-attribute-key Key prefix for single-sign-on group value in the sso-attribute. (Empty) sso-attribute-valueoverride Enable/disable override old attribute value with new value for the same endpoint. enable rsso-context-timeout Timeout value for RADIUS server database entries (0 = infinite). 28800 rsso-log-period Minimum time period to use for event logs. 0 rsso-log-flags Events to log. protocol-error profilemissing accountingstop-missed accounting-event endpoint-block radiusdother CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 683 rsso-flush-ip-session Enable/disable flush user IP sessions on RADIUS accounting stop. disable accounting-server Additional accounting servers. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 684 user/security-exempt-list CLI Syntax config user security-exempt-list edit <name_str> set name <string> set description <string> config rule edit <name_str> set id <integer> config srcaddr edit <name_str> set name <string> end config devices edit <name_str> set name <string> end config dstaddr edit <name_str> set name <string> end config service edit <name_str> set name <string> end end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 685 Description Configuration Description Default Value name Name of the exempt list. (Empty) description Description. (Empty) rule Exempt rules. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 686 user/setting CLI Syntax config user setting edit <name_str> set auth-type {http | https | ftp | telnet} set auth-cert <string> set auth-ca-cert <string> set auth-secure-http {enable | disable} set auth-http-basic {enable | disable} set auth-multi-group {enable | disable} set auth-timeout <integer> set auth-timeout-type {idle-timeout | hard-timeout | new-session} set auth-portal-timeout <integer> set radius-ses-timeout-act {hard-timeout | ignore-timeout} set auth-blackout-time <integer> set auth-invalid-max <integer> set auth-lockout-threshold <integer> set auth-lockout-duration <integer> config auth-ports edit <name_str> set id <integer> set type {http | https | ftp | telnet} set port <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 687 Description Configuration Description Default Value auth-type Allowed firewall policy authentication methods. http https ftp telnet auth-cert HTTPS server certificate for policy authentication. (Empty) auth-ca-cert HTTPS CA certificate for policy authentication. (Empty) auth-secure-http Enable/disable use of HTTPS for HTTP authentication. disable auth-http-basic Enable/disable use of HTTP BASIC for HTTP authentication. disable auth-multi-group Enable/disable retrieval of groups to which a user belongs. enable auth-timeout Firewall user authentication time-out. 5 auth-timeout-type Authenticated policy expiration behavior. idle-timeout auth-portal-timeout Firewall captive portal authentication time-out (1 30 min, default - 3). 3 radius-ses-timeout-act RADIUS session timeout behavior. hard-timeout auth-blackout-time Authentication blackout time (0 - 3600 s). 0 auth-invalid-max Number of invalid auth tries allowed before blackout. 5 auth-lockout-threshold Maximum number of failed login attempts before lockout (1 - 10). 3 auth-lockout-duration Lockout period in seconds after too many login failures. 0 auth-ports Authentication port table. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 688 user/tacacs+ CLI Syntax config user tacacs+ edit <name_str> set name <string> set server <string> set secondary-server <string> set tertiary-server <string> set port <integer> set key <password> set secondary-key <password> set tertiary-key <password> set authen-type {mschap | chap | pap | ascii | auto} set authorization {enable | disable} set source-ip <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 689 Description Configuration Description Default Value name TACACS+ server entry name. (Empty) server {<name_str|ip_str>} server CN domain name or IP. (Empty) secondary-server {<name_str|ip_str>} secondary server CN domain name or IP. (Empty) tertiary-server {<name_str|ip_str>} tertiary server CN domain name or IP. (Empty) port Port number of the TACACS+ server. 49 key Key to access the server. (Empty) secondary-key Key to access the secondary server. (Empty) tertiary-key Key to access the tertiary server. (Empty) authen-type Authentication type to use. auto authorization Enable/disable TACACS+ authorization. disable source-ip source IP for communications to TACACS+ server. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 690 voip/profile CLI Syntax config voip profile edit <name_str> set name <string> set comment <var-string> config sip edit <name_str> set status {disable | enable} set rtp {disable | enable} set open-register-pinhole {disable | enable} set open-contact-pinhole {disable | enable} set strict-register {disable | enable} set register-rate <integer> set invite-rate <integer> set max-dialogs <integer> set max-line-length <integer> set block-long-lines {disable | enable} set block-unknown {disable | enable} set call-keepalive <integer> set block-ack {disable | enable} set block-bye {disable | enable} set block-cancel {disable | enable} set block-info {disable | enable} set block-invite {disable | enable} set block-message {disable | enable} set block-notify {disable | enable} set block-options {disable | enable} set block-prack {disable | enable} set block-publish {disable | enable} set block-refer {disable | enable} set block-register {disable | enable} set block-subscribe {disable | enable} set block-update {disable | enable} set register-contact-trace {disable | enable} set open-via-pinhole {disable | enable} set open-record-route-pinhole {disable | enable} set rfc2543-branch {disable | enable} set log-violations {disable | enable} set log-call-summary {disable | enable} set nat-trace {disable | enable} set subscribe-rate <integer> set message-rate <integer> set notify-rate <integer> set refer-rate <integer> set update-rate <integer> set options-rate <integer> set ack-rate <integer> set prack-rate <integer> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 691 set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set info-rate <integer> publish-rate <integer> bye-rate <integer> cancel-rate <integer> preserve-override {disable | enable} no-sdp-fixup {disable | enable} contact-fixup {disable | enable} max-idle-dialogs <integer> block-geo-red-options {disable | enable} hosted-nat-traversal {disable | enable} hnt-restrict-source-ip {disable | enable} max-body-length <integer> unknown-header {discard | pass | respond} malformed-request-line {discard | pass | respond} malformed-header-via {discard | pass | respond} malformed-header-from {discard | pass | respond} malformed-header-to {discard | pass | respond} malformed-header-call-id {discard | pass | respond} malformed-header-cseq {discard | pass | respond} malformed-header-rack {discard | pass | respond} malformed-header-rseq {discard | pass | respond} malformed-header-contact {discard | pass | respond} malformed-header-record-route {discard | pass | respond} malformed-header-route {discard | pass | respond} malformed-header-expires {discard | pass | respond} malformed-header-content-type {discard | pass | respond} malformed-header-content-length {discard | pass | respond} malformed-header-max-forwards {discard | pass | respond} malformed-header-allow {discard | pass | respond} malformed-header-p-asserted-identity {discard | pass | respond} malformed-header-sdp-v {discard | pass | respond} malformed-header-sdp-o {discard | pass | respond} malformed-header-sdp-s {discard | pass | respond} malformed-header-sdp-i {discard | pass | respond} malformed-header-sdp-c {discard | pass | respond} malformed-header-sdp-b {discard | pass | respond} malformed-header-sdp-z {discard | pass | respond} malformed-header-sdp-k {discard | pass | respond} malformed-header-sdp-a {discard | pass | respond} malformed-header-sdp-t {discard | pass | respond} malformed-header-sdp-r {discard | pass | respond} malformed-header-sdp-m {discard | pass | respond} provisional-invite-expiry-time <integer> ips-rtp {disable | enable} ssl-mode {off | full} ssl-send-empty-frags {enable | disable} ssl-client-renegotiation {allow | deny | secure} ssl-algorithm {high | medium | low} ssl-pfs {require | deny | allow} ssl-min-version {ssl-3.0 | tls-1.0 | tls-1.1 | tls-1.2} ssl-max-version {ssl-3.0 | tls-1.0 | tls-1.1 | tls-1.2} ssl-client-certificate <string> ssl-server-certificate <string> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 692 set ssl-server-certificate <string> set ssl-auth-client <string> set ssl-auth-server <string> end config sccp edit <name_str> set status {disable | enable} set block-mcast {disable | enable} set verify-header {disable | enable} set log-call-summary {disable | enable} set log-violations {disable | enable} set max-calls <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 693 Description Configuration Description Default Value name Profile name. (Empty) comment Comment. (Empty) sip SIP. Details below Configuration status rtp open-register-pinhole open-contact-pinhole strict-register register-rate invite-rate max-dialogs max-line-length block-long-lines block-unknown call-keepalive block-ack block-bye block-cancel block-info block-invite block-message block-notify block-options block-prack block-publish block-refer block-register block-subscribe block-update register-contact-trace open-via-pinhole open-record-route-pinhole rfc2543-branch log-violations log-call-summary nat-trace subscribe-rate CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Default Value enable enable enable enable disable 0 0 0 998 enable enable 0 disable disable disable disable disable disable disable disable disable disable disable disable disable disable disable disable enable disable disable enable enable 0 694 message-rate notify-rate refer-rate update-rate options-rate ack-rate prack-rate info-rate publish-rate bye-rate cancel-rate preserve-override no-sdp-fixup contact-fixup max-idle-dialogs block-geo-red-options hosted-nat-traversal hnt-restrict-source-ip max-body-length unknown-header malformed-request-line malformed-header-via malformed-header-from malformed-header-to malformed-header-call-id malformed-header-cseq malformed-header-rack malformed-header-rseq malformed-header-contact malformed-header-record-route malformed-header-route malformed-header-expires malformed-header-content-type malformed-header-content-length malformed-header-max-forwards malformed-header-allow malformed-header-p-asserted-identity malformed-header-sdp-v malformed-header-sdp-o malformed-header-sdp-s malformed-header-sdp-i malformed-header-sdp-c malformed-header-sdp-b malformed-header-sdp-z CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 0 0 0 0 0 0 0 0 0 0 0 disable disable enable 0 disable disable disable 0 pass pass pass pass pass pass pass pass pass pass pass pass pass pass pass pass pass pass pass pass pass pass pass pass pass 695 malformed-header-sdp-k malformed-header-sdp-a malformed-header-sdp-t malformed-header-sdp-r malformed-header-sdp-m provisional-invite-expiry-time ips-rtp ssl-mode ssl-send-empty-frags ssl-client-renegotiation ssl-algorithm ssl-pfs ssl-min-version ssl-max-version ssl-client-certificate ssl-server-certificate ssl-auth-client ssl-auth-server sccp pass pass pass pass pass 210 enable off enable allow high allow tls-1.0 tls-1.2 (Empty) (Empty) (Empty) (Empty) SCCP. Configuration status block-mcast verify-header log-call-summary log-violations max-calls CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Details below Default Value enable disable disable disable disable 0 696 vpn.certificate/ca CLI Syntax config vpn.certificate ca edit <name_str> set name <string> set ca <user> set range {global | vdom} set source {factory | user | bundle | fortiguard} set trusted {enable | disable} set scep-url <string> set auto-update-days <integer> set auto-update-days-warning <integer> set source-ip <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 697 Description Configuration Description Default Value name Name. (Empty) ca CA certificate. (Empty) range CA certificate range. vdom source CA certificate source. user trusted Enable/disable trusted CA. enable scep-url URL of SCEP server. (Empty) auto-update-days Days to auto-update before expired, 0=disabled. 0 auto-update-dayswarning Days to send update before auto-update (0=disabled). 0 source-ip Source IP for communications to SCEP server. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 698 vpn.certificate/crl CLI Syntax config vpn.certificate crl edit <name_str> set name <string> set crl <user> set range {global | vdom} set source {factory | user | bundle | fortiguard} set update-vdom <string> set ldap-server <string> set ldap-username <string> set ldap-password <password> set http-url <string> set scep-url <string> set scep-cert <string> set update-interval <integer> set source-ip <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 699 Description Configuration Description Default Value name Name. (Empty) crl Certificate Revocation List. (Empty) range CRL range. vdom source CRL source. user update-vdom Virtual domain for CRL update. root ldap-server LDAP server. (Empty) ldap-username Login name for LDAP server. (Empty) ldap-password Login password for LDAP server. (Empty) http-url URL of HTTP server for CRL update. (Empty) scep-url URL of CA server for CRL update via SCEP. (Empty) scep-cert Local certificate used for CRL update via SCEP. Fortinet_CA_SSL update-interval Second between updates, 0=disabled. 0 source-ip Source IP for communications to CA (HTTP/SCEP) server. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 700 vpn.certificate/local CLI Syntax config vpn.certificate local edit <name_str> set name <string> set password <password> set comments <string> set private-key <user> set certificate <user> set csr <user> set state <user> set scep-url <string> set range {global | vdom} set source {factory | user | bundle | fortiguard} set auto-regenerate-days <integer> set auto-regenerate-days-warning <integer> set scep-password <password> set ca-identifier <string> set name-encoding {printable | utf8} set source-ip <ipv4-address> set ike-localid <string> set ike-localid-type {asn1dn | fqdn} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 701 Description Configuration Description Default Value name Name. (Empty) password Password. (Empty) comments Comment. (Empty) private-key Private key. (Empty) certificate Certificate. (Empty) csr Certificate Signing Request. (Empty) state Certificate Signing Request State. (Empty) scep-url URL of SCEP server. (Empty) range Certificate range. vdom source Certificate source. user auto-regenerate-days Days to auto-regenerate before expired, 0=disabled. 0 auto-regenerate-dayswarning Days to send warning before auto-regeneration, 0=disabled. 0 scep-password SCEP server challenge password for autoregeneration. (Empty) ca-identifier CA identifier of the CA server for signing via SCEP. (Empty) name-encoding Name encoding for auto-regeneration. printable source-ip Source IP for communications to SCEP server. 0.0.0.0 ike-localid IKE local ID. (Empty) ike-localid-type IKE local ID type. asn1dn CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 702 vpn.certificate/ocsp-server CLI Syntax config vpn.certificate ocsp-server edit <name_str> set name <string> set url <string> set cert <string> set secondary-url <string> set secondary-cert <string> set unavail-action {revoke | ignore} set source-ip <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 703 Description Configuration Description Default Value name OCSP server entry name. (Empty) url URL to OCSP server. (Empty) cert OCSP server certificate. (Empty) secondary-url URL to secondary OCSP server. (Empty) secondary-cert Secondary OCSP server certificate. (Empty) unavail-action Action when server is unavailable. revoke source-ip Enable/disable source IP for communications to OCSP server. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 704 vpn.certificate/remote CLI Syntax config vpn.certificate remote edit <name_str> set name <string> set remote <user> set range {global | vdom} set source {factory | user | bundle | fortiguard} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 705 Description Configuration Description Default Value name Name. (Empty) remote Remote certificate. (Empty) range Remote certificate range. vdom source Remote certificate source. user CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 706 vpn.certificate/setting CLI Syntax config vpn.certificate setting edit <name_str> set ocsp-status {enable | disable} set ocsp-default-server <string> set check-ca-cert {enable | disable} set strict-crl-check {enable | disable} set strict-ocsp-check {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 707 Description Configuration Description Default Value ocsp-status OCSP status. disable ocsp-default-server Default OCSP server. (Empty) check-ca-cert Enable/disable check CA certificate. enable strict-crl-check Enable/disable check CRL in strict mode. disable strict-ocsp-check Enable/disable check OCSP in strict mode. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 708 vpn.ipsec/concentrator CLI Syntax config vpn.ipsec concentrator edit <name_str> set name <string> set src-check {disable | enable} config member edit <name_str> set name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 709 Description Configuration Description Default Value name Concentrator name. (Empty) src-check Enable/disable use of source selector when choosing appropriate tunnel. disable member Concentrator members. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 710 vpn.ipsec/forticlient CLI Syntax config vpn.ipsec forticlient edit <name_str> set realm <string> set usergroupname <string> set phase2name <string> set status {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 711 Description Configuration Description Default Value realm FortiClient realm name. (Empty) usergroupname User group name. (Empty) phase2name Tunnel (phase2) name. (Empty) status Enable/disable realm status. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 712 vpn.ipsec/manualkey CLI Syntax config vpn.ipsec manualkey edit <name_str> set name <string> set interface <string> set remote-gw <ipv4-address> set local-gw <ipv4-address-any> set authentication {null | md5 | sha1 | sha256 | sha384 | sha512} set encryption {null | des | 3des | aes128 | aes192 | aes256 | aria128 | aria192 | aria256 | seed} set authkey <user> set enckey <user> set localspi <user> set remotespi <user> set npu-offload {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 713 Description Configuration Description Default Value name IPsec tunnel name. (Empty) interface Interface name. (Empty) remote-gw Peer gateway. 0.0.0.0 local-gw Local gateway. 0.0.0.0 authentication Authentication algorithm. null encryption Encryption algorithm. null authkey Authentication key. - enckey Encryption key. - localspi Local SPI. 0x100 remotespi Remote SPI. 0x100 npu-offload Enable/disable NPU offloading. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 714 vpn.ipsec/manualkey-interface CLI Syntax config vpn.ipsec manualkey-interface edit <name_str> set name <string> set interface <string> set ip-version {4 | 6} set addr-type {4 | 6} set remote-gw <ipv4-address> set remote-gw6 <ipv6-address> set local-gw <ipv4-address-any> set local-gw6 <ipv6-address> set auth-alg {null | md5 | sha1 | sha256 | sha384 | sha512} set enc-alg {null | des | 3des | aes128 | aes192 | aes256 | aria128 | aria192 | ar ia256 | seed} set auth-key <user> set enc-key <user> set local-spi <user> set remote-spi <user> set npu-offload {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 715 Description Configuration Description Default Value name IPsec tunnel name. (Empty) interface Interface name. (Empty) ip-version IP version to use for VPN interface. 4 addr-type IP version to use for IP packets. 4 remote-gw Remote IPv4 address of VPN gateway. 0.0.0.0 remote-gw6 Remote IPv6 address of VPN gateway. :: local-gw Local IPv4 address of VPN gateway. 0.0.0.0 local-gw6 Local IPv6 address of VPN gateway. :: auth-alg Authentication algorithm. null enc-alg Encryption algorithm. null auth-key Authentication key. - enc-key Encryption key. - local-spi Local SPI. 0x100 remote-spi Remote SPI. 0x100 npu-offload Enable/disable offloading NPU. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 716 vpn.ipsec/phase1 CLI Syntax config vpn.ipsec phase1 edit <name_str> set name <string> set type {static | dynamic | ddns} set interface <string> set ike-version {1 | 2} set remote-gw <ipv4-address> set local-gw <ipv4-address> set remotegw-ddns <string> set keylife <integer> config certificate edit <name_str> set name <string> end set authmethod {psk | rsa-signature | signature} set mode {aggressive | main} set peertype {any | one | dialup | peer | peergrp} set peerid <string> set usrgrp <string> set peer <string> set peergrp <string> set autoconfig {disable | client | gateway} set mode-cfg {disable | enable} set assign-ip {disable | enable} set assign-ip-from {range | usrgrp | dhcp} set ipv4-start-ip <ipv4-address> set ipv4-end-ip <ipv4-address> set ipv4-netmask <ipv4-netmask> set dns-mode {manual | auto} set ipv4-dns-server1 <ipv4-address> set ipv4-dns-server2 <ipv4-address> set ipv4-dns-server3 <ipv4-address> set ipv4-wins-server1 <ipv4-address> set ipv4-wins-server2 <ipv4-address> config ipv4-exclude-range edit <name_str> set id <integer> set start-ip <ipv4-address> set end-ip <ipv4-address> end set ipv4-split-include <string> set split-include-service <string> set ipv6-start-ip <ipv6-address> set ipv6-end-ip <ipv6-address> set ipv6-prefix <integer> set ipv6-dns-server1 <ipv6-address> set ipv6-dns-server2 <ipv6-address> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 717 set ipv6-dns-server3 <ipv6-address> config ipv6-exclude-range edit <name_str> set id <integer> set start-ip <ipv6-address> set end-ip <ipv6-address> end set ipv6-split-include <string> set unity-support {disable | enable} set domain <string> set banner <var-string> set include-local-lan {disable | enable} set save-password {disable | enable} set client-auto-negotiate {disable | enable} set client-keep-alive {disable | enable} config backup-gateway edit <name_str> set address <string> end set proposal {des-md5 | des-sha1 | des-sha256 | des-sha384 | des-sha512 | 3des-md5 | 3des-sha1 | 3des-sha256 | 3des-sha384 | 3des-sha512 | aes128-md5 | aes128-sha1 | ae s128-sha256 | aes128-sha384 | aes128-sha512 | aes192-md5 | aes192-sha1 | aes192-sha256 | aes192-sha384 | aes192-sha512 | aes256-md5 | aes256-sha1 | aes256-sha256 | aes256-s ha384 | aes256-sha512 | aria128-md5 | aria128-sha1 | aria128-sha256 | aria128-sha384 | aria128-sha512 | aria192-md5 | aria192-sha1 | aria192-sha256 | aria192-sha384 | aria1 92-sha512 | aria256-md5 | aria256-sha1 | aria256-sha256 | aria256-sha384 | aria256-sha 512 | seed-md5 | seed-sha1 | seed-sha256 | seed-sha384 | seed-sha512} set add-route {disable | enable} set exchange-interface-ip {enable | disable} set add-gw-route {enable | disable} set psksecret <password> set keepalive <integer> set distance <integer> set priority <integer> set localid <string> set localid-type {auto | fqdn | user-fqdn | keyid | address | asn1dn} set auto-negotiate {enable | disable} set negotiate-timeout <integer> set fragmentation {enable | disable} set dpd {disable | on-idle | on-demand} set dpd-retrycount <integer> set dpd-retryinterval <user> set forticlient-enforcement {enable | disable} set comments <var-string> set npu-offload {enable | disable} set send-cert-chain {enable | disable} set dhgrp {1 | 2 | 5 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21} set suite-b {disable | suite-b-gcm-128 | suite-b-gcm-256} set eap {enable | disable} set eap-identity {use-id-payload | send-request} set acct-verify {enable | disable} set wizard-type {custom | dialup-forticlient | dialup-ios | dialup-android | dialu p-windows | dialup-cisco | static-fortigate | dialup-fortigate | static-cisco | dialup CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 718 p-windows | dialup-cisco | static-fortigate | dialup-fortigate | static-cisco | dialup -cisco-fw} set xauthtype {disable | client | pap | chap | auto} set reauth {disable | enable} set authusr <string> set authpasswd <password> set authusrgrp <string> set mesh-selector-type {disable | subnet | host} set idle-timeout {enable | disable} set idle-timeoutinterval <integer> set ha-sync-esp-seqno {enable | disable} set nattraversal {enable | disable | forced} set esn {require | allow | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 719 Description Configuration Description Default Value name IPsec remote gateway name. (Empty) type Remote gateway type (static, dialup, or DDNS). static interface Local outgoing interface. (Empty) ike-version IKE protocol version (IKEv1 or IKEv2). 1 remote-gw Remote VPN gateway. 0.0.0.0 local-gw Local VPN gateway. 0.0.0.0 remotegw-ddns Domain name of remote gateway (eg. name.DDNS.com). (Empty) keylife Phase1 keylife. 86400 certificate Certificate name for signature. (Empty) authmethod Authentication method. psk mode Mode. main peertype Peer type. any peerid Peer ID. (Empty) usrgrp User group. (Empty) peer Accept this peer certificate. (Empty) peergrp Accept this peer certificate group. (Empty) autoconfig Auto-configuration type. mode-cfg Enable/disable configuration method. disable assign-ip Enable/disable assignment of IP to IPsec interface via configuration method. enable assign-ip-from Method by which the IP address will be assigned. range ipv4-start-ip Start of IPv4 range. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 720 ipv4-end-ip End of IPv4 range. 0.0.0.0 ipv4-netmask IPv4 Netmask. 255.255.255.255 dns-mode DNS server mode. manual ipv4-dns-server1 IPv4 DNS server 1. 0.0.0.0 ipv4-dns-server2 IPv4 DNS server 2. 0.0.0.0 ipv4-dns-server3 IPv4 DNS server 3. 0.0.0.0 ipv4-wins-server1 WINS server 1. 0.0.0.0 ipv4-wins-server2 WINS server 2. 0.0.0.0 ipv4-exclude-range Configuration Method IPv4 exclude ranges. (Empty) ipv4-split-include IPv4 split-include subnets. (Empty) split-include-service Split-include services. (Empty) ipv6-start-ip Start of IPv6 range. :: ipv6-end-ip End of IPv6 range. :: ipv6-prefix IPv6 prefix. 128 ipv6-dns-server1 IPv6 DNS server 1. :: ipv6-dns-server2 IPv6 DNS server 2. :: ipv6-dns-server3 IPv6 DNS server 3. :: ipv6-exclude-range Configuration method IPv6 exclude ranges. (Empty) ipv6-split-include IPv6 split-include subnets. (Empty) unity-support Enable/disable support for Cisco UNITY Configuration Method extensions. enable domain Instruct unity clients about the default DNS domain. (Empty) banner Message that unity client should display after connecting. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 721 include-local-lan Enable/disable allow local LAN access on unity clients. disable save-password Enable/disable saving XAuth username and password on VPN clients. disable client-auto-negotiate Enable/disable allowing the VPN client to bring up the tunnel when there is no traffic. disable client-keep-alive Enable/disable allowing the VPN client to keep the tunnel up when there is no traffic. disable backup-gateway Instruct unity clients about the backup gateway address(es). (Empty) proposal Phase1 proposal. aes128-sha256 aes256-sha256 3dessha256 aes128-sha1 aes256-sha1 3dessha1 add-route Enable/disable control addition of a route to peer destination selector. disable exchange-interface-ip Enable/disable exchange of IPsec interface IP address. disable add-gw-route Enable/disable automatically add a route to the remote gateway. disable psksecret Pre-shared secret for PSK authentication. (Empty) keepalive NAT-T keep alive interval. 10 distance Distance for routes added by IKE (1 - 255). 15 priority Priority for routes added by IKE (0 4294967295). 0 localid Local ID. (Empty) localid-type Local ID type. auto auto-negotiate Enable/disable automatic initiation of IKE SA negotiation. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 722 negotiate-timeout IKE SA negotiation timeout in seconds (1 - 300). 30 fragmentation Enable/disable fragment IKE message on retransmission. enable dpd Dead Peer Detection mode. on-demand dpd-retrycount Number of DPD retry attempts. 3 dpd-retryinterval DPD retry interval. 20 forticlient-enforcement Enable/disable FortiClient enforcement. disable comments Comment. (Empty) npu-offload Enable/disable offloading NPU. enable send-cert-chain Enable/disable sending certificate chain. enable dhgrp DH group. 14 5 suite-b Use Suite-B. disable eap Enable/disable IKEv2 EAP authentication. disable eap-identity IKEv2 EAP peer identity type. use-id-payload acct-verify Enable/disable verification of RADIUS accounting record. disable wizard-type GUI VPN Wizard Type. custom xauthtype XAuth type. disable reauth Enable/disable re-authentication upon IKE SA lifetime expiration. disable authusr XAuth user name. (Empty) authpasswd XAuth password (max 35 characters). (Empty) authusrgrp Authentication user group. (Empty) mesh-selector-type Add selectors containing subsets of the configuration depending on traffic. disable idle-timeout Enable/disable IPsec tunnel idle timeout. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 723 idle-timeoutinterval IPsec tunnel idle timeout in minutes (10 - 43200). 15 ha-sync-esp-seqno Enable/disable sequence number jump ahead for IPsec HA. enable nattraversal Enable/disable NAT traversal. enable esn Extended sequence number (ESN) negotiation. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 724 vpn.ipsec/phase1-interface CLI Syntax config vpn.ipsec phase1-interface edit <name_str> set name <string> set type {static | dynamic | ddns} set interface <string> set ip-version {4 | 6} set ike-version {1 | 2} set local-gw <ipv4-address> set local-gw6 <ipv6-address> set remote-gw <ipv4-address> set remote-gw6 <ipv6-address> set remotegw-ddns <string> set keylife <integer> config certificate edit <name_str> set name <string> end set authmethod {psk | rsa-signature | signature} set mode {aggressive | main} set peertype {any | one | dialup | peer | peergrp} set peerid <string> set default-gw <ipv4-address> set default-gw-priority <integer> set usrgrp <string> set peer <string> set peergrp <string> set monitor <string> set monitor-hold-down-type {immediate | delay | time} set monitor-hold-down-delay <integer> set monitor-hold-down-weekday {everyday | sunday | monday | tuesday | wednesday | thursday | friday | saturday} set monitor-hold-down-time <user> set mode-cfg {disable | enable} set assign-ip {disable | enable} set assign-ip-from {range | usrgrp | dhcp} set ipv4-start-ip <ipv4-address> set ipv4-end-ip <ipv4-address> set ipv4-netmask <ipv4-netmask> set dns-mode {manual | auto} set ipv4-dns-server1 <ipv4-address> set ipv4-dns-server2 <ipv4-address> set ipv4-dns-server3 <ipv4-address> set ipv4-wins-server1 <ipv4-address> set ipv4-wins-server2 <ipv4-address> config ipv4-exclude-range edit <name_str> set id <integer> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 725 set start-ip <ipv4-address> set end-ip <ipv4-address> end set ipv4-split-include <string> set split-include-service <string> set ipv6-start-ip <ipv6-address> set ipv6-end-ip <ipv6-address> set ipv6-prefix <integer> set ipv6-dns-server1 <ipv6-address> set ipv6-dns-server2 <ipv6-address> set ipv6-dns-server3 <ipv6-address> config ipv6-exclude-range edit <name_str> set id <integer> set start-ip <ipv6-address> set end-ip <ipv6-address> end set ipv6-split-include <string> set unity-support {disable | enable} set domain <string> set banner <var-string> set include-local-lan {disable | enable} set save-password {disable | enable} set client-auto-negotiate {disable | enable} set client-keep-alive {disable | enable} config backup-gateway edit <name_str> set address <string> end set proposal {des-md5 | des-sha1 | des-sha256 | des-sha384 | des-sha512 | 3des-md5 | 3des-sha1 | 3des-sha256 | 3des-sha384 | 3des-sha512 | aes128-md5 | aes128-sha1 | ae s128-sha256 | aes128-sha384 | aes128-sha512 | aes192-md5 | aes192-sha1 | aes192-sha256 | aes192-sha384 | aes192-sha512 | aes256-md5 | aes256-sha1 | aes256-sha256 | aes256-s ha384 | aes256-sha512 | aria128-md5 | aria128-sha1 | aria128-sha256 | aria128-sha384 | aria128-sha512 | aria192-md5 | aria192-sha1 | aria192-sha256 | aria192-sha384 | aria1 92-sha512 | aria256-md5 | aria256-sha1 | aria256-sha256 | aria256-sha384 | aria256-sha 512 | seed-md5 | seed-sha1 | seed-sha256 | seed-sha384 | seed-sha512} set add-route {disable | enable} set exchange-interface-ip {enable | disable} set add-gw-route {enable | disable} set psksecret <password> set keepalive <integer> set distance <integer> set priority <integer> set localid <string> set localid-type {auto | fqdn | user-fqdn | keyid | address | asn1dn} set auto-negotiate {enable | disable} set negotiate-timeout <integer> set fragmentation {enable | disable} set dpd {disable | on-idle | on-demand} set dpd-retrycount <integer> set dpd-retryinterval <user> set forticlient-enforcement {enable | disable} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 726 set forticlient-enforcement {enable | disable} set comments <var-string> set npu-offload {enable | disable} set send-cert-chain {enable | disable} set dhgrp {1 | 2 | 5 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21} set suite-b {disable | suite-b-gcm-128 | suite-b-gcm-256} set eap {enable | disable} set eap-identity {use-id-payload | send-request} set acct-verify {enable | disable} set wizard-type {custom | dialup-forticlient | dialup-ios | dialup-android | dialu p-windows | dialup-cisco | static-fortigate | dialup-fortigate | static-cisco | dialup -cisco-fw} set xauthtype {disable | client | pap | chap | auto} set reauth {disable | enable} set authusr <string> set authpasswd <password> set authusrgrp <string> set mesh-selector-type {disable | subnet | host} set idle-timeout {enable | disable} set idle-timeoutinterval <integer> set ha-sync-esp-seqno {enable | disable} set auto-discovery-sender {enable | disable} set auto-discovery-receiver {enable | disable} set auto-discovery-forwarder {enable | disable} set auto-discovery-psk {enable | disable} set encapsulation {none | gre | vxlan} set encapsulation-address {ike | ipv4 | ipv6} set encap-local-gw4 <ipv4-address> set encap-local-gw6 <ipv6-address> set encap-remote-gw4 <ipv4-address> set encap-remote-gw6 <ipv6-address> set nattraversal {enable | disable | forced} set esn {require | allow | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 727 Description Configuration Description Default Value name IPsec remote gateway name. (Empty) type Remote gateway type (static, dialup, or DDNS). static interface Local outgoing interface. (Empty) ip-version IP version to use for VPN interface. 4 ike-version IKE protocol version (IKEv1 or IKEv2). 1 local-gw Local IPv4 address of VPN. 0.0.0.0 local-gw6 Local IPv6 address of VPN. :: remote-gw Remote IPv4 address of VPN gateway. 0.0.0.0 remote-gw6 Remote IPv6 address of VPN. :: remotegw-ddns Domain name of remote gateway (eg. name.DDNS.com). (Empty) keylife Phase1 keylife. 86400 certificate Certificate name for signature. (Empty) authmethod Authentication method. psk mode Mode. main peertype Peer type. any peerid Peer ID. (Empty) default-gw IPv4 address of default route gateway to use for traffic exiting the interface. 0.0.0.0 default-gw-priority Priority for default gateway route. 0 usrgrp User group. (Empty) peer Accept this peer certificate. (Empty) peergrp Accept this peer certificate group. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 728 monitor IPsec interface to backup. (Empty) monitor-hold-down-type Control recovery time when primary reestablishes. immediate monitor-hold-downdelay Number of seconds to wait before recovery once primary re-establishes. 0 monitor-hold-downweekday Day of the week to recover once primary reestablishes. sunday monitor-hold-down-time Time of day to recover once primary reestablishes. 00:00 mode-cfg Enable/disable configuration method. disable assign-ip Enable/disable assignment of IP to IPsec interface via configuration method. enable assign-ip-from Method by which the IP address will be assigned. range ipv4-start-ip Start of IPv4 range. 0.0.0.0 ipv4-end-ip End of IPv4 range. 0.0.0.0 ipv4-netmask IPv4 Netmask. 255.255.255.255 dns-mode DNS server mode. manual ipv4-dns-server1 IPv4 DNS server 1. 0.0.0.0 ipv4-dns-server2 IPv4 DNS server 2. 0.0.0.0 ipv4-dns-server3 IPv4 DNS server 3. 0.0.0.0 ipv4-wins-server1 WINS server 1. 0.0.0.0 ipv4-wins-server2 WINS server 2. 0.0.0.0 ipv4-exclude-range Configuration Method IPv4 exclude ranges. (Empty) ipv4-split-include IPv4 split-include subnets. (Empty) split-include-service Split-include services. (Empty) ipv6-start-ip Start of IPv6 range. :: CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 729 ipv6-end-ip End of IPv6 range. :: ipv6-prefix IPv6 prefix. 128 ipv6-dns-server1 IPv6 DNS server 1. :: ipv6-dns-server2 IPv6 DNS server 2. :: ipv6-dns-server3 IPv6 DNS server 3. :: ipv6-exclude-range Configuration method IPv6 exclude ranges. (Empty) ipv6-split-include IPv6 split-include subnets. (Empty) unity-support Enable/disable support for Cisco UNITY Configuration Method extensions. enable domain Instruct unity clients about the default DNS domain. (Empty) banner Message that unity client should display after connecting. (Empty) include-local-lan Enable/disable allow local LAN access on unity clients. disable save-password Enable/disable saving XAuth username and password on VPN clients. disable client-auto-negotiate Enable/disable allowing the VPN client to bring up the tunnel when there is no traffic. disable client-keep-alive Enable/disable allowing the VPN client to keep the tunnel up when there is no traffic. disable backup-gateway Instruct unity clients about the backup gateway address(es). (Empty) proposal Phase1 proposal. aes128-sha256 aes256-sha256 3dessha256 aes128-sha1 aes256-sha1 3dessha1 add-route Enable/disable control addition of a route to peer destination selector. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 730 exchange-interface-ip Enable/disable exchange of IPsec interface IP address. disable add-gw-route Enable/disable automatically add a route to the remote gateway. disable psksecret Pre-shared secret for PSK authentication. (Empty) keepalive NAT-T keep alive interval. 10 distance Distance for routes added by IKE (1 - 255). 15 priority Priority for routes added by IKE (0 4294967295). 0 localid Local ID. (Empty) localid-type Local ID type. auto auto-negotiate Enable/disable automatic initiation of IKE SA negotiation. enable negotiate-timeout IKE SA negotiation timeout in seconds (1 - 300). 30 fragmentation Enable/disable fragment IKE message on retransmission. enable dpd Dead Peer Detection mode. on-demand dpd-retrycount Number of DPD retry attempts. 3 dpd-retryinterval DPD retry interval. 20 forticlient-enforcement Enable/disable FortiClient enforcement. disable comments Comment. (Empty) npu-offload Enable/disable offloading NPU. enable send-cert-chain Enable/disable sending certificate chain. enable dhgrp DH group. 14 5 suite-b Use Suite-B. disable eap Enable/disable IKEv2 EAP authentication. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 731 eap-identity IKEv2 EAP peer identity type. use-id-payload acct-verify Enable/disable verification of RADIUS accounting record. disable wizard-type GUI VPN Wizard Type. custom xauthtype XAuth type. disable reauth Enable/disable re-authentication upon IKE SA lifetime expiration. disable authusr XAuth user name. (Empty) authpasswd XAuth password (max 35 characters). (Empty) authusrgrp Authentication user group. (Empty) mesh-selector-type Add selectors containing subsets of the configuration depending on traffic. disable idle-timeout Enable/disable IPsec tunnel idle timeout. disable idle-timeoutinterval IPsec tunnel idle timeout in minutes (10 - 43200). 15 ha-sync-esp-seqno Enable/disable sequence number jump ahead for IPsec HA. enable auto-discovery-sender Enable/disable sending auto-discovery short-cut messages. disable auto-discovery-receiver Enable/disable accepting auto-discovery short-cut messages. disable auto-discoveryforwarder Enable/disable forwarding auto-discovery shortcut messages. disable auto-discovery-psk Enable/disable use of pre-shared secrets for authentication of auto-discovery tunnels. disable encapsulation Enable/disable GRE/VXLAN encapsulation. none encapsulation-address Source for GRE/VXLAN tunnel address. ike encap-local-gw4 Local IPv4 address of GRE/VXLAN tunnel. 0.0.0.0 encap-local-gw6 Local IPv6 address of GRE/VXLAN tunnel. :: CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 732 encap-remote-gw4 Remote IPv4 address of GRE/VXLAN tunnel. 0.0.0.0 encap-remote-gw6 Remote IPv6 address of GRE/VXLAN tunnel. :: nattraversal Enable/disable NAT traversal. enable esn Extended sequence number (ESN) negotiation. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 733 vpn.ipsec/phase2 CLI Syntax config vpn.ipsec phase2 edit <name_str> set name <string> set phase1name <string> set dhcp-ipsec {enable | disable} set use-natip {enable | disable} set selector-match {exact | subset | auto} set proposal {null-md5 | null-sha1 | null-sha256 | null-sha384 | null-sha512 | des -null | des-md5 | des-sha1 | des-sha256 | des-sha384 | des-sha512 | 3des-null | 3des-m d5 | 3des-sha1 | 3des-sha256 | 3des-sha384 | 3des-sha512 | aes128-null | aes128-md5 | aes128-sha1 | aes128-sha256 | aes128-sha384 | aes128-sha512 | aes128gcm | aes192-null | aes192-md5 | aes192-sha1 | aes192-sha256 | aes192-sha384 | aes192-sha512 | aes256-nu ll | aes256-md5 | aes256-sha1 | aes256-sha256 | aes256-sha384 | aes256-sha512 | aes256 gcm | aria128-null | aria128-md5 | aria128-sha1 | aria128-sha256 | aria128-sha384 | ar ia128-sha512 | aria192-null | aria192-md5 | aria192-sha1 | aria192-sha256 | aria192-sh a384 | aria192-sha512 | aria256-null | aria256-md5 | aria256-sha1 | aria256-sha256 | a ria256-sha384 | aria256-sha512 | seed-null | seed-md5 | seed-sha1 | seed-sha256 | seed -sha384 | seed-sha512} set pfs {enable | disable} set dhgrp {1 | 2 | 5 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21} set replay {enable | disable} set keepalive {enable | disable} set auto-negotiate {enable | disable} set add-route {phase1 | enable | disable} set keylifeseconds <integer> set keylifekbs <integer> set keylife-type {seconds | kbs | both} set single-source {enable | disable} set route-overlap {use-old | use-new | allow} set encapsulation {tunnel-mode | transport-mode} set l2tp {enable | disable} set comments <var-string> set protocol <integer> set src-name <string> set src-name6 <string> set src-addr-type {subnet | range | ip | name} set src-start-ip <ipv4-address-any> set src-start-ip6 <ipv6-address> set src-end-ip <ipv4-address-any> set src-end-ip6 <ipv6-address> set src-subnet <ipv4-classnet-any> set src-subnet6 <ipv6-prefix> set src-port <integer> set dst-name <string> set dst-name6 <string> set dst-addr-type {subnet | range | ip | name} set dst-start-ip <ipv4-address-any> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 734 set set set set set set end dst-start-ip6 <ipv6-address> dst-end-ip <ipv4-address-any> dst-end-ip6 <ipv6-address> dst-subnet <ipv4-classnet-any> dst-subnet6 <ipv6-prefix> dst-port <integer> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 735 Description Configuration Description Default Value name IPsec tunnel name. (Empty) phase1name IKE phase1 name. (Empty) dhcp-ipsec Enable/disable DHCP-IPsec. disable use-natip Enable/disable source NAT selector fix-up. enable selector-match Match type to use when comparing selectors. auto proposal Phase2 proposal. aes128-sha1 aes256sha1 3des-sha1 aes128-sha256 aes256-sha256 3dessha256 pfs Enable/disable PFS feature. enable dhgrp Phase2 DH group. 14 5 replay Enable/disable replay detection. enable keepalive Enable/disable keep alive. disable auto-negotiate Enable/disable IPsec SA auto-negotiation. disable add-route Enable/disable automatic route addition. phase1 keylifeseconds Phase2 key life in time in seconds (120 172800). 43200 keylifekbs Phase2 key life in number of bytes of traffic (5120 - 4294967295). 5120 keylife-type Keylife type. seconds single-source Enable/disable single source IP restriction. disable route-overlap Action for overlapping routes. use-new encapsulation ESP encapsulation mode. tunnel-mode l2tp Enable/disable L2TP over IPsec. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 736 comments Comment. (Empty) protocol Quick mode protocol selector (1 - 255 or 0 for all). 0 src-name Local proxy ID name. (Empty) src-name6 Local proxy ID name. (Empty) src-addr-type Local proxy ID type. subnet src-start-ip Local proxy ID start. 0.0.0.0 src-start-ip6 Local proxy ID IPv6 start. :: src-end-ip Local proxy ID end. 0.0.0.0 src-end-ip6 Local proxy ID IPv6 end. :: src-subnet Local proxy ID subnet. 0.0.0.0 0.0.0.0 src-subnet6 Local proxy ID IPv6 subnet. ::/0 src-port Quick mode source port (1 - 65535 or 0 for all). 0 dst-name Remote proxy ID name. (Empty) dst-name6 Remote proxy ID name. (Empty) dst-addr-type Remote proxy ID type. subnet dst-start-ip Remote proxy ID IPv4 start. 0.0.0.0 dst-start-ip6 Remote proxy ID IPv6 start. :: dst-end-ip Remote proxy ID IPv4 end. 0.0.0.0 dst-end-ip6 Remote proxy ID IPv6 end. :: dst-subnet Remote proxy ID IPv4 subnet. 0.0.0.0 0.0.0.0 dst-subnet6 Remote proxy ID IPv6 subnet. ::/0 dst-port Quick mode destination port (1 - 65535 or 0 for all). 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 737 vpn.ipsec/phase2-interface CLI Syntax config vpn.ipsec phase2-interface edit <name_str> set name <string> set phase1name <string> set dhcp-ipsec {enable | disable} set proposal {null-md5 | null-sha1 | null-sha256 | null-sha384 | null-sha512 | des -null | des-md5 | des-sha1 | des-sha256 | des-sha384 | des-sha512 | 3des-null | 3des-m d5 | 3des-sha1 | 3des-sha256 | 3des-sha384 | 3des-sha512 | aes128-null | aes128-md5 | aes128-sha1 | aes128-sha256 | aes128-sha384 | aes128-sha512 | aes128gcm | aes192-null | aes192-md5 | aes192-sha1 | aes192-sha256 | aes192-sha384 | aes192-sha512 | aes256-nu ll | aes256-md5 | aes256-sha1 | aes256-sha256 | aes256-sha384 | aes256-sha512 | aes256 gcm | aria128-null | aria128-md5 | aria128-sha1 | aria128-sha256 | aria128-sha384 | ar ia128-sha512 | aria192-null | aria192-md5 | aria192-sha1 | aria192-sha256 | aria192-sh a384 | aria192-sha512 | aria256-null | aria256-md5 | aria256-sha1 | aria256-sha256 | a ria256-sha384 | aria256-sha512 | seed-null | seed-md5 | seed-sha1 | seed-sha256 | seed -sha384 | seed-sha512} set pfs {enable | disable} set dhgrp {1 | 2 | 5 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21} set replay {enable | disable} set keepalive {enable | disable} set auto-negotiate {enable | disable} set add-route {phase1 | enable | disable} set auto-discovery-sender {phase1 | enable | disable} set auto-discovery-forwarder {phase1 | enable | disable} set keylifeseconds <integer> set keylifekbs <integer> set keylife-type {seconds | kbs | both} set single-source {enable | disable} set route-overlap {use-old | use-new | allow} set encapsulation {tunnel-mode | transport-mode} set l2tp {enable | disable} set comments <var-string> set protocol <integer> set src-name <string> set src-name6 <string> set src-addr-type {subnet | range | ip | name | subnet6 | range6 | ip6 | name6} set src-start-ip <ipv4-address-any> set src-start-ip6 <ipv6-address> set src-end-ip <ipv4-address-any> set src-end-ip6 <ipv6-address> set src-subnet <ipv4-classnet-any> set src-subnet6 <ipv6-prefix> set src-port <integer> set dst-name <string> set dst-name6 <string> set dst-addr-type {subnet | range | ip | name | subnet6 | range6 | ip6 | name6} set dst-start-ip <ipv4-address-any> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 738 set set set set set set end dst-start-ip6 <ipv6-address> dst-end-ip <ipv4-address-any> dst-end-ip6 <ipv6-address> dst-subnet <ipv4-classnet-any> dst-subnet6 <ipv6-prefix> dst-port <integer> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 739 Description Configuration Description Default Value name IPsec tunnel name. (Empty) phase1name IKE phase1 name. (Empty) dhcp-ipsec Enable/disable DHCP-IPsec. disable proposal Phase2 proposal. aes128-sha1 aes256sha1 3des-sha1 aes128-sha256 aes256-sha256 3dessha256 pfs Enable/disable PFS feature. enable dhgrp Phase2 DH group. 14 5 replay Enable/disable replay detection. enable keepalive Enable/disable keep alive. disable auto-negotiate Enable/disable IPsec SA auto-negotiation. disable add-route Enable/disable automatic route addition. phase1 auto-discovery-sender Enable/disable sending short-cut messages. phase1 auto-discoveryforwarder Enable/disable forwarding short-cut messages. phase1 keylifeseconds Phase2 key life in time in seconds (120 172800). 43200 keylifekbs Phase2 key life in number of bytes of traffic (5120 - 4294967295). 5120 keylife-type Keylife type. seconds single-source Enable/disable single source IP restriction. disable route-overlap Action for overlapping routes. use-new encapsulation ESP encapsulation mode. tunnel-mode CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 740 l2tp Enable/disable L2TP over IPsec. disable comments Comment. (Empty) protocol Quick mode protocol selector (1 - 255 or 0 for all). 0 src-name Local proxy ID name. (Empty) src-name6 Local proxy ID name. (Empty) src-addr-type Local proxy ID type. subnet src-start-ip Local proxy ID start. 0.0.0.0 src-start-ip6 Local proxy ID IPv6 start. :: src-end-ip Local proxy ID end. 0.0.0.0 src-end-ip6 Local proxy ID IPv6 end. :: src-subnet Local proxy ID subnet. 0.0.0.0 0.0.0.0 src-subnet6 Local proxy ID IPv6 subnet. ::/0 src-port Quick mode source port (1 - 65535 or 0 for all). 0 dst-name Remote proxy ID name. (Empty) dst-name6 Remote proxy ID name. (Empty) dst-addr-type Remote proxy ID type. subnet dst-start-ip Remote proxy ID IPv4 start. 0.0.0.0 dst-start-ip6 Remote proxy ID IPv6 start. :: dst-end-ip Remote proxy ID IPv4 end. 0.0.0.0 dst-end-ip6 Remote proxy ID IPv6 end. :: dst-subnet Remote proxy ID IPv4 subnet. 0.0.0.0 0.0.0.0 dst-subnet6 Remote proxy ID IPv6 subnet. ::/0 dst-port Quick mode destination port (1 - 65535 or 0 for all). 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 741 vpn.ssl.web/host-check-software CLI Syntax config vpn.ssl.web host-check-software edit <name_str> set name <string> set type {av | fw} set version <string> set guid <user> config check-item-list edit <name_str> set id <integer> set action {require | deny} set type {file | registry | process} set target <string> set version <string> config md5s edit <name_str> set id <string> end end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 742 Description Configuration Description Default Value name Name. (Empty) type Type. av version Version. (Empty) guid Globally unique ID. "00000000-0000-00000000-000000000000" check-item-list Check item list. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 743 vpn.ssl.web/portal CLI Syntax config vpn.ssl.web portal edit <name_str> set name <string> set tunnel-mode {enable | disable} set ip-mode {range | user-group} set auto-connect {enable | disable} set keep-alive {enable | disable} set save-password {enable | disable} config ip-pools edit <name_str> set name <string> end set exclusive-routing {enable | disable} set service-restriction {enable | disable} set split-tunneling {enable | disable} config split-tunneling-routing-address edit <name_str> set name <string> end set dns-server1 <ipv4-address> set dns-server2 <ipv4-address> set wins-server1 <ipv4-address> set wins-server2 <ipv4-address> set ipv6-tunnel-mode {enable | disable} config ipv6-pools edit <name_str> set name <string> end set ipv6-exclusive-routing {enable | disable} set ipv6-service-restriction {enable | disable} set ipv6-split-tunneling {enable | disable} config ipv6-split-tunneling-routing-address edit <name_str> set name <string> end set ipv6-dns-server1 <ipv6-address> set ipv6-dns-server2 <ipv6-address> set ipv6-wins-server1 <ipv6-address> set ipv6-wins-server2 <ipv6-address> set web-mode {enable | disable} set display-bookmark {enable | disable} set user-bookmark {enable | disable} set user-group-bookmark {enable | disable} config bookmark-group edit <name_str> set name <string> config bookmarks CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 744 edit <name_str> set name <string> set apptype {citrix | ftp | portforward | rdp | rdpnative | smb | ssh | te lnet | vnc | web} set url <var-string> set host <var-string> set folder <var-string> set additional-params <var-string> set listening-port <integer> set remote-port <integer> set show-status-window {enable | disable} set description <var-string> set server-layout {en-us-qwerty | de-de-qwertz | fr-fr-azerty | it-it-qwer ty | sv-se-qwerty | failsafe} set security {rdp | nla | tls | any} set port <integer> set logon-user <var-string> set logon-password <password> set sso {disable | static | auto} config form-data edit <name_str> set name <string> set value <var-string> end set sso-credential {sslvpn-login | alternative} set sso-username <var-string> set sso-password <password> end end set display-connection-tools {enable | disable} set display-history {enable | disable} set display-status {enable | disable} set heading <string> set redir-url <var-string> set theme {blue | green | red | melongene | mariner} set custom-lang <string> set host-check {none | av | fw | av-fw | custom} set host-check-interval <integer> config host-check-policy edit <name_str> set name <string> end set limit-user-logins {enable | disable} set mac-addr-check {enable | disable} set mac-addr-action {allow | deny} config mac-addr-check-rule edit <name_str> set name <string> set mac-addr-mask <integer> config mac-addr-list edit <name_str> set addr <mac-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 745 end end set os-check {enable | disable} config os-check-list edit <name_str> set name <string> set action {deny | allow | check-up-to-date} set tolerance <integer> set latest-patch-level <user> end set virtual-desktop {enable | disable} set virtual-desktop-app-list <string> set virtual-desktop-clipboard-share {enable | disable} set virtual-desktop-desktop-switch {enable | disable} set virtual-desktop-logout-when-browser-close {enable | disable} set virtual-desktop-network-share-access {enable | disable} set virtual-desktop-printing {enable | disable} set virtual-desktop-removable-media-access {enable | disable} set skip-check-for-unsupported-os {enable | disable} set skip-check-for-unsupported-browser {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 746 Description Configuration Description Default Value name Portal name. (Empty) tunnel-mode Enable/disable SSL VPN tunnel mode. disable ip-mode IP mode is range or by user group. range auto-connect Enable/disable automatic connect by client when system is up. disable keep-alive Enable/disable automatic re-connect by client. disable save-password Enable/disable save of user password by client. disable ip-pools Tunnel IP pools. (Empty) exclusive-routing Enable/disable all traffic go through tunnel only. disable service-restriction Enable/disable tunnel service restriction. disable split-tunneling Enable/disable split tunneling. enable split-tunneling-routingaddress Split tunnelling address range for client routing. (Empty) dns-server1 DNS server 1. 0.0.0.0 dns-server2 DNS server 2. 0.0.0.0 wins-server1 WINS server 1. 0.0.0.0 wins-server2 WINS server 2. 0.0.0.0 ipv6-tunnel-mode Enable/disable SSL VPN IPV6 tunnel mode. disable ipv6-pools Tunnel IP pools. (Empty) ipv6-exclusive-routing Enable/disable all IPv6 traffic go through tunnel only. disable ipv6-service-restriction Enable/disable IPv6 tunnel service restriction. disable ipv6-split-tunneling Enable/disable IPv6 split tunneling. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 747 ipv6-split-tunnelingrouting-address IPv6 split tunnelling address range for client routing. (Empty) ipv6-dns-server1 IPv6 DNS server 1. :: ipv6-dns-server2 IPv6 DNS server 2. :: ipv6-wins-server1 IPv6 WINS server 1. :: ipv6-wins-server2 IPv6 WINS server 2. :: web-mode Enable/disable SSL VPN web mode. disable display-bookmark Enable/disable displaying of bookmark widget. enable user-bookmark Enable/disable user defined bookmark. enable user-group-bookmark Enable/disable user group defined bookmark. enable bookmark-group Portal bookmark group. (Empty) display-connectiontools Enable/disable displaying of connection tools widget. enable display-history Enable/disable displaying of user login history widget. enable display-status Enable/disable display of status widget. enable heading Portal heading message. SSL-VPN Portal redir-url Client login redirect URL. (Empty) theme Color scheme for the portal. blue custom-lang Custom portal language. (Empty) host-check Configure host check settings. none host-check-interval Periodic host check interval. 0 host-check-policy Host check policy. (Empty) limit-user-logins Enable/disable allow users to have only one active SSL VPN connection at a time. disable mac-addr-check Client MAC address check. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 748 mac-addr-action Client MAC address action. allow mac-addr-check-rule Client MAC address check rule. (Empty) os-check Enable/disable SSL VPN OS check. disable os-check-list SSL VPN OS checks. (Empty) virtual-desktop Enable/disable SSL VPN virtual desktop. disable virtual-desktop-app-list Virtual desktop application list. (Empty) virtual-desktopclipboard-share Enable/disable sharing of clipboard in virtual desktop. disable virtual-desktopdesktop-switch Enable/disable switch to virtual desktop. enable virtual-desktop-logoutwhen-browser-close Enable/disable logout when browser is close in virtual desktop. disable virtual-desktopnetwork-share-access Enable/disable network share access in virtual desktop. disable virtual-desktop-printing Enable/disable printing in virtual desktop. disable virtual-desktopremovable-mediaaccess Enable/disable access to removable media in virtual desktop. disable skip-check-forunsupported-os Skip check for unsupported OS. enable skip-check-forunsupported-browser Skip check for unsupported browsers. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 749 vpn.ssl.web/realm CLI Syntax config vpn.ssl.web realm edit <name_str> set url-path <string> set max-concurrent-user <integer> set login-page <var-string> set virtual-host <var-string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 750 Description Configuration Description Default Value url-path URL path to access SSL-VPN login page. (Empty) max-concurrent-user Maximum concurrent users (0 - 65535, 0 for unlimited). 0 login-page Replacement HTML for SSL-VPN login page. (Empty) virtual-host Virtual host name for realm. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 751 vpn.ssl.web/user-bookmark CLI Syntax config vpn.ssl.web user-bookmark edit <name_str> set name <string> set custom-lang <string> config bookmarks edit <name_str> set name <string> set apptype {citrix | ftp | portforward | rdp | rdpnative | smb | ssh | telnet | vnc | web} set url <var-string> set host <var-string> set folder <var-string> set additional-params <var-string> set listening-port <integer> set remote-port <integer> set show-status-window {enable | disable} set description <var-string> set server-layout {en-us-qwerty | de-de-qwertz | fr-fr-azerty | it-it-qwerty | sv-se-qwerty | failsafe} set security {rdp | nla | tls | any} set port <integer> set logon-user <var-string> set logon-password <password> set sso {disable | static | auto} config form-data edit <name_str> set name <string> set value <var-string> end set sso-credential {sslvpn-login | alternative} set sso-username <var-string> set sso-password <password> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 752 Description Configuration Description Default Value name User and group name. (Empty) custom-lang Personal language. (Empty) bookmarks Bookmark table. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 753 vpn.ssl.web/virtual-desktop-app-list CLI Syntax config vpn.ssl.web virtual-desktop-app-list edit <name_str> set name <string> set action {allow | block} config apps edit <name_str> set name <string> config md5s edit <name_str> set id <string> end end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 754 Description Configuration Description Default Value name Application list name. (Empty) action Action. allow apps Applications. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 755 vpn.ssl/settings CLI Syntax config vpn.ssl settings edit <name_str> set reqclientcert {enable | disable} set sslv3 {enable | disable} set tlsv1-0 {enable | disable} set tlsv1-1 {enable | disable} set tlsv1-2 {enable | disable} set banned-cipher {RSA | DH | DHE | ECDH | ECDHE | DSS | ECDSA | AES | AESGCM | CA MELLIA | 3DES | SHA1 | SHA256 | SHA384} set ssl-big-buffer {enable | disable} set ssl-insert-empty-fragment {enable | disable} set https-redirect {enable | disable} set ssl-client-renegotiation {disable | enable} set force-two-factor-auth {enable | disable} set unsafe-legacy-renegotiation {enable | disable} set servercert <string> set algorithm {high | medium | default | low} set idle-timeout <integer> set auth-timeout <integer> config tunnel-ip-pools edit <name_str> set name <string> end config tunnel-ipv6-pools edit <name_str> set name <string> end set dns-suffix <var-string> set dns-server1 <ipv4-address> set dns-server2 <ipv4-address> set wins-server1 <ipv4-address> set wins-server2 <ipv4-address> set ipv6-dns-server1 <ipv6-address> set ipv6-dns-server2 <ipv6-address> set ipv6-wins-server1 <ipv6-address> set ipv6-wins-server2 <ipv6-address> set route-source-interface {enable | disable} set url-obscuration {enable | disable} set http-compression {enable | disable} set http-only-cookie {enable | disable} set deflate-compression-level <integer> set deflate-min-data-size <integer> set port <integer> set port-precedence {enable | disable} set auto-tunnel-static-route {enable | disable} set header-x-forwarded-for {pass | add | remove} config source-interface CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 756 edit <name_str> set name <string> end config source-address edit <name_str> set name <string> end set source-address-negate {enable | disable} config source-address6 edit <name_str> set name <string> end set source-address6-negate {enable | disable} set default-portal <string> config authentication-rule edit <name_str> set id <integer> config source-interface edit <name_str> set name <string> end config source-address edit <name_str> set name <string> end set source-address-negate {enable | disable} config source-address6 edit <name_str> set name <string> end set source-address6-negate {enable | disable} config users edit <name_str> set name <string> end config groups edit <name_str> set name <string> end set portal <string> set realm <string> set client-cert {enable | disable} set cipher {any | high | medium} set auth {any | local | radius | tacacs+ | ldap} end set dtls-tunnel {enable | disable} set check-referer {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 757 Description Configuration Description Default Value reqclientcert Enable/disable require client certificate. disable sslv3 Enable/disable SSLv3. disable tlsv1-0 Enable/disable TLSv1.0. disable tlsv1-1 Enable/disable TLSv1.1. enable tlsv1-2 Enable/disable TLSv1.2. enable banned-cipher Banned ciphers for SSLVPN (Empty) ssl-big-buffer Enable/disable big SSLv3 buffer. disable ssl-insert-emptyfragment Enable/disable insertion of empty fragment. enable https-redirect Enable/disable redirect of port 80 to SSL-VPN port. disable ssl-client-renegotiation Allow/block client renegotiation by server. disable force-two-factor-auth Enable/disable force two-factor authentication. disable unsafe-legacyrenegotiation Enable/disable unsafe legacy re-negotiation. disable servercert Server certificate. Fortinet_Factory algorithm Allow algorithms. high idle-timeout SSL VPN disconnects if idle for specified time. 300 auth-timeout Forced re-authentication after timeout. 28800 tunnel-ip-pools Tunnel IP pools. (Empty) tunnel-ipv6-pools Tunnel IPv6 pools. (Empty) dns-suffix DNS suffix. (Empty) dns-server1 DNS server 1. 0.0.0.0 dns-server2 DNS server 2. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 758 wins-server1 WINS server 1. 0.0.0.0 wins-server2 WINS server 2. 0.0.0.0 ipv6-dns-server1 IPv6 DNS server 1. :: ipv6-dns-server2 IPv6 DNS server 2. :: ipv6-wins-server1 IPv6 WINS server 1. :: ipv6-wins-server2 IPv6 WINS server 2. :: route-source-interface Enable/disable bind client side outgoing interface. disable url-obscuration Enable/disable URL obscuration. disable http-compression Enable/disable support HTTP compression. disable http-only-cookie Enable/disable support HTTP only cookie. enable deflate-compressionlevel Compression level (0~9). 6 deflate-min-data-size Minimum size to start compression (200 - 65535). 300 port SSL VPN access HTTPS port (1 - 65535). 10443 port-precedence Enable/disable SSLVPN port precedence over admin GUI HTTPS port. enable auto-tunnel-static-route Enable/disable auto create static route for tunnel IP addresses. enable header-x-forwarded-for Action when HTTP x-forwarded-for header to forwarded requests. add source-interface SSL VPN source interface of incoming traffic. (Empty) source-address Source address of incoming traffic. (Empty) source-address-negate Enable/disable negated source address match. disable source-address6 IPv6 source address of incoming traffic. (Empty) source-address6negate Enable/disable negated source IPv6 address match. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 759 default-portal Default SSL VPN portal. (Empty) authentication-rule Authentication rule for SSL VPN. (Empty) dtls-tunnel Enable/disable DTLS tunnel. enable check-referer Enable/disable verification of referer field in HTTP request header. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 760 vpn/l2tp CLI Syntax config vpn l2tp edit <name_str> set eip <ipv4-address> set sip <ipv4-address> set status {enable | disable} set usrgrp <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 761 Description Configuration Description Default Value eip End IP. 0.0.0.0 sip Start IP. 0.0.0.0 status Enable/disable FortiGate as a L2TP gateway. disable usrgrp User group. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 762 vpn/pptp CLI Syntax config vpn pptp edit <name_str> set status {enable | disable} set ip-mode {range | usrgrp} set eip <ipv4-address> set sip <ipv4-address> set local-ip <ipv4-address> set usrgrp <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 763 Description Configuration Description Default Value status Enable/disable FortiGate as a PPTP gateway. disable ip-mode IP assignment mode for PPTP client. range eip End IP. 0.0.0.0 sip Start IP. 0.0.0.0 local-ip Local IP to be used for peer's remote IP. 0.0.0.0 usrgrp User group. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 764 waf/main-class CLI Syntax config waf main-class edit <name_str> set name <string> set id <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 765 Description Configuration Description Default Value name Main signature class name. (Empty) id Main signature class ID. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 766 waf/profile CLI Syntax config waf profile edit <name_str> set name <string> set external {disable | enable} config signature edit <name_str> config main-class edit <name_str> set id <integer> set status {enable | disable} set action {allow | block | erase} set log {enable | disable} set severity {high | medium | low} end config disabled-sub-class edit <name_str> set id <integer> end config disabled-signature edit <name_str> set id <integer> end set credit-card-detection-threshold <integer> config custom-signature edit <name_str> set name <string> set status {enable | disable} set action {allow | block | erase} set log {enable | disable} set severity {high | medium | low} set direction {request | response} set case-sensitivity {disable | enable} set pattern <string> set target {arg | arg-name | req-body | req-cookie | req-cookie-name | req -filename | req-header | req-header-name | req-raw-uri | req-uri | resp-body | resp-hd r | resp-status} end end config constraint edit <name_str> config header-length edit <name_str> set status {enable | disable} set length <integer> set action {allow | block} set log {enable | disable} set severity {high | medium | low} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 767 end config content-length edit <name_str> set status {enable | disable} set length <integer> set action {allow | block} set log {enable | disable} set severity {high | medium | end config param-length edit <name_str> set status {enable | disable} set length <integer> set action {allow | block} set log {enable | disable} set severity {high | medium | end config line-length edit <name_str> set status {enable | disable} set length <integer> set action {allow | block} set log {enable | disable} set severity {high | medium | end config url-param-length edit <name_str> set status {enable | disable} set length <integer> set action {allow | block} set log {enable | disable} set severity {high | medium | end config version edit <name_str> set status {enable | disable} set action {allow | block} set log {enable | disable} set severity {high | medium | end config method edit <name_str> set status {enable | disable} set action {allow | block} set log {enable | disable} set severity {high | medium | end config hostname edit <name_str> set status {enable | disable} set action {allow | block} set log {enable | disable} set severity {high | medium | CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. low} low} low} low} low} low} low} 768 set severity {high | medium | low} end config malformed edit <name_str> set status {enable | disable} set action {allow | block} set log {enable | disable} set severity {high | medium | low} end config max-cookie edit <name_str> set status {enable | disable} set max-cookie <integer> set action {allow | block} set log {enable | disable} set severity {high | medium | low} end config max-header-line edit <name_str> set status {enable | disable} set max-header-line <integer> set action {allow | block} set log {enable | disable} set severity {high | medium | low} end config max-url-param edit <name_str> set status {enable | disable} set max-url-param <integer> set action {allow | block} set log {enable | disable} set severity {high | medium | low} end config max-range-segment edit <name_str> set status {enable | disable} set max-range-segment <integer> set action {allow | block} set log {enable | disable} set severity {high | medium | low} end config exception edit <name_str> set id <integer> set pattern <string> set regex {enable | disable} set address <string> set header-length {enable | disable} set content-length {enable | disable} set param-length {enable | disable} set line-length {enable | disable} set url-param-length {enable | disable} set version {enable | disable} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 769 set set set set set set set set end version {enable | disable} method {enable | disable} hostname {enable | disable} malformed {enable | disable} max-cookie {enable | disable} max-header-line {enable | disable} max-url-param {enable | disable} max-range-segment {enable | disable} end config method edit <name_str> set status {enable | disable} set log {enable | disable} set severity {high | medium | low} set default-allowed-methods {get | post | put | head | connect | trace | optio ns | delete | others} config method-policy edit <name_str> set id <integer> set pattern <string> set regex {enable | disable} set address <string> set allowed-methods {get | post | put | head | connect | trace | options | delete | others} end end config address-list edit <name_str> set status {enable | disable} set blocked-log {enable | disable} set severity {high | medium | low} config trusted-address edit <name_str> set name <string> end config blocked-address edit <name_str> set name <string> end end config url-access edit <name_str> set id <integer> set address <string> set action {bypass | permit | block} set log {enable | disable} set severity {high | medium | low} config access-pattern edit <name_str> set id <integer> set srcaddr <string> set pattern <string> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 770 set pattern <string> set regex {enable | disable} set negate {enable | disable} end end set comment <var-string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 771 Description Configuration Description Default Value name WAF Profile name. (Empty) external Disable/Enable external HTTP Inspection. disable signature WAF signatures. Details below Configuration main-class disabled-sub-class disabled-signature credit-card-detection-threshold custom-signature constraint CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Default Value (Empty) (Empty) (Empty) 3 (Empty) WAF HTTP protocol restrictions. Details below 772 Configuration header-length content-length param-length line-length url-param-length version method hostname malformed max-cookie max-header-line max-url-param max-range-segment exception method Configuration status log severity default-allowed-methods method-policy address-list CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Default Value {"status":"disable","length":8192,"action":"allow","log":"disable", "severity":"medium"} {"status":"disable","length":67108864,"action":"allow","log":"disa ble","severity":"medium"} {"status":"disable","length":8192,"action":"allow","log":"disable", "severity":"medium"} {"status":"disable","length":1024,"action":"allow","log":"disable", "severity":"medium"} {"status":"disable","length":8192,"action":"allow","log":"disable", "severity":"medium"} {"status":"disable","action":"allow","log":"disable","severity":"me dium"} {"status":"disable","action":"allow","log":"disable","severity":"me dium"} {"status":"disable","action":"allow","log":"disable","severity":"me dium"} {"status":"disable","action":"allow","log":"disable","severity":"me dium"} {"status":"disable","maxcookie":16,"action":"allow","log":"disable","severity":"medium"} {"status":"disable","max-headerline":32,"action":"allow","log":"disable","severity":"medium"} {"status":"disable","max-urlparam":16,"action":"allow","log":"disable","severity":"medium"} {"status":"disable","max-rangesegment":5,"action":"allow","log":"disable","severity":"medium"} (Empty) Method restriction. Details below Default Value disable disable medium (Empty) (Empty) Black address list and white address list. Details below 773 Configuration status blocked-log severity trusted-address blocked-address Default Value disable disable medium (Empty) (Empty) url-access URL access list (Empty) comment Comment. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 774 waf/signature CLI Syntax config waf signature edit <name_str> set desc <string> set id <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 775 Description Configuration Description Default Value desc Signature description. (Empty) id Signature ID. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 776 waf/sub-class CLI Syntax config waf sub-class edit <name_str> set name <string> set id <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 777 Description Configuration Description Default Value name Signature subclass name. (Empty) id Signature subclass ID. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 778 wanopt/auth-group CLI Syntax config wanopt auth-group edit <name_str> set name <string> set auth-method {cert | psk} set psk <password> set cert <string> set peer-accept {any | defined | one} set peer <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 779 Description Configuration Description Default Value name Auth-group name. (Empty) auth-method Group authentication method. cert psk Pre-shared secret for PSK authentication. (Empty) cert Name of certificate to identify this host. (Empty) peer-accept Peer acceptance method. any peer Peer host ID. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 780 wanopt/peer CLI Syntax config wanopt peer edit <name_str> set peer-host-id <string> set ip <ipv4-address-any> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 781 Description Configuration Description Default Value peer-host-id Peer host ID. (Empty) ip Peer IP address. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 782 wanopt/profile CLI Syntax config wanopt profile edit <name_str> set name <string> set transparent {enable | disable} set comments <var-string> set auth-group <string> config http edit <name_str> set status {enable | disable} set secure-tunnel {enable | disable} set byte-caching {enable | disable} set prefer-chunking {dynamic | fix} set tunnel-sharing {private | shared | express-shared} set log-traffic {enable | disable} set port <integer> set ssl {enable | disable} set ssl-port <integer> set unknown-http-version {reject | tunnel | best-effort} set tunnel-non-http {enable | disable} end config cifs edit <name_str> set status {enable | disable} set secure-tunnel {enable | disable} set byte-caching {enable | disable} set prefer-chunking {dynamic | fix} set tunnel-sharing {private | shared | express-shared} set log-traffic {enable | disable} set port <integer> end config mapi edit <name_str> set status {enable | disable} set secure-tunnel {enable | disable} set byte-caching {enable | disable} set tunnel-sharing {private | shared | express-shared} set log-traffic {enable | disable} set port <integer> end config ftp edit <name_str> set status {enable | disable} set secure-tunnel {enable | disable} set byte-caching {enable | disable} set prefer-chunking {dynamic | fix} set tunnel-sharing {private | shared | express-shared} set log-traffic {enable | disable} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 783 set port <integer> end config tcp edit <name_str> set status {enable | disable} set secure-tunnel {enable | disable} set byte-caching {enable | disable} set byte-caching-opt {mem-only | mem-disk} set tunnel-sharing {private | shared | express-shared} set log-traffic {enable | disable} set port <user> set ssl {enable | disable} set ssl-port <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 784 Description Configuration Description Default Value name Profile name. (Empty) transparent Enable/disable transparent mode. enable comments Comment. (Empty) auth-group Peer authentication group. (Empty) http HTTP protocol settings. Details below Configuration status secure-tunnel byte-caching prefer-chunking tunnel-sharing log-traffic port ssl ssl-port unknown-http-version tunnel-non-http cifs Default Value disable disable enable fix private enable 80 disable 443 tunnel disable CIFS protocol settings. Configuration status secure-tunnel byte-caching prefer-chunking tunnel-sharing log-traffic port mapi Default Value disable disable enable fix private enable 445 MAPI protocol settings. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Details below Details below 785 Configuration status secure-tunnel byte-caching tunnel-sharing log-traffic port ftp Default Value disable disable enable private enable 135 FTP protocol settings. Configuration status secure-tunnel byte-caching prefer-chunking tunnel-sharing log-traffic port tcp Default Value disable disable enable fix private enable 21 TCP protocol settings. Configuration status secure-tunnel byte-caching byte-caching-opt tunnel-sharing log-traffic port ssl ssl-port CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Details below Details below Default Value disable disable disable mem-only private enable 1-65535 disable 443 990 995 465 993 786 wanopt/settings CLI Syntax config wanopt settings edit <name_str> set host-id <string> set tunnel-ssl-algorithm {high | medium | low} set auto-detect-algorithm {simple | diff-req-resp} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 787 Description Configuration Description Default Value host-id Host identity. default-id tunnel-ssl-algorithm Relative strength of encryption algorithms accepted in tunnel negotiation. high auto-detect-algorithm Auto detection algorithms used in tunnel negotiation. simple CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 788 wanopt/storage CLI Syntax config wanopt storage edit <name_str> set name <string> set size <integer> set webcache-storage-percentage <integer> set webcache-storage-size <user> set wan-optimization-cache-storage-size <user> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 789 Description Configuration Description Default Value name Storage name. (Empty) size Maximum total size of files within the storage (MB). 1024 webcache-storagepercentage Percentage of storage available for Web cache. The rest is used for WAN optimization 50 webcache-storage-size Web cache storage size. (Empty) wan-optimizationcache-storage-size WAN optimization cache storage size. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 790 wanopt/webcache CLI Syntax config wanopt webcache edit <name_str> set max-object-size <integer> set neg-resp-time <integer> set fresh-factor <integer> set max-ttl <integer> set min-ttl <integer> set default-ttl <integer> set ignore-ims {enable | disable} set ignore-conditional {enable | disable} set ignore-pnc {enable | disable} set ignore-ie-reload {enable | disable} set cache-expired {enable | disable} set cache-cookie {enable | disable} set reval-pnc {enable | disable} set always-revalidate {enable | disable} set cache-by-default {enable | disable} set host-validate {enable | disable} set external {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 791 Description Configuration Description Default Value max-object-size Maximum cacheable object size in kB, the maximum is 2147483 (2GB). 512000 neg-resp-time Duration of negative responses cache. 0 fresh-factor Fresh factor percentage (1 - 100 percent). 100 max-ttl Maximum TTL in minutes (default = 7200 (5 days); maximum = 5256000 (100 years)). 7200 min-ttl Minimum TTL in minutes (default = 5; maximum = 5256000 (100 years)). 5 default-ttl Default TTL minutes (default = 1440 (1 day); maximum = 5256000 (100 years)). 1440 ignore-ims Enable/disable ignore if-modified-since. disable ignore-conditional Enable/disable ignore HTTP 1.1 conditionals. disable ignore-pnc Enable/disable ignore pragma-no-cache. disable ignore-ie-reload Enable/disable ignore IE reload. enable cache-expired Enable/disable cache expired objects. disable cache-cookie Enable/disable caching of HTTP response with Set-Cookie header. disable reval-pnc Enable/disable re-validation of pragma-no-cache. disable always-revalidate Enable/disable re-validation of requested cached object with content server before serving it to client. disable cache-by-default Enable/disable caching of content lacking explicit caching policy from server. disable host-validate Enable/disable validating "Host:" with original server IP. disable external Enable/disable external cache. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 792 web-proxy/debug-url CLI Syntax config web-proxy debug-url edit <name_str> set name <string> set url-pattern <string> set status {enable | disable} set exact {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 793 Description Configuration Description Default Value name Debug URL name. (Empty) url-pattern URL exemption pattern. (Empty) status Enable/disable this URL exemption. enable exact Enable/disable match exact path. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 794 web-proxy/explicit CLI Syntax config web-proxy explicit edit <name_str> set status {enable | disable} set ftp-over-http {enable | disable} set socks {enable | disable} set http-incoming-port <integer> set https-incoming-port <integer> set ftp-incoming-port <integer> set socks-incoming-port <integer> set incoming-ip <ipv4-address-any> set outgoing-ip <ipv4-address-any> set ipv6-status {enable | disable} set incoming-ip6 <ipv6-address> set outgoing-ip6 <ipv6-address> set strict-guest {enable | disable} set pref-dns-result {ipv4 | ipv6} set unknown-http-version {reject | best-effort} set realm <string> set sec-default-action {accept | deny} set https-replacement-message {enable | disable} set message-upon-server-error {enable | disable} set pac-file-server-status {enable | disable} set pac-file-server-port <integer> set pac-file-name <string> set pac-file-data <user> set pac-file-url <user> set ssl-algorithm {high | medium | low} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 795 Description Configuration Description Default Value status Enable/disable explicit Web proxy. disable ftp-over-http Enable/disable FTP-over-HTTP. disable socks Enable/disable SOCKS proxy. disable http-incoming-port Accept incoming HTTP requests on ports other than port 80. 8080 https-incoming-port Accept incoming HTTPS requests on this port. 0 ftp-incoming-port Accept incoming FTP-over-HTTP requests on this port. 0 socks-incoming-port Accept incoming SOCKS proxy requests on this port. 0 incoming-ip Accept incoming HTTP requests from this IP. An interface must have this IP address. 0.0.0.0 outgoing-ip Outgoing HTTP requests will leave this IP. An interface must have this IP address. (Empty) ipv6-status Enable/disable IPv6 destination in policy. disable incoming-ip6 Accept incoming HTTP requests from this IP. An interface must have this IP address. :: outgoing-ip6 Outgoing HTTP requests will leave this IP. An interface must have this IP address. (Empty) strict-guest Enable/disable strict guest user check in explicit proxy. disable pref-dns-result IPv4 or IPv6 DNS result preference. ipv4 unknown-http-version Unknown HTTP version handling. reject realm Authentication realm. default sec-default-action Default action to allow or deny when no webproxy firewall policy exists. deny CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 796 https-replacementmessage Default action to enable or disable return replacement message for HTTPS requests. enable message-upon-servererror Enable/disable return of replacement message upon server error detection. enable pac-file-server-status Enable/disable PAC file server. disable pac-file-server-port PAC file server listening port. 0 pac-file-name PAC file name. proxy.pac pac-file-data PAC file contents. (Empty) pac-file-url PAC file access URL. (Empty) ssl-algorithm Relative strength of encryption algorithms accepted in HTTPS deep-scan. low CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 797 web-proxy/forward-server CLI Syntax config web-proxy forward-server edit <name_str> set name <string> set ip <ipv4-address-any> set fqdn <string> set addr-type {ip | fqdn} set port <integer> set healthcheck {disable | enable} set monitor <string> set server-down-option {block | pass} set comment <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 798 Description Configuration Description Default Value name Server name. (Empty) ip Forward server IP. 0.0.0.0 fqdn Forward server FQDN. (Empty) addr-type Address type. ip port Forward server port. 3128 healthcheck Enable/disable forward server health checking. disable monitor Forward health checking URL. http://www.google.com server-down-option Action when forward server is down. block comment Comment. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 799 web-proxy/forward-server-group CLI Syntax config web-proxy forward-server-group edit <name_str> set name <string> set affinity {enable | disable} set ldb-method {weighted | least-session} set group-down-option {block | pass} config server-list edit <name_str> set name <string> set weight <integer> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 800 Description Configuration Description Default Value name Forward server group name. (Empty) affinity Enable/disable affinity. enable ldb-method Load balance method. weighted group-down-option Action when group is down. block server-list Forward server list. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 801 web-proxy/global CLI Syntax config web-proxy global edit <name_str> set proxy-fqdn <string> set max-request-length <integer> set max-message-length <integer> set strict-web-check {enable | disable} set forward-proxy-auth {enable | disable} set tunnel-non-http {enable | disable} set unknown-http-version {reject | tunnel | best-effort} set forward-server-affinity-timeout <integer> set max-waf-body-cache-length <integer> set webproxy-profile <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 802 Description Configuration Description Default Value proxy-fqdn Proxy FQDN. default.fqdn max-request-length Maximum length of HTTP request line (1kB units (1024 Bytes)). 4 max-message-length Maximum length of HTTP message not including body (1kB units (1024 Bytes)). 32 strict-web-check Enable/disable strict web check. disable forward-proxy-auth Enable/disable forward proxy authentication. disable tunnel-non-http Enable/disable non-HTTP tunnel. enable unknown-http-version Unknown HTTP version handling. best-effort forward-server-affinitytimeout Timeout of the forward server affinity (6 - 60 min, default = 30 min). 30 max-waf-body-cachelength Maximum length of HTTP message (1kB units (1024 Bytes)) processed by Web Application Firewall. 100 webproxy-profile Web proxy profile using when none matched policy. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 803 web-proxy/profile CLI Syntax config web-proxy profile edit <name_str> set name <string> set header-client-ip {pass | add | remove} set header-via-request {pass | add | remove} set header-via-response {pass | add | remove} set header-x-forwarded-for {pass | add | remove} set header-front-end-https {pass | add | remove} config headers edit <name_str> set id <integer> set name <string> set action {add-to-request | add-to-response | remove-from-request | remove-fr om-response} set content <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 804 Description Configuration Description Default Value name Profile name. (Empty) header-client-ip Action when HTTP client-IP header to forwarded requests. pass header-via-request Action when HTTP via header to forwarded requests. pass header-via-response Action when HTTP via header to forwarded responses. pass header-x-forwarded-for Action when HTTP x-forwarded-for header to forwarded requests. pass header-front-end-https Action when HTTP front-end-HTTPS header to forwarded requests. pass headers Configure HTTP forwarded requests headers. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 805 web-proxy/url-match CLI Syntax config web-proxy url-match edit <name_str> set name <string> set status {enable | disable} set url-pattern <string> set forward-server <string> set cache-exemption {enable | disable} set comment <var-string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 806 Description Configuration Description Default Value name Configure URL name. (Empty) status Enable/disable per URL pattern web proxy forwarding and cache exemptions. enable url-pattern URL pattern. (Empty) forward-server Forward server name. (Empty) cache-exemption Enable/disable cache exemption for this URL pattern. disable comment Comment. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 807 webfilter/content CLI Syntax config webfilter content edit <name_str> set id <integer> set name <string> set comment <var-string> config entries edit <name_str> set name <string> set pattern-type {wildcard | regexp} set status {enable | disable} set lang {western | simch | trach | japanese | korean | french | thai | spanis h | cyrillic} set score <integer> set action {block | exempt} end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 808 Description Configuration Description Default Value id ID. 0 name Name of table. (Empty) comment Comment. (Empty) entries Configure web filter banned word. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 809 webfilter/content-header CLI Syntax config webfilter content-header edit <name_str> set id <integer> set name <string> set comment <var-string> config entries edit <name_str> set pattern <string> set action {block | allow | exempt} set category <user> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 810 Description Configuration Description Default Value id ID. 0 name Name of table. (Empty) comment Comment. (Empty) entries Configure content types used by web filter. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 811 webfilter/cookie-ovrd CLI Syntax config webfilter cookie-ovrd edit <name_str> set auth-epoch <integer> set redir-host <string> set redir-port <integer> set cookie-name <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 812 Description Configuration Description Default Value auth-epoch Current authentication epoch - changing this value will invalidate all currently issued override cookies. 0 redir-host Domain name or IP of host that will be used to validate override authentication cookies. (Empty) redir-port TCP port that will be used on "redir-host" to validate override authentication cookies. 20080 cookie-name Name to use for override authentication cookies. wfovrdZnkHSb2CESh CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 813 webfilter/fortiguard CLI Syntax config webfilter fortiguard edit <name_str> set cache-mode {ttl | db-ver} set cache-prefix-match {enable | disable} set cache-mem-percent <integer> set ovrd-auth-port-http <integer> set ovrd-auth-port-https <integer> set ovrd-auth-port-warning <integer> set ovrd-auth-https {enable | disable} set warn-auth-https {enable | disable} set close-ports {enable | disable} set request-packet-size-limit <integer> set ovrd-auth-port <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 814 Description Configuration Description Default Value cache-mode Cache entry expiration mode. ttl cache-prefix-match Enable/disable prefix matching in the cache. enable cache-mem-percent Maximum percentage of available memory allocated to caching (1 - 15%). 2 ovrd-auth-port-http Port to use for FortiGuard Web Filter HTTP override authentication 8008 ovrd-auth-port-https Port to use for FortiGuard Web Filter HTTPS override authentication. 8010 ovrd-auth-port-warning Port to use for FortiGuard Web Filter Warning override authentication. 8020 ovrd-auth-https Enable/disable use of HTTPS for override authentication. enable warn-auth-https Enable/disable use of HTTPS for warning and authentication. enable close-ports Close ports used for HTTP/HTTPS override authentication and disable user overrides. disable request-packet-sizelimit Limit size of URL request packets sent to FortiGuard server (0 for default). 0 ovrd-auth-port Port to use for FortiGuard Web Filter override authentication. 8008 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 815 webfilter/ftgd-local-cat CLI Syntax config webfilter ftgd-local-cat edit <name_str> set id <integer> set desc <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 816 Description Configuration Description Default Value id Local category ID. 0 desc Local category description. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 817 webfilter/ftgd-local-rating CLI Syntax config webfilter ftgd-local-rating edit <name_str> set url <string> set status {enable | disable} set rating <user> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 818 Description Configuration Description Default Value url URL to rate locally. (Empty) status Enable/disable local rating. enable rating Local rating. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 819 webfilter/ftgd-warning CLI Syntax config webfilter ftgd-warning edit <name_str> set id <integer> set status {enable | disable} set scope {user | user-group | ip | ip6} set ip <ipv4-address> set user <string> set user-group <string> set old-profile <string> set expires <user> set rating <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 820 Description Configuration Description Default Value id Specify the override rule ID. 0 status Enable/disable override rule. disable scope Specify the scope of the override rule. user ip Specify the IP address for which the override applies. 0.0.0.0 user Specify the username for which the override applies. (Empty) user-group Specify the user group for which the override applies. (Empty) old-profile Specify the web-filter profile for which the override applies. (Empty) expires Specify when the override expires. 1969/12/31 17:00:00 rating Ratings associated with the overridden filter. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 821 webfilter/ips-urlfilter-cache-setting CLI Syntax config webfilter ips-urlfilter-cache-setting edit <name_str> set dns-retry-interval <integer> set extended-ttl <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 822 Description Configuration Description Default Value dns-retry-interval Retry interval. Refresh DNS faster than TTL to capture multiple IPs for hosts. 0 means use DNS server's TTL only. 0 extended-ttl Extend time to live beyond reported by DNS. 0 means use DNS server's TTL 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 823 webfilter/ips-urlfilter-setting CLI Syntax config webfilter ips-urlfilter-setting edit <name_str> set device <string> set distance <integer> set gateway <ipv4-address> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 824 Description Configuration Description Default Value device Enable/disable gateway out interface. (Empty) distance Administrative distance (1 - 255). 1 gateway Gateway IP for this route. 0.0.0.0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 825 webfilter/override CLI Syntax config webfilter override edit <name_str> set id <integer> set status {enable | disable} set scope {user | user-group | ip | ip6} set ip <ipv4-address> set user <string> set user-group <string> set old-profile <string> set new-profile <string> set ip6 <ipv6-address> set expires <user> set initiator <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 826 Description Configuration Description Default Value id Specify the override rule ID. 0 status Enable/disable override rule. disable scope Specify the scope of the override rule. user ip Specify the IP address for which the override applies. 0.0.0.0 user Specify the username for which the override applies. (Empty) user-group Specify the user group for which the override applies. (Empty) old-profile Specify the web-filter profile for which the override applies. (Empty) new-profile Specify the new web-filter profile to apply override. (Empty) ip6 Specify the IPv6 address for which the override applies. :: expires Specify when the override expires. 1969/12/31 17:00:00 initiator Initiating user of override (not settable). (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 827 webfilter/override-user CLI Syntax config webfilter override-user edit <name_str> set id <integer> set status {enable | disable} set scope {user | user-group | ip | ip6} set ip <ipv4-address> set user <string> set user-group <string> set old-profile <string> set new-profile <string> set ip6 <ipv6-address> set expires <user> set initiator <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 828 Description Configuration Description Default Value id Specify the override rule ID. 0 status Enable/disable override rule. disable scope Specify the scope of the override rule. user ip Specify the IP address for which the override applies. 0.0.0.0 user Specify the username for which the override applies. (Empty) user-group Specify the user group for which the override applies. (Empty) old-profile Specify the web-filter profile for which the override applies. (Empty) new-profile Specify the new web-filter profile to apply override. (Empty) ip6 Specify the IPv6 address for which the override applies. :: expires Specify when the override expires. 1969/12/31 17:00:00 initiator Initiating user of override (not settable). (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 829 webfilter/profile CLI Syntax config webfilter profile edit <name_str> set name <string> set comment <var-string> set replacemsg-group <string> set inspection-mode {proxy | flow-based | dns} set options {rangeblock | activexfilter | cookiefilter | javafilter | block-invali d-url | jscript | js | vbs | unknown | intrinsic | wf-referer | wf-cookie | https-urlscan | per-user-bwl} set https-replacemsg {enable | disable} set ovrd-perm {bannedword-override | urlfilter-override | fortiguard-wf-override | contenttype-check-override} set post-action {normal | comfort | block} config override edit <name_str> set ovrd-cookie {allow | deny} set ovrd-scope {user | user-group | ip | browser | ask} set profile-type {list | radius} set ovrd-dur-mode {constant | ask} set ovrd-dur <user> set profile-attribute {User-Name | User-Password | CHAP-Password | NAS-IP-Addr ess | NAS-Port | Service-Type | Framed-Protocol | Framed-IP-Address | Framed-IP-Netmas k | Framed-Routing | Filter-Id | Framed-MTU | Framed-Compression | Login-IP-Host | Log in-Service | Login-TCP-Port | Reply-Message | Callback-Number | Callback-Id | Framed-R oute | Framed-IPX-Network | State | Class | Session-Timeout | Idle-Timeout | Terminati on-Action | Called-Station-Id | Calling-Station-Id | NAS-Identifier | Proxy-State | Lo gin-LAT-Service | Login-LAT-Node | Login-LAT-Group | Framed-AppleTalk-Link | Framed-Ap pleTalk-Network | Framed-AppleTalk-Zone | Acct-Status-Type | Acct-Delay-Time | Acct-In put-Octets | Acct-Output-Octets | Acct-Session-Id | Acct-Authentic | Acct-Session-Time | Acct-Input-Packets | Acct-Output-Packets | Acct-Terminate-Cause | Acct-Multi-Sessio n-Id | Acct-Link-Count | CHAP-Challenge | NAS-Port-Type | Port-Limit | Login-LAT-Port} config ovrd-user-group edit <name_str> set name <string> end config profile edit <name_str> set name <string> end end config web edit <name_str> set bword-threshold <integer> set bword-table <integer> set urlfilter-table <integer> set content-header-list <integer> set blacklist {enable | disable} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 830 set whitelist {exempt-av | exempt-webcontent | exempt-activex-java-cookie | ex empt-dlp | exempt-rangeblock | extended-log-others} set safe-search {url | header} set youtube-edu-filter-id <string> set log-search {enable | disable} config keyword-match edit <name_str> set pattern <string> end end config ftgd-wf edit <name_str> set options {error-allow | http-err-detail | rate-image-urls | rate-server-ip | redir-block | connect-request-bypass | ftgd-disable} set category-override <user> set exempt-quota <user> set ovrd <user> config filters edit <name_str> set id <integer> set category <integer> set action {block | authenticate | monitor | warning} set warn-duration <user> config auth-usr-grp edit <name_str> set name <string> end set log {enable | disable} set override-replacemsg <string> set warning-prompt {per-domain | per-category} set warning-duration-type {session | timeout} end config quota edit <name_str> set id <integer> set category <user> set type {time | traffic} set unit {B | KB | MB | GB} set value <integer> set duration <user> set override-replacemsg <string> end set max-quota-timeout <integer> set rate-image-urls {disable | enable} set rate-javascript-urls {disable | enable} set rate-css-urls {disable | enable} set rate-crl-urls {disable | enable} end set wisp {enable | disable} config wisp-servers edit <name_str> set name <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 831 end set wisp-algorithm {primary-secondary | round-robin | auto-learning} set log-all-url {enable | disable} set web-content-log {enable | disable} set web-filter-activex-log {enable | disable} set web-filter-command-block-log {enable | disable} set web-filter-cookie-log {enable | disable} set web-filter-applet-log {enable | disable} set web-filter-jscript-log {enable | disable} set web-filter-js-log {enable | disable} set web-filter-vbs-log {enable | disable} set web-filter-unknown-log {enable | disable} set web-filter-referer-log {enable | disable} set web-filter-cookie-removal-log {enable | disable} set web-url-log {enable | disable} set web-invalid-domain-log {enable | disable} set web-ftgd-err-log {enable | disable} set web-ftgd-quota-usage {enable | disable} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 832 Description Configuration Description Default Value name Profile name. (Empty) comment Comment. (Empty) replacemsg-group Replacement message group. (Empty) inspection-mode Web filtering inspection mode. proxy options Options. (Empty) https-replacemsg Enable replacement message display for nondeep SSL inspection. enable ovrd-perm Override permit option. (Empty) post-action Action for HTTP POST requests. normal override Web Filter override settings. Details below Configuration ovrd-cookie ovrd-scope profile-type ovrd-dur-mode ovrd-dur profile-attribute ovrd-user-group profile web Default Value deny user list constant 15m Login-LAT-Service (Empty) (Empty) Web settings. Configuration bword-threshold bword-table urlfilter-table content-header-list blacklist whitelist safe-search youtube-edu-filter-id log-search keyword-match CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Details below Default Value 10 0 0 0 disable (Empty) (Empty) (Empty) disable (Empty) 833 ftgd-wf FortiGuard Web Filter settings. Configuration options category-override exempt-quota ovrd filters quota max-quota-timeout rate-image-urls rate-javascript-urls rate-css-urls rate-crl-urls Details below Default Value ftgd-disable 17 (Empty) (Empty) 300 enable enable enable enable wisp Enable/disable web proxy WISP. disable wisp-servers WISP servers. (Empty) wisp-algorithm WISP server selection algorithm. auto-learning log-all-url Enable/disable log all URLs visited. disable web-content-log Enable/disable logging for web filter content blocking. enable web-filter-activex-log Enable/disable logging for web script filtering on ActiveX. enable web-filter-commandblock-log Enable/disable logging for web filtering on command blocking. enable web-filter-cookie-log Enable/disable logging for web script filtering on cookies. enable web-filter-applet-log Enable/disable logging for web script filtering on Java applets. enable web-filter-jscript-log Enable/disable logging for web script filtering on JScripts. enable web-filter-js-log Enable/disable logging for web script filtering on Java scripts. enable web-filter-vbs-log Enable/disable logging for web script filtering on VB scripts. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 834 web-filter-unknown-log Enable/disable logging for web script filtering on unknown scripts. enable web-filter-referer-log Enable/disable logging of web filter referrer block. enable web-filter-cookieremoval-log Enable/disable logging of web filter cookie block. enable web-url-log Enable/disable logging for URL filtering. enable web-invalid-domain-log Enable/disable logging for web filtering of invalid domain name. enable web-ftgd-err-log Enable/disable logging for FortiGuard Web Filter rating errors. enable web-ftgd-quota-usage Enable/disable logging for FortiGuard Web Filter quota usage each day. enable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 835 webfilter/search-engine CLI Syntax config webfilter search-engine edit <name_str> set name <string> set hostname <string> set url <string> set query <string> set safesearch {disable | url | header} set charset {utf-8 | gb2312} set safesearch-str <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 836 Description Configuration Description Default Value name Search engine name. (Empty) hostname Hostname regular expression. (Empty) url URL regular expression. (Empty) query Query string (must end with an equals character). (Empty) safesearch Safe search enable. disable charset Search engine charset. utf-8 safesearch-str Safe search parameter. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 837 webfilter/urlfilter CLI Syntax config webfilter urlfilter edit <name_str> set id <integer> set name <string> set comment <var-string> set one-arm-ips-urlfilter {enable | disable} set ip-addr-block {enable | disable} config entries edit <name_str> set id <integer> set url <string> set type {simple | regex | wildcard} set action {exempt | block | allow | monitor} set status {enable | disable} set exempt {av | filepattern | web-content | activex-java-cookie | dlp | forti guard | range-block | pass | all} set web-proxy-profile <string> set referrer-host <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 838 Description Configuration Description Default Value id ID. 0 name Name of table. (Empty) comment Comment. (Empty) one-arm-ips-urlfilter Enable/disable DNS resolver for one-arm IPS URL filter operation. disable ip-addr-block Enable/disable block URLs when hostname appears as an IP address. disable entries Web filter/URL filter. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 839 wireless-controller/ap-status CLI Syntax config wireless-controller ap-status edit <name_str> set id <integer> set bssid <mac-address> set ssid <string> set status {rogue | accepted | suppressed} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 840 Description Configuration Description Default Value id AP ID. 0 bssid AP's BSSID. 00:00:00:00:00:00 ssid AP's SSID. (Empty) status AP status. rogue CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 841 wireless-controller/global CLI Syntax config wireless-controller global edit <name_str> set name <string> set location <string> set max-retransmit <integer> set data-ethernet-II {enable | disable} set link-aggregation {enable | disable} set mesh-eth-type <integer> set fiapp-eth-type <integer> set discovery-mc-addr <ipv4-address-multicast> set max-clients <integer> set rogue-scan-mac-adjacency <integer> set ap-log-server {enable | disable} set ap-log-server-ip <ipv4-address> set ap-log-server-port <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 842 Description Configuration Description Default Value name Name. (Empty) location Location. (Empty) max-retransmit Maximum # of retransmissions for tunnel packet. 3 data-ethernet-II Enable/disable ethernet frame type with 802.3 data tunnel mode. disable link-aggregation Enable/disable CAPWAP transmit hash calculation for selecting link aggregation slaves. disable mesh-eth-type Ethernet type for wireless backhaul tunnel packet. 8755 fiapp-eth-type Ethernet type for Fortinet Inter-Access Point Protocol (IAPP) packets. 5252 discovery-mc-addr Discovery multicast address. 224.0.1.140 max-clients Maximum number of stations supported by the AC. 0 rogue-scan-macadjacency Range of numerical difference between AP's Ethernet MAC and AP's BSSID, given the identical OUI (default = 7). 7 ap-log-server Enable/disable AP log server. disable ap-log-server-ip AP log server IP address. 0.0.0.0 ap-log-server-port AP log server port. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 843 wireless-controller/setting CLI Syntax config wireless-controller setting edit <name_str> set account-id <string> set country {NA | AL | DZ | AO | AR | AM | AT | AZ | BH | BD | BB | BY | BE | BZ | BO | BA | BR | BN | BG | KH | CL | CN | CO | CR | HR | CY | CZ | DK | DO | EC | EG | SV | EE | FI | FR | GE | DE | GR | GL | GD | GU | GT | HT | HN | HK | HU | IS | IN | I D | IR | IE | IL | IT | JM | JO | KZ | KE | KP | KR | KW | LV | LB | LI | LT | LU | MO | MK | MY | MT | MX | MC | MA | MZ | NP | NL | AN | AW | NZ | NO | OM | PK | PA | PG | PY | PE | PH | PL | PT | PR | QA | RO | RU | RW | SA | RS | ME | SG | SK | SI | ZA | ES | LK | SE | SD | CH | SY | TW | TH | TT | TN | TR | AE | UA | GB | US | PS | UY | UZ | VE | VN | YE | ZW | JP | AU | CA} end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 844 Description Configuration Description Default Value account-id FortiCloud customer account ID. (Empty) country Country. US CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 845 wireless-controller/timers CLI Syntax config wireless-controller timers edit <name_str> set echo-interval <integer> set discovery-interval <integer> set client-idle-timeout <integer> set rogue-ap-log <integer> set fake-ap-log <integer> set darrp-optimize <integer> set darrp-day {sunday | monday | tuesday | wednesday | thursday | friday | saturda y} config darrp-time edit <name_str> set time <string> end set sta-stats-interval <integer> set vap-stats-interval <integer> set radio-stats-interval <integer> set sta-capability-interval <integer> set sta-locate-timer <integer> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 846 Description Configuration Description Default Value echo-interval Interval before WTP sends Echo Request after joining AC (1 - 255, default = 30 sec). 30 discovery-interval Interval between Discovery Request (2 - 180 sec, default = 5 sec). 5 client-idle-timeout Wireless station idle timeout (0 no client-idle check, 20 - 3600 sec, default = 300 sec). 300 rogue-ap-log Rogue AP periodic log reporting interval (default = 0 min). 0 fake-ap-log Fake AP periodic log reporting interval (default = 1 min). 1 darrp-optimize DARRP optimization interval (default = 1800 sec). 1800 darrp-day Weekday on which DARRP optimization is executed. (Empty) darrp-time Time at which DARRP optimization is executed (Up to 8 time points). (Empty) sta-stats-interval WTP interval for which station statistics are sent (1 - 255, default = 1 sec). 1 vap-stats-interval WTP interval for which vap statistics are sent (1 255, default = 15 sec). 15 radio-stats-interval WTP interval for which radio statistics are sent (1 - 255, default = 15 sec). 15 sta-capability-interval WTP interval for which station capability information is sent (1 - 255, default = 30 sec). 30 sta-locate-timer Interval at which the WTP flushes the station presence (default = 1800 sec). 1800 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 847 wireless-controller/vap CLI Syntax config wireless-controller vap edit <name_str> set name <string> set vdom <string> set fast-roaming {enable | disable} set external-fast-roaming {enable | disable} set mesh-backhaul {enable | disable} set max-clients <integer> set max-clients-ap <integer> set ssid <string> set broadcast-ssid {enable | disable} set security-obsolete-option {enable | disable} set security {open | captive-portal | wep64 | wep128 | wpa-personal | wpa-personal +captive-portal | wpa-enterprise | wpa-only-personal | wpa-only-personal+captive-porta l | wpa-only-enterprise | wpa2-only-personal | wpa2-only-personal+captive-portal | wpa 2-only-enterprise} set pmf {disable | enable | optional} set pmf-assoc-comeback-timeout <integer> set pmf-sa-query-retry-timeout <integer> set okc {disable | enable} set tkip-counter-measure {enable | disable} set external-web <string> set external-logout <string> set radius-mac-auth {enable | disable} set radius-mac-auth-server <string> set auth {psk | radius | usergroup} set encrypt {TKIP | AES | TKIP-AES} set keyindex <integer> set key <password> set passphrase <password> set radius-server <string> set acct-interim-interval <integer> config usergroup edit <name_str> set name <string> end set portal-message-override-group <string> config portal-message-overrides edit <name_str> set auth-disclaimer-page <string> set auth-reject-page <string> set auth-login-page <string> set auth-login-failed-page <string> end set portal-type {auth | auth+disclaimer | disclaimer | email-collect} config selected-usergroups edit <name_str> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 848 set name <string> end set security-exempt-list <string> set security-redirect-url <string> set intra-vap-privacy {enable | disable} set schedule <string> set local-standalone {enable | disable} set local-standalone-nat {enable | disable} set ip <ipv4-classnet-host> set local-bridging {enable | disable} set split-tunneling {enable | disable} set local-authentication {enable | disable} set vlanid <integer> set vlan-auto {enable | disable} set dynamic-vlan {enable | disable} set alias <string> set multicast-rate {0 | 6000 | 12000 | 24000} set multicast-enhance {enable | disable} set broadcast-suppression {dhcp-up | dhcp-down | dhcp-starvation | arp-known | arp -unknown | arp-reply | arp-poison | arp-proxy | netbios-ns | netbios-ds | ipv6 | all-o ther-mc | all-other-bc} set me-disable-thresh <integer> set probe-resp-suppression {enable | disable} set probe-resp-threshold <string> set vlan-pooling {wtp-group | round-robin | hash | disable} config vlan-pool edit <name_str> set id <integer> set wtp-group <string> end set ptk-rekey {enable | disable} set ptk-rekey-intv <integer> set gtk-rekey {enable | disable} set gtk-rekey-intv <integer> set eap-reauth {enable | disable} set eap-reauth-intv <integer> set rates-11a {1 | 1-basic | 2 | 2-basic | 5.5 | 5.5-basic | 11 | 11-basic | 6 | 6 -basic | 9 | 9-basic | 12 | 12-basic | 18 | 18-basic | 24 | 24-basic | 36 | 36-basic | 48 | 48-basic | 54 | 54-basic} set rates-11bg {1 | 1-basic | 2 | 2-basic | 5.5 | 5.5-basic | 11 | 11-basic | 6 | 6-basic | 9 | 9-basic | 12 | 12-basic | 18 | 18-basic | 24 | 24-basic | 36 | 36-basic | 48 | 48-basic | 54 | 54-basic} set rates-11n-ss12 {mcs0/1 | mcs1/1 | mcs2/1 | mcs3/1 | mcs4/1 | mcs5/1 | mcs6/1 | mcs7/1 | mcs8/2 | mcs9/2 | mcs10/2 | mcs11/2 | mcs12/2 | mcs13/2 | mcs14/2 | mcs15/2} set rates-11n-ss34 {mcs16/3 | mcs17/3 | mcs18/3 | mcs19/3 | mcs20/3 | mcs21/3 | mc s22/3 | mcs23/3 | mcs24/4 | mcs25/4 | mcs26/4 | mcs27/4 | mcs28/4 | mcs29/4 | mcs30/4 | mcs31/4} set rates-11ac-ss12 {mcs0/1 | mcs1/1 | mcs2/1 | mcs3/1 | mcs4/1 | mcs5/1 | mcs6/1 | mcs7/1 | mcs8/1 | mcs9/1 | mcs0/2 | mcs1/2 | mcs2/2 | mcs3/2 | mcs4/2 | mcs5/2 | mcs 6/2 | mcs7/2 | mcs8/2 | mcs9/2} set rates-11ac-ss34 {mcs0/3 | mcs1/3 | mcs2/3 | mcs3/3 | mcs4/3 | mcs5/3 | mcs6/3 | mcs7/3 | mcs8/3 | mcs9/3 | mcs0/4 | mcs1/4 | mcs2/4 | mcs3/4 | mcs4/4 | mcs5/4 | mcs 6/4 | mcs7/4 | mcs8/4 | mcs9/4} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 849 6/4 | mcs7/4 | mcs8/4 | mcs9/4} set mac-filter {enable | disable} set mac-filter-policy-other {allow | deny} config mac-filter-list edit <name_str> set id <integer> set mac <mac-address> set mac-filter-policy {allow | deny} end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 850 Description Configuration Description Default Value name Virtual AP name. (Empty) vdom Owning VDOM. (Empty) fast-roaming Enable/disable fast roaming. enable external-fast-roaming Enable/disable fast roaming with external nonmanaged AP. disable mesh-backhaul Enable/disable mesh backhaul. disable max-clients Maximum number of STAs supported by the VAP. 0 max-clients-ap Maximum number of STAs supported by the VAP (per AP radio). 0 ssid IEEE 802.11 Service Set Identifier. fortinet broadcast-ssid Enable/disable SSID broadcast in the beacon. enable security-obsoleteoption Enable/disable obsolete security options. disable security Wireless access security of SSID. wpa2-only-personal pmf Protected Management Frames (PMF) support. disable pmf-assoc-comebacktimeout Protected Management Frames (PMF) comeback maximum timeout (1-20 sec). 1 pmf-sa-query-retrytimeout Protected Management Frames (PMF) SA query retry timeout interval (1 - 5 in 100s of msec). 2 okc Enable/disable Opportunistic Key Caching (OKC). enable tkip-counter-measure Enable/disable TKIP counter measure. enable external-web URL of external authentication web server. (Empty) external-logout URL of external authentication logout server. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 851 radius-mac-auth Enable/disable RADIUS-based MAC authentication. disable radius-mac-auth-server RADIUS-based MAC authentication server. (Empty) auth Authentication protocol. psk encrypt Data encryption. AES keyindex WEP key index (1 - 4). 1 key WEP Key. (Empty) passphrase Pre-shared key for WPA. (Empty) radius-server WiFi RADIUS server. (Empty) acct-interim-interval WiFi RADIUS accounting interim interval (60 86400 sec, default = 0). 0 usergroup Selected user group. (Empty) portal-messageoverride-group Specify captive portal replacement message override group. (Empty) portal-messageoverrides Individual message overrides. Details below Configuration auth-disclaimer-page auth-reject-page auth-login-page auth-login-failed-page Default Value (Empty) (Empty) (Empty) (Empty) portal-type Captive portal type. auth selected-usergroups Selected user group. (Empty) security-exempt-list Security exempt list name. (Empty) security-redirect-url URL redirection after disclaimer/authentication. (Empty) intra-vap-privacy Enable/disable intra-SSID privacy. disable schedule VAP schedule name. (Empty) local-standalone Enable/disable AP local standalone. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 852 local-standalone-nat Enable/disable AP local standalone NAT mode. disable ip IP address and subnet mask for the local standalone NAT subnet. 0.0.0.0 0.0.0.0 local-bridging Enable/disable FortiAP local VAP-to-Ethernet bridge. disable split-tunneling Enable/disable split tunneling. disable local-authentication Enable/disable AP local authentication. disable vlanid Optional VLAN ID. 0 vlan-auto Enable/disable automatic management of SSID VLAN interface. disable dynamic-vlan Enable/disable dynamic VLAN assignment. disable alias Alias. (Empty) multicast-rate Multicast rate (kbps). 0 multicast-enhance Enable/disable multicast enhancement. disable broadcast-suppression Suppress broadcast frames from WiFi clients. dhcp-up arp-known me-disable-thresh Threshold of number of multicast clients to disable multicast enhancement. 32 probe-respsuppression Enable/disable probe response suppression. disable probe-resp-threshold Threshold at which FortiAP responds to probe requests (signal level must be no lower than this value). -80 vlan-pooling Enable/disable VLAN pooling. disable vlan-pool VLAN pool. (Empty) ptk-rekey Enable/disable PTK rekey for WPA-Enterprise security. disable ptk-rekey-intv PTK rekey interval interval (1800 - 864000 sec, default = 86400). 86400 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 853 gtk-rekey Enable/disable GTK rekey for WPA security. disable gtk-rekey-intv GTK rekey interval interval (1800 - 864000 sec, default = 86400). 86400 eap-reauth Enable/disable EAP re-authentication for WPAEnterprise security. disable eap-reauth-intv EAP re-authentication interval (1800 - 864000 sec, default = 86400). 86400 rates-11a Configure allowed data rates for 802.11a. (Empty) rates-11bg Configure allowed data rates for 802.11b/g. (Empty) rates-11n-ss12 Configure allowed data rates for 802.11n with 1 or (Empty) 2 spatial streams. rates-11n-ss34 Configure allowed data rates for 802.11n with 3 or (Empty) 4 spatial streams. rates-11ac-ss12 Configure allowed data rates for 802.11ac with 1 or 2 spatial streams. (Empty) rates-11ac-ss34 Configure allowed data rates for 802.11ac with 3 or 4 spatial streams. (Empty) mac-filter Enable/disable MAC filter status. disable mac-filter-policy-other Deny or allow STAs whose MAC addresses are not in the filter list. allow mac-filter-list MAC filter list. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 854 wireless-controller/vap-group CLI Syntax config wireless-controller vap-group edit <name_str> set name <string> set comment <var-string> config vaps edit <name_str> set name <string> end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 855 Description Configuration Description Default Value name Group Name (Empty) comment Comment. (Empty) vaps Selected list of SSIDs to be included in the group. (Empty) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 856 wireless-controller/wids-profile CLI Syntax config wireless-controller wids-profile edit <name_str> set name <string> set comment <string> set ap-scan {disable | enable} set ap-bgscan-period <integer> set ap-bgscan-intv <integer> set ap-bgscan-duration <integer> set ap-bgscan-idle <integer> set ap-bgscan-report-intv <integer> set ap-bgscan-disable-day {sunday | monday | tuesday | wednesday | thursday | frid ay | saturday} set ap-bgscan-disable-start <user> set ap-bgscan-disable-end <user> set ap-fgscan-report-intv <integer> set ap-scan-passive {enable | disable} set rogue-scan {enable | disable} set ap-auto-suppress {enable | disable} set wireless-bridge {enable | disable} set deauth-broadcast {enable | disable} set null-ssid-probe-resp {enable | disable} set long-duration-attack {enable | disable} set long-duration-thresh <integer> set invalid-mac-oui {enable | disable} set weak-wep-iv {enable | disable} set auth-frame-flood {enable | disable} set auth-flood-time <integer> set auth-flood-thresh <integer> set assoc-frame-flood {enable | disable} set assoc-flood-time <integer> set assoc-flood-thresh <integer> set spoofed-deauth {enable | disable} set asleap-attack {enable | disable} set eapol-start-flood {enable | disable} set eapol-start-thresh <integer> set eapol-start-intv <integer> set eapol-logoff-flood {enable | disable} set eapol-logoff-thresh <integer> set eapol-logoff-intv <integer> set eapol-succ-flood {enable | disable} set eapol-succ-thresh <integer> set eapol-succ-intv <integer> set eapol-fail-flood {enable | disable} set eapol-fail-thresh <integer> set eapol-fail-intv <integer> set eapol-pre-succ-flood {enable | disable} set eapol-pre-succ-thresh <integer> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 857 set set set set set end eapol-pre-succ-intv <integer> eapol-pre-fail-flood {enable | disable} eapol-pre-fail-thresh <integer> eapol-pre-fail-intv <integer> deauth-unknown-src-thresh <integer> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 858 Description Configuration Description Default Value name WIDS profile name. (Empty) comment Comment. (Empty) ap-scan Enable/disable AP scan. disable ap-bgscan-period Interval between two rounds of scanning (60 3600 sec). 600 ap-bgscan-intv Interval between two scanning channels (1 - 600 sec). 1 ap-bgscan-duration Listening time on a scanning channel (10 - 1000 msec). 20 ap-bgscan-idle Channel idle time before scanning channel (0 1000 msec). 0 ap-bgscan-report-intv Interval between two background scan reports (15 - 600 sec). 30 ap-bgscan-disable-day Weekday on which background scan is disabled. (Empty) ap-bgscan-disable-start Start time at which background scan is disabled. 00:00 ap-bgscan-disable-end End time at which background scan is disabled. 00:00 ap-fgscan-report-intv Interval between two foreground scan reports (15 - 600 sec) 15 ap-scan-passive Enable/disable passive scan on all channels. disable rogue-scan Enable/disable rogue AP on-wire scan. disable ap-auto-suppress Enable/disable on-wire rogue AP auto-suppress. disable wireless-bridge Enable/disable wireless bridge detection. disable deauth-broadcast Enable/disable broadcasting de-authentication detection. disable null-ssid-probe-resp Enable/disable null SSID probe response detection. disable CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 859 long-duration-attack Enable/disable long duration attack detection based on user configured threshold. disable long-duration-thresh Threshold value (usec) for long duration attack detection. 8200 invalid-mac-oui Enable/disable invalid MAC OUI detection. disable weak-wep-iv Enable/disable weak WEP IV (Initialization Vector) detection. disable auth-frame-flood Enable/disable authentication frame flooding detection. disable auth-flood-time Number of seconds after which an STA is considered not connected. 10 auth-flood-thresh Threshold value for authentication flooding. 30 assoc-frame-flood Enable/disable association frame flooding detection. disable assoc-flood-time Number of seconds after which an STA is considered not connected. 10 assoc-flood-thresh Threshold value for association flooding. 30 spoofed-deauth Enable/disable spoofed de-authentication attack detection. disable asleap-attack Enable/disable asleap attack detection. disable eapol-start-flood Enable/disable EAPOL-Start flooding (to AP) detection. disable eapol-start-thresh The threshold value for EAPOL-Start flooding in specified interval. 10 eapol-start-intv The detection interval for EAPOL-Start flooding in sec. 1 eapol-logoff-flood Enable/disable EAPOL-Logoff flooding (to AP) detection. disable eapol-logoff-thresh The threshold value for EAPOL-Logoff flooding in specified interval. 10 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 860 eapol-logoff-intv The detection interval for EAPOL-Logoff flooding in sec. 1 eapol-succ-flood Enable/disable EAPOL-Success flooding (to AP) detection. disable eapol-succ-thresh The threshold value for EAPOL-Success flooding in specified interval. 10 eapol-succ-intv The detection interval for EAPOL-Success flooding in sec. 1 eapol-fail-flood Enable/disable EAPOL-Failure flooding (to AP) detection. disable eapol-fail-thresh The threshold value for EAPOL-Failure flooding in specified interval. 10 eapol-fail-intv The detection interval for EAPOL-Failure flooding in sec. 1 eapol-pre-succ-flood Enable/disable premature EAPOL-Success flooding (to STA) detection. disable eapol-pre-succ-thresh The threshold value for premature EAPOLSuccess flooding in specified interval. 10 eapol-pre-succ-intv The detection interval for premature EAPOLSuccess flooding in sec. 1 eapol-pre-fail-flood Enable/disable premature EAPOL-Failure flooding (to STA) detection. disable eapol-pre-fail-thresh The threshold value for premature EAPOLFailure flooding in specified interval. 10 eapol-pre-fail-intv The detection interval for premature EAPOLFailure flooding in sec. 1 deauth-unknown-srcthresh Threshold value per second to deauth unknown src for DoS attack(0: no limit). 10 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 861 wireless-controller/wtp CLI Syntax config wireless-controller wtp edit <name_str> set wtp-id <string> set index <integer> set admin {discovered | disable | enable} set name <string> set location <string> set wtp-mode {normal | remote} set wtp-profile <string> set override-led-state {enable | disable} set led-state {enable | disable} set override-wan-port-mode {enable | disable} set wan-port-mode {wan-lan | wan-only} set override-ip-fragment {enable | disable} set ip-fragment-preventing {tcp-mss-adjust | icmp-unreachable} set tun-mtu-uplink <integer> set tun-mtu-downlink <integer> set override-split-tunnel {enable | disable} set split-tunneling-acl-local-ap-subnet {enable | disable} config split-tunneling-acl edit <name_str> set id <integer> set dest-ip <ipv4-classnet> end set override-lan {enable | disable} config lan edit <name_str> set port-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port-ssid <string> set port1-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port1-ssid <string> set port2-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port2-ssid <string> set port3-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port3-ssid <string> set port4-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port4-ssid <string> set port5-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port5-ssid <string> set port6-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port6-ssid <string> set port7-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port7-ssid <string> set port8-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port8-ssid <string> end set override-allowaccess {enable | disable} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 862 set allowaccess {telnet | http | https | ssh} set override-login-passwd-change {enable | disable} set login-passwd-change {yes | default | no} set login-passwd <password> config radio-1 edit <name_str> set radio-id <integer> set override-band {enable | disable} set band {802.11a | 802.11b | 802.11g | 802.11n | 802.11n-5G | 802.11n,g-only | 802.11g-only | 802.11n-only | 802.11n-5G-only | 802.11ac | 802.11ac,n-only | 802.11a c-only} set override-analysis {enable | disable} set spectrum-analysis {enable | disable} set override-txpower {enable | disable} set auto-power-level {enable | disable} set auto-power-high <integer> set auto-power-low <integer> set power-level <integer> set override-vaps {enable | disable} set vap-all {enable | disable} config vaps edit <name_str> set name <string> end set override-channel {enable | disable} config channel edit <name_str> set chan <string> end end config radio-2 edit <name_str> set radio-id <integer> set override-band {enable | disable} set band {802.11a | 802.11b | 802.11g | 802.11n | 802.11n-5G | 802.11n,g-only | 802.11g-only | 802.11n-only | 802.11n-5G-only | 802.11ac | 802.11ac,n-only | 802.11a c-only} set override-analysis {enable | disable} set spectrum-analysis {enable | disable} set override-txpower {enable | disable} set auto-power-level {enable | disable} set auto-power-high <integer> set auto-power-low <integer> set power-level <integer> set override-vaps {enable | disable} set vap-all {enable | disable} config vaps edit <name_str> set name <string> end set override-channel {enable | disable} config channel edit <name_str> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 863 edit <name_str> set chan <string> end end set image-download {enable | disable} set mesh-bridge-enable {default | enable | disable} set coordinate-enable {enable | disable} set coordinate-x <string> set coordinate-y <string> end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 864 Description Configuration Description Default Value wtp-id WTP ID. (Empty) index Index (0 - 4294967295). 0 admin Admin status. enable name WTP name. (Empty) location WTP location. (Empty) wtp-mode WTP mode. normal wtp-profile WTP profile name. (Empty) override-led-state Enable/disable override of LED state. disable led-state Enable/disable use of LEDs on WTP. enable override-wan-portmode Enable/disable override of wan-port-mode. disable wan-port-mode Enable/disable use of WAN port as LAN port. wan-only override-ip-fragment Enable/disable override of IP fragment prevention. disable ip-fragment-preventing Prevent IP fragmentation for CAPWAP tunnelled control and data packets. tcp-mss-adjust tun-mtu-uplink Uplink tunnel MTU. 0 tun-mtu-downlink Downlink tunnel MTU. 0 override-split-tunnel Enable/disable override of split tunneling. disable split-tunneling-acllocal-ap-subnet Enable/disable split tunneling ACL local AP subnet. disable split-tunneling-acl Split tunneling ACL filter list. (Empty) override-lan Enable/disable override of WTP LAN port. disable lan WTP LAN port mapping. Details below CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 865 Configuration port-mode port-ssid port1-mode port1-ssid port2-mode port2-ssid port3-mode port3-ssid port4-mode port4-ssid port5-mode port5-ssid port6-mode port6-ssid port7-mode port7-ssid port8-mode port8-ssid Default Value offline (Empty) offline (Empty) offline (Empty) offline (Empty) offline (Empty) offline (Empty) offline (Empty) offline (Empty) offline (Empty) override-allowaccess Enable/disable override of management access to managed AP. disable allowaccess Allow management access to managed AP. (Empty) override-login-passwdchange Enable/disable override of login password of managed AP. disable login-passwd-change Configuration options for login password of managed AP. no login-passwd Login password of managed AP. (Empty) radio-1 Radio 1. Details below CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 866 Configuration radio-id override-band band override-analysis spectrum-analysis override-txpower auto-power-level auto-power-high auto-power-low power-level override-vaps vap-all vaps override-channel channel radio-2 Configuration radio-id override-band band override-analysis spectrum-analysis override-txpower auto-power-level auto-power-high auto-power-low power-level override-vaps vap-all vaps override-channel channel Default Value 0 disable (Empty) disable disable disable disable 17 10 100 disable enable (Empty) disable (Empty) Radio 2. Details below Default Value 1 disable (Empty) disable disable disable disable 17 10 100 disable enable (Empty) disable (Empty) image-download Enable/disable WTP image download. enable mesh-bridge-enable Enable/disable mesh Ethernet bridge when WTP is configured as a mesh branch/leaf AP. default coordinate-enable Enable/disable WTP coordinates. disable coordinate-x X axis coordinate. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 867 coordinate-y CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Y axis coordinate. 0 868 wireless-controller/wtp-profile CLI Syntax config wireless-controller wtp-profile edit <name_str> set name <string> set comment <var-string> config platform edit <name_str> set type {AP-11N | 220A | 220B | 223B | 210B | 222B | 112B | 320B | 11C | 14C | 28C | 320C | 221C | 25D | 222C | 224D | 214B | 21D | 24D | 112D | 223C | 321C | S321 C | S322C | S323C | S311C | S313C | S321CR | S322CR | S323CR | S421E | S422E | S423E} end set wan-port-mode {wan-lan | wan-only} config lan edit <name_str> set port-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port-ssid <string> set port1-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port1-ssid <string> set port2-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port2-ssid <string> set port3-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port3-ssid <string> set port4-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port4-ssid <string> set port5-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port5-ssid <string> set port6-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port6-ssid <string> set port7-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port7-ssid <string> set port8-mode {offline | nat-to-wan | bridge-to-wan | bridge-to-ssid} set port8-ssid <string> end set led-state {enable | disable} set dtls-policy {clear-text | dtls-enabled} set dtls-in-kernel {enable | disable} set max-clients <integer> set handoff-rssi <integer> set handoff-sta-thresh <integer> set handoff-roaming {enable | disable} config deny-mac-list edit <name_str> set id <integer> set mac <mac-address> end set ap-country {NA | AL | DZ | AO | AR | AM | AT | AZ | BH | BD | BB | BY | BE | B Z | BO | BA | BR | BN | BG | KH | CL | CN | CO | CR | HR | CY | CZ | DK | DO | EC | EG | SV | EE | FI | FR | GE | DE | GR | GL | GD | GU | GT | HT | HN | HK | HU | IS | IN CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 869 | ID | IR | IE | IL | IT | JM | JO | KZ | KE | KP | KR | KW | LV | LB | LI | LT | LU | MO | MK | MY | MT | MX | MC | MA | MZ | NP | NL | AN | AW | NZ | NO | OM | PK | PA | PG | PY | PE | PH | PL | PT | PR | QA | RO | RU | RW | SA | RS | ME | SG | SK | SI | Z A | ES | LK | SE | SD | CH | SY | TW | TH | TT | TN | TR | AE | UA | GB | US | PS | UY | UZ | VE | VN | YE | ZW | JP | AU | CA} set ip-fragment-preventing {tcp-mss-adjust | icmp-unreachable} set tun-mtu-uplink <integer> set tun-mtu-downlink <integer> set split-tunneling-acl-local-ap-subnet {enable | disable} config split-tunneling-acl edit <name_str> set id <integer> set dest-ip <ipv4-classnet> end set allowaccess {telnet | http | https | ssh} set login-passwd-change {yes | default | no} set login-passwd <password> set lldp {enable | disable} config radio-1 edit <name_str> set radio-id <integer> set mode {disabled | ap | monitor | sniffer} set band {802.11a | 802.11b | 802.11g | 802.11n | 802.11n-5G | 802.11ac | 802. 11n,g-only | 802.11g-only | 802.11n-only | 802.11n-5G-only | 802.11ac,n-only | 802.11a c-only} set protection-mode {rtscts | ctsonly | disable} set powersave-optimize {tim | ac-vo | no-obss-scan | no-11b-rate | client-rate -follow} set transmit-optimize {disable | power-save | aggr-limit | retry-limit | sendbar} set amsdu {enable | disable} set coexistence {enable | disable} set short-guard-interval {enable | disable} set channel-bonding {80MHz | 40MHz | 20MHz} set auto-power-level {enable | disable} set auto-power-high <integer> set auto-power-low <integer> set power-level <integer> set dtim <integer> set beacon-interval <integer> set rts-threshold <integer> set frag-threshold <integer> set ap-sniffer-bufsize <integer> set ap-sniffer-chan <integer> set ap-sniffer-addr <mac-address> set ap-sniffer-mgmt-beacon {enable | disable} set ap-sniffer-mgmt-probe {enable | disable} set ap-sniffer-mgmt-other {enable | disable} set ap-sniffer-ctl {enable | disable} set ap-sniffer-data {enable | disable} set spectrum-analysis {enable | disable} set wids-profile <string> set darrp {enable | disable} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 870 set darrp {enable | disable} set max-clients <integer> set max-distance <integer> set frequency-handoff {enable | disable} set ap-handoff {enable | disable} set vap-all {enable | disable} config vaps edit <name_str> set name <string> end config channel edit <name_str> set chan <string> end end config radio-2 edit <name_str> set radio-id <integer> set mode {disabled | ap | monitor | sniffer} set band {802.11a | 802.11b | 802.11g | 802.11n | 802.11n-5G | 802.11ac | 802. 11n,g-only | 802.11g-only | 802.11n-only | 802.11n-5G-only | 802.11ac,n-only | 802.11a c-only} set protection-mode {rtscts | ctsonly | disable} set powersave-optimize {tim | ac-vo | no-obss-scan | no-11b-rate | client-rate -follow} set transmit-optimize {disable | power-save | aggr-limit | retry-limit | sendbar} set amsdu {enable | disable} set coexistence {enable | disable} set short-guard-interval {enable | disable} set channel-bonding {80MHz | 40MHz | 20MHz} set auto-power-level {enable | disable} set auto-power-high <integer> set auto-power-low <integer> set power-level <integer> set dtim <integer> set beacon-interval <integer> set rts-threshold <integer> set frag-threshold <integer> set ap-sniffer-bufsize <integer> set ap-sniffer-chan <integer> set ap-sniffer-addr <mac-address> set ap-sniffer-mgmt-beacon {enable | disable} set ap-sniffer-mgmt-probe {enable | disable} set ap-sniffer-mgmt-other {enable | disable} set ap-sniffer-ctl {enable | disable} set ap-sniffer-data {enable | disable} set spectrum-analysis {enable | disable} set wids-profile <string> set darrp {enable | disable} set max-clients <integer> set max-distance <integer> set frequency-handoff {enable | disable} CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 871 set frequency-handoff {enable | disable} set ap-handoff {enable | disable} set vap-all {enable | disable} config vaps edit <name_str> set name <string> end config channel edit <name_str> set chan <string> end end config lbs edit <name_str> set ekahau-blink-mode {enable | disable} set ekahau-tag <mac-address> set erc-server-ip <ipv4-address-any> set erc-server-port <integer> set aeroscout {enable | disable} set aeroscout-server-ip <ipv4-address-any> set aeroscout-server-port <integer> set aeroscout-mu-factor <integer> set aeroscout-mu-timeout <integer> set fortipresence {enable | disable} set fortipresence-server <ipv4-address-any> set fortipresence-port <integer> set fortipresence-secret <password> set fortipresence-project <string> set fortipresence-frequency <integer> set fortipresence-rogue {enable | disable} set fortipresence-unassoc {enable | disable} set station-locate {enable | disable} end end CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 872 Description Configuration Description Default Value name WTP profile name. (Empty) comment Comment. (Empty) platform WTP platform. Details below Configuration type Default Value 220B wan-port-mode Enable/disable use of WAN port as LAN port. wan-only lan WTP LAN port mapping. Details below Configuration port-mode port-ssid port1-mode port1-ssid port2-mode port2-ssid port3-mode port3-ssid port4-mode port4-ssid port5-mode port5-ssid port6-mode port6-ssid port7-mode port7-ssid port8-mode port8-ssid Default Value offline (Empty) offline (Empty) offline (Empty) offline (Empty) offline (Empty) offline (Empty) offline (Empty) offline (Empty) offline (Empty) led-state Enable/disable use of LEDs on WTP. enable dtls-policy WTP data channel DTLS policy. clear-text dtls-in-kernel Enable/disable data channel DTLS in kernel. disable max-clients Maximum number of STAs supported by the WTP. 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 873 handoff-rssi Minimum RSSI value for handoff. 25 handoff-sta-thresh Threshold value for AP handoff. 30 handoff-roaming Enable/disable handoff when a client is roaming. enable deny-mac-list Deny MAC filter list. (Empty) ap-country AP country code. NA ip-fragment-preventing Prevent IP fragmentation for CAPWAP tunneled control and data packets. tcp-mss-adjust tun-mtu-uplink Uplink tunnel MTU. 0 tun-mtu-downlink Downlink tunnel MTU. 0 split-tunneling-acllocal-ap-subnet Enable/disable split tunneling ACL local AP subnet. disable split-tunneling-acl Split tunneling ACL filter list. (Empty) allowaccess Allow management access to managed AP. (Empty) login-passwd-change Configuration options for login password of managed AP. no login-passwd Login password of managed AP. (Empty) lldp Enable/disable LLDP. disable radio-1 Radio 1. Details below CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 874 Configuration radio-id mode band protection-mode powersave-optimize transmit-optimize amsdu coexistence short-guard-interval channel-bonding auto-power-level auto-power-high auto-power-low power-level dtim beacon-interval rts-threshold frag-threshold ap-sniffer-bufsize ap-sniffer-chan ap-sniffer-addr ap-sniffer-mgmt-beacon ap-sniffer-mgmt-probe ap-sniffer-mgmt-other ap-sniffer-ctl ap-sniffer-data spectrum-analysis wids-profile darrp max-clients max-distance frequency-handoff ap-handoff vap-all vaps channel radio-2 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Default Value 0 ap (Empty) disable (Empty) power-save aggr-limit retry-limit send-bar enable enable disable 20MHz disable 17 10 100 1 100 2346 2346 16 36 00:00:00:00:00:00 enable enable enable enable enable disable (Empty) disable 0 0 disable disable enable (Empty) (Empty) Radio 2. Details below 875 Configuration radio-id mode band protection-mode powersave-optimize transmit-optimize amsdu coexistence short-guard-interval channel-bonding auto-power-level auto-power-high auto-power-low power-level dtim beacon-interval rts-threshold frag-threshold ap-sniffer-bufsize ap-sniffer-chan ap-sniffer-addr ap-sniffer-mgmt-beacon ap-sniffer-mgmt-probe ap-sniffer-mgmt-other ap-sniffer-ctl ap-sniffer-data spectrum-analysis wids-profile darrp max-clients max-distance frequency-handoff ap-handoff vap-all vaps channel lbs Default Value 1 ap (Empty) disable (Empty) power-save aggr-limit retry-limit send-bar enable enable disable 20MHz disable 17 10 100 1 100 2346 2346 16 6 00:00:00:00:00:00 enable enable enable enable enable disable (Empty) disable 0 0 disable disable enable (Empty) (Empty) Location based service. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Details below 876 Configuration ekahau-blink-mode ekahau-tag erc-server-ip erc-server-port aeroscout aeroscout-server-ip aeroscout-server-port aeroscout-mu-factor aeroscout-mu-timeout fortipresence fortipresence-server fortipresence-port fortipresence-secret fortipresence-project fortipresence-frequency fortipresence-rogue fortipresence-unassoc station-locate CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Default Value disable 01:18:8e:00:00:00 0.0.0.0 8569 disable 0.0.0.0 0 20 5 disable 0.0.0.0 3000 fortinet fortipresence 30 disable disable disable 877 execute backup execute The execute commands perform immediate operations on the FortiGate unit, including: l l l Maintenance operations, such as back up and restore the system configuration, reset the configuration to factory settings, update antivirus and attack definitions, view and delete log messages, set the date and time. Network operations, such as view and clear DHCP leases, clear arp table entries, use ping or traceroute to diagnose network problems. Generate certificate requests and install certificates for VPN authentication. backup Back up the FortiGate configuration files, logs, or IPS user-defined signatures file to a TFTP or FTP server, USB disk, or a management station. Management stations can either be a FortiManager unit, or FortiGuard Analysis and Management Service. For more information, see "fortiguard" on page 1 or "central-management" on page 1. When virtual domain configuration is enabled (in global, vdom-admin is enabled), the content of the backup file depends on the administrator account that created it. A backup of the system configuration from the super admin account contains the global settings and the settings for all of the VDOMs. Only the super admin can restore the configuration from this file. When you back up the system configuration from a regular administrator account, the backup file contains the global settings and the settings for the VDOM to which the administrator belongs. Only a regular administrator account can restore the configuration from this file. Syntax execute backup config flash <comment> execute backup config ftp <filename_str> <server_ipv4[:port_int] | server_fqdn[:port_ int]> [<username_str> [<password_str>]] [<backup_password_str>] execute backup config management-station <comment_str> execute backup config tftp <filename_str> <server_ipv4> [<backup_password_str>] execute backup config usb <filename_str> [<backup_password_str>] execute backup config-with-forticlient-info usb-mode [<backup_password_str>] execute backup config-with-forticlient-info ftp <filename_str> <server_ipv4[:port_int] | server_fqdn[:port_int]> [<username_str> [<password_str>]] [<backup_password_str>] execute backup config-with-forticlient-info tftp <filename_str> <server_ipv4> [<backup_ password_str>] execute backup config-with-forticlient-info usb [<backup_password_str>] execute backup config-with-forticlient-info usb-mode [<backup_password_str>] execute backup full-config ftp <filename_str> <server_ipv4[:port_int] | server_fqdn [:port_int]> [<username_str> [<password_str>]] [<backup_password_str>] execute backup full-config tftp <filename_str> <server_ipv4> [<backup_password_str>] execute backup full-config usb <filename_str> [<backup_password_str>] execute backup full-config usb-mode <filename_str> [<backup_password_str>] execute backup ipsuserdefsig ftp <filename_str> <server_ipv4[:port_int] | server_fqdn [:port_int]> [<username_str> [<password_str>]] execute backup ipsuserdefsig tftp tftp <filename_str> <server_ipv4> execute backup {disk | memory} alllogs ftp <server_ipv4[:port_int] | server_fqdn[:port_ int]> [<username_str> <password_str>] CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 878 backup execute execute backup {disk | memory} alllogs tftp <server_ipv4> execute backup {disk | memory} alllogs usb execute backup {disk | memory} log ftp <server_ipv4[:port_int] | server_fqdn[:port_ int]> <username_str> <password_str> {traffic | event | ids | virus | webfilter | spam | dlp | voip | app-ctrl | netscan} execute backup {disk | memory} log tftp <server_ipv4> {traffic | event | ids | virus | webfilter | spam | dlp | voip | app-ctrl | netscan} execute backup {disk | memory} log usb {traffic | event | ids | virus | webfilter | spam | dlp | voip | app-ctrl | netscan} Variable Description config flash <comment> Back up the system configuration to the flash disk. Optionally, include a comment. config ftp <filename_str> <server_ ipv4[:port_int] | server_fqdn [:port_int]> [<username_str> [<password_str>]] [<backup_ password_str>] config management-station <comment_str> Back up the system configuration to an FTP server. Optionally, you can specify a password to protect the saved data. Back up the system configuration to a configured management station. If you are adding a comment, do not add spaces, underscore characters (_), or quotation marks (“ “) or any other punctuation marks. The comment you enter displays in both the portal website and FortiGate web-based manager (System > Maintenance > Revision). config tftp <filename_str> <server_ipv4> [<backup_password_ str>] Back up the system configuration to a file on a TFTP server. Optionally, you can specify a password to protect the saved data. config usb <filename_str> [<backup_password_str>] Back up the system configuration to a file on a USB disk. Optionally, you can specify a password to protect the saved data. config usb-mode [<backup_password_ str>] Back up the system configuration to a USB disk (Global admin only). Optionally, you can specify a password to protect the saved data. config-with-forticlient-info ftp <filename_str> <server_ipv4[:port_ int] | server_fqdn[:port_int]> [<username_str> [<password_str>]] [<backup_password_str>] Back up the system configuration to a file on an FTP server. Optionally, you can specify a password to protect the saved data. config-with-forticlient-info tftp <filename_str> <server_ipv4> [<backup_password_str>] Back up the system configuration to a file on a TFTP server. Optionally, you can specify a password to protect the saved data. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 879 execute backup Variable Description config-with-forticlient-info usb [<backup_password_str>] Back up the system configuration to a file on a USB disk. Optionally, you can specify a password to protect the saved data. config-with-forticlient-info usbmode [<backup_password_str>] Back up the system configuration to a USB disk (Global admin only). Optionally, you can specify a password to protect the saved data. full-config ftp <filename_str> <server_ipv4[:port_int] | server_ fqdn[:port_int]> [<username_str> [<password_str>]] [<backup_ password_str>] Back up the full system configuration to a file on an FTP server. You can optionally specify a password to protect the saved data. full-config tftp <filename_str> <server_ipv4> [<backup_password_ str>] Back up the full system configuration to a file on a TFTP server. You can optionally specify a password to protect the saved data. full-config usb <filename_str> [<backup_password_str>] Back up the full system configuration to a file on a USB disk. You can optionally specify a password to protect the saved data. full-config usb-mode <filename_ str> [<backup_password_str>] Back up the full system configuration to a file on a USB disk (Global admin only). You can optionally specify a password to protect the saved data. ipsuserdefsig ftp <filename_str> <server_ipv4[:port_int] | server_ fqdn[:port_int]> [<username_str> [<password_str>]] Backup IPS user-defined signatures to a file on an FTP server. ipsuserdefsig tftp tftp <filename_ str> <server_ipv4> Back up IPS user-defined signatures to a file on a TFTP server. {disk | memory} alllogs ftp <server_ipv4[:port_int] | server_ fqdn[:port_int]> [<username_str> <password_str>] Back up either all memory or all hard disk log files for this VDOM to an FTP server. The disk option is available on FortiGate models that log to a hard disk. The file name has the form: <log_file_name>_ <VDOM>_<date>_<time> {disk | memory} alllogs tftp <server_ipv4> Back up either all memory or all hard disk log files for this VDOM to a TFTP server. he disk option is available on FortiGate models that log to a hard disk. The file name has the form: <log_file_name>_ <VDOM>_<date>_<time> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 880 batch execute Variable Description {disk | memory} alllogs usb Back up either all memory or all hard disk log files for this VDOM to a USB disk. he disk option is available on FortiGate models that log to a hard disk. The file name has the form: <log_file_name>_ <VDOM>_<date>_<time> {disk | memory} log ftp <server_ ipv4[:port_int] | server_fqdn [:port_int]> <username_str> <password_str> {traffic | event | ids | virus | webfilter | spam | dlp | voip | app-ctrl | netscan} {disk | memory} log tftp <server_ ipv4> {traffic | event | ids | virus | webfilter | spam | dlp | voip | app-ctrl | netscan} {disk | memory} log usb {traffic | event | ids | virus | webfilter | spam | dlp | voip | app-ctrl | netscan} Back up the specified type of log file from either hard disk or memory to an FTP server. The disk option is available on FortiGate models that log to a hard disk. Back up the specified type of log file from either hard disk or memory to a TFTP server. The disk option is available on FortiGate models that log to a hard disk. Back up the specified type of log file from either hard disk or memory to a USB disk. The disk option is available on FortiGate models that log to a hard disk. Example This example shows how to backup the FortiGate unit system configuration to a file named fgt.cfg on a TFTP server at IP address 192.168.1.23. execute backup config tftp fgt.cfg 192.168.1.23 batch Execute a series of CLI commands. execute batch commands are controlled by the Maintenance (mntgrp) access control group. Syntax execute batch [<cmd_cue>] where <cmd_cue> is one of: end — exit session and run the batch commands lastlog — read the result of the last batch commands start — start batch mode status — batch mode status reporting if batch mode is running or stopped CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 881 execute bypass-mode Example To start batch mode: execute batch start Enter batch mode... To enter commands to run in batch mode: config system global set refresh 5 end To execute the batch commands: execute batch end Exit and run batch commands... bypass-mode Use this command to manually switch a FortiGate-600C or FortiGate-1000C into bypass mode. This is available in transparent mode only. If manually switched to bypass mode, the unit remains in bypass-mode until bypass mode is disabled. Syntax execute bypass-mode {enable | disable} carrier-license Use this command to enter a l FortiOS Carrier license key if you have installed a FortiOS Carrier build on a FortiGate unit and need to enter a license key to enable FortiOS Carrier functionality. Contact Fortinet Support for more information about this command. Syntax execute carrier-license <license_key> Variable Description <license_key> Enter the FortiOS Carrier license key supplied by Fortinet. central-mgmt Update Central Management Service account information. Also used receive configuration file updates from an attached FortiManager unit. Syntax execute central-mgmt set-mgmt-id <management_id> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 882 cfg reload execute execute central-mgmt register-device <fmg-serial-number> <fmg-register-password> <fgtuser-name> <fgt-password> execute central-mgmt unregister-device <fmg-serial-number> set-mgmt-id is used to change or initially set the management ID, or your account number for Central Management Services. This account ID must be set for the service to be enabled. register-device registers the FortiGate unit with a specific FortiManager unit specified by serial number. You must also specify the administrator name and password that the FortiManager unit uses to log on to the FortiGate unit. unregister-device removes the FortiGate unit from the specified FortiManager unit’s device list. update is used to update your Central Management Service contract with your new management account ID. This command is to be used if there are any changes to your management service account. Example If you are registering with the Central Management Service for the first time, and your account number is 123456, you would enter the following: execute central-mgmt set-mgmt-id 123456 cfg reload Use this command to restore the saved configuration when the configuration change mode is manual or revert. This command has no effect if the mode is automatic, the default. The set cfg-save command in system global sets the configuration change mode. When you reload the saved system configuration, the your session ends and the FortiGate unit restarts. In the default configuration change mode, automatic, CLI commands become part of the saved unit configuration when you execute them by entering either next or end. In manual mode, commands take effect but do not become part of the saved configuration unless you execute the execute cfg save command. When the FortiGate unit restarts, the saved configuration is loaded. Configuration changes that were not saved are lost. The revert mode is similar to manual mode, except that configuration changes are saved automatically if the administrative session is idle for more than a specified timeout period. This provides a way to recover from an erroneous configuration change, such as changing the IP address of the interface you are using for administration. You set the timeout in system global using the set cfg-revert-timeout command. Syntax execute cfg reload Example This is sample output from the command when successful: # execute cfg reload configs reloaded. system will reboot.This is sample output from the command when not in runtime-only configuration mode: # execute cfg reload no config to be reloaded. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 883 execute cfg save cfg save Use this command to save configuration changes when the configuration change mode is manual or revert. If the mode is automatic, the default, all changes are added to the saved configuration as you make them and this command has no effect. The set cfg-save command in system global sets the configuration change mode. In manual mode, commands take effect but do not become part of the saved configuration unless you execute the execute cfg save command. When the FortiGate unit restarts, the saved configuration is loaded. Configuration changes that were not saved are lost. The revert mode is similar to manual mode, except that configuration changes are reverted automatically if the administrative session is idle for more than a specified timeout period. This provides a way to recover from an erroneous configuration change, such as changing the IP address of the interface you are using for administration. To change the timeout from the default of 600 seconds, go to system global and use the set cfg-revert-timeout command. Syntax execute cfg save Example This is sample output from the command: # execute cfg save config saved. This is sample output when not in runtime-only configuration mode. It also occurs when in runtime-only configuration mode and no changes have been made: # execute cfg save no config to be saved. clear system arp table Clear all the entries in the arp table. Syntax execute clear system arp table cli check-template-status Reports the status of the secure copy protocol (SCP) script template. Syntax execute cli check-template-status CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 884 cli status-msg-only execute cli status-msg-only Enable or disable displaying standardized CLI error output messages. If executed, this command stops other debug messages from displaying in the current CLI session. This command is used for compatibility with FortiManager. Syntax execute cli status-msg-only [enable | disable] Variable Description status-msg-only [enable | disable] Enable or disable standardized CLI error output messages. Entering the command without enable or disable disables displaying standardized output. Default enable client-reputation Use these commands to retrieve or remove client reputation information. Syntax To erase all client reputation data execute client-reputation erase To retrieve client reputation host count execute client-reputation host-count <rows> To retrieve client reputation host details execute client-reputation host detail <host> To retrieve client reputation host summary execute client-reputation host summary <host> To purge old data execute client-reputation purge To view the top n records execute client-reputation <n | all> date Get or set the system date. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 885 execute disk Syntax execute date [<date_str>] date_str has the form yyyy-mm-dd, where yyyy is the year and can be 2001 to 2037 mm is the month and can be 01 to 12 dd is the day of the month and can be 01 to 31 If you do not specify a date, the command returns the current system date. Shortened values, such as ‘06’ instead of ‘2006’ for the year or ‘1’ instead of ‘01’ for month or day, are not valid. Example This example sets the date to 17 September 2004: execute date 2004-09-17 disk Use this command to list and format hard disks installed in FortiGate units or individual partitions on these hard disks. Syntax execute disk format <partition1_ref_int> [...<partitionn_ref_int>] execute disk list execute disk scan <ref_int> Variable Description Format the referenced disk partitions or disks. Separate reference numbers with spaces. format If you enter a partition reference number the disk partition is formatted. If you enter a disk reference number the entire disk and all of its partitions are formatted. list List the disks and partitions and the reference number for each one. scan Scan a disk or partition and repair errors. <ref_int> Disk (device) or partition reference number. The execute disk format command formats the specified partitions or disks and then reboots the system if a reboot is required. In most cases you need to format the entire disk only if there is a problem with the partition. Formatting the partition removes all data from the partition. Formatting the disk removes all data from the entire disk and creates a single partition on the disk. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 886 disk raid execute Examples Use the following command to list the disks and partitions. execute disk list Disk Internal(boot) ref: 14.9GB type: SSD [ATA SanDisk SSD U100] dev: /dev/sda partition ref: 3 14.4GB, 14.4GB free mounted: Y label: 7464A257123E07BB dev: /dev/sda3 In this example, there is only one partition and its reference number is 3. Enter the following command to format the partition. execute disk format 3 After a confirmation message the FortiGate unit formats the partition and restarts. This can take a few minutes. disk raid Use this command to view information about and change the raid settings on FortiGate units that support RAID. Syntax execute execute execute execute disk disk disk disk raid raid raid raid disable enable {Raid-0 | Raid-1 | Raid-5} rebuild status Variable Description disable Disable raid for the FortiGate unit. enable {Raid-0 | Raid-1 | Raid-5} Change the RAID level on the FortiGate unit. rebuild Rebuild RAID on the FortiGate unit at the same RAID level. You can only execute this command if a RAID error has been detected. Changing the RAID level takes a while and deletes all data on the disk array. status Display information about the RAID disk array in the FortiGate unit. Examples Use the following command to display information about the RAID disk array in a FortiGate-82C. execute disk raid status RAID Level: Raid-1 RAID Status: OK RAID Size: 1000GB Disk Disk Disk Disk 1: 2: 3: 4: OK Used 1000GB OK Used 1000GB OK Used 1000GB Unavailable Not-Used 0GB CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 887 execute disk scan disk scan Use this command to run a disk check operation. Syntax execute disk scan <ref_int> where n is the partition "ref:" number for the disk, shown by execute disk list. The operation requires the FortiGate unit to reboot. The command responds: Example # execute disk scan 3 scan requested for: 3/Internal (device=/dev/sda3) This action requires the unit to reboot. Do you want to continue? (y/n) dhcp lease-clear Clear all DHCP address leases. Syntax For IPv4: execute dhcp lease-clear For IPv6 execute dhcp6 lease-clear dhcp lease-list Display DHCP leases on a given interface Syntax For IPv4: execute dhcp lease-list [interface_name] For IPv6: execute dhcp6 lease-list [interface_name] If you specify an interface, the command lists only the leases issued on that interface. Otherwise, the list includes all leases issued by DHCP servers on the FortiGate unit. If there are no DHCP leases in user on the FortiGate unit, an error will be returned. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 888 disconnect-admin-session execute disconnect-admin-session Disconnect an administrator who is logged in. Syntax execute disconnect-admin-session <index_number> To determine the index of the administrator that you want to disconnect, view the list of logged-in administrators by using the following command: execute disconnect-admin-session ? The list of logged-in administrators looks like this: Connected: INDEX USERNAME TYPE FROM TIME 0 admin WEB 172.20.120.51 Mon Aug 14 12:57:23 2006 1 admin2 CLI ssh(172.20.120.54) Mon Aug 14 12:57:23 2006 Example This example shows how to disconnect the logged administrator admin2 from the above list. execute disconnect-admin-session 1 enter Use this command to go from global commands to a specific virtual domain (VDOM). Only available when virtual domains are enabled and you are in config global. After you enter the VDOM, the prompt will not change from “(global)”. However you will be in the VDOM with all the commands that are normally available in VDOMs. Syntax execute enter <vdom> Use “?” to see a list of available VDOMs. erase-disk Use this command to reformat the boot device or an attached hard disk. Optionally, this command can restore the image from a TFTP server after erasing. Syntax execute erase-disk <disk_name> The <disk_name> for the boot device is boot. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 889 execute factoryreset factoryreset Reset the FortiGate configuration to factory default settings. Syntax execute factoryreset [keepvmlicense] If keepvmlicense is specified (VM models only), the VM license is retained after reset. Apart from the keepvmlicense option, this procedure deletes all changes that you have made to the FortiGate configuration and reverts the system to its original configuration, including resetting interface addresses. factoryreset2 Reset the FortiGate configuration to factory default settings except VDOM and interface settings. Syntax execute factoryreset2 [keepvmlicense] If keepvmlicense is specified (VM models only), the VM license is retained after reset. formatlogdisk Format the FortiGate hard disk to enhance performance for logging. Syntax execute formatlogdisk In addition to deleting logs, this operation will erase all other data on the disk, including system configuration, quarantine files, and databases for antivirus and IPS. forticarrier-license Use this command to perform a FortiCarrier license upgrade. Syntax execute forticarrier-license <activation-code> forticlient Use these commands to manage FortiClient licensing. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 890 FortiClient-NAC execute Syntax To view FortiClient license information execute forticlient info To show current FortiClient count execute forticlient list <connection_type> where <connection_type> is one of: 0 - IPsec 1 - SSLVPN 2 - NAC (Endpoint Security) 3 - WAN optimization 4 - Test To upgrade FortiClient licenses execute forticlient upgrade <license_key_str> FortiClient-NAC Use the following command to load a FortiClient license onto a FortiGate unit. Syntax execute FortiClient-NAC update-registration-license <code> where <code> is the FortiClient registration license key/activation code. fortiguard-log Use this to manage FortiGuard Analysis and Management Service (FortiCloud) operation. Syntax To create a FortiCloud account execute fortiguard-log create-account To perform FortiCloud certification execute fortiguard-log certification To retrieve the FortiCloud agreement execute fortiguard-log agreement CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 891 execute fortitoken To test connection to a FortiCloud account execute fortiguard-log try <account-id> <password> To join FortiCloud execute fortiguard-log join To log in to a FortiCloud account execute fortiguard-log login <account-id> <password> To update the FortiGuard Analysis and Management Service contract execute fortiguard-log update fortitoken Use these commands to activate and synchronize a FortiToken device. FortiToken devices are used in two-factor authentication of administrator and user account logons. The device generates a random six-digit code that you enter during the logon process along with user name and password. Before they can be used to authenticate account logins, FortiToken devices must be activated with the FortiGuard service. When successfully activated, the status of the FortiToken device will change from New to Active. Synchronization is sometimes needed due to the internal clock drift of the FortiToken device. It is not unusual for new FortiToken units to require synchronization before being put into service. Synchronization is accomplished by entering two sequential codes provided by the FortiToken. Syntax To activate one or more FortiToken devices execute fortitoken activate <serial_number> [serial_number2 ... serial_numbern] To import FortiToken OTP seeds execute fortitoken import <seeds_file> <seeds_file_preshared_key> To synchronize a FortiToken device execute fortitoken sync <serial_number> <code> <next code> To import a set of FortiToken serial numbers execute fortitoken import-sn-file <ftk-sn> FortiCare returns a set of 200 serial numbers that are in the same serial number range as the specified FortiToken device. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 892 fortitoken-mobile execute fortitoken-mobile Use these commands to activate and synchronize a FortiToken Mobile card. FortiToken Mobile cards are used in two-factor authentication of administrator and user account logons. The FortiGate unit sends a random six-digit code to the mobile device by email or SMS that the user enters during the logon process along with user name and password. Syntax To import the FortiToken Mobile card serial number execute fortitoken-mobile import <activation_code> To poll a FortiToken Mobile token state execute fortitoken-mobile poll To provision a FortiToken Mobile token execute fortitoken-mobile provision <token_serial_number> fsso refresh Use this command to manually refresh user group information from Directory Service servers connected to the FortiGate unit using the Fortinet Single Sign On (FSSO) agent. Syntax execute fsso refresh ha disconnect Use this command to disconnect a FortiGate unit from a functioning cluster. You must specify the serial number of the unit to be disconnected. You must also specify an interface name and assign an IP address and netmask to this interface of the disconnected unit. You can disconnect any unit from the cluster even the primary unit. After the unit is disconnected the cluster responds as if the disconnected unit has failed. The cluster may renegotiate and may select a new primary unit. To disconnect the unit from the cluster, the execute ha disconnect command sets the HA mode of the disconnected unit to standalone. In addition, all interface IP addresses of the disconnected unit are set to 0.0.0.0. The interface specified in the command is set to the IP address and netmask that you specify in the command. In addition all management access to this interface is enabled. Once the FortiGate unit is disconnected you can use SSH, telnet, HTTPS, or HTTP to connect to and manage the FortiGate unit. Syntax execute ha disconnect <cluster-member-serial_str> <interface_str> <address_ipv4> <address_ipv4mask> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 893 execute ha ignore-hardware-revision Variable Description cluster-memberserial_str The serial number of the cluster unit to be disconnected. interface_str The name of the interface to configure. The command configures the IP address and netmask for this interface and also enables all management access for this interface. Example This example shows how to disconnect a cluster unit with serial number FGT5002803033050. The internal interface of the disconnected unit is set to IP address 1.1.1.1 and netmask 255.255.255.0. execute ha disconnect FGT5002803033050 internal 1.1.1.1 255.255.255.0 ha ignore-hardware-revision Use this command to set ignore-hardware-revision status. Syntax To view ignore-hardware-revision status execute ha ignore-hardware-revision status To set ignore-hardware-revision status execute ha ignore-hardware-revision {enable | disable} ha manage Use this command from the CLI of a FortiGate unit in an HA cluster to log into the CLI of another unit in the cluster. Usually you would use this command from the CLI of the primary unit to log into the CLI of a subordinate unit. However, if you have logged into a subordinate unit CLI, you can use this command to log into the primary unit CLI, or the CLI of another subordinate unit. You can use CLI commands to manage the cluster unit that you have logged into. If you make changes to the configuration of any cluster unit (primary or subordinate unit) these changes are synchronized to all cluster units. Syntax execute ha manage <cluster-index> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 894 ha synchronize Variable execute Description cluster-index The cluster index is assigned by the FortiGate Clustering Protocol according to cluster unit serial number. The cluster unit with the highest serial number has a cluster index of 0. The cluster unit with the second highest serial number has a cluster index of 1 and so on. Enter ? to list the cluster indexes of the cluster units that you can log into. The list does not show the unit that you are already logged into. Example This example shows how to log into a subordinate unit in a cluster of three FortiGate units. In this example you have already logged into the primary unit. The primary unit has serial number FGT3082103000056. The subordinate units have serial numbers FGT3012803021709 and FGT3082103021989. execute ha manage ? <id> please input slave cluster index. <0> Subsidary unit FGT3012803021709 <1> Subsidary unit FGT3082103021989 Type 0 and press enter to connect to the subordinate unit with serial number FGT3012803021709. The CLI prompt changes to the host name of this unit. To return to the primary unit, type exit. From the subordinate unit you can also use the execute ha manage command to log into the primary unit or into another subordinate unit. Enter the following command: execute ha manage ? <id> please input slave cluster index. <1> Subsidary unit FGT3082103021989 <2> Subsidary unit FGT3082103000056 Type 2 and press enter to log into the primary unit or type 1 and press enter to log into the other subordinate unit. The CLI prompt changes to the host name of this unit. ha synchronize Use this command from a subordinate unit in an HA cluster to manually synchronize its configuration with the primary unit or to stop a synchronization process that is in progress. Syntax execute ha synchronize {start | stop} Variable Description start Start synchronizing the cluster configuration. stop Stop the cluster from completing synchronizing its configuration. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 895 execute interface dhcpclient-renew interface dhcpclient-renew Renew the DHCP client for the specified DHCP interface and close the CLI session. If there is no DHCP connection on the specified port, there is no output. Syntax execute interface dhcpclient-renew <port> Example This is the output for renewing the DHCP client on port1 before the session closes: # execute interface dhcpclient-renew port1 renewing dhcp lease on port1 interface pppoe-reconnect Reconnect to the PPPoE service on the specified PPPoE interface and close the CLI session. If there is no PPPoE connection on the specified port, there is no output. Syntax execute interface pppoe-reconnect <port> log backup Use this command to back up all logs, index files, and report databases. The files are compressed and combined into a TAR archive. Syntax execute log backup <file name> where <file name> is the name of the backup file to create. log client-reputation-report Use these commands to control client-reputation log actions. Syntax To accept a host so that it has its own baselines execute log client-reputation-report accept <policy-id> <host> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 896 log client-reputation-report execute To clear all auto-profile data execute log client-reputation-report clear To ignore a host, removing it from the abnormal list execute log client-reputation-report ignore <policy-id> <host> To refresh the data of one option result execute log client-reputation-report refresh <policy-id> <option> <action> <option> is one of bandwidth, session, failconn, geo, or app <action> is one of data, baseline, or data_baseline (both data and baseline) To get baseline/average information of one option execute log client-reputation-report result baseline <policy-id> <option> <option> is one of bandwidth, session, or failconn To get hourly data of a host visiting a country or using an application execute log client-reputation-report result details {hourly | total} <policy-id> <option> <name> <host> <option> is geo or app <name> is the name of the country or application To list abnormal hosts of one or all options execute log client-reputation-report result list <policy-id> <option> <option> is geo, app, or all To list periodical data of one host of one option execute log client-reputation-report result period <policy-id> <option> <host> <periods> <option> is one of bandwidth, session, failconn, geo, or app <periods> is number of periods to list To list the top 10 abnormal hosts of one option execute log client-reputation-report result top10 <policy-id> <option> <option> is one of bandwidth, session, failconn, geo, or app To run reports immediately execute log client-reputation-report run <policy-id> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 897 execute log convert-oldlogs log convert-oldlogs Use this command to convert old compact logs to the new format. This command is available only if you have upgraded from an earlier version of FortiOS and have old compact logs on your system. Syntax execute log convert-oldlogs log delete-all Use this command to clear all log entries for this VDOM in memory and current log files on hard disk. If your FortiGate unit has no hard disk, only log entries in system memory will be cleared. You will be prompted to confirm the command. Syntax execute log delete-all log delete-oldlogs Use this command to delete old compact logs. This command is available only if you have upgraded from an earlier version of FortiOS and have old compact logs on your system. Syntax execute log delete-oldlogs log detail Display UTM-related log entries for traffic log entries in this VDOM. Syntax execute log detail <category> <utm-ref> where <category> is one of: 2: utm-virus 3: utm-webfilter 4: utm-ips 5: utm-spam 9: utm-dlp 10: utm-app-ctrl CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 898 log display execute You can obtain <utm-ref> from the execute log display output. log display Use this command to display log messages for this VDOM that you have selected with the execute log filter command. Syntax execute log display The console displays the first 10 log messages. To view more messages, run the command again. You can do this until you have seen all of the selected log messages. To restart viewing the list from the beginning, use the commands execute log filter start-line 1 execute log display You can restore the log filters to their default values using the command execute log filter reset log downgrade-log Use this command to downgrade existing logs to v5.0 format prior to a firmware downgrade to FortiOS v5.0. Syntax execute log downgrade-log log filter Use this command to select log messages in this VDOM for viewing or deletion. You can view one log category on one device at a time. Optionally, you can filter the messages to select only specified date ranges or severities of log messages. For traffic logs, you can filter log messages by source or destination IP address. Commands are cumulative. If you omit a required variable, the command displays the current setting. Use as many execute log filter commands as you need to define the log messages that you want to view. Syntax execute execute execute execute execute execute execute execute execute log log log log log log log log log filter filter filter filter filter filter filter filter filter CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. category <category_name> device {disk | memory} dump field <name> <value> [<value2>,...<valuen>] [not] ha-member <unitsn_str> reset [all | field] rolled_number <number> sortby <field> [max-sort-lines] start-line <line_number> 899 execute log fortianalyzer test-connectivity execute log filter view-lines <count> Variable Description category <category_name> Enter the type of log you want to select. To see a list of available categories, enter Default event execute log filter category device {disk | memory} Device where the logs are stored. disk dump Display current filter settings. No default. field <name> <value> [<value2>,...<value n>] [not] Enter execute log filter field to view the list of field names. Press Enter after <name> to view information about value parameters for that field. No default. not inverts the field value condition. ha-member <unitsn_str> Select logs from the specified HA cluster member. Enter the serial number of the unit. reset [all | field] Execute this command to reset all filter settings. You can use field option to reset only filter field settings. No default. rolled_number <number> Select logs from rolled log file. 0 selects current log file. 0 sortby <field> [max-sort-lines] Sort logs by specified field. No default. start-line <line_ number> Select logs starting at specified line number. 1 view-lines <count> Set lines per view. Range: 5 to 1000 10 log fortianalyzer test-connectivity Use this command to test the connection to the FortiAnalyzer unit. This command is available only when FortiAnalyzer is configured. Syntax execute log fortianalyzer test-connectivity Example When FortiAnalyzer is connected, the output looks like this: FortiAnalyzer Host Name: FortiAnalyzer-800B CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 900 log list execute FortiGate Device ID: FG50B3G06500085 Registration: registered Connection: allow Disk Space (Used/Allocated): 468/1003 MB Total Free Space: 467088 MB Log: Tx & Rx Report: Tx & Rx Content Archive: Tx & Rx Quarantine: Tx & Rx When FortiAnalyzer is not connected, the output is: Connect Error log list You can view the list of current and rolled log files for this VDOM on the console. The list shows the file name, size and timestamp. Syntax execute log list <category> To see a list of available categories, enter execute log list Example The output looks like this: elog 8704 Fri March 6 14:24:35 2009 elog.1 1536 Thu March 5 18:02:51 2009 elog.2 35840 Wed March 4 22:22:47 2009 At the end of the list, the total number of files in the category is displayed. For example: 501 event log file(s) found. log rebuild-sqldb Use this command to rebuild the SQL database from log files. If run in the VDOM context, only this VDOM’s SQL database is rebuilt. If run in the global context, the SQL database is rebuilt for all VDOMs. If SQL logging is disabled, this command is unavailable. Syntax execute log rebuild-sqldb log recreate-sqldb Use this command to recreate SQL log database. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 901 execute log-report reset If SQL logging is disabled, this command is unavailable. Syntax execute log recreate-sqldb log-report reset Use this command to delete all logs, archives and user configured report templates. Syntax execute log-report reset log restore Use this command to restore up all logs, index files, and report databases from a backup file created with the "log backup" on page 27 command. This command will wipe out all existing logs and report database for the vdom. It is only available for debug firmware builds. It is recommended to kill reportd and miglogd prior to running this command. kill -3 1 killall miglogd killall reportd Syntax execute log restore <file name> where <file name> is the name of the backup file to use. log roll Use this command to roll all log files. Syntax execute log roll log shift-time Use this command in conjunction with the "log backup" on page 27 and "log restore" on page 33 commands. You can load a log set generated previously to do demos or testing without needing to regenerate data. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 902 log upload-progress execute Syntax execute log shift-time <number of hours> log upload-progress Use this command to display the progress of the latest log upload. Syntax execute log upload-progress modem dial Dial the modem. The dial command dials the accounts configured in config system modem until it makes a connection or it has made the maximum configured number of redial attempts. This command can be used if the modem is in Standalone mode. Syntax execute modem dial modem hangup Hang up the modem. This command can be used if the modem is in Standalone mode. Syntax execute modem hangup modem trigger This command sends a signal to the modem daemon, which causes the state machine to re-evaluate its current state. If for some reason the modem should be connected but isn't, then it will trigger a redial. If the modem should not be connected but is, this command will cause the modem to disconnect. Syntax execute modem trigger CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 903 execute mrouter clear mrouter clear Clear multicast routes, RP-sets, IGMP membership records or routing statistics. Syntax Clear IGMP memberships: execute mrouter clear igmp-group {{<group-address>} <interface-name>} execute mrouter clear igmp-interface <interface-name> Clear multicast routes: execute mrouter clear <route-type> {<group-address> {<source-address>}} Clear PIM-SM RP-sets learned from the bootstrap router (BSR): execute mrouter clear sparse-mode-bsr Clear statistics: execute mrouter clear statistics {<group-address> {<source-address>}} Variable Description <interface-name> Enter the name of the interface on which you want to clear IGMP memberships. <group-address> Optionally enter a group address to limit the command to a particular group. Enter one of: dense-routes - clear only PIM dense routes <route-type> multicast-routes - clear all types of multicast routes sparse-routes - clear only sparse routes <source-address> Optionally, enter a source address to limit the command to a particular source address. You must also specify group-address. netscan Use this command to start and stop the network vulnerability scanner and perform related functions. Syntax execute execute execute execute execute netscan netscan netscan netscan netscan CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. import list start scan status stop 904 pbx execute Variable Description import Import hosts discovered on the last asset discovery scan. list List the hosts discovered on the last asset discover scan. start scan Start configured vulnerability scan. status Display the status of the current network vulnerability scan. stop Stop the current network vulnerability scan. pbx Use this command to view active channels and to delete, list or upload music files for when music is playing while a caller is on hold. Syntax execute pbx active-call <list> execute pbx extension <list> execute pbx ftgd-voice-pkg {sip-trunk} execute pbx music-on-hold {delete | list | upload} execute pbx prompt upload ftp <file.tgz> <ftp_server_address>[:port] [<username>] [password>] execute pbx prompt upload tftp <file.tgz> <ftp_server_address>[:port] [<username>] [password>] execute pbx prompt upload usb <file.tgz> <ftp_server_address>[:port] [<username>] [password>] execute pbx restore-default-prompts execute pbx sip-trunk list Variables Description active-call <list> Enter to display a list of the active calls being processed by the FortiGate Voice unit. extension <list> Enter to display the status of all extensions with SIP phones that have connected to the FortiGate Voice unit. ftgd-voice-pkg {sip-trunk} Enter to retrieve FortiGuard voice package sip trunk information. music-on-hold {delete | list | upload} Enter to either delete, list or upload music on hold files. You can upload music on hold files using FTP, TFTP, or from a USB drive plugged into the FortiGate Voice unit. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 905 execute pbx Variables Description prompt upload ftp <file.tgz> <ftp_ server_address> [:port] [<username>] [password>] Upload new pbx voice prompt files using FTP. The voice prompt files should be added to a tar file and zipped. This file would usually have the extension tgz. You must include the filename, FTP server address (domain name of IPv4 address) and if required the username and password for the server. prompt upload tftp <file.tgz> <ftp_ server_address> [:port] [<username>] [password>] Upload new pbx voice prompt files using TFTP. The voice prompt files should be added to a tar file and zipped. This file would usually have the extension tgz. You must include the filename and TFTP server IP address. prompt upload usb <file.tgz> <ftp_ server_address> [:port] [<username>] [password>] Upload new pbx voice prompt files from a USB drive plugged into the FortiGate Voice unit. The voice prompt files should be added to a tar file and zipped. This file would usually have the extension tgz. You must include the filename. restore-defaultprompts Restore default English voicemail and other PBX system prompts. Use this command if you have changed the default prompts and want to restore the default settings. sip-trunk list Enter to display the status of all SIP trunks that have been added to the FortiGate Voice configuration. Example command output Enter the following command to view active calls: execute pbx active-call Call-From Call-To Durationed 6016 6006 00:00:46 Enter the following command to display the status of all extensions execute pbx extension list Extension Host Dialplan 6052 Unregister company-default 6051 Unregister company-default 6050 Unregister company-default 6022 Unregister company-default 6021/6021 172.30.63.34 company-default 6020 Unregister company-default Enter the following command to display the status of all SIP trunks execute pbx sip-trunk list Name Host Username Provider_1 192.169.20.1 +5555555 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Account-Type State Static N/A 906 ping execute ping Send an ICMP echo request (ping) to test the network connection between the FortiGate unit and another network device. Syntax execute ping {<address_ipv4> | <host-name_str>} <host-name_str> should be an IP address, or a fully qualified domain name. Example This example shows how to ping a host with the IP address 172.20.120.16. #execute ping 172.20.120.16 PING 172.20.120.16 (172.20.120.16): 56 data bytes 64 bytes from 172.20.120.16: icmp_seq=0 ttl=128 time=0.5 64 bytes from 172.20.120.16: icmp_seq=1 ttl=128 time=0.2 64 bytes from 172.20.120.16: icmp_seq=2 ttl=128 time=0.2 64 bytes from 172.20.120.16: icmp_seq=3 ttl=128 time=0.2 64 bytes from 172.20.120.16: icmp_seq=4 ttl=128 time=0.2 ms ms ms ms ms --- 172.20.120.16 ping statistics --5 packets transmitted, 5 packets received, 0% packet loss round-trip min/avg/max = 0.2/0.2/0.5 ms ping-options, ping6-options Set ICMP echo request (ping) options to control the way ping tests the network connection between the FortiGate unit and another network device. Syntax execute execute execute execute execute execute execute execute execute execute Variable ping-options ping-options ping-options ping-options ping-options ping-options ping-options ping-options ping-options ping-options data-size <bytes> df-bit {yes | no} pattern <2-byte_hex> repeat-count <repeats> source {auto | <source-intf_ip>} timeout <seconds> tos <service_type> ttl <hops> validate-reply {yes | no} view-settings Description data-size <bytes> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Specify the datagram size in bytes. Default 56 907 execute ping-options, ping6-options Variable Description Default df-bit {yes | no} Set df-bit to yes to prevent the ICMP packet from being fragmented. Set df-bit to no to allow the ICMP packet to be fragmented. no pattern <2byte_hex> Used to fill in the optional data buffer at the end of the ICMP packet. The size of the buffer is specified using the data_size parameter. This allows you to send out packets of different sizes for testing the effect of packet size on the connection. No default. repeat-count <repeats> Specify how many times to repeat ping. 5 source {auto | <source-intf_ ip>} Specify the FortiGate interface from which to send the ping. If you specify auto, the FortiGate unit selects the source address and interface based on the route to the <host-name_str> or <host_ ip>. Specifying the IP address of a FortiGate interface tests connections to different network segments from the specified interface. auto timeout <seconds> Specify, in seconds, how long to wait until ping times out. 2 Set the ToS (Type of Service) field in the packet header to provide an indication of the quality of service wanted. tos <service_ type> lowdelay = minimize delay 0 throughput = maximize throughput reliability = maximize reliability lowcost = minimize cost ttl <hops> Specify the time to live. Time to live is the number of hops the ping packet should be allowed to make before being discarded or returned. 64 validate-reply {yes | no} Select yes to validate reply data. no view-settings Display the current ping-option settings. No default. Example Use the following command to increase the number of pings sent. execute ping-options repeat-count 10 Use the following command to send all pings from the FortiGate interface with IP address 192.168.10.23. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 908 ping6 execute execute ping-options source 192.168.10.23 ping6 Send an ICMP echo request (ping) to test the network connection between the FortiGate unit and an IPv6 capable network device. Syntax execute ping6 {<address_ipv6> | <host-name_str>} Example This example shows how to ping a host with the IPv6 address 12AB:0:0:CD30:123:4567:89AB:CDEF. execute ping6 12AB:0:0:CD30:123:4567:89AB:CDEF policy-packet-capture delete-all Use this command to delete captured packets. Syntax execute policy-packet-capture delete-all You will be asked to confirm that you want delete the packets. reboot Restart the FortiGate unit. Abruptly powering off your FortiGate unit may corrupt its configuration. Using the reboot and shutdown options here or in the web-based manager ensure proper shutdown procedures are followed to prevent any loss of configuration. Syntax execute reboot <comment “comment_string”> <comment “comment_string”> allows you to optionally add a message that will appear in the hard disk log indicating the reason for the reboot. If the message is more than one word it must be enclosed in quotes. Example This example shows the reboot command with a message included. execute reboot comment “December monthly maintenance” CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 909 execute report report Use these commands to manage reports. Syntax To flash report caches: execute report flash-cache To recreate the report database: execute report recreate-db To generate a report: execute report run [<layout_name>["start-time" "end-time"]] The start and end times have the format yyyy-mm-dd hh:mm:ss report-config reset Use this command to reset report templates to the factory default. Logs are not deleted. If SQL logging is disabled, this command is unavailable. Syntax execute report-config reset restore Use this command to l restore the configuration from a file l change the FortiGate firmware l change the FortiGate backup firmware l restore an IPS custom signature file When virtual domain configuration is enabled (in system global, vdom-admin is enabled), the content of the backup file depends on the administrator account that created it. A backup of the system configuration from the super admin account contains the global settings and the settings for all of the VDOMs. Only the super admin account can restore the configuration from this file. A backup file from a regular administrator account contains the global settings and the settings for the VDOM to which the administrator belongs. Only a regular administrator account can restore the configuration from this file. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 910 restore execute Syntax execute restore av ftp <filename_str> <server_ipv4[:port_int] | server_fqdn[:port_int]> [<username_str> <password_str>] execute restore av tftp <filename_str> <server_ipv4[:port_int]> execute restore config flash <revision> execute restore config ftp <filename_str> <server_ipv4[:port_int] | server_fqdn[:port_ int]> [<username_str> <password_str>] [<backup_password_str>] execute restore config management-station {normal | template | script} <rev_int> execute restore config tftp <filename_str> <server_ipv4> [<backup_password_str>] execute restore config usb <filename_str> [<backup_password_str>] execute restore config usb-mode [<backup_password_str>] execute restore forticlient tftp <filename_str> <server_ipv4> execute restore image flash <revision> execute restore image ftp <filename_str> <server_ipv4[:port_int] | server_fqdn[:port_ int]> [<username_str> <password_str>] execute restore image management-station <version_int> execute restore image tftp <filename_str> <server_ipv4> execute restore image usb <filename_str> execute restore ips ftp <filename_str> <server_ipv4[:port_int] | server_fqdn[:port_ int]> [<username_str> <password_str>] execute restore ips tftp <filename_str> <server_ipv4> execute restore ipsuserdefsig ftp <filename_str> <server_ipv4[:port_int] | server_fqdn [:port_int]> [<username_str> <password_str>] execute restore ipsuserdefsig tftp <filename_str> <server_ipv4> execute restore secondary-image ftp <filename_str> <server_ipv4[:port_int] | server_ fqdn[:port_int]> [<username_str> <password_str>] execute restore secondary-image tftp <filename_str> <server_ipv4> execute restore secondary-image usb <filename_str> execute restore src-vis <src-vis-pkgfile> execute restore vcm {ftp | tftp} <filename_str> <server_ipv4> execute restore vmlicense {ftp | tftp} <filename_str> <server_ipv4> Variable Description av ftp <filename_ str> <server_ipv4 [:port_int] | server_ fqdn[:port_int]> [<username_str> <password_str>] Download the antivirus database file from an FTP server to the FortiGate unit. av tftp <filename_ str> <server_ipv4 [:port_int]> Download the antivirus database file from a TFTP server to the FortiGate unit. config flash <revision> Restore the specified revision of the system configuration from the flash disk. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 911 execute Variable config ftp <filename_str> <server_ipv4[:port_ int] | server_fqdn [:port_int]> [<username_str> <password_str>] [<backup_ password_str>] restore Description Restore the system configuration from an FTP server. The new configuration replaces the existing configuration, including administrator accounts and passwords. If the backup file was created with a password, you must specify the password. config managementstation {normal | template | script} <rev_int> Restore the system configuration from the central management server. The new configuration replaces the existing configuration, including administrator accounts and passwords. config tftp <filename_str> <server_ipv4> [<backup_ password_str>] Restore the system configuration from a file on a TFTP server. The new configuration replaces the existing configuration, including administrator accounts and passwords. config usb <filename_str> [<backup_ password_str>] config usb-mode [<backup_ password_str>] rev_int is the revision number of the saved configuration to restore. Enter 0 for the most recent revision. If the backup file was created with a password, you must specify the password. Restore the system configuration from a file on a USB disk. The new configuration replaces the existing configuration, including administrator accounts and passwords. If the backup file was created with a password, you must specify the password. Restore the system configuration from a USB disk. The new configuration replaces the existing configuration, including administrator accounts and passwords. When the USB drive is removed, the FortiGate unit needs to reboot and revert to the unit’s existing configuration. If the backup file was created with a password, you must specify the password. forticlient tftp <filename_str> <server_ipv4> Download the FortiClient image from a TFTP server to the FortiGate unit. The filename must have the format: FortiClientSetup_versionmajor. versionminor.build.exe. For example, FortiClientSetup.4.0.377.exe. image flash <revision> Restore specified firmware image from flash disk. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 912 restore Variable image ftp <filename_str> <server_ipv4[:port_ int] | server_fqdn [:port_int]> [<username_str> <password_str>] image managementstation <version_ int> execute Description Download a firmware image from an FTP server to the FortiGate unit. The FortiGate unit reboots, loading the new firmware. This command is not available in multiple VDOM mode. Download a firmware image from the central management station. This is available if you have configured a FortiManager unit as a central management server. This is also available if your account with FortiGuard Analysis and Management Service allows you to upload firmware images. image tftp <filename_str> <server_ipv4> Download a firmware image from a TFTP server to the FortiGate unit. The FortiGate unit reboots, loading the new firmware. image usb <filename_str> Download a firmware image from a USB disk to the FortiGate unit. The FortiGate unit reboots, loading the new firmware. ips ftp <filename_ str> <server_ipv4 [:port_int] | server_ fqdn[:port_int]> [<username_str> <password_str>] Download the IPS database file from an FTP server to the FortiGate unit. ips tftp <filename_ str> <server_ipv4> Download the IPS database file from a TFTP server to the FortiGate unit. ipsuserdefsig ftp <filename_str> <server_ipv4[:port_ int] | server_fqdn [:port_int]> [<username_str> <password_str>] Restore IPS custom signature file from an FTP server. The file will overwrite the existing IPS custom signature file. ipsuserdefsig tftp <filename_str> <server_ipv4> Restore an IPS custom signature file from a TFTP server. The file will overwrite the existing IPS custom signature file. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. This command is not available in multiple VDOM mode. 913 execute revision Variable Description secondary-image ftp <filename_str> <server_ipv4[:port_ int] | server_fqdn [:port_int]> [<username_str> <password_str>] Download a firmware image from an FTP server as the backup firmware of the FortiGate unit. Available on models that support backup firmware images. secondary-image tftp <filename_str> <server_ipv4> Download a firmware image from a TFTP server as the backup firmware of the FortiGate unit. Available on models that support backup firmware images. secondary-image usb <filename_str> Download a firmware image from a USB disk as the backup firmware of the FortiGate unit. The unit restarts when the upload is complete. Available on models that support backup firmware images. src-vis <src-vispkgfile> Download source visibility signature package. vcm {ftp | tftp} <filename_str> <server_ipv4> Restore VCM engine/plugin from an ftp or tftp server. vmlicense {ftp | tftp} <filename_str> <server_ipv4> Restore VM license (VM version of product only). Example This example shows how to upload a configuration file from a TFTP server to the FortiGate unit and restart the FortiGate unit with this configuration. The name of the configuration file on the TFTP server is backupconfig. The IP address of the TFTP server is 192.168.1.23. execute restore config tftp backupconfig 192.168.1.23 revision Use these commands to manage configuration and firmware image files on the local disk. Syntax To delete a configuration file execute revision delete config <revision> To delete a firmware image file execute revision delete image <revision> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 914 router clear bfd session execute To list the configuration files execute revision list config To delete a firmware image file execute revision list image router clear bfd session Use this command to clear bi-directional forwarding session. Syntax execute router clear bfd session <src_ip> <dst_ip> <interface> Variable Description <src_ip> Select the source IP address of the session. <dst_ip> Select the destination IP address of the session. <interface> Select the interface for the session. router clear bgp Use this command to clear BGP peer connections. Syntax execute execute execute execute execute execute router router router router router router Variable clear clear clear clear clear clear bgp bgp bgp bgp bgp bgp all [soft] [in | out] as <as_number> [soft] [in | out] dampening {ip_address | ip/netmask} external {in prefix-filter} [soft] [in | out] flap-statistics {ip_address | ip/netmask} ip <ip_address> [soft] [in | out] Description all Clear all BGP peer connections. as <as_number> Clear BGP peer connections by AS number. dampening {ip_ address | ip/netmask} Clear route flap dampening information for peer or network. external {in prefixfilter} Clear all external peers. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 915 execute router clear ospf process Variable Description ip <ip_address> Clear BGP peer connections by IP address. peer-group Clear all members of a BGP peer-group. [in | out] Optionally limit clear operation to inbound only or outbound only. flap-statistics {ip_ address | ip/netmask} Clear flap statistics for peer or network. soft Do a soft reset that changes the configuration but does not disturb existing sessions. router clear ospf process Use this command to clear and restart the OSPF router. Syntax IPv4: execute router clear ospf process IPv6: execute router clear ospf6 process router restart Use this command to restart the routing software. Syntax execute router restart send-fds-statistics Use this command to send an FDS statistics report now, without waiting for the FDS statistics report interval to expire. Syntax execute send-fds-statistics CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 916 set system session filter execute set system session filter Use these commands to define the session filter for get system session commands. Syntax To clear the filter settings execute set system session filter clear {all|dport|dst|duration|expire|policy|proto|sport|src|vd} To specify destination port execute set system session filter dport <port_range> To specify destination IP address execute set system session filter dst <ip_range> To specify duration execute set system session filter duration <duration_range> To specify expiry execute set system session filter expire <expire_range> To list the filter settings execute set system session filter list To invert a filter setting execute set system session filter negate {dport|dst|duration|expire|policy|proto|sport|src|vd} To specify firewall policy ID execute set system session filter policy <policy_range> To specify protocol execute set system session filter proto <protocol_range> To specify source port execute set system session filter sport <port_range> To specify source IP address execute set system session filter src <ip_range> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 917 execute set-next-reboot To specify virtual domain execute set system session filter vd <vdom_index> Variable Description <duration_range> The start and end times, separated by a space. <expire_range> The start and end times, separated by a space. <ip_range> The start and end IP addresses, separated by a space. <policy_range> The start and end policy numbers, separated by a space. <port_range> The start and end port numbers, separated by a space. <protocol_range> The start and end protocol numbers, separated by a space. <vdom_index> The VDOM index number. -1 means all VDOMs. set-next-reboot Use this command to start the FortiGate unit with primary or secondary firmware after the next reboot. Available on models that can store two firmware images. By default, the FortiGate unit loads the firmware from the primary partition. VDOM administrators do not have permission to run this command. It must be executed by a super administrator. Syntax execute set-next-reboot {primary | secondary} sfp-mode-sgmii Change the SFP mode for an NP2 card to SGMII. By default when an AMC card is inserted the SFP mode is set to SERDES mode by default. If a configured NP2 card is removed and re-inserted, the SFP mode goes back to the default. In these situations, the sfpmode-sgmii command will change the SFP mode from SERDES to SGMII for the interface specified. Syntax execute sfpmode-sgmii <interface> <interface> is the NP2 interface where you are changing the SFP mode. shutdown Shut down the FortiGate unit now. You will be prompted to confirm this command. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 918 ssh execute Abruptly powering off your FortiGate unit may corrupt its configuration. Using the reboot and shutdown options here or in the web-based manager ensure proper shutdown procedures are followed to prevent any loss of configuration. Syntax execute shutdown [comment <comment_string>] comment is optional but you can use it to add a message that will appear in the event log message that records the shutdown. The comment message of the does not appear on the Alert Message console. If the message is more than one word it must be enclosed in quotes. Example This example shows the reboot command with a message included. execute shutdown comment “emergency facility shutdown” An event log message similar to the following is recorded: 2009-09-08 11:12:31 critical admin 41986 ssh(172.20.120.11) shutdown User admin shutdown the device from ssh(172.20.120.11). The reason is 'emergency facility shutdown' ssh Use this command to establish an ssh session with another system. Syntax execute ssh <destination> [<port>] <destination> - the destination in the form user@ip or user@host. [<port>] - optional TCP port number Example execute ssh admin@172.20.120.122 To end an ssh session, type exit: FGT-6028030112 # exit Connection to 172.20.120.122 closed. FGT-8002805000 # sync-session Use this command to force a session synchronization. Syntax execute sync-session CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 919 execute system custom-language import system custom-language import Use this command to import a custom language file from a TFTP server. The web-based manager provides a downloadable template file. Go to System > Config > Advanced. Syntax execute system custom-language import <lang_name> <file_name> <tftp_server_ip> <lang_name> - language name <file_name> - the language file name <tftp_server_ip> the TFTP server IP address system fortisandbox test-connectivity Use this command to query FortiSandbox connection status. Syntax execute fortisandbox test-connectivity tac report Use this command to create a debug report to send to Fortinet Support. Normally you would only use this command if requested to by Fortinet Support. Syntax execute tac report telnet Use telnet client. You can use this tool to test network connectivity. Syntax execute telnet <telnet_ipv4> <telnet_ipv4> is the address to connect with. Type exit to close the telnet session. time Get or set the system time. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 920 traceroute execute Syntax execute time [<time_str>] time_str has the form hh:mm:ss, where hh is the hour and can be 00 to 23 mm is the minutes and can be 00 to 59 ss is the seconds and can be 00 to 59 If you do not specify a time, the command returns the current system time. You are allowed to shorten numbers to only one digit when setting the time. For example both 01:01:01 and 1:1:1 are allowed. Example This example sets the system time to 15:31:03: execute time 15:31:03 traceroute Test the connection between the FortiGate unit and another network device, and display information about the network hops between the device and the FortiGate unit. Syntax execute traceroute {<ip_address> | <host-name>} Example This example shows how to test the connection with http://docs.forticare.com. In this example the traceroute command times out after the first hop indicating a possible problem. #execute traceoute docs.forticare.com traceroute to docs.forticare.com (65.39.139.196), 30 hops max, 38 byte packets 1 172.20.120.2 (172.20.120.2) 0.324 ms 0.427 ms 0.360 ms 2 * * * If your FortiGate unit is not connected to a working DNS server, you will not be able to connect to remote hostnamed locations with traceroute. tracert6 Test the connection between the FortiGate unit and another network device using IPv6 protocol, and display information about the network hops between the device and the FortiGate unit. Syntax tracert6 [-Fdn] [-f first_ttl] [-i interface] [-m max_ttl] [-s src_addr] [-q nprobes] [-w waittime] [-z sendwait] host [paddatalen] CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 921 execute update-av Variable Description -F Set Don’t Fragment bit. -d Enable debugging. -n Do not resolve numeric address to domain name. -f <first_ttl> Set the initial time-to-live used in the first outgoing probe packet. -i <interface> Select interface to use for tracert. -m <max_ttl> Set the max time-to-live (max number of hops) used in outgoing probe packets. -s <src_addr> Set the source IP address to use in outgoing probe packets. -q <nprobes> Set the number probes per hop. -w <waittime> Set the time in seconds to wait for response to a probe. Default is 5. -z <sendwait> Set the time in milliseconds to pause between probes. host Enter the IP address or FQDN to probe. <paddatalen> Set the packet size to use when probing. update-av Use this command to manually initiate the virus definitions and engines update. To update both virus and attack definitions, use the execute update-now command. Syntax execute update-av update-geo-ip Use this command to obtain an update to the IP geography database from FortiGuard. Syntax execute update-geo-ip update-ips Use this command to manually initiate the Intrusion Prevention System (IPS) attack definitions and engine update. To update both virus and attack definitions, use the execute update-now command. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 922 update-list execute Syntax execute update-ips update-list Use this command to download an updated FortiGuard server list. Syntax execute update-list update-now Use this command to manually initiate both virus and attack definitions and engine updates. To initiate only virus or attack definitions, use the execute update-av or execute update-ids command respectively. Syntax execute update-now update-src-vis Use this command to trigger an FDS update of the source visibility signature package. Syntax execute update-src-vis upd-vd-license Use this command to enter a Virtual Domain (VDOM) license key. If you have a FortiGate- unit that supports VDOM licenses, you can purchase a license key from Fortinet to increase the maximum number of VDOMs to 25, 50, 100 or 500. By default, FortiGate units support a maximum of 10 VDOMs. Available on FortiGate models that can be licensed for more than 10 VDOMs. Syntax execute upd-vd-license <license_key> Variable <license_key> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Description The license key is a 32-character string supplied by Fortinet. Fortinet requires your unit serial number to generate the license key. 923 execute upload upload Use this command to upload system configurations and firmware images to the flash disk from FTP, TFTP, or USB sources. Syntax To upload configuration files: execute upload config ftp <filename_str> <comment> <server_ipv4[:port_int] | server_ fqdn[:port_int]> [<username_str> [<password_str>]] [<backup_password_str>] execute upload config tftp <filename_str> <comment> <server_ipv4> execute upload config usb <filename_str> <comment> To upload firmware image files: execute upload image ftp <filename_str> <comment> <server_ipv4[:port_int] | server_fqdn [:port_int]> [<username_str> [<password_str>]] execute upload image tftp <filename_str> <comment> <server_ipv4> execute upload image usb <filename_str> <comment> To upload report image files: execute upload report-img ftp <filename_str> <server_ipv4[:port_int] | server_fqdn [:port_int]> [<username_str> [<password_str>]] execute upload report-img tftp <filename_str> <server_ipv4> Variable Description <comment> Comment string. <filename_str> Filename to upload. <server_fqdn[:port_ int]> Server fully qualified domain name and optional port. <server_ipv4[:port_ int]> Server IP address and optional port number. <username_str> Username required on server. <password_str> Password required on server. <backup_password_ str> Password for backup file. usb-device Use these commands to manage FortiExplorer IOS devices. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 924 usb-disk execute Syntax List connected FortiExplorer IOS devices execute usb-device list Disconnect FortiExplorer IOS devices execute usb-device disconnect usb-disk Use these commands to manage your USB disks. Syntax execute execute execute execute usb-disk usb-disk usb-disk usb-disk Variable delete <filename> format list rename <old_name> <new_name> Description delete <filename> Delete the named file from the USB disk. format Format the USB disk. list List the files on the USB disk. rename <old_ name> <new_ name> Rename a file on the USB disk. vpn certificate ca Use this command to import a CA certificate from a TFTP or SCEP server to the FortiGate unit, or to export a CA certificate from the FortiGate unit to a TFTP server. Before using this command you must obtain a CA certificate issued by a CA. Digital certificates are used to ensure that both participants in an IPSec communications session are trustworthy, prior to an encrypted VPN tunnel being set up between the participants. The CA certificate is the certificate that the FortiGate unit uses to authenticate itself to other devices. VPN peers must use digital certificates that adhere to the X.509 standard. Digital certificates are not required for configuring FortiGate VPNs. Digital certificates are an advanced feature provided for the convenience of system administrators. This manual assumes the user has prior knowledge of how to configure digital certificates for their implementation. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 925 execute vpn certificate crl Syntax execute vpn certificate ca export tftp <certificate-name_str> <file-name_str> <tftp_ip> execute vpn certificate ca import auto <ca_server_url> <ca_identifier_str> execute vpn certificate ca import tftp <file-name_str> <tftp_ip> Variable Description import Import the CA certificate from a TFTP server to the FortiGate unit. export Export or copy the CA certificate from the FortiGate unit to a file on the TFTP server. Type ? for a list of certificates. <certificate-name_ str> Enter the name of the CA certificate. <file-name_str> Enter the file name on the TFTP server. <tftp_ip> Enter the TFTP server address. auto Retrieve a CA certificate from a SCEP server. tftp Import the CA certificate to the FortiGate unit from a file on a TFTP server (local administrator PC). <ca_server_url> Enter the URL of the CA certificate server. <ca_identifier_str> CA identifier on CA certificate server (optional). Examples Use the following command to import the CA certificate named trust_ca to the FortiGate unit from a TFTP server with the address 192.168.21.54. execute vpn certificate ca import trust_ca 192.168.21.54 vpn certificate crl Use this command to get a CRL via LDAP, HTTP, or SCEP protocol, depending on the auto-update configuration. In order to use the command execute vpn certificate crl, the authentication servers must already be configured. Digital certificates are used to ensure that both participants in an IPSec communications session are trustworthy, prior to an encrypted VPN tunnel being set up between the participants. The CA certificate is the certificate that the FortiGate unit uses to authenticate itself to other devices. VPN peers must use digital certificates that adhere to the X.509 standard. Digital certificates are not required for configuring FortiGate VPNs. Digital certificates are an advanced feature provided for the convenience of system administrators. This manual assumes the user has prior knowledge of how to configure digital certificates for their implementation. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 926 vpn certificate local export execute Syntax execute vpn certificate crl import auto <crl-name> Variable Description import Import the CRL from the configured LDAP, HTTP, or SCEP authentication server to the FortiGate unit. <crl-name> Enter the name of the CRL. auto Trigger an auto-update of the CRL from the configured LDAP, HTTP, or SCEP authentication server. vpn certificate local export Use this command to export a local certificate from the FortiGate unit to a TFTP server. Digital certificates are used to ensure that both participants in an IPSec communications session are trustworthy, prior to an encrypted VPN tunnel being set up between the participants. The local certificate is the certificate that the FortiGate unit uses to authenticate itself to other devices. VPN peers must use digital certificates that adhere to the X.509 standard. Digital certificates are not required for configuring FortiGate VPNs. Digital certificates are an advanced feature provided for the convenience of system administrators. This manual assumes the user has prior knowledge of how to configure digital certificates for their implementation. Syntax execute vpn certificate local export tftp <certificate-name_str> <file-name_str> <tftp_ ip> Variable export Description Export or copy the local certificate from the FortiGate unit to a file on the TFTP server. Type ? for a list of certificates. Enter the name of the local certificate. <certificate-name_ str> To view a list of the local certificates, you can enter: execute vpn certificate local export tftp ? <file-name_str> Enter the file name on the TFTP server. <tftp_ip> Enter the TFTP server address. Example Use the following command to export the local certificate request generated in the above example from the FortiGate unit to a TFTP server. The example uses the file name testcert for the downloaded file and the CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 927 execute vpn certificate local generate TFTP server address 192.168.21.54. execute vpn certificate local export branch_cert testcert 192.168.21.54 vpn certificate local generate Use this command to generate a local certificate. Digital certificates are used to ensure that both participants in an IPSec communications session are trustworthy, prior to an encrypted VPN tunnel being set up between the participants. The local certificate is the certificate that the FortiGate unit uses to authenticate itself to other devices. When you generate a certificate request, you create a private and public key pair for the local FortiGate unit. The public key accompanies the certificate request. The private key remains confidential. When you receive the signed certificate from the CA, use the vpn certificate local command to install it on the FortiGate unit. VPN peers must use digital certificates that adhere to the X.509 standard. Digital certificates are not required for configuring FortiGate VPNs. Digital certificates are an advanced feature provided for the convenience of system administrators. This manual assumes the user has prior knowledge of how to configure digital certificates for their implementation. Syntax To generate the default CA certificate used by SSL Inspection execute vpn certificate local generate default-ssl-ca To generate the default server key used by SSL Inspection execute vpn certificate local generate default-ssl-serv-key To generate an elliptical curve certificate request execute vpn certificate local generate ec <certificate-name_str> <elliptic-curve-name> <subject_str> [<optional_information>] To generate an RSA certificate request execute vpn certificate local generate rsa <certificate-name_str> <key-length> <subject_str> [<optional_information>] Variable <certificate-name_ str> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Description Enter a name for the certificate. The name can contain numbers (0-9), uppercase and lowercase letters (A-Z, a-z), and the special characters - and _. Other special characters and spaces are not allowed. 928 vpn certificate local generate Variable execute Description <elliptic-curvename> Enter the elliptic curve name: secp256rl, secp384rl, or secp521rl. <key-length> Enter 1024, 1536 or 2048 for the size in bits of the encryption key. <subject_str> Enter the FortiGate unit host IP address, its fully qualified domain name, or an email address to identify the FortiGate unit being certified. An IP address or domain name is preferred. If this is impossible (such as with a dialup client), use an e-mail address. If you specify a host IP or domain name, use the IP address or domain name associated with the interface on which IKE negotiations will take place (usually the external interface of the local FortiGate unit). If the IP address in the certificate does not match the IP address of this interface (or if the domain name in the certificate does not match a DNS query of the FortiGate unit’s IP), then some implementations of IKE may reject the connection. Enforcement of this rule varies for different IPSec products. [<optional_ information>] Enter optional_information as required to further identify the certificate. See Optional information variables on page 60 for the list of optional information variables. You must enter the optional variables in order that they are listed in the table. To enter any optional variable you must enter all of the variables that come before it in the list. For example, to enter the organization_name_str, you must first enter the country_code_str, state_name_str, and city_name_ str. While entering optional variables, you can type ? for help on the next required variable. Optional information variables Variable Description <country_code_str> Enter the two-character country code. Enter execute vpn certificates local generate <name_str> country followed by a ? for a list of country codes. The country code is case sensitive. Enter null if you do not want to specify a country. <state_name_str> Enter the name of the state or province where the FortiGate unit is located. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 929 execute vpn certificate local import Variable Description <city_name_str> Enter the name of the city, or town, where the person or organization certifying the FortiGate unit resides. <organization-name_ str> Enter the name of the organization that is requesting the certificate for the FortiGate unit. <organization-unit_ name_str> Enter a name that identifies the department or unit within the organization that is requesting the certificate for the FortiGate unit. <email_address_str> Enter a contact e-mail address for the FortiGate unit. <ca_server_url> Enter the URL of the CA (SCEP) certificate server that allows auto-signing of the request. <challenge_ password> Enter the challenge password for the SCEP certificate server. Example Use the following command to generate a local certificate request with the name branch_cert, the domain name www.example.com and a key size of 1536. execute vpn certificate local generate branch_cert 1536 www.example.com vpn certificate local import Use this command to import a local certificate to the FortiGate unit from a TFTP server. Digital certificates are used to ensure that both participants in an IPSec communications session are trustworthy, prior to an encrypted VPN tunnel being set up between the participants. The local certificate is the certificate that the FortiGate unit uses to authenticate itself to other devices. VPN peers must use digital certificates that adhere to the X.509 standard. Digital certificates are not required for configuring FortiGate VPNs. Digital certificates are an advanced feature provided for the convenience of system administrators. This manual assumes the user has prior knowledge of how to configure digital certificates for their implementation. Syntax execute vpn certificate local import tftp <file-name_str> <tftp_ip> Variable <certificate-name_ str> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Description Enter the name of the local certificate. 930 vpn certificate remote Variable execute Description <file-name_str> Enter the file name on the TFTP server. <tftp_ip> Enter the TFTP server address. Example Use the following command to import the signed local certificate named branch_cert to the FortiGate unit from a TFTP server with the address 192.168.21.54. execute vpn certificate local import branch_cert 192.168.21.54 vpn certificate remote Use this command to import a remote certificate from a TFTP server, or export a remote certificate from the FortiGate unit to a TFTP server. The remote certificates are public certificates without a private key. They are used as OCSP (Online Certificate Status Protocol) server certificates. Syntax execute vpn certificate remote import tftp <file-name_str> <tftp_ip> execute vpn certificate remote export tftp <certificate-name_str> <file-name_str> <tftp_ip> Field/variable Description import Import the remote certificate from the TFTP server to the FortiGate unit. export Export or copy the remote certificate from the FortiGate unit to a file on the TFTP server. Type ? for a list of certificates. <certificate-name_ str> Enter the name of the public certificate. <file-name_str> Enter the file name on the TFTP server. <tftp_ip> Enter the TFTP server address. tftp Import/export the remote certificate via a TFTP server. vpn ipsec tunnel down Use this command to shut down an IPsec VPN tunnel. Syntax execute vpn ipsec tunnel down <phase2> [<phase1> <phase2_serial>] where: CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 931 execute vpn ipsec tunnel up <phase2> is the phase 2 name <phase1> is the phase 1 name <phase2_serial> is the phase 2 serial number <phase1> is required on a dial-up tunnel. vpn ipsec tunnel up Use this command to activate an IPsec VPN tunnel. Syntax execute vpn ipsec tunnel up <phase2> [<phase1> <phase2_serial>] where: <phase2> is the phase 2 name <phase1> is the phase 1 name <phase2_serial> is the phase 2 serial number This command cannot activate a dial-up tunnel. vpn sslvpn del-all Use this command to delete all SSL VPN connections in this VDOM. Syntax execute vpn sslvpn del-all vpn sslvpn del-tunnel Use this command to delete an SSL tunnel connection. Syntax execute vpn sslvpn del-tunnel <tunnel_index> <tunnel_index> identifies which tunnel to delete if there is more than one active tunnel. vpn sslvpn del-web Use this command to delete an active SSL VPN web connection. Syntax execute vpn sslvpn del-web <web_index> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 932 vpn sslvpn list execute <web_index> identifies which web connection to delete if there is more than one active connection. vpn sslvpn list Use this command to list current SSL VPN tunnel connections. Syntax execute vpn sslvpn list {web | tunnel} webfilter quota-reset Use this command to reset user quota. Syntax execute webfilter quota-reset <wf-profile> <user_ip4addr> execute webfilter quota-reset <wf-profile> <user_name> wireless-controller delete-wtp-image Use this command to delete all firmware images for WLAN Termination Points (WTPs), also known as physical access points. Syntax execute wireless-controller delete-wtp-image wireless-controller list-wtp-image Use this command to list all firmware images for WLAN Termination Points (WTPs), also known as WiFi physical access points. Syntax execute wireless-controller list-wtp-image Example output WTP Images on AC: ImageName ImageSize(B) ImageInfo ImageMTime FAP22A-IMG.wtp 3711132 FAP22A-v4.0-build212 Mon Jun 6 12:26:41 2011 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 933 execute wireless-controller reset-wtp wireless-controller reset-wtp Use this command to reset a physical access point (WTP). If the FortiGate unit has a more recent version of the FortiAP firmware, the FortiAP unit will download and install it. Use the command execute wireless-controller upload-wtp-image to upload FortiAP firmware to the FortiGate unit. Syntax execute wireless-controller reset-wtp {<serialNumber_str> | all} where <serialNumber_str> is the FortiWiFi unit serial number. Use the all option to reset all APs. wireless-controller restart-acd Use this command to restart the wireless-controller daemon. Syntax execute wireless-controller restart-acd wireless-controller restart-wtpd Use this command to restart the wireless access point daemon. Syntax execute wireless-controller restart-wtpd wireless-controller upload-wtp-image Use this command to upload a FortiWiFi firmware image to the FortiGate unit. Wireless APs controlled by this wireless controller can download the image as needed. Use the execute wireless-controller reset-wtp command to trigger FortiAP units to update their firmware. Syntax FTP: execute wireless-controller upload-wtp-image ftp <filename_str> <server_ipv4[:port_ int]> [<username_str> <password_str>] TFTP: execute wireless-controller upload-wtp-image tftp <filename_str> <server_ipv4> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 934 application internet-service status get get The get commands retrieve information about the operation and performance of your FortiGate unit. application internet-service status Use this command to display Internet service information. Syntax get application internet-service status [<app-id>] All application IDs are listed if <app-id> is not specified. Example output FG-5KD3914800284 # get application internet-service status 1245324 id: 1245324 app-name: "Fortinet-FortiGuard" application internet-service-summary Use this command to display information about the Internet service database. Syntax get application internet-service-summary Example output FG-5KD3914800284 # get application internet-service-summary Version: 00002.00679 Timestamp: 201512161002 Number of Entries: 1267 certificate Display detailed information about local and CA certificates installed on the FortiGate.This is a global level command. At the VDOM level, use get vpn certificate. Syntax get certificate {local | ca} details [certificate_name] CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 935 get extender modem-status extender modem-status Use this command to display detailed FortiExtender modem status information. Syntax get extender modem-status <serno> where <serno> is the FortiExtender serial number. Example output physical_port: Internal manufacture: Sierra Wireless, Incorporated product: AirCard 313U model: AirCard 313U revision: SWI9200X_03.05.10.02AP R4684 CARMD-EN-10527 2012/02/25 11:58:38 imsi: 310410707582825 pin_status: READY service: N/A signal_strength: 73 RSSI: -68 dBm connection_status: connected Profile 1: broadband Profile 2: broadband Profile 13: wap.cingular Profile 15: broadband NAI: w.tp Profile: 0 Disabled home_addr: 127.219.10.128 primary_ha: 127.218.246.40 secondary_ha: 119.75.69.176 aaa_spi: 0 ha_spi: 4 esn_imei: 012615000227604 activation_status: Activated roaming_status: N/A usim_status: N/A oma_dm_version: N/A plmn: N/A band: B17 signal_rsrq: N/A signal_rsrp: N/A lte_sinr: N/A lte_rssi: N/A lte_rs_throughput: N/A lte_ts_throughput: N/A lte_physical_cellid: N/A modem_type: drc_cdma_evdo: N/A current_snr: N/A wireless_operator: operating_mode: N/A wireless_signal: 73 usb_wan_mac: 16:78:f7:db:01:07 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 936 extender sys-info get extender sys-info Use this command to display detailed FortiExtender system information. Syntax get extender sys-info firewall dnstranslation Use this command to display the firewall DNS translation table. Syntax get firewall dnstranslation firewall iprope appctrl Use this command to list all application control signatures added to an application control list and display a summary of the application control configuration. Syntax get firewall iprope appctrl {list | status} Example output In this example, the FortiGate unit includes one application control list that blocks the FTP application. get firewall iprope appctrl list app-list=app_list_1/2000 other-action=Pass app-id=15896 list-id=2000 action=Block get firewall iprope appctrl status appctrl table 3 list 1 app 1 shaper 0 firewall iprope list Use this command to list all of the FortiGate unit iprope firewall policies. Optionally include a group number in hexidecimal format to display a single policy. Policies are listed in FortiOS format. Syntax get firewall iprope list [<group_number_hex>] CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 937 get firewall proute, proute6 Example output get firewall iprope list 0010000c policy flag (8000000): pol_stats flag2 (20): ep_block shapers: / per_ip= imflag: sockport: 1011 action: redirect index: 0 schedule() group=0010000c av=00000000 au=00000000 host=0 split=00000000 chk_client_info=0x0 app_list=0 misc=0 grp_info=0 seq=0 hash=0 npu_sensor_id=0 tunnel= zone(1): 0 ->zone(1): 0 source(0): dest(0): source wildcard(0): destination wildcard(0): service(1): [6:0x8:1011/(0,65535)->(80,80)] nat(0): mms: 0 0 firewall proute, proute6 Use these commands to list policy routes. Syntax For IPv4 policy routes: get firewall proute For IPv6 policy routes: get firewall proute6 Example output get firewall proute list route policy info(vf=root): iff=5 src=1.1.1.0/255.255.255.0 tos=0x00 tos_mask=0x00 dst=0.0.0.0/0.0.0.0 protocol=80 port=1:65535 oif=3 gwy=1.2.3.4 firewall service custom Use this command to view the list of custom services. If you do not specify a <service_name> the command lists all of the pre-defined services. Syntax get firewall service custom This lists the services. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 938 firewall shaper get To view details about all services config firewall service custom show full-configuration To view details about a specific service This example lists the configuration for the ALL_TCP service: config firewall service custom edit ALL_TCP show full-configuration Example output This is a partial output. get firewall service custom == [ ALL ] name: ALL == [ ALL_TCP ] name: ALL_TCP == [ ALL_UDP ] name: ALL_UDP == [ ALL_ICMP ] name: ALL_ICMP == [ ALL_ICMP6 ] name: ALL_ICMP6 == [ GRE ] name: GRE == [ AH ] name: AH == [ ESP ] name: ESP == [ AOL ] name: AOL == [ BGP ] name: BGP == [ DHCP ] name: DHCP == [ DNS ] name: DNS == [ FINGER ] name: FINGER firewall shaper Use these command to retrieve information about traffic shapers. Syntax To get information about per-ip traffic shapers get firewall shaper per-ip CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 939 get grep To get information about shared traffic shapers get firewall shaper traffic-shaper grep In many cases the get and show (and diagnose) commands may produce a large amount of output. If you are looking for specific information in a large get or show command output you can use the grep command to filter the output to only display what you are looking for. The grep command is based on the standard UNIX grep, used for searching text output based on regular expressions. Information about how to use grep and regular expressions is available from the Internet. For example, see http://www.opengroup.org/onlinepubs/009695399/utilities/grep.html. Syntax {get | show| diagnose} | grep <regular_expression> Example output Use the following command to display the MAC address of the FortiGate unit internal interface: get hardware nic internal | grep Current_HWaddr Current_HWaddr 00:09:0f:cb:c2:75 Use the following command to display all TCP sessions in the session list and include the session list line number in the output get system session list | grep -n tcp 19:tcp 1110 10.31.101.10:1862 172.20.120.122:30670 69.111.193.57:1469 27:tcp 3599 10.31.101.10:2061 - 10.31.101.100:22 38:tcp 3594 10.31.101.10:4780 172.20.120.122:49700 172.20.120.100:445 43:tcp 3582 10.31.101.10:4398 172.20.120.122:49574 24.200.188.171:48726 - Use the following command to display all lines in HTTP replacement message commands that contain URL (upper or lower case): show system replacemsg http | grep -i url set buffer "<HTML><BODY>The page you requested has been blocked because it contains a banned word. URL = %%PROTOCOL%%%%URL%%</BODY></HTML>" config system replacemsg http "url-block" set buffer "<HTML><BODY>The URL you requested has been blocked. URL = %%URL%%</BODY></HTML>" config system replacemsg http "urlfilter-err" . . . gui console status Display information about the CLI console. Syntax get gui console status CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 940 gui topology status get Example The output looks like this: Preferences: User: admin Colour scheme (RGB): text=FFFFFF, background=000000 Font: style=monospace, size=10pt History buffer=50 lines, external input=disabled gui topology status Display information about the topology viewer database. The topology viewer is available only if the Topology widget has been added to a customized web-based manager menu layout. Syntax get gui topology status Example output Preferences: Canvas dimensions (pixels): width=780, height=800 Colour scheme (RGB): canvas=12ff08, lines=bf0f00, exterior=ddeeee Background image: type=none, placement: x=0, y=0 Line style: thickness=2 Custom background image file: none Topology element database: __FortiGate__: x=260, y=340 Office: x=22, y=105 ISPnet: x=222, y=129 __Text__: x=77, y=112: "Ottawa" __Text__: x=276, y=139: "Internet" hardware cpu Use this command to display detailed information about all of the CPUs in your FortiGate unit. Syntax get hardware cpu Example output get hardware npu legacy list No npu ports are found 620_ha_1 # get hardware cpu processor : 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 941 get hardware memory vendor_id : GenuineIntel cpu family : 6 model : 15 model name : Intel(R) Core(TM)2 Duo CPU E4300 @ 1.80GHz stepping : 13 cpu MHz : 1795.545 cache size : 64 KB fdiv_bug : no hlt_bug : no f00f_bug : no coma_bug : no fpu : yes fpu_exception : yes cpuid level : 10 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe lm pni monitor ds_cpl tm2 est bogomips : 3578.26 processor : 1 vendor_id : GenuineIntel cpu family : 6 model : 15 model name : Intel(R) Core(TM)2 Duo CPU E4300 @ 1.80GHz stepping : 13 cpu MHz : 1795.545 cache size : 64 KB fdiv_bug : no hlt_bug : no f00f_bug : no coma_bug : no fpu : yes fpu_exception : yes cpuid level : 10 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe lm pni monitor ds_cpl tm2 est bogomips : 3578.26 hardware memory Use this command to display information about FortiGate unit memory use including the total, used, and free memory. Syntax get hardware memory Example output get hardware memory total: used: free: shared: buffers: cached: shm: Mem: 3703943168 348913664 3355029504 0 192512 139943936 137314304 Swap: 0 0 0 MemTotal: 3617132 kB CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 942 hardware nic get MemFree: 3276396 kB MemShared: 0 kB Buffers: 188 kB Cached: 136664 kB SwapCached: 0 kB Active: 22172 kB Inactive: 114740 kB HighTotal: 1703936 kB HighFree: 1443712 kB LowTotal: 1913196 kB LowFree: 1832684 kB SwapTotal: 0 kB SwapFree: 0 kB hardware nic Use this command to display hardware and status information about each FortiGate interface. The hardware information includes details such as the driver name and version and chip revision. Status information includes transmitted and received packets, and different types of errors. Syntax get hardware nic <interface_name> Variable Description <interface_name> A FortiGate interface name such as port1, wan1, internal, etc. Example output get hardware nic port9 Chip_Model FA2/ISCP1B-v3/256MB FPGA_REV_TAG 06101916 Driver Name iscp1a/b-DE Driver Version 0.1 Driver Copyright Fortinet Inc. Link down Speed N/A Duplex N/A State up Rx_Packets 0 Tx_Packets 0 Rx_Bytes 0 Tx_Bytes 0 Current_HWaddr 00:09:0f:77:09:68 Permanent_HWaddr 00:09:0f:77:09:68 Frame_Received 0 Bad Frame Received 0 Tx Frame 0 Tx Frame Drop 0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 943 get hardware npu Receive IP Error 0 FIFO Error 0 Small PktBuf Left 125 Normal PktBuf Left 1021 Jumbo PktBuf Left 253 NAT Anomaly 0 hardware npu Use this command to display information about the network processor unit (NPU) hardware installed in a FortiGate unit. The NPUs can be built-in or on an installed AMC module. Syntax get get get get get hardware npu legacy {list | session <device_name_str> | setting <device_name_str>} hardware npu np1 {list | status} hardware npu np2 {list | performance <device_id_int> | status <device_id_int>} hardware npu np4 {list | status <device_id_int>} hardware npu np6 {dce | ipsec-stats | port-list | session-stats <device_id_int> | sse-stats <device_id_int> | synproxy-stats} get hardware npu sp {list | status} Example output get hardware npu np1 list ID Interface 0 port9 port10 get hardware npu np1 status ISCP1A 10ee:0702 RX SW Done 0 MTP 0x00000000 desc_size = 0x00001000 count = 0x00000100 nxt_to_u = 0x00000000 nxt_to_f = 0x00000000 Total Number of Interfaces: 2 Number of Interface In-Use: 2 Interface[0] Tx done: 0 desc_size = 0x00004000 count = 0x00000100 nxt_to_u = 0x00000000 nxt_to_f = 0x00000000 TX timeout = 0x00000000 BD_empty = 0x00000000 HRx Packets= 0x00000000 HTXBytes = 0x00000000 HRXBytes = 0x00000000 Interface[1] Tx done: 0 desc_size = 0x00004000 count = 0x00000100 nxt_to_u = 0x00000000 nxt_to_f = 0x00000000 TX timeout = 0x00000000 BD_empty = 0x00000000 HRx Packets= 0x00000000 HTXBytes = 0x00000000 HRXBytes = 0x00000000 NAT Information: head = 0x00000001 tail = 00000001 ISCP1A Performance [Top]: Nr_int : 0x00000000 INTwoInd : 0x00000000 RXwoDone : 0x00000000 PKTwoEnd : 0x00000000 PKTCSErr : 0x00000000 PKTidErr : 0x00000000 PHY0Int : 0x00000000 PHY1INT : 0x00000000 CSUMOFF : 0x00000000 BADCSUM : 0x00000000 MSGINT : 0x00000000 IPSEC : 0x00000000 IPSVLAN : 0x00000000 SESMISS : 0x00000000 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 944 hardware npu get TOTUP : 0x00000000 RSVD MEMU : 0x00000010 MSG Performance: QLEN: 0x00001000(QW) HEAD: 0x00000000 Performance: TOTMSG: 0x00000000 BADMSG: 0x00000000 TOUTMSG: 0x00000000 QUERY: 0x00000000 NULLTK: 0x00000000 NAT Performance: BYPASS (Enable) BLOCK (Disable) IRQ : 00000001 QFTL : 00000000 DELF : 00000000 FFTL : 00000000 OVTH : 00000001 QRYF : 00000000 INSF : 00000000 INVC : 00000000 ALLO : 00000000 FREE : 00000000 ALLOF : 00000000 BPENTR: 00000000 BKENTR: 00000000 PBPENTR: 00000000 PBKENTR: 00000000 NOOP : 00000000 THROT : 00000000(0x002625a0) SWITOT : 00000000 SWDTOT : 00000000 ITDB : 00000000 OTDB : 00000000 SPISES : 00000000 FLUSH : 00000000 APS (Disabled) information: MODE: BOTH UDPTH 255 ICMPTH 255 APSFLAGS: 0x00000000 IPSEC Offload Status: 0x58077dcb get hardware npu np2 list ID PORTS -- ----0 amc-sw1/1 0 amc-sw1/2 0 amc-sw1/3 0 amc-sw1/4 ID PORTS -- ----1 amc-dw2/1 ID PORTS -- ----2 amc-dw2/2 get hardware npu np2 status 0 NP2 Status ISCP2 f7750000 (Neighbor 00000000) 1a29:0703 256MB Base f8aad000 DBG 0x00000000 RX SW Done 0 MTP 0x0 desc_alloc = f7216000 desc_size = 0x2000 count = 0x100 nxt_to_u = 0x0 nxt_to_f = 0x0 Total Interfaces: 4 Total Ports: 4 Number of Interface In-Use: 4 Interface f7750100 netdev 81b1e000 0 Name amc-sw1-1 PHY: Attached LB Mode 0 LB IDX 0/1 LB Ports: f7750694, 00000000, 00000000, 00000000 Port f7750694 Id 0 Status Down ictr 4 desc = 8128c000 desc_size = 0x00001000 count = 0x00000100 nxt_to_u = 0x00000000 nxt_to_f = 0x00000000 Intf f7750100 Interface f7750264 netdev 81b2cc00 1 Name amc-sw1-2 PHY: Attached LB Mode 0 LB IDX 0/1 LB Ports: f7750748, 00000000, 00000000, 00000000 Port f7750748 Id 1 Status Down ictr 0 desc = 81287000 desc_size = 0x00001000 count = 0x00000100 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 945 get hardware status nxt_to_u = 0x00000000 nxt_to_f = 0x00000000 Intf f7750264 Interface f77503c8 netdev 81b2c800 2 Name amc-sw1-3 PHY: Attached LB Mode 0 LB IDX 0/1 LB Ports: f77507fc, 00000000, 00000000, 00000000 Port f77507fc Id 2 Status Down ictr 0 desc = 81286000 desc_size = 0x00001000 count = 0x00000100 nxt_to_u = 0x00000000 nxt_to_f = 0x00000000 Intf f77503c8 Interface f775052c netdev 81b2c400 3 Name amc-sw1-4 PHY: Attached LB Mode 0 LB IDX 0/1 LB Ports: f77508b0, 00000000, 00000000, 00000000 Port f77508b0 Id 3 Status Down ictr 0 desc = 81281000 desc_size = 0x00001000 count = 0x00000100 nxt_to_u = 0x00000000 nxt_to_f = 0x00000000 Intf f775052c NAT Information: cmdq_qw = 0x2000 cmdq = 82160000 head = 0x1 tail = 0x1 APS (Enabled) information: Session Install when TMM TSE OOE: Disable Session Install when TMM TAE OOE: Disable IPS anomaly check policy: Follow config MSG Base = 82150000 QL = 0x1000 H = 0x0 hardware status Report information about the FortiGate unit hardware including FortiASIC version, CPU type, amount of memory, flash drive size, hard disk size (if present), USB flash size (if present), network card chipset, and WiFi chipset (FortiWifi models). This information can be useful for troubleshooting, providing information about your FortiGate unit to Fortinet Support, or confirming the features that your FortiGate model supports. Syntax get hardware status Example output Model name: Fortigate-620B ASIC version: CP6 ASIC SRAM: 64M CPU: Intel(R) Core(TM)2 Duo CPU E4300 @ 1.80GHz RAM: 2020 MB Compact Flash: 493 MB /dev/sda Hard disk: 76618 MB /dev/sdb USB Flash: not available Network Card chipset: Broadcom 570x Tigon3 Ethernet Adapter (rev.0x5784100) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 946 ips decoder status get ips decoder status Displays all the port settings of all the IPS decoders. Syntax get ips decoder status Example output # get ips decoder status decoder-name: "back_orifice" decoder-name: "dns_decoder" port_list: 53 decoder-name: "ftp_decoder" port_list: 21 decoder-name: "http_decoder" decoder-name: "im_decoder" decoder-name: "imap_decoder" port_list: 143 Ports are shown only for decoders with configurable port settings. ips rule status Displays current configuration information about IPS rules. Syntax get ips rule status Example output # get ips rule status rule-name: "IP.Land" rule-id: 12588 rev: 2.464 action: pass status: disable log: enable log-packet: disable severity: 3.high service: All location: server, client os: All application: All rule-name: "IP.Loose.Src.Record.Route.Option" CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 947 get ips session rule-id: 12805 rev: 2.464 action: pass status: disable log: enable log-packet: disable severity: 2.medium service: All location: server, client os: All application: All ips session Displays current IPS session status. Syntax get ips session Example output get ips session SYSTEM: memory capacity 279969792 memory used 5861008 recent pps\bps 0\0K session in-use 0 TCP: in-use\active\total 0\0\0 UDP: in-use\active\total 0\0\0 ICMP: in-use\active\total 0\0\0 ips view-map Use this command to view the policies examined by IPS. This is mainly used for debugging. If there is no ips view map, it means IPS is not used or enabled. Syntax get ips view-map <id> Example output id : 1 id-policy-id : 0 policy-id : 2 vdom-id : 0 which : firewall CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 948 ipsec tunnel Variable get Description id IPS policy ID id-policy-id Identity-based policy ID (0 means none) policy-id Policy ID vdom-id VDOM, identified by ID number which Type of policy id: firewall, firewall6, sniffer, sniffer6, interface, interface6 ipsec tunnel List the current IPSec VPN tunnels and their status. Syntax To view details of all IPsec tunnels: get ipsec tunnel details To list IPsec tunnels by name: get ipsec tunnel name To view a summary of IPsec tunnel information: get ipsec tunnel summary mgmt-data status Use this command to display information additional to that provided by get system status or get hardware status. Syntax get mgmt-data status Sample output FG100D3G12801361 # get mgmt-data status Model name: FortiGate-100D CPU: 4 RAM: 1977 MB is_ssd_available: 0 is_logdisk_mounted: 1 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 949 get pbx branch-office is_support_log_on_boot_device: 1 is_rev_support_wanopt: 1 pbx branch-office Use this command to list the configured branch offices. Syntax get pbx branch-office Example output == [ Branch 15 ] name: Branch 15 == [ Branch 12 ] name: Branch 12 pbx dialplan Use this command to list the configured dial plans. Syntax get pbx dialplan Example output == [ company-default ] name: company-default == [ inbound ] name: inbound pbx did Use this command to list the configured direct inward dial (DID) numbers. Syntax get pbx did Example output == [ Operator ] name: Operator == [ Emergency ] name: Emergency CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 950 pbx extension get pbx extension Use this command to list the configured extensions. Syntax get pbx extension Example output == [ 6555 ] extension: 6555 == [ 6777 ] extension: 6777 == [ 6111 ] extension: 6111 pbx ftgd-voice-pkg Use this command to display the current FortiGate Voice service package status. Syntax get pbx ftgd-voice-pkg status Example output Status: Activated Total 1 Packages: Package Type: B, Credit Left: 50.00, Credit Used: 0.00, Expiration Date: 2011-01-01 12:00:00 Total 1 Dids: 12345678901 Total 1 Efaxs: 12345678902 Total 0 Tollfrees: pbx global Use this command to display the current global pbx settings. Syntax get pbx global Example output block-blacklist : enable country-area : USA country-code : 1 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 951 get pbx ringgrp efax-check-interval : 5 extension-pattern : 6XXX fax-admin-email : faxad@example.com ftgd-voice-server : service.fortivoice.com local-area-code : 408 max-voicemail : 60 outgoing-prefix : 9 ring-timeout : 20 rtp-hold-timeout : 0 rtp-timeout : 60 voicemail-extension : *97 pbx ringgrp Use this command to display the currently configured ring groups. Syntax get pbx ringgrp Example output == [ 6001 ] name: 6001 == [ 6002 ] name: 6002 pbx sip-trunk Use this command to display the currently configured SIP trunks. Syntax get pbx sip-trunk Example output == [ __FtgdVoice_1 ] name: __FtgdVoice_1 pbx voice-menu Use this command to display the current voice menu and recorder extension configuration. Syntax get pbx voice-menu CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 952 router info bfd neighbor get Example output comment : general password : * press-0: ring-group : 6001 type : ring-group press-1: type : voicemail press-2: type : directory press-3: type : none press-4: type : none press-5: type : none press-6: type : none press-7: type : none press-8: type : none press-9: type : none recorder-exten : *30 router info bfd neighbor Use this command to list state information about the neighbors in the bi-directional forwarding table. Syntax get router info bfd neighbour router info bgp Use this command to display information about the BGP configuration. Syntax get router info bgp <keyword> <keyword> Description cidr-only Show all BGP routes having non-natural network masks. community Show all BGP routes having their COMMUNITY attribute set. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 953 get router info bgp <keyword> Description community-info Show general information about the configured BGP communities, including the routes in each community and their associated network addresses. community-list Show all routes belonging to configured BGP community lists. Display information about dampening: dampening {dampened-paths | flap-statistics | parameters} Type dampened-paths to show all paths that have been suppressed due to flapping. Type flap-statistics to show flap statistics related to BGP routes. Type parameters to show the current dampening settings. filter-list Show all routes matching configured AS-path lists. inconsistent-as Show all routes associated with inconsistent autonomous systems of origin. memory Show the BGP memory table. neighbors [<address_ipv4> | <address_ipv4> advertised-routes | <address_ipv4> received prefix-filter | <address_ipv4> received-routes | <address_ipv4> routes] Show information about connections to TCP and BGP neighbors. network [<address_ ipv4mask>] Show general information about the configured BGP networks, including their network addresses and associated prefixes. network-longerprefixes <address_ ipv4mask> Show general information about the BGP route that you specify (for example, 12.0.0.0/14) and any specific routes associated with the prefix. paths Show general information about BGP AS paths, including their associated network addresses. prefix-list <name> Show all routes matching configured prefix list <name>. quote-regexp <regexp_str> Enter the regular expression to compare to the AS_PATH attribute of BGP routes (for example, ^730$) and enable the use of output modifiers (for example, include, exclude, and begin) to search the results. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 954 router info bgp <keyword> get Description regexp <regexp_str> Enter the regular expression to compare to the AS_PATH attribute of BGP routes (for example, ^730$). route-map Show all routes matching configured route maps. scan Show information about next-hop route scanning, including the scan interval setting. summary Show information about BGP neighbor status. Example output get router info bgp memory Memory type Alloc count Alloc bytes =================================== ============= =============== BGP structure : 2 1408 BGP VR structure : 2 104 BGP global structure : 1 56 BGP peer : 2 3440 BGP as list master : 1 24 Community list handler : 1 32 BGP Damp Reuse List Array : 2 4096 BGP table : 62 248 ----------------------------------- ------------- --------------Temporary memory : 4223 96095 Hash : 7 140 Hash index : 7 28672 Hash bucket : 11 132 Thread master : 1 564 Thread : 4 144 Link list : 32 636 Link list node : 24 288 Show : 1 396 Show page : 1 4108 Show server : 1 36 Prefix IPv4 : 10 80 Route table : 4 32 Route node : 63 2772 Vector : 2180 26160 Vector index : 2180 18284 Host config : 1 2 Message of The Day : 1 100 IMI Client : 1 708 VTY master : 1 20 VTY if : 11 2640 VTY connected : 5 140 Message handler : 2 120 NSM Client Handler : 1 12428 NSM Client : 1 1268 Host : 1 64 Log information : 2 72 Context : 1 232 ----------------------------------- ------------- --------------bgp proto specifc allocations : 9408 B CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 955 get router info isis bgp generic allocations : 196333 B bgp total allocations : 205741 B router info isis Use this command to display information about the FortiGate ISIS. Syntax get get get get get get router router router router router router info info info info info info isis isis isis isis isis isis interface neighbor is-neighbor database route topology router info kernel Use this command to display the FortiGate kernel routing table. The kernel routing table displays information about all of the routes in the kernel. Syntax get router info kernel [<routing_type_int>] router info multicast Use this command to display information about a Protocol Independent Multicasting (PIM) configuration. Multicast routing is supported in the root virtual domain only. Syntax get router info multicast <keywords> CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 956 router info multicast <keywords> get Description Show Internet Group Management Protocol (IGMP) membership information according to one of these qualifiers: Type groups [{<interface-name> | <groupaddress>}] to show IGMP information for the multicast group (s) associated with the specified interface or multicast group address. igmp Type groups-detail [{<interface-name> | <group-address>}] to show detailed IGMP information for the multicast group(s) associated with the specified interface or multicast group address. Type interface [<interface-name>] to show IGMP information for all multicast groups associated with the specified interface. Show information related to dense mode operation according to one of these qualifiers: Type interface to show information about PIM-enabled interfaces. Type interface-detail to show detailed information about PIM-enabled interfaces. Type neighbor to show the current status of PIM neighbors. pim dense-mode Type neighbor-detail to show detailed information about PIM neighbors. Type next-hop to show information about next-hop PIM routers. Type table [<group-address>][<source-address>] to show the multicast routing table entries associated with the specified multicast group address and/or multicast source address. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 957 get router info ospf <keywords> Description Show information related to sparse mode operation according to one of these qualifiers: Type bsr-info to show Boot Strap Router (BSR) information. Type interface to show information about PIM-enabled interfaces. Type interface-detail to show detailed information about PIM-enabled interfaces. Type neighbor to show the current status of PIM neighbors. pim sparse-mode Type neighbor-detail to show detailed information about PIM neighbors. Type next-hop to show information about next-hop PIM routers. Type rp-mapping to show Rendezvous Point (RP) information. Type table [<group-address>][<source-address>] to show the multicast routing table entries associated with the specified multicast group address and/or multicast source address. table [<group-address>] [<source-address>] Show the multicast routing table entries associated with the specified multicast group address and/or multicast source address. table-count [<group-address>] [<source-address>] Show statistics related to the specified multicast group address and/or multicast source address. router info ospf Use this command to display information about the FortiGate OSPF configuration and/or the Link-State Advertisements (LSAs) that the FortiGate unit obtains and generates. An LSA identifies the interfaces of all OSPF-enabled routers in an area, and provides information that enables OSPF-enabled routers to select the shortest path to a destination. Syntax get router info ospf <keyword> <keyword> border-routers CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Description Show OSPF routing table entries that have an Area Border Router (ABR) or Autonomous System Boundary Router (ASBR) as a destination. 958 router info ospf get <keyword> Description Show information from the OSPF routing database according to the of these qualifiers. Some qualifiers require a target that can be one of the following values: Type adv_router <address_ipv4> to limit the information to LSAs originating from the router at the specified IP address. database <qualifier> Type self-originate <address_ipv4> to limit the information to LSAs originating from the FortiGate unit. advrouter <address_ ipv4> Type adv-router <address_ipv4> to show ospf Advertising Router link states for the router at the given IP address. asbrsummary <target> Type asbr-summary to show information about ASBR summary LSAs. brief Type brief to show the number and type of LSAs associated with each OSPF area. external <target> Type external to show information about external LSAs. max-age Type max-age to show all LSAs in the MaxAge list. network <target> Type network to show information about network LSAs. nssaexternal <target> Type nssa-external to show information about not-so-stubby external LSAs. opaquearea <address_ ipv4> Type opaque-area <address_ipv4> to show information about opaque Type 10 (area-local) LSAs (see RFC 2370). opaque-as <address_ ipv4> Type opaque-as <address_ipv4> to show information about opaque Type 11 LSAs (see RFC 2370), which are flooded throughout the AS. opaquelink <address_ ipv4> Type opaque-link <address_ipv4> to show information about opaque Type 9 (link-local) LSAs (see RFC 2370). CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 959 get router info protocols <keyword> Description router <target> Type router to show information about router LSAs. selforiginate Type self-originate to show self-originated LSAs. summary <target> Type summary to show information about summary LSAs. interface [<interface_name>] Show the status of one or all FortiGate interfaces and whether OSPF is enabled on those interfaces. Show general information about OSPF neighbors, excluding down-status neighbors: Type all to show information about all neighbors, including down-status neighbors. Type <neighbor_id> to show detailed information about the specified neighbor only. neighbor [all | <neighbor_id> | detail | detail all | interface <address_ipv4>] Type detail to show detailed information about all neighbors, excluding down-status neighbors. Type detail all to show detailed information about all neighbors, including down-status neighbors. Type interface <address_ipv4> to show neighbor information based on the FortiGate interface IP address that was used to establish the neighbor’s relationship. route Show the OSPF routing table. status Show general information about the OSPF routing processes. virtual-links Show information about OSPF virtual links. router info protocols Use this command to show the current states of active routing protocols. Inactive protocols are not displayed. Syntax get router info protocols Routing Protocol is "rip" Sending updates every 30 seconds with +/-50% Timeout after 180 seconds, garbage collect after 120 seconds Outgoing update filter list for all interface is not set CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 960 router info rip get Incoming update filter list for all interface is not set Default redistribution metric is 1 Redistributing: Default version control: send version 2, receive version 2 Interface Send Recv Key-chain Routing for Networks: Routing Information Sources: Gateway Distance Last Update Bad Packets Bad Routes Distance: (default is 120) Routing Protocol is "ospf 0" Invalid after 0 seconds, hold down 0, flushed after 0 Outgoing update filter list for all interfaces is Incoming update filter list for all interfaces is Redistributing: Routing for Networks: Routing Information Sources: Gateway Distance Last Update Distance: (default is 110) Address Mask Distance List Routing Protocol is "bgp 5" IGP synchronization is disabled Automatic route summarization is disabled Default local-preference applied to incoming route is 100 Redistributing: Neighbor(s): Address AddressFamily FiltIn FiltOut DistIn DistOut RouteMapIn RouteMapOut Weight 192.168.20.10 unicast router info rip Use this command to display information about the RIP configuration. Syntax get router info rip <keyword> <keyword> Description database interface [<interface_name>] Show the entries in the RIP routing database. Show the status of the specified FortiGate unit interface <interface_name> and whether RIP is enabled. If interface is used alone it lists all the FortiGate unit interfaces and whether RIP is enabled on each. router info routing-table Use this command to display the routes in the routing table. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 961 get router info vrrp Syntax get router info routing-table <keyword> <keyword> Description all Show all entries in the routing table. bgp Show the BGP routes in the routing table. connected Show the connected routes in the routing table. database Show the routing information database. details [<address_ ipv4mask>] Show detailed information about a route in the routing table, including the next-hop routers, metrics, outgoing interfaces, and protocol-specific information. ospf Show the OSPF routes in the routing table. rip Show the RIP routes in the routing table. static Show the static routes in the routing table. router info vrrp Use this command to display information about the VRRP configuration. Syntax get router info vrrp Example output Interface: port1, primary IP address: 9.1.1.2 VRID: 1 vrip: 9.1.1.254, priority: 100, state: BACKUP adv_interval: 1, preempt: 1, start_time: 3 vrdst: 0.0.0.0 router info6 bgp Use this command to display information about the BGP IPv6 configuration. Syntax get router info6 bgp <keyword> <keyword> community CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. Description Show all BGP routes having their COMMUNITY attribute set. 962 router info6 interface <keyword> community-list get Description Show all routes belonging to configured BGP community lists. Display information about dampening: dampening {dampened-paths | flap-statistics | parameters} Type dampened-paths to show all paths that have been suppressed due to flapping. Type flap-statistics to show flap statistics related to BGP routes. Type parameters to show the current dampening settings. filter-list Show all routes matching configured AS-path lists. inconsistent-as Show all routes associated with inconsistent autonomous systems of origin. neighbors [<address_ ipv6mask> Show information about connections to TCP and BGP neighbors. network [<address_ ipv6mask>] Show general information about the configured BGP networks, including their network addresses and associated prefixes. network-longerprefixes <address_ ipv6mask> Show general information about the BGP route that you specify (for example, 12.0.0.0/14) and any specific routes associated with the prefix. paths Show general information about BGP AS paths, including their associated network addresses. prefix-list <name> Show all routes matching configured prefix list <name>. quote-regexp <regexp_str> Enter the regular expression to compare to the AS_PATH attribute of BGP routes (for example, ^730$) and enable the use of output modifiers (for example, include, exclude, and begin) to search the results. regexp <regexp_str> Enter the regular expression to compare to the AS_PATH attribute of BGP routes (for example, ^730$). route-map Show all routes matching configured route maps. summary Show information about BGP neighbor status. router info6 interface Use this command to display information about IPv6 interfaces. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 963 get router info6 kernel Syntax get router info6 interface <interface_name> Example output The command returns the status of the interface and the assigned IPv6 address. dmz2 [administratively down/down] 2001:db8:85a3:8d3:1319:8a2e:370:7348 fe80::209:fff:fe04:4cfd router info6 kernel Use this command to display the FortiGate kernel routing table. The kernel routing table displays information about all of the routes in the kernel. Syntax get router info6 kernel router info6 ospf Use this command to display information about the OSPF IPv6 configuration. Syntax get router info6 ospf router info6 protocols Use this command to display information about the configuration of all IPv6 dynamic routing protocols. Syntax get router info6 protocols router info6 rip Use this command to display information about the RIPng configuration. Syntax get router info6 rip CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 964 router info6 routing-table get router info6 routing-table Use this command to display the routes in the IPv6 routing table. Syntax get router info6 routing-table <item> where <item> is one of the following: Variable Description <ipv6_ip> Destination IPv6 address or prefix. bgp Show BGP routing table entries. connected Show connected routing table entries. database Show routing information base. ospf Show OSPF routing table entries. rip Show RIP routing table entries. static Show static routing table entries. switch-controller poe Retrieve information about PoE ports. Syntax get switch-controller poe <vdom-name> <fortiswitch-id> system admin list View a list of all the current administration sessions. Syntax get system admin list Example output # get system admin list username local device remote started admin sshv2 port1:172.20.120.148:22 172.20.120.16:4167 2006-08-09 12:24:20 admin https port1:172.20.120.148:443 172.20.120.161:56365 2006-08-09 12:24:20 admin https port1:172.20.120.148:443 172.20.120.16:4214 2006-08-09 12:25:29 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 965 get system admin status Variable Description username Name of the admin account for this session local The protocol this session used to connect to the FortiGate unit. device The interface, IP address, and port used by this session to connect to the FortiGate unit. remote The IP address and port used by the originating computer to connect to the FortiGate unit. started The time the current session started. system admin status View the status of the currently logged in admin and their session. Syntax get system admin status Example The output looks like this: # get system admin status username: admin login local: sshv2 login device: port1:172.20.120.148:22 login remote: 172.20.120.16:4167 login vdom: root login started: 2006-08-09 12:24:20 current time: 2006-08-09 12:32:12 Variable Description username Name of the admin account currently logged in. login local The protocol used to start the current session. login device The login information from the FortiGate unit including interface, IP address, and port number. login remote The computer the user is logging in from including the IP address and port number. login vdom The virtual domain the admin is current logged into. login started The time the current session started. current time The current time of day on the FortiGate unit CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 966 system arp get system arp View the ARP table entries on the FortiGate unit. This command is not available in multiple VDOM mode. Syntax get system arp Example output # get system arp Address Age(min) Hardware Addr Interface 172.20.120.16 0 00:0d:87:5c:ab:65 internal 172.20.120.138 0 00:08:9b:09:bb:01 internal system auto-update Use this command to display information about the status FortiGuard updates on the FortiGate unit. Syntax get system auto-update status get system auto-update versions Example output get system auto-update status FDN availability: available at Thu Apr 1 08:22:58 2010 Push update: disable Scheduled update: enable Update daily: 8:22 Virus definitions update: enable IPS definitions update: enable Server override: disable Push address override: disable Web proxy tunneling: disable system central-management View information about the Central Management System configuration. Syntax get system central-management Example The output looks like this: CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 967 get system checksum FG600B3908600705 # get system central-management status : enable type : fortimanager auto-backup : disable schedule-config-restore: enable schedule-script-restore: enable allow-push-configuration: enable allow-pushd-firmware: enable allow-remote-firmware-upgrade: enable allow-monitor : enable fmg : 172.20.120.161 vdom : root authorized-manager-only: enable serial-number : "FMG-3K2404400063" system checksum View the checksums for global, root, and all configurations. These checksums are used by HA to compare the configurations of each cluster unit. Syntax get system checksum status Example output # get system checksum status global: 7a 87 3c 14 93 bc 98 92 b0 58 16 f2 eb bf a4 15 root: bb a4 80 07 42 33 c2 ff f1 b5 6e fe e4 bb 45 fb all: 1c 28 f1 06 fa 2e bc 1f ed bd 6b 21 f9 4b 12 88 system cmdb status View information about cmdbsvr on the FortiGate unit. FortiManager uses some of this information. Syntax get system cmdb status Example output # get system cmdb status version: 1 owner id: 18 update index: 6070 config checksum: 12879299049430971535 last request pid: 68 last request type: 29 last request: 78 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 968 system fortianalyzer-connectivity Variable get Description version Version of the cmdb software. owner id Process ID of the cmdbsvr daemon. update index The updated index shows how many changes have been made in cmdb. config checksum The config file version used by FortiManager. last request pid The last process to access the cmdb. last requst type Type of the last attempted access of cmdb. last request The number of the last attempted access of cmdb. system fortianalyzer-connectivity Display connection and remote disk usage information about a connected FortiAnalyzer unit. Syntax get fortianalyzer-connectivity status Example output # get system fortianalyzer-connectivity status Status: connected Disk Usage: 0% system fortiguard-log-service status Command returns information about the status of the FortiGuard Log & Analysis Service including license and disk information. Syntax get system fortiguard-log-service status Example output # get system fortiguard-log-service status FortiGuard Log & Analysis Service Expire on: 20071231 Total disk quota: 1111 MB Max daily volume: 111 MB Current disk quota usage: n/a CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 969 get system fortiguard-service status system fortiguard-service status COMMAND REPLACED. Command returns information about the status of the FortiGuard service including the name, version late update, method used for the last update and when the update expires. This information is shown for the AV Engine, virus definitions, attack definitions, and the IPS attack engine. Syntax get system fortiguard-service status Example output NAME VERSION LAST UPDATE METHOD EXPIRE AV Engine 2.002 2006-01-26 19:45:00 Virus Definitions 6.513 2006-06-02 22:01:00 Attack Definitions 2.299 2006-06-09 19:19:00 IPS Attack Engine 1.015 2006-05-09 23:29:00 manual manual manual manual 2006-06-12 2006-06-12 2006-06-12 2006-06-12 08:00:00 08:00:00 08:00:00 08:00:00 system ha-nonsync-csum FortiManager uses this command to obtain a system checksum. Syntax get system ha-nonsync-csum system ha status Use this command to display information about an HA cluster. The command displays general HA configuration settings. The command also displays information about how the cluster unit that you have logged into is operating in the cluster. Usually you would log into the primary unit CLI using SSH or telnet. In this case the get system ha status command displays information about the primary unit first, and also displays the HA state of the primary unit (the primary unit operates in the work state). However, if you log into the primary unit and then use the execute ha manage command to log into a subordinate unit, (or if you use a console connection to log into a subordinate unit) the get system status command displays information about this subordinate unit first, and also displays the HA state of this subordinate unit. The state of a subordinate unit is work for an active-active cluster and standby for an active-passive cluster. For a virtual cluster configuration, the get system ha status command displays information about how the cluster unit that you have logged into is operating in virtual cluster 1 and virtual cluster 2. For example, if you connect to the cluster unit that is the primary unit for virtual cluster 1 and the subordinate unit for virtual cluster 2, the output of the get system ha status command shows virtual cluster 1 in the work state and virtual cluster 2 in the standby state. The get system ha status command also displays additional information about virtual cluster 1 and virtual cluster 2. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 970 system ha status get Syntax get system ha status The command display includes the following fields. For more information see the examples that follow. Variable Description Model The FortiGate model number. Mode The HA mode of the cluster: a-a or a-p. Group The group ID of the cluster. Debug The debug status of the cluster. ses_pickup The status of session pickup: enable or disable. load_balance The status of the load-balance-all field: enable or disable. Displayed for active-active clusters only. schedule The active-active load balancing schedule. Displayed for activeactive clusters only. Master displays the device priority, host name, serial number, and actual cluster index of the primary (or master) unit. Slave displays the device priority, host name, serial number, and actual cluster index of the subordinate (or slave, or backup) unit or units. Master Slave The list of cluster units changes depending on how you log into the CLI. Usually you would use SSH or telnet to log into the primary unit CLI. In this case the primary unit would be at the top the list followed by the other cluster units. If you use execute ha manage or a console connection to log into a subordinate unit CLI, and then enter get system ha status the subordinate unit that you have logged into appears at the top of the list of cluster units. number of vcluster CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. The number of virtual clusters. If virtual domains are not enabled, the cluster has one virtual cluster. If virtual domains are enabled the cluster has two virtual clusters. 971 get system ha status Variable Description The HA state (hello, work, or standby) and HA heartbeat IP address of the cluster unit that you have logged into in virtual cluster 1. If virtual domains are not enabled, vcluster 1 displays information for the cluster. If virtual domains are enabled, vcluster 1 displays information for virtual cluster 1. The HA heartbeat IP address is 10.0.0.1 if you are logged into a the primary unit of virtual cluster 1 and 10.0.0.2 if you are logged into a subordinate unit of virtual cluster 1. vcluster 1 also lists the primary unit (master) and subordinate units (slave) in virtual cluster 1. The list includes the operating cluster index and serial number of each cluster unit in virtual cluster 1. The cluster unit that you have logged into is at the top of the list. If virtual domains are not enabled and you connect to the primary unit CLI, the HA state of the cluster unit in virtual cluster 1 is work. The display lists the cluster units starting with the primary unit. vcluster 1 If virtual domains are not enabled and you connect to a subordinate unit CLI, the HA state of the cluster unit in virtual cluster 1 is standby. The display lists the cluster units starting with the subordinate unit that you have logged into. If virtual domains are enabled and you connect to the virtual cluster 1 primary unit CLI, the HA state of the cluster unit in virtual cluster 1 is work. The display lists the cluster units starting with the virtual cluster 1 primary unit. If virtual domains are enabled and you connect to the virtual cluster 1 subordinate unit CLI, the HA state of the cluster unit in virtual cluster 1 is standby. The display lists the cluster units starting with the subordinate unit that you are logged into. In a cluster consisting of two cluster units operating without virtual domains enabled all clustering actually takes place in virtual cluster 1. HA is designed to work this way to support virtual clustering. If this cluster was operating with virtual domains enabled, adding virtual cluster 2 is similar to adding a new copy of virtual cluster 1. Virtual cluster 2 is visible in the get system ha status command output when you add virtual domains to virtual cluster 2. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 972 system info admin status Variable get Description vcluster 2 only appears if virtual domains are enabled. vcluster 2 displays the HA state (hello, work, or standby) and HA heartbeat IP address of the cluster unit that you have logged into in virtual cluster 2. The HA heartbeat IP address is 10.0.0.2 if you are logged into the primary unit of virtual cluster 2 and 10.0.0.1 if you are logged into a subordinate unit of virtual cluster 2. vcluster 2 also lists the primary unit (master) and subordinate units (slave) in virtual cluster 2. The list includes the cluster index and serial number of each cluster unit in virtual cluster 2. The cluster unit that you have logged into is at the top of the list. vcluster 2 If you connect to the virtual cluster 2 primary unit CLI, the HA state of the cluster unit in virtual cluster 2 is work. The display lists the cluster units starting with the virtual cluster 2 primary unit. If you connect to the virtual cluster 2 subordinate unit CLI, the HA state of the cluster unit in virtual cluster 2 is standby. The display lists the cluster units starting with the subordinate unit that you are logged into. system info admin status Use this command to display administrators that are logged into the FortiGate unit. Syntax get system info admin status Example This shows sample output. Index User name Login type From 0 admin CLI ssh(172.20.120.16) 1 admin WEB 172.20.120.16 Variable Description Index The order the administrators logged in. User name The name of the user account logged in. Login type Which interface was used to log in. From The IP address this user logged in from. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 973 get system info admin ssh Related topics "system info admin ssh" on page 105 system info admin ssh Use this command to display information about the SSH configuration on the FortiGate unit such as: the SSH port number the interfaces with SSH enabled the hostkey DSA fingerprint the hostkey RSA fingerprint Syntax get system info admin ssh Example output # get system info admin ssh SSH v2 is enabled on port 22 SSH is enabled on the following 1 interfaces: internal SSH hostkey DSA fingerprint = cd:e1:87:70:bb:f0:9c:7d:e3:7b:73:f7:44:23:a5:99 SSH hostkey RSA fingerprint = c9:5b:49:1d:7c:ba:be:f3:9d:39:33:4d:48:9d:b8:49 system interface physical Use this command to list information about the unit’s physical network interfaces. Syntax get system interface physical The output looks like this: # get system interface physical == [onboard] ==[dmz1] mode: static ip: 0.0.0.0 0.0.0.0 status: down speed: n/a ==[dmz2] mode: static ip: 0.0.0.0 0.0.0.0 status: down speed: n/a ==[internal] mode: static ip: 172.20.120.146 255.255.255.0 status: up CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 974 system ip-conflict status get speed: 100 ==[wan1] mode: pppoe ip: 0.0.0.0 0.0.0.0 status: down speed: n/a ==[wan2] mode: static ip: 0.0.0.0 0.0.0.0 status: down speed: n/a ==[modem] mode: static ip: 0.0.0.0 0.0.0.0 status: down speed: n/a system ip-conflict status List interface names and IP addresses in conflict. Syntax get system ip-conflict status system mgmt-csum FortiManager uses this command to obtain checksum information from FortiGate units. Syntax get system mgmt-csum {global | vdom | all} where global retrieves global object checksums vdom retrieves VDOM object checksums all retrieves all object checksums. system performance firewall Use this command to display packet distribution and traffic statistics information for the FortiGate firewall. Syntax get system performance firewall packet-distribution get system performance firewall statistics CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 975 get system performance status Variable packetdistribution Description Display a list of packet size ranges and the number of packets of each size accepted by the firewall since the system restarted. You can use this information to learn about the packet size distribution on your network. Note: these counts do not include packets offloaded to the NPU. statistics Display a list of traffic types (browsing, email, DNS etc) and the number of packets and number of payload bytes accepted by the firewall for each type since the FortiGate unit was restarted. Example output get system performance firewall packet-distribution getting packet distribution statistics... 0 bytes - 63 bytes: 655283 packets 64 bytes - 127 bytes: 1678278 packets 128 bytes - 255 bytes: 58823 packets 256 bytes - 383 bytes: 70432 packets 384 bytes - 511 bytes: 1610 packets 512 bytes - 767 bytes: 3238 packets 768 bytes - 1023 bytes: 7293 packets 1024 bytes - 1279 bytes: 18865 packets 1280 bytes - 1500 bytes: 58193 packets > 1500 bytes: 0 packets get system performance firewall statistics getting traffic statistics... Browsing: 623738 packets, 484357448 bytes DNS: 5129187383836672 packets, 182703613804544 bytes E-Mail: 23053606 packets, 2 bytes FTP: 0 packets, 0 bytes Gaming: 0 packets, 0 bytes IM: 0 packets, 0 bytes Newsgroups: 0 packets, 0 bytes P2P: 0 packets, 0 bytes Streaming: 0 packets, 0 bytes TFTP: 654722117362778112 packets, 674223966126080 bytes VoIP: 16834455 packets, 10 bytes Generic TCP: 266287972352 packets, 8521215115264 bytes Generic UDP: 0 packets, 0 bytes Generic ICMP: 0 packets, 0 bytes Generic IP: 0 packets, 0 bytes system performance status Use this command to display FortiGate CPU usage, memory usage, network usage, sessions, virus, IPS attacks, and system up time. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 976 system performance top get Syntax get system performance status Variable Description The percentages of CPU cycles used by user, system, nice and idle categories of processes. These categories are: user -CPU usage of normal user-space processes system -CPU usage of kernel CPU states nice - CPU usage of user-space processes having other-thannormal running priority idle - Idle CPU cycles Adding user, system, and nice produces the total CPU usage as seen on the CPU widget on the web-based system status dashboard. Memory states The percentage of memory used. Average network usage The average amount of network traffic in kbps in the last 1, 10 and 30 minutes. Average sessions The average number of sessions connected to the FortiGate unit over the list 1, 10 and 30 minutes. Virus caught The number of viruses the FortiGate unit has caught in the last 1 minute. IPS attacks blocked The number of IPS attacks that have been blocked in the last 1 minute. Uptime How long since the FortiGate unit has been restarted. Example output # get system performance status CPU states: 0% user 0% system 0% nice 100% idle Memory states: 18% used Average network usage: 0 kbps in 1 minute, 0 kbps in 10 minutes, 1 kbps in 30 minutes Average sessions: 5 sessions in 1 minute, 6 sessions in 10 minutes, 5 sessions in 30 minutes Virus caught: 0 total in 1 minute IPS attacks blocked: 0 total in 1 minute Uptime: 9days, 22 hours, 0 minutes system performance top Use this command to display the list of processes running on the FortiGate unit (similar to the Linux top command). CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 977 get system session list You can use the following commands when get system performance top is running: • Press Q or Ctrl+C to quit. • Press P to sort the processes by the amount of CPU that the processes are using. • Press M to sort the processes by the amount of memory that the processes are using. Syntax get system performance top [<delay_int>] <max_lines_int>]] Variable Description <delay_int> The delay, in seconds, between updating the process list. The default is 5 seconds. <max_lines_ int> The maximum number of processes displayed in the output. The default is 20 lines. system session list Command returns a list of all the sessions active on the FortiGate unit. or the current virtual domain if virtual domain mode is enabled. Syntax get system session list Example output PROTO EXPIRE SOURCE SOURCE-NAT DESTINATION DESTINATION-NAT tcp 0 127.0.0.1:1083 127.0.0.1:514 tcp 0 127.0.0.1:1085 127.0.0.1:514 tcp 10 127.0.0.1:1087 127.0.0.1:514 tcp 20 127.0.0.1:1089 127.0.0.1:514 tcp 30 127.0.0.1:1091 127.0.0.1:514 tcp 40 127.0.0.1:1093 127.0.0.1:514 tcp 60 127.0.0.1:1097 127.0.0.1:514 tcp 70 127.0.0.1:1099 127.0.0.1:514 tcp 80 127.0.0.1:1101 127.0.0.1:514 tcp 90 127.0.0.1:1103 127.0.0.1:514 tcp 100 127.0.0.1:1105 127.0.0.1:514 tcp 110 127.0.0.1:1107 127.0.0.1:514 tcp 103 172.20.120.16:3548 - 172.20.120.133:22 tcp 3600 172.20.120.16:3550 - 172.20.120.133:22 udp 175 127.0.0.1:1026 127.0.0.1:53 tcp 5 127.0.0.1:1084 127.0.0.1:514 tcp 5 127.0.0.1:1086 127.0.0.1:514 tcp 15 127.0.0.1:1088 127.0.0.1:514 tcp 25 127.0.0.1:1090 127.0.0.1:514 tcp 45 127.0.0.1:1094 127.0.0.1:514 tcp 59 127.0.0.1:1098 127.0.0.1:514 tcp 69 127.0.0.1:1100 127.0.0.1:514 tcp 79 127.0.0.1:1102 127.0.0.1:514 - CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 978 system session status get tcp 99 127.0.0.1:1106 tcp 109 127.0.0.1:1108 tcp 119 127.0.0.1:1110 - Variable 127.0.0.1:514 127.0.0.1:514 127.0.0.1:514 - Description PROTO The transfer protocol of the session. EXPIRE How long before this session will terminate. SOURCE The source IP address and port number. SOURCE-NAT The source of the NAT. ‘-’ indicates there is no NAT. DESTINATION The destination IP address and port number. DESTINATION-NAT The destination of the NAT. ‘-’ indicates there is no NAT. system session status Use this command to display the number of active sessions on the FortiGate unit, or if virtual domain mode is enabled it returns the number of active sessions on the current VDOM. In both situations it will say ‘the current VDOM. Syntax get system session status Example output The total number of sessions for the current VDOM: 3100 system session-helper-info list Use this command to list the FortiGate session helpers and the protocol and port number configured for each one. Syntax get system sesion-helper-info list Example output list builtin help module: mgcp dcerpc rsh pmap dns-tcp dns-udp rtsp pptp CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 979 get system session-info sip mms tns h245 h323 ras tftp ftp list session help: help=pmap, protocol=17 port=111 help=rtsp, protocol=6 port=8554 help=rtsp, protocol=6 port=554 help=pptp, protocol=6 port=1723 help=rtsp, protocol=6 port=7070 help=sip, protocol=17 port=5060 help=pmap, protocol=6 port=111 help=rsh, protocol=6 port=512 help=dns-udp, protocol=17 port=53 help=tftp, protocol=17 port=69 help=tns, protocol=6 port=1521 help=mgcp, protocol=17 port=2727 help=dcerpc, protocol=17 port=135 help=rsh, protocol=6 port=514 help=ras, protocol=17 port=1719 help=ftp, protocol=6 port=21 help=mgcp, protocol=17 port=2427 help=dcerpc, protocol=6 port=135 help=mms, protocol=6 port=1863 help=h323, protocol=6 port=1720 system session-info Use this command to display session information. Syntax get get get get get system system system system system session-info session-info session-info session-info session-info Variable expectation full-stat list statistics ttl Description expectation Display expectation sessions. full-stat Display detailed information about the FortiGate session table including a session table and expect session table summary, firewall error statistics, and other information. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 980 system source-ip Variable get Description list Display detailed information about all current FortiGate sessions. For each session the command displays the protocol number, traffic shaping information, policy information, state information, statistics and other information. statistics Display the same information as the full-stat command except for the session table and expect session table summary. ttl Display the current setting of the config system sessionttl command including the overall session timeout as well as the timeouts for specific protocols. Example output get system session-info statistics misc info: session_count=15 exp_count=0 clash=0 memory_tension_drop=0 ephemeral=1/32752 removeable=14 delete=0, flush=0, dev_down=0/0 firewall error stat: error1=00000000 error2=00000000 error3=00000000 error4=00000000 tt=00000000 cont=00000000 ids_recv=00000000 url_recv=00000000 av_recv=00000000 fqdn_count=00000001 tcp reset stat: syncqf=0 acceptqf=0 no-listener=227 data=0 ses=0 ips=0 global: ses_limit=0 ses6_limit=0 rt_limit=0 rt6_limit=0 system source-ip Use this command to list defined source-IPs. Syntax get system source-ip Example output # get sys source-ip status The following services force their communication to use a specific source IP address: service=NTP source-ip=172.18.19.101 service=DNS source-ip=172.18.19.101 vdom=root service=RADIUS name=server-pc25 source-ip=10.1.100.101 vdom=root service=TACACS+ name=tac_plus_pc25 source-ip=10.1.100.101 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 981 get system startup-error-log vdom=root service=FSAE name=pc26 source-ip=172.18.19.101 vdom=V1 service=RADIUS name=pc25-Radius source-ip=172.16.200.101 vdom=V1 service=TACACS+ name=pc25-tacacs+ source-ip=172.16.200.101 vdom=V1 service=FSAE name=pc16 source-ip=172.16.200.101 system startup-error-log Use this command to display information about system startup errors. This command only displays information if an error occurs when the FortiGate unit starts up. Syntax get system startup-error-log system stp list Use this command to display Spanning Tree Protocol status. Syntax get system stp list system status Use this command to display system status information including: FortiGate firmware version, build number and branch point virus and attack definitions version FortiGate unit serial number and BIOS version log hard disk availability host name operation mode virtual domains status: current VDOM, max number of VDOMs, number of NAT and TP mode VDOMs and VDOM status current HA status system time the revision of the WiFi chip in a FortiWiFi unit Syntax get system status CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 982 test get Example output Version: Fortigate-620B v4.0,build0271,100330 (MR2) Virus-DB: 11.00643(2010-03-31 17:49) Extended DB: 11.00643(2010-03-31 17:50) Extreme DB: 0.00000(2003-01-01 00:00) IPS-DB: 2.00778(2010-03-31 12:55) FortiClient application signature package: 1.167(2010-04-01 10:11) Serial-Number: FG600B3908600705 BIOS version: 04000006 Log hard disk: Available Hostname: 620_ha_1 Operation Mode: NAT Current virtual domain: root Max number of virtual domains: 10 Virtual domains status: 1 in NAT mode, 0 in TP mode Virtual domain configuration: disable FIPS-CC mode: disable Current HA mode: a-p, master Distribution: International Branch point: 271 Release Version Information: MR2 System time: Thu Apr 1 15:27:29 2010 test Use this command to display information about FortiGate applications and perform operations on FortiGate applications. You can specify an application name and a test level. Enter ? to display the list of applications. The test level performs various functions depending on the application but can include displaying memory usage, dropping connections and restarting the application. The test levels are different for different applications. In some cases when you enter the command and include an application name but no test level (or an invalid test level) the command output includes a list of valid test levels. Syntax get test <application_name_str> <test_level_int> Example output get test http Proxy Worker 0 - http [0:H] HTTP Proxy Test Usage [0:H] [0:H] 2: Drop all connections [0:H] 22: Drop max idle connections [0:H] 222: Drop all idle connections [0:H] 4: Display connection stat [0:H] 44: Display info per connection [0:H] 444: Display connections per state [0:H] 4444: Display per-VDOM statistics [0:H] 44444: Display information about idle connections [0:H] 55: Display tcp info per connection CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 983 get test get test http 4 HTTP Common Current Connections 0/8032 HTTP Stat Bytes sent 0 (kb) Bytes received 0 (kb) Error Count (alloc) 0 Error Count (accept) 0 Error Count (bind) 0 Error Count (connect) 0 Error Count (socket) 0 Error Count (read) 0 Error Count (write) 0 Error Count (retry) 0 Error Count (poll) 0 Error Count (scan reset) 0 Error Count (urlfilter wait) 0 Last Error 0 Web responses clean 0 Web responses scan errors 0 Web responses detected 0 Web responses infected with worms 0 Web responses infected with viruses 0 Web responses infected with susp 0 Web responses file blocked 0 Web responses file exempt 0 Web responses bannedword detected 0 Web requests oversize pass 0 Web requests oversize block 0 URL requests exempt 0 URL requests blocked 0 URL requests passed 0 URL requests submit error 0 URL requests rating error 0 URL requests rating block 0 URL requests rating allow 0 URL requests infected with worms 0 Web requests detected 0 Web requests file blocked 0 Web requests file exempt 0 POST requests clean 0 POST requests scan errors 0 POST requests infected with viruses 0 POST requests infected with susp 0 POST requests file blocked 0 POST requests bannedword detected 0 POST requests oversize pass 0 POST requests oversize block 0 Web request backlog drop 0 Web response backlog drop 0 HTTP Accounting setup_ok=0 setup_fail=0 conn_ok=0 conn_inp=0 urlfilter=0/0/0 uf_lookupf=0 scan=0 clt=0 srv=0 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 984 user adgrp get user adgrp Use this command to list Directory Service user groups. Syntax get user adgrp [<dsgroupname>] If you do not specify a group name, the command returns information for all Directory Service groups. For example: == [ DOCTEST/Cert Publishers ] name: DOCTEST/Cert Publishers server-name: DSserv1 == [ DOCTEST/Developers ] name: DOCTEST/Developers server-name: DSserv1 == [ DOCTEST/Domain Admins ] name: DOCTEST/Domain Admins server-name: DSserv1 == [ DOCTEST/Domain Computers ] name: DOCTEST/Domain Computers server-name: DSserv1 == [ DOCTEST/Domain Controllers ] name: DOCTEST/Domain Controllers server-name: DSserv1 == [ DOCTEST/Domain Guests ] name: DOCTEST/Domain Guests server-name: DSserv1 == [ DOCTEST/Domain Users ] name: DOCTEST/Domain Users server-name: DSserv1 == [ DOCTEST/Enterprise Admins ] name: DOCTEST/Enterprise Admins server-name: DSserv1 == [ DOCTEST/Group Policy Creator Owners ] name: DOCTEST/Group Policy Creator Owners server-name: DSserv1 == [ DOCTEST/Schema Admins ] name: DOCTEST/Schema Admins server-name: DSserv1 If you specify a Directory Service group name, the command returns information for only that group. For example: name : DOCTEST/Developers server-name : ADserv1 The server-name is the name you assigned to the Directory Service server when you configured it in the user fsae command. vpn certificate Display detailed information about local and CA certificates installed on the FortiGate. This is a VDOM level command. The global command is get certificate. Syntax get vpn certificate {local | ca} details [certificate_name] CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 985 get vpn ike gateway vpn ike gateway Use this command to display information about FortiGate IPsec VPN IKE gateways. Syntax get vpn ike gateway [<gateway_name_str>] vpn ipsec tunnel details Use this command to display detailed information about IPsec tunnels. Syntax get vpn ipsec tunnel details vpn ipsec tunnel name Use this command to display information about a specified IPsec VPN tunnel. Syntax get vpn ipsec tunnel name <tunnel_name_str> vpn ipsec tunnel summary Use this command to display summary information about IPsec tunnels. Syntax get vpn ipsec tunnel summary vpn ipsec stats crypto Use this command to display information about the FortiGate hardware and software crypto configuration. Syntax get vpn ipsec stats crypto Example output get vpn ipsec stats crypto IPsec crypto devices in use: CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 986 vpn ipsec stats tunnel get CP6 (encrypted/decrypted): null: 0 0 des: 0 0 3des: 0 0 aes: 0 0 CP6 (generated/validated): null: 0 0 md5: 0 0 sha1: 0 0 sha256: 0 0 SOFTWARE (encrypted/decrypted): null: 0 0 des: 0 0 3des: 0 0 aes: 0 0 SOFTWARE (generated/validated): null: 0 0 md5: 0 0 sha1: 0 0 sha256: 0 0 vpn ipsec stats tunnel Use this command to view information about IPsec tunnels. Syntax get vpn ipsec stats tunnel Example output #get vpn ipsec stats tunnel tunnels total: 0 static/ddns: 0 dynamic: 0 manual: 0 errors: 0 selectors total: 0 up: 0 vpn ssl monitor Use this command to display information about logged in SSL VPN users and current SSL VPN sessions. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 987 get vpn status l2tp Syntax get vpn ssl monitor Example output vpn status l2tp Use this command to display information about L2TP tunnels. Syntax get vpn status l2tp vpn status pptp Use this command to display information about PPTP tunnels. Syntax get vpn status pptp vpn status ssl Use this command to display SSL VPN tunnels and to also verify that the FortiGate unit includes the CP6 or greater FortiASIC device that supports SSL acceleration. Syntax get vpn status ssl hw-acceleration-status get vpn status ssl list Variable Description hwaccelerationstatus Display whether or not the FortiGate unit contains a FortiASIC device that supports SSL acceleration. list Display information about all configured SSL VPN tunnels. webfilter categories List the FortiGuard Web Filtering categories. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 988 webfilter ftgd-statistics get Syntax get webfilter categories Example output (partial) FG-5KD3914800284 # get webfilter categories g01 Potentially Liable: 1 Drug Abuse 3 Hacking 4 Illegal or Unethical 5 Discrimination 6 Explicit Violence 12 Extremist Groups 59 Proxy Avoidance 62 Plagiarism 83 Child Abuse g02 Adult/Mature Content: 2 Alternative Beliefs 7 Abortion 8 Other Adult Materials 9 Advocacy Organizations 11 Gambling 13 Nudity and Risque 14 Pornography 15 Dating 16 Weapons (Sales) 57 Marijuana 63 Sex Education 64 Alcohol 65 Tobacco 66 Lingerie and Swimsuit 67 Sports Hunting and War Games g04 Bandwidth Consuming: 19 Freeware and Software Downloads 24 File Sharing and Storage 25 Streaming Media and Download 72 Peer-to-peer File Sharing 75 Internet Radio and TV 76 Internet Telephony g05 Security Risk: 26 Malicious Websites 61 Phishing 86 Spam URLs 88 Dynamic DNS ... webfilter ftgd-statistics Use this command to display FortiGuard Web Filtering rating cache and daemon statistics. CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 989 get webfilter ftgd-statistics Syntax get webfilter ftgd-statistics Example output get webfilter ftgd-statistics Rating Statistics: ===================== DNS failures : 0 DNS lookups : 0 Data send failures : 0 Data read failures : 0 Wrong package type : 0 Hash table miss : 0 Unknown server : 0 Incorrect CRC : 0 Proxy request failures : 0 Request timeout : 0 Total requests : 0 Requests to FortiGuard servers : 0 Server errored responses : 0 Relayed rating : 0 Invalid profile : 0 Allowed : 0 Blocked : 0 Logged : 0 Errors : 0 Cache Statistics: ===================== Maximum memory : 0 Memory usage : 0 Nodes : 0 Leaves : 0 Prefix nodes : 0 Exact nodes : 0 Requests : 0 Misses : 0 Hits : 0 Prefix hits : 0 Exact hits : 0 No cache directives : 0 Add after prefix : 0 Invalid DB put : 0 DB updates : 0 Percent full : 0% Branches : 0% Leaves : 0% Prefix nodes : 0% CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 990 webfilter status get Exact nodes : 0% Miss rate : 0% Hit rate : 0% Prefix hits : 0% Exact hits : 0% webfilter status Use this command to display FortiGate Web Filtering rating information. Syntax get webfilter status [<refresh-rate_int>] wireless-controller client-info Use this command to get information about WiFi clients. Syntax get wireless-controller client-info <vfid> <interface> <client_ip> The output looks like this: # get wireless-controller client-info 0 test-local 192.168.2.100 count=1 status: sta_mac=10:fe:ed:26:aa:e0 ap_sn=FP320C3X14006184, ap_name=FP320C3X14006184, chan=6, radio_type=11N wireless-controller rf-analysis Use this command to show information about RF conditions at the access point. Syntax get wireless-controller rf-analysis [<wtp_id>] Example output # get wireless-controller rf-analysis <wtp-id> wtp id FWF60C3G11004319 (global) # get wireless-controller rf-analysis WTP: FWF60C-WIFI0 0-127.0.0.1:15246 channel rssi-total rf-score overlap-ap interfere-ap 1 418 1 24 26 2 109 5 0 34 3 85 7 1 34 4 64 9 0 35 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 991 get wireless-controller scan 5 101 6 1 35 6 307 1 8 11 7 82 7 0 16 8 69 8 1 15 9 42 10 0 15 10 53 10 0 14 11 182 1 5 6 12 43 10 0 6 13 20 10 0 5 14 8 10 0 5 Controller: FWF60C3G11004319-0 channel rssi_total 1 418 2 109 3 85 4 64 5 101 6 307 7 82 8 69 9 42 10 53 11 182 12 43 13 20 14 8 wireless-controller scan Use this command to view the list of access points detected by wireless scanning. Syntax get wireless-controller scan Example output CMW SSID BSSID CHAN RATE S:N INT CAPS ACT LIVE AGE WIRED UNN 00:0e:8f:24:18:6d 64 54M 16:0 100 Es N 62576 1668 ? UNN ftiguest 00:15:55:23:d8:62 157 130M 6:0 100 EPs N 98570 2554 ? wireless-controller spectral-info Use this command to display wireless controller spectrum analysis. Syntax get wireless-controller spectral-info CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 992 wireless-controller status get wireless-controller status Use this command to view the numbers of wtp sessions and clients. Syntax get wireless-controller status Example output # get wireless-controller status Wireless Controller : wtp-session-count: 1 client-count : 1/0 wireless-controller vap-status Use this command to view information about your SSIDs. Syntax get wireless-controller vap-status Example output # get wireless-controller vap-status WLAN: mesh.root name : mesh.root vdom : root ssid : fortinet.mesh.root status : up mesh backhaul : yes ip : 0.0.0.0 mac : 00:ff:0a:57:95:ca station info : 0/0 WLAN: wifi name : wifi vdom : root ssid : ft-mesh status : up mesh backhaul : yes ip : 10.10.80.1 mac : 00:ff:45:e1:55:81 station info : 1/0 wireless-controller wlchanlistlic Use this command to display a list of the channels allowed in your region, including the maximum permitted power for each channel CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 993 get wireless-controller wlchanlistlic the channels permitted for each wireless type (802.11n, for example) The list is in XML format. Syntax get wireless-controller wlchanlistlic Sample output country name: UNITED STATES2, country code:841, iso name:US channels on 802.11A band without channel bonding: channel= 36 maxRegTxPower= 23 maxTxPower= 63/2 minTxPower= 63/2 channel= 40 maxRegTxPower= 23 maxTxPower= 63/2 minTxPower= 63/2 channel= 44 maxRegTxPower= 23 maxTxPower= 63/2 minTxPower= 63/2 channel= 48 maxRegTxPower= 23 maxTxPower= 63/2 minTxPower= 63/2 channel=149 maxRegTxPower= 30 maxTxPower= 63/2 minTxPower= 63/2 channel=153 maxRegTxPower= 30 maxTxPower= 63/2 minTxPower= 63/2 channel=157 maxRegTxPower= 30 maxTxPower= 63/2 minTxPower= 63/2 channel=161 maxRegTxPower= 30 maxTxPower= 63/2 minTxPower= 63/2 channel=165 maxRegTxPower= 30 maxTxPower= 63/2 minTxPower= 63/2 channels channel= channel= channel= channel= channel= channel= channel= channel= channel= channel= channel= on 802.11B band without channel bonding: 1 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 2 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 3 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 4 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 5 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 6 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 7 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 8 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 9 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 10 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 11 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 channels channel= channel= channel= channel= channel= channel= channel= channel= channel= channel= channel= on 802.11G band without channel bonding: 1 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 2 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 3 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 4 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 5 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 6 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 7 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 8 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 9 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 10 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 11 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 channels channel= channel= channel= channel= channel= channel= channel= channel= on 802.11N 2.4GHz band without channel bonding: 1 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 2 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 3 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 4 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 5 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 6 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 7 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 8 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 63/2 63/2 63/2 63/2 63/2 63/2 63/2 63/2 994 wireless-controller wtp-status get channel= 9 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 channel= 10 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 channel= 11 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 channels channel= channel= channel= channel= channel= channel= channel= on 802.11N 2.4GHz band with channel bonding plus: 1 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 2 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 3 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 4 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 5 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 6 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 7 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 channels channel= channel= channel= channel= channel= channel= channel= on 802.11N 2.4GHz band with channel bonding minus: 5 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 6 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 7 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 8 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 9 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 10 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 11 maxRegTxPower= 27 maxTxPower= 63/2 minTxPower= 63/2 channels on channel= 36 channel= 40 channel= 44 channel= 48 channel=149 channel=153 channel=157 channel=161 channel=165 802.11N 5GHz band maxRegTxPower= 23 maxRegTxPower= 23 maxRegTxPower= 23 maxRegTxPower= 23 maxRegTxPower= 30 maxRegTxPower= 30 maxRegTxPower= 30 maxRegTxPower= 30 maxRegTxPower= 30 without channel bonding: maxTxPower= 63/2 minTxPower= maxTxPower= 63/2 minTxPower= maxTxPower= 63/2 minTxPower= maxTxPower= 63/2 minTxPower= maxTxPower= 63/2 minTxPower= maxTxPower= 63/2 minTxPower= maxTxPower= 63/2 minTxPower= maxTxPower= 63/2 minTxPower= maxTxPower= 63/2 minTxPower= 63/2 63/2 63/2 63/2 63/2 63/2 63/2 63/2 63/2 channels on channel= 36 channel= 40 channel= 44 channel= 48 channel=149 channel=153 channel=157 channel=161 802.11N 5GHz band maxRegTxPower= 23 maxRegTxPower= 23 maxRegTxPower= 23 maxRegTxPower= 23 maxRegTxPower= 30 maxRegTxPower= 30 maxRegTxPower= 30 maxRegTxPower= 30 with channel bonding all: maxTxPower= 63/2 minTxPower= maxTxPower= 63/2 minTxPower= maxTxPower= 63/2 minTxPower= maxTxPower= 63/2 minTxPower= maxTxPower= 63/2 minTxPower= maxTxPower= 63/2 minTxPower= maxTxPower= 63/2 minTxPower= maxTxPower= 63/2 minTxPower= 63/2 63/2 63/2 63/2 63/2 63/2 63/2 63/2 wireless-controller wtp-status Syntax get wireless-controller wtp-status Example output # get wireless-controller wtp-status CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 995 get wireless-controller wtp-status WTP: FAP22B3U11005354 0-192.168.3.110:5246 wtp-id : FAP22B3U11005354 region-code : name : mesh-uplink : mesh mesh-downlink : disabled mesh-hop-count : 1 parent-wtp-id : software-version : local-ipv4-addr : 0.0.0.0 board-mac : 00:00:00:00:00:00 join-time : Mon Apr 2 10:23:32 2012 connection-state : Disconnected image-download-progress: 0 last-failure : 0 -- N/A last-failure-param: last-failure-time: N/A Radio 1 : Monitor Radio 2 : Ap country-name : NA country-code : N/A client-count : 0 base-bssid : 00:00:00:00:00:00 max-vaps : 7 oper-chan : 0 Radio 3 : Not Exist WTP: FWF60C-WIFI0 0-127.0.0.1:15246 wtp-id : FWF60C-WIFI0 region-code : ALL name : mesh-uplink : ethernet mesh-downlink : enabled mesh-hop-count : 0 parent-wtp-id : software-version : FWF60C-v5.0-build041 local-ipv4-addr : 127.0.0.1 board-mac : 00:09:0f:fe:cc:56 join-time : Mon Apr 2 10:23:35 2012 connection-state : Connected image-download-progress: 0 last-failure : 0 -- N/A last-failure-param: last-failure-time: N/A Radio 1 : Ap country-name : US country-code : N/A client-count : 1 base-bssid : 00:0e:8e:3b:63:99 max-vaps : 7 oper-chan : 1 Radio 2 : Not Exist Radio 3 : Not Exist CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 996 CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 997 tree tree The tree command displays FortiOS config CLI commands in a tree structure called the configuration tree. Each configuration command forms a branch of the tree. Syntax tree [branch] [sub-branch] You can enter the tree command from the top of the configuration tree the command displays the complete configuration tree. Commands are displayed in the order that they are processed when the FortiGate unit starts up. For example, the following output shows the first 10 lines of tree command output: tree -- -- system -- [vdom] --*name (12) +- vcluster-id (0,0) |- <global> -- language |- gui-ipv6 |- gui-voip-profile |- gui-lines-per-page (20,1000) |- admintimeout (0,0) |- admin-concurrent |- admin-lockout-threshold (0,0) |- admin-lockout-duration (1,2147483647) |- refresh (0,2147483647) |- interval (0,0) |- failtime (0,0) |- daily-restart |- restart-time ... You can include a branch name with the tree command to view the commands in that branch: tree user -- user -- [radius] --*name (36) |- server (64) |- secret |- secondary-server (64) |- secondary-secret ... |- [tacacs+] --*name (36) |- server (64) |- secondary-server (64) |- tertiary-server (64) ... |- [ldap] --*name (36) |- server (64) |- secondary-server (64) |- tertiary-server (64) |- port (1,65535) ... You can include a branch and sub branch name with the tree command to view the commands in that sub branch: tree user local -- [local] --*name (36) |- status CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 998 tree ||||+- type passwd ldap-server (36) radius-server (36) tacacs+-server (36) ... If you enter the tree command from inside the configuration tree the command displays the tree for the current command: config user ldap tree -- [ldap] --*name (36) |- server (64) |- cnid (21) |- dn (512) |- port (1,65535) |- type ... The tree command output includes information about field limits. These apply in both the CLI and the webbased manager. For a numeric field, the two numbers in in parentheses show the lower and upper limits. For example (0,32) indicates that values from 0 to 32 inclusive are accepted. For string values, the number in parentheses is one more than the maximum number of characters permitted. In the following example, the FQDN can contain up to 255 characters. config firewall address tree -- [address] --*name (64) |- subnet |- type |- start-ip |- end-ip |- fqdn (256) |- country (3) |- cache-ttl (0,86400) |- wildcard |- comment |- visibility |- associated-interface (36) |- color (0,32) +- [tags] --*name (64) CLI Reference for FortiOS 5.4 Fortinet Technologies Inc. 999 Copyright© 2016 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., in the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. In no event does Fortinet make any commitment related to future deliverables, features, or development, and circumstances may change such that any forward-looking statements herein are not accurate. Fortinet disclaims in full any covenants, representations,and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, 1000 CLI Reference for FortiOS 5.4 transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. Fortinet Technologies Inc.