01-28008-0015-20050204 - FortiGate CLI Reference
01-28008-0015-20050204 - FortiGate CLI Reference
No part of this publication including text, examples, diagrams or illustrations may be reproduced,
transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical or
otherwise, for any purpose, without prior written permission of Fortinet Inc.
Trademarks
Products mentioned in this document are trademarks or registered trademarks of their respective
holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS
Send information about errors or omissions in this document or any Fortinet technical documentation to
[email protected].
Contents
Table of Contents
Introduction ............................................................................................................ 9
Changes to the FortiGate CLI for 2.80................................................................................ 9
About this document ......................................................................................................... 10
Conventions ...................................................................................................................... 11
Fortinet documentation ..................................................................................................... 12
Comments on Fortinet technical documentation........................................................... 12
Customer service and technical support........................................................................... 12
config firewall....................................................................................................... 63
address ............................................................................................................................. 64
addrgrp.............................................................................................................................. 66
dnstranslation.................................................................................................................... 68
ipmacbinding setting ......................................................................................................... 70
ipmacbinding table ............................................................................................................ 72
ippool ................................................................................................................................ 74
multicast-policy ................................................................................................................. 76
policy................................................................................................................................. 78
profile ................................................................................................................................ 84
schedule onetime.............................................................................................................. 95
schedule recurring ............................................................................................................ 97
service custom .................................................................................................................. 99
service group .................................................................................................................. 101
vip ................................................................................................................................... 103
execute................................................................................................................ 353
backup ............................................................................................................................ 354
date ................................................................................................................................. 355
dhcpclear ........................................................................................................................ 356
enter................................................................................................................................ 357
factoryreset ..................................................................................................................... 358
formatlogdisk................................................................................................................... 359
ha manage ...................................................................................................................... 360
ha synchronize................................................................................................................ 361
modem dial ..................................................................................................................... 363
modem hangup ............................................................................................................... 364
ping ................................................................................................................................. 365
ping-options .................................................................................................................... 366
ping6 ............................................................................................................................... 368
reboot.............................................................................................................................. 369
restore............................................................................................................................. 370
router restart ................................................................................................................... 371
router restart-graceful ..................................................................................................... 372
shutdown......................................................................................................................... 373
time ................................................................................................................................. 374
traceroute........................................................................................................................ 375
update_now .................................................................................................................... 376
vpn certificate ca ............................................................................................................. 377
vpn certificate key ........................................................................................................... 378
vpn certificate local ......................................................................................................... 379
Introduction
The FortiGate Antivirus Firewall supports network-based deployment of application-level services,
including virus protection and full-scan content filtering. FortiGate units improve network security,
reduce network misuse and abuse, and help you use communications resources more efficiently
without compromising the performance of your network.
The FortiGate unit is a dedicated easily managed security device that delivers a full suite of capabilities
that include:
• application-level services such as virus protection and content filtering,
• network-level services such as firewall, intrusion detection, VPN, and traffic shaping.
The FortiGate unit employs Fortinet’s Accelerated Behavior and Content Analysis System
(ABACAS™) technology, which leverages breakthroughs in chip design, networking, security, and
content analysis. The unique ASIC-based architecture analyzes content and behavior in real-time,
enabling key applications to be deployed right at the network edge where they are most effective at
protecting your networks. The FortiGate series complements existing solutions, such as host-based
antivirus protection, and enables new applications and services while greatly lowering costs for
equipment, administration, and maintenance.
For a detailed description of the new structure, navigation and command types, see “CLI Structure” on
page 17.
Conventions
This guide uses the following conventions to describe command syntax.
• Angle brackets < > to indicate variables.
For example:
execute restore config <filename_str>
You enter:
execute restore config myfile.bak
<xxx_str> indicates an ASCII string that does not contain new-lines or carriage returns.
<xxx_integer> indicates an integer string that is a decimal (base 10) number.
<xxx_octet> indicates a hexadecimal string that uses the digits 0-9 and letters A-F.
<xxx_ipv4> indicates a dotted decimal IPv4 address.
<xxx_v4mask> indicates a dotted decimal IPv4 netmask.
<xxx_ipv4mask> indicates a dotted decimal IPv4 address followed by a dotted decimal IPv4
netmask.
<xxx_ipv6> indicates an IPv6 address.
<xxx_v6mask> indicates an IPv6 netmask.
<xxx_ipv6mask> indicates an IPv6 address followed by an IPv6 netmask.
• Vertical bar and curly brackets {|} to separate alternative, mutually exclusive required keywords.
For example:
set opmode {nat | transparent}
You can enter set opmode nat or set opmode transparent.
• Square brackets [ ] to indicate that a keyword or variable is optional.
For example:
show system interface [<name_str>]
To show the settings for all interfaces, you can enter show system interface. To show the
settings for the internal interface, you can enter show system interface internal.
• A space to separate options that can be entered in any combination and must be separated by
spaces.
For example:
set allowaccess {ping https ssh snmp http telnet}
You can enter any of the following:
set allowaccess ping
set allowaccess ping https ssh
set allowaccess https ping ssh
set allowaccess snmp
In most cases to make changes to lists that contain options separated by spaces, you need to
retype the whole list including all the options you want to apply and excluding all the options you
want to remove.
Fortinet documentation
Information about FortiGate products is available from the following FortiGate documents:
• FortiGate Administration Guide (one for each FortiGate product)
• FortiGate CLI Reference Guide
• FortiGate Log Message Reference Guide
• FortiGate VPN Guide
The FortiGate online help also contains procedures for using the FortiGate web-based manager to
configure and manage your FortiGate unit.
Administrator access
Each administrator account belongs to an access profile. You can create access profiles that deny
access to or allow read only, write only, or both read and write access to the following FortiGate
features.
System Can access the system status, interface, virtual domain, HA, routing, option, SNMP, time, and
Configuration replacement message features.
Log & Report Can access the log setting, and log message features.
Security Policy Can access the firewall, VPN, IPS, and antivirus features.
Auth Users Can access the authorized users feature.
Admin Users Can access the administrative users feature.
FortiProtect Can access the update options feature.
Update
System Can access the system shutdown, and system reboot functions.
Shutdown
Note: The following procedure describes how to connect to the FortiGate CLI using Windows HyperTerminal
software. You can use any terminal emulation program.
Note: Remember to press Enter at the end of each line in the command example. Also, type end and press Enter
to commit the changes to the FortiGate configuration.
4 To confirm that you have configured SSH or Telnet access correctly, enter the following command to
view the access settings for the interface:
get system interface <name_str>
The CLI displays the settings, including the management access settings, for the named interface.
Caution: Telnet is not a secure access method. SSH should be used to access the FortiGate CLI from the Internet
! or any other unprotected network.
CLI Structure
This section describes:
• CLI command organization
• Example command sequences
config branch
The config branch is organized into configuration shells. You can complete and save the
configuration within each shell for that shell, or you can leave the shell without saving the
configuration. You can only use the configuration commands for the shell that you are working in. To
use the configuration commands for another shell you must leave the shell you are working in and
enter the other shell.
The following navigation and configuration commands are available in the config branch.
config Navigate to a shell. For example, type config system admin and press Enter to access the
shell to add or edit administrator accounts.
end Save the changes you have made in the current shell and leave the shell. Every config
command must be paired with an end command.
The end command is also used to save set command changes and leave the shell.
edit Add an entry to the FortiGate configuration or edit an existing entry. For example in the config
system admin shell:
• type edit admin and press Enter to edit the settings for the default admin administrator
account.
• type edit newadmin and press Enter to create a new administrator account with the name
newadmin and to edit the default settings for the new administrator account.
When you add a new entry using the edit command, the message new entry
<‘variable’> added is displayed.
purge Remove all entries configured in the current shell. For example in the config user local
shell:
• type get to see the list of user names added to the FortiGate configuration,
• type purge and then y to confirm that you want to purge all the user names,
• type get again to confirm that no user names are displayed.
move Change the position of an entry in an ordered table. For example in the config firewall
policy shell:
• type move 3 after 1 and press Enter to move the policy in the third position in the table to
the second position in the table.
• type move 3 before 1 and press Enter to move the policy in the third position in the table
to the first position in the table.
delete Remove an entry from the FortiGate configuration. For example in the config system
admin shell, type delete newadmin and press Enter to delete the administrator account
named newadmin.
next Save the changes you have made in the current shell and continue working in the shell. For
example if you want to add several new user accounts enter the config user local shell.
• Type edit User1 and press Enter.
• Use the set commands to configure the values for the new user account.
• Type next to save the configuration for User1 without leaving the config user local
shell.
• Continue using the edit, set, and next commands to continue adding user accounts.
• type end and press Enter to save the last configuration and leave the shell.
set Assign values. For example from the edit admin command shell, typing set passwd
newpass changes the password of the admin administrator account to newpass.
Note: When using a set command to make changes to lists that contain options separated by
spaces, you need to retype the whole list including all the options you want to apply and
excluding all the options you want to remove.
unset Reset values to defaults. For example from the edit admin command shell, typing unset
passwd resets the password of the admin administrator account to the default of no password.
abort Exit a shell without saving the configuration.
get branch
Use get to display settings. You can use get within a config shell to display the settings for that
shell, or you can use get with a full path to display the settings for the specified shell.
To use get from the root prompt, you must include a path to a shell.
The root prompt is the FortiGate host or model name followed by a #.
Example
Note: Interface names vary for different FortiGate models. The following examples use the interface names for a
FortiGate_300 unit.
When you type get in the config system interface shell, information about all of the interfaces
is displayed.
At the (interface)# prompt, type:
get
The screen displays:
== [ internal ]
name: internal mode: static ip: 192.168.20.200 255.255.255.0 status:
up netbios-forward: disable type: physical ip6-address: ::/0 ip6-
send-adv: disable
== [ external ]
name: external mode: static ip: 192.168.100.99 255.255.255.0 status:
up netbios-forward: disable type: physical ip6-address: ::/0 ip6-
send-adv: disable
...
Example
When you type get in the internal interface shell, the configuration values for the internal interface
are displayed.
At the (internal)# prompt, type:
get
The screen displays:
name : internal
allowaccess : ping https ssh
arpforword : enable
cli_conn_status : 0
detectserver : (null)
gwdetect : disable
ip : 192.168.20.200 255.255.255.0
ip6-address : ::/0
...
secondaryip:
speed : auto
status : up
substitute-dst-mac : 00 00 00 00 00 00
type : physical
vdom : root
Example
You are working in the config system global shell and want to see information about the
FortiGate interfaces.
At the (global)# prompt, type:
get system interface
The screen displays:
== [ internal ]
name: internal mode: static ip: 192.168.20.200 255.255.255.0 status:
up netbios-forward: disable type: physical ip6-address: ::/0 ip6-
send-adv: disable
== [ external ]
name: external mode: static ip: 192.168.100.99 255.255.255.0 status:
up netbios-forward: disable type: physical ip6-address: ::/0 ip6-
send-adv: disable
...
Example
You want to confirm the IP address and netmask of the internal interface from the root prompt.
At the # prompt, type:
get system interface internal
The screen displays:
name : internal
allowaccess : ping https ssh
arpforword : enable
cli_conn_status : 0
detectserver : (null)
gwdetect : disable
ip : 192.168.20.200 255.255.255.0
ip6-address : ::/0
ip6-default-life : 1800
...
show branch
Use show to display the FortiGate unit configuration. Only changes to the default configuration are
displayed. You can use show within a config shell to display the configuration of that shell, or you
can use show with a full path to display the configuration of the specified shell.
To display the configuration of all config shells, you can use show from the root prompt.
The root prompt is the FortiGate host or model name followed by a #.
Example
When you type show and press Enter within the internal interface shell, the changes to the default
internal interface configuration are displayed.
At the (internal)# prompt, type:
show
The screen displays:
config system interface
edit internal
set allowaccess ssh ping https
set ip 192.168.20.200 255.255.255.0
next
end
Example
You are working in the internal interface shell and want to see the system global configuration.
At the (internal)# prompt, type:
show system global
execute branch
Use execute to run static commands, to reset the FortiGate unit to factory defaults, to back up or
restore FortiGate configuration files, and to enter or leave a virtual domain. The execute commands
are available only from the root prompt.
The root prompt is the FortiGate host or model name followed by a #.
Example
At the root prompt, type:
execute reboot
and press Enter to restart the FortiGate unit.
diagnose branch
Commands in the diagnose branch are used for debugging the operation of the FortiGate unit and to
set parameters for displaying different levels of diagnostic information. The diagnose commands are
not documented in this CLI Reference Guide.
Caution: Diagnose commands are intended for advanced users only. Contact Fortinet technical support before
! using these commands.
CLI basics
This section includes:
• Command help
• Command completion
• Recalling commands
• Editing commands
• Line continuation
• Command abbreviation
• Environment variables
• Encrypted password support
• Using single quotes to enter tabs or spaces in strings
• International characters
• IP address formats
• Editing the configuration file
• Setting page length
• Changing the baud rate
• Using Perl regular expressions
Command help
You can press the question mark (?) key to display command help.
• Press the question mark (?) key at the command prompt to display a list of the commands available
and a description of each command.
• Type a command followed by a space and press the question mark (?) key to display a list of the
options available for that command and a description of each option.
• Type a command followed by an option and press the question mark (?) key to display a list of
additional options available for that command option combination and a description of each option.
Command completion
You can use the tab key or the question mark (?) key to complete commands.
• You can press the tab key at any prompt to scroll through the options available for that prompt.
• You can type the first characters of any command and press the tab key or the question mark (?)
key to complete the command or to scroll through the options that are available at the current
cursor position.
• After completing the first word of a command, you can press the space bar and then the tab key to
scroll through the options available at the current cursor position.
Recalling commands
You can recall previously entered commands by using the Up and Down arrow keys to scroll through
commands you have entered.
Editing commands
Use the Left and Right arrow keys to move the cursor back and forth in a recalled command. You can
also use the Backspace and Delete keys and the control keys listed in Table 2 to edit the command.
Line continuation
To break a long command over multiple lines, use a \ at the end of each line.
Command abbreviation
You can abbreviate commands and command options to the smallest number of non-ambiguous
characters. For example, the command get system status can be abbreviated to g sy st.
Environment variables
The FortiGate CLI supports several environment variables.
$USERFROM The management access type (SSH, Telnet and so on) and the IP address of the logged in
administrator.
$USERNAME The user account name of the logged in administrator.
$SerialNum The serial number of the FortiGate unit.
Variable names are case sensitive. In the following example, when entering the variable, you can type
$ followed by a tab to auto-complete the variable to ensure that you have the exact spelling and case.
Continue pressing tab until the variable you want to use is displayed.
config system global
set hostname $SerialNum
end
International characters
The CLI supports international characters in strings.
IP address formats
You can enter an IP address and subnet using either dotted decimal or slash-bit format. For example
you can type either:
set ip 192.168.1.1 255.255.255.0
or
set ip 192.168.1.1/24
The IP address is displayed in the configuration file in dotted decimal format.
Note: Changing the default baud rate is available for FortiGate units with BIOS 3.03 and higher and FortiOS
version 2.50 and higher.
In Perl regular expressions, ‘*’ means match 0 or more times of the character before it, not 0 or more
times of any character. For example:
• forti*\.com matches fortiiii.com but does not match fortinet.com.
To match any character 0 or more times, use ‘.*’ where ‘.’ means any character and the ‘*’ means 0 or
more times. For example:
• the wildcard match pattern forti*.com is equivalent to the regular expression forti.*\.com.
Word boundary
In Perl regular expressions, the pattern does not have an implicit word boundary. For example, the
regular expression “test” not only matches the word “test” but also matches any word that contains the
word “test” such as “atest”, “mytest”, “testimony”, “atestb”. The notation “\b” specifies the word
boundary. To match exactly the word “test”, the expression should be \btest\b.
Case sensitivity
Regular expression pattern matching is case sensitive in the Web and Spam filters. To make a word or
phrase case insensitive, use the regular expression /i. For example, /bad language/i will block all
instances of “bad language” regardless of case.
Expression Matches
abc abc (that exact character sequence, but anywhere in the string)
^abc abc at the beginning of the string
abc$ abc at the end of the string
a|b either of a and b
^abc|abc$ the string abc at the beginning or at the end of the string
ab{2,4}c an a followed by two, three or four b's followed by a c
ab{2,}c an a followed by at least two b's followed by a c
ab*c an a followed by any number (zero or more) of b's followed by a c
ab+c an a followed by one or more b's followed by a c
ab?c an a followed by an optional b followed by a c; that is, either abc or ac
a.c an a followed by any single character (not newline) followed by a c
a\.c a.c exactly
[abc] any one of a, b and c
[Aa]bc either of Abc and abc
[abc]+ any (nonempty) string of a's, b's and c's (such as a, abba, acbabcacaa)
[^abc]+ any (nonempty) string which does not contain any of a, b and c (such as defg)
\d\d any two decimal digits, such as 42; same as \d{2}
/i makes the pattern case insensitive. For example, /bad language/i
blocks any instance of “bad language” regardless of case.
\w+ a "word": a nonempty sequence of alphanumeric characters and low lines
(underscores), such as foo and 12bar8 and foo_1
config alertemail
filter
setting
filter
Use this command to specify what log activity and what log severity level to send alert email for.
You can configure the FortiGate unit to send alert email to multiple recipients when selected events
occur.
Note: If more than one log message is collected before an interval is reached, the messages are combined and
sent out as one alert email.
Examples
This example shows how to configure the FortiGate unit to send alert email for administrative events,
HA activity, and virus incidents, and to set a log severity level of warning.
config alertemail filter
set severity warning
set admin enable
set ha enable
set virus enable
end
This example shows how to display the alertemail filter settings.
get alertemail filter
This example shows how to display the configuration for the alertemail filter settings.
show alertemail filter
If the show command returns you to the prompt, the settings are at default.
Command History
FortiOS v2.80 Substantially revised and expanded.
FortiOS v.2.80 MR2 The email_content keyword was removed.
The email_log_imap, email_log_pop3, and email_log_smtp
keywords were added.
FortiOS v.2.80 MR3 The chassis keyword was added.
Related Commands
• config alertemail setting
• config log
setting
Use this command to configure the FortiGate unit to send alert email to up to three recipients, and to
configure how frequently the FortiGate unit sends alert email.
Note: Because the FortiGate uses the SMTP server name to connect to the mail server, it must be able to look up
this name on your DNS server. For information, see “config system dns” on page 239.
Examples
This example shows how to configure the SMTP server and user name, add two email addresses for
sending alerts to, and specify how frequently to send alerts for each log severity level.
config alertemail setting
set server mail.ourcompany.com
set username [email protected]
set mailto1 [email protected]
set mailto2 [email protected]
set alert-interval 2
set critical-interval 10
set debug-interval 10
set emergency-interval 1
set error-interval 60
set information-interval 1440
set notification-interval 720
set warning-interval 120
end
This example shows how to display the alertemail settings.
get alertemail setting
This example shows how to display the configuration of the alertemail setting command.
show alertemail setting
Command History
FortiOS v2.80 Substantially revised and expanded.
Related Commands
• config alertemail filter
• config log
• config system dns
config antivirus
filepattern
grayware <category-name_str>
heuristic
quarantine
quarfilepattern
service http
service ftp
service pop3
service imap
service smtp
filepattern
Use this command to add, edit or delete the file patterns used for virus blocking and to set which
protocols to check for files to block.
Example
This example shows how to add the *.xyz file pattern, allow *.xyz files in IMAP, SMTP, and POP3
traffic, and block *.xyz files in HTTP and FTP traffic.
config antivirus filepattern
edit *.xyz
set allow imap smtp pop3
set block http ftp
end
This example shows how to display the file pattern list.
get antivirus filepattern
This example shows how to display the settings for the *.bat file pattern.
get antivirus filepattern *.bat
This example shows how to display the configuration for the entire file pattern list.
show antivirus filepattern
This example shows how to display the configuration for the *.bat file pattern.
show antivirus filepattern *.bat
Command History
FortiOS v2.80 Substantially revised.
Related Commands
• config antivirus heuristic
• config antivirus grayware <category-name_str>
• config antivirus quarantine
• config antivirus quarfilepattern
• config antivirus service http
• config antivirus service ftp
• config antivirus service pop3
• config antivirus service imap
• config antivirus service smtp
grayware <category-name_str>
Use this command to enable or disable grayware scanning for the specified category.
Grayware programs are unsolicited commercial software programs that get installed on computers,
often without the user’s consent or knowledge. Grayware programs are generally considered an
annoyance, but these programs can cause system performance problems or be used for malicious
means.
The FortiGate unit scans for known grayware executable programs in each category you enable. The
category list and contents are added or updated whenever your FortiGate unit receives a virus update
package. New categories may be added at any time and are loaded with virus updates. By default, all
new categories are disabled.
Adware Adware is usually embedded in freeware programs and causes ads to pop up whenever the
program is opened or used.
Dial Dialers allow others to use the PC modem to call premium numbers or make long distance
calls.
Game Games are usually joke or nuisance games that you may want to block from network users.
Joke Joke programs can include custom cursors and programs that appear to affect the system.
P2P P2P, while a legitimate protocol, is synonymous with file sharing programs that are used to
swap music, movies, and other files, often illegally.
Spy Spyware, like adware, is often included with freeware. Spyware is a tracking and analysis
program that can report your activities, such as web browsing habits, to the advertiser’s web
site where it may be recorded and analyzed.
Keylog Keylogger programs can record every keystroke made on a keyboard including passwords,
chat, and instant messages.
Hijacker Browser hijacking occurs when a ‘spyware’ type program changes web browser settings,
including favorites or bookmarks, start pages, and menu options.
Plugin Browser plugins can often be harmless Internet browsing tools that are installed and operate
directly from the browser window. Some toolbars and plugins can attempt to control or record
and send browsing preferences.
NMT Network management tools can be installed and used maliciously to change settings and
disrupt network security.
RAT Remote administration tools allow outside users to remotely change and monitor a computer
on a network.
Misc The miscellaneous grayware category.
BHO BHOs (Browser Helper Objects) are DLL files that are often installed as part of a software
package so the software can control the behavior of Internet Explorer 4.x and higher. Not all
BHOs are malicious, but the potential exists to track surfing habits and gather other
information.
Toolbar While some toolbars are harmless, spyware developers can use these toolbars to monitor
web habits and send information back to the developer.
Download Download components are usually run at Windows startup and are designed to install or
download other software, especially advertising and dial software.
Note: The FortiGate CLI is case sensitive and the first letter of all grayware category names is uppercase.
Example
This example shows how to enable grayware scanning for Adware programs.
config antivirus grayware Adware
set status enable
end
This example shows how to display the list of grayware categories.
get antivirus grayware
This example shows how to display the settings for the Adware category.
get antivirus filepattern Adware
This example shows how to display the configuration for all the grayware categories.
show antivirus grayware
This example shows how to display the configuration for the Adware category.
show antivirus grayware Adware
Command History
FortiOS v2.80 New.
Related Commands
• config antivirus filepattern
• config antivirus heuristic
• config antivirus quarantine
• config antivirus quarfilepattern
• config antivirus service http
• config antivirus service ftp
• config antivirus service pop3
• config antivirus service imap
• config antivirus service smtp
• config system autoupdate schedule
• execute update_now
heuristic
Use this command to configure heuristic scanning for viruses in binary files.
Example
This example shows how to disable heuristic scanning.
config antivirus heuristic
set mode disable
end
This example shows how to display the settings for the antivirus heuristic command.
get antivirus heuristic
This example shows how to display the configuration for the antivirus heuristic command.
show antivirus heuristic
Command History
FortiOS v2.80 New.
Related Commands
• config antivirus filepattern
• config antivirus quarantine
• config antivirus quarfilepattern
• config antivirus service http
• config antivirus service ftp
• config antivirus service pop3
• config antivirus service imap
• config antivirus service smtp
quarantine
Use this command to set file quarantine options.
FortiGate units with a local disk can quarantine blocked and infected files. The quarantined files are
removed from the content stream and stored on the FortiGate local disk. Users receive a message
informing them that the removed files have been quarantined.
You can view the file names and status information about the file in the quarantined file list. You can
also submit specific files and add file patterns to the autoupload list so they are automatically uploaded
to Fortinet for analysis.
Example
This example shows how to set the quarantine age limit to 100 hours, not quarantine blocked files from
SMTP and POP3 traffic, not quarantine heuristic tagged files from SMTP and POP3 traffic, enable
auto submit to the quarantine, set the quarantine to drop new files if the memory is full, set the
maximum file size to quarantine at 2 MB, quarantine files from IMAP traffic with blocked status,
quarantine files with heuristic status in IMAP, HTTP, and FTP traffic, use both file patterns and status
to determine which files to quarantine.
config antivirus quarantine
set agelimit 100
set drop_blocked smtp pop3
set drop_heuristic smtp pop3
set enable_auto_submit enable
set lowspace drop_new
set maxfilesize 2
set sel_status fileblocked
set store_blocked imap
set store_heuristic imap http ftp
set use_fpat enable
set use_status enable
end
This example shows how to display the settings for the antivirus quarantine command.
get antivirus quarantine
This example shows how to display the configuration for the antivirus quarantine command.
show antivirus quarantine
Command History
FortiOS v2.80 Substantially revised.
FortiOS v2.80 MR2 The enable_auto_upload keyword was changed to enable_auto_submit.
Related Commands
• config antivirus filepattern
• config antivirus heuristic
• config antivirus quarfilepattern
• config antivirus service http
• config antivirus service ftp
• config antivirus service pop3
• config antivirus service imap
• config antivirus service smtp
quarfilepattern
Use this command to configure the file patterns used by automatic file uploading.
You can configure the FortiGate unit to automatically upload suspicious files to Fortinet for analysis.
You can add file patterns you want uploaded to the autoupload list using the * wildcard character. File
patterns are applied for autoupload regardless of file blocking settings.
You can also upload files to Fortinet based on status (blocked or heuristics) or submit individual files
directly from the quarantined files list. For more information, see config antivirus quarantine.
Example
Use the following commands to enable automatic upload of *.bat files.
config antivirus quarfilepattern
edit *.bat
set status enable
end
This example shows how to display the settings for the antivirus quarfilepattern command.
get antivirus quarfilepattern
This example shows how to display the settings for the *.bat file pattern.
get antivirus quarfilepattern *.bat
This example shows how to display the configuration for the antivirus quarfilepattern
command.
show antivirus quarfilepattern
This example shows how to display the configuration for the *.bat file pattern.
show antivirus quarfilepattern *.bat
Command History
FortiOS v2.80 New.
Related Commands
• config antivirus filepattern
• config antivirus heuristic
• config antivirus quarantine
• config antivirus service http
• config antivirus service ftp
• config antivirus service pop3
• config antivirus service imap
• config antivirus service smtp
service http
Use this command to configure how the FortiGate unit handles antivirus scanning of large files in
HTTP traffic and what ports the FortiGate unit scans for HTTP.
This example shows how to set the maximum file size that can be buffered to memory for scanning at
12 MB, the maximum uncompressed file size that can be buffered to memory for scanning at 15 MB,
and how to enable antivirus scanning on ports 70, 80, and 443 for HTTP traffic.
config antivirus service http
set memfilesizelimit 12
set uncompsizelimit 15
set port 70
set port 80
set port 443
end
This example shows how to display the antivirus HTTP traffic settings.
get antivirus service http
This example shows how to display the configuration for antivirus HTTP traffic.
show antivirus service http
Command History
FortiOS v2.80 Substantially revised.
FortiOS v2.80 MR6 Removed diskfilesizelimit keyword.
FortiOS v2.80 MR7 Added uncompsizelimit keyword.
Related Commands
• config antivirus filepattern
• config antivirus heuristic
• config antivirus quarantine
• config antivirus quarfilepattern
• config antivirus service ftp
• config antivirus service pop3
• config antivirus service imap
• config antivirus service smtp
service ftp
Use this command to configure how the FortiGate unit handles antivirus scanning of large files in FTP
traffic and how the FortiGate unit handles the buffering and uploading of files to an FTP server.
Example
This example shows how to set the maximum file size buffered to memory for scanning at 25 MB, the
maximum uncompressed file size that can be buffered to memory at 100 MB, and how to enable
antivirus scanning on ports 20 and 21 for FTP traffic.
config antivirus service ftp
set memfilesizelimit 25
set uncompsizelimit 100
set port 20 21
end
This example shows how to display the antivirus FTP traffic settings.
get antivirus service ftp
This example shows how to display the configuration for antivirus FTP traffic.
show antivirus service ftp
Command History
FortiOS v2.80 Substantially revised.
FortiOS v2.80 MR3 The splice keyword was changed to a variable and moved under the ftp and smtp
keywords of config firewall profile.
FortiOS v2.80 MR6 Removed diskfilesizelimit keyword.
FortiOS v2.80 MR7 Added uncompsizelimit keyword.
Related Commands
• config antivirus filepattern
• config antivirus heuristic
• config antivirus quarantine
• config antivirus quarfilepattern
• config antivirus service http
• config antivirus service pop3
• config antivirus service imap
• config antivirus service smtp
service pop3
Use this command to configure how the FortiGate unit handles antivirus scanning of large files in
POP3 traffic and what ports the FortiGate unit scans for POP3.
Example
This example shows how to set the maximum file size that can be buffered to memory for scanning at
20 MB, the maximum uncompressed file size that can be buffered to memory for scanning at 60 MB,
and how to enable antivirus scanning on ports 110, 111, and 992 for POP3 traffic.
config antivirus service pop3
set memfilesizelimit 20
set uncompsizelimit 60
set port 110
set port 111
set port 992
end
This example shows how to display the antivirus POP3 traffic settings.
get antivirus service pop3
This example shows how to display the configuration for antivirus POP3 traffic.
show antivirus service pop3
Command History
FortiOS v2.80 Substantially revised.
FortiOS v2.80 MR6 Removed diskfilesizelimit keyword.
FortiOS v2.80 MR7 Added uncompsizelimit keyword.
Related Commands
• config antivirus filepattern
• config antivirus heuristic
• config antivirus quarantine
• config antivirus quarfilepattern
• config antivirus service http
• config antivirus service ftp
• config antivirus service imap
• config antivirus service smtp
service imap
Use this command to configure how the FortiGate unit handles antivirus scanning of large files in IMAP
traffic and what ports the FortiGate unit scans for IMAP.
Example
This example shows how to set the maximum file size that can be buffered to memory for scanning at
25 MB, the maximum uncompressed file size that can be buffered to memory for scanning at 50 MB,
and how to enable antivirus scanning on ports 143 and 993 for IMAP traffic.
config antivirus service http
set memfilesizelimit 25
set uncompsizelimit 50
set port 143
set port 993
end
This example shows how to display the antivirus IMAP traffic settings.
get antivirus service imap
This example shows how to display the configuration for antivirus IMAP traffic.
show antivirus service imap
Command History
FortiOS v2.80 Substantially revised.
FortiOS v2.80 MR6 Removed diskfilesizelimit keyword.
FortiOS v2.80 MR7 Added uncompsizelimit keyword.
Related Commands
• config antivirus filepattern
• config antivirus heuristic
• config antivirus quarantine
• config antivirus quarfilepattern
• config antivirus service http
• config antivirus service ftp
• config antivirus service pop3
• config antivirus service smtp
service smtp
Use this command to configure how the FortiGate unit handles antivirus scanning of large files in
SMTP traffic, what ports the FortiGate unit scans for SMTP, and how the FortiGate unit handles
interaction with an SMTP server for delivery of email with infected email file attachments.
Example
This example shows how to set the maximum file size that can be buffered to memory for scanning at
100 MB, the maximum uncompressed file size that can be buffered to memory for scanning at 1 GB
(1000 MB), and how to enable antivirus scanning on ports 25, and 465 for SMTP traffic.
config antivirus service smtp
set memfilesizelimit 100
set uncompsizelimit 1000
set port 25
set port 465
end
This example shows how to display the antivirus SMTP traffic settings.
get antivirus service smtp
This example shows how to display the configuration for antivirus SMTP traffic.
show antivirus service smtp
Command History
FortiOS v2.80 Substantially revised.
FortiOS v2.80 MR3 The splice keyword was changed to a variable and moved under the ftp and smtp
keywords of config firewall profile.
FortiOS v2.80 MR6 Removed diskfilesizelimit keyword.
FortiOS v2.80 MR7 Added uncompsizelimit keyword.
Related Commands
• config antivirus filepattern
• config antivirus heuristic
• config antivirus quarantine
• config antivirus quarfilepattern
• config antivirus service http
• config antivirus service ftp
• config antivirus service pop3
• config antivirus service imap
config firewall
address
addrgrp
dnstranslation
ipmacbinding setting
ipmacbinding table
ippool
multicast-policy
policy
profile
schedule onetime
schedule recurring
service custom
service group
vip
address
Use this command to add and edit addresses used in firewall policies. A firewall address can be
configured with a name, an IP address, and a netmask, or a name and IP address range.
The FortiGate unit comes configured with the default address All, which represents any IP address.
Addresses, address groups, and virtual IPs must all have unique names to avoid confusion in firewall
policies. If an address is included in a policy, it canno t be deleted unless it is first removed from the
policy.
Note: IP address: 0.0.0.0 and Netmask: 255.255.255.255 is not a valid firewall address. IP address: 0.0.0.0 and
Netmask: 0.0.0.0 means all possible addresses.
Example
This example shows how to add an address called User_Network, with an IP address and mask, and
add an address called User_Range, with an IP address range.
config firewall address
edit User_Network
set type ipmask
set subnet 192.168.1.0 255.255.255.0
next
edit User_Range
set type iprange
set start_ip 13.1.1.10
set end_ip 13.1.1.30
end
This example shows how to display the firewall address list.
get firewall address
This example shows how to display the settings for the address User_Range.
get firewall address User_Range
This example shows how to display the configuration for the entire address list.
show firewall address
This example shows how to display the configuration for the address User_Network.
show firewall address User_Network
Command History
FortiOS v2.80 Substantially revised. IP address range option added. Requiring that an
address be added to an interface removed.
Related Commands
• config firewall addrgrp
• config firewall policy
addrgrp
Add, edit or delete address groups used in firewall policies.
You can organize related addresses into address groups to make it easier to configure policies. For
example, if you add three addresses and then configure them in an address group, you can configure
a single policy using all three addresses.
Addresses, address groups, and virtual IPs must all have unique names to avoid confusion in firewall
policies. If an address group is included in a policy, it cannot be deleted unless it is first removed from
the policy.
Example
This example shows how to add an address group named Group1, and add the addresses
User_Network and User_Range to the group.
config firewall addrgrp
edit Group1
set User_Network User_Range
end
This example shows how to display the settings for the firewall address groups.
get firewall addrgrp
This example shows how to display the settings for the Group1 address group.
get firewall addrgrp Group1
This example shows how to display the configuration for address groups.
show firewall addrgrp
This example shows how to display the configuration for the Group1 address group.
show firewall addrgrp Group1
Command History
FortiOS v2.80 Revised.
Related Commands
• address
• policy
dnstranslation
Use this command to add, edit or delete a DNS translation entry.
DNS translation translates IP addresses in packets sent by a DNS server from the internal network to
the external network. Use DNS translation if you have a DNS server on your internal network that can
be accessed by users on the external network to find the IP addresses of servers on your internal
network.
If users on the external network can access a server on your internal network using virtual IP mapping,
you may allow them to find the IP address of the server using a DNS query. If they query a DNS server
that is also on your internal network, the DNS server would return the internal IP address of the server.
The external users would not be able to use this IP address to access the internal server.
Using DNS translation, you can map the internal IP address of the server to an address that external
users can use to access this server. So, when the firewall receives DNS packets from the internal
network that match a DNS translation source address, DNS translation changes the IP address in the
DNS packet to the DNS translation destination IP address and forwards the packet through the firewall
to the external user.
Note: The source and destination addresses must both be single IP addresses or must both be subnet addresses.
The netmask applies to both the source and destination addresses.
Example
This example shows how to add DNS translation for the source and destination addresses listed.
config firewall dnstranslation
edit 1
set dst 220.210.200.190
set netmask 255.255.255.0
set src 192.168.100.12
end
This example shows how to display the configured DNS translation settings.
get firewall dnstranslation
This example shows how to display the settings for the id 1 DNS translation entry.
get firewall dnstranslation 1
This example shows how to display the configuration for DNS translation.
show firewall dnstranslation
This example shows how to display the configuration for the id 1 DNS translation entry.
show firewall dnstranslation 1
Command History
FortiOS v2.80 Revised.
Related Commands
• vip
ipmacbinding setting
Use this command to configure IP/MAC binding settings. You can enable or disable IP/MAC binding
for traffic going to or through the FortiGate unit. You can allow or block traffic not defined in the IP/MAC
binding table. You can enable or disable IP/MAC binding for each individual FortiGate interface using
the ipmac keyword with the interface command described on page 262.
IP/MAC binding protects the FortiGate unit and your network from IP spoofing attacks. IP spoofing
attacks try to use the IP address of a trusted computer to connect to, or through, the FortiGate unit
from a different computer. The IP address of a computer is easy to change to a trusted address, but
MAC addresses are added to ethernet cards at the factory and are not easy to change.
Note: If you enable IP/MAC binding and change the IP address of a computer with an IP or MAC address in the
IP/MAC list, you must also change the entry in the IP/MAC list or the computer does not have access to or through
the FortiGate unit. You must also add the IP/MAC address pair of any new computer that you add to your network
or the new computer does not have access to or through the FortiGate unit.
Example
This example shows how to enable IP/MAC binding going to and going through the firewall, and allow
undefined hosts (IP/MAC address pairs).
config firewall ipmacbinding setting
set bindthroughfw enable
set bindtofw enable
set undefinedhost allow
end
This example shows how to display the IP/MAC binding settings.
get firewall ipmacbinding setting
This example shows how to display the configuration for IP/MAC binding.
show firewall ipmacbinding setting
Command History
FortiOS v2.80 Revised.
Related Commands
• ipmacbinding table
ipmacbinding table
Use this command to add IP and MAC address pairs to the IP/MAC binding table, or to edit or delete IP
and MAC address pairs added to the IP/MAC binding table.
You can enable or disable IP/MAC binding for each individual FortiGate interface using the ipmac
keyword with the interface command described on page 262.
Example
This example shows how to add and enable an IP/MAC entry to the IP/MAC binding table.
config firewall ipmacbinding table
edit 1
set ip 205.33.44.55
set mac 00:10:F3:04:7A:4C
set name RemoteAdmin
set status enable
end
This example shows how to display the settings for IP/MAC binding table.
get firewall ipmacbinding table
This example shows how to display the settings for the first entry (id 1) in the IP/MAC binding table.
get firewall ipmacbinding table 1
This example shows how to display the configuration for IP/MAC binding table.
show firewall ipmacbinding table
This example shows how to display the configuration for the first entry (id 1) in the IP/MAC binding
table.
show firewall ipmacbinding table 1
Command History
FortiOS v2.80 Revised.
Related Commands
• ipmacbinding setting
ippool
Use this command to add IP address pools to use for NAT mode policies. An IP pool (also called a
dynamic IP pool) is a range of IP addresses added to a firewall interface. Enable Dynamic IP Pool in a
firewall policy to translate the source address to an address randomly selected from the IP pool. To
use IP pools the IP pool interface must be the same as the firewall policy destination interface.
You can add an IP pool if you want to add NAT mode policies that translate source addresses to
addresses randomly selected from the IP pool rather than being limited to the IP address of the
destination interface. IP pools are only available in NAT/Route mode. You can add multiple IP pools to
any interface and configure the firewall policy to select the IP pool to use for that firewall policy.
Example
Use the following command to add an IP pool with these settings to the firewall configuration.
• ID number: 1
• interface name: internal
• start of IP address range: 192.168.1.100
• end of IP address range: 192.168.1.200
config firewall ippool
edit 1
set startip 192.168.1.100
set endip 192.168.1.200
set interface internal
end
This example shows how to display the settings for the firewall ippool command.
get firewall ippool
This example shows how to display the settings for the id 1 IP pool.
get firewall ippool 1
This example shows how to display the configuration for the firewall ippool command.
show firewall ippool
This example shows how to display the configuration for the id 1 IP pool.
show firewall ippool 1
Command History
FortiOS v2.80 Revised.
Related Commands
• policy
multicast-policy
Use this command to configure a source NAT IP, if multicast forwarding is enabled.
The matched forwarded (outgoing) IP multicast source IP address is changed to the configured IP
address.
Example
This example shows how to configure a multicast NAT policy.
config firewall multicast-policy
edit 1
set dstaddr 10.0.0.1 255.255.255.0
set dstintf dmz/ha
set nat 10.0.1.1
set srcaddr 192.168.100.12 255.255.255.0
set srcintf internal
end
This example shows how to display the settings for the firewall multicast-policy command.
get firewall multicast-policy
This example shows how to display the settings for the id 1 multicast policy.
get firewall multicast-policy 1
This example shows how to display the configuration for the firewall multicast-policy
command.
show firewall multicast-policy
This example shows how to display the configuration for the id 1 multicast policy.
show firewall multicast-policy 1
Command History
FortiOS v2.80 Revised.
Related Commands
• config system global, set multicast-forward
policy
Use this command to add, edit or delete firewall policies.
Firewall policies control all traffic passing through the FortiGate unit. Firewall policies are instructions
used by the FortiGate unit to decide what to do with a connection request. The policy directs the
firewall to allow the connection, deny the connection, require authentication before the connection is
allowed, or process the packet as an IPSec VPN packet.
Example
On a FortiGate-100, 200, or 300, use the following example to add policy number 2 that allows users
on the external network to access a web server on a DMZ network. The policy:
• Is for connections from the external interface (srcintf is external) to the DMZ interface
(dstintf is dmz)
• Is enabled
• Allows users from any IP address on the Internet to access the web server (srcaddr is all)
• Allows access to an address on the DMZ network (dstaddr is dmz_web_server)
• Sets the schedule to Always so that users can access the web server 24 hours a day, seven
days a week
• Sets the service to HTTP to limit access to the web server to HTTP connections
• Sets action to accept to allow connections
• Applies network address translation (nat is enabled)
• Applies traffic shaping to guarantee 100 KBytes/s of bandwidth is available, to limit the maximum
bandwidth to 500 KBytes/second, and to set the priority for the traffic accepted by this policy to
medium (trafficshaping enabled, gbandwidth set to 100, maxbandwidth set to 500,
priority set to medium)
Command History
FortiOS v2.80 Revised.
FortiOS v2.80 MR2 Replaced usrgrp keyword with userdomain.
Added poolname keyword.
FortiOS v2.80 MR3 Removed userdomain keyword.
Added groups keyword.
FortiOS v2.80 MR6 Removed authentication keyword. Authentication is automatically enabled for a policy
when one or more user group are set with the groups keyword.
Related Commands
• config firewall address
• config firewall profile
• config firewall schedule onetime
• config firewall schedule recurring
• config firewall service custom
• config firewall service group
profile
Use this command to add, edit or delete protection profiles. Use protection profiles to apply different
protection settings for traffic controlled by firewall policies.
Example
This example shows how to:
• create a profile called spammail
• enable filtering of email according to the email banned word list, the MIME header list, and the
return DNS check, enable spam to be logged and tagged with the tag “Spam” in the subject for
POP3 traffic
• enable filtering of email based on the DNSBL server, and log and discard messages identified as
spam for SMTP traffic
config firewall profile
edit spammail
set pop3 spamemailbwl spamhdrcheck spamraddrdns
set pop3_spamaction log tag
set pop3_spamtagmsg Spam
set pop3_spamtagtype subject
set smtp spamrbl
set smtp_spamaction log discard
end
Command History
FortiOS v2.80 Substantially revised.
FortiOS v2.80 MR2 Removed log variable from imap_spamaction, pop3_spamaction, and
smtp_spamaction keywords.
FortiOS v2.80 MR3 Added splice variable to ftp and smtp keywords. Moved from config antivirus
ftp service and config antivirus smtp service.
Added chunkedbypass variable to http keyword.
FortiOS v2.80 MR5 Added http_err_detail to cat_options keyword.
FortiOS v2.80 MR6 Removed buffer_to_disk variable from ftp, http, imap, pop3, and smtp keywords.
Added spamfeip variable to imap, pop3, and smtp keywords.
Changed content_log variable to content-archive for ftp, http, imap, pop3,
and smtp keywords.
FortiOS v2.80 MR7 Changed spamfeip variable to spamfsip for the FortiShield Anitspam Service.
Added no-content-summary variable to ftp, http, imap, pop3, and smtp keywords.
FortiOS v2.80 MR8 Added spamfsurl for the FortiShield spam filter URL blacklist to imap, pop3, and smtp
keywords. Added the rate_image_urls setting to the cat_options keyword.
Related Commands
• policy
• config alertemail
• config spamfilter
• config antivirus
• config ips
• config webfilter
schedule onetime
Use this command to add, edit, or delete one-time schedules.
Use scheduling to control when policies are active or inactive. You can use one-time schedules for
policies that are effective once for the period of time specified in the schedule.
Note: To edit a schedule, you must redefine the entire schedule, including your changes. This means entering all
of the schedule parameters, both those that are changing and those that are not.
Example
Use the following example to add a one-time schedule named Holiday that is valid from 5:00 pm on
3 September 2004 until 8:45 am on 7 September 2004.
config firewall schedule onetime
edit Holiday
set start 17:00 2004/09/03
set end 08:45 2004/09/07
end
This example shows how to display the settings for the firewall schedule onetime command.
get firewall schedule onetime
This example shows how to display the settings for the Holiday onetime schedule.
get firewall schedule onetime Holiday
This example shows how to display the configuration for the firewall schedule onetime
command.
show firewall schedule onetime
This example shows how to display the configuration for the Holiday onetime schedule.
show firewall schedule onetime Holiday
Command History
FortiOS v2.80 Revised.
Related Commands
• policy
• schedule recurring
schedule recurring
Use this command to add, edit and delete recurring schedules used in firewall policies.
Use scheduling to control when policies are active or inactive. Use recurring schedules to create
policies that repeat weekly. You can use recurring schedules to create policies that are effective only
at specified times of the day or on specified days of the week.
Note: If you create a recurring schedule with a stop time that occurs before the start time, the schedule starts at
the start time and finishes at the stop time on the next day. You can use this technique to create recurring
schedules that run from one day to the next. You can also create a recurring schedule that runs for 24 hours by
setting the start and stop times to the same time.
Example
This example shows how to add a recurring schedule named access so that it is valid Monday to
Friday from 7:45 am to 5:30 pm.
config firewall schedule recurring
edit access
set day monday tuesday wednesday thursday friday
set start 07:45
set end 17:30
end
Edit the recurring schedule named access so that it is no longer valid on Fridays.
config firewall schedule recurring
edit access
set day monday tuesday wednesday thursday
set start 07:45
set end 17:30
end
This example shows how to display the settings for the firewall schedule recurring
command.
get firewall schedule recurring
This example shows how to display the settings for the access recurring schedule.
get firewall schedule recurring access
This example shows how to display the configuration for the firewall schedule recurring
command.
show firewall schedule recurring
This example shows how to display the configuration for the access recurring schedule.
show firewall schedule recurring access
Command History
FortiOS v2.80 Revised.
Related Commands
• policy
• schedule onetime
service custom
Use this command to add, edit, or delete custom firewall services.
Add a custom service if you need to create a policy for a service that is not in the predefined service
list.
Example
This example shows how to add a custom service called Custom_1. The service can use any source
port. The service destination port range is TCP 4501 to 4503.
config firewall service custom
edit Custom_1
set protocol TCP
set srcport 1-65535
set dstport 4501-4503
end
This example shows how to display the settings for the firewall service custom command.
get firewall service custom
This example shows how to display the settings for the Custom_1 service.
get firewall service custom Custom_1
This example shows how to display the configuration for the firewall service custom
command.
show firewall service custom
This example shows how to display the configuration for the Custom_1 service.
show firewall service custom Custom_1
Command History
FortiOS v2.80 Revised.
Related Commands
• policy
service group
Use this command to add, edit, or delete firewall service groups.
To make it easier to add policies, you can create groups of services and then add one policy to provide
or block access for all the services in the group. A service group can contain predefined services and
custom services in any combination. You cannot add service groups to another service group.
Note: To edit a service group, you must enter all of the members of the service group, both those you are
changing and those that are staying the same.
Example
This example shows how to add a service group called web_Services that includes the FTP, HTTP,
HTTPS, and Real Audio services.
config firewall service group
edit web_Services
set member FTP HTTP HTTPS RAUDIO
end
This example shows how to add the TELNET service to the web_Services service group.
config firewall service group
edit web_Services
set member FTP HTTP HTTPS RAUDIO TELNET
end
This example shows how to display the settings for the firewall service group command.
get firewall service group
This example shows how to display the settings for the web_Services service group.
get firewall service group web_Services
This example shows how to display the configuration for the firewall service group command.
show firewall service group
This example shows how to display the configuration for the web_Services service group.
show firewall service custom web_Services
Command History
FortiOS v2.80 Revised.
Related Commands
• policy
vip
Use this command to add, edit, or delete virtual IPs. You can add static NAT virtual IPs or port
forwarding virtual IPs.
Addresses, address groups, and virtual IPs must all have unique names to avoid confusion in firewall
policies. If aVIP is included in a policy, it cannot be deleted unless it is first removed from the policy.
Use virtual IPs to provide access to IP addresses on a destination network that are hidden from the
source network by NAT security policies. To allow connections between these networks, you must
create a mapping between an address on the source network and the real address on the destination
network. This mapping is called a virtual IP.
You can create two types of virtual IPs:
Static NAT Used to translate an address on a source network to a hidden address on a destination
network. Static NAT translates the source address of return packets to the address on the
source network.
Port Forwarding Used to translate an address and a port number on a source network to a hidden address and,
optionally, a different port number on a destination network. Using port forwarding you can also
route packets with a specific port number and a destination address that matches the IP
address of the interface that receives the packets. This technique is called port forwarding or
port address translation (PAT). You can also use port forwarding to change the destination port
of the forwarded packets.
Example
This example shows how to add a static NAT virtual IP named web_Server that allows users on the
Internet to connect to a web server on your internal network. The internet address of the web server is
64.32.21.34 and the real IP address of the web server on the internal network is 192.168.1.44.
config firewall vip
edit web_Server
set type staticnat
set extintf external
set extip 64.32.21.34
set mappedip 192.168.1.44
end
This example shows how to edit the static NAT virtual IP named web_Server to change the real IP
address of the web server on the internal network to 192.168.110.23.
config firewall vip
edit web_Server
set mappedip 192.168.110.23
end
This example shows how to add a port forwarding virtual IP that uses port address translation to allow
external access to a web server on your internal network if you do not have a separate external IP
address for the web server. In this example, the IP address of the external interface is 192.168.100.99
and the real IP address of the web server on the internal network is 192.168.1.93.
config firewall vip
edit web_Server
set type portforward
set extintf external
set extip 192.168.100.99
set extport 80
set mappedip 192.168.1.93
set mappedport 80
end
This example shows how to display the settings for the firewall vip command.
get firewall vip
This example shows how to display the settings for the web_Server VIP.
get firewall vip web_Server
This example shows how to display the configuration for the firewall vip command.
show firewall vip
This example shows how to display the configuration for the web_Server VIP.
show firewall vip web_Server
Command History
FortiOS v2.80 Revised.
Related Commands
• policy
config ips
anomaly
custom
group
anomaly
The FortiGate IPS uses anomalies to identify network traffic that does not fit known or preset traffic
patterns. The FortiGate IPS identifies the four statistical anomaly types for the TCP, UDP, and ICMP
protocols.
Flooding If the number of sessions targeting a single destination in one second is over a threshold, the
destination is experiencing flooding.
Scan If the number of sessions from a single source in one second is over a threshold, the source is
scanning.
Source session If the number of concurrent sessions from a single source is over a threshold, the source
limit session limit is reached.
Destination If the number of concurrent sessions to a single destination is over a threshold, the destination
session limit session limit is reached.
You can enable or disable logging for each anomaly, and you can control the IPS action in response to
detecting an anomaly. In many cases you can also configure the thresholds that the anomaly uses to
detect traffic patterns that could represent an attack.
Note: It is important to estimate the normal and expected traffic on your network before changing the default
anomaly thresholds. Setting the thresholds too low could cause false positives, and setting the thresholds too high
could miss some attacks.
The list of anomalies can be updated only when the FortiGate firmware image is upgraded.
Example
This example shows how to change the tcp_land anomaly configuration.
config ips anomaly tcp_land
set action pass
set log enable
set status enable
end
This example shows how to change the icmp_flood anomaly configuration.
config ips anomaly icmp_flood
set action drop
set log enable
set status enable
set threshold 1024
end
This example shows how to display the list of anomalies.
get ips anomaly
This example shows how to display the settings for icmp_flood.
get ips anomaly icmp_flood
This example shows how to display the configuration for the ips anomaly command.
show ips anomaly
This example shows how to display the configuration for icmp_flood.
show ips anomaly icmp_flood
config limit
Access the config limit subcommand using the config ips anomaly <name_str>
command. Use this command for session control based on source and destination network address.
This command is available for tcp_src_session, tcp_dst_session, icmp_src_session,
icmp_dst_session, udp_src_session, udp_dst_session.
You cannot edit the default entry. Addresses are matched from more specific to more general. For
example, if you define thresholds for 192.168.100.0/24 and 192.168.0.0/16, the address with the 24 bit
netmask is matched before the entry with the 16 bit netmask.
Example
Use the following command to configure the limit for the tcp_src_session anomaly.
config ips anomaly tcp_src_session
config limit
edit subnet1
set ipaddress 1.1.1.0 255.255.255.0
set threshold 300
end
end
Command History
FortiOS v2.80 Substantially revised.
Related Commands
• config ips custom
• config ips group
• config system global ips-open
custom
You can create custom IPS signatures. The custom signatures you create are added to a single
Custom signature group.
Custom signatures provide the power and flexibility to customize the FortiGate IPS for diverse network
environments. The FortiGate predefined signatures cover common attacks. If you are using an
unusual or specialized application or an uncommon platform, you can add custom signatures based on
the security alerts released by the application and platform vendors.
You can also use custom signatures to block or allow specific traffic.
Once you add the custom signature, you can configure the settings for it under the signature group
named custom. For more information on configuring signature groups, see “config ips group” on
page 114.
For more information on custom signature syntax see the FortiGate IPS Custom Signatures Technical
Bulletin.
Note: Custom signatures are an advanced feature. This document assumes the user has previous experience
writing intrusion detection signatures.
Example
This example shows how to add a custom signature for ICMP packets set to type 10.
config ips custom
edit ICMP10
set signature 'F-SBID(--protocol icmp; --icmp_type 10; --revision 2; )'
end
Command History
FortiOS v2.80 Substantially revised.
Related Commands
• config ips group
• execute backup
• execute restore
• config system global ips-open
group
The FortiGate IPS matches network traffic against patterns contained in attack signatures. Attack
signatures reliably protect your network from known attacks. Fortinet’s FortiProtect infrastructure
ensures the rapid identification of new threats and the development of new attack signatures.
You can configure the FortiGate unit to automatically check for and download an updated attack
definition file containing the latest signatures, or you can manually download the updated attack
definition file. You can also configure the FortiGate unit to allow push updates of updated attack
definition files as soon as they are available from the FortiProtect Distribution Network. For details, see
“config system autoupdate schedule” on page 226 and “execute update_now” on page 376.
When the FortiGate unit installs an updated attack definition file, it checks to see if the default
configuration for any existing signatures has changed. If the default configuration has changed, the
changes are preserved.
Signatures are arranged into groups based on the type of attack. By default, all signature groups are
enabled.
You can enable or disable signature groups or individual signatures. Disabling unneeded signatures
can improve system performance and reduce the number of log messages and alert emails that the
IPS generates. For example, the IPS detects a large number of web server attacks. If you do not
provide access to a web server behind your FortiGate unit, you might want to disable all web server
attack signatures.
Some signature groups include configurable parameters. The parameters that are available depend on
the type of signatures in the signature group. When you configure these parameters for a signature
group, the parameters apply to all of the signatures in the group.
For each signature, you can configure the action the FortiGate IPS takes when it detects an attack.
The FortiGate IPS can pass, drop, reset or clear packets or sessions. You can also enable or disable
logging of the attack.
Example
This example shows how to disable the dos signature group.
config ips group dos
set status disable
end
This example shows how to display the list of signature groups.
get ips group
This example shows how to display the settings for the dos signature group.
get ips group dos
This example shows how to display the configuration for the ips group command.
show ips group
This example shows how to display the configuration for the dos signature group.
show ips group dos
Example
This example shows how to change the action for the NAPTHA signature in the dos signature group to
drop.
config ips group dos
config rule NAPTHA
set action drop
end
end
This example shows how to display the list of signature groups.
get ips group
This example shows how to display the settings for the dos signature group.
get ips group dos
This example shows how to display the configuration for the ips group command.
show ips group
This example shows how to display the configuration for the dos signature group.
show ips group dos
Command History
FortiOS v2.80 Substantially revised.
Related Commands
• config ips anomaly
• config system autoupdate schedule
• execute update_now
• config system global ips-open
config log
Use the config log commands to set the logging type, the logging severity level, and the logging
location for the FortiGate unit.
For descriptions of log formats and specific log messages see the FortiGate Log Message Reference
Guide.
Note: Logging to disk is only available on FortiGate units with a local disk.
Example
This example shows how to set the logging severity level to warning, enable virus logging for infected
files, and enable event logging for admin and IPSec events.
config log disk filter
set severity warning
set virus enable
set infected enable
set event enable
set admin enable
set ipsec enable
end
This example shows how to display the filter settings for logging to a FortiLog unit.
get log disk filter
This example shows how to display the configuration for logging to a syslog server.
show log syslogd filter
If the show command returns you to the prompt, the settings are at default.
Command History
FortiOS v2.80 Substantially revised.
FortiOS v2.8 MR2 Removed email_content keyword.
Added email_log_imap, email_log_pop3, and email_log_smtp
keywords.
Related Commands
• disk setting
• fortilog setting
• memory setting
• syslogd setting
• trafficfilter
• webtrends setting
disk setting
Use this command to configure log settings for logging to the local disk. Disk logging is only available
for FortiGate models with a local disk. You can also use this command to configure the FortiGate unit
to upload current log files to an FTP server every time the log files are rolled.
Example
This example shows how to enable logging to the local disk, set the action to stop logging when the
disk is full, and save the old log and start a new one at 6pm on Fridays.
config log disk setting
set status enable
set diskfull nolog
set rollday friday
set rolltime 18:00:00
end
This example shows how to enable uploading the traffic log and content archive files to an FTP server.
The FTP server has the IP address 172.30.120.24, the user name is ftpuser, the password is
ftppass, and the directory on the FTP server is fortigate\logs.
Command History
FortiOS v2.80 Substantially revised.
FortiOS v2.80 MR2 Removed ftppasswd, ftpserver, and ftpuser keywords.
Added upload keyword.
Added upload, uploaddir, uploadip, uploadpass, uploadport, uploadtype,
and uploaduser keywords.
Related Commands
• {disk | fortilog | memory | syslogd | webtrends} filter
• fortilog setting
• memory setting
• syslogd setting
• trafficfilter
• webtrends setting
fortilog setting
Use this command to configure log settings for logging to a FortiLog unit.
The FortiLog unit is a log analyzer and manager that can combine the log information from various
FortiGate units.
Example
This example shows how to enable logging to a FortiLog unit and set the FortiLog IP address.
config log fortilog setting
set status enable
set server 192.168.100.1
end
This example shows how to display the log setting for logging to a FortiLog unit.
get log fortilog setting
This example shows how to display the configuration for logging to a FortiLog unit.
show log fortilog setting
If the show command returns you to the prompt, the settings are at default.
Command History
FortiOS v2.80 New.
FortiOS v2.80 MR2 Added localid and psksecret keywords.
Related Commands
• {disk | fortilog | memory | syslogd | webtrends} filter
• disk setting
• memory setting
• syslogd setting
• trafficfilter
• webtrends setting
memory setting
Use this command to configure log settings for logging to the FortiGate system memory.
The FortiGate system memory has a limited capacity and only displays the most recent log entries.
Traffic logs cannot be stored in the memory buffer. After all available memory is used, by default the
FortiGate unit begins to overwrite the oldest messages. All log entries are deleted when the FortiGate
unit restarts.
Example
This example shows how to enable logging to the FortiGate system memory.
config log memory setting
set status enable
end
This example shows how to display the log setting for logging to the FortiGate system memory.
get log memory setting
This example shows how to display the configuration for logging to the FortiGate system memory.
show log memory setting
If the show command returns you to the prompt, the settings are at default.
Command History
FortiOS v2.80 Substantially revised.
Related Commands
• {disk | fortilog | memory | syslogd | webtrends} filter
• disk setting
• fortilog setting
• syslogd setting
• trafficfilter
• webtrends setting
syslogd setting
Use this command to configure log settings for logging to a remote syslog server.
You can configure the FortiGate unit to send logs to a remote computer running a syslog server.
Example
This example shows how to enable logging to a remote syslog server, configure an IP address and
port for the server, and enable logging in CSV format.
config log syslogd setting
set status enable
set server 220.210.200.190
set port 601
set csv enable
end
This example shows how to display the log setting for logging to a remote syslog server.
get log syslogd setting
This example shows how to display the configuration for logging to a remote syslog server.
show log syslogd setting
If the show command returns you to the prompt, the settings are at default.
Command History
FortiOS v2.80 Substantially revised.
FortiOS v2.80 MR3 Added alert and audit keywords for use with facility keyword.
Related Commands
• {disk | fortilog | memory | syslogd | webtrends} filter
• disk setting
• fortilog setting
• memory setting
• trafficfilter
• webtrends setting
trafficfilter
Use this command to configure the following global settings for traffic logging:
• resolve IP addresses to host names
• display the port number or service (protocol) in the log message
Example
This example shows how to display the service name and enable resolving IP addresses to host
names in log messages.
config log trafficfilter
set display name
set resolve enable
end
This example shows how to display the settings for the log trafficfilter command.
get log trafficfilter setting
This example shows how to display the configuration for the log trafficfilter command.
show log trafficfilter setting
If the show command returns you to the prompt, the settings are at default.
config rule
Access the rule subcommand using the log trafficfilter command.
Use the following command to configure traffic filter rules based on source IP address, destination IP
address, and service (protocol).
Example
This example shows how to configure a traffic filter called TF_1, to configure the source and
destination IP and netmask, and to set the service to HTTP.
config log trafficfilter
config rule
edit TF_1
set dst 220.210.200.190 255.255.255.0
set src 192.168.100.1 255.255.255.0
set service HTTP
end
end
This example shows how to display the settings for the log trafficfilter command.
get log trafficfilter setting
This example shows how to display the configuration for the log trafficfilter command.
show log trafficfilter setting
If the show command returns you to the prompt, the settings are at default.
Command History
FortiOS v2.80 Revised.
Related Commands
• {disk | fortilog | memory | syslogd | webtrends} filter
• disk setting
• fortilog setting
• memory setting
• syslogd setting
• webtrends setting
webtrends setting
Use this command to configure log settings for logging to a remote computer running a NetIQ
WebTrends firewall reporting server.
FortiGate log formats comply with WebTrends Enhanced Log Format (WELF) and are compatible with
NetIQ WebTrends Security Reporting Center 2.0 and Firewall Suite 4.1.
Example
This example shows how to enable logging to and set an IP address for a remote WebTrends server.
config log webtrends setting
set status enable
set server 220.210.200.190
end
This example shows how to display the settings for logging to a remote WebTrends server.
get log webtrends setting
This example shows how to display the configuration for logging to a remote WebTrends server.
show log webtrends setting
If the show command returns you to the prompt, the settings are at default.
Command History
FortiOS v2.80 Substantially revised.
Related Commands
• {disk | fortilog | memory | syslogd | webtrends} filter
• disk setting
• fortilog setting
• memory setting
• syslogd setting
• trafficfilter
config router
access-list
get router info ospf
get router info protocols
get router info rip
get router info routing_table
key-chain
ospf
policy
prefix-list
rip
route-map
static
static6
access-list
Use this command to add, edit, or delete access lists.
Access lists are filters used by FortiGate routing features.
Each rule in an access list consists of a prefix (IP address and netmask), the action to take for this
prefix (permit or deny), and whether to match the prefix exactly or to match the prefix and any more
specific prefix.
The FortiGate unit attempts to match a packet against the rules in an access list starting at the top of
the list. If it finds a match for the prefix it takes the action specified for that prefix. If no match is found
the default action is deny.
For an access list to take effect it must be called by another FortiGate routing feature such as RIP or
OSPF.
config rule
Access the config rule subcommand using the config router access-list command. Use
the config rule command to add, edit, or delete access list rules with the specified number.
Example
This example shows how to add an access list named acc_list1 with two rules. The first rule denies
the subnet that exactly matches the prefix 192.168.50.0 255.255.255.0 and permits all other
subnets that match the prefix 192.168.0.0 255.255.0.0.
config router access-list
edit acc_list1
config rule
edit 1
set prefix 192.168.50.0 255.255.255.0
set action deny
set exact_match enable
next
edit 2
set prefix 192.168.0.0 255.255.0.0
set action permit
set exact_match disable
end
end
This example shows how to display the list of access lists.
get router access-list
This example shows how to display the settings for acc_list1.
get router access-list acc_list1
This example shows how to display the configuration for the router access-list command.
show router access-list
This example shows how to display the configuration for acc_list1.
show router access-list acc_list1
Command History
FortiOS v2.80 New.
Related Commands
• config router ospf
• config router prefix-list
• config router rip
Command syntax
get router info ospf <keyword>
Examples
get router info ospf database
get router info ospf interface
Command History
FortiOS v2.80 MR1 New.
FortiOS v2.80 MR2 Renamed from execute router show ospf.
FortiOS v2.80 MR7 Added status keyword.
Related Commands
• execute router restart
• get router info protocols
• get router info routing_table
• config system interface
• config router ospf
Command syntax
get router info protocols
Command History
FortiOS v2.80 New.
FortiOS v2.80 MR2 Renamed from execute router show protocols.
Related Commands
• execute router restart
• get router info rip
• get router info routing_table
• config router rip
• config router ospf
Command syntax
get router info rip <keyword>
Examples
get router info rip database
get router info rip interface
Command History
FortiOS v2.80 New.
FortiOS v2.80 MR2 Renamed from execute router show rip.
Related Commands
• execute router restart-graceful
• get router info protocols
• get router info routing_table
• config router rip
• config system interface
Command syntax
get router info routing_table
Command History
FortiOS v2.80 New.
FortiOS v2.80 MR2 Renamed from execute router show routing_table.
Related Commands
• execute router restart
• execute router restart-graceful
• get router info ospf
• get router info protocols
• get router info rip
• config router policy
• config router rip
• config router static
• config router static6
• config system interface
key-chain
Use this command to manage RIP version 2 authentication keys.
RIP version 2 uses authentication keys to ensure that the routing information exchanged between
routers is reliable. For authentication to work both the sending and receiving routers must be set to use
authentication, and must be configured with the same keys.
A key chain is a list of one or more keys and the send and receive lifetimes for each key. Keys are
used for authenticating routing packets only during the specified lifetimes. The FortiGate unit migrates
from one key to the next according to the scheduled send and receive lifetimes. The sending and
receiving routers should have their system dates and times synchronized, but overlapping the key
lifetimes ensures that a key is always available even if there is some difference in the system times.
See “config system global” on page 244 to ensure that the FortiGate system date and time are correct.
config key
Access the config key subcommand using the config router key-chain command. Use the
config key command to add, edit, or delete keys identified by the specified number.
Example
This example shows how to add a key chain named test1 with three keys. The first two keys each
have send and receive lifetimes of 13 hours, and the 3rd key has send and receive lifetimes that never
expire.
config router key-chain
edit test1
config key
edit 1
set accept-lifetime 10:00:00 1 6 2004 46800
set send-lifetime 10:00:00 1 6 2004 46800
set key-string 1a2b2c4d5e6f7g8h
next
edit 2
set accept-lifetime 22:00:00 1 6 2004 46800
set send-lifetime 22:00:00 1 6 2004 46800
set key-string 9i1j2k3l4m5n6o7p
next
edit 3
set accept-lifetime 10:00:00 2 6 2004 infinite
set send-lifetime 10:00:00 2 6 2004 infinite
set key-string 123abc456def789g
end
end
This example shows how to display the list of key-chains.
get router key-chain
This example shows how to display the settings for the key chain test1.
get router key-chain test1
This example shows how to display the configuration for the router key-chain command.
show router key-chain
This example shows how to display the configuration for the key chain test1.
show router key-chain test1
Command History
FortiOS v2.80 New.
Related Commands
• config router rip
• config system global
ospf
Use this command to configure open shortest path first (OSPF) on the FortiGate unit.
OSPF is an open protocol based on the shortest path first algorithm. OSPF is a link state protocol
capable of routing larger networks than the simpler distance vector RIP protocol. An OSPF
autonomous system (AS) or routing domain is a group of areas connected to a backbone area. A
router connected to more than one area is an area border router (ABR). Routing information is
contained in a link state database. Routing information is communicated between routers using link
state advertisements (LSAs). More information on OSPF can be found in RFC 2328.
Note: In the following table, only the router-id keyword is required. All other keywords are optional.
Example
This example shows how to set the OSPF router ID to 1.1.1.1:
config router ospf
set router-id 1.1.1.1
end
This example shows how to display the OSPF settings.
get router ospf
This example shows how to display the OSPF configuration.
show router ospf
config area
Access the config area subcommand using the config router ospf command. Use the
config area command to set OSPF area related parameters.
Routers in an OSPF autonomous system (AS) or routing domain are organized into logical groupings
called areas. Areas are linked together by area border routers (ABRs). There must be a backbone
area that all areas can connect to. You can use a virtual link to connect areas that do not have a
physical connection to the backbone. Routers within an OSPF area maintain link state databases for
their own areas.
Note: Any IP address is a valid area ID. An area ID of 0.0.0.0 indicates the backbone area.
config area
edit <id_ipv4>
set <keyword> <variable>
end
config area
edit <id_ipv4>
unset <keyword> <variable>
end
config area
delete <id_ipv4>
end
config area
edit <id_ipv4>
get
end
config area
edit <id_ipv4>
show
end
The config area command has 3 subcommands.
config filter-list
config range
config virtual-link
Example
This example shows how to configure a stub area with the id 15.1.1.1, a stub type of summary, a
default cost of 20, and MD5 authentication.
config router ospf
config area
edit 15.1.1.1
set type stub
set stub-type summary
set default-cost 20
set authentication md5
end
end
This example shows how to display the settings for area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
get
end
This example shows how to display the configuration for area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
show
end
config filter-list
Access the config filter-list subcommand using the config area subcommand.
Use filter lists to control the import and export of LSAs into and out of an area. You can use access or
prefix lists for OSPF area filter lists. For more information, see “access-list” on page 140 and “prefix-
list” on page 175.
Example
This example shows how to use an access list named acc_list1 to filter packets entering area
15.1.1.1.
config router ospf
config area
edit 15.1.1.1
config filter-list
edit 1
set direction in
set list acc_list1
end
end
This example shows how to display the settings for area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
get
end
This example shows how to display the configuration for area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
show
end
config range
Access the config range subcommand using the config area command.
Use the area range command to summarize routes at an area boundary. If the network numbers in an
area are contiguous, the ABR advertises a summary route that includes all the networks within the
area that are within the specified range.
Note: Only the prefix keyword is required. All other keywords are optional.
Example
This example shows how to set the prefix for range 1 of area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
config range
edit 1
set prefix 1.1.0.0 255.255.0.0
end
end
This example shows how to display the settings for area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
get
end
This example shows how to display the configuration for area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
show
end
config virtual-link
Access the config virtual-link subcommand using the config area command.
Use virtual links to connect an area to the backbone when the area has no direct connection to the
backbone. A virtual link allows traffic from the area to transit a directly connected area to reach the
backbone. The transit area cannot be a stub area. Virtual links can only be set up between two area
border routers (ABRs).
Note: Only the peer keyword is required. All other keywords are optional.
Example
This example shows how to configure a virtual link.
config router ospf
config area
edit 15.1.1.1
config virtual-link
edit vlnk1
set peer 1.1.1.1
end
end
This example shows how to display the settings for area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
get
end
This example shows how to display the configuration for area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
show
end
config distribute-list
Access the config distribute-list subcommand using the config router ospf command.
Use this command to use an access list to filter the networks in routing updates. Routes not matched
by any of the distribute lists will not be advertised.
You must configure the access list that you want the distribute list to use before you configure the
distribute list. For more information on configuring access lists, see “config router access-list” on
page 140.
Example
This example shows how to configure a distribute list numbered 2 to use an access list named
acc_list1 for all static routes.
config router ospf
config distribute-list
edit 2
set access-list acc_list1
set protocol static
end
end
This example shows how to display the settings for distribute list 2.
config router ospf
config distribute-list
edit 2
get
end
This example shows how to display the configuration for distribute list 2.
config router ospf
config distribute-list
edit 2
show
end
config neighbor
Access the config neighbor subcommand using the config router ospf command.
Use this command to manually configure an OSPF neighbor on nonbroadcast networks. OSPF
packets are unicast to the specified neighbor address. You can configure multiple neighbors.
config neighbor
delete <id_integer>
end
config neighbor
edit <id_integer>
get
end
config neighbor
edit <id_integer>
show
end
Note: Only the ip keyword is required. All other keywords are optional.
Example
This example shows how to manually add a neighbor.
config router ospf
config neighbor
edit 1
set ip 192.168.21.63
end
end
This example shows how to display the settings for neighbor 1.
config router ospf
config neighbor
edit 1
get
end
config network
Access the config network subcommand using the config router ospf command.
Use this command to identify the interfaces to include in the specified OSPF area. The prefix
keyword can define one or multiple interfaces.
Example
Use the following command to enable OSPF for the interfaces attached to networks specified by the IP
address 10.0.0.0 and the netmask 255.255.255.0 and to add these interfaces to area 10.1.1.1.
config router ospf
config network
edit 2
set area 10.1.1.1
set prefix 10.0.0.0 255.255.255.0
end
end
This example shows how to display the settings for network 2.
config router ospf
config network
edit 2
get
end
This example shows how to display the configuration for network 2.
config router ospf
config network
edit 2
show
end
config ospf-interface
Access the config ospf-interface subcommand using the config router ospf command.
Use this command to change interface related OSPF settings.
config ospf-interface
edit <interface-name_str>
set <keyword> <variable>
end
config ospf-interface
edit <interface-name_str>
unset <keyword>
end
config ospf-interface
delete <interface-name_str>
end
config ospf-interface
edit <interface-name_str>
get
end
config ospf-interface
edit <interface-name_str>
show
end
Note: The interface and ip keywords are required. All other keywords are optional.
Example
This example shows how to assign an OSPF interface configuration named test to the interface
named internal and how to configure text authentication for this interface.
config router ospf
config ospf-interface
edit test
set interface internal
set ip 192.168.20.3
set authentication text
set authentication-key a2b3c4d5e
end
end
This example shows how to display the settings for the OSPF interface configuration named test.
config router ospf
config ospf-interface
edit test
get
end
This example shows how to display the configuration for the OSPF interface configuration named test.
config router ospf
config ospf-interface
edit test
show
end
config redistribute
Access the config redistribute subcommand using the config router ospf command.
Use the redistribute command to advertise routes learned from RIP, static routes, or a direct
connection to the destination network.
Example
This example shows how to enable route redistribution from RIP, using a metric of 3 and a route map
named rtmp2.
config router ospf
config redistribute rip
set metric 3
set routemap rtmp2
set status enable
end
end
This example shows how to display the OSPF settings.
get router ospf
This example shows how to display the OSPF configuration.
show router ospf
config summary-address
Access the config summary-address subcommand using the config router ospf command.
Use this command to summarize external routes for redistribution into OSPF. This command works
only for summarizing external routes on an Autonomous System Boundary Router (ASBR). For
information on summarization between areas, see “config range” on page 157. By replacing the LSAs
for each route with one aggregate route, you reduce the size of the OSPF link-state database.
Note: Only the prefix keyword is required. All other keywords are optional.
Example
This example shows how to summarize routes using the prefix 10.0.0.0 255.0.0.0.
config router ospf
config summary-address
edit 5
set prefix 10.0.0.0 255.0.0.0
end
end
This example shows how to display the OSPF settings.
get router ospf
This example shows how to display the OSPF configuration.
show router ospf
Command History
FortiOS v2.80 New.
Related Commands
• config router access-list
• config router prefix-list
• config router route-map
• get router info ospf
• get router info protocols
• get router info routing_table
policy
When you create a policy route, any packets that match the policy are forwarded to the IP address of
the next hop gateway through the specified outbound interface.
You can configure the FortiGate unit to route packets based on:
• a source address
• a protocol, service type, or port range
• the inbound interface
When the FortiGate unit receives a packet, it starts at the top of the policy routing list and attempts to
match the packet with a policy in ascending order. If no packets match the policy route, the FortiGate
unit routes the packet using the regular routing table (policy routing is processed before static routing).
Note: For static routing, any number of static routes can be defined for the same destination IP/mask. When
multiple routes for the same destination IP/mask exist, the FortiGate unit chooses the route with the lowest
number in the Distance field. Route redundancy is not available for policy routing: any packets that match a policy
route are forwarded according to the route specified in the policy.
Example
If a FortiGate unit provides Internet access for multiple internal subnets, you can use policy routing to
control the route that traffic from each network takes to the Internet. For example, if the internal
network includes the subnets 192.168.10.0 and 192.168.20.0 you can enter the following policy
routes:
• Enter the following command to route traffic from the 192.168.10.0 subnet to the
100.100.100.0 subnet. Force the packets to the next hop gateway at IP address 1.1.1.1
through the interface named external.
config router policy
edit 1
set input_device internal
set src 192.168.10.0 255.255.255.0
set dst 100.100.100.0 255.255.255.0
set output_device external
set gateway 1.1.1.1
end
• Enter the following command to route traffic from the 192.168.20.0 subnet to the 200.200.200.0
subnet. Force the packets to the next hop gateway at IP address 2.2.2.1 through the interface
named external.
config router policy
edit 2
set input_device internal
set src 192.168.20.0 255.255.255.0
set dst 200.200.200.0 255.255.255.0
set output_device external
set gateway 2.2.2.1
end
• Enter the following command to direct all HTTP traffic using port 80 to the next hop gateway at IP
address 1.1.1.1.
config router policy
edit 1
set input_device internal
set src 0.0.0.0 0.0.0.0
set dst 0.0.0.0 0.0.0.0
set output_device external
set gateway 1.1.1.1
set protocol 6
set start_port 80
set end_port 80
end
• Enter the following command to direct all other traffic to the next hop gateway at IP address
2.2.2.1.
config router policy
edit 2
set input_device internal
set src 0.0.0.0 0.0.0.0
set dst 0.0.0.0 0.0.0.0
set output_device external
set gateway 2.2.2.1
end
This example shows how to display the list of policy based routes.
get router policy
This example shows how to display the settings for routing policy 1.
get router policy 1
This example shows how to display the configuration for the router policy command.
show router policy
This example shows how to display the configuration for routing policy 1.
show router policy 1
Command History
FortiOS v2.80 Revised.
Related Commands
• config router static
prefix-list
Use this command to add, edit, or delete prefix lists.
A prefix list is an enhanced version of an access list that allows you to control the length of the prefix
netmask.
Each rule in a prefix list consists of a prefix (IP address and netmask), the action to take for this prefix
(permit or deny), and maximum and minimum prefix length settings.
The FortiGate unit attempts to match a packet against the rules in a prefix list starting at the top of the
list. If it finds a match for the prefix it takes the action specified for that prefix. If no match is found the
default action is deny.
For a prefix list to take effect it must be called by another FortiGate routing feature such as RIP or
OSPF.
config rule
Access the config rule subcommand using the router prefix-list command. Use the
config rule command to add, edit, or delete prefix list rules with the specified number.
Example
This example shows how to add a prefix list named prf_list1 with three rules. The first rule permits
subnets that match prefix lengths between 26 and 30 for the prefix 192.168.100.0
255.255.255.0. The second rule denies subnets that match the prefix lengths between 20 and 25
for the prefix 10.1.0.0 255.255.0.0. The third rule denies all other traffic.
config router prefix-list
edit prf_list1
config rule
edit 1
set prefix 192.168.100.0 255.255.255.0
set action permit
set ge 26
set le 30
next
edit 2
set prefix 10.1.0.0 255.255.0.0
set action deny
set ge 20
set le 25
next
edit 3
set prefix any
set action deny
end
end
This example shows how to display the list of prefix lists.
get router prefix-list
Command History
FortiOS v2.80 New.
FortiOS v2.80 MR2 Changed default for le from 0 to 32.
Related Commands
• config router access-list
• config router rip
rip
Use this command to configure routing information protocol (RIP) on the FortiGate unit.
The FortiGate implementation of RIP supports both RIP version 1 as defined by RFC 1058, and RIP
version 2 as defined by RFC 2453. RIP version 2 enables RIP messages to carry more information,
and to support simple authentication and subnet masks.
RIP is a distance-vector routing protocol intended for small, relatively homogeneous, networks. RIP
uses hop count as its routing metric. Each network is usually counted as one hop. The network
diameter is limited to 15 hops.
Example
This example shows how to:
• enable advertising a default static route into RIP,
• enable sending and receiving RIP version 1 packets,
• set the default metric to 5.
config distance
Access the config distance subcommand using the config router rip command.
Configure administrative distance to set the priority of routes advertised by different routing protocols
to the same destination. The lowest administrative distance number indicates the preferred route. If
you specify a prefix, RIP uses the specified distance when the source IP address of a packet matches
the prefix.
Example
This example shows how to change the administrative distance to 10.
config router rip
config distance
edit 1
set distance 10
end
end
This example shows how to display the RIP settings.
get router rip
This example shows how to display the RIP configuration.
show router rip
config distribute-list
Access the config distribute-list subcommand using the config router rip command.
Use this command to filter incoming or outgoing updates using an access list or a prefix list. If you do
not specify an interface the filter will be applied to all interfaces. You must configure the access list or
prefix list that you want the distribute list to use before you configure the distribute list. For more
information on configuring access lists and prefix lists, see “config router access-list” on page 140 and
“config router prefix-list” on page 175.
Example
This example shows how to configure and enable a distribute list numbered 2 to use an access list
named acc_list1 on incoming updates on the external interface.
config router rip
config distribute-list
edit 2
set direction in
set interface external
set listname acc_list1
set status enable
end
end
This example shows how to display the RIP settings.
get router rip
This example shows how to display the RIP configuration.
show router rip
config interface
Access the config interface subcommand using the config router rip command.
Use the config interface subcommand to configure RIP version 2 authentication, RIP version
send and receive for the specified interface, and to configure and enable split horizon.
Authentication is only available for RIP version 2 packets sent and received by an interface. Set
authentication to none if receive-version or send-version are set to 1 or 1 2.
Example
This example shows how to configure the external interface to send and receive RIP version 2, to use
MD5 authentication, and to use a key chain called test1.
config router rip
config interface
edit external
set receive-version 2
set send-version 2
set auth-mode md5
set auth-keychain test1
end
end
This example shows how to display the RIP settings.
get router rip
This example shows how to display the RIP configuration.
show router rip
config neighbor
Access the config neighbor subcommand using the config router rip command.
Use this command to enable RIP to send unicast routing updates to the router at the specified
address. You can use the neighbor command and “passive-interface <name_str>” on page 179 to
allow RIP to send unicast updates to the specified neighbor while blocking broadcast updates on the
specified interface. You can configure multiple neighbors.
config neighbor
edit <id_integer>
unset <keyword>
end
config neighbor
delete <id_integer>
end
get router rip
show router rip
Example
This example shows how to set the router at 192.168.21.20 as a neighbor.
config router rip
config neighbor
edit 1
set ip 192.168.21.20
end
end
This example shows how to display the RIP settings.
get router rip
This example shows how to display the RIP configuration.
show router rip
config network
Access the config network subcommand using the config router rip command.
Use this command to identify the networks for which to send and receive RIP updates. If a network is
not specified, interfaces in that network will not be advertised in RIP updates.
config network
delete <id_integer>
end
get router rip
show router rip
Example
Use the following command to enable RIP for the interfaces attached to networks specified by the IP
address 10.0.0.0 and the netmask 255.255.255.0.
config router rip
config network
edit 2
set prefix 10.0.0.0 255.255.255.0
end
end
This example shows how to display the RIP settings.
get router rip
This example shows how to display the RIP configuration.
show router rip
config offset-list
Access the config offset-list subcommand using the config router rip command.
Use the offset list to add the specified offset to the metric of a route.
Example
This example shows how to configure and enable offset list number 5 that adds a metric of 3 to
incoming routes that match the access list named acc_list1 on the external interface.
config router rip
config offset-list
edit 5
set access-list acc_list1
set direction in
set interface external
set offset 3
set status enable
end
end
This example shows how to display the RIP settings.
get router rip
This example shows how to display the RIP configuration.
show router rip
config redistribute
Access the config redistribute subcommand using the config router rip command.
Use the redistribute command to advertise routes learned from OSPF, BGP, static routes, or a
direct connection to the destination network.
Example
This example shows how to enable route redistribution from OSPF, using a metric of 3 and a route
map named rtmp2.
config router rip
config redistribute ospf
set metric 3
set routemap rtmp2
set status enable
end
end
This example shows how to display the RIP settings.
get router rip
This example shows how to display the RIP configuration.
show router rip
Command History
FortiOS v2.80 Substantially revised.
FortiOS v2.80 MR7 Added access-list keyword to config distance subcommand.
Related Commands
• config router access-list
• config router key-chain
• config router prefix-list
• config router route-map
• execute router restart-graceful
• get router info protocols
• get router info rip
• get router info routing_table
route-map
Use this command to add, edit, or delete route maps.
Route maps are a specialized form of filter. Route maps are similar to access lists, but have enhanced
matching criteria, and in addition to permit or deny actions can be configured to make changes as
defined by set statements.
The FortiGate unit attempts to match a packet against the rules in a route map starting at the top of the
list. If it finds a match it makes the changes defined in the set statements and then takes the action
specified for the rule. If no match is found in the route map the default action is deny. If no match
statements are defined in a rule, the default action is to match everything. If multiple match statements
are defined in a rule, all the match statements must match before the set statements can be used.
For a route map to take effect it must be called by another FortiGate routing feature such as RIP.
config rule
Access the config rule subcommand using the config router route-map command. Use the
config rule subcommand to add, edit, or delete route map rules with the specified number.
Example
This example shows how to add a route map list named rtmp2 with two rules. The first rule denies
routes that match the IP addresses in an access list named acc_list2. The second rule permits
routes that match a metric of 2 and changes the metric to 4.
config router route-map
edit rtmp2
config rule
edit 1
set match-ip-address acc_list2
set action deny
next
edit 2
set match-metric 2
set action permit
set set-metric 4
end
end
This example shows how to display the list of route maps.
get router route-map
This example shows how to display the settings for rtmp2.
get router route-map rtmp2
This example shows how to display the configuration for the router route-map command.
show router route-map
This example shows how to display the configuration for rtmp2.
show router route-map rtmp2
Command History
FortiOS v2.80 New.
Related Commands
• config router access-list
• config router prefix-list
• config router rip
static
Use this command to add, edit, or delete static routes for IPv4 traffic.
Add static routes to control the destination of traffic exiting the FortiGate unit. You configure routes by
adding destination IP addresses and netmasks and adding gateways for these destination addresses.
The gateways are the next hop routers to which to route traffic that matches the destination addresses
in the route.
You can also configure the administrative distance for a route to indicate the order of preferability when
more than one route is available to the same network. The lower the administrative distance the
greater the preferability of the route.
The FortiGate unit assigns routes using a best match algorithm. To select a route for a packet, the
FortiGate unit searches through the routing table for a route that best matches the destination address
of the packet. If a match is not found, the FortiGate unit routes the packet using the default route.
Example
This example shows how to add a static route that has the sequence number 2.
config router static
edit 2
set dev internal
set dst 192.168.22.0 255.255.255.0
set gateway 192.168.22.44
end
This example shows how to display the list of static route numbers.
get router static
This example shows how to display the settings for static route 2.
get router static 2
This example shows how to display the static route configuration.
show router static
This example shows how to display the configuration for static route 2.
show router static 2
Command History
FortiOS v2.80 Substantially revised.
Related Commands
• config system interface
• get router info routing_table
static6
Use this command to add, edit, or delete static routes for IPv6 traffic. Add static routes to control the
destination of traffic exiting the FortiGate unit. You configure routes by adding destination IP
addresses and netmasks and adding gateways for these destination addresses. The gateways are the
next hop routers to which to route traffic that matches the destination addresses in the route.
The FortiGate unit assigns routes using a best match algorithm. To select a route for a packet, the
FortiGate unit searches through the routing table for a route that best matches the destination address
of the packet. If a match is not found, the FortiGate unit routes the packet using the default route.
Example
This example shows how to add an IPV6 static route that has the sequence number 2.
config router static6
edit 2
set dev internal
set dst 12AB:0:0:CD30::/60
set gateway 12AB:0:0:CD30:123:4567:89AB:CDEF
end
This example shows how to display the list of IPV6 static route numbers.
get router static6
This example shows how to display the settings for IPV6 static route 2.
get router static6 2
This example shows how to display the IPV6 static route configuration.
show router static6
This example shows how to display the configuration for IPV6 static route 2.
show router static6 2
Command History
FortiOS v2.80 New.
Related Commands
• config system interface
• get router info routing_table
config spamfilter
bword
emailbwl
fortishield
ipbwl
mheader
rbl
bword
Use this command to add or edit and configure options for the spam filter banned word list.
The FortiGate spam filters are generally applied in the following order:
• fortishield: FortiShield Antispam Service
• ipbwl : IP address list
• rbl: DNSBL & ORDBL
• emailbwl: Email address list
• mheader: MIME headers
• bword: Banned words
Control spam by blocking email containing specific words or patterns. The FortiGate unit searches for
banned words in email messages. If a match is found, the corresponding protection profile action is
taken. If no match is found, the email is passed to the recipient (because bword is the final spam filter).
You can use Perl regular expressions or wildcards to add banned word patterns to the list. See “Using
Perl regular expressions” on page 28. You can add one or more banned words to sort email containing
those words in the email subject, body, or both. Words can be marked as spam or clear. Banned
words can be one word or a phrase up to 127 characters long.
If you enter a single word, the FortiGate unit blocks all email that contain that word. If you enter a
phrase, the FortiGate unit blocks all email containing the exact phrase. To block any word in a phrase,
use Perl regular expressions.
Note: Perl regular expression patterns are case sensitive for Spam Filter banned words. To make a word or
phrase case insensitive, use the regular expression /i. For example, /bad language/i blocks all instances of
bad language regardless of case. Wildcard patterns are not case sensitive.
Examples
This example shows how to add the banned word patterns bad* and ^worse to the banned word list
(as the tenth and eleventh list entries). Enable both words, set the action to spam, use the ASCII
character set, set the correct pattern_type and search the body of the email for each word.
config spamfilter bword
edit 10
set status enable
set action spam
set language ASCII
set pattern bad*
set pattern_type wildcard
set where body
next
edit 11
set status enable
set action spam
set language ASCII
set pattern ^worse
set pattern_type regexp
set where body
end
This example shows how to display the spamfilter banned word list.
get spamfilter bword
This example shows how to display the settings for the fifth banned word in the list.
get spamfilter bword 5
This example shows how to display the configuration for the banned word list.
show spamfilter bword
This example shows how to display the configuration for the first banned word in the list.
show spamfilter bword 1
Command History
FortiOS v2.80 New.
FortiOS v2.80 MR2 Added French and Thai variables to the language keyword.
Related Commands
• config spamfilter emailbwl
• config spamfilter ipbwl
• config spamfilter mheader
• config spamfilter rbl
emailbwl
Use this command to filter email based on the sender’s email address or address pattern.
The FortiGate spam filters are generally applied in the following order:
• fortishield: FortiShield Antispam Service
• ipbwl : IP address list
• rbl: DNSBL & ORDBL
• emailbwl: Email address list
• mheader: MIME headers
• bword: Banned words
The FortiGate unit uses the email address list to filter incoming email. The FortiGate unit compares the
email address or domain of the sender to the list in sequence. If a match is found, the corresponding
action is taken. If no match is found, the email is passed on to the next spam filter.
The FortiGate unit can filter email from specific senders or all email from a domain (such as
sample.net). You can mark each email address as clear or spam.
You can use Perl regular expressions or wildcards to add email address patterns to the list. See “Using
Perl regular expressions” on page 28.
Example
This example shows how to add and enable the email address [email protected] (mark as
spam) and the email address *@fortinet.com (mark as clear) to the list as the tenth and eleventh
entries.
config spamfilter emailbwl
edit 10
set status enable
set action spam
set pattern [email protected]
next
edit 11
set status enable
set action clear
set pattern *@fortinet.com
set pattern_type wildcard
end
This example shows how to display the spamfilter email list.
get spamfilter emailbwl
This example shows how to display the settings for the first entry in the spamfilter email list.
get spamfilter emailbwl 1
This example shows how to display the configuration for the entire email list.
show spamfilter emailbwl
If the show command returns you to the prompt, there are no URLs in the list.
This example shows how to display the configuration for the third entry in the email list.
show spamfilter emailbwl 3
Command History
FortiOS v2.80 New.
Related Commands
• config spamfilter bword
• config spamfilter ipbwl
• config spamfilter mheader
• config spamfilter rbl
fortishield
Use this command to configure the settings for the FortiShield Antispam Service.
The FortiGate spam filters are generally applied in the following order:
• fortishield: FortiShield Antispam Service
• ipbwl : IP address list
• rbl: DNSBL & ORDBL
• emailbwl: Email address list
• mheader: MIME headers
• bword: Banned words
FortiShield is an antispam system from Fortinet that includes an IP address black list, a URL black list,
and spam filtering tools. The IP address black list contains IP addresses of email servers known to be
used to generate Spam. The URL black list contains URLs of website found in Spam email.
FortiShield compiles the IP address and URL list from email captured by spam probes located around
the world. Spam probes are email addresses purposely configured to attract spam and identify known
spam sources to create the antispam IP address and URL list. FortiShield combines IP address and
URL checks with other spam filter techniques in a two-pass process.
On the first pass, if spamfsip is selected in the protection profile, FortiShield extracts the SMTP mail
server source address and sends the IP address to a FortiShield server to see if this IP address
matches the list of known spammers. If spamfsurl is selected in the protection profile, FortiShield
checks the body of email messages to extract any URL links. These URL links will be sent to a
FortiShield server to see if any of them is listed. Typically Spam messages contain URL links to
advertisements (also called spamvertizing).
If an IP address or URL match is found, FortiShield terminates the session. If FortiShield does not find
a match, the mail server sends the email to the recipient.
As each email is received, FortiShield performs the second antispam pass by checking the header,
subject, and body of the email for common spam content. If FortiShield finds spam content, the email
is tagged or dropped according to the configuration in the firewall protection profile.
Both FortiShield antispam processes are completely automated and configured by Fortinet. With
constant monitoring and dynamic updates, FortiShield is always current. You can enable or disable
FortiShield in a firewall protection profile.
Examples
This example shows how to enable the FortiShield service, enable the cache, and set the TTL to 1800
seconds.
config spamfilter fortishield
set status enable
set cache enable
set cache_ttl 1800
end
This example shows how to display the spamfilter banned word list. When you use the get command
the FortiShield license type and expiry date are also displayed.
Fortigate-unit-prompt # get spamfilter fortishield
status : enable
cache : enable
cache_ttl : 1800
hostname : antispam.fortigate.com
license : Trial
expiration : N/A
This example shows how to display the FortiShield configuration.
Fortigate-unit-prompt # show spamfilter fortishield
config spamfilter fortishield
set status enable
set cache enable
set cache_ttl 1800
end
Command History
FortiOS v2.80 MR7 New.
Related Commands
• config spamfilter bword
• config spamfilter emailbwl
• config spamfilter ipbwl
• config spamfilter mheader
• config spamfilter rbl
ipbwl
Use this command to filter email based on the IP or subnet address.
The FortiGate spam filters are generally applied in the following order:
• fortishield: FortiShield Antispam Service
• ipbwl : IP address list
• rbl: DNSBL & ORDBL
• emailbwl: Email address list
• mheader: MIME headers
• bword: Banned words
The FortiGate unit uses the IP address list to filter incoming email. The FortiGate unit compares the IP
address of the sender to the list in sequence. If a match is found, the corresponding protection profile
action is taken. If no match is found, the email is passed on to the next spam filter.
You can enter an IP address and mask in two formats:
• x.x.x.x/x.x.x.x, for example 62.128.69.100/255.255.255.0
• x.x.x.x/x, for example 62.128.69.100/24
You can configure the FortiGate unit to filter email from specific IP addresses. You can mark each IP
address as clear, spam, or reject. You can filter single IP addresses, or a range of addresses at the
network level by configuring an address and mask.
Example
This example shows how to add and enable the IP address and netmask 123.0.0.0./8 as the seventh
entry in the list and reject email from that subnet.
config spamfilter ipbwl
edit 7
set status enable
set action reject
set ip/subnet 123.0.0.0/8
end
This example shows how to display the spamfilter IP list.
get spamfilter ipbwl
This example shows how to display the settings for the second entry in the spamfilter IP list.
get spamfilter ipbwl 2
This example shows how to display the configuration for the entire IP list.
show spamfilter ipbwl
If the show command returns you to the prompt, there are no IP addresses in the list.
This example shows how to display the configuration for the seventh entry in the IP list.
show spamfilter ipbwl 7
Command History
FortiOS v2.80 New.
Related Commands
• config spamfilter bword
• config spamfilter emailbwl
• config spamfilter fortishield
• config spamfilter mheader
• config spamfilter rbl
mheader
Use this command to filter email based on the MIME header.
The FortiGate spam filters are generally applied in the following order:
• fortishield: FortiShield Antispam Service
• ipbwl : IP address list
• rbl: DNSBL & ORDBL
• emailbwl: Email address list
• mheader: MIME headers
• bword: Banned words
The FortiGate unit compares the MIME header key-value pair of incoming email to the list pair in
sequence. If a match is found, the corresponding action is taken. If no match is found, the email is
passed on to the next spam filter.
MIME (Multipurpose Internet Mail Extensions) headers are added to email to describe content type
and content encoding, such as the type of text in the email body or the program that generated the
email. Some examples of MIME headers include:
• X-mailer: outgluck
• X-Distribution: bulk
• Content_Type: text/html
• Content_Type: image/jpg
The first part of the MIME header is called the header key, or just header. The second part is called the
value. Spammers often insert comments into header values or leave them blank. These malformed
headers can fool some spam and virus filters.
You can use the MIME headers list to mark email from certain bulk mail programs or with certain types
of content that are common in spam messages. You can choose to mark the email as spam or clear
for each header you configure.
You can use Perl regular expressions or wildcards to add MIME header patterns to the list. See “Using
Perl regular expressions” on page 28.
Example
This example shows how to enable and add two MIME headers to the list. The first entry uses
wildcards and the second entry uses regular expressions.
config spamfilter mheader
edit 1
set status enable
set action clear
set fieldbody Content-Type
set fieldname text/*
set pattern_type wildcard
next
edit 2
set status enable
set action spam
set fieldbody Received
set fieldname 1/.2/.3/.4
set pattern_type regexps
end
This example shows how to display the spamfilter MIME header list.
get spamfilter mheader
This example shows how to display the settings for the second entry in the spamfilter MIME header
list.
get spamfilter mheader 2
This example shows how to display the configuration for the entire MIME header list.
show spamfilter mheader
If the show command returns you to the prompt, there are no MIME headers in the list.
This example shows how to display the configuration for the seventh entry in the MIME header list.
show spamfilter mheader 7
Command History
FortiOS v2.80 New.
Related Commands
• config spamfilter bword
• config spamfilter emailbwl
• config spamfilter fortishield
• config spamfilter ipbwl
• config spamfilter rbl
rbl
Use this command to filter email using DNS-based Blackhole List (DNSBL) or Open Relay Database
List (ORDBL) servers.
The FortiGate spam filters are generally applied in the following order:
• fortishield: FortiShield Antispam Service
• ipbwl : IP address list
• rbl: DNSBL & ORDBL
• emailbwl: Email address list
• mheader: MIME headers
• bword: Banned words
The FortiGate unit compares the IP address or domain name of the sender to any database lists you
configure in sequence. If a match is found, the corresponding action is taken. If no match is found, the
email is passed on to the next spam filter.
Some spammers use unsecured third party SMTP servers to send unsolicited bulk email. Using
DNSBLs and ORDBLs is an effective way to tag or reject spam as it enters your network. These lists
act as domain name servers that match the domain of incoming email to a list of IP addresses known
to send spam or allow spam to pass through.
There are several free and subscription servers available that provide reliable access to continually
updated DNSBLs and ORDBLs. Please check with the service you are using to confirm the correct
domain name for connecting to the server.
Note: Because the FortiGate unit uses the server domain name to connect to the DNSBL or ORDBL server, it
must be able to look up this name on the DNS server. For information on configuring DNS, see “config system
dns” on page 239.
Example
This example shows how to add the DNSBL server bl.spamcop.net to the second position in the
list and reject email identified as spam, and add the ORDBL relays.ordb.org to the third position
in the list and mark email identified as spam.
config spamfilter rbl
edit 2
set action reject
set server bl.spamcop.net
set status enable
next
edit 3
set action spam
set server relays.ordb.org
set status enable
end
This example shows how to display the spamfilter DNSBL list.
get spamfilter rbl
This example shows how to display the settings for the second entry in the spamfilter DNSBL list.
get spamfilter rbl 2
This example shows how to display the configuration for the entire DNSBL list.
show spamfilter rbl
If the show command returns you to the prompt, there are no DNSBLs in the list.
This example shows how to display the configuration for the third entry in the DNSBL list:
show spamfilter rbl 3
Command History
FortiOS v2.80 New.
Related Commands
• config spamfilter bword
• config spamfilter emailbwl
• config spamfilter fortishield
• config spamfilter ipbwl
• config spamfilter mheader
• config system dns
config system
accprofile interface
admin ipv6_tunnel
autoupdate clientoverride mac-address-table
autoupdate override manageip
autoupdate push-update modem
autoupdate schedule oobm interface
autoupdate tunneling oobm route
bug-report replacemsg {alertmail | catblock |
console ftp | http | mail | spam}
<message-type_str>
dhcp exclude_range
session-helper
dhcp ipmacbinding
session_ttl
dhcp server
snmp community
dns
snmp sysinfo
fm
vdom
get system performance
wireless mac_filter
get system status
wireless settings
global
zone
ha
accprofile
Use this command to add access profiles that control administrator access to FortiGate features. Each
FortiGate administrator account must include an access profile. You can create access profiles that
deny access to or allow read only, write only, or both read and write access to FortiGate features.
Example
Use the following commands to add a new access profile named policy_profile that allows read
and write access to firewall policies and that denies access to all other FortiGate features. An
administrator account with this access profile can view and edit firewall policies, but cannot view or
change any other FortiGate settings or features.
config system accprofile
edit policy_profile
set secgrp rw
end
This example shows how to display the settings for the system accprofile command.
get system accprofile
This example shows how to display the settings for the policy_profile access profile.
get system accprofile policy_profile
This example shows how to display the configuration for the system accprofile command.
show system accprofile
This example shows how to display the configuration for the policy_profile access profile.
get system accprofile policy_profile
Command History
FortiOS v2.80 New
Related Commands
• admin
admin
Use this command to add, edit, and delete administrator accounts.
Use the admin account or an account with system configuration read and write privileges to add new
administrator accounts and control their permission levels. Each administrator account must include
an access profile. You cannot delete the admin administrator account. You cannot change the admin
administrator account permissions.
Example
Use the following commands to add a new administrator account named new_admin with the
password set to p8ssw0rd and that includes an access profile named policy_profile.
Administrators that log in to this account will have administrator access to the FortiGate unit from any
IP address.
config system admin
edit new_admin
set password p8ssw0rd
set accprofile policy_profile
end
This example shows how to display the settings for the system admin command.
get system admin
This example shows how to display the settings for the new_admin administrator account.
get system admin new_admin
This example shows how to display the configuration for the system admin command.
show system admin
Command History
FortiOS v2.80 Revised.
Related Commands
• accprofile
autoupdate clientoverride
Use this command to receive updates on a different interface than that connected to the FortiProtect
Distribution Network (FDN). This command changes the source IP address of update requests to the
FortiProtect server, causing it to send the update to the modified source address.
Example
This example shows how to add a push update client IP address 192.0.2.45.
config system autoupdate clientoverride
set address 192.0.2.45
set status enable
end
This example shows how to display the settings for the system autoupdate clientoverride
command.
get system autoupdate clientoverride
This example shows how to display the configuration for the system autoupdate override
command.
show system autoupdate clientoverride
Command History
FortiOS v2.80 Added.
MR6
Related Commands
• autoupdate override
• autoupdate push-update
• autoupdate schedule
• autoupdate tunneling
• execute update_now
autoupdate override
Use this command to add the IP address of an override FDS server.
If you cannot connect to the FDN or if your organization provides updates using their own FortiProtect
server, you can add an override FDS server so that the FortiGate unit connects to this IP address
instead of the FortiProtect Distribution Network (FDN).
Example
This example shows how to add and enable an FDS override server with IP address 192.168.87.45.
config system autoupdate override
set address 192.168.87.45
set status enable
end
This example shows how to display the settings for the system autoupdate override command.
get system autoupdate override
This example shows how to display the configuration for the system autoupdate override
command.
show system autoupdate override
Command History
FortiOS v2.80 Revised.
Related Commands
• autoupdate push-update
• autoupdate schedule
• autoupdate tunneling
• execute update_now
autoupdate push-update
Use this command to configure push updates. The FortiProtect Distribution Network (FDN) can push
updates to FortiGate units to provide the fastest possible response to critical situations. You must
register the FortiGate unit before it can receive push updates.
When you configure a FortiGate unit to allow push updates, the FortiGate unit sends a SETUP
message to the FDN. The next time an update is released, the FDN notifies all FortiGate units that are
configured for push updates that a new update is available. Within 60 seconds of receiving a push
notification, the FortiGate unit requests an update from the FDN.
Using this command you can enable or disable push updates. You can also configure push IP address
and port override. If the FDN must connect to the FortiGate unit through a NAT device, you must
configure port forwarding on the NAT device and add the port forwarding information to the push
update override configuration.
Note: You cannot receive push updates through a NAT device if the external IP address of the NAT device is
dynamic (for example, set using PPPoE or DHCP).
Example
This example shows how to enable push updates.
config system autoupdate push-update
set status enable
end
This example shows how to display the settings for the system autoupdate push-update
command.
get system autoupdate push-update
This example shows how to display the configuration for the system autoupdate push-update
command.
show system autoupdate push-update
Command History
FortiOS v2.80 Revised.
Related Commands
• autoupdate override
• autoupdate schedule
• autoupdate tunneling
• execute update_now
autoupdate schedule
Use this command to enable or disable scheduled updates, at regular intervals throughout the day,
once a day, or once a week.
Example
This example shows how to configure the FortiGate unit to check the FortiProtect Distribution Network
(FDN) for updates once a day at 3:00 in the morning.
config system autoupdate schedule
set frequency daily
set time 03:00
set status enable
end
This example shows how to display the settings for the system autoupdate schedule command.
get system autoupdate schedule
This example shows how to display the configuration for the system autoupdate schedule
command.
show system autoupdate schedule
Command History
FortiOS v2.80 Revised.
FortiOS v2.80 Can set time as well as day for weekly updates.
MR2
Related Commands
• autoupdate override
• autoupdate push-update
• autoupdate tunneling
• global
autoupdate tunneling
Use this command to configure the FortiGate unit to use a proxy server to connect to the FortiProtect
Distribution Network (FDN). To use the proxy server you must enable tunneling and add the IP
address and port required to connect to the proxy server. If the proxy server requires authentication,
add the user name and password required to connect to the proxy server.
The FortiGate unit connects to the proxy server using the HTTP CONNECT method, as described in
RFC 2616. The FortiGate unit sends an HTTP CONNECT request to the proxy server (optionally with
authentication information) specifying the IP address and port required to connect to the FDN. The
proxy server establishes the connection to the FDN and passes information between the FortiGate unit
and the FDN.
The CONNECT method is used mostly for tunneling SSL traffic. Some proxy servers do not allow the
CONNECT to connect to any port; they restrict the allowed ports to the well known ports for HTTPS
and perhaps some other similar services. Because FortiGate autoupdates use HTTPS on port 8890 to
connect to the FDN, your proxy server might have to be configured to allow connections on this port.
Example
This example shows how to enable tunneling where the FortiGate unit must connect to a proxy server
with IP address 67.35.50.34 that uses port 8080, requires the user id proxy_user and the password
proxy_pwd.
Command History
FortiOS v2.80 Revised.
Related Commands
• autoupdate override
• autoupdate push-update
• autoupdate schedule
bug-report
Use this command to configure a custom email relay for sending problem reports to Fortinet customer
support. For more information on sending problem reports, see the System Maintenance chapter of
the Administration Guide for your FortiGate model.
Example
config system bug-report
set auth yes
set password '123456'
set server '10.0.0.1'
set username 'User1'
end
This example shows how to display the settings for the bug-report command.
get system bug-report
This example shows how to display the configuration for the bug-report command.
show system bug-report
Command History
FortiOS v2.80 New.
FortiOS v2.80 MR2 Command changed from config bug-report to config system bug-report.
Related Commands
• system dns
console
Use this command to set the console command mode, the number of lines displayed by the console,
and the baud rate.
Example
This example shows how to set the baudrate to 38400 and set the number of lines per page to 25.
config system console
set baudrate 38400
set page 25
end
This example shows how to display the settings for the console command.
get system console
This example shows how to display the configuration for the console command.
show system console
Command History
FortiOS v2.80 Revised.
FortiOS v2.80 MR2 Command changed from config console to config system console.
FortiOS v2.80 MR4 page keyword removed. output keyword added.
dhcp exclude_range
Use this command to add up to 16 exclusion ranges of IP addresses that FortiGate DHCP servers
cannot assign to DHCP clients. Exclusion ranges apply to all FortiGate DHCP servers.
Note: For this configuration to take effect you must set the interface to DHCP server mode using the dhcp-
server-mode keyword in the config system interface command.
Example
Use the following command to add an exclusion range from 192.168.20.22 to 192.168.20.25.
config system dhcp exclude_range
edit 1
set start-ip 192.168.20.22
set end-ip 192.168.20.25
end
This example shows how to display the settings for the system dhcp exclude command.
get system dhcp exclude_range
This example shows how to display the settings for the 1 exclusion range.
get system dhcp exclude_range 1
This example shows how to display the configuration for the system dhcp exclude command.
show system dhcp exclude_range
This example shows how to display the configuration for the 1 exclusion range.
show system dhcp exclude_range 1
Command History
FortiOS v2.80 Substantially revised.
FortiOS v2.80 MR3 Can now define up to 16 exclude ranges.
Related Commands
• dhcp ipmacbinding
• dhcp server
• interface
dhcp ipmacbinding
Use this command to reserve an IP address for a particular device on the network according to the
MAC address of the device. When you add the MAC address and an IP address to the IP/MAC binding
list, the DHCP server always assigns this IP address to the MAC address. You can create up to 50
IP/MAC binding pairs.
Note: For this configuration to take effect you must set the interface to DHCP server mode using the dhcp-
server-mode keyword in the config system interface command.
Example
Use the following command to add an IP/MAC binding pair named ipmac_pair consisting of IP
address 192.168.110.3 and MAC address 00:09:0F:0A:01:BC.
config system dhcp ipmacbinding
edit ipmac_pair
set ip 192.168.110.3
set mac 00:09:0F:0A:01:BC
end
This example shows how to display the settings for the system dhcp ipmacbinding command.
get system dhcp ipmacbinding
This example shows how to display the settings for the ipmac_pair IP/MAC binding pair.
get system dhcp ipmacbinding ipmac_pair
This example shows how to display the configuration for the system dhcp ipmacbinding
command.
show system dhcp ipmacbinding
This example shows how to display the configuration for the ipmac_pair IP/MAC binding pair.
show system dhcp ipmacbinding ipmac_pair
Command History
FortiOS v2.80 Substantially revised.
Related Commands
• dhcp exclude_range
• dhcp server
• interface
dhcp server
Use this command to add one or more DHCP servers for any FortiGate interface. As a DHCP server,
the interface dynamically assigns IP addresses to hosts on a network connected to the interface.
You can add more than one DHCP server to a single interface to be able to provide DHCP services to
multiple networks. For more information on configuring your network and FortiGate unit to use multiple
DHCP servers on one interface, see the System DHCP chapter in the Administration Guide for your
FortiGate unit.
Note: For this configuration to take effect you must set the interface to DHCP server mode using the dhcp-
server-mode keyword in the config system interface command.
Example
Use the following command to add a DHCP server named new_dhcp. This DHCP server assigns IP
addresses to computers connected to the same network as the internal interface. The IP addresses
assigned are in the range 192.168.33.100 to 192.168.33.200. The example DHCP configuration also
sets the netmask, default gateway, two DNS server IP addresses, the lease time, and one WINS
server.
config system dhcp server
edit new_dhcp
set interface internal
set start-ip 192.168.33.100
set end-ip 192.168.33.200
set netmask 255.255.255.0
set default-router 192.168.33.1
set dns_server1 56.34.56.96
set dns_server2 56.34.56.99
set lease-time 4000
set wins_server1 192.168.33.45
end
This example shows how to display the settings for the system dhcp server command.
get system dhcp server
This example shows how to display the settings for the new_dhcp DHCP server.
get system dhcp server new_dhcp
This example shows how to display the configuration for the system dhcp server command.
show system dhcp server
This example shows how to display the configuration for the new_dhcp DHCP server.
show system dhcp server new_dhcp
Command History
FortiOS v2.80 Substantially revised.
FortiOS v2.80 MR2 Added domain keyword.
Removed discard-age keyword.
Related Commands
• dhcp exclude_range
• dhcp ipmacbinding
• interface
dns
Use this command to set the DNS server addresses. Several FortiGate functions, including sending
email alerts and URL blocking, use DNS.
On models numbered 100 and lower, you can use this command to set up DNS forwarding.
Example
This example shows how to set the primary FortiGate DNS server IP address to 45.37.121.76 and
the secondary FortiGate DNS server IP address to 45.37.121.77.
config system dns
set primary 45.37.121.76
set secondary 45.37.121.77
end
This example shows how to display the settings for the system dns command.
get system dns
This example shows how to display the configuration for the system dns command.
show system dns
Command History
FortiOS v2.80 Revised.
FortiOS v2.80 MR2 Added autosvr and fwdintf keywords for models numbered 100 and lower.
FortiOS v2.80 MR8 Added cache-notfound-responses keyword.
fm
Use this command to configure the FortiGate unit for remote administration from a FortiManager
server. Use the config vpn ipsec commands to set up the IPSec VPN tunnel.
Example
This example shows how to set the FortiGate to be managed by a FortiManager Server:
config system fm
set id FMServer_Gateway
set ip 192.20.120.100
end
Command History
FortiOS v2.80 MR2 Command moved from config system global and revised.
FortiOS v2.80 MR7 Added status keyword.
Related Commands
• config vpn ipsec manualkey
• config vpn ipsec phase1
• config vpn ipsec phase2
global
Use this command to configure global settings that affect various FortiGate systems and
configurations.
Example
This example shows how to change to Transparent mode.
config system global
set opmode transparent
end
This example shows how to display the settings for the system global command.
get system global
This example shows how to display the configuration for the system global command.
show system global
Command History
FortiOS v2.80 New.
FortiOS v2.80 MR2 The ip-overlap keyword was changed to allow-interface-subnet-overlap.
FortiOS v2.80 MR3 Added av_failopen and reset_sessionless_tcp keywords.
FortiOS v2.80 MR4 date and time moved to execute branch.
phase1-rekey keyword added.
FortiOS v2.80 MR6 Added ips-open keyword.
ha
Use this command to enable and configure FortiGate high availability (HA). HA is supported on
FortiGate models numbered 60 and higher and on the FortiWiFi-60. Using the config system ha
command you must configure all cluster members with the same group ID, mode, and password
before putting the cluster into HA mode.
Group ID, mode, and password are not synchronized between cluster units. The primary cluster unit
synchronizes all other configuration settings, including the other HA configuration settings.
Note: You cannot enable HA mode if one of the FortiGate unit interfaces is configured using DHCP or PPPoE. If
DHCP or PPPoE is configured, the config ha mode keyword is not available.
Examples
This example shows how to configure a FortiGate unit for active-active HA operation. The example
shows how to enter the basic HA configuration (mode, group_id, and password). You would enter
the exact same command on every FortiGate unit in the cluster.
config system ha
set mode a-a
set groupid 15
set password HA1passw0rd
end
The following example shows how to enable cluster communication for the internal interface and how
to set the priority to 100.
config system ha
set hbdev internal enable
set hbdev_priority internal 100
end
The following example shows how to enable connection monitoring for the external, internal and DMZ
interfaces and how to set the monitor priority of the internal interface to 200, the monitor priority of the
external interface to 100, and the monitor priority of the DMZ interface to 50.
config system ha
set monitor external enable
set monitor_priority internal 200
set monitor internal enable
set monitor_priority internal 100
set monitor dmz enable
set monitor_priority internal 50
end
The following example shows how to configure weighted round robin weights for a cluster of three
FortiGate units. You can enter the following commands to configure the weight values for each unit:
config system ha
set schedule weight-round-robin
set weight 0 1
set weight 1 3
set weight 2 3
end
These commands have the following results:
• The first connection is processed by the primary unit (priority 0, weight 1)
• The next three connections are processed by the first subordinate unit (priority 1, weight 3)
• The next three connections are processed by the second subordinate unit (priority 2, weight 3)
The subordinate units process more connections than the primary unit, and both subordinate units, on
average, process the same number of connections.
This example shows how to display the settings for the system ha command.
get system ha
This example shows how to display the configuration for the system ha command.
show system ha
Command History
FortiOS v2.80 Revised.
FortiOS v2.80 MR2 Added load-balance-all keyword.
FortiOS v2.80 MR5 Added route-hold, route-wait, and route-ttl keywords.
FortiOS v2.80 MR6 Added authentication, arp, encryption, hb-lost-threshold, helo-holddown,
and hb-interval keywords.
FortiOS v2.80 MR7 Changes to the weight keyword.
Related Commands
• execute ha manage
• execute ha synchronize
interface
Use this command to edit the configuration of a FortiGate physical interface or VLAN subinterface.
In the following table, VLAN subinterface can be substituted for interface in most places except that
you can only configure VLAN subinterfaces with static IP addresses. Use the edit command to add a
VLAN subinterface.
Note: A VLAN cannot have the same name as a zone or a virtual domain.
Example
This example shows how to set the FortiGate-300 internal interface IP address and netmask to
192.168.100.159 255.255.255.0, and the management access to ping, https, and ssh.
config system interface
edit internal
set allowaccess ping https ssh
set ip 192.168.110.26 255.255.255.0
end
config ip6-prefix-list
Access the ip6-prefix-list subcommand branch using the config system interface
command. You can create up to 32 entries. This command is available in NAT/Route mode only.
config secondaryip
Access the secondaryip subcommand branch using the config system interface command.
Example
This example shows how to add a secondary IP address and netmask of 192.176.23.180
255.255.255.0 to the internal interface. Also configure ping and https management access to
this secondary IP address.
config system interface
edit internal
config secondaryip
edit 1
set allowaccess ping https
set ip 192.176.23.180 255.255.255.0
end
end
This example shows how to display the settings for the system interface command.
get system interface
This example shows how to display the configuration for the system interface command.
show system interface
This example shows how to display the settings for the internal interface. You can substitute any
model appropriate interface name.
get system interface internal
If the interface mode is DHCP, the display includes Lease Expires, Acquired DNS1, Acquired DNS2,
and DHCP Gateway. If the interface mode is PPPoE, the display includes Acquired DNS1, Acquired
DNS2 and PPPoE gateway.
This example shows how to display the configuration for the internal interface. You can substitute any
model appropriate interface name.
show system interface internal
Command History
FortiOS v2.80 Substantially revised. IPv6 added.
FortiOS v2.80 MR2 Added netbios-forward, wins-ip keywords.
VLAN-related keywords are available on all models.
Removed zone keyword. See config system zone.
FortiOS v2.80 MR3 Added defaultgw keyword.
FortiOS v2.80 MR6 Added mtu-override keyword.
ipv6_tunnel
Use this command to tunnel IPv6 traffic over an IPv4 network.
Example
config system ipv6_tunnel
edit test_tunnel
set destination 10.10.10.1
set interface internal
set ip6 12AB:0:0:CD30::/60
set mode ipv6ip
set source192.168.50.1
set vd root
end
This example shows how to display the settings for the system ipv6_tunnel command.
get system ipv6_tunnel
This example shows how to display the configuration for the system ipv6_tunnel command.
show system ipv6_tunnel
This example shows how to display the settings for the ipv6_tunnel named test_tunnel.
get system ipv6_tunnel test_tunnel
This example shows how to display the configuration for the ipv6_tunnel named test_tunnel.
show system ipv6_tunnel test_tunnel
Command History
FortiOS v2.80 New.
Related Commands
• interface
mac-address-table
Use this command to create a static MAC table. You can make up to 50 entries. This command is
available in Transparent mode only.
Example
Use the following commands to add a static MAC entry for the internal interface.
config system mac-address-table
edit 11:22:33:00:ff:aa
set interface internal
end
This example shows how to display the settings for the mac-address-table command.
get system mac-address-table
This example shows how to display the configuration for the mac-address-table command.
show system mac-address-table
This example shows how to display the settings for the MAC address 11:22:33:00:ff:aa.
get system mac-address-table 11:22:33:00:ff:aa
This example shows how to display the configuration for the MAC address 11:22:33:00:ff:aa.
show system mac-address-table 11:22:33:00:ff:aa
Command History
FortiOS v2.80 Renamed and Revised. Formerly set system brctl.
manageip
Configure the Transparent mode management IP address. Use the management IP address for
management access to the FortiGate unit running in Transparent mode. The FortiProtect Distribution
Network (FDN) also connects to the management IP address for antivirus and attack definition and
engine updates.
Example
This example shows how to set the transparent mode management IP address to 192.168.1.80 and
the netmask to 255.255.255.0.
config system manageip
set ip 192.168.1.80 255.255.255.0
end
This example shows how to display the settings for the manageip command.
get system manageip
This example shows how to display the configuration for the manageip command.
show system manageip
Command History
FortiOS v2.80 Revised.
Related Commands
• interface
modem
Use this command to configure a FortiGate-60M modem or a serial modem connected using a serial
converter to the FortiGate 50A or FortiGate-60 USB port.
You can add the information to connect to up to three dialup accounts. The FortiGate-60 or FortiGate-
60M unit modem interface can act as a backup interface for one of the FortiGate ethernet interfaces or
as a standalone dialup interface.
These commands are available in NAT/Route mode only and apply only to models 50A, 60, 60M and
60-WiFi.
Example
This example shows how to enable the modem and configure the modem to act as a backup for the
WAN1 interface. Only one dialup account is configured. The FortiGate unit and modem will attempt to
dial this account 10 times. The FortiGate unit will wait 5 seconds after the WAN1 interface recovers
before switching back to the WAN1 interface.
config system modem
set action dial
set status enable
set holddown_time 5
set interface wan1
set passwd1 acct1passwd
set phone1 1234567891
set redial 10
set username1 acct1user
end
This example shows how to display the settings for the modem command.
get system modem
This example shows how to display the configuration for the modem command.
show system modem
Command History
FortiOS v2.80 Revised.
FortiOS v2.80 MR3 Default for altmode changed to enable.
Related Commands
• interface
oobm interface
Use this command to configure the Out-of-Band Management interface on the FortiGate 4000 unit.
Command History
FortiOS v2.80 MR3 Added.
Related Commands
• oobm route
oobm route
Use this command to configure an Out-of-Band Management route on the FortiGate 4000 unit.
Command History
FortiOS v2.80 MR3 Added.
Related Commands
• oobm interface
<message-type_str>
Defaults
Name <message-type_str> Description Format Header
alertmail Alert email messages sent to system administrators.
alertmail_test Email message sent when the administrator text none
tests alert email.
alertmail_virus Virus log is enabled for alert email and a none none
virus is detected.
alertmail_block Virus log is enabled for alert email and text none
antivirus file blocking blocks a file.
alertmail_nids_event Attack log is enabled for alert email and the text none
IPS detects an attack.
alertmail_crit_event Event log is enabled for alert email and a text none
critical system message is sent.
alertmail_disk_full Event log is enabled for alert email and the text none
log disk is full.
catblock Messages that appear on web pages blocked by category blocking.
cat_block Web category blocking blocks a web page. text none
ftp Messages added to FTP sessions when the antivirus engine blocks a file either because of a
matching file pattern or because a virus is detected.
ftp_dl_infected Antivirus system detects a virus in a file text none
being downloaded and blocks the file.
ftp_dl_blocked Antivirus system blocks a file that matches a text none
file pattern.
ftp_dl_filesize Antivirus system blocks an oversize file (one text none
that is too large to be virus scanned).
http Messages added to web pages when the antivirus engine blocks a file in an HTTP session
because of a matching file pattern or because a virus is detected; or when web filter blocks a web
page.
bannedword The web filter banned word list blocks a web html http
page.
url_block Web filter URL blocking blocks a web page. html http
http_block The antivirus system blocks a file that html http
matches a file pattern.
http_virus The antivirus system blocks a file that html http
contains a virus.
http_filesize The antivirus system blocks a file that is too html http
large to be virus scanned.
http_client_block The antivirus system blocks a file that html http
matches a file pattern.
http_client_virus The antivirus system blocks a file that html http
contains a virus.
http_client_filesize The antivirus system blocks a file that is too html http
large to be virus scanned.
http_client_bannedword The web filter banned word list blocks a web html http
page.
<message-type_str>
Defaults
Name <message-type_str> Description Format Header
mail Messages added to email messages when the antivirus engine blocks a file
either because of a matching file pattern or because a virus is detected; or
when spam filter blocks an email.
email_block The antivirus system blocks a file that text 8bit
matches a file pattern.
email_virus The antivirus system deletes a file from an text 8bit
email messages that contains a virus.
email_filesize The antivirus system blocks an email text 8bit
message that is too large to be virus
scanned.
partial The FortiGate unit deletes a part of a text 8bit
fragmented email message.
smtp_block The antivirus system blocks a file in an text 8bit
SMTP email message that matches a file
pattern.
smtp_virus The antivirus system deletes a file from an text 8bit
SMTP email messages that contains a
virus.
smtp_filesize The antivirus system blocks an SMTP email text 8bit
message that is too large to be virus
scanned.
spam Messages added to SMTP email messages when spam filter blocks an email message
ipblocklist The spam filter IP address list marked an text 8bit
email message as reject or as spam.
smtp_spam_rbl The spam filter DNSBL & ORDBL list text 8bit
marked an email message as reject or as
spam.
smtp_spam_helo An email message is blocked because the text 8bit
HELO/EHLO domain is invalid.
smtp_spam_emailblack The spam filter email address list marked a text 8bit
message as spam.
smtp_spam_mimeheader The spam MIME headers list marked a text 8bit
message as spam.
reversedns Spam filtering return-email DNS check text 8bit
identified a message as spam.
smtp_spam_bannedword The spam filter email address list marked an text 8bit
SMTP message as spam.
Replacement messages can include replacement message tags. When users receive the replacement
message, the replacement message tag is replaced with content relevant to the message.
Example
This example shows how to change the email message that is sent to test the alert email system.
config system replacemsg alertmail alertmail_test
set buffer "A test of the FortiGate alert email system."
end
Command History
FortiOS v2.80 New
FortiOS v2.80 MR2 Changed cerb keyword to catblock.
session-helper
A session-helper binds a service to a TCP port. By default, there are 14 session helpers binding
services to standard ports. Use this command to configure a new session helper or to edit an existing
one.
Example
Use the following commands to change the ftp port from 21 to 1021:
config system session-helper
edit 11
set port 1021
end
Command History
FortiOS v2.80 New
session_ttl
Use this command when you want to increase or decrease the length of time a TCP session can be
idle before being dropped.
Example
Use the following commands to increase the default session timeout.
config system session_ttl
set default 62000
end
This example shows how to display the settings for the session_ttl command.
get system session_ttl
This example shows how to display the configuration for the session_ttl command.
show system session_ttl
config port
Access the port subcommand branch using the sesion_ttl command. Use this command to
control the timeout for a specific port.
config port
edit <port_integer>
unset <keyword>
end
config port
delete <port_integer>
end
get system session_ttl
show system session_ttl
Example
Use the following command to change the session timeout for SSH on port 22 to 3600 seconds.
config system session_ttl
config port
edit 22
set 3600
end
end
Command History
FortiOS v2.80 Revised.
snmp community
Use this command to configure SNMP communities. Add SNMP communities so that SNMP
managers can connect to the FortiGate unit to view system information and receive SNMP traps. You
can add up to three SNMP communities. Each community can have a different configuration for SNMP
queries and traps. Each community can be configured to monitor the FortiGate unit for a different set
of events. You can also the add IP addresses of up to 8 SNMP managers to each community.
Example
This example shows how to add a new SNMP community named SNMP_Com1. The default
configuration can be used in most cases with only a few modifications. In the example below the
community is added, given a name, and then because this community is for an SNMP manager that is
SNMP v1 compatible, all v2c functionality is disabled. After the community is configured the SNMP
manager is added. The SNMP manager IP address is 192.168.20.34 and it connects to the FortiGate
unit internal interface.
config system snmp community
edit 1
set name SNMP_Com1
set query_v2c_status disable
set trap_v2c_status disable
config hosts
edit 1
set interface internal
set ip 192.168.10.34
end
end
This example shows how to display the settings for the system snmp community command.
get system snmp community
This example shows how to display the settings for the SNMP community with ID 1.
get system snmp community 1
This example shows how to display the configuration for the snmp community command.
show system snmp community
This example shows how to display the configuration for the SNMP community with ID 1.
show system snmp community 1
config hosts
Access the hosts subcommand using the snmp community command. Use this command to add
SNMP manager IP addresses to an SNMP community and to specify the FortiGate interface that each
SNMP manager connects to.
config hosts
edit <id_integer>
unset <keyword>
end
config hosts
delete <id_integer>
end
get system snmp community [<id_integer>]
show system snmp community [<id_integer>]
Example
Use the following command to add an SNMP manager with IP address 192.34.56.78 that connects to
the external interface of the FortiGate unit.
config system snmp
edit 1
config hosts
edit 1
set interface external
set ip 192.34.56.78
end
end
Command History
FortiOS v2.80 Substantially revised.
FortiOS v2.80 MR6 fm_if_change added to events
Related Commands
• snmp sysinfo
snmp sysinfo
Use this command to enable the FortiGate SNMP agent and to enter basic FortiGate system
information that is used by the FortiGate SNMP agent. Use system information to identify the FortiGate
unit so that when your SNMP manager receives configuration information or traps from the FortiGate
unit you can identify the FortiGate unit that sent the information.
Example
This example shows how to enable the FortiGate SNMP agent and add basic SNMP system
information.
config system snmp sysinfo
set status enable
set contact info ‘System Admin ext 245’
set description ‘FortiGate unit’
set location ‘Server Room’
end
This example shows how to display the settings for the system snmp sysinfo command.
get system snmp sysinfo
This example shows how to display the configuration for the system snmp sysinfo command.
show system snmp sysinfo
Command History
FortiOS v2.80 Revised.
Related Commands
• snmp community
vdom
Use this command to add virtual domains. The number of virtual domains you can add is dependent
on the FortiGate model.
By default, each FortiGate unit runs a virtual domain named root. This virtual domain includes all of the
FortiGate physical interfaces, VLAN subinterfaces, zones, firewall policies, routing settings, and VPN
settings.
Once you add a virtual domain you can configure it by adding VLAN subinterfaces, zones, firewall
policies, routing settings, and VPN settings. You can also move physical interfaces from the root virtual
domain to other virtual domains and move VLAN subinterfaces from one virtual domain to another.
By default all physical interfaces are in the root virtual domain. You cannot remove a physical interface
from a virtual domain if firewall policies have been added for it. Delete the firewall policies or remove
the interface from the firewall policies first. If the interface has been added to a zone, it is removed
from the zone when you move it to a different virtual domain.
You cannot delete the default root virtual domain and you cannot delete a virtual domain that is used
for system management.
Example
This example shows how to add a virtual domain called Test1.
config system vdom
edit Test1
end
Command History
FortiOS v2.80 Substantially revised.
Related Commands
• global
• interface
wireless mac_filter
Use this command to configure the WLAN interface wireless MAC filter.
config mac_list
Use the config mac_list command to add MAC addresses to the Allow list or to the Deny list.
Access this command using the config system wireless mac_filter command.
Examples
This example shows how to enable the MAC filter, specify that unlisted MAC addresses should be
denied access, and add MAC address 12:34:56:78:90:AB to the MAC filter Allow list:
config system wireless mac_filter
set status enable
set default_acl deny
config mac_list
edit 1
set acl allow
set mac 12:34:56:78:90:AB
end
end
This example shows how to display the wireless mac_filter:
show system wireless mac_filter
Command History
FortiOS v2.80E New command, incorporating config system network wireless wlan command
and adding new subcommands and keywords.
Related Commands
• wireless settings
• interface
wireless settings
Use this command to configure the WLAN interface wireless settings.
Example
This example shows how to configure the wireless interface.
config system wireless settings
set channel 4
set geography Americas
set key 0123456789abcdeffedcba9876
set security WEP128
set ssid test_wifi
end
This example shows how to display the wireless settings.
get system wireless settings
This example shows how to display the wireless settings.
show system wireless settings
Command History
FortiOS v2.80E Command was config system wireless wlan
Keywords added: beacon_interval, broadcast_ssid, fragment_threshold,
passphrase, power_level, radius_server, rts_threshold
Related Commands
• interface
• wireless mac_filter
zone
Use this command to add or edit zones.
Example
This example shows how to add a zone named Zone1, to add the internal interface to it, and to deny
routing between different zones.
config system zone
edit Zone1
set interface internal
set intrazone deny
end
Command History
FortiOS v2.80 Revised.
FortiOS v2.80 MR2 intrazone now available on all models. All models support zones.
Added interface keyword (was part of config system interface).
Related Commands
• interface
config user
group
ldap
local
peer
peergrp
radius
group
Use this command to add or edit user groups.
To enable authentication, you must add user names, RADIUS servers and LDAP servers to one or
more user groups. You can then select a user group when you require authentication. You can select
a user group to configure authentication for:
• Policies that require authentication.
Only users in the selected user group or users that can authenticate with the RADIUS or LDAP
servers added to the user group can authenticate with these policies.
• IPSec VPN Phase 1 configurations for dialup users.
Only users in the selected user group can authenticate to use the VPN tunnel.
• XAuth for IPSec VPN Phase 1 configurations.
Only users in the selected user group can be authenticated using XAuth.
• The FortiGate PPTP configuration.
Only users in the selected user group can use PPTP.
• The FortiGate L2TP configuration.
Only users in the selected user group can use L2TP.
When you add user names, RADIUS servers, and LDAP servers to a user group, the order in which
they are added determines the order in which the FortiGate unit checks for authentication. If user
names are first, then the FortiGate unit checks for a match with these local user names. If a match is
not found, the FortiGate unit checks the RADIUS or LDAP server. If a RADIUS or LDAP server is
added first, the FortiGate unit checks the server and then the local user names.
If the user group contains user names, RADIUS servers, and LDAP servers, the FortiGate unit checks
them in the order in which they have been added to the user group.
Example
This example shows how to add a group named User_Grp_1, and add User_2, User_3, Radius_2 and
LDAP_1 as members of the group, and set the protection profile to strict:
config user group
edit User_Grp_1
set member User_2 User_3 Radius_2 LDAP_1
set profile strict
end
This example shows how to display the list of configured user groups.
get user group
This example shows how to display the settings for the user group User_Grp_1.
get user group User_Grp_1
This example shows how to display the configuration for all the user groups.
show user group
This example shows how to display the configuration for the user group User_Grp_1.
show user group User_Grp_1
Command History
FortiOS v2.80 Revised.
FortiOS v2.80 MR3 Added profile keyword.
Related Commands
• config user ldap
• config user local
• config user peer
• config user peergrp
• config user radius
ldap
Use this command to add or edit the information used for LDAP authentication.
To authenticate with the FortiGate unit, the user enters a user name and password. The FortiGate unit
sends this user name and password to the LDAP server. If the LDAP server can authenticate the user,
the user is successfully authenticated with the FortiGate unit. If the LDAP server cannot authenticate
the user, the connection is refused by the FortiGate unit.
The FortiGate unit supports LDAP protocol functionality defined in RFC2251 for looking up and
validating user names and passwords. FortiGate LDAP supports all LDAP servers compliant with
LDAP v3.
FortiGate LDAP support does not extend to proprietary functionality, such as notification of password
expiration, that is available from some LDAP servers. FortiGate LDAP support does not supply
information to the user about why authentication failed.
LDAP user authentication is supported for PPTP, L2TP, IPSec VPN, and firewall authentication. With
PPTP, L2TP, and IPSec VPN, PAP (Packet Authentication Protocol) is supported and CHAP
(Challenge Handshake Authentication Protocol) is not.
Example
This example shows how to add an LDAP server called LDAP1 using the IP address 23.64.67.44,
the default port, the common name cn, and the distinguished names
ou=marketing,dc=fortinet,dc=com.
config user ldap
edit LDAP1
set server 23.64.67.44
set cnid cn
set dn ou=marketing,dc=fortinet,dc=com
end
This example shows how to change the distinguished name in the example above to
ou=accounts,ou=marketing,dc=fortinet,dc=com.
config user ldap
edit LDAP1
set dn ou=accounts,ou=marketing,dc=fortinet,dc=com
end
This example shows how to display the list of configured LDAP servers.
get user ldap
This example shows how to display the settings for the LDAP server LDAP1.
get user ldap LDAP1
This example shows how to display the configuration for all the LDAP servers.
show user ldap
This example shows how to display the configuration for the LDAP server LDAP1.
show user ldap LDAP1
Command History
FortiOS v2.80 Revised.
Related Commands
• config user group
• config user local
• config user peer
• config user peergrp
• config user radius
local
Use this command to add local user names and configure user authentication for the FortiGate unit. To
add authentication by LDAP or RADIUS server you must first add servers using the config user
ldap and config user radius commands.
Example
This example shows how to add and enable a local user called Admin7 for authentication using the
RADIUS server RAD1, with the provision to try other RADIUS servers if unable to contact RAD1.
config user local
edit Admin7
set status enable
set type radius
set radius_server RAD1
set try_other enable
end
This example shows how to change the authentication method for the user Admin7 to password and
enter the password.
config user local
edit Admin7
set type password
set passwd abc123
end
This example shows how to display the list of configured local user names.
get user local
This example shows how to display the settings for the local user Admin7.
get user local Admin7
This example shows how to display the configuration for all local user names.
show user local
This example shows how to display the configuration for the local user Admin7.
show user local Admin7
Command History
FortiOS v2.80 Revised.
FortiOS v2.80 MR2 Removed try_other keyword.
Related Commands
• config user group
• config user ldap
• config user peer
• config user peergrp
• config user radius
peer
Use this command to add or edit peer (digital certificate holder) information. You use the peers you
define here in the config vpn ipsec phase1 command if you specify peertype as peer. Also,
you can add these peers to peer groups you define in the config user peergrp command.
This command refers to certificates imported into the FortiGate unit. You import CA certificates using
the execute vpn certificate ca import command. You import local certificates using the
execute vpn certificate key import or execute vpn certificate local import
commands.
Example
This example shows how to add the branch_office peer.
Configure the peer using the CA certificate name and peer information:
config user peer
edit branch_office
set ca CA_Cert_1
set cn [email protected]
set cn-type email
end
Command History
FortiOS v2.80 MR2 New.
Related Commands
• config user peergrp
• config vpn ipsec phase1
• execute vpn certificate ca
• execute vpn certificate key
• execute vpn certificate local
peergrp
Use this command to add or edit a peer group. Peers are digital certificate holders defined using the
config user peer command. You use the peer groups you define here in the config vpn ipsec
phase1 command if you specify peertype as peergrp.
Example
This example shows how to add peers to the peergrp EU_branches.
config user peergrp
edit EU_branches
set member Sophia_branch Valencia_branch Cardiff_branch
end
This example shows how to display the list of configured peer groups.
get user peergrp
This example shows how to display the settings for the peergrp EU_branches.
get user peergrp EU_branches
This example shows how to display the configuration for all the peers groups.
show user peergrp
This example shows how to display the configuration for the peergrp EU_branches.
show user peergrp EU_branches
Command History
FortiOS v2.80 MR2 New.
Related Commands
• config user peer
• config vpn ipsec phase1
radius
Use this command to add or edit the information used for RADIUS authentication.
The default port for RADIUS traffic is 1812. If your RADIUS server is using a different port you can
change the default RADIUS port. See config system global, and set “radius_port
<port_integer>” on page 246.
Example
This example shows how to add the radius server RAD1 at the IP address 206.205.204.203 and set
the shared secret as R1a2D3i4U5s.
config user radius
edit RAD1
set server 206.205.204.203
set secret R1a2D3i4U5s
end
This example shows how to display the list of configured RADIUS servers.
get user radius
This example shows how to display the settings for the RADIUS server RAD1.
get user radius RAD1
This example shows how to display the configuration for all the RADIUS servers.
show user radius
This example shows how to display the configuration for the RADIUS server RAD1.
show user radius RAD1
Command History
FortiOS v2.80 Revised.
Related Commands
• config user group
• config user ldap
• config user local
• config system global, set radius_port
config vpn
ipsec concentrator
ipsec manualkey
ipsec phase1
ipsec phase2
ipsec vip
l2tp
pinggen
pptp
ipsec concentrator
Use this command to add IPSec phase 2 configurations (IPSec VPN tunnels) to a VPN concentrator.
The VPN concentrator collects hub-and-spoke tunnels into a group. The concentrator allows VPN
traffic to pass from one tunnel to the other through the FortiGate unit. The FortiGate unit functions as a
concentrator, or hub, in a hub-and-spoke network.
Example
Use the following commands to add an IPSec VPN concentrator named Concen_1 and add three
tunnels to the concentrator.
config vpn ipsec concentrator
edit Concen_1
set member Tunnel_1 Tunnel_2 Tunnel_3
end
This example shows how to remove all tunnels assigned to an IPSec VPN concentrator named
Concen_1.
config vpn ipsec concentrator
unset member
end
This example shows how to display the settings for the Concen_1 concentrator.
get vpn ipsec concentrator Concen_1
This example shows how to display the configuration for the vpn ipsec concentrator command.
show vpn ipsec concentrator
Command History
FortiOS v2.80 Revised
FortiOS v2.80 MR4 Method for adding concentrators changed
Related Commands
• config vpn ipsec phase1
• config vpn ipsec phase2
ipsec manualkey
Use this command to configure manual key IPSec VPN tunnels.
Configure a manual key tunnel to create an IPSec VPN tunnel between the FortiGate unit and a
remote IPSec VPN client or gateway that is also using manual key. A manual key VPN tunnel consists
of a name for the tunnel, the IP address of the VPN gateway or client at the opposite end of the tunnel,
and the encryption and authentication algorithms to use for the tunnel. Because the keys are created
when you configure the tunnel, no negotiation is required for the VPN tunnel to start. However, the
VPN gateway or client that connects to this tunnel must use the same encryption and authentication
algorithms and must have the same encryption and authentication keys.
Example
Use the following command to add an IPSec VPN manual key tunnel with the following characteristics:
• Tunnel name: Manual_Tunnel
• Local SPI: 1000ff
• Remote SPI: 2000ff
• Remote gateway IP address: 206.37.33.45
• Encryption algorithm: 3DES
• Encryption keys: 003f2b01a9002f3b 004f4b0209003f01 3b00f23bff003eff
• Authentication algorithm: MD5
• Authentication keys: ff003f012ba900bb 00f402303f0100ff
config vpn ipsec manualkey
edit Manual_Tunnel
set localspi 1000ff
set remotespi 2000ff
set gateway 206.37.33.45
set encryption 3des
set enckey 003f2b01a9002f3b-004f4b0209003f01-3b00f23bff003eff
set authentication md5
set authkey ff003f012ba900bb-00f402303f0100ff
end
This example shows how to display the settings for the vpn ipsec manualkey command.
get vpn ipsec manualkey
This example shows how to display the settings for the Manual_tunnel manual key configuration.
get vpn ipsec manualkey Manual_Tunnel
This example shows how to display the configuration for the vpn ipsec manualkey command.
show vpn ipsec manualkey
Command History
FortiOS v2.80 Revised
FortiOS v2.80 MR3 concentrator keyword available in NAT/Route mode only.
Related Commands
• config vpn ipsec phase2
ipsec phase1
Use this command to add or edit IPSec phase 1 configurations.
When you add a phase 1 configuration, you define how the FortiGate unit and a remote VPN peer
(gateway or client) authenticate themselves to each other as part of establishing an IPSec VPN tunnel.
The phase 1 configuration specifies the name of a remote VPN peer, the nature of the connection
(static IP, dialup, or dynamic DNS), the encryption and authentication keys for the phase 1 proposal,
and the authentication method (preshared key or certificate). For authentication to be successful, the
FortiGate unit and the remote VPN peer must be configured with compatible phase 1 settings.
You can change all settings except the type setting after you define the configuration: if the address
type of a remote peer changes, you must delete the original phase 1 configuration and define a new
one. As a general rule, create only one phase 1 configuration per remote VPN peer.
Example
Use the following command to add an IPSec VPN phase 1 configuration with the following
characteristics:
• Phase 1 configuration name: Simple_GW
• Remote peer address type: Dynamic
• Encryption and authentication proposal: des-md5
• Authentication method: psk
• Pre-shared key: Qf2p3O93jIj2bz7E
• Mode: aggressive
• Dead Peer Detection: disable
config vpn ipsec phase1
edit Simple_GW
set Type dynamic
set proposal des-md5
set authmethod psk
set psksecret Qf2p3O93jIj2bz7E
set mode aggressive
set dpd disable
end
This example shows how to display the settings for the vpn ipsec phase1 command.
get vpn ipsec phase1
This example shows how to display the settings for the Simple_GW Phase 1 configuration.
get vpn ipsec phase1 Simple_GW
This example shows how to display the configuration for the vpn ipsec phase1 command.
show vpn ipsec phase1
Command History
FortiOS v2.80 Revised
FortiOS v2.80 MR2 Added two new parameters to the peertype keyword {peer | peergrp}.
Added two new keywords: peer and peergrp.
Related Commands
• config vpn ipsec phase2
• config user group
• config user local
• config user peer
• config user peergrp
• config user radius
• vpn certificate local
• vpn certificate ca
ipsec phase2
Use this command to add or edit an IPSec VPN phase 2 configuration. The FortiGate unit uses the
phase 2 configuration to create and maintain an IPSec VPN tunnel with a remote VPN peer (the VPN
gateway or client). The phase 2 configuration consists of a name for the VPN tunnel, the name or
names of already configured phase 1 remote gateways, the proposal settings (encryption and
authentication algorithms) and DH group used for phase 2. For phase 2 to be successful, the FortiGate
unit and the remote VPN peer must be configured with compatible proposal settings.
Example
Use the following command to add a phase 2 configuration with the following characteristics:
• Name: New_Tunnel
• Phase 1 name: Simple_GW
• Encryption and authentication proposal: 3des-sha1 aes256-sha1 des-md5
• Keylife type: seconds
• Keylife seconds: 18001
• Diffie-Hellman group: 2
• Replay detection: enable
• Perfect forward secrecy: enable
• Keepalive: enable
Command History
FortiOS v2.80 Revised
FortiOS v2.80 MR3 concentrator keyword available in NAT/Route mode only.
FortiOS v2.80 MR7 wildcardid keyword removed.
selector keyword and associated srcaddr, dstaddr, protocol,
srcport, and dstport keywords added.
single-source keyword added.
Related Commands
• config vpn ipsec phase1
• config alertemail filter
• config alertemail setting
• config firewall policy
ipsec vip
A FortiGate unit can act as a proxy by answering ARP requests locally and forwarding the associated
traffic to the intended destination host over an IPSec VPN tunnel. The feature is intended to enable
IPSec VPN communications between two hosts that coordinate the same private address space on
physically separate networks. The IP addresses of both the source host and the destination host must
be unique. The ipsec vip command lets you specify the IP addresses that can be accessed at the
remote end of the VPN tunnel. You must configure IPSec virtual IP (VIP) addresses at both ends of the
IPSec VPN tunnel.
Adding an IPSec VIP entry to the VIP table enables a FortiGate unit to respond to ARP requests
destined for remote servers and route traffic to the intended destinations automatically. Each IPSec
VIP entry is identified by an integer. An entry identifies the name of the FortiGate interface to the
destination network, and the IP address of a destination host on the destination network. Specify a VIP
address for every host that needs to be accessed on the other side of the tunnel—you can define a
maximum of 32 IPSec VIP addresses on the same interface.
Note: The interface to the destination network must be associated with a VPN tunnel through a firewall encryption
policy (action must be set to encrypt). The policy determines which VPN tunnel will be selected to forward
traffic to the destination. When you create IPSec VIP entries, check the encryption policy on the FortiGate
interface to the destination network to ensure that it meets your requirements.
Example
The following commands add IPSec VIP entries for two remote hosts that can be accessed by a
FortiGate unit through an IPSec VPN tunnel on the external interface of the FortiGate unit. Similar
commands must be entered on the FortiGate unit at the other end of the IPSec VPN tunnel.
config vpn ipsec vip
edit 1
set ip 192.168.12.1
set out-interface external
next
edit 2
set ip 192.168.12.2
set out-interface external
end
Note: Typing next lets you define another VIP address without leaving the vip shell.
This example shows how to display the settings for the vpn ipsec vip command.
get vpn ipsec vip
This example shows how to display the settings for the VIP entry named 1.
get vpn ipsec vip 1
This example shows how to display the current configuration of all existing VIP entries.
show vpn ipsec vip
Command History
FortiOS v2.80 MR4 New
Related Commands
• config vpn ipsec phase1
• config vpn ipsec phase2
l2tp
Use this command to enable L2TP and specify a local address range to reserve for remote L2TP
clients. When a remote L2TP client connects to the internal network through a L2TP VPN, the client is
assigned an IP address from the specified range.
L2TP clients must authenticate with the FortiGate unit when a L2TP session starts. To support L2TP
authentication on the FortiGate unit, you must define the L2TP users who need access and then add
them to a user group. For more information, see “config user group” on page 300, “config user ldap” on
page 302, “config user local” on page 304, and “config user radius” on page 310.
You need to define a firewall policy to control services inside the L2TP tunnel. For more information,
see “config firewall” on page 63. When you define the firewall policy:
• Create an external -> internal policy.
• Set the source address to match the L2TP address range.
• Set the destination address to reflect the private address range of the internal network behind the
local FortiGate unit.
• Set the policy service(s) to match the type(s) of traffic that L2TP users may generate.
• Set the policy action to accept.
• Enable NAT if required.
Note: The first time you configure the L2TP address range you must enter a starting IP, an ending IP, and a user
group.
Note: You can configure L2TP VPNs on FortiGate units that run in NAT/Route mode.
Example
This example shows how to enable L2TP and set the L2TP address range for the first time using a
starting address of 192.168.1.150, an ending address of 192.168.1.160 and an existing group of
L2TP users named L2TP_users:
config vpn l2tp
set sip 192.168.1.150
set eip 192.168.1.160
set status enable
set usrgrp L2TP_users
end
This example shows how to display the settings for the vpn l2tp command.
get vpn l2tp
This example shows how to display the configuration for the vpn l2tp command.
show vpn l2tp
Command History
FortiOS v2.80 Revised
Related Commands
• config user group
• config firewall policy
pinggen
Use this command to generate periodic traffic on one or two VPN tunnels.
The ping generator generates traffic in an IPSec VPN tunnel to keep the tunnel connection open at
times when no traffic is being generated inside the tunnel. For example, the ping generator is useful in
scenarios where a dialup client or dynamic DNS peer connects from an IP address that changes
periodically—traffic may be suspended while the IP address changes. You may also use the ping
generator to trouble-shoot network connectivity inside a VPN tunnel.
You can configure settings to generate traffic through two tunnels simultaneously. The ping interval is
fixed at 40 seconds.
The source and destination IP addresses refer to the source and destination addresses of IP packets
that are to be transported through the VPN. When source and destination addresses of 0.0.0.0 are
specified, no ping traffic is generated between the source and destination.
Example
This example shows how to enable the generation of traffic between a local computer at IP address
192.168.20.1 and a remote computer at IP address 172.16.2.12. The computers communicate
through an IPSec VPN.
config vpn pinggen
set src 192.168.20.1
set dst 172.16.2.12
set status enable
end
This example shows how to display the settings for the vpn pinggen command.
get vpn pinggen
This example shows how to display the configuration for the vpn pinggen command.
show vpn pinggen
Command History
FortiOS v2.80 Revised
Related Commands
• config vpn ipsec phase2
pptp
Use this command to enable PPTP and specify a local address range to reserve for remote PPTP
clients. When a remote PPTP client connects to the internal network through a PPTP VPN, the client is
assigned an IP address from the specified range.
PPTP clients must authenticate with the FortiGate unit when a PPTP session starts. To support PPTP
authentication on the FortiGate unit, you must define the PPTP users who need access and then add
them to a user group. For more information, see “config user group” on page 300, “config user ldap” on
page 302, “config user local” on page 304, and “config user radius” on page 310.
You need to define a firewall policy to control services inside the PPTP tunnel. For more information,
see “config firewall” on page 63. When you define the firewall policy:
• Create an external -> internal policy.
• Set the source address to match the PPTP address range.
• Set the destination address to reflect the private address range of the internal network behind the
local FortiGate unit.
• Set the policy service(s) to match the type(s) of traffic that PPTP users may generate.
• Set the policy action to accept.
• Enable NAT if required.
Note: The first time you configure the PPTP address range you must enter a starting IP, an ending IP, and a user
group.
Note: You can configure PPTP VPNs on FortiGate units that run in NAT/Route mode.
Example
This example shows how to enable PPTP and set the PPTP address range for the first time using a
starting address of 192.168.1.100, an ending address of 192.168.1.130 and an existing group of
PPTP users named PPTP_users:
config vpn pptp
set sip 192.168.1.100
set eip 192.168.1.130
set status enable
set usrgrp PPTP_users
end
This example shows how to display the settings for the vpn pptp command.
get vpn pptp
This example shows how to display the configuration for the vpn pptp command.
show vpn pptp
Command History
FortiOS v2.80 Revised
Related Commands
• config user group
• config firewall policy
config webfilter
bword
catblock
script
urlblock
urlexm
urlpat
bword
Use this command to add or edit and configure options for the Web content block list.
You can add one or more banned words to block Web pages containing those words. Banned words
can be one word or a text string up to 80 characters long. The maximum number of banned words and
patterns in the list is 32. The FortiGate unit blocks Web pages containing banned words and displays a
replacement message instead.
If you enter a single word, the FortiGate unit blocks all Web pages that contain that word. You can add
phrases by enclosing the phrase in ‘single quotes’. If you enter a phrase, the FortiGate unit blocks all
Web pages containing any word in the phrase. You can add exact phrases by enclosing the phrases in
“quotation marks”. If you enclose the phrase in quotation marks, the FortiGate unit blocks all Web
pages containing the exact phrase.
You can create banned word patterns using wildcards or Perl regular expressions. See “Using Perl
regular expressions” on page 28.
Note: Perl regular expression patterns are case sensitive for Web Filter content block. To make a word or phrase
case insensitive, use the regular expression /i. For example, /bad language/i blocks all instances of bad
language regardless of case. Wildcard patterns are not case sensitive.
Example
This example shows how to add the exact phrase “free credit report” to the Web content block list,
enable it, and set the language (character set) as Western.
config webfilter bword
edit “free credit report”
set status enable
set lang Western
end
This example shows how to display the webfilter banned word list.
get webfilter bword
This example shows how to display the settings for the banned word badword.
get webfilter bword badword
This example shows how to display the configuration for the entire banned word list.
show webfilter bword
If the show command returns you to the prompt, there are no banned words in the list.
This example shows how to display the configuration for the banned word badword.
show webfilter bword badword
Command History
FortiOS v2.80 Substantially revised.
Related Commands
• webfilter catblock
• webfilter script
• webfilter urlblock
• webfilter urlexm
• webfilter urlpat
catblock
Use this command to configure Web filtering by specific categories using FortiGuard URL filtering.
FortiGuard licensing
Every FortiGate unit comes with a free 30 day FortiGuard trial license. FortiGuard license
management is done by the FortiGuard server, so there is no need to enter a license number. The
FortiGate unit automatically contacts the FortiGuard servers when you enable FortiGuard category
blocking.
When you want to renew your FortiGuard license after the free trial, contact Fortinet Technical
Support.
FortiGuard configuration
Once enabled, FortiGuard category block settings apply globally. After enabling FortiGuard you can
configure different categories for each firewall protection profile you create.
See “config firewall profile” on page 84 to configure FortiGuard category blocking in a protection
profile.
See “FortiGuard categories” in the FortiGate Administration Guide for a complete list and description of
the FortiGuard web filter categories.
Example
This example shows how to enable FortiGuard category blocking with cache enabled and a TTL of 30
minutes (1800 seconds).
config webfilter catblock
set status enable
set service fortiguard
set cache enable
set cache_ttl 1800
end
This example shows how to display the catblock settings.
get webfilter catblock
This example shows how to display the configuration for the catblock settings.
show webfilter catblock
If the show command returns you to the prompt, the settings are at default.
Command History
FortiOS v2.80 New.
FortiOS v2.80 MR2 Added cerb_hostname, cerb_port, ftgd_hostname, and ftgd_port keywords.
Changed license to cerb_license.
FortiOS v2.80 MR4 Removed cerb_hostname, cerb_license, and cerb_port keywords.
Removed ftgd_port keyword.
FortiOS v2.80 MR8 Added spamfsurl for the FortiShield spam filter URL blacklist to imap, pop3, and smtp
keywords. Added the rate_image_urls setting to the cat_options keyword.
Related Commands
• config firewall profile
• config webfilter bword
• config webfilter script
• config webfilter urlblock
• config webfilter urlexm
• config webfilter urlpat
script
Use this command to configure the FortiGate unit to block Java applets, cookies, ActiveX controls, or
scripts from Web pages.
Note: Blocking any of these items may prevent some Web pages from functioning and displaying correctly.
Example
This example shows how to configure the FortiGate unit to block Web pages containing ActiveX
controls and Java applets.
config webfilter script
set filter activex java
end
This example shows how to display the script settings.
get webfilter script
This example shows how to display the configuration for the script settings.
show webfilter script
If the show command returns you to the prompt, the settings are at default.
Command History
FortiOS v2.80 Revised.
FortiOS v2.80 MR6 Removed script variable from filter keyword. No change in functionality.
Related Commands
• webfilter bword
• webfilter catblock
• webfilter urlblock
• webfilter urlexm
• webfilter urlpat
urlblock
Use this command to block access to specific URLs by adding them to the URL block list. The
FortiGate unit blocks Web pages matching any specified URLs and displays a replacement message
instead.
You can configure the FortiGate unit to block all pages on a website by adding the top-level URL or IP
address. You can also block individual pages on a website by including the full path and filename of
the web page to block.
Type a top-level URL or IP address to block access to all pages on a website. For example,
www.badsite.com or 122.133.144.155 blocks access to all pages at this website.
Type a top-level URL followed by the path and filename to block access to a single page on a website.
For example, www.badsite.com/news.html or 122.133.144.155/news.html blocks the news
page on this website.
To block all pages with a URL that ends with badsite.com, add badsite.com to the block list. For
example, adding badsite.com blocks access to www.badsite.com, mail.badsite.com,
www.finance.badsite.com, and so on.
Example
This example shows how to add the Web page www.badsite.com to the URL block list and enable
URL blocking for this site.
config webfilter urlblock
edit www.badsite.com
set status enable
end
This example shows how to display the webfilter URL block list.
get webfilter urlblock
This example shows how to display the settings for the URL www.badsite.com.
get webfilter urlblock www.badsite.com
This example shows how to display the configuration for the entire URL block list.
show webfilter urlblock
If the show command returns you to the prompt, there are no URLs in the list.
This example shows how to display the configuration for the URL www.badsite.com.
show webfilter urlblock www.badsite.com
Command History
FortiOS v2.80 Substantially revised
Related Commands
• webfilter bword
• webfilter catblock
• webfilter script
• webfilter urlexm
• webfilter urlpat
urlexm
Use this command to configure specific URLs as exempt from any of the Web Filtering block lists. You
can configure the URL exempt list with trusted URLs that you do not want to be subject to any
blocking. The URL exempt list functions the same way as the URL block list.
Example
Use the following commands to enable and add the Web page www.fortinet.com to the URL
exempt list.
config webfilter urlexm
edit www.fortinet.com
set status enable
end
This example shows how to display the webfilter URL exempt list.
get webfilter urlexm
This example shows how to display the settings for the URL www.fortinet.com.
get webfilter urlexm www.fortinet.com
This example shows how to display the configuration for the entire URL exempt list.
show webfilter urlexm
If the show command returns you to the prompt, there are no URLs in the list.
This example shows how to display the configuration for the URL www.fortinet.com.
show webfilter urlexm www.fortinet.com
Command History
FortiOS v2.80 Substantially revised.
Related Commands
• webfilter bword
• webfilter catblock
• webfilter script
• webfilter urlblock
• webfilter urlpat
urlpat
Use this command to block all URLs that match patterns you create using text and regular expressions
(or wildcard characters). For example, badsite.* matches badsite.com, badsite.org,
badsite.net and so on. The FortiGate unit blocks Web pages that match any configured pattern
and displays a replacement message instead.
FortiGate web pattern blocking supports standard regular expressions. You can add up to 20 patterns
to the web pattern block list.
Example
This example shows how to enable and add the pattern badsite.* to the URL block list.
config webfilter urlpat
edit badsite.*
set status enable
end
This example shows how to display the webfilter URL pattern block list.
get webfilter urlpat
This example shows how to display the settings for the URL pattern www.badsite.*.
get webfilter urlpat www.badsite.*
This example shows how to display the configuration for the entire URL pattern block list.
show webfilter urlpat
If the show command returns you to the prompt, there are no URL patterns in the list.
This example shows how to display the configuration for the URL pattern www.badsite.*.
show webfilter urlpat www.badsite.*
Command History
FortiOS v2.80 New.
Related Commands
• webfilter bword
• webfilter catblock
• webfilter script
• webfilter urlblock
• webfilter urlexm
execute
backup ping6
date reboot
dhcpclear restore
enter router restart
factoryreset router restart-graceful
formatlogdisk shutdown
ha manage time
ha synchronize traceroute
modem dial update_now
modem hangup vpn certificate ca
ping vpn certificate key
ping-options vpn certificate local
backup
Backup the FortiGate configuration file or IPS user defined signatures file to a TFTP server.
Command syntax
execute backup allconfig <filename_str> <tftp-server_ipv4> <password_str>
execute backup config <filename_str> <tftp-server_ipv4>
execute backup ipsuserdefsig <filename_str> <tftp-server_ipv4>
Example
This example shows how to backup a system configuration file from the FortiGate unit to a TFTP
server. The name to give the configuration file on the TFTP sever is fgt.cfg. The IP address of the
TFTP server is 192.168.1.23.
execute backup config fgt.cfg 192.168.1.23
Command History
FortiOS v2.80 Revised.
Related Commands
• execute restore
• config ips custom
date
Get or set the system date.
Command syntax
execute date [<date_str>]
date_str has the form mm/dd/yyyy, where
• mm is the month and can be 01 to 12
• dd is the day of the month and can be 01 to 31
• yyyy is the year and can be 2001 to 2100
If you do not specify a date, the command returns the current system date.
Example
This example sets the date to 17 September 2004:
execute date 09/17/2004
Command History
FortiOS v2.80 MR4 New.
dhcpclear
Clear the DHCP IP/MAC binding table.
Command syntax
execute dhcpclear
Command History
FortiOS v2.80 MR2 New.
Related Commands
• config system dhcp server
• config system dhcp ipmacbinding
enter
Use this command to switch to the named virtual domain.
Command syntax
execute enter <virtual-domain-name_str>
Example
This example shows how to switch to the virtual domain called Client2.
execute enter Client2
Command History
FortiOS v2.80 New.
Related Commands
• config system vdom
factoryreset
Reset the FortiGate configuration to factory default settings.
Command syntax
execute factoryreset
Caution: This procedure deletes all changes that you have made to the FortiGate configuration and reverts the
! system to its original configuration, including resetting interface addresses.
Command History
FortiOS v2.80 Unchanged.
Related Commands
• execute backup
• execute reboot
formatlogdisk
Format the FortiGate hard disk to enhance performance for logging.
Command syntax
execute formatlogdisk
! Caution: This operation will erase all quarantine files and logging data on the hard disk.
Command History
FortiOS v2.80 Unchanged.
ha manage
Use this command from the CLI of the primary unit in an HA cluster to connect to the CLI of another
unit in the cluster.
Command syntax
execute ha manage <cluster-member_integer>
Example
This example shows how to connect to a subordinate unit in a cluster of three FortiGate units.
execute ha manage ?
<1> Subsidary unit FPS3012803021709
<2> Subsidary unit FPS3082103021989
Type 2 and press enter to connect to the second unit in the list. The CLI prompt changes to the host
name of this unit. To return to the primary unit, type exit.
Command History
FortiOS v2.80 Unchanged.
Related Commands
• execute ha synchronize
• config system ha
ha synchronize
Use this command from a subordinate HA unit in an HA cluster to manually synchronize its
configuration with the primary unit. Using this command you can synchronize the following:
• Configuration changes made to the primary unit (normal system configuration, firewall
configuration, VPN configuration and so on stored in the FortiGate configuration file),
• Antivirus engine and antivirus definition updates received by the primary unit from the FortiProtect
Distribution Network (FDN),
• IPS attack definition updates received by the primary unit from the FDN,
• Web filter lists added to or changed on the primary unit,
• Email filter lists added to or changed on the primary unit,
• Certification Authority (CA) certificates added to the primary unit,
• Local certificates added to the primary unit.
You can also use the start and stop keywords to force the cluster to synchronize its configuration or
to stop a synchronization process that is in progress.
Command syntax
execute ha synchronize {config| avupd| attackdef| weblists| emaillists|
ca| localcert| all | start | stop}
Example
From the CLI on a subordinate unit, use the following commands to synchronize the antivirus and
attack definitions on the subordinate FortiGate unit with the primary unit after the FDN has pushed new
definitions to the primary unit.
execute ha synchronize avupd
execute ha synchronize attackdef
Command History
FortiOS v2.80 Unchanged.
FortiOS v2.80 MR6 Added start and stop keywords.
Related Commands
• execute ha manage
• config system ha
modem dial
Dial the modem.
The dial command dials the accounts configured in config system modem until it makes a
connection or it has made the maximum configured number of redial attempts.
This command applies only to models 50A, 60, 60M and 60-WiFi and is effective only if the modem is
in Standalone mode.
Command syntax
execute modem dial
Command History
FortiOS v2.80 New
Related Commands
• config system modem
• execute modem hangup
modem hangup
Hang up the modem.
This command applies only to models 50A, 60, 60M and 60-WiFi and is effective only if the modem is
in Standalone mode.
Command syntax
execute modem hangup
Command History
FortiOS v2.80 New
Related Commands
• config system modem
• execute modem dial
ping
Send an ICMP echo request (ping) to test the network connection between the FortiGate unit and
another network device.
Command syntax
execute ping {<address_ipv4> | <host-name_str>}
Example
This example shows how to ping a host with the IP address 192.168.1.23.
execute ping 192.168.1.23
Command History
FortiOS v2.80 Unchanged.
Related Commands
• execute ping6
• execute traceroute
ping-options
Set ICMP echo request (ping) options to control the way ping tests the network connection between
the FortiGate unit and another network device.
Syntax description
Keyword Description Default Availability
data-size <byte_integer> Specify the datagram size in bytes. 56 All models.
df-bit {yes | no} Set df-bit to yes to prevent the ICMP packet from no All models.
being fragmented. Set df-bit to no to allow the
ICMP packet to be fragmented.
pattern <2-byte_hex> Used to fill in the optional data buffer at the end of the No All models.
ICMP packet. The size of the buffer is specified using default.
the data_size parameter. This allows you to send
out packets of different sizes for testing the effect of
packet size on the connection.
repeat-count Specify how many times to repeat ping. 5 All models.
<repeat_integer>
source {auto | <source- Specify the FortiGate interface from which to send auto All models.
intf_ip>} the ping. If you specify auto, the FortiGate unit
selects the source address and interface based on
the route to the <host-name_str> or <host_ip>.
Specifying the IP address of a FortiGate interface
tests connections to different network segments from
the specified interface.
timeout <seconds_integer> Specify, in seconds, how long to wait until ping times 2 All models.
out.
tos Set the ToS (Type of Service) field in the packet default/ All models.
{default | lowcost | header to provide an indication of the quality of 0
lowdelay | reliability | service wanted.
throughput} • lowdelay = minimize delay
• throughput = maximize throughput
• reliability = maximize reliability
• lowcost = minimize cost
• default = 0
ttl <ttl_integer> Specify the time to live. Time to live is the number of 64 All models.
hops the ping packet should be allowed to make
before being discarded or returned.
validate-reply {yes | no} Select yes to validate reply data. no All models.
view-settings Display the current ping-option settings. No All models.
default
Example
Use the following command to increase the number of pings sent.
execute ping-options repeat-count 10
Use the following command to send all pings from the FortiGate interface with IP address
192.168.10.23.
execute ping-options source 192.168.10.23
Command History
FortiOS v2.80 Unchanged.
Related commands
• execute ping
• execute ping6
• execute traceroute
ping6
Send an ICMP echo request (ping) to test the network connection between the FortiGate unit and an
IPv6 capable network device.
Command syntax
execute ping6 {<address_ipv6> | <host-name_str>}
Example
This example shows how to ping a host with the IPv6 address
12AB:0:0:CD30:123:4567:89AB:CDEF.
execute ping 12AB:0:0:CD30:123:4567:89AB:CDEF
Command History
FortiOS v2.80 New.
Related Commands
• execute ping
• execute ping-options
• execute traceroute
reboot
Restart the FortiGate unit.
Command syntax
execute reboot
Command History
FortiOS v2.80 Unchanged.
Related Commands
• execute backup
• execute factoryreset
restore
Use this command to restore a backup configuration, to change the FortiGate firmware, or to restore
an IPS custom signature file.
Command syntax
execute restore allconfig <filename_str> <tftp-server_ipv4>
<password_str>
execute restore config <filename_str> <tftp-server_ipv4>
execute restore image <filename_str> <tftp-server_ipv4>
execute restore ipsuserdefsig <filename_str> <tftp-server_ipv4>
Example
This example shows how to upload a configuration file from a TFTP server to the FortiGate unit and
restart the FortiGate unit with this configuration. The name of the configuration file on the TFTP server
is backupconfig. The IP address of the TFTP server is 192.168.1.23.
execute restore config backupconfig 192.168.1.23
Command History
FortiOS v2.80 Revised.
Related Commands
• execute backup
• config ips custom
router restart
Use this command to restart the routing software.
Command syntax
execute router restart
Command History
FortiOS v2.80 MR2 New.
Related Commands
• config router ospf
• config router rip
• config router static
• config router static6
• get router info ospf
• get router info protocols
• get router info rip
• get router info routing_table
router restart-graceful
Use this command to restart the RIP daemon without stopping forwarding of RIP routes.
When you use the restart-graceful command, RIP informs its neighbors that it is restarting and
requests a grace period. RIP can still forward traffic during the restart period. This reduces disruption
of the network during the restart period. The duration of the grace period can be 1 to 65535 seconds.
Command syntax
execute router restart-graceful <duration_integer>
Example
This example shows how to restart the RIP demon with a grace period of 120 seconds.
execute router restart-graceful 120
Command History
FortiOS v2.80 New.
Related Commands
• get router info protocols
• get router info rip
• get router info routing_table
• config router rip
shutdown
Shut down the FortiGate unit.
Command syntax
execute shutdown
Command History
FortiOS v2.80 MR8 New.
time
Get or set the system time.
Command syntax
execute time [<time_str>]
time_str has the form hh:mm:ss, where
• hh is the hour and can be 00 to 23
• mm is the minutes and can be 00 to 59
• ss is the seconds and can be 00 to 59
If you do not specify a time, the command returns the current system time.
Example
This example sets the system time to 15:31:03:
execute time 15:31:03
Command History
FortiOS v2.80 MR4 New.
traceroute
Test the connection between the FortiGate unit and another network device, and display information
about the network hops between the device and the FortiGate unit.
Command syntax
execute traceroute {<address_ipv4> | <host-name_str>}
Example
This example shows how to ping a host with the IP address 192.168.1.23.
execute ping 192.168.1.23
Command History
FortiOS v2.80 Unchanged.
Related Commands
• execute ping
• execute ping-options
update_now
Use this command to manually initiate virus and attack definitions and engine updates.
Command syntax
execute update_now
Command History
FortiOS v2.80 Revised.
Related Commands
• config system autoupdate override
• config system autoupdate push-update
• config system autoupdate schedule
• config system autoupdate tunneling
vpn certificate ca
Use this command to import a CA certificate from a TFTP server to the FortiGate unit, or to download
a CA certificate from the FortiGate unit to a TFTP server.
Before using this command you must obtain a CA certificate issued by a CA.
Digital certificates are used to ensure that both participants in an IPSec communications session are
trustworthy, prior to an encrypted VPN tunnel being set up between the participants. The CA certificate
is the certificate that the FortiGate unit uses to validate digital certificates received from other devices.
Note: Digital certificates are not required for configuring FortiGate VPNs. Digital certificates are an advanced
feature provided for the convenience of system administrators. This manual assumes the user has prior
knowledge of how to configure digital certificates for their implementation.
Syntax description
Keyword Description Availability
delete Delete the CA certificate from the FortiGate unit. All models.
<certificate-name_str> Type ? for a list of certificates.
export Export or copy the CA certificate from the FortiGate unit to a All models.
<certificate-name_str> file on a TFTP server. Type ? for a list of certificates.
<file-name_str> <tftp_ip>
import Import the CA certificate from a TFTP server to the FortiGate All models.
<name_str> <tftp_ip> unit.
list List CA certificates All models.
Examples
Use the following command to import the CA certificate named trust_ca to the FortiGate unit from a
TFTP server with the address 192.168.21.54.
execute vpn certificate ca import trust_ca 192.168.21.54
Command History
FortiOS v2.80 MR2 The delete keyword was added.
The download keyword was changed to export.
Related commands
• execute vpn certificate key
• execute vpn certificate local
• config vpn ipsec phase1
Note: Digital certificates are not required for configuring FortiGate VPNs. Digital certificates are an advanced
feature provided for the convenience of system administrators. This manual assumes the user has prior
knowledge of how to configure digital certificates for their implementation.
Syntax description
Keyword Description Availability
delete Enter the name of the local certificate to delete. All models.
<certificate-name_str> Type ? for a list of certificates.
export Enter the name of the local certificate to backup by exporting All models.
<name_str> <filename_str> the certificate to a file on a TFTP server. Enter a name for the
<tftp_ip> <password_str> password protected PKCS12 file. Enter the TFTP server IP
address. Enter a password for the PKCS12 file.
import Enter the name of the certificate to restore. Enter the name of All models.
<name_str> <filename_str> the password protected PKCS12 file. Enter the TFTP server IP
<tftp_ip> <password_str> address. Enter the password for the PKCS12 file.
list List key certificates. All models.
Examples
Use the following command to backup the certificate and keys for the branch_cert local certificate.
The TFTP server address is 192.168.21.54 and the PKCS12 file name and password are
backup_brcrt and aV193bb12.
execute vpn certificate key download branch_cert backup_brcrt
192.168.21.54 aV193bb12
Command History
FortiOS v2.80 MR2 The delete keyword was added.
The download keyword was changed to export.
Related commands
• execute vpn certificate ca
• execute vpn certificate local
• config vpn ipsec phase1
Note: VPN peers must use digital certificates that adhere to the X.509 standard.
Note: Digital certificates are not required for configuring FortiGate VPNs. Digital certificates are an advanced
feature provided for the convenience of system administrators. This manual assumes the user has prior
knowledge of how to configure digital certificates for their implementation.
Syntax description
Keyword Description Availability
delete Enter the name of the local certificate to delete. All models.
<certificate-name_str> Type ? for a list of certificates.
export Export or save the local certificate from the FortiGate unit to a All models.
<certificate-name_str> file on the TFTP server. Type ? for a list of certificates.
<file-name_str> <tftp_ip>
Examples
Use the following command to generate a local certificate request with the name branch_cert, the
domain name www.example.com and a key size of 1536.
set vpn certificates local generate branch_cert www.example.com 1536
Use the following command to download the local certificate request generated in the above example
from the FortiGate unit to a TFTP server. The example uses the file name testcert for the
downloaded file and the TFTP server address 192.168.21.54.
set vpn certificates local download branch_cert testcert 192.168.21.54
Use the following command to import the signed local certificate named branch_cert to the
FortiGate unit from a TFTP server with the address 192.168.21.54.
set vpn certificates local import branch_cert 192.168.21.54
Command History
FortiOS v2.80 MR2 The delete keyword was added.
The download keyword was changed to export.
FortiOS v2.80 MR3 Keywords were removed from the execute vpn certificate local
keyword and replaced with variables.
Related commands
• execute vpn certificate ca
Index
A allconfig
backup 354
abort 18 restore 370
abr-type 151 allow 40
accept-lifetime 148 allowaccess
access-list interface 259
router 140 oobm interface 276
router ospf distribute-list 162 secondaryip 267
router rip distance 180 allowed
router rip offset-list 187 log filter 120
accprofile allow-interface-subnet-overlap 244
system 216 altmode 273
system admin 219 anomaly
action alertemail filter 32
firewall policy 79 ips 108
ips anomaly 109 log filter 120
ips rule 117 area 164
router access-list rule 141
arpforward 259
router prefix-list rule 176
router route-map rule 190 arps 249
spamfilter bword 199 asymroute 244
spamfilter emailbwl 201 attack
spamfilter ipbwl 206 alertemail filter 32
spamfilter mheader 209 log filter 120
spamfilter rbl 212 attackdef 361
address 224 auth
firewall 64 alertemail filter 32
system autoupdate clientoverride 221 log filter 120
system autoupdate override 223 system bug-report 230
system autoupdate tunneling 228 authenticate 36
addrgrp 66 authentication
admin router ospf area 154
alertemail filter 32 router ospf area virtual-link 159
log filter 120 router ospf-interface 166
system 219 system ha 249
admingrp 216 vpn ipsec manualkey 316
Administrator access 13 authentication-key
admintimeout 244 router ospf area virtual-link 159
advertise router ospf-interface 166
router ospf area range 158 authgrp 216
router ospf summary-address 171 authkey 316
agelimit 47 auth-keychain 183
alert-interval 36 authmethod 319
alertmail auth-mode 183
replacement messages 279 authpasswd 319
all 361 auth-string 183
export H
vpn certificate ca 377
vpn certificate key 378 ha
vpn certificate local 379 alertemail filter 33
arps 249
extintf 104
authentication 249
extip 104 encryption 249
extport 104 groupid 249
hb-interval 250
F hb-lost-threshold 250
helo-holddown 251
facility 131 load-balance-all 251
factoryreset 358 log filter 121
failtime 245 mode 252
fieldbody 209 monitor 252
fieldname 209 override 252
filepattern 40 password 252
priority 252
filesize 124
route-hold 253
filter route-ttl 253
alertemail 32 route-wait 254
webfilter script 345 schedule 255
fixedport 80 system ha command 249
fm 241 weight 255
format 278 ha manage 360
formatlogdisk 359 ha synchronize 361
fortilog setting 127 hbdev 251
FortiManager, configuration for 241 hbdev_priority 256
Fortinet documentation 12 hb-interval 250
frequency 226 hb-lost-threshold 250
ftp 86 header 278
replacement messages 279 hello-interval
router ospf area virtual-link 160
fwdintf 239
router ospf ospf-interface 167
helo-holddown 251
G heuristic 45
garbage-timer 179 holddown_timer 273
gateway hostname 245
oobm route 277 http 87
router policy 172 replacement messages 279
router static 192
router static6 194 I
vpn ipsec manualkey 317
icmpcode 99
gbandwidth 80
icmptype 99
ge 176
id (FortiManager) 241
generate 380 idle_timeout 115
geography 295 idle_timer 273
get system performance 242 idle-timeout 262
get system status 243 ie6workaround 245
global 244 image 370
grayware 42 imap 88
group imap_spamaction 88
ips 114 imap_spamtagmsg 88
user 300 imap_spamtagtype 88
groupid 249 import
gwdetect vpn certificate ca 377
system interface 262 vpn certificate key 378
system secondaryip 267 vpn certificate local 380
inbound 80 ippool
infected firewall 74
alertemail filter 33 firewall policy 80
log filter 121 ips 89
information-interval 36 ipsec 33
input_device 172 log filter 122
Interface ipsec concentrator 314
adding to a zone 297 ipsec manualkey 316
interface ipsec phase1 319
firewall ippool 74 ipsec phase2 326
RIP 145 ipsec vip 331
router ospf-interface 167
ipsuserdefsig
router rip distribute-list 181
execute backup 354
router rip offset-list 187
execute restore 370
system 259
system dhcp server 237 ipunnumbered 262
system ipv6tunnel 269 ipv6_tunnel 269
system mac-address-table 271
system modem 273 K
system snmp community hosts 289
keepalive
International characters 27 vpn ipsec phase1 321
internetbrowsing 327 vpn ipsec phase2 327
interval 245 key 295
intrazone 297 key-chain 147
Introduction 9 keylife 321
ip keylife_type 327
firewall ipmacbinding table 72
keylifekbs 327
FortiManager 241
oobm interface 276 keylifeseconds 327
router ospf neighbor 163 key-string 148
router ospf-interface 167
router rip neighbor 185 L
secondary ip 267
l2forward 263
snmp community hosts 289
system dhcp ipmacbinding 234 l2tp 333
system interface 262 language
system manageip 272 spamfilter bword 199
vpn ipsec vip 331 system global 245
IP address formats 27 webfilter bword 340
ip/subnet 207 lcdpin 245
ip_signature 245 lcdprotection 245
ip6 269 lcp-echo-interval 263
ip6-address 262 lcp-max-echo-failures 263
ip6-default-life 262 ldap 302
ip6-hop-limit 262 ldap_server 304
ip6-link-mtu 262 le 176
ip6-manage-flag 262 lease-time 237
ip6-max-interval 262 Line continuation 26
ip6-min-interval 263 list 156
ip6-other-flag 263 list CA certificates 377
ip6-reachable-time 263 list key certificates 378
ip6-retrans-time 263 list local certificates 380
ip6-send-adv 263 listname 182
ipaddress 111 load-balance-all 251
ipbwl 206 local 304
ipmacbinding setting 70 local_anomaly 245
ipmacbinding table 72 localcert 361
localid metric
log fortilog setting 127 router ospf redistribute 169
vpn ipsec phase1 321 router rip redistribute 188
localspi 317 metric-type 169
location 290 mheader 208
log min_ttl 115
ips anomaly 109 mode
ips group 117 antivirus heuristic 45
system interface 263 modem 273
loggrp 217 system console 231
loglocaldeny 246 system ha 252
logtraffic 80 system interface 263
lowspace 47 system ipv6_tunnel 269
system wireless 295
M vpn ipsec phase1 321
modem
mac auto_dial 273
firewall ipmacbinding table 72 dial 363
system dhcp ipmacbinding 234 dial_on_demand 273
macaddr 263 hangup 364
mac-address-table 271 mode 273
mail option for China 273
replacement messages 280 system 273
mail_sig 89 monitor 252
mailsig-status 89 move 17
mailto1 36 mtu
mailto2 36 oobm interface 276
mailto3 36 router ospf-interface 167
manageip 272 system interface 264
management ip, transparent mode 272 mtu-ignore 167
management-vdom 246 multicast-forward 246
mappedip 104 multicast-policy 76
mappedport 104
match-interface 190 N
match-ip-address 190 name
match-ip-nexthop 190 firewall ipmacbinding table 72
match-metric 190 system session-helper 282
match-route-type 190 system snmp community 287
match-tag 190 nat
maxbandwidth 80 firewall multicast-policy 76
maxfilesize 48 firewall policy 80
mc-ttl_notchange 246 natinbound 80
md5-key natip 81
router ospf area virtual-link 160 natoutbound 81
router ospf-interface 167 nattraversal 321
member netbios-forward 264
firewall addrgrp 66 netmask
firewall service group 101 firewall dnstranslation 68
user group 301 system dhcp server 237
user peergrp 308 network-type 167
vpn ipsec concentrator 314
next 18
memfilesizelimit
notification-interval 36
antivirus service ftp 54
antivirus service http 52 nssa-default-information-originate 154
antivirus service imap 58 nssa-default-information-originate-metric 154
antivirus service pop3 56 nssa-default-information-originate-metric-typ 154
antivirus service smtp 60 nssa-redistribution 154
memory setting 129 nssa-translator-role 154
T urlpat 351
use_fpat 48
tag use_status 48
router ospf redistribute 169
username
router ospf summary-address 171
alertemail setting 37
tcp_option 247 system autoupdate tunneling 228
threshold system bug-report 230
ips anomaly 110 system interface 265
ips anomaly limit 111 username1 274
time username2 274
system autoupdate schedule 226
username3 274
time, execute time command 374
Using single quotes to enter tabs or spaces in strings 27
timeout
Using the CLI 13
ping-options 366
system session_ttl port 285 usrgrp
firewall policy 80
timeout-timer 179
vpn ipsec phase1 324
timezone 247 vpn l2tp 334
tos 366 vpn pptp 338
traceroute 375
traffic V
log filter 122
trafficfilter 133 validate-reply 366
trafficshaping 82 valid-life-time 266
transmit-delay vd 269
router ospf area virtual-link 160 vdom
router ospf-interface 168 system 292
trap_v1_lport 287 system interface 265
trap_v1_rport 287 version 179
trap_v1_status 287 view-settings 366
trap_v2c_lport 287 violation
trap_v2c_rport 288 log filter 122
trap_v2c_status 288 vip 103
trusthost1 219 virus 34
log filter 122
trusthost2 219
vlanid 265
trusthost3 219
vpn certificate ca 377
ttl 366
vpn certificate key 378
type
firewall address 65 vpn certificate local 379
firewall vip 104 vpntunnel 82
router ospf area 155
user local 304 W
vpn ipsec phase1 324 warning-interval 37
web 34
U log filter 122
undefinedhost 70 web_content
unit alertemail filter 34
log disk setting 124 log filter 122
vpn certificate local 380 weblists 361
unset 18 webtrends setting 136
update_now 376 weight 255
update-timer 179 where 199
updgrp 217 wildcard 28
url_block wildcard pattern matching 28
alertemail filter 34 wildcardid 330
log filter 122 wins-ip 265
urlblock 347 wins-server1 237
urlexm 349 wins-server2 237
wireless 295 X
mac_filter 293
mac_list 293 xauthtype 324
settings 295
Word boundary
Z
Perl regular expressions 29 zone 297