FortiOS 7.2.8 CLI Reference
FortiOS 7.2.8 CLI Reference
FortiOS 7.2.8
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTIGUARD LABS
https://www.fortiguard.com
FEEDBACK
Email: techdoc@fortinet.com
Change Log 16
FortiOS CLI reference 17
Availability of commands and options 17
Command tree 17
CLI configuration commands 19
alertemail 20
config alertemail setting 20
antivirus 27
config antivirus exempt-list 27
config antivirus profile 28
config antivirus quarantine 58
config antivirus settings 63
application 65
config application custom 65
config application group 66
config application list 67
config application name 76
config application rule-settings 78
authentication 79
config authentication rule 79
config authentication scheme 81
config authentication setting 83
automation 87
config automation setting 87
certificate 88
config certificate ca 88
config certificate crl 89
config certificate local 91
config certificate remote 94
dlp 96
config dlp data-type 96
config dlp dictionary 97
config dlp filepattern 99
config dlp fp-doc-source 102
config dlp profile 105
config dlp sensitivity 110
config dlp sensor 111
config dlp settings 112
dnsfilter 114
config dnsfilter domain-filter 114
config dnsfilter profile 115
dpdk 121
config dpdk cpus 121
config dpdk global 122
This document describes FortiOS 7.2.8 CLI commands used to configure and manage a FortiGate unit from the
command line interface (CLI). For information on using the CLI, see the FortiOS 7.2.8 Administration Guide, which
contains information such as:
l Connecting to the CLI
l CLI basics
l Command syntax
l Subcommands
l Permissions
Some FortiOS CLI commands and options are not available on all FortiGate units. The CLI displays an error message if
you attempt to enter a command or option that is not available. You can use the question mark ‘?’ to verify the commands
and options that are available.
Commands and options may not be available for the following reasons:
FortiGate model
All commands are not available on all FortiGate models. For example, a hardware switch can be configured only on
models which have the corresponding hardware switch chipset.
Hardware configuration
For example, settings like mediatype would only be available on units with SFPs.
Commands for extended functionality are not available on all FortiGate models. The CLI Reference may not include all
commands.
Command tree
Enter tree to display the entire FortiOS CLI command tree. To capture the full output, connect to your device using a
terminal emulation program, such as PuTTY, and capture the output to a log file.
l To view all available commands, enter tree.
l To view a specific configuration branch of a tree, enter tree <branch>, for example: tree system.
Use configuration commands to configure and manage a FortiGate unit from the command line interface (CLI).
The CLI syntax is created by processing the schema from FortiGate models running FortiOS 7.2.8 and reformatting the
resultant CLI output. If you have comments on this content, its format, or requests for commands that are not included,
contact us at techdoc@fortinet.com.
Option Description
Option Description
FIPS-CC-errors Enable/disable FIPS and Common Criteria error logs option - disable
in alert email.
Option Description
enable Enable FIPS and Common Criteria error logs in alert email.
disable Disable FIPS and Common Criteria error logs in alert email.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable Fortinet Advanced Mezzanine Card (AMC) interface bypass mode
logs in alert email.
disable Disable Fortinet Advanced Mezzanine Card (AMC) interface bypass mode
logs in alert email.
Option Description
Option Description
filter-mode How to filter log messages that are sent to alert option - category
emails.
Option Description
Option Description
Option Description
local-disk-usage Disk usage percentage at which to send alert email. integer Minimum 75
value: 1
Maximum
value: 99
Option Description
mailto2 Optional second email address to send alert email to string Maximum
(max. 63 characters). length: 63
mailto3 Optional third email address to send alert email to string Maximum
(max. 63 characters). length: 63
Option Description
Option Description
Option Description
username Name that appears in the From: field of alert emails string Maximum
(max. 63 characters). length: 63
Option Description
Option Description
Option Description
Option Description
analytics- Only submit files matching this DLP file-pattern to integer Minimum 0
accept-filetype FortiSandbox (post-transfer scan only). value: 0
Maximum
value:
4294967295
Option Description
analytics- Do not submit files matching this DLP file-pattern to integer Minimum 0
ignore-filetype FortiSandbox (post-transfer scan only). value: 0
Maximum
value:
4294967295
Option Description
Option Description
Option Description
disable Disable use of EMS threat feed when performing AntiVirus scan.
enable Enable use of EMS threat feed when performing AntiVirus scan.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
log-only Log FortiSandbox inline scan error, but allow the file.
Option Description
analytics- FortiSandbox post-transfer scan: submit supported files and known infected
everything files.
Option Description
log-only Log FortiSandbox inline scan timeout, but allow the file.
Option Description
Option Description
Option Description
legacy Scan archive files only after the entire file is received.
config cifs
Option Description
disable Disable.
Option Description
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
config content-disarm
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
cover-page Enable/disable inserting a cover page into the disarmed option - enable
document.
Option Description
detect-only Enable/disable only detect disarmable files, do not alter option - disable
content.
Option Description
config ftp
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
config http
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable Content Disarm and Reconstruction when performing AntiVirus scan.
enable Enable Content Disarm and Reconstruction when performing AntiVirus scan.
config imap
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
Option Description
executables Treat Windows executable files as viruses for the option - default
purpose of blocking or monitoring.
Option Description
Option Description
disable Disable Content Disarm and Reconstruction when performing AntiVirus scan.
enable Enable Content Disarm and Reconstruction when performing AntiVirus scan.
config mapi
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
executables Treat Windows executable files as viruses for the option - default
purpose of blocking or monitoring.
Option Description
Option Description
quar-src-ip Quarantine all traffic from the infected hosts source IP.
Option Description
config nntp
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
config pop3
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
executables Treat Windows executable files as viruses for the option - default
purpose of blocking or monitoring.
Option Description
Option Description
disable Disable Content Disarm and Reconstruction when performing AntiVirus scan.
enable Enable Content Disarm and Reconstruction when performing AntiVirus scan.
config smtp
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
executables Treat Windows executable files as viruses for the option - default
purpose of blocking or monitoring.
Option Description
Option Description
disable Disable Content Disarm and Reconstruction when performing AntiVirus scan.
enable Enable Content Disarm and Reconstruction when performing AntiVirus scan.
config ssh
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
FortiAnalyzer FortiAnalyzer
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
Option Description
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
https HTTPS.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
https HTTPS.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
lowspace Select the method for handling additional files when option - ovrw-old
running low on disk space.
Option Description
ovrw-old Overwrite the oldest quarantined files. That is, the files that are closest to
being deleted from the quarantine.
quarantine- The amount of disk space to reserve for quarantining integer Minimum 0
quota files. value: 0
Maximum
value:
4294967295
store-blocked Quarantine blocked files found in sessions using the option - imap smtp
selected protocols. pop3 http
ftp nntp
imaps
smtps
pop3s ftps
mapi cifs
ssh
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
ftps FTPS.
mapi MAPI.
Option Description
cifs CIFS.
ssh SSH.
store-infected Quarantine infected files found in sessions using the option - imap smtp
selected protocols. pop3 http
ftp nntp
imaps
smtps
pop3s
https ftps
mapi cifs
ssh
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
https HTTPS.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
store- Quarantine files detected by machine learning found in option - imap smtp
machine- sessions using the selected protocols. pop3 http
learning ftp nntp
imaps
smtps
pop3s
https ftps
mapi cifs
ssh
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
https HTTPS.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
Option Description
Option Description
Option Description
monitor Enable machine learning based malware detection for monitoring only.
override- Override the large file scan timeout value in seconds. integer Minimum 0
timeout Zero is the default value and is used to disable this value: 30
command. When disabled, the daemon adjusts the Maximum
large file scan timeout based on the file size. value: 3600
Option Description
signature The text that makes up the actual custom application var-string Maximum
signature. length: 4095
Option Description
1 Popularity level 1.
2 Popularity level 2.
3 Popularity level 3.
4 Popularity level 4.
5 Popularity level 5.
risk <level> Risk, or impact, of allowing traffic from this integer Minimum
application to occur (1 - 5; Low, Elevated, Medium, value: 0
High, and Critical). Maximum
Risk, or impact, of allowing traffic from this value:
application to occur (1 - 5; Low, Elevated, Medium, 4294967295
High, and Critical).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable forced inclusion of signatures which normally require SSL deep
inspection.
enable Enable forced inclusion of signatures which normally require SSL deep
inspection.
Option Description
Option Description
Option Description
Option Description
skype Skype.
edonkey Edonkey.
Option Description
Option Description
config default-network-services
Option Description
http HTTP.
ssh SSH.
telnet TELNET.
ftp FTP.
dns DNS.
smtp SMTP.
pop3 POP3.
imap IMAP.
snmp SNMP.
nntp NNTP.
https HTTPS.
violation- Action for protocols not in the allowlist for selected option - block
action port.
Option Description
config entries
risk <level> Risk, or impact, of allowing traffic from this integer Minimum
application to occur (1 - 5; Low, Elevated, Medium, value: 0
High, and Critical). Maximum
Risk, or impact, of allowing traffic from this value:
application to occur (1 - 5; Low, Elevated, Medium, 4294967295
High, and Critical).
Option Description
1 Popularity level 1.
2 Popularity level 2.
3 Popularity level 3.
4 Popularity level 4.
5 Popularity level 5.
action Pass or block traffic, or reset connection for traffic option - block
from this application.
Option Description
Option Description
Option Description
Option Description
Option Description
none none
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
config parameters
config members
config metadata
Address name.
Option Description
Option Description
srcaddr Authentication is required for the selected IPv4 source string Maximum
<name> address. length: 79
Address name.
srcaddr6 Authentication is required for the selected IPv6 source string Maximum
<name> address. length: 79
Address name.
Option Description
Option Description
Option Description
web-portal Enable/disable web portal for proxy transparent policy. option - enable
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
cookie-max- Persistent web portal cookie maximum age in minutes. integer Minimum 480
age value: 30
Maximum
value:
10080
cookie- Refresh rate divider of persistent web portal cookie. integer Minimum 2
refresh-div Refresh value = cookie-max-age/cookie-refresh-div. value: 2
Maximum
value: 4
dev-range Address range for the IP based device query. string Maximum
<name> Address name. length: 79
Option Description
Option Description
Option Description
Option Description
max- Maximum number of automation stitches that are integer Minimum 512 **
concurrent- allowed to run concurrently. value: 32
stitches Maximum
value: 1024
**
config certificate ca
CA certificate.
config certificate ca
Description: CA certificate.
edit <name>
set auto-update-days {integer}
set auto-update-days-warning {integer}
set ca {user}
set ca-identifier {string}
set obsolete [disable|enable]
set range [global|vdom]
set scep-url {string}
set source [factory|user|...]
set source-ip {ipv4-address}
set ssl-inspection-trusted [enable|disable]
next
end
config certificate ca
Option Description
disable Alive.
enable Obsolete.
range Either global or VDOM IP address range for the CA option - global
certificate.
Option Description
Option Description
source-ip Source IP address for communications to the SCEP ipv4- Not Specified 0.0.0.0
server. address
Option Description
range Either global or VDOM IP address range for the option - global
certificate.
Option Description
scep-cert Local certificate for SCEP communication for CRL string Maximum Fortinet_
auto-update. length: 35 CA_SSL
Option Description
source-ip Source IP address for communications to a HTTP or ipv4- Not Specified 0.0.0.0
SCEP CA server. address
update- Time in seconds before the FortiGate checks for an integer Minimum 0
interval updated CRL. Set to 0 to update only when it expires. value: 0
Maximum
value:
4294967295
Option Description
renewal Renewal.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
range Either the global or VDOM IP address range for the option - global
remote certificate.
Option Description
Option Description
pattern Regular expression pattern string without look around. string Maximum
length: 255
verify Regular expression pattern string used to verify the string Maximum
data type. length: 255
Option Description
Option Description
config entries
Option Description
Option Description
Option Description
name Name of table containing the file pattern list. string Maximum
length: 63
Option Description
Option Description
xz Match xz files.
Option Description
msoffice Match MS-Office files. For example, doc, xls, ppt, and so on.
msofficex Match MS-Office XML files. For example, docx, xlsx, pptx, and so on.
rm Match rm files.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1001F, FortiGate 101E,
FortiGate 101F, FortiGate 1101E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3001F, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3201F, FortiGate 3301E, FortiGate 3401E,
FortiGate 3501F, FortiGate 3601E, FortiGate 3700D, FortiGate 3701F, FortiGate 401E,
FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4201F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 501E, FortiGate 601E, FortiGate 601F, FortiGate 60F, FortiGate
61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate 80F Bypass,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 901G, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000F, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 1100E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E,
FortiGate 200F, FortiGate 2200E, FortiGate 3000F, FortiGate 300E, FortiGate 3200F,
FortiGate 3300E, FortiGate 3400E, FortiGate 3500F, FortiGate 3600E, FortiGate 3700F,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F,
FortiGate 4200F, FortiGate 4400F, FortiGate 5001E, FortiGate 500E, FortiGate 600E,
FortiGate 600F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E,
FortiGate 80E-POE, FortiGate 80E, FortiGate 80F-POE, FortiGate 80F, FortiGate 900G,
FortiGate 90E, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E.
Create a DLP fingerprint database by allowing the FortiGate to access a file server containing files from which to create
fingerprints.
config dlp fp-doc-source
Description: Create a DLP fingerprint database by allowing the FortiGate to access a
file server containing files from which to create fingerprints.
date Day of the month on which to scan the server. integer Minimum 1
value: 1
Maximum
value: 31
file-path Path on the server to the fingerprint files (max 119 string Maximum
characters). length: 119
file-pattern Files matching this pattern on the server are string Maximum *
fingerprinted. Optionally use the * and ? wildcards. length: 35
keep-modified Enable so that when a file is changed on the server option - enable
the FortiGate keeps the old fingerprint and adds a
new fingerprint to the database.
Option Description
enable Keep the old fingerprint and add a new fingerprint when a file is changed on
the server.
disable Replace the old fingerprint with the new fingerprint when a file is changed on
the server.
password Password required to log into the file server. password Not
Specified
period Frequency for which the FortiGate checks the server option - none
for new or changed files.
Option Description
Option Description
enable Keep the fingerprint database up to date when a file is deleted from the
server.
disable Do not check for deleted files on the server. Saves system resources.
Option Description
enable Keep the fingerprint database up to date when a file is added or changed on
the server.
disable Do not check for added or changed files on the server. Saves system
resources.
Option Description
sensitivity Select a sensitivity or threat level for matches with string Maximum
this fingerprint database. Add sensitivities using length: 35
sensitivity.
server-type Protocol used to communicate with the file server. option - samba
Currently only Samba (SMB) servers are supported.
Option Description
tod-hour Hour of the day on which to scan the server. integer Minimum 1
value: 0
Maximum
value: 23
tod-min Minute of the hour on which to scan the server. integer Minimum 0
value: 0
Maximum
value: 59
username User name required to log into the file server. string Maximum
length: 35
vdom Select the VDOM that can communicate with the file option - mgmt
server.
Option Description
mgmt Communicate with the file server through the management VDOM.
current Communicate with the file server through the VDOM containing this DLP
fingerprint database configuration.
weekday Day of the week on which to scan the server. option - sunday
Option Description
sunday Sunday
monday Monday
tuesday Tuesday
wednesday Wednesday
thursday Thursday
friday Friday
saturday Saturday
Option Description
Option Description
Option Description
Option Description
smtp SMTP.
pop3 POP3.
imap IMAP.
ftp FTP.
nntp NNTP.
mapi MAPI.
cifs CIFS.
Option Description
replacemsg- Replacement message group used by this DLP profile. string Maximum
group length: 35
Option Description
smtp SMTP.
pop3 POP3.
imap IMAP.
Option Description
ftp FTP.
nntp NNTP.
mapi MAPI.
cifs CIFS.
config rule
severity Select the severity or threat level that matches this option - medium
filter.
Option Description
info Informational.
low Low.
medium Medium.
high High.
critical Critical.
type Select whether to check the content of messages (an option - file
email message) or files (downloaded files or email
attachments).
Option Description
Option Description
smtp SMTP.
pop3 POP3.
imap IMAP.
ftp FTP.
nntp NNTP.
mapi MAPI.
cifs CIFS.
Option Description
file-type Select the number of a DLP file pattern table to integer Minimum 0
match. value: 0
Maximum
value:
4294967295
Option Description
action Action to take with content that this DLP profile option - allow
matches.
Option Description
allow Allow the content to pass through the FortiGate and do not create a log
message.
log-only Allow the content to pass through the FortiGate, but write a log message.
quarantine-ip Quarantine all traffic from the IP address and write a log message.
expiry Quarantine duration in days, hours, minutes (format = user Not Specified 5m
dddhhmm).
Create self-explanatory DLP sensitivity levels to be used when setting sensitivity under config fp-doc-source.
config dlp sensitivity
Description: Create self-explanatory DLP sensitivity levels to be used when setting
sensitivity under config fp-doc-source.
edit <name>
next
end
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1001F, FortiGate 101E,
FortiGate 101F, FortiGate 1101E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3001F, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3201F, FortiGate 3301E, FortiGate 3401E,
FortiGate 3501F, FortiGate 3601E, FortiGate 3700D, FortiGate 3701F, FortiGate 401E,
FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4201F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 501E, FortiGate 601E, FortiGate 601F, FortiGate 60F, FortiGate
61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate 80F Bypass,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 901G, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000F, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 1100E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E,
FortiGate 200F, FortiGate 2200E, FortiGate 3000F, FortiGate 300E, FortiGate 3200F,
FortiGate 3300E, FortiGate 3400E, FortiGate 3500F, FortiGate 3600E, FortiGate 3700F,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F,
FortiGate 4200F, FortiGate 4400F, FortiGate 5001E, FortiGate 500E, FortiGate 600E,
FortiGate 600F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E,
FortiGate 80E-POE, FortiGate 80E, FortiGate 80F-POE, FortiGate 80F, FortiGate 900G,
FortiGate 90E, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E.
chunk-size Maximum fingerprint chunk size. Caution, changing integer Minimum 2800
this setting will flush the entire database. value: 100
Maximum
value: 100000
Option Description
size Maximum total size of files within the storage (MB). integer Minimum 16
value: 16
Maximum
value:
4294967295
Option Description
Option Description
allow Allow DNS requests matching the domain filter without logging.
monitor Allow DNS requests matching the domain filter with logging.
Option Description
Option Description
Option Description
Option Description
redirect-portal IPv4 address of the SDNS redirect portal. ipv4- Not 0.0.0.0
address Specified
Option Description
Option Description
Option Description
youtube- Set safe search for YouTube restriction level. option - strict
restrict
Option Description
config dns-translation
Option Description
src IPv4 address or subnet on the internal ipv4- Not Specified 0.0.0.0
network to compare with the resolved address address
in DNS query replies. If the resolved address
matches, the resolved address is substituted
with dst.
dst IPv4 address or subnet on the external ipv4- Not Specified 0.0.0.0
network to substitute for the resolved address address
in DNS query replies. Can be single IP
address or subnet on the external network, but
number of addresses must equal number of
mapped IP addresses in src.
netmask If src and dst are subnets rather than single IP ipv4- Not Specified 255.255.255.255
addresses, enter the netmask for both src and netmask
dst.
Option Description
prefix If src6 and dst6 are subnets rather than single integer Minimum 128
IP addresses, enter the prefix for both src6 value: 1
and dst6. Maximum
value: 128
config domain-filter
config ftgd-dns
Option Description
action Action to take for DNS requests matching the category. option - monitor
Option Description
monitor Allow DNS requests matching the category and log the result.
log Enable/disable DNS filter logging for this DNS profile. option - enable
Option Description
vnp-cpus CPUs enabled to run DPDK VNP engines. string Maximum all
length: 1022
ips-cpus CPUs enabled to run DPDK IPS engines. string Maximum all
length: 1022
isolated-cpus CPUs isolated to run only the DPDK engines with the string Maximum none
exception of processes that have affinity explicitly set by length: 1022
either a user configuration or by their implementation.
Option Description
enable Enable DPDK operation. *The minimum system requirements for DPDK is
2 vCPUs and 4GB memory.
Option Description
Option Description
Option Description
Option Description
traffic-log-only Enable per-session accounting only for VNP sessions with traffic logging
turned on in firewall policy.
enable Enable per-session accounting for all VNP sessions. *Affect performance.
Option Description
config entries
Option Description
Option Description
ip By IP address.
Option Description
Option Description
ip4-subnet IPv4 network address/subnet mask bits. ipv4- Not Specified 0.0.0.0
classnet 0.0.0.0
ip6-subnet IPv6 network address/subnet mask bits. ipv6- Not Specified ::/128
network
Option Description
config entries
Option Description
Option Description
Option Description
Option Description
Option Description
western Western.
japanese Japanese.
korean Korean.
french French.
thai Thai.
spanish Spanish.
config entries
Option Description
Option Description
Option Description
Option Description
config entries
Option Description
Option Description
ip4-subnet IPv4 network address or network address/subnet ipv4- Not Specified 0.0.0.0
mask bits. classnet 0.0.0.0
ip6-subnet IPv6 network address/subnet mask bits. ipv6- Not Specified ::/128
network
config entries
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config gmail
Option Description
config imap
Option Description
Option Description
Option Description
Option Description
tag-msg Subject text or header added to spam email. string Maximum Spam
length: 63
config mapi
Option Description
Option Description
config msn-hotmail
Option Description
config other-webmails
Option Description
config pop3
Option Description
Option Description
Option Description
tag-msg Subject text or header added to spam email. string Maximum Spam
length: 63
config smtp
Option Description
Option Description
Option Description
tag-msg Subject text or header added to spam email. string Maximum Spam
length: 63
Option Description
disable Disable SMTP email header IP checks for spamfsip, spamrbl, and spambal
filters.
enable Enable SMTP email header IP checks for spamfsip, spamrbl, and spambal
filters.
Option Description
config yahoo-mail
Option Description
Option Description
fabric-auth Allow this FortiGate unit to load the authentication page provided by EMS to
authenticate itself with EMS.
websocket Enable/disable websockets for this FortiGate unit. Override behavior using
websocket-override.
websocket- Allow this FortiGate unit to request malware hash notifications over
malware websocket.
common-tags- Can recieve tag information from New Common Tags API from EMS.
api
Option Description
Option Description
mismatched- FortiClient EMS entry dirty because EMS SN is mismatched with configured
ems-sn SN.
Option Description
https-port FortiClient EMS HTTPS access port number.. integer Minimum 443
value: 1
Maximum
value:
65535
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
none No authentication.
pap PAP.
chap CHAP.
Option Description
Option Description
Option Description
Option Description
signal- Signal threshold. Specify the range between 50 - 100, integer Minimum 100
threshold where 50/100 means -50/-100 dBm. value: 50
Maximum
value: 100
Option Description
Option Description
generic Compatible with any SIM. Assigned if no other dataplan matches the chosen
SIM.
Option Description
bandwidth- FortiExtender LAN extension bandwidth limit (Mbps). integer Minimum 1024
limit value: 1
Maximum
value:
16776000
Option Description
Option Description
login- Set the managed extender's administrator password. password Not Specified
password
Option Description
yes Change the managed extender's administrator password. Use the login-
password option to set the password.
default Keep the managed extender's administrator password set to the factory
default.
Option Description
Option Description
config cellular
config controller-report
Option Description
config sms-notification
Option Description
config alert
system- Display string when system rebooted. string Maximum system will
reboot length: 63 reboot
data- Display string when data exhausted. string Maximum data plan is
exhausted length: 63 exhausted
session- Display string when session disconnected. string Maximum LTE data
disconnect length: 63 session is
disconnected
low-signal- Display string when signal strength is low. string Maximum LTE signal
strength length: 63 strength is too
low
os-image- Display string when falling back to a previous OS string Maximum system start to
fallback image. length: 63 fallback OS
image
fgt-backup- Display string when FortiGate backup mode string Maximum FortiGate
mode-switch switched. length: 63 backup work
mode switched
config receiver
Option Description
Option Description
config modem1
Option Description
Option Description
Option Description
Option Description
Option Description
config auto-switch
Option Description
Option Description
Option Description
Option Description
config modem2
Option Description
Option Description
Option Description
Option Description
Option Description
config auto-switch
config lan-extension
Option Description
config backhaul
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
yes Change the managed extender's administrator password. Use the login-
password option to set the password.
default Keep the managed extender's administrator password set to the factory
default.
Option Description
Option Description
Option Description
disable Use the the WTP profile login-password (administrator password) setting.
config wan-extension
Option Description
config lan-extension
backhaul-ip IPsec phase1 IPv4/FQDN. Used to specify the external string Maximum
IP/FQDN when the FortiGate unit is behind a NAT length: 63
device.
Option Description
Option Description
Option Description
Option Description
Option Description
config rules
Option Description
Option Description
Option Description
direction Traffic direction (HTTP, FTP, SSH, CIFS only). option - any
Option Description
any Match files transmitted in the session's originating and reply directions.
Option Description
Option Description
config anomaly
Option Description
Option Description
Option Description
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
auth-ca Name of the SSH server public key authentication CA. string Maximum
length: 79
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
yes Critical option, server refuses to authorize if it cannnot recognize the critical
option.
Option Description
Option Description
Option Description
enable add dns entry for all vhosts used by access proxy.
disable Do not add dns entry for all vhosts used by access proxy.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
svr-pool-ttl Time-to-live in the server pool for idle connections to integer Minimum 15
servers. value: 0
Maximum
value:
2147483647
Option Description
Option Description
http HTTP.
https HTTPS.
tcp-forwarding TCP-FORWARDING.
samlsp SAML-SP.
web-portal VPN-SSL-WEB-PORTAL.
saas SAAS.
Option Description
Option Description
persistence Configure how to make sure that clients connect to option - none
the same server every time they make a request
that is part of the same session.
Option Description
none None.
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Domain that HTTP cookie persistence should apply string Maximum
domain to. length: 35
http-cookie- Limit HTTP cookie persistence to the specified path. string Maximum
path length: 35
http-cookie-age Time in minutes that client web browsers should integer Minimum 60
keep a cookie. Default is 60 minutes. 0 = no time value: 0
limit. Maximum
value: 525600
Option Description
same-ip Allow HTTP cookie to match any API Gateway with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
Option Description
Option Description
ssl-algorithm Permitted encryption algorithms for the server side option - high
of SSL full mode sessions according to encryption
strength.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
Option Description
Option Description
config realservers
Option Description
port Port for communicating with the real server. integer Minimum 443
value: 1
Maximum
value: 65535
mappedport Port for communicating with the real server. user Not Specified
status Set the status of the real server to active so that it option - active
can accept traffic, or on standby or disabled so no
traffic is sent.
Option Description
Option Description
ssh SSH.
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
Option Description
health-check- Protocol of the health check monitor to use when option - ping
proto polling to determine server's connectivity status.
Option Description
tcp-connect Use a full TCP connection to test the link with the server.
Option Description
Option Description
ssh-host-key- Enable/disable SSH real server host key validation. option - disable
validation
Option Description
config ssl-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - tls-1.0 tls-
with. 1.1 tls-1.2
tls-1.3
Option Description
config api-gateway6
Option Description
http HTTP.
https HTTPS.
tcp-forwarding TCP-FORWARDING.
samlsp SAML-SP.
web-portal VPN-SSL-WEB-PORTAL.
saas SAAS.
Option Description
Option Description
persistence Configure how to make sure that clients connect to option - none
the same server every time they make a request
that is part of the same session.
Option Description
none None.
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Domain that HTTP cookie persistence should apply string Maximum
domain to. length: 35
http-cookie- Limit HTTP cookie persistence to the specified path. string Maximum
path length: 35
http-cookie-age Time in minutes that client web browsers should integer Minimum 60
keep a cookie. Default is 60 minutes. 0 = no time value: 0
limit. Maximum
value: 525600
Option Description
same-ip Allow HTTP cookie to match any API Gateway with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
Option Description
Option Description
ssl-algorithm Permitted encryption algorithms for the server side option - high
of SSL full mode sessions according to encryption
strength.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
Option Description
Option Description
config realservers
port Port for communicating with the real server. integer Minimum 443
value: 1
Maximum
value: 65535
mappedport Port for communicating with the real server. user Not Specified
status Set the status of the real server to active so that it option - active
can accept traffic, or on standby or disabled so no
traffic is sent.
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
health-check- Protocol of the health check monitor to use when option - ping
proto polling to determine server's connectivity status.
ssh-host-key- Enable/disable SSH real server host key validation. option - disable
validation
versions SSL/TLS versions that the cipher suite can be used option - tls-1.0 tls-
with. 1.1 tls-1.2
tls-1.3
Option Description
enable add dns entry for all vhosts used by access proxy.
disable Do not add dns entry for all vhosts used by access proxy.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
svr-pool-ttl Time-to-live in the server pool for idle connections to integer Minimum 15
servers. value: 0
Maximum
value:
2147483647
Option Description
Option Description
http HTTP.
https HTTPS.
tcp-forwarding TCP-FORWARDING.
samlsp SAML-SP.
web-portal VPN-SSL-WEB-PORTAL.
saas SAAS.
Option Description
Option Description
persistence Configure how to make sure that clients connect to option - none
the same server every time they make a request
that is part of the same session.
Option Description
none None.
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Domain that HTTP cookie persistence should apply string Maximum
domain to. length: 35
http-cookie- Limit HTTP cookie persistence to the specified path. string Maximum
path length: 35
http-cookie-age Time in minutes that client web browsers should integer Minimum 60
keep a cookie. Default is 60 minutes. 0 = no time value: 0
limit. Maximum
value: 525600
Option Description
same-ip Allow HTTP cookie to match any API Gateway with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
Option Description
Option Description
ssl-algorithm Permitted encryption algorithms for the server side option - high
of SSL full mode sessions according to encryption
strength.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
Option Description
Option Description
config realservers
Option Description
port Port for communicating with the real server. integer Minimum 443
value: 1
Maximum
value: 65535
mappedport Port for communicating with the real server. user Not Specified
status Set the status of the real server to active so that it option - active
can accept traffic, or on standby or disabled so no
traffic is sent.
Option Description
Option Description
ssh SSH.
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
Option Description
health-check- Protocol of the health check monitor to use when option - ping
proto polling to determine server's connectivity status.
Option Description
tcp-connect Use a full TCP connection to test the link with the server.
Option Description
Option Description
ssh-host-key- Enable/disable SSH real server host key validation. option - disable
validation
Option Description
config ssl-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - tls-1.0 tls-
with. 1.1 tls-1.2
tls-1.3
Option Description
config api-gateway6
Option Description
http HTTP.
https HTTPS.
tcp-forwarding TCP-FORWARDING.
samlsp SAML-SP.
web-portal VPN-SSL-WEB-PORTAL.
saas SAAS.
Option Description
Option Description
persistence Configure how to make sure that clients connect to option - none
the same server every time they make a request
that is part of the same session.
Option Description
none None.
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Domain that HTTP cookie persistence should apply string Maximum
domain to. length: 35
http-cookie- Limit HTTP cookie persistence to the specified path. string Maximum
path length: 35
http-cookie-age Time in minutes that client web browsers should integer Minimum 60
keep a cookie. Default is 60 minutes. 0 = no time value: 0
limit. Maximum
value: 525600
Option Description
same-ip Allow HTTP cookie to match any API Gateway with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
Option Description
Option Description
ssl-algorithm Permitted encryption algorithms for the server side option - high
of SSL full mode sessions according to encryption
strength.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
Option Description
Option Description
config realservers
port Port for communicating with the real server. integer Minimum 443
value: 1
Maximum
value: 65535
mappedport Port for communicating with the real server. user Not Specified
status Set the status of the real server to active so that it option - active
can accept traffic, or on standby or disabled so no
traffic is sent.
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
health-check- Protocol of the health check monitor to use when option - ping
proto polling to determine server's connectivity status.
ssh-host-key- Enable/disable SSH real server host key validation. option - disable
validation
versions SSL/TLS versions that the cipher suite can be used option - tls-1.0 tls-
with. 1.1 tls-1.2
tls-1.3
This command is available for model(s): FortiGate 1000F, FortiGate 1001F, FortiGate 100EF,
FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate
1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate
1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200F, FortiGate 201F, FortiGate 2200E,
FortiGate 2201E, FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D,
FortiGate 3000F, FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E,
FortiGate 3400E, FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E,
FortiGate 3601E, FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E,
FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E,
FortiGate 401F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 900G, FortiGate 901G.
It is not available for: FortiGate 1000D, FortiGate 200E, FortiGate 201E, FortiGate 40F 3G4G,
FortiGate 40F, FortiGate 5001E1, FortiGate 5001E, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate
81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
Option Description
This command is available for model(s): FortiGate 1000F, FortiGate 1001F, FortiGate 100EF,
FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate
1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate
1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200F, FortiGate 201F, FortiGate 2200E,
FortiGate 2201E, FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D,
FortiGate 3000F, FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E,
FortiGate 3400E, FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E,
FortiGate 3601E, FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E,
FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E,
FortiGate 401F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 900G, FortiGate 901G.
It is not available for: FortiGate 1000D, FortiGate 200E, FortiGate 201E, FortiGate 40F 3G4G,
FortiGate 40F, FortiGate 5001E1, FortiGate 5001E, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate
81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
Option Description
Option Description
Option Description
unknown UNKNOWN.
healthy HEALTHY.
quarantine QUARANTINE.
checkup CHECKUP.
transient TRANSIENT.
infected INFECTED.
end-ip Final IP address (inclusive) in the range for the ipv4- Not 0.0.0.0
address. address- Specified
any
Option Description
Option Description
Option Description
ip IP address.
Option Description
start-ip First IP address (inclusive) in the range for the ipv4- Not 0.0.0.0
address. address- Specified
any
Option Description
subnet IP address and subnet mask of address. ipv4- Not 0.0.0.0 0.0.0.0
classnet- Specified
any
Option Description
config list
config tagging
Option Description
config subnet-segment
Option Description
config values
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
end-ip Final IP address (inclusive) in the range for the ipv6- Not ::
address (format: address Specified
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx).
Option Description
Option Description
any Wildcard.
start-ip First IP address (inclusive) in the range for the ipv6- Not ::
address (format: address Specified
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx).
Option Description
template Template.
Option Description
config list
config subnet-segment
Option Description
any Wildcard.
config tagging
allow-routing Enable/disable use of this group in the static route option - disable
configuration.
Option Description
Option Description
Option Description
Option Description
Option Description
default Default address group type (address may belong to multiple groups).
folder Address folder group (members may not belong to any other group).
config tagging
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
Option Description
identity- Name of the identity-based route that applies to this string Maximum
based-route portal. length: 35
Option Description
Option Description
Option Description
Option Description
orig-port Original TCP port (1 to 65535, 0 means any user Not Specified
port).
Option Description
Option Description
dstmac Set destination MAC address for mirrored traffic. mac- Not ff:ff:ff:ff:ff:ff
address Specified
Option Description
Option Description
dst IPv4 address or subnet on the external ipv4- Not Specified 0.0.0.0
network to substitute for the resolved address address
in DNS query replies. Can be single IP
address or subnet on the external network, but
number of addresses must equal number of
mapped IP addresses in src.
netmask If src and dst are subnets rather than single IP ipv4- Not Specified 255.255.255.255
addresses, enter the netmask for both src and netmask
dst.
src IPv4 address or subnet on the internal ipv4- Not Specified 0.0.0.0
network to compare with the resolved address address
in DNS query replies. If the resolved address
matches, the resolved address is substituted
with dst.
Option Description
config rule
gateway IPv4 address of the gateway (Format: xxx.xxx.xxx.xxx ipv4- Not Specified 0.0.0.0
, Default: 0.0.0.0). address
groups Select one or more group(s) from available groups string Maximum
<name> that are allowed to use this route. Separate group length: 79
names with a space.
Group name.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config entry
Option Description
protocol Integer value for the protocol type as defined by IANA. integer Minimum 0
value: 0
Maximum
value: 255
config port-range
end-port Integer value for ending TCP/UDP/SCTP destination integer Minimum 65535
port in range (0 to 65535). value: 0
Maximum
value: 65535
Option Description
config entry
Option Description
protocol Integer value for the protocol type as defined by IANA. integer Minimum 0
value: 0
Maximum
value: 255
config port-range
end-port Integer value for ending TCP/UDP/SCTP destination integer Minimum 65535
port in range (0 to 65535). value: 0
Maximum
value: 65535
config entry
protocol Integer value for the protocol type as defined by IANA. integer Minimum 0
value: 0
Maximum
value: 255
config disable-entry
Option Description
protocol Integer value for the protocol type as defined by IANA. integer Minimum 0
value: 0
Maximum
value: 255
config port-range
end-port Integer value for ending TCP/UDP/SCTP destination integer Minimum 65535
port in range (0 to 65535). value: 0
Maximum
value: 65535
config ip-range
config entry
Option Description
protocol Integer value for the protocol type as defined by IANA. integer Minimum 0
value: 0
Maximum
value: 255
end-port Integer value for ending TCP/UDP/SCTP destination integer Minimum 65535
port in range (0 to 65535). value: 0
Maximum
value: 65535
direction How this service may be used (source, destination or option - both
both).
Option Description
Option Description
database Database name this Internet Service belongs to. option - isdb
Option Description
direction How this service may be used in a firewall policy option - both
(source, destination or both).
Option Description
obsolete Indicates whether the Internet Service can be used. integer Minimum 0
value: 0
Maximum
value: 255
map-startip Address to be used as the starting point for translation ipv4- Not Specified 0.0.0.0
in the range. address-
any
Option Description
SCTP SCTP
Option Description
enable Enable IP/MAC binding for packets that would normally go through the
firewall.
Option Description
disable Disable IP/MAC binding for packets that would normally go through the
firewall.
Option Description
enable Enable IP/MAC binding for packets that would normally go to the firewall.
disable Disable IP/MAC binding for packets that would normally go to the firewall.
Option Description
allow Allow packets from MAC addresses not in the IP/MAC list.
block Block packets from MAC addresses not in the IP/MAC list.
ip IPv4 address portion of the pair (format: ipv4- Not Specified 0.0.0.0
xxx.xxx.xxx.xxx). address
mac MAC address portion of the pair (format = mac- Not Specified 00:00:00:00:00:00
xx:xx:xx:xx:xx:xx in hexadecimal). address
Option Description
Option Description
arp-intf Select an interface from available options that will reply string Maximum
to ARP requests. (If blank, any is selected). length: 15
Option Description
Option Description
Option Description
Option Description
endip Final IPv4 address (inclusive) in the range for the ipv4- Not 0.0.0.0
address pool (format xxx.xxx.xxx.xxx, Default: 0.0.0.0). address- Specified
any
endport Final port number (inclusive) in the range for the integer Minimum 65533
address pool (Default: 65533). value: 5117
Maximum
value:
65533
Option Description
num-blocks- Number of addresses blocks that can be used by a user. integer Minimum 8
per-user value: 1
Maximum
value: 128
Option Description
source-endip Final IPv4 address (inclusive) in the range of the source ipv4- Not 0.0.0.0
addresses to be translated (format xxx.xxx.xxx.xxx, address- Specified
Default: 0.0.0.0). any
startip First IPv4 address (inclusive) in the range for the ipv4- Not 0.0.0.0
address pool (format xxx.xxx.xxx.xxx, Default: 0.0.0.0). address- Specified
any
startport First port number (inclusive) in the range for the address integer Minimum 5117
pool (Default: 5117). value: 5117
Maximum
value:
65533
Option Description
disable Do not include the subnetwork address and broadcast IP address in the
NAT64 IP pool.
enable Include the subnetwork address and broadcast IP address in the NAT64 IP
pool.
type IP pool type (overload, one-to-one, fixed port range, or option - overload
port block allocation).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
dns-protocol Select the protocol used by the DNS health check option - udp
monitor to check the health of the server (UDP | TCP).
Option Description
udp UDP.
tcp TCP.
dns-request- Fully qualified domain name to resolve for the DNS string Maximum
domain probe. length: 255
http-get URL used to send a GET request to check the health of string Maximum
an HTTP server. length: 255
port Service port used to perform the health check. If 0, integer Minimum 0
health check monitor inherits port configured for the value: 0
server. Maximum
value:
65535
retry Number health check attempts before the server is integer Minimum 3
considered down. value: 1
Maximum
value: 255
timeout Time to wait to receive response to a health check from integer Minimum 2
a server. Reaching the timeout means the health check value: 1
failed. Maximum
value: 255
type Select the Monitor type used by the health check option -
monitor to check the health of the server (PING | TCP |
HTTP | HTTPS | DNS).
Option Description
Option Description
Option Description
Option Description
service- When enabled service specifies what the service option - disable
negate must NOT be.
Option Description
srcaddr- When enabled srcaddr specifies what the source option - disable
negate address must NOT be.
Option Description
Option Description
Option Description
Option Description
Option Description
service- When enabled service specifies what the service option - disable
negate must NOT be.
Option Description
srcaddr- When enabled srcaddr specifies what the source option - disable
negate address must NOT be.
Option Description
Option Description
Option Description
associated- Interface associated with the address object. When string Maximum
interface setting up a policy, only addresses associated with length: 35
this interface are available.
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
end-ip Final IPv4 address (inclusive) in the range for the ipv4- Not 0.0.0.0
address. address- Specified
any
start-ip First IPv4 address (inclusive) in the range for the ipv4- Not 0.0.0.0
address. address- Specified
any
Option Description
config tagging
config tagging
Option Description
Option Description
dnat IPv4 DNAT address used for multicast ipv4- Not Specified 0.0.0.0
destination addresses. address-
any
Option Description
protocol Integer value for the protocol type as defined by integer Minimum 0
IANA. value: 0
Maximum
value: 255
Option Description
snat-ip IPv4 address to be used as the source address ipv4- Not Specified 0.0.0.0
for NATed traffic. address
Option Description
Option Description
accept Accept.
deny Deny.
Option Description
Option Description
protocol Integer value for the protocol type as defined by integer Minimum 0
IANA. value: 0
Maximum
value: 255
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable TCP NPU session delay in order to guarantee packet order of 3-way
handshake.
disable Disable TCP NPU session delay in order to guarantee packet order of 3-way
handshake.
Option Description
Option Description
Option Description
Option Description
Option Description
dstaddr <name> Destination IPv4 address and address group string Maximum
names. length: 79
Address name.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
check-all Flush all current sessions accepted by this policy. These sessions must be
started and re-matched with policies.
Option Description
Option Description
Option Description
physical-location Match geography address to its physical location using the geography IP
database.
registered- Match geography address to its registered location using the geography IP
location database.
groups <name> Names of user groups that can authenticate string Maximum
with this policy. length: 79
Group name.
Option Description
inbound Policy-based IPsec VPN: only traffic from the option - disable
remote network can initiate a VPN.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
match-vip Enable to match packets that have had their option - enable
destination addresses changed by a VIP.
Option Description
Option Description
enable Enable matching of only those packets that have had their destination
addresses changed by a VIP.
disable Disable matching of only those packets that have had their destination
addresses changed by a VIP.
Option Description
Option Description
Option Description
Option Description
natip Policy-based IPsec VPN: source NAT IP ipv4- Not Specified 0.0.0.0 0.0.0.0
address for outgoing traffic. classnet
Option Description
Option Description
Option Description
Option Description
outbound Policy-based IPsec VPN: only traffic from the option - enable
internal network can initiate a VPN.
Option Description
Option Description
Option Description
Option Description
Option Description
policy-expiry- Policy expiry date and time, in epoch format. user Not Specified
date-utc
Option Description
Option Description
redirect-url URL users are directed to after seeing and var-string Maximum
accepting the disclaimer or authenticating. length: 1023
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
session-ttl TTL in seconds for sessions accepted by this user Not Specified
policy.
Option Description
srcaddr <name> Source IPv4 address and address group string Maximum
names. length: 79
Address name.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
tos ToS (Type of Service) value used for user Not Specified
comparison.
tos-mask Non-zero bit positions are used for user Not Specified
comparison while zero bit positions are
ignored.
Option Description
Option Description
vlan-cos-fwd VLAN forward direction user priority: 255 integer Minimum 255
passthrough, 0 lowest, 7 highest. value: 0
Maximum
value: 7
vlan-cos-rev VLAN reverse direction user priority: 255 integer Minimum 255
passthrough, 0 lowest, 7 highest. value: 0
Maximum
value: 7
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config cifs
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
(MB). value: 1
Maximum
value: 1606
**
Option Description
tcp-window-type TCP window type to use for this protocol. option - auto-tuning
Option Description
system Use system default TCP window size for this protocol.
dynamic Vary TCP window size based on available memory and within limits of tcp-
window-minimum and tcp-window-maximum.
Option Description
config server-keytab
keytab Base64 encoded keytab file containing credential of the string Maximum
server. length: 8191
config dns
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
config ftp
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
(MB). value: 1
Maximum
value: 1606 **
Option Description
tcp-window-type TCP window type to use for this protocol. option - auto-tuning
Option Description
system Use system default TCP window size for this protocol.
dynamic Vary TCP window size based on available memory and within limits of tcp-
window-minimum and tcp-window-maximum.
Option Description
Option Description
config http
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
Option Description
enable Enable range header blocking (treat all partial file downloads as full file
download)
Option Description
Option Description
Option Description
Option Description
unknown-http- How to handle HTTP sessions that do not comply option - reject
version with HTTP 0.9, 1.0, or 1.1.
Option Description
reject Reject or tear down HTTP sessions that do not use HTTP 0.9, 1.0, or 1.1.
tunnel Pass HTTP traffic that does not use HTTP 0.9, 1.0, or 1.1 without applying
HTTP protocol optimization, byte-caching, or web caching. TCP protocol
optimization is applied.
best-effort Assume all HTTP sessions comply with HTTP 0.9, 1.0, or 1.1. If a session
uses a different HTTP version, it may not parse correctly and the
connection may be lost.
Option Description
enable Pass non-HTTP sessions through the tunnel without applying protocol
optimization, byte-caching, or web caching. TCP protocol optimization is
applied.
Option Description
enable Allow h2c HTTP connection upgrades. h2c tunnels do not support content
scan.
unknown-content- Configure the action the FortiGate unit will take on option - block
encoding unknown content-encoding.
Option Description
Option Description
Option Description
Option Description
block-page- Code number returned for blocked HTTP pages. integer Minimum 403
status-code value: 100
Maximum
value: 599
tcp-window-type TCP window type to use for this protocol. option - auto-tuning
Option Description
system Use system default TCP window size for this protocol.
dynamic Vary TCP window size based on available memory and within limits of tcp-
window-minimum and tcp-window-maximum.
Option Description
Option Description
config imap
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
(MB). value: 1
Maximum
value: 1606
**
Option Description
Option Description
config mail-signature
Option Description
signature Email signature to be added to outgoing email (if the string Maximum
signature contains spaces, enclose with quotation length: 1023
marks).
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
(MB). value: 1
Maximum
value: 1606
**
Option Description
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
(MB). value: 1
Maximum
value: 1606
**
Option Description
config pop3
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
(MB). value: 1
Maximum
value: 1606
**
Option Description
Option Description
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
(MB). value: 1
Maximum
value: 1606
**
Option Description
server-busy Enable/disable SMTP server busy when server not option - disable
available.
Option Description
Option Description
config ssh
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
(MB). value: 1
Maximum
value: 1606 **
Option Description
tcp-window-type TCP window type to use for this protocol. option - auto-tuning
Option Description
Option Description
system Use system default TCP window size for this protocol.
dynamic Vary TCP window size based on available memory and within limits of tcp-
window-minimum and tcp-window-maximum.
Option Description
Option Description
color Integer value to determine the color of the icon integer Minimum 0
in the GUI. value: 0
Maximum
value: 32
Option Description
query Match the query part of the URL as a regular string Maximum
expression. length: 255
Option Description
Option Description
Option Description
config header-group
Option Description
config tagging
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
Option Description
config tagging
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
redirect-url Redirect URL for further explicit web proxy var-string Maximum
processing. length: 1023
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
end Schedule end date and time, format hh:mm user Not
yyyy/mm/dd. Specified
end-utc Schedule end date and time, in epoch format. user Not
Specified
expiration- Write an event log message this many days before the integer Minimum 3
days schedule expires. value: 0
Maximum
value: 100
Option Description
start Schedule start date and time, format hh:mm user Not
yyyy/mm/dd. Specified
start-utc Schedule start date and time, in epoch format. user Not
Specified
day One or more days of the week on which the schedule is option - none
valid. Separate the names of the days with a space.
Option Description
sunday Sunday.
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
thursday Thursday.
friday Friday.
saturday Saturday.
none None.
end Time of day to end the schedule, format hh:mm. user Not
Specified
Option Description
start Time of day to start the schedule, format hh:mm. user Not
Specified
Option Description
Option Description
Option Description
Option Description
groups Names of user groups that can authenticate with string Maximum
<name> this policy. length: 79
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
learning- Enable to allow everything, but log all of the option - disable
mode meaningful data for security information
gathering. A learning report will be generated.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
srcaddr Source IPv4 address name and address group string Maximum
<name> names. length: 79
Address name.
Option Description
srcaddr6 Source IPv6 address name and address group string Maximum
<name> names. length: 79
Address name.
Option Description
Option Description
users <name> Names of individual users that can authenticate string Maximum
with this policy. length: 79
User name.
Option Description
Option Description
Option Description
Option Description
Option Description
ftp FTP.
tftp TFTP.
ras RAS.
h323 H323.
tns TNS.
mms MMS.
sip SIP.
Option Description
pptp PPTP.
rtsp RTSP.
pmap PMAP.
rsh RSH.
dcerpc DCERPC.
mgcp MGCP.
iprange Start and end of the IP range associated with user Not Specified
service.
Option Description
ICMP ICMP.
ICMP6 ICMP6.
IP IP.
Option Description
Option Description
tcp-halfclose- Wait time to close a TCP session waiting for an integer Minimum 0
timer unanswered FIN packet. value: 0
Maximum
value: 86400
tcp-halfopen- Wait time to close a TCP session waiting for an integer Minimum 0
timer unanswered open session packet. value: 0
Maximum
value: 86400
tcp-rst-timer Set the length of the TCP CLOSE state in integer Minimum 0
seconds. value: 5
Maximum
value: 300
tcp-timewait- Set the length of the TCP TIME-WAIT state in integer Minimum 0
timer seconds. value: 0
Maximum
value: 300
Option Description
Option Description
bandwidth-unit Unit of measurement for maximum bandwidth for this option - kbps
shaper (Kbps, Mbps or Gbps).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
exceed-dscp DSCP mark for traffic in guaranteed-bandwidth and user Not Specified
exceed-bandwidth.
maximum- DSCP mark for traffic in exceed-bandwidth and user Not Specified
dscp maximum-bandwidth.
Option Description
Option Description
application IDs of one or more applications that this shaper integer Minimum
<id> applies application control traffic shaping to. value: 0
Application IDs. Maximum
value:
4294967295
Option Description
Option Description
diffservcode- Change packet's reverse (reply) DiffServ to this user Not Specified
rev value.
Address name.
groups Apply this traffic shaping policy to user groups string Maximum
<name> that have authenticated with the FortiGate. length: 79
Group name.
Option Description
Option Description
Option Description
per-ip-shaper Per-IP traffic shaper to apply with this policy. string Maximum
length: 35
Option Description
tos ToS (Type of Service) value used for user Not Specified
comparison.
tos-mask Non-zero bit positions are used for comparison user Not Specified
while zero bit positions are ignored.
Option Description
users <name> Apply this traffic shaping policy to individual string Maximum
users that have authenticated with the length: 79
FortiGate.
User name.
Option Description
Option Description
limit Hard limit on the real queue size in packets. integer Minimum 1000
value: 5
Maximum
value: 10000
cburst-in- Number of bytes that can be burst as fast as the integer Minimum 0
msec interface can transmit. Formula: cburst = maximum- value: 0
bandwidth*cburst-in-msec. Maximum
value: 2000
min Average queue size in packets at which RED drop integer Minimum 83
becomes a possibility. value: 3
Maximum
value: 3000
max Average queue size in packets at which RED drop integer Minimum 250
probability is maximal. value: 3
Maximum
value: 3000
Configure sniffer.
config firewall sniffer
Description: Configure sniffer.
edit <id>
config anomaly
Description: Configuration method to edit Denial of Service (DoS) anomaly
settings.
edit <name>
set status [disable|enable]
set log [enable|disable]
set action [pass|block]
set quarantine [none|attacker]
set quarantine-expiry {user}
set quarantine-log [disable|enable]
set threshold {integer}
set threshold(default) {integer}
next
end
set application-list {string}
set application-list-status [enable|disable]
set av-profile {string}
set av-profile-status [enable|disable]
set dlp-profile {string}
set dlp-profile-status [enable|disable]
set dsri [enable|disable]
set emailfilter-profile {string}
set emailfilter-profile-status [enable|disable]
set file-filter-profile {string}
set file-filter-profile-status [enable|disable]
set host {string}
set interface {string}
set ip-threatfeed <name1>, <name2>, ...
set ip-threatfeed-status [enable|disable]
set ips-dos-status [enable|disable]
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
interface Interface name that traffic sniffing will take place string Maximum
on. length: 35
Option Description
Option Description
Option Description
Option Description
logtraffic Either log all sessions, only sessions that have a option - utm
security profile applied, or disable all logging for
this policy.
Option Description
Option Description
protocol Integer value for the protocol type as defined by string Maximum
IANA. length: 63
Option Description
Option Description
config anomaly
Option Description
Option Description
Option Description
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
Option Description
status Set the trust status of the public key. option - trusted
Option Description
Option Description
Option Description
Option Description
private-key SSH proxy private key, encrypted with a password. user Not
Specified
Option Description
private-key SSH proxy private key, encrypted with a password. user Not
Specified
Option Description
Option Description
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
ssl-cert Name of certificate for SSL connections to this server. string Maximum Fortinet_
length: 35 CA_SSL
Option Description
secure Reject any SSL connection that does not offer a RFC 5746 Secure
Renegotiation Indication.
Option Description
Option Description
Option Description
Option Description
ssl-mode SSL/TLS mode for encryption and decryption of traffic. option - full
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
use-ssl-server Enable/disable the use of SSL server table for SSL option - disable
offloading.
Option Description
config dot
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
Option Description
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
config ftps
Option Description
disable Disable.
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
allow Bypass the session when unable to retrieve server's certificate for
inspection.
block Block the session when unable to retrieve server's certificate for inspection.
Option Description
Option Description
config imaps
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
config pop3s
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
config smtps
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
disable Disable.
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
Option Description
Option Description
high-encryption Allow only AES-CTR, AES-GCM ciphers and high encryption algorithms.
config ssl
Option Description
disable Disable.
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
allow Bypass the session when unable to retrieve server's certificate for
inspection.
block Block the session when unable to retrieve server's certificate for inspection.
Option Description
Option Description
config ssl-server
https-client- Action based on received client certificate during the option - bypass
certificate HTTPS handshake.
Option Description
smtps-client- Action based on received client certificate during the option - bypass
certificate SMTPS handshake.
Option Description
pop3s-client- Action based on received client certificate during the option - bypass
certificate POP3S handshake.
Option Description
imaps-client- Action based on received client certificate during the option - bypass
certificate IMAPS handshake.
Option Description
ftps-client- Action based on received client certificate during the option - bypass
certificate FTPS handshake.
Option Description
Option Description
Option Description
Option Description
cert-cache- Maximum capacity of the host certificate cache. integer Minimum 200
capacity value: 0
Maximum
value: 500
kxp-queue- Maximum length of the CP KXP queue. When the integer Minimum 16
threshold * queue becomes full, the proxy switches cipher functions value: 0
to the main CPU. Maximum
value: 512
no-matching- Bypass or drop the connection when no matching cipher option - bypass
cipher-action is found.
Option Description
Option Description
ssl-queue- Maximum length of the CP SSL queue. When the queue integer Minimum 32
threshold * becomes full, the proxy switches cipher functions to the value: 0
main CPU. Maximum
value: 512
Option Description
Option Description
Option Description
ttl Value/range to match against the packet's Time to user Not Specified
Live value.
Option Description
Option Description
extport Incoming port number range that you want to user Not Specified
map to a port number range on the
destination network.
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-
cooke-domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
Option Description
same-ip Allow HTTP cookie to match any virtual server with same IP.
Option Description
Option Description
Option Description
Option Description
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
Option Description
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
ipv6-mappedport IPv6 port number range on the destination user Not Specified
network to which the external port number
range is mapped.
Option Description
monitor <name> Name of the health check monitor to use string Maximum
when polling to determine a virtual server's length: 79
connectivity status.
Health monitor name.
Option Description
disable Force only the source NAT mapped IP to the external IP for traffic
egressing the external interface of the VIP.
enable Force the source NAT mapped IP to the external IP for all traffic.
Option Description
Option Description
Option Description
Option Description
none None.
Option Description
Option Description
Option Description
Option Description
tcp TCP.
udp UDP.
sctp SCTP.
icmp ICMP.
Option Description
http HTTP.
https HTTPS.
imaps IMAPS.
pop3s POP3S.
smtps SMTPS.
ssl SSL.
tcp TCP.
Option Description
udp UDP.
ip IP.
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
custom Custom encryption. Use config ssl-cipher-suites to select the cipher suites
that are allowed.
ssl-certificate The name of the certificate to use for SSL string Maximum
handshake. length: 35
Option Description
disable Disable.
enable Enable.
Option Description
secure Abort any client initiated SSL re-negotiation attempt that does not use RFC
5746 Secure Renegotiation.
ssl-client- How to expire SSL sessions for the segment option - both
session-state- of the SSL connection between the client and
type the FortiGate.
Option Description
both Expire session states based on time or count, whichever occurs first.
Option Description
Option Description
ssl-hpkp-age Number of seconds the client should honor integer Minimum 5184000
the HPKP setting. value: 60
Maximum
value:
157680000
Option Description
Option Description
ssl-hsts-age Number of seconds the client should honor integer Minimum 5184000
the HSTS setting. value: 60
Maximum
value:
157680000
Option Description
Option Description
Option Description
Option Description
Option Description
ssl-mode Apply SSL offloading between the client and option - half
the FortiGate (half) or from the client to the
FortiGate and from the FortiGate to the
server (full).
Option Description
ssl-pfs Select the cipher suites that can be used for option - require
SSL perfect forward secrecy (PFS). Applies
to both client and server sessions.
Option Description
allow Allow use of any cipher suite so PFS may or may not be used depending on
the cipher suite selected.
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
client Use the same encryption algorithms for both client and server sessions.
Option Description
Option Description
Option Description
ssl-server- How to expire SSL sessions for the segment option - both
session-state- of the SSL connection between the server
type and the FortiGate.
Option Description
both Expire session states based on time or count, whichever occurs first.
Option Description
Option Description
Option Description
disable Do not add HTTP header indicating SSL offload for WebLogic server.
enable Add HTTP header indicating SSL offload for WebLogic server.
Option Description
disable Do not add HTTP header indicating SSL offload for WebSphere server.
enable Add HTTP header indicating SSL offload for WebSphere server.
config realservers
Option Description
port Port for communicating with the real server. Required integer Minimum 0
if port forwarding is enabled. value: 1
Maximum
value: 65535
status Set the status of the real server to active so that it can option - active
accept traffic, or on standby or disabled so no traffic
is sent.
Option Description
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
holddown- Time in seconds that the system waits before re- integer Minimum 300
interval activating a previously down active server in the value: 30
active-standby mode. This is to prevent any flapping Maximum
issues. value: 65535
Option Description
Option Description
monitor Name of the health check monitor to use when string Maximum
<name> polling to determine a virtual server's connectivity length: 79
status.
Health monitor name.
client-ip Only clients in this IP range can connect to this real user Not Specified
server.
config ssl-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - ssl-3.0 tls-
with. 1.0 tls-1.1
tls-1.2 tls-
1.3
Option Description
config ssl-server-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - ssl-3.0 tls-
with. 1.0 tls-1.1
tls-1.2 tls-
1.3
Option Description
Option Description
Option Description
disable Disable use of the lower 32 bits of the external IPv6 address as mapped IPv4
address.
enable Enable use of the lower 32 bits of the external IPv6 address as mapped IPv4
address.
extip IPv6 address or address range on the external user Not Specified
interface that you want to map to an address or
address range on the destination network.
extport Incoming port number range that you want to user Not Specified
map to a port number range on the destination
network.
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
Option Description
same-ip Allow HTTP cookie to match any virtual server with same IP.
Option Description
Option Description
Option Description
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
ipv4- IPv4 port number range on the destination user Not Specified
mappedport network to which the external port number
range is mapped.
Option Description
Option Description
least-session Sends new sessions to the server with the lowest session count.
mappedip Mapped IPv6 address range in the format user Not Specified
startIP-endIP.
mappedport Port number range on the destination network user Not Specified
to which the external port number range is
mapped.
monitor Name of the health check monitor to use when string Maximum
<name> polling to determine a virtual server's length: 79
connectivity status.
Health monitor name.
Option Description
enable Perform SNAT on traffic from mappedip to the extip for all egress interfaces.
Option Description
Option Description
Option Description
disable Disable this FortiGate unit's ability to respond to NDP requests for this virtual
IP address.
enable Enable this FortiGate unit's ability to respond to NDP requests for this virtual
IP address.
Option Description
Option Description
none None.
Option Description
Option Description
tcp TCP.
udp UDP.
sctp SCTP.
Option Description
http HTTP.
https HTTPS.
imaps IMAPS.
pop3s POP3S.
smtps SMTPS.
ssl SSL.
tcp TCP.
udp UDP.
ip IP.
Option Description
Option Description
Option Description
custom Use config ssl-cipher-suites to select the cipher suites that are allowed.
ssl-certificate The name of the certificate to use for SSL string Maximum
handshake. length: 35
Option Description
disable Disable.
enable Enable.
Option Description
secure Reject any SSL connection that does not offer a RFC 5746 Secure
Renegotiation Indication.
ssl-client- How to expire SSL sessions for the segment of option - both
session-state- the SSL connection between the client and the
type FortiGate.
Option Description
both Expire session states based on time or count, whichever occurs first.
Option Description
Option Description
ssl-hpkp-age Number of minutes the web browser should integer Minimum 5184000
keep HPKP. value: 60
Maximum
value:
157680000
Option Description
Option Description
ssl-hsts-age Number of seconds the client should honor the integer Minimum 5184000
HSTS setting. value: 60
Maximum
value:
157680000
Option Description
Option Description
Option Description
Option Description
Option Description
ssl-mode Apply SSL offloading between the client and option - half
the FortiGate (half) or from the client to the
FortiGate and from the FortiGate to the server
(full).
Option Description
ssl-pfs Select the cipher suites that can be used for option - require
SSL perfect forward secrecy (PFS). Applies to
both client and server sessions.
Option Description
Option Description
allow Allow use of any cipher suite so PFS may or may not be used depending on
the cipher suite selected.
Option Description
Option Description
custom Use config ssl-server-cipher-suites to select the cipher suites that are
allowed.
client Use the same encryption algorithms for client and server sessions.
Option Description
Option Description
Option Description
ssl-server- How to expire SSL sessions for the segment of option - both
session-state- the SSL connection between the server and
type the FortiGate.
Option Description
both Expire session states based on time or count, whichever occurs first.
Option Description
Option Description
Option Description
disable Do not add HTTP header indicating SSL offload for WebLogic server.
enable Add HTTP header indicating SSL offload for WebLogic server.
Option Description
disable Do not add HTTP header indicating SSL offload for WebSphere server.
enable Add HTTP header indicating SSL offload for WebSphere server.
config realservers
port Port for communicating with the real server. Required integer Minimum 0
if port forwarding is enabled. value: 1
Maximum
value: 65535
status Set the status of the real server to active so that it can option - active
accept traffic, or on standby or disabled so no traffic
is sent.
Option Description
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
holddown- Time in seconds that the system waits before re- integer Minimum 300
interval activating a previously down active server in the value: 30
active-standby mode. This is to prevent any flapping Maximum
issues. value: 65535
Option Description
Option Description
max- Max number of active connections that can directed integer Minimum 0
connections to the real server. When reached, sessions are sent value: 0
to other real servers. Maximum
value:
2147483647
monitor Name of the health check monitor to use when string Maximum
<name> polling to determine a virtual server's connectivity length: 79
status.
Health monitor name.
client-ip Only clients in this IP range can connect to this real user Not Specified
server.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - ssl-3.0 tls-
with. 1.0 tls-1.1
tls-1.2 tls-
1.3
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - ssl-3.0 tls-
with. 1.0 tls-1.1
tls-1.2 tls-
1.3
Option Description
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
incoming-ip Accept incoming FTP requests from this IP address. An ipv4- Not 0.0.0.0
interface must have this IP address. address- Specified
any
incoming-port Accept incoming FTP requests on one or more ports. user Not
Specified
outgoing-ip Outgoing FTP requests will leave from this IP address. ipv4- Not
An interface must have this IP address. address- Specified
any
sec-default- Accept or deny explicit FTP proxy sessions when no option - deny
action FTP proxy firewall policy exists.
Option Description
accept Accept requests. All explicit FTP proxy traffic is accepted whether there is an
explicit FTP proxy policy or not
deny Deny requests unless there is a matching explicit FTP proxy policy.
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
ssl-cert Name of certificate for SSL connections to this server. string Maximum Fortinet_
length: 35 CA_SSL
Option Description
Option Description
Option Description
204-size-limit 204 response size limit to be saved by ICAP client in integer Minimum 1
megabytes. value: 1
Maximum
value: 10
Option Description
Option Description
Option Description
ssh Forward file transfer with SSH protocol to ICAP server for further processing.
ftp Forward file transfer with FTP protocol to ICAP server for further processing.
file-transfer- Action to take if the ICAP server cannot be contacted option - error
failure when processing a file transfer.
Option Description
error Error.
bypass Bypass.
file-transfer- Path component of the ICAP URI that identifies the file string Maximum
path transfer processing service. length: 127
Option Description
methods The allowed HTTP methods that will be sent to ICAP option - delete get
server for further processing. head
options
post put
trace
connect
other
Option Description
delete Forward HTTP request or response with DELETE method to ICAP server for
further processing.
get Forward HTTP request or response with GET method to ICAP server for
further processing.
head Forward HTTP request or response with HEAD method to ICAP server for
further processing.
Option Description
options Forward HTTP request or response with OPTIONS method to ICAP server for
further processing.
post Forward HTTP request or response with POST method to ICAP server for
further processing.
put Forward HTTP request or response with PUT method to ICAP server for
further processing.
trace Forward HTTP request or response with TRACE method to ICAP server for
further processing.
connect Forward HTTP request or response with CONNECT method to ICAP server
for further processing.
other Forward HTTP request or response with All other methods to ICAP server for
further processing.
Option Description
Option Description
request-failure Action to take if the ICAP server cannot be contacted option - error
when processing an HTTP request.
Option Description
error Error.
bypass Bypass.
request-path Path component of the ICAP URI that identifies the string Maximum
HTTP request processing service. length: 127
Option Description
forward Forward response to ICAP server unless a rule specifies not to.
bypass Don't forward request to ICAP server unless a rule specifies to forward the
request.
Option Description
response- Action to take if the ICAP server cannot be contacted option - error
failure when processing an HTTP response.
Option Description
error Error.
bypass Bypass.
response-path Path component of the ICAP URI that identifies the string Maximum
HTTP response processing service. length: 127
Option Description
Option Description
timeout Time (in seconds) that ICAP client waits for the integer Minimum 30
response from ICAP server. value: 30
Maximum
value: 3600
config icap-headers
Option Description
Option Description
bypass Don't forward request to ICAP server when this rule is matched.
config header-group
Option Description
Configure an ICAP server group consisting of multiple forward servers. Supports failover and load balancing.
Option Description
least-session Send new sessions to the server with lowest session count.
config server-list
weight Optionally assign a weight of the forwarding server for integer Minimum 10
weighted load balancing. value: 1
Maximum
value: 100
addr-type Address type of the remote ICAP server: IPv4, IPv6 option - ip4
or FQDN.
Option Description
fqdn ICAP remote server Fully Qualified Domain Name string Maximum
(FQDN). length: 255
Option Description
healthcheck- ICAP Service name to use for health checks. string Maximum
service length: 127
ip-address IPv4 address of the ICAP server. ipv4- Not Specified 0.0.0.0
address-
any
Option Description
action Default action (pass or block) for this signature. option - pass
Option Description
Option Description
Option Description
protocol Protocol(s) that the signature scans. Blank for all user Not Specified
protocols.
severity Relative severity of the signature, from info to critical. user Not Specified
Log messages generated by the signature include the
severity.
Option Description
config parameter
Option Description
periodical After an anomaly is detected, allow the number of packets per second
according to the anomaly configuration.
Option Description
advanced Offload more types of pattern matching resulting in higher throughput than
basic mode. Requires two CP8s or one CP9.
Option Description
engine-count Number of IPS engines running. If set to the default integer Minimum 0
value of 0, FortiOS sets the number to optimize value: 0
performance depending on the number of CPU Maximum
cores. value: 255
Option Description
fail-open Enable to allow traffic if the IPS buffer is full. Default option - disable
is disable and IPS traffic is blocked when the IPS
buffer is full.
Option Description
Option Description
disable Disable IPS daemon's use of CPUs other than CPU 0 (all daemons run on all
CPUs).
Option Description
packet-log- Packet/pcap log queue depth per IPS engine. integer Minimum 128
queue-depth value: 128
Maximum
value: 4096
Option Description
socket-size IPS socket buffer size. Max and default value integer Minimum 128 **
depend on available memory. Can be changed to value: 0
tune performance. Maximum
value: 256 **
sync-session- Enable/disable use of kernel session TTL for IPS option - enable
ttl sessions.
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
vdom Virtual domain name for TLS active probe. string Maximum
length: 31
source-ip Source IP address used for TLS active probe. ipv4- Not 0.0.0.0
address Specified
source-ip6 Source IPv6 address used for TLS active probe. ipv6- Not ::
address Specified
Option Description
Option Description
Option Description
config metadata
Option Description
Option Description
Option Description
rule <id> Identifies the predefined or custom IPS signatures integer Minimum
to add to the sensor. value: 0
Rule IPS. Maximum
value:
4294967295
severity Relative severity of the signature, from info to user Not Specified all
critical. Log messages generated by the signature
include the severity.
protocol Protocols to be examined. Use all for every protocol user Not Specified all
and other for unlisted protocols.
os Operating systems to be protected. Use all for every user Not Specified all
operating system and other for unlisted operating
systems.
application Operating systems to be protected. Use all for every user Not Specified all
application and other for unlisted application.
Option Description
Option Description
cve <cve- List of CVE IDs of the signatures to add to the string Maximum
entry> sensor. length: 19
CVE IDs or CVE wildcards.
last-modified Filter by signature last modified date. Formats: user Not Specified
before <date>, after <date>, between <start-date>
<end-date>.
status Status of the signatures included in filter. Only those option - default
filters with a status to enable are used.
Option Description
default Default.
Option Description
Option Description
Option Description
action Action taken with traffic in which signatures are option - default
detected.
Option Description
default Pass or drop matching traffic, depending on the default action of the signature.
Option Description
Option Description
none none
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
config exempt-ip
src-ip Source IP address and netmask (applies to packet ipv4- Not Specified 0.0.0.0
matching the signature). classnet 0.0.0.0
dst-ip Destination IP address and netmask (applies to ipv4- Not Specified 0.0.0.0
packet matching the signature). classnet 0.0.0.0
packet-log- Maximum memory can be used by packet log. integer Minimum 256
memory value: 64
Maximum
value: 8192
packet-log- Number of packets to log after the IPS signature is integer Minimum 0
post-attack detected. value: 0
Maximum
value: 255
Option Description
Configure filters for local disk logging. Use these filters to determine the log messages to record according to severity
and type.
config log disk filter
Description: Configure filters for local disk logging. Use these filters to determine
the log messages to record according to severity and type.
set anomaly [enable|disable]
set dlp-archive [enable|disable]
set forward-traffic [enable|disable]
config free-style
Description: Free style filters.
edit <id>
set category [traffic|event|...]
set filter {string}
set filter-type [include|exclude]
next
end
set gtp [enable|disable]
set local-traffic [enable|disable]
set multicast-traffic [enable|disable]
set severity [emergency|alert|...]
set sniffer-traffic [enable|disable]
set voip [enable|disable]
set ztna-traffic [enable|disable]
end
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
severity Log to disk every message above and including this option - information
severity level.
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
diskfull Action to take when disk is full. The system can option - overwrite
overwrite the oldest log messages or stop logging
when the disk is full.
Option Description
overwrite Overwrite the oldest logs when the log disk is full.
Option Description
Option Description
Option Description
sunday Sunday
monday Monday
tuesday Tuesday
wednesday Wednesday
thursday Thursday
friday Friday
Option Description
saturday Saturday
Option Description
roll-time Time of day to roll the log file (hh:mm). user Not Specified
source-ip Source IP address to use for uploading disk log ipv4- Not Specified 0.0.0.0
files. address
Option Description
upload Enable/disable uploading log files when they are option - disable
rolled.
Option Description
Option Description
upload- The type of server to upload log files to. Only FTP is option - ftp-server
destination currently supported.
Option Description
Option Description
uploaddir The remote directory on the FTP server to upload string Maximum
log files to. length: 63
uploadip IP address of the FTP server to upload log files to. ipv4- Not Specified 0.0.0.0
address
uploadpass Password required to log into the FTP server to password Not Specified
upload disk log files.
uploadport TCP port to use for communicating with the FTP integer Minimum 21
server. value: 0
Maximum
value: 65535
uploadsched Set the schedule for uploading log files to the FTP option - disable
server.
Option Description
uploadtime Time of day at which log files are uploaded if user Not Specified
uploadsched is enabled (hh:mm or hh).
uploadtype Types of log files to upload. Separate multiple option - traffic event
entries with a space. virus
webfilter
IPS
emailfilter
dlp-archive
anomaly
voip dlp
app-ctrl waf
dns ssh ssl
**
Option Description
Option Description
uploaduser Username required to log into the FTP server to string Maximum
upload disk log files. length: 35
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
source-ip Source IPv4 or IPv6 address used to communicate with string Maximum
FortiAnalyzer. length: 63
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
Option Description
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
upload-option Enable/disable logging to hard disk and then uploading option - 5-minute
to FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
severity Log every message above and including this severity option - information
level.
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
severity Log every message above and including this severity option - information
level.
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
enable Enable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
disable Disable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
Option Description
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
Option Description
Option Description
enable Enable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
disable Disable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
enable Enable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
disable Disable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
source-ip Source IPv4 or IPv6 address used to communicate with string Maximum
FortiAnalyzer. length: 63
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
upload-option Enable/disable logging to hard disk and then uploading option - 5-minute
to FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
enable Enable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
disable Disable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
Option Description
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
Option Description
Option Description
enable Enable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
disable Disable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
enable Enable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
disable Disable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
source-ip Source IPv4 or IPv6 address used to communicate with string Maximum
FortiAnalyzer. length: 63
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
upload-option Enable/disable logging to hard disk and then uploading option - 5-minute
to FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
enable Enable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
disable Disable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
Option Description
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
Option Description
Option Description
enable Enable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
disable Disable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
enable Enable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
disable Disable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
source-ip Source IPv4 or IPv6 address used to communicate with string Maximum
FortiAnalyzer. length: 63
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
upload-option Enable/disable logging to hard disk and then uploading option - 5-minute
to FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
override Overriding FortiCloud settings for this VDOM or use option - disable
global settings.
Option Description
Option Description
Option Description
Option Description
upload-option Configure how log messages are sent to FortiCloud. option - 5-minute
Option Description
store-and-upload Log to the hard disk and then upload logs to FortiCloud.
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiCloud.
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
upload-option Configure how log messages are sent to FortiCloud. option - 5-minute
Option Description
store-and-upload Log to the hard disk and then upload logs to FortiCloud.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
severity Log every message above and including this severity option - information
level.
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
max-size Maximum amount of memory that can be used for integer Minimum 168438906 **
memory logging in bytes. value: 0
Maximum
value:
4294967295
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
enable Enable statistics collection for when no external logging destination, such as
FortiAnalyzer, is present (data is not saved).
disable Disable statistics collection for when no external logging destination, such as
FortiAnalyzer, is present (data is not saved).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Option Description
botnet- Threat weight score for detected botnet connections. option - critical
connection-
detected
Option Description
low Use the low level score for detected botnet connections.
medium Use the medium level score for detected botnet connections.
high Use the high level score for detected botnet connections.
critical Use the critical level score for detected botnet connections.
Option Description
Option Description
Option Description
Option Description
config geolocation
Option Description
info-severity Threat weight score for IPS info severity events. option - disable
Option Description
disable Disable threat weight scoring for IPS info severity events.
low Use the low level score for IPS info severity events.
medium Use the medium level score for IPS info severity events.
high Use the high level score for IPS info severity events.
critical Use the critical level score for IPS info severity events.
low-severity Threat weight score for IPS low severity events. option - low
Option Description
disable Disable threat weight scoring for IPS low severity events.
low Use the low level score for IPS low severity events.
medium Use the medium level score for IPS low severity events.
high Use the high level score for IPS low severity events.
critical Use the critical level score for IPS low severity events.
medium- Threat weight score for IPS medium severity events. option - medium
severity
Option Description
disable Disable threat weight scoring for IPS medium severity events.
low Use the low level score for IPS medium severity events.
medium Use the medium level score for IPS medium severity events.
high Use the high level score for IPS medium severity events.
critical Use the critical level score for IPS medium severity events.
high-severity Threat weight score for IPS high severity events. option - high
Option Description
disable Disable threat weight scoring for IPS high severity events.
low Use the low level score for IPS high severity events.
medium Use the medium level score for IPS high severity events.
high Use the high level score for IPS high severity events.
Option Description
critical Use the critical level score for IPS high severity events.
critical- Threat weight score for IPS critical severity events. option - critical
severity
Option Description
disable Disable threat weight scoring for IPS critical severity events.
low Use the low level score for IPS critical severity events.
medium Use the medium level score for IPS critical severity events.
high Use the high level score for IPS critical severity events.
critical Use the critical level score for IPS critical severity events.
config level
config malware
virus-infected Threat weight score for virus (infected) detected. option - critical
Option Description
low Use the low level score for virus (infected) detected.
medium Use the medium level score for virus (infected) detected.
high Use the high level score for virus (infected) detected.
critical Use the critical level score for virus (infected) detected.
Option Description
low Use the low level score for virus detected by FortiNDR.
medium Use the medium level score for virus detected by FortiNDR.
high Use the high level score for virus detected by FortiNDR.
critical Use the critical level score for virus detected by FortiNDR.
Option Description
low Use the low level score for virus detected by FortiSandbox.
medium Use the medium level score for virus detected by FortiSandbox.
high Use the high level score for virus detected by FortiSandbox.
critical Use the critical level score for virus detected by FortiSandbox.
file-blocked Threat weight score for blocked file detected. option - low
Option Description
low Use the low level score for blocked file detected.
medium Use the medium level score for blocked file detected.
high Use the high level score for blocked file detected.
critical Use the critical level score for blocked file detected.
command-blocked Threat weight score for blocked command detected. option - disable
Option Description
low Use the low level score for blocked command detected.
medium Use the medium level score for blocked command detected.
high Use the high level score for blocked command detected.
critical Use the critical level score for blocked command detected.
oversized Threat weight score for oversized file detected. option - disable
Option Description
low Use the low level score for oversized file detected.
medium Use the medium level score for oversized file detected.
high Use the high level score for oversized file detected.
critical Use the critical level score for oversized file detected.
virus-scan-error Threat weight score for virus (scan error) detected. option - high
Option Description
disable Disable threat weight scoring for virus (scan error) detected.
low Use the low level score for virus (scan error) detected.
medium Use the medium level score for virus (scan error) detected.
high Use the high level score for virus (scan error) detected.
critical Use the critical level score for virus (scan error) detected.
switch-proto Threat weight score for switch proto detected. option - disable
Option Description
low Use the low level score for switch proto detected.
medium Use the medium level score for switch proto detected.
high Use the high level score for switch proto detected.
critical Use the critical level score for switch proto detected.
Option Description
virus-file-type- Threat weight score for virus (file type executable) option - medium
executable detected.
Option Description
disable Disable threat weight scoring for virus (filetype executable) detected.
low Use the low level score for virus (filetype executable) detected.
medium Use the medium level score for virus (filetype executable) detected.
high Use the high level score for virus (filetype executable) detected.
critical Use the critical level score for virus (filetype executable) detected.
virus-outbreak- Threat weight score for virus (outbreak prevention) option - critical
prevention event.
Option Description
disable Disable threat weight scoring for virus (outbreak prevention) event.
low Use the low level score for virus (outbreak prevention) event.
medium Use the medium level score for virus (outbreak prevention) event.
high Use the high level score for virus (outbreak prevention) event.
critical Use the critical level score for virus (outbreak prevention) event.
content-disarm Threat weight score for virus (content disarm) option - medium
detected.
Option Description
disable Disable threat weight scoring for virus (content disarm) detected.
low Use the low level score for virus (content disarm) detected.
medium Use the medium level score for virus (content disarm) detected.
high Use the high level score for virus (content disarm) detected.
critical Use the critical level score for virus (content disarm) detected.
malware-list Threat weight score for virus (malware list) detected. option - medium
Option Description
disable Disable threat weight scoring for virus (malware list) detected.
low Use the low level score for virus (malware list) detected.
medium Use the medium level score for virus (malware list) detected.
high Use the high level score for virus (malware list) detected.
critical Use the critical level score for virus (malware list) detected.
ems-threat-feed Threat weight score for virus (EMS threat feed) option - medium
detected.
Option Description
disable Disable threat weight scoring for virus (EMS threat feed) detected.
low Use the low level score for virus (EMS threat feed) detected.
medium Use the medium level score for virus (EMS threat feed) detected.
high Use the high level score for virus (EMS threat feed) detected.
critical Use the critical level score for virus (EMS threat feed) detected.
Option Description
low Use the low level score for FortiSandbox malicious malware detected.
medium Use the medium level score for FortiSandbox malicious malware
detected.
high Use the high level score for FortiSandbox malicious malware detected.
critical Use the critical level score for FortiSandbox malicious malware detected.
fsa-high-risk Threat weight score for FortiSandbox high risk option - high
malware detected.
Option Description
disable Disable threat weight scoring for FortiSandbox high risk malware
detected.
Option Description
low Use the low level score for FortiSandbox high risk malware detected.
medium Use the medium level score for FortiSandbox high risk malware detected.
high Use the high level score for FortiSandbox high risk malware detected.
critical Use the critical level score for FortiSandbox high risk malware detected.
fsa-medium-risk Threat weight score for FortiSandbox medium risk option - medium
malware detected.
Option Description
disable Disable threat weight scoring for FortiSandbox medium risk malware
detected.
low Use the low level score for FortiSandbox medium risk malware detected.
medium Use the medium level score for FortiSandbox medium risk malware
detected.
high Use the high level score for FortiSandbox medium risk malware detected.
critical Use the critical level score for FortiSandbox medium risk malware
detected.
config web
category Threat weight score for web category filtering matches. integer Minimum 0
value: 0
Maximum
value: 255
level Threat weight score for web category filtering matches. option - low
Option Description
disable Disable threat weight scoring for web category filtering matches.
low Use the low level score for web category filtering matches.
medium Use the medium level score for web category filtering matches.
high Use the high level score for web category filtering matches.
critical Use the critical level score for web category filtering matches.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1100E, FortiGate 1101E,
FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E, FortiGate 5001E1, FortiGate 5001E,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate 800D, FortiGate
900D.
It is not available for: FortiGate 1000F, FortiGate 1001F, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1800F, FortiGate 1801F, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2600F, FortiGate 2601F, FortiGate 3000F, FortiGate 3001F,
FortiGate 3200F, FortiGate 3201F, FortiGate 3500F, FortiGate 3501F, FortiGate 3700F,
FortiGate 3701F, FortiGate 400F, FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 600F,
FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E,
FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 80E-
POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate
81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900G, FortiGate
901G, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
Option Description
threshold IPsec engine status check threshold. Example: Log is user Not
generated if IPsec engine 0 is busy each of every 15 Specified
consecutive interval checks.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 1100E, FortiGate 1101E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 4200F,
FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 800D, FortiGate 900D, FortiGate 900G, FortiGate 901G.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E,
FortiGate 101F, FortiGate 140E-POE, FortiGate 140E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 60E DSLJ,
FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E,
FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 80E-POE, FortiGate 80E, FortiGate
80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E,
FortiGate 81F-POE, FortiGate 81F, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
multipliers HPE type interval multipliers. An event log is generated user Not
after every (interval * multiplier)seconds as configured Specified
for any HPE type when drops occur for that HPE type.
An attack log is generated after every (4 * multiplier)
number of continuous event logs.
Option Description
config service-index
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1001F, FortiGate 101E,
FortiGate 101F, FortiGate 1101E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3001F, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3201F, FortiGate 3301E, FortiGate 3401E,
FortiGate 3501F, FortiGate 3601E, FortiGate 3700D, FortiGate 3701F, FortiGate 401E,
FortiGate 401F, FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E,
FortiGate 601E, FortiGate 601F, FortiGate 61E, FortiGate 61F, FortiGate 71F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 901G, FortiGate 91E, FortiGate VM64, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi
81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000F, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 1100E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E,
FortiGate 200F, FortiGate 2200E, FortiGate 3000F, FortiGate 300E, FortiGate 3200F,
FortiGate 3300E, FortiGate 3400E, FortiGate 3500F, FortiGate 3600E, FortiGate 3700F,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 600F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 70F, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 900G,
FortiGate 90E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 80F 2R.
Option Description
custom Custom.
Option Description
sunday Sunday.
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
thursday Thursday.
friday Friday.
saturday Saturday.
Option Description
Option Description
pdf PDF.
max-pdf- Maximum number of PDF reports to keep at one time integer Minimum 31
report (oldest report is overwritten). value: 1
Maximum
value: 365
Option Description
dummy-option Use this option if you need none of the above options.
Option Description
Option Description
config body-item
Option Description
text Text.
image Image.
chart Chart.
misc Miscellaneous.
Option Description
heading1 Heading 1.
heading2 Heading 2.
heading3 Heading 3.
Option Description
Option Description
name Field name that match field of parameters defined in string Maximum
dataset. length: 127
config page
Option Description
a4 A4 paper.
Option Description
Option Description
Option Description
config header
config header-item
Option Description
text Text.
image Image.
config footer
Option Description
text Text.
image Image.
This command is available for model(s): FortiGate 1000D, FortiGate 1001F, FortiGate 101E,
FortiGate 101F, FortiGate 1101E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3001F, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3201F, FortiGate 3301E, FortiGate 3401E,
FortiGate 3501F, FortiGate 3601E, FortiGate 3700D, FortiGate 3701F, FortiGate 401E,
FortiGate 401F, FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E,
FortiGate 601E, FortiGate 601F, FortiGate 61E, FortiGate 61F, FortiGate 71F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 901G, FortiGate 91E, FortiGate VM64, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi
81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000F, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 1100E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E,
FortiGate 200F, FortiGate 2200E, FortiGate 3000F, FortiGate 300E, FortiGate 3200F,
FortiGate 3300E, FortiGate 3400E, FortiGate 3500F, FortiGate 3600E, FortiGate 3700F,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 600F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 70F, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 900G,
FortiGate 90E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 80F 2R.
Option Description
Option Description
Option Description
config rule
action Permit or deny this IP address and netmask prefix. option - permit
Option Description
prefix IPv4 prefix to define regular filter criteria, such as user Not Specified
"any" or subnets.
wildcard Wildcard to define Cisco-style wildcard filter criteria. user Not Specified
Option Description
config rule
action Permit or deny this IP address and netmask prefix. option - permit
Option Description
prefix6 IPv6 prefix to define regular filter criteria, such as user Not Specified
"any" or subnets.
Option Description
config rule
Option Description
Configure BFD.
config router bfd
Description: Configure BFD.
config multihop-template
Description: BFD multi-hop template table.
edit <id>
set src {ipv4-classnet}
set dst {ipv4-classnet}
set bfd-desired-min-tx {integer}
set bfd-required-min-rx {integer}
set bfd-detect-mult {integer}
set auth-mode [none|md5]
set md5-key {password}
next
end
config neighbor
Description: Neighbor.
edit <ip>
config multihop-template
bfd-desired- BFD desired minimal transmit interval (milliseconds). integer Minimum 250
min-tx value: 100
Maximum
value: 30000
bfd-required- BFD required minimal receive interval (milliseconds). integer Minimum 250
min-rx value: 100
Maximum
value: 30000
Option Description
none None.
config neighbor
config multihop-template
bfd-desired- BFD desired minimal transmit interval (milliseconds). integer Minimum 250
min-tx value: 100
Maximum
value: 30000
bfd-required- BFD required minimal receive interval (milliseconds). integer Minimum 250
min-rx value: 100
Maximum
value: 30000
Option Description
none None.
config neighbor
Configure BGP.
config router bgp
Description: Configure BGP.
set additional-path [enable|disable]
set additional-path-select {integer}
set additional-path-select-vpnv4 {integer}
set additional-path-select6 {integer}
set additional-path-vpnv4 [enable|disable]
set additional-path6 [enable|disable]
config admin-distance
Description: Administrative distance modifications.
edit <id>
set neighbour-prefix {ipv4-classnet}
set route-list {string}
set distance {integer}
next
end
config aggregate-address
Description: BGP aggregate address table.
edit <id>
set prefix {ipv4-classnet-any}
set as-set [enable|disable]
set summary-only [enable|disable]
next
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
distance-internal Distance for routes internal to the AS. integer Minimum 200
value: 1
Maximum
value: 255
distance-local Distance for routes local to the AS. integer Minimum 200
value: 1
Maximum
value: 255
Option Description
Option Description
Option Description
Option Description
Option Description
graceful-restart- Time needed for neighbors to restart (sec). integer Minimum 120
time value: 1
Maximum
value: 3600
graceful- Time to hold stale paths of restarting neighbor integer Minimum 360
stalepath-time (sec). value: 1
Maximum
value: 3600
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
preferred Use tag-match if a BGP route resolution with another route containing the
same tag is successful.
merge Merge tag-match with best-match if they are using different routes. The
result will exclude the next hops of tag-match whose interfaces have
appeared in best-match.
config admin-distance
route-list Access list of routes to apply new distance to. string Maximum
length: 35
Option Description
Option Description
config aggregate-address6
Option Description
Option Description
config neighbor
Option Description
Option Description
Option Description
as-path AS path.
med MED.
Option Description
as-path AS path.
med MED.
Option Description
as-path AS path.
med MED.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
none None.
Option Description
none None.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
distribute-list-in Filter for IPv4 updates from this neighbor. string Maximum
length: 35
distribute-list-in6 Filter for IPv6 updates from this neighbor. string Maximum
length: 35
distribute-list-in- Filter for VPNv4 updates from this neighbor. string Maximum
vpnv4 length: 35
ebgp-multihop-ttl EBGP multihop TTL for this peer. integer Minimum 255
value: 1
Maximum
value: 255
Option Description
Option Description
Option Description
prefix-list-in IPv4 Inbound filter for updates from this string Maximum
neighbor. length: 35
prefix-list-in6 IPv6 Inbound filter for updates from this string Maximum
neighbor. length: 35
prefix-list-in-vpnv4 Inbound filter for VPNv4 updates from this string Maximum
neighbor. length: 35
Option Description
Option Description
route-map-out- IPv4 outbound route map filter if the peer is string Maximum
preferable preferred. length: 35
route-map-out6- IPv6 outbound route map filter if the peer is string Maximum
preferable preferred. length: 35
route-map-out- VPNv4 outbound route map filter if the peer is string Maximum
vpnv4-preferable preferred. length: 35
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
holdtime-timer Interval (sec) before peer considered dead. integer Minimum 4294967295
value: 3
Maximum
value: 65535
Option Description
Option Description
Option Description
Option Description
config conditional-advertise
Option Description
config conditional-advertise6
Option Description
config neighbor-group
Option Description
Option Description
Option Description
as-path AS path.
med MED.
Option Description
as-path AS path.
med MED.
Option Description
as-path AS path.
med MED.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
none None.
Option Description
none None.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
distribute-list-in Filter for IPv4 updates from this neighbor. string Maximum
length: 35
distribute-list-in6 Filter for IPv6 updates from this neighbor. string Maximum
length: 35
distribute-list-in- Filter for VPNv4 updates from this neighbor. string Maximum
vpnv4 length: 35
ebgp-multihop-ttl EBGP multihop TTL for this peer. integer Minimum 255
value: 1
Maximum
value: 255
Option Description
Option Description
Option Description
prefix-list-in IPv4 Inbound filter for updates from this string Maximum
neighbor. length: 35
prefix-list-in6 IPv6 Inbound filter for updates from this string Maximum
neighbor. length: 35
prefix-list-in-vpnv4 Inbound filter for VPNv4 updates from this string Maximum
neighbor. length: 35
Option Description
Option Description
route-map-out- IPv4 outbound route map filter if the peer is string Maximum
preferable preferred. length: 35
route-map-out6- IPv6 outbound route map filter if the peer is string Maximum
preferable preferred. length: 35
route-map-out- VPNv4 outbound route map filter if the peer is string Maximum
vpnv4-preferable preferred. length: 35
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
holdtime-timer Interval (sec) before peer considered dead. integer Minimum 4294967295
value: 3
Maximum
value: 65535
Option Description
Option Description
Option Description
config neighbor-range
config neighbor-range6
config network
Option Description
Option Description
Option Description
config network6
Option Description
Option Description
Option Description
config redistribute6
Option Description
config vrf
Option Description
ce CE VRF.
pe PE VRF.
config leak-target
interface Interface which is used to leak routes to target VRF. string Maximum
length: 15
config vrf6
config leak-target
interface Interface which is used to leak routes to target VRF. string Maximum
length: 15
Option Description
config rule
Option Description
Option Description
config rule
Option Description
Option Description
rt Route Target.
Configure IS-IS.
config router isis
Description: Configure IS-IS.
set adjacency-check [enable|disable]
set adjacency-check6 [enable|disable]
set adv-passive-only [enable|disable]
set adv-passive-only6 [enable|disable]
set auth-keychain-l1 {string}
set auth-keychain-l2 {string}
set auth-mode-l1 [password|md5]
set auth-mode-l2 [password|md5]
set auth-password-l1 {password}
set auth-password-l2 {password}
set auth-sendonly-l1 [enable|disable]
set auth-sendonly-l2 [enable|disable]
set default-originate [enable|disable]
set default-originate6 [enable|disable]
set dynamic-hostname [enable|disable]
set ignore-lsp-errors [enable|disable]
set is-type [level-1-2|level-1|...]
config isis-interface
Description: IS-IS interface configuration.
edit <name>
set status [enable|disable]
set status6 [enable|disable]
set network-type [broadcast|point-to-point|...]
set circuit-type [level-1-2|level-1|...]
set csnp-interval-l1 {integer}
set csnp-interval-l2 {integer}
set hello-interval-l1 {integer}
set hello-interval-l2 {integer}
set hello-multiplier-l1 {integer}
set hello-multiplier-l2 {integer}
set hello-padding [enable|disable]
set lsp-interval {integer}
set lsp-retransmit-interval {integer}
Option Description
Option Description
Option Description
Option Description
Option Description
password Password.
md5 MD5.
Option Description
password Password.
md5 MD5.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
external External.
interlevel Inter-level.
Option Description
Option Description
Option Description
redistribute6-l1- Access-list for IPv6 route redistribution from l1 to l2. string Maximum
list length: 35
Option Description
redistribute6-l2- Access-list for IPv6 route redistribution from l2 to l1. string Maximum
list length: 35
config isis-interface
Option Description
Option Description
Option Description
broadcast Broadcast.
point-to-point Point-to-point.
loopback Loopback.
Option Description
level-1 Level 1.
level-2 Level 2.
Option Description
Option Description
Option Description
Option Description
Option Description
md5 MD5.
password Password.
Option Description
md5 MD5.
password Password.
Option Description
config redistribute
Option Description
enable Enable.
disable Disable.
Option Description
external External.
internal Internal.
Option Description
level-1 Level 1.
level-2 Level 2.
Option Description
Option Description
Option Description
level-1 Level 1.
level-2 Level 2.
config summary-address
Option Description
level-1 Level 1.
level-2 Level 2.
config summary-address6
Option Description
level-1 Level 1.
level-2 Level 2.
Configure key-chain.
config router key-chain
Description: Configure key-chain.
edit <name>
config key
Description: Configuration method to edit key settings.
edit <id>
set accept-lifetime {user}
set send-lifetime {user}
set key-string {password}
set algorithm [md5|hmac-sha1|...]
next
end
config key
Option Description
md5 MD5.
hmac-sha1 HMAC-SHA1.
hmac-sha256 HMAC-SHA256.
hmac-sha384 HMAC-SHA384.
hmac-sha512 HMAC-SHA512.
Configure multicast-flow.
config router multicast-flow
Description: Configure multicast-flow.
edit <name>
set comments {string}
config flows
Description: Multicast-flow entries.
edit <id>
set group-addr {ipv4-address-any}
set source-addr {ipv4-address-any}
config flows
Option Description
config interface
Option Description
sparse-mode sparse-mode
dense-mode dense-mode
Option Description
Option Description
cisco-exclude- Exclude GenID from hello packets (compatibility with option - disable
genid old Cisco IOS).
Option Description
Option Description
rpf-nbr-fail- Enable/disable fail back for RPF neighbor query. option - disable
back
Option Description
config igmp
Option Description
1 Version 1.
last-member- Timeout between IGMPv2 leave and removing group. integer Minimum 1000
query-interval value: 1
Maximum
value:
65535
query-max- Maximum time to wait for a IGMP query response. integer Minimum 10
response- value: 1
time Maximum
value: 25
query-timeout Timeout between queries before becoming querying integer Minimum 255
unit for network. value: 60
Maximum
value: 900
Option Description
config pim-sm-global
message- Period of time between sending periodic PIM join/prune integer Minimum 60
interval messages in seconds. value: 1
Maximum
value:
65535
Option Description
bsr-allow- Enable/disable accept BSR quick refresh packets from option - disable
quick-refresh neighbors.
Option Description
cisco-register- Checksum entire register packet(for old Cisco IOS option - disable
checksum compatibility).
Option Description
Option Description
cisco-ignore- Use only hash for RP selection (compatibility with old option - disable
rp-set-priority Cisco IOS).
Option Description
Option Description
Option Description
Option Description
Option Description
register-rate- Limit of packets/sec per source registered through this integer Minimum 0
limit RP. value: 0
Maximum
value:
65535
config rp-address
Option Description
Option Description
config interface
register-rate- Limit of packets/sec per source registered through this integer Minimum 0
limit RP (0 means unlimited). value: 0
Maximum
value:
65535
config rp-address
Configure OSPF.
config router ospf
Description: Configure OSPF.
set abr-type [cisco|ibm|...]
config area
Description: OSPF area configuration.
edit <id>
set shortcut [disable|enable|...]
set authentication [none|text|...]
set default-cost {integer}
set nssa-translator-role [candidate|never|...]
set stub-type [no-summary|summary]
set type [regular|nssa|...]
set nssa-default-information-originate [enable|always|...]
set nssa-default-information-originate-metric {integer}
set nssa-default-information-originate-metric-type [1|2]
set nssa-redistribution [enable|disable]
set comments {var-string}
config range
Description: OSPF area range configuration.
edit <id>
set prefix {ipv4-classnet-any}
set advertise [disable|enable]
set substitute {ipv4-classnet-any}
set substitute-status [enable|disable]
next
Option Description
cisco Cisco.
ibm IBM.
shortcut Shortcut.
standard Standard.
Option Description
Option Description
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config area
Option Description
Option Description
none None.
text Text.
Option Description
candidate Candidate.
never Never.
always Always.
Option Description
no-summary No summary.
summary Summary.
Option Description
regular Regular.
nssa NSSA.
stub Stub.
Option Description
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
config range
Option Description
Option Description
config virtual-link
Option Description
none None.
text Text.
config md5-keys
config md5-keys
Option Description
in In.
out Out.
config distribute-list
Option Description
cost Cost of the interface, value range from 0 to 65535, 0 integer Minimum 0
means auto-cost. value: 0
Maximum
value: 65535
config network
Option Description
none None.
text Text.
cost Cost of the interface, value range from 0 to 65535, 0 integer Minimum 0
means auto-cost. value: 0
Maximum
value:
65535
Option Description
Option Description
Option Description
broadcast Broadcast.
Option Description
non-broadcast Non-broadcast.
point-to-point Point-to-point.
point-to- Point-to-multipoint.
multipoint
Option Description
Option Description
config md5-keys
config redistribute
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
Option Description
cisco Cisco.
ibm IBM.
standard Standard.
auto-cost-ref- Reference bandwidth in terms of megabits per second. integer Minimum 1000
bandwidth value: 1
Maximum
value:
1000000
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
Option Description
Option Description
Option Description
Option Description
candidate Candidate.
never Never.
always Always.
Option Description
no-summary No summary.
summary Summary.
Option Description
regular Regular.
nssa NSSA.
stub Stub.
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
Option Description
ah Authentication Header.
Option Description
md5 MD5.
sha1 SHA1.
sha256 SHA256.
Option Description
sha384 SHA384.
sha512 SHA512.
Option Description
null No encryption.
des DES.
3des 3DES.
aes128 AES128.
aes192 AES192.
aes256 AES256.
config ipsec-keys
config ipsec-keys
Option Description
disable disable
enable enable
config virtual-link
Option Description
ah Authentication Header.
Option Description
md5 MD5.
sha1 SHA1.
sha256 SHA256.
sha384 SHA384.
sha512 SHA512.
Option Description
null No encryption.
des DES.
3des 3DES.
aes128 AES128.
aes192 AES192.
aes256 AES256.
config ipsec-keys
config ospf6-interface
cost Cost of the interface, value range from 0 to 65535, 0 integer Minimum 0
means auto-cost. value: 0
Maximum
value:
65535
Option Description
Option Description
broadcast broadcast
point-to-point point-to-point
non-broadcast non-broadcast
point-to- point-to-multipoint
multipoint
Option Description
Option Description
Option Description
Option Description
ah Authentication Header.
Option Description
md5 MD5.
sha1 SHA1.
sha256 SHA256.
sha384 SHA384.
sha512 SHA512.
Option Description
null No encryption.
des DES.
3des 3DES.
aes128 AES128.
aes192 AES192.
aes256 AES256.
config ipsec-keys
config ipsec-keys
config neighbor
cost Cost of the interface, value range from 0 to 65535, 0 integer Minimum 0
means auto-cost. value: 0
Maximum
value:
65535
config redistribute
Option Description
Option Description
1 Type 1.
2 Type 2.
config summary-address
Option Description
disable disable
enable enable
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config rule
action Permit or deny this IP address and netmask prefix. option - permit
Option Description
prefix IPv4 prefix to define regular filter criteria, such as user Not Specified 0.0.0.0
"any" or subnets. 0.0.0.0
config rule
action Permit or deny packets that match this rule. option - permit
Option Description
prefix6 IPv6 prefix to define regular filter criteria, such as user Not Specified
"any" or subnets.
Configure RIP.
config router rip
Description: Configure RIP.
set default-information-originate [enable|disable]
set default-metric {integer}
config distance
Description: Distance.
edit <id>
set prefix {ipv4-classnet-any}
set distance {integer}
set access-list {string}
next
end
config distribute-list
Description: Distribute list.
edit <id>
set status [enable|disable]
set direction [in|out]
set listname {string}
set interface {string}
next
end
set garbage-timer {integer}
config interface
Option Description
max-out- Maximum metric allowed to output(0 means 'not set'). integer Minimum 0
metric value: 0
Maximum
value: 15
Option Description
1 Version 1.
2 Version 2.
config distribute-list
Option Description
Option Description
Option Description
none None.
text Text.
md5 MD5.
Option Description
1 Version 1.
2 Version 2.
Option Description
1 Version 1.
2 Version 2.
Option Description
Option Description
Option Description
poisoned Poisoned.
regular Regular.
config neighbor
config network
Option Description
Option Description
config redistribute
Option Description
Configure RIPng.
config router ripng
Description: Configure RIPng.
config aggregate-address
Description: Aggregate address.
edit <id>
set prefix6 {ipv6-prefix}
next
end
set default-information-originate [enable|disable]
set default-metric {integer}
config distance
Description: Distance.
edit <id>
set distance {integer}
set prefix6 {ipv6-prefix}
set access-list6 {string}
next
end
config distribute-list
Description: Distribute list.
edit <id>
set status [enable|disable]
set direction [in|out]
set listname {string}
set interface {string}
next
end
set garbage-timer {integer}
config interface
Description: RIPng interface configuration.
edit <name>
set split-horizon-status [enable|disable]
set split-horizon [poisoned|regular]
set flags {integer}
next
end
set max-out-metric {integer}
config neighbor
Description: Neighbor.
edit <id>
Option Description
max-out- Maximum metric allowed to output(0 means 'not set'). integer Minimum 0
metric value: 0
Maximum
value: 15
config aggregate-address
config distance
config distribute-list
Option Description
Option Description
config interface
Option Description
Option Description
poisoned Poisoned.
regular Regular.
config neighbor
config network
Option Description
Option Description
config redistribute
Option Description
config rule
Option Description
permit Permit.
deny Deny.
Option Description
Option Description
Option Description
none None.
match-ip6- Match next hop IPv6 address passed by access- string Maximum
nexthop list6 or prefix-list6. length: 35
Option Description
Option Description
prepend Prepend.
replace Replace.
Option Description
Option Description
Option Description
Option Description
none None.
Option Description
Option Description
dst Destination IP and mask for this route. ipv4- Not Specified 0.0.0.0
classnet 0.0.0.0
Option Description
Option Description
enable Keep this static route when link monitor or health check is down.
disable Withdraw this static route when link monitor or health check is down. (default)
src Source prefix for this route. ipv4- Not Specified 0.0.0.0
classnet 0.0.0.0
Option Description
Option Description
Option Description
dynamic- Enable use of dynamic gateway retrieved from Router option - disable
gateway Advertisement (RA).
Option Description
Option Description
enable Keep this static route when link monitor or health check is down.
disable Withdraw this static route when link monitor or health check is down. (default)
Option Description
Option Description
Option Description
Option Description
config ppid-filters
Option Description
Option Description
sftp SFTP.
Option Description
scp SCP.
Option Description
Option Description
sftp SFTP.
scp SCP.
config shell-commands
Option Description
Option Description
action Action to take for SSH shell command matches. option - block
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Policies which can override the 'default' for specific ISL/ICL/FortiLink interface.
config switch-controller auto-config custom
Description: Policies which can override the 'default' for specific ISL/ICL/FortiLink
interface.
edit <name>
config switch-binding
Description: Switch binding list.
edit <switch-id>
set policy {string}
next
end
next
end
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Policy definitions which can define the behavior on auto configured interfaces.
config switch-controller auto-config policy
Description: Policy definitions which can define the behavior on auto configured
interfaces.
edit <name>
set igmp-flood-report [enable|disable]
set igmp-flood-traffic [enable|disable]
set poe-status [enable|disable]
set qos-policy {string}
set storm-control-policy {string}
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Configure the FortiGate switch controller to send custom commands to managed FortiSwitch devices.
config switch-controller custom-command
Description: Configure the FortiGate switch controller to send custom commands to
managed FortiSwitch devices.
edit <command-name>
set command {var-string}
set description {string}
next
end
This command is available for model(s): FortiGate 40F 3G4G, FortiGate 60F, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81F-POE, FortiGate 81F,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100EF,
FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate
1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate
1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F, FortiGate 300E,
FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F, FortiGate 3201F,
FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3500F,
FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3700F,
FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F, FortiGate 4200F, FortiGate
4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate
500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate 601F,
FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 61E,
FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate
80E, FortiGate 81E-POE, FortiGate 81E, FortiGate 900D, FortiGate 900G, FortiGate 901G,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi
60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F,
FortiWiFi 80F 2R, FortiWiFi 81F 2R.
DSL policy.
config switch-controller dsl policy
Description: DSL policy.
edit <name>
set append_padding [disable|enable]
set cpe-aele [disable|enable]
set cpe-aele-mode [ELE_M0|ELE_DS|...]
set cs {option1}, {option2}, ...
set ds-bitswap [disable|enable]
set pause-frame [disable|enable]
set profile [auto-30a|auto-17a|...]
set type {option}
set us-bitswap [disable|enable]
next
end
Option Description
disable Disable.
enable Enable.
Option Description
disable Disable.
enable Enable.
Option Description
Option Description
Option Description
disable Disable.
enable Enable.
Option Description
disable Disable.
enable Enable.
Option Description
Option Description
Proscend Proscend.
Option Description
disable Disable.
enable Enable.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Configure Dynamic port policy to be applied on the managed FortiSwitch ports through DPP device.
config switch-controller dynamic-port-policy
Description: Configure Dynamic port policy to be applied on the managed FortiSwitch
ports through DPP device.
edit <name>
set description {string}
set fortilink {string}
config policy
Description: Port policies with matching criteria and actions.
edit <name>
set description {string}
set status [enable|disable]
set category [device|interface-tag]
set interface-tags <tag-name1>, <tag-name2>, ...
set mac {string}
set hw-vendor {string}
set type {string}
set family {string}
set host {string}
set lldp-profile {string}
set qos-policy {string}
set 802-1x {string}
set vlan-policy {string}
set bounce-port-link [disable|enable]
next
fortilink FortiLink interface for which this Dynamic port policy string Maximum
belongs to. length: 15
config policy
Option Description
Option Description
interface-tags Match policy based on the FortiSwitch interface object string Maximum
<tag-name> tags. length: 63
FortiSwitch port tag name.
lldp-profile LLDP profile to be applied when using this policy. string Maximum
length: 63
qos-policy QoS policy to be applied when using this policy. string Maximum
length: 63
802-1x 802.1x security policy to be applied when using this string Maximum
policy. length: 31
vlan-policy VLAN policy to be applied when using this policy. string Maximum
length: 63
Option Description
disable Disable bouncing (administratively bring the link down, up) of a switch port
where this policy is applied.
enable Enable bouncing (administratively bring the link down, up) of a switch port
where this policy is applied.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
max-export- Configure flow max export packet size. integer Minimum value: 512
pkt-size 512 Maximum
value: 9216
sample-mode Configure sample mode for the flow tracking. option - perimeter
Option Description
local Set local mode which samples on the specific switch port.
perimeter Set perimeter mode which samples on all switch fabric ports and fortilink port
at the ingress.
device-ingress Set device -ingress mode which samples across all switch ports at the ingress.
sample-rate Configure sample rate for the perimeter and integer Minimum value: 512
device-ingress sampling. 0 Maximum
value: 99999
timeout- Configure flow session general timeout. integer Minimum value: 3600
general 60 Maximum
value: 604800
timeout-icmp Configure flow session ICMP timeout. integer Minimum value: 300
60 Maximum
value: 604800
timeout-max Configure flow session max timeout. integer Minimum value: 604800
60 Maximum
value: 604800
timeout-tcp Configure flow session TCP timeout. integer Minimum value: 3600
60 Maximum
value: 604800
timeout-tcp- Configure flow session TCP FIN timeout. integer Minimum value: 300
fin 60 Maximum
value: 604800
timeout-tcp- Configure flow session TCP RST timeout. integer Minimum value: 120
rst 60 Maximum
value: 604800
timeout-udp Configure flow session UDP timeout. integer Minimum value: 300
60 Maximum
value: 604800
config aggregates
ip IP address to group all matching traffic sessions to a ipv4- Not Specified 0.0.0.0
flow. classnet 0.0.0.0
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
link-down- Clear NAC and dynamic devices on switch ports on link option - enable
flush down event.
Option Description
disable Disable clearing NAC and dynamic devices on a switch port when link down
event happens.
enable Enable clearing NAC and dynamic devices on a switch port when link down
event happens.
config nac-ports
onboarding- Default NAC Onboarding VLAN when NAC devices are string Maximum
vlan discovered. length: 15
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
disable Disable bouncing (administratively bring the link down, up) of a switch port
where a quarantined device was seen last.
enable Enable bouncing (administratively bring the link down, up) of a switch port
where a quarantined device was seen last.
default-virtual- Default VLAN for ports when added to the virtual- string Maximum
switch-vlan switch. length: 15
Option Description
Option Description
Option Description
Option Description
Option Description
mac-aging- Time after which an inactive MAC is aged out. integer Minimum 300
interval value: 10
Maximum
value:
1000000
Option Description
Option Description
by-redirect Quarantined device traffic is redirected only to the FortiGate on the received
VLAN.
Option Description
enable Enable DNS resolution of the FortiSwitch unit's IP address by use of its serial
number.
disable Disable DNS resolution of the FortiSwitch unit's IP address by use of its serial
number.
update-user- Control which sources update the device user list. option - mac-cache
device lldp dhcp-
snooping l2-
db l3-db
Option Description
Option Description
dhcp-snooping Update from FortiSwitch DHCP snooping client and server databases.
Option Description
vlan-identity Identity of the VLAN. Commonly used for RADIUS option - name
Tunnel-Private-Group-Id.
Option Description
description Configure the VLAN description to that of the FortiOS interface description if
available; otherwise use the interface name.
name Configure the VLAN description to that of the FortiOS interface name.
Option Description
config custom-command
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
query-interval Maximum time after which IGMP query will be sent. integer Minimum 125
value: 10
Maximum
value: 1200
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
default-vlan Default VLAN (native) assigned to all switch ports string Maximum _default
upon discovery. length: 63
nac-segment VLAN for NAC segment primary interface. string Maximum nac_segment
length: 63
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
Option Description
config custom-tlvs
config med-location-service
Option Description
config med-network-policy
Option Description
enable Transmit this TLV if a VLAN has been addded to the port.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
tx-hold Number of tx-intervals before local LLDP data expires. integer Minimum 4
Packet TTL is tx-hold * tx-interval. value: 1
Maximum
value: 16
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
config address-civic
country The two-letter ISO 3166 country code in capital ASCII string Maximum
letters eg. US, CA, DK, DE. length: 47
config coordinates
altitude Plus or minus floating point number. For example, string Maximum
117.47. length: 15
Option Description
Option Description
latitude Floating point starting with +/- or ending with (N or S). string Maximum
For example, +/-16.67 or 16.67N. length: 15
longitude Floating point starting with +/- or ending with (N or S). string Maximum
For example, +/-26.789 or 26.789E. length: 15
config elin-number
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Configure MAC policy to be applied on the managed FortiSwitch devices through NAC device.
config switch-controller mac-policy
Description: Configure MAC policy to be applied on the managed FortiSwitch devices
through NAC device.
edit <name>
set bounce-port-link [disable|enable]
set count [disable|enable]
set description {string}
set fortilink {string}
set traffic-policy {string}
set vlan {string}
next
end
Option Description
disable Disable bouncing (administratively bring the link down, up) of a switch port
where this mac-policy is applied.
enable Enable bouncing (administratively bring the link down, up) of a switch port
where this mac-policy is applied.
Option Description
fortilink FortiLink interface for which this MAC policy belongs to. string Maximum
length: 15
traffic-policy Traffic policy to be applied when using this MAC policy. string Maximum
length: 63
vlan Ingress traffic VLAN assignment for the MAC address string Maximum
matching this MAC policy. length: 15
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
global Use global setting for DHCP snooping server access list.
enable Override global setting and enable DHCP server access list.
disable Override global setting and disable DHCP server access list.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config 802-1X-settings
Option Description
Option Description
Option Description
config custom-command
config dhcp-snooping-static-client
Option Description
aging-time Maximum time to retain a multicast snooping entry for integer Minimum 300
which no packets have been seen. value: 15
Maximum
value: 3600
Option Description
config vlans
proxy IGMP snooping proxy for the VLAN interface. option - global
Option Description
global Use global setting for IGMP snooping proxy on VLAN interface.
querier Enable/disable IGMP snooping querier for the VLAN option - disable
interface.
Option Description
config ip-source-guard
config binding-entry
config mirror
Option Description
Option Description
config ports
Option Description
1000full 1G full-duplex
auto Auto-negotiation.
Option Description
Option Description
Option Description
Option Description
Option Description
bandwidth Member selection based on largest total bandwidth of links of similar speed.
Option Description
flap-duration Period over which flap events are calculated integer Minimum 30
(seconds). value: 5
Maximum
value: 300
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
both Enable flow control for both transmission and receive pause control frames.
Option Description
75% Back pressure state won't be cleared until bucket count falls below 75% of
pause threshold.
50% Back pressure state won't be cleared until bucket count falls below 50% of
pause threshold.
25% Back pressure state won't be cleared until bucket count falls below 25% of
pause threshold.
Option Description
qos-policy Switch controller QoS policy from available string Maximum default
options. length: 63
storm-control- Switch controller storm control policy from string Maximum default
policy available options. length: 63
Option Description
Option Description
Option Description
Option Description
mode LACP mode: ignore and do not send control option - static
messages, or negotiate 802.3ad aggregation
passively or actively.
Option Description
static Static aggregation, do not send and ignore any control messages.
Option Description
Option Description
Option Description
config remote-log
Option Description
Option Description
Option Description
Option Description
Option Description
config snmp-community
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config hosts
config snmp-sysinfo
Option Description
config snmp-trap-threshold
config snmp-user
Option Description
Option Description
Option Description
Option Description
Option Description
config storm-control
Option Description
rate Rate in packets per second at which storm traffic is integer Minimum 500
controlled. Storm control drops excess traffic data rates value: 1
beyond this threshold. Maximum
value:
10000000
Option Description
Option Description
Option Description
config stp-instance
Option Description
0 0.
4096 4096.
8192 8192.
12288 12288.
16384 16384.
20480 20480.
24576 24576.
28672 28672.
32768 32768.
36864 36864.
Option Description
40960 40960.
45056 45056.
49152 49152.
53248 53248.
57344 57344.
61440 61440.
config stp-settings
local-override Enable to configure local STP settings that override option - disable
global STP settings.
Option Description
hello-time Period of time between successive STP frame Bridge integer Minimum 2
Protocol Data Units. value: 1
Maximum
value: 10
forward-time Period of time a port is in listening and learning state. integer Minimum 15
value: 4
Maximum
value: 30
max-age Maximum time before a bridge port saves its integer Minimum 20
configuration BPDU information. value: 6
Maximum
value: 40
max-hops Maximum number of hops between the root bridge and integer Minimum 20
the furthest bridge. value: 1
Maximum
value: 40
config switch-log
local-override Enable to configure local logging settings that override option - disable
global logging settings.
Option Description
Option Description
severity Severity of FortiSwitch logs that are added to the option - notification
FortiGate event log.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
config map
Option Description
Option Description
EF DSCP EF.
Option Description
flash Flash.
immediate Immediate.
priority Priority.
routine Routine.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
config cos-queue
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
auth-fail-vlan Enable to allow limited access to clients that cannot option - disable
authenticate.
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable the capability to apply the EAP/MAB frame VLAN to the port native
VLAN.
enable Enable the capability to apply the EAP/MAB frame VLAN to the port native
VLAN.
guest-vlan Enable the guest VLAN feature to allow limited access option - disable
to non-802.1X-compliant clients.
Option Description
Option Description
Option Description
Option Description
radius- Enable to override the global RADIUS session timeout. option - disable
timeout-
overwrite
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
internal- Allowed access on the switch internal interface. option - https ping
allowaccess ssh
Option Description
mgmt- Allowed access on the switch management interface. option - https ping
allowaccess ssh
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
enable Enable storm control for broadcast traffic to drop packets which exceed
configured rate limits.
disable Disable storm control for broadcast traffic to allow all packets.
rate Threshold rate in packets per second at which storm integer Minimum 500
traffic is controlled in override mode. value: 0
Maximum
value:
10000000
Option Description
override Override global and switch level storm control to use port level configuration.
disabled Disable storm control on the port entirely overriding global and switch level
storm control.
Option Description
enable Enable storm control for unknown multicast traffic to drop packets which
exceed configured rate limits.
disable Disable storm control for unknown multicast traffic to allow all packets.
Option Description
enable Enable storm control for unknown unicast traffic to drop packets which exceed
configured rate limits.
disable Disable storm control for unknown unicast traffic to allow all packets.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
rate Rate in packets per second at which storm traffic is integer Minimum 500
controlled. Storm control drops excess traffic data rates value: 1
beyond this threshold. Maximum
value:
10000000
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
forward-time Period of time a port is in listening and learning state. integer Minimum 15
value: 4
Maximum
value: 30
hello-time Period of time between successive STP frame Bridge integer Minimum 2
Protocol Data Units. value: 1
Maximum
value: 10
max-age Maximum time before a bridge port expires its integer Minimum 20
configuration BPDU information. value: 6
Maximum
value: 40
max-hops Maximum number of hops between the root bridge and integer Minimum 20
the furthest bridge. value: 1
Maximum
value: 40
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Configure FortiSwitch logging (logs are transferred to and inserted into FortiGate event log).
config switch-controller switch-log
Description: Configure FortiSwitch logging (logs are transferred to and inserted into
FortiGate event log).
set severity [emergency|alert|...]
set status [enable|disable]
end
severity Severity of FortiSwitch logs that are added to the option - notification
FortiGate event log.
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
dynamic- Periodic time interval to run Dynamic port policy integer Minimum 60
periodic- engine. value: 5
interval Maximum
value: 180
iot-holdoff MAC entry's creation time. Time must be greater than integer Minimum 5
this value for an entry to be created. value: 0
Maximum
value:
10080
iot-mac-idle MAC entry's idle time. MAC entry is removed after this integer Minimum 1440
value. value: 0
Maximum
value:
10080
Option Description
Option Description
compatible Least restrictive. Supports the widest variety of hardware and software
versions.
strict Highest level of security. Supports only the latest generation of hardware and
latest software version.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
guaranteed- Guaranteed burst size in bytes (max value = integer Minimum 45000
burst 4294967295). value: 0
Maximum
value:
4294967295
maximum- Maximum burst size in bytes (max value = integer Minimum 67500
burst 4294967295). value: 0
Maximum
value:
4294967295
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
config target-ip
config target-mac
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Configure VLAN policy to be applied on the managed FortiSwitch ports through dynamic-port-policy.
config switch-controller vlan-policy
Description: Configure VLAN policy to be applied on the managed FortiSwitch ports
through dynamic-port-policy.
edit <name>
set allowed-vlans <vlan-name1>, <vlan-name2>, ...
set allowed-vlans-all [enable|disable]
set description {string}
set discard-mode [none|all-untagged|...]
set fortilink {string}
set untagged-vlans <vlan-name1>, <vlan-name2>, ...
set vlan {string}
allowed-vlans Allowed VLANs to be applied when using this VLAN string Maximum
<vlan- policy. length: 79
name> VLAN name.
allowed- Enable/disable all defined VLANs when using this VLAN option - disable
vlans-all policy.
Option Description
discard-mode Discard mode to be applied when using this VLAN option - none
policy.
Option Description
fortilink FortiLink interface for which this VLAN policy belongs to. string Maximum
length: 15
untagged- Untagged VLANs to be applied when using this VLAN string Maximum
vlans <vlan- policy. length: 79
name> VLAN name.
vlan Native VLAN to be applied when using this VLAN policy. string Maximum
length: 15
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate
81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 900G, FortiGate 901G, FortiGate 90E,
FortiGate 91E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F
3G4G, FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ,
FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F
2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate VM64.
3G MODEM custom.
config system 3g-modem custom
Description: 3G MODEM custom.
edit <id>
set class-id {user}
set init-string {string}
set model {string}
set modeswitch-string {string}
set product-id {user}
set vendor {string}
set vendor-id {user}
next
end
class-id USB interface class in hexadecimal format (00-ff). user Not Specified
modeswitch- USB modeswitch arguments. For example: '-v 1410 - string Maximum
string p 9030 -V 1410 -P 9032 -u 3'. length: 127
Option Description
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
Option Description
none No access.
Option Description
none No access.
Option Description
Option Description
Option Description
Option Description
none No access.
vpngrp Administrator access to IPsec, SSL, PPTP, and L2TP option - none
VPN.
Option Description
none No access.
Option Description
none No access.
wifi Administrator access to the WiFi controller and Switch option - none
controller.
Option Description
none No access.
config fwgrp-permission
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
config loggrp-permission
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
config sysgrp-permission
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
config utmgrp-permission
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
interface Interface(s) on which the ACME client will listen for string Maximum
<interface- challenges. length: 79
name> Interface name.
source-ip Source IPv4 address used to connect to the ACME ipv4- Not 0.0.0.0
server. address Specified
source-ip6 Source IPv6 address used to connect to the ACME ipv6- Not ::
server. address Specified
config accounts
accprofile Access profile for this administrator. Access profiles string Maximum
control administrator access to FortiGate features. length: 35
Option Description
Option Description
Option Description
Option Description
Option Description
ip6-trusthost1 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost10 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost2 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost3 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost4 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost5 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost6 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost7 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost8 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost9 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
Option Description
peer-group Name of peer group defined under config user group string Maximum
which has PKI members. Used for peer certificate length: 35
authentication (for HTTPS admin access).
Option Description
remote-group User group name used for remote auth. string Maximum
length: 35
sms-custom- Custom SMS server to send SMS messages to. string Maximum
server length: 35
sms-server Send SMS messages using the FortiGuard SMS option - fortiguard
server or a custom server.
Option Description
ssh-certificate Select the certificate to be used by the FortiGate for string Maximum
authentication with an SSH client. length: 35
trusthost1 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost10 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost2 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost3 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost4 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost5 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost6 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost7 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost8 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost9 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
Option Description
Option Description
Option Description
vdom <name> Virtual domain(s) that the administrator can access. string Maximum
Virtual domain name. length: 79
vdom-override Enable to use the names of VDOMs provided by the option - disable
remote authentication server to control the VDOMs
that this administrator can access.
Option Description
Option Description
This command is available for model(s): FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate VM64.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100EF,
FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate
1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate
1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F, FortiGate 300E,
FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F, FortiGate 3201F,
FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3500F,
FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3700F,
FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate
81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 900G, FortiGate 901G, FortiGate 90E,
FortiGate 91E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F
3G4G, FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ,
FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F
2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
affinity- Affinity setting (64-bit hexadecimal value in the format string Maximum
cpumask of 0xxxxxxxxxxxxxxxxx). length: 127
rxqid ID of the receive queue (when the interface has integer Minimum 0
multiple queues) on which to perform packet value: 0
redistribution. Maximum
value: 255
Configure alarm.
config system alarm
Description: Configure alarm.
set audible [enable|disable]
config groups
Description: Alarm groups.
edit <id>
set period {integer}
set admin-auth-failure-threshold {integer}
set admin-auth-lockout-threshold {integer}
set user-auth-failure-threshold {integer}
set user-auth-lockout-threshold {integer}
set replay-attempt-threshold {integer}
set self-test-failure-threshold {integer}
set log-full-warning-threshold {integer}
set encryption-failure-threshold {integer}
set decryption-failure-threshold {integer}
config fw-policy-violations
Description: Firewall policy violations.
edit <id>
set threshold {integer}
set src-ip {ipv4-address}
set dst-ip {ipv4-address}
set src-port {integer}
set dst-port {integer}
next
end
set fw-policy-id {integer}
set fw-policy-id-threshold {integer}
next
Option Description
Option Description
config groups
Option Description
config trusthost
Option Description
auto-install- Enable/disable auto install the config in USB disk. option - disable
config
Option Description
auto-install- Enable/disable auto install the image in USB disk. option - disable
image
Option Description
default- Default config file name in USB disk. string Maximum fgt_
config-file length: 127 system.conf
default- Default image file name in USB disk. string Maximum image.out
image-file length: 127
Option Description
timeout Maximum running time for this script in seconds (0 = no integer Minimum 0
timeout). value: 0
Maximum
value: 300
accprofile Access profile for CLI script action to access string Maximum
FortiGate features. length: 35
Option Description
Option Description
Option Description
Option Description
Option Description
enable CLI script executes on all FortiGate units in the Security Fabric.
disable CLI script executes only on the FortiGate unit that the stitch is triggered.
Option Description
text Plaintext.
Option Description
post POST.
put PUT.
get GET.
patch PATCH.
delete DELETE.
minimum- Limit execution to no more than once in this interval integer Minimum 0
interval (in seconds). value: 0
Maximum
value:
2592000
Option Description
http HTTP.
https HTTPS.
Option Description
Option Description
timeout Maximum running time for this script in seconds (0 = integer Minimum 0
no timeout). value: 0
Maximum
value: 300
Option Description
config http-headers
Automation destinations.
config system automation-destination
Description: Automation destinations.
edit <name>
set destination <name1>, <name2>, ...
set ha-group-id {integer}
set type [fortigate|ha-cluster]
next
end
Option Description
Automation stitches.
config system automation-stitch
Description: Automation stitches.
edit <name>
config actions
Description: Configure stitch actions.
edit <id>
set action {string}
set delay {integer}
set required [enable|disable]
next
end
set description {var-string}
set destination <name1>, <name2>, ...
set status [enable|disable]
set trigger {string}
next
end
Option Description
config actions
Option Description
Option Description
ha-failover HA failover.
Option Description
Option Description
Option Description
Option Description
trigger- Trigger date and time (YYYY-MM-DD HH:MM:SS). datetime Not 0000-00-00
datetime Specified 00:00:00
Option Description
Option Description
Option Description
Option Description
sunday Sunday.
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
thursday Thursday.
friday Friday.
saturday Saturday.
vdom <name> Virtual domain(s) that this trigger is valid for. string Maximum
Virtual domain name. length: 79
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 2500E, FortiGate 400E Bypass, FortiGate
800D, FortiGate 80F Bypass, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiGateRugged 70F 3G4G, FortiGateRugged 70F.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100EF,
FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate
1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate
1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2600F, FortiGate 2601F,
FortiGate 3000D, FortiGate 3000F, FortiGate 3001F, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3200F, FortiGate 3201F, FortiGate 3300E,
FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3500F, FortiGate 3501F,
FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3700F, FortiGate 3701F,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E, FortiGate 400F, FortiGate 401E,
FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F,
FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E,
FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate
60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate
61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 80E-POE, FortiGate 80E,
FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 81F, FortiGate 900D, FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate
91E, FortiGate VM64, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
auto-recover * Automatically recover from bypass mode after system option - enable
reboot.
Option Description
enable Recover interfaces from bypass mode. The actual mode is determined by
poweron-bypass setting.
Option Description
2 2 second
4 4 second
6 6 second
8 8 second
10 10 second
12 12 second
14 14 second
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
default High strength algorithms and medium-strength 128-bit key length algorithms.
fmg-source-ip IPv4 source address that this FortiGate uses when ipv4- Not 0.0.0.0
communicating with FortiManager. address Specified
fmg-source-ip6 IPv6 source address that this FortiGate uses when ipv6- Not ::
communicating with FortiManager. address Specified
Option Description
Option Description
enable Enable inclusion of public FortiGuard servers in the override server list.
disable Disable inclusion of public FortiGuard servers in the override server list.
Option Description
Option Description
ltefw-upgrade- Schedule next LTE firmware upgrade time (Local string Maximum
time * Time). Format: YYYY-MM-DD HH:MM:SS length: 35
Option Description
backup Manage and configure this FortiGate locally and back up its configuration to
FortiManager.
Option Description
Option Description
Option Description
fortimanager FortiManager.
use-elbc-vdom Enable/disable use of special ELBC config sync VDOM option - disable
* to connect to FortiManager.
Option Description
enable enable
disable disable
vdom Virtual domain (VDOM) name to use when string Maximum root
communicating with FortiManager. length: 31
config server-list
Option Description
Option Description
fqdn FQDN.
Configure console.
config system console
Description: Configure console.
set fortiexplorer [enable|disable]
set login [enable|disable]
set mode [batch|line]
set output [standard|more]
end
Option Description
Option Description
Option Description
Option Description
Add this FortiGate to a Security Fabric or set up a new Security Fabric on this FortiGate.
Option Description
Option Description
Option Description
Option Description
enable Enable downstream device access to this device's configuration and data.
disable Disable downstream device access to this device's configuration and data.
Option Description
local Global CMDB objects will not be synchronized to and from this device.
Option Description
file-quota Maximum amount of memory that can be used by integer Minimum 268435456
the daemon files (in bytes). value: 0
Maximum
value:
4294967295
file-quota- Warn when the set percentage of quota has been integer Minimum 90
warning used. value: 1
Maximum
value: 99
Option Description
group-password Security Fabric group password. All FortiGates in password Not Specified
a Security Fabric must have the same group
password.
Option Description
Option Description
source-ip Source IP address for communication with the ipv4- Not Specified 0.0.0.0
upstream FortiGate. address
Option Description
Option Description
upstream-port The port number to use to communicate with the integer Minimum 8013
FortiGate upstream from this FortiGate in the value: 1
Security Fabric. Maximum
value: 65535
config fabric-connector
Option Description
config trusted-list
Option Description
Option Description
Option Description
Configure DDNS.
config system ddns
Description: Configure DDNS.
edit <ddnsid>
set addr-type [ipv4|ipv6]
set bound-ip {string}
set clear-text [disable|enable]
set ddns-auth [disable|tsig]
set ddns-domain {string}
set ddns-key {password_aes256}
set ddns-keyname {string}
set ddns-password {password}
set ddns-server [dyndns.org|dyns.net|...]
set ddns-server-addr <addr1>, <addr2>, ...
set ddns-sn {string}
set ddns-ttl {integer}
set ddns-username {string}
set ddns-zone {string}
set monitor-interface <interface-name1>, <interface-name2>, ...
set server-type [ipv4|ipv6]
set ssl-certificate {string}
set update-interval {integer}
set use-public-ip [disable|enable]
next
end
Option Description
Option Description
Option Description
Option Description
dyns.net www.dyns.net
tzo.com rh.tzo.com
Option Description
dipdns.net dipdnsserver.dipdns.com
now.net.cn ip.todayisp.com
dhs.org members.dhs.org
easydns.com members.easydns.com
noip.com dynupdate.no-ip.com
Option Description
ssl-certificate Name of local certificate for SSL connections. string Maximum Fortinet_
length: 35 Factory
Option Description
default- Default gateway for dedicated management interface. ipv4- Not 0.0.0.0
gateway address Specified
Option Description
Option Description
Option Description
Option Description
none No failure.
version- An image matching the device and version could not be found.
unavailable
Option Description
device- The image downloads are complete, but one or more devices have
disconnected disconnected.
cancelled The upgrade was cancelled due to the tree not being ready.
Option Description
Option Description
dns-service Options for assigning DNS servers to DHCPv6 clients. option - specify
Option Description
domain Domain name suffix for the IP addresses that the string Maximum
DHCP server assigns to clients. length: 35
Option Description
Option Description
Option Description
Option Description
subnet Subnet or subnet-id if the IP mode is delegated. ipv6-prefix Not Specified ::/0
config ip-range
Option Description
auto-managed- Enable/disable use of this DHCP server once this option - enable
status interface has been assigned an IP address from
FortiIPAM.
Option Description
disable Disable use of this DHCP server once this interface has been assigned an IP
address from FortiIPAM.
enable Enable use of this DHCP server once this interface has been assigned an IP
address from FortiIPAM.
Option Description
Option Description
Option Description
default- Default gateway IP address assigned by the DHCP ipv4-address Not Specified 0.0.0.0
gateway server.
Option Description
Option Description
local IP address of the interface the DHCP server is added to becomes the client's
DNS server IP address.
domain Domain name suffix for the IP addresses that the string Maximum
DHCP server assigns to clients. length: 35
filename Name of the boot file on the TFTP server. string Maximum
length: 127
Option Description
Option Description
ipsec-lease- DHCP over IPsec leases expire this many seconds integer Minimum 60
hold after tunnel down (0 to disable forced-expiry). value: 0
Maximum
value:
8640000
mac-acl- MAC access control default action (allow or block option - assign
default-action assigning IP settings).
Option Description
assign Allow the DHCP server to assign IP settings to clients on the MAC access
control list.
block Block the DHCP server from assigning IP settings to clients on the MAC
access control list.
netmask Netmask assigned by the DHCP server. ipv4-netmask Not Specified 0.0.0.0
next-server IP address of a server (for example, a TFTP sever) ipv4-address Not Specified 0.0.0.0
that DHCP clients can download a boot file from.
Option Description
local IP address of the interface the DHCP server is added to becomes the client's
NTP server IP address.
Option Description
Option Description
Option Description
02 (GMT-10:00) Hawaii
03 (GMT-9:00) Alaska
05 (GMT-7:00) Arizona
10 (GMT-6:00) Saskatchewan
74 (GMT-4:00) Caracas
77 (GMT-4:00) Georgetown
15 (GMT-4:00) La Paz
87 (GMT-4:00) Paraguay
16 (GMT-3:00) Santiago
17 (GMT-3:30) Newfoundland
Option Description
18 (GMT-3:00) Brasilia
75 (GMT-3:00) Uruguay
21 (GMT-2:00) Mid-Atlantic
22 (GMT-1:00) Azores
24 (GMT) Monrovia
79 (GMT) Casablanca
78 (GMT+1:00) Namibia
32 (GMT+2:00) Bucharest
33 (GMT+2:00) Cairo
36 (GMT+2:00) Jerusalem
37 (GMT+3:00) Baghdad
83 (GMT+3:00) Moscow
84 (GMT+3:00) Minsk
40 (GMT+3:00) Nairobi
85 (GMT+3:00) Istanbul
Option Description
41 (GMT+3:30) Tehran
43 (GMT+4:00) Baku
44 (GMT+4:30) Kabul
45 (GMT+5:00) Ekaterinburg
48 (GMT+5:45) Kathmandu
52 (GMT+6:30) Rangoon
54 (GMT+7:00) Krasnoyarsk
58 (GMT+8:00) Perth
59 (GMT+8:00) Taipei
61 (GMT+9:00) Yakutsk
62 (GMT+9:30) Adelaide
63 (GMT+9:30) Darwin
64 (GMT+10:00) Brisbane
67 (GMT+10:00) Hobart
68 (GMT+10:00) Vladivostok
Option Description
69 (GMT+10:00) Magadan
73 (GMT+13:00) Nuku'alofa
86 (GMT+13:00) Samoa
76 (GMT+14:00) Kiritimati
timezone- Options for the DHCP server to set the client's time option - disable
option zone.
Option Description
Option Description
Option Description
local IP address of the interface the DHCP server is added to becomes the client's
WiFi Access Controller IP address.
wifi-ac1 WiFi Access Controller 1 IP address (DHCP option ipv4-address Not Specified 0.0.0.0
138, RFC 5417).
wifi-ac2 WiFi Access Controller 2 IP address (DHCP option ipv4-address Not Specified 0.0.0.0
138, RFC 5417).
wifi-ac3 WiFi Access Controller 3 IP address (DHCP option ipv4-address Not Specified 0.0.0.0
138, RFC 5417).
config exclude-range
Option Description
Option Description
lease-time Lease time in seconds, 0 means default lease time. integer Minimum 0
value: 300
Maximum
value:
8640000
config ip-range
Option Description
Option Description
lease-time Lease time in seconds, 0 means default lease time. integer Minimum 0
value: 300
Maximum
value:
8640000
config options
Option Description
Option Description
Option Description
config reserved-address
Option Description
mac MAC address of the client that will get the mac- Not Specified 00:00:00:00:00:00
reserved IP address. address
Option Description
assign Configure the client with this MAC address like any other client.
block Block the DHCP server from assigning IP settings to the client with this MAC
address.
Option Description
reserved Assign the reserved IP address to the client with this MAC address.
Option Description
circuit-id Option 82 circuit-ID of the client that will get string Maximum
the reserved IP address. length: 312
Option Description
remote-id Option 82 remote-ID of the client that will get string Maximum
the reserved IP address. length: 312
This command is available for model(s): FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiGateRugged 70F 3G4G, FortiGateRugged 70F.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100EF,
FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate
1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate
1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F, FortiGate 300E,
FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F, FortiGate 3201F,
FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3500F,
FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3700F,
FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1,
FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate
VM64, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi
60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-
POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
Option Description
Option Description
Option Description
Option Description
Option Description
contact Email address of the administrator for this zone. You string Maximum host
can specify only the username, such as admin or the length: 255
full email address, such as admin@test.com When
using only a username, the domain of the email will
be this zone.
ip-primary IP address of primary DNS server. Entries in this ipv4- Not Specified 0.0.0.0
primary DNS server and imported into the DNS address-
zone. any
primary-name Domain name of the default DNS server for this string Maximum dns
zone. length: 255
source-ip Source IP for forwarding to DNS server. ipv4- Not Specified 0.0.0.0
address
Option Description
ttl Default time-to-live value for the entries of this DNS integer Minimum 86400
zone. value: 0
Maximum
value:
2147483647
Option Description
secondary Secondary DNS zone, to import entries from other DNS zones.
view Zone view (public to serve public clients, shadow to option - shadow
serve internal clients).
Option Description
config dns-entry
Option Description
Option Description
A Host type.
Option Description
Option Description
Configure DNS.
config system dns
Description: Configure DNS.
set alt-primary {ipv4-address}
set alt-secondary {ipv4-address}
set cache-notfound-responses [disable|enable]
set dns-cache-limit {integer}
set dns-cache-ttl {integer}
set domain <domain1>, <domain2>, ...
set fqdn-cache-ttl {integer}
set fqdn-min-refresh {integer}
set interface {string}
set interface-select-method [auto|sdwan|...]
set ip6-primary {ipv6-address}
set ip6-secondary {ipv6-address}
set log [disable|error|...]
set primary {ipv4-address}
set protocol {option1}, {option2}, ...
set retry {integer}
set secondary {ipv4-address}
set server-hostname <hostname1>, <hostname2>, ...
set server-select-method [least-rtt|failover]
set source-ip {ipv4-address}
set ssl-certificate {string}
set timeout {integer}
end
alt-primary Alternate primary DNS server. This is not used as a ipv4- Not Specified 0.0.0.0
failover DNS server. address
alt-secondary Alternate secondary DNS server. This is not used ipv4- Not Specified 0.0.0.0
as a failover DNS server. address
cache- Enable/disable response from the DNS server when option - disable
notfound- a record is not in cache.
responses
Option Description
dns-cache-limit Maximum number of records in the DNS cache. integer Minimum 5000
value: 0
Maximum
value:
4294967295
dns-cache-ttl Duration in seconds that the DNS cache retains integer Minimum 1800
information. value: 60
Maximum
value: 86400
Option Description
Option Description
disable Disable.
Option Description
Option Description
source-ip IP address used by the DNS server as its source IP. ipv4- Not Specified 0.0.0.0
address
ssl-certificate Name of local certificate for SSL connections. string Maximum Fortinet_
length: 35 Factory
Configure DNS64.
config system dns64
Description: Configure DNS64.
set always-synthesize-aaaa-record [enable|disable]
set dns64-prefix {ipv6-prefix}
set status [enable|disable]
end
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
forticontroller FortiController.
dual- Dual-FortiController.
forticontroller
Configure the email server used by the FortiGate various things. For example, for sending email messages to users to
support user authentication features.
config system email-server
Description: Configure the email server used by the FortiGate various things. For
example, for sending email messages to users to support user authentication features.
set authenticate [enable|disable]
set interface {string}
set interface-select-method [auto|sdwan|...]
set password {password}
set port {integer}
set reply-to {string}
set security [none|starttls|...]
set server {string}
set source-ip {ipv4-address}
set source-ip6 {ipv6-address}
set ssl-min-proto-version [default|SSLv3|...]
set type {option}
set username {string}
set validate-server [enable|disable]
end
Option Description
Option Description
Option Description
none None.
starttls STARTTLS.
smtps SSL/TLS.
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
Option Description
Option Description
Option Description
full Check server certificate and verify the domain matches in the server
certificate.
source-ip Source IPv4 address used to communicate with ipv4- Not 0.0.0.0
server. address Specified
Option Description
Option Description
Option Description
feed FortiGate unit will pull update from the external resource.
push External Resource update is pushed to the FortiGate unit through the
FortiGate unit's RESTAPI/CLI.
loopback- IPv4 address and subnet mask for hub's loopback ipv4- Not Specified 0.0.0.0
address-block address, syntax: X.X.X.X/24. classnet- 0.0.0.0
host
Option Description
Option Description
Option Description
Option Description
config advertised-subnets
Option Description
config overlays
overlay- IPv4 address and subnet mask for the overlay tunnel , ipv4- Not Specified 0.0.0.0
tunnel-block syntax: X.X.X.X/24. classnet- 0.0.0.0
host
remote-gw IP address of the hub gateway (Set by hub). ipv4- Not Specified 0.0.0.0
address-
any
overlay-policy The overlay policy to allow ADVPN thru traffic. integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none No failure.
version- An image matching the device and version could not be found.
unavailable
Option Description
ha-reboot- Serial number of the FortiGate unit that will control the string Maximum
controller reboot process for the federated upgrade of the HA length: 79
cluster.
next-path- The index of the next image to upgrade to. integer Minimum 0
index value: 0
Maximum
value: 10
Option Description
device- The image downloads are complete, but one or more devices have
disconnected disconnected.
cancelled The upgrade was cancelled due to the tree not being ready.
Option Description
config node-list
Option Description
Option Description
coordinating- Serial number of the FortiGate unit that controls this string Maximum
fortigate device. length: 79
Option Description
Option Description
Option Description
Option Description
antispam- Interval of time between license checks for the integer Minimum 4294967295
license FortiGuard antispam contract. value: 0
Maximum
value:
4294967295
anycast-sdns- IP address of the FortiGuard anycast DNS rating ipv4- Not Specified 0.0.0.0
server-ip server. address
anycast-sdns- Port to connect to on the FortiGuard anycast DNS integer Minimum 853
server-port rating server. value: 1
Maximum
value: 65535
Option Description
auto- Allowed day. Disallow any day of the week to use option -
firmware- auto-firmware-upgrade-delay instead, which waits
upgrade-day for designated days before installing an automatic
patch-level firmware upgrade.
Option Description
sunday Sunday.
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
thursday Thursday.
friday Friday.
saturday Saturday.
auto- End time in the designated time window for integer Minimum 4
firmware- automatic patch-level firmware upgrade from value: 0
upgrade-end- FortiGuard in 24 hour time. When the end time is Maximum
hour smaller than the start time, the end time is value: 23
interpreted as the next day. The actual upgrade
time is selected randomly within the time window.
auto- Start time in the designated time window for integer Minimum 1
firmware- automatic patch-level firmware upgrade from value: 0
upgrade-start- FortiGuard in 24 hour time. The actual upgrade Maximum
hour time is selected randomly within the time window. value: 23
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
outbreak- Interval of time between license checks for integer Minimum 4294967295
prevention- FortiGuard Virus Outbreak Prevention contract. value: 0
license Maximum
value:
4294967295
Option Description
Option Description
Option Description
proxy-server- Port used to communicate with the proxy server. integer Minimum 0
port value: 0
Maximum
value: 65535
Option Description
Option Description
include-question- Include DNS question section in the FortiGuard DNS setup message.
section
sdns-server- IP address of the FortiGuard DNS rating server. user Not Specified
ip
source-ip Source IPv4 address used to communicate with ipv4- Not Specified 0.0.0.0
FortiGuard. address
source-ip6 Source IPv6 address used to communicate with ipv6- Not Specified ::
FortiGuard. address
Option Description
Option Description
Option Description
Option Description
Option Description
videofilter- Interval of time between license checks for the integer Minimum 4294967295
license FortiGuard video filter contract. value: 0
Maximum
value:
4294967295
Option Description
webfilter- Time-to-live for web filter cache entries in integer Minimum 3600
cache-ttl seconds. value: 300
Maximum
value: 86400
Option Description
webfilter- Interval of time between license checks for the integer Minimum 4294967295
license FortiGuard web filter contract. value: 0
Maximum
value:
4294967295
Configure FortiNDR.
config system fortindr
Description: Configure FortiNDR.
set interface {string}
set interface-select-method [auto|sdwan|...]
set source-ip {string}
set status [disable|enable]
end
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Configure FortiSandbox.
config system fortisandbox
Description: Configure FortiSandbox.
set email {string}
set enc-algorithm [default|high|...]
set forticloud [enable|disable]
set inline-scan [enable|disable]
set interface {string}
set interface-select-method [auto|sdwan|...]
set server {string}
set source-ip {string}
set ssl-min-proto-version [default|SSLv3|...]
set status [enable|disable]
end
enc-algorithm Configure the level of SSL protection for secure option - default
communication with FortiSandbox.
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
Option Description
server-cert Name of the server certificate to be used for SSL. string Maximum Fortinet_
length: 35 Factory
server-ip IPv4 address of FortiToken Mobile push services server ipv4- Not 0.0.0.0
(format: xxx.xxx.xxx.xxx). address Specified
server-port Port to communicate with FortiToken Mobile push integer Minimum 4433
services server. value: 1
Maximum
value:
65535
Option Description
ip-version IP version to use for the GENEVE interface and so for option - ipv4-unicast
communication over the GENEVE. IPv4 or IPv6
unicast.
Option Description
remote-ip IPv4 address of the GENEVE interface on the device at ipv4- Not 0.0.0.0
the remote end of the GENEVE. address Specified
remote-ip6 IPv6 IP address of the GENEVE interface on the device ipv6- Not ::
at the remote end of the GENEVE. address Specified
Option Description
Configure geographical location mapping for IP address(es) to override mappings from FortiGuard.
config system geoip-override
Description: Configure geographical location mapping for IP address(es) to override
mappings from FortiGuard.
edit <name>
set country-id {string}
set description {string}
config ip-range
Description: Table of IP ranges assigned to country.
edit <id>
set start-ip {ipv4-address}
set end-ip {ipv4-address}
next
end
config ip6-range
Description: Table of IPv6 ranges assigned to country.
edit <id>
config ip-range
start-ip Starting IP address, inclusive, of the address range ipv4- Not 0.0.0.0
(format: xxx.xxx.xxx.xxx). address Specified
end-ip Ending IP address, inclusive, of the address range ipv4- Not 0.0.0.0
(format: xxx.xxx.xxx.xxx). address Specified
config ip6-range
Option Description
Option Description
Option Description
Option Description
enable Admin users must provide a valid certificate when PKI is enabled for
HTTPS admin access.
Option Description
Option Description
DHE Ban the use of cipher suites using authenticated ephemeral DH key
agreement.
ECDHE Ban the use of cipher suites using authenticated ephemeral ECDH key
agreement.
AES Ban the use of cipher suites using either 128 or 256 bit AES.
AESGCM Ban the use of cipher suites using AES in Galois Counter Mode (GCM).
CAMELLIA Ban the use of cipher suites using either 128 or 256 bit CAMELLIA.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
pass Bypass the antivirus system when memory is low. Antivirus scanning
resumes when the low memory condition is resolved.
off Stop accepting new AV sessions when entering conserve mode, but
continue to process current active sessions.
Option Description
Option Description
Option Description
Option Description
revert Manually save config and revert the config when timeout.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable early TCP NPU session in order to guarantee packet order of 3-
way handshake.
disable Disable early TCP NPU session in order to guarantee packet order of 3-
way handshake.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
yyyy/MM/dd Year/Month/Day.
dd/MM/yyyy Day/Month/Year.
MM/dd/yyyy Month/Day/Year.
yyyy-MM-dd Year-Month-Day.
dd-MM-yyyy Day-Month-Year.
MM-dd-yyyy Month-Day-Year.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
auto auto
Option Description
mini Small sized Internet Service database with very limited IP addresses.
ip-src-port-range IP source port range used for user Not Specified 1024-25000
traffic originating from the
FortiGate unit.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
english English.
french French.
spanish Spanish.
portuguese Portuguese.
japanese Japanese.
korean Korean.
Option Description
Option Description
Option Description
Option Description
enable Enable logging the event of a single CPU core reaching CPU usage
threshold.
disable Disable logging the event of a single CPU core reaching CPU usage
threshold.
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable use of the admin-sport setting for the management port.
disable Disable use of the admin-sport setting for the management port.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
traffic Proxy keep-alive timeout begins after traffic has not been received.
re- Proxy keep-alive timeout begins when the user was authenticated.
authentication
proxy-re- The time limit that users must integer Minimum value: 30
authentication-time re-authenticate if proxy-keep- 1 Maximum
alive-mode is set to re- value: 86400
authenticate (1 - 86400 sec,
default=30s.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable detection of those special format files when using Data Leak
Prevention.
enable Enable detection of those special format files when using Data Leak
Prevention.
Option Description
Option Description
Option Description
sunday Sunday
monday Monday
tuesday Tuesday
wednesday Wednesday
thursday Thursday
friday Friday
saturday Saturday
Option Description
chacha20- chacha20-poly1305@openssh.com
poly1305@openssh.com
aes128-ctr aes128-ctr
aes192-ctr aes192-ctr
aes256-ctr aes256-ctr
arcfour256 arcfour256
arcfour128 arcfour128
aes128-cbc aes128-cbc
3des-cbc 3des-cbc
blowfish-cbc blowfish-cbc
cast128-cbc cast128-cbc
aes192-cbc aes192-cbc
aes256-cbc aes256-cbc
arcfour arcfour
rijndael-cbc@lysator.liu.se rijndael-cbc@lysator.liu.se
aes128- aes128-gcm@openssh.com
gcm@openssh.com
aes256- aes256-gcm@openssh.com
gcm@openssh.com
Option Description
diffie-hellman- diffie-hellman-group1-sha1
group1-sha1
diffie-hellman- diffie-hellman-group14-sha1
group14-sha1
diffie-hellman-group- diffie-hellman-group-exchange-sha1
exchange-sha1
diffie-hellman-group- diffie-hellman-group-exchange-sha256
exchange-sha256
curve25519- curve25519-sha256@libssh.org
sha256@libssh.org
ecdh-sha2-nistp256 ecdh-sha2-nistp256
ecdh-sha2-nistp384 ecdh-sha2-nistp384
ecdh-sha2-nistp521 ecdh-sha2-nistp521
Option Description
hmac-md5 hmac-md5
hmac-md5- hmac-md5-etm@openssh.com
etm@openssh.com
hmac-md5-96 hmac-md5-96
hmac-md5-96- hmac-md5-96-etm@openssh.com
etm@openssh.com
hmac-sha1 hmac-sha1
Option Description
hmac-sha1- hmac-sha1-etm@openssh.com
etm@openssh.com
hmac-sha2-256 hmac-sha2-256
hmac-sha2-256- hmac-sha2-256-etm@openssh.com
etm@openssh.com
hmac-sha2-512 hmac-sha2-512
hmac-sha2-512- hmac-sha2-512-etm@openssh.com
etm@openssh.com
hmac-ripemd160 hmac-ripemd160
hmac- hmac-ripemd160@openssh.com
ripemd160@openssh.com
hmac-ripemd160- hmac-ripemd160-etm@openssh.com
etm@openssh.com
umac-64@openssh.com umac-64@openssh.com
umac-128@openssh.com umac-128@openssh.com
umac-64- umac-64-etm@openssh.com
etm@openssh.com
umac-128- umac-128-etm@openssh.com
etm@openssh.com
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
02 (GMT-10:00) Hawaii
03 (GMT-9:00) Alaska
05 (GMT-7:00) Arizona
Option Description
10 (GMT-6:00) Saskatchewan
74 (GMT-4:00) Caracas
77 (GMT-4:00) Georgetown
15 (GMT-4:00) La Paz
87 (GMT-4:00) Paraguay
16 (GMT-3:00) Santiago
17 (GMT-3:30) Newfoundland
18 (GMT-3:00) Brasilia
75 (GMT-3:00) Uruguay
21 (GMT-2:00) Mid-Atlantic
22 (GMT-1:00) Azores
24 (GMT) Monrovia
79 (GMT) Casablanca
Option Description
78 (GMT+1:00) Namibia
32 (GMT+2:00) Bucharest
33 (GMT+2:00) Cairo
36 (GMT+2:00) Jerusalem
37 (GMT+3:00) Baghdad
83 (GMT+3:00) Moscow
84 (GMT+3:00) Minsk
40 (GMT+3:00) Nairobi
85 (GMT+3:00) Istanbul
41 (GMT+3:30) Tehran
43 (GMT+4:00) Baku
44 (GMT+4:30) Kabul
45 (GMT+5:00) Ekaterinburg
48 (GMT+5:45) Kathmandu
52 (GMT+6:30) Rangoon
Option Description
54 (GMT+7:00) Krasnoyarsk
58 (GMT+8:00) Perth
59 (GMT+8:00) Taipei
61 (GMT+9:00) Yakutsk
62 (GMT+9:30) Adelaide
63 (GMT+9:30) Darwin
64 (GMT+10:00) Brisbane
67 (GMT+10:00) Hobart
68 (GMT+10:00) Vladivostok
69 (GMT+10:00) Magadan
73 (GMT+13:00) Nuku'alofa
86 (GMT+13:00) Samoa
76 (GMT+14:00) Kiritimati
Option Description
tos IP TOS.
Option Description
Option Description
Option Description
restricted Send ARPs for the first 8192 addresses in VIP range.
Option Description
Option Description
Option Description
Option Description
Option Description
wireless-controller- Port used for the control integer Minimum value: 5246
port channel in wireless controller 1024 Maximum
mode. value: 49150
Option Description
config split-port-mode
split-mode The configuration mode for the split port interface. option - disable
Option Description
Option Description
Option Description
Option Description
diffservcode DiffServ setting to be applied to GRE tunnel outer IP user Not Specified
header.
Option Description
Option Description
key-inbound * Require received GRE packets contain this key. integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
Option Description
Option Description
Configure HA monitor.
config system ha-monitor
Description: Configure HA monitor.
set monitor-vlan [enable|disable]
set vlan-hb-interval {integer}
set vlan-hb-lost-threshold {integer}
end
Option Description
Configure HA.
config system ha
Description: Configure HA.
set arps {integer}
set arps-interval {integer}
set authentication [enable|disable]
set cpu-threshold {user}
set encryption [enable|disable]
set failover-hold-time {integer}
set ftp-proxy-threshold {user}
set gratuitous-arps [enable|disable]
set group-id {integer}
set group-name {string}
set ha-direct [enable|disable]
set ha-eth-type {string}
config ha-mgmt-interfaces
Description: Reserve interfaces to manage individual cluster units.
edit <id>
set interface {string}
set dst {ipv4-classnet}
set gateway {ipv4-address}
set gateway6 {ipv6-address}
next
end
set ha-mgmt-status [enable|disable]
set ha-uptime-diff-margin {integer}
set hb-interval {integer}
set hb-interval-in-milliseconds [100ms|10ms]
set hb-lost-threshold {integer}
set hbdev {user}
set hc-eth-type {string}
set hello-holddown {integer}
set http-proxy-threshold {user}
set imap-proxy-threshold {user}
set key {password}
set l2ep-eth-type {string}
set link-failed-signal [enable|disable]
set load-balance-all [enable|disable]
set logical-sn [enable|disable]
set memory-based-failover [enable|disable]
set memory-compatible-mode [enable|disable]
set memory-failover-flip-timeout {integer}
set memory-failover-monitor-period {integer}
set memory-failover-sample-rate {integer}
set memory-failover-threshold {integer}
set memory-threshold {user}
set mode [standalone|a-a|...]
set monitor {user}
set multicast-ttl {integer}
set nntp-proxy-threshold {user}
set override [enable|disable]
set override-wait-time {integer}
set password {password}
Option Description
cpu-threshold Dynamic weighted load balancing CPU usage user Not Specified
weight and high and low thresholds.
Option Description
ftp-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of FTP proxy sessions.
Option Description
group-name Cluster group name. Must be the same for all string Maximum
members. length: 32
Option Description
Option Description
ha-uptime-diff- Normally you would only reduce this value for integer Minimum 300
margin failover testing. value: 1
Maximum
value: 65535
Option Description
hbdev Heartbeat interfaces. Must be the same for all user Not Specified
members. Enter <interface> <priority> pairs to
specify the priority of each heartbeat interface.
Higher priority takes precedence.
hello-holddown Time to wait before changing from hello to work integer Minimum 20
state. value: 5
Maximum
value: 300
http-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of HTTP proxy sessions.
imap-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of IMAP proxy sessions.
link-failed-signal Enable to shut down all interfaces for 1 sec after option - disable
a failover. Use if gratuitous ARPs do not update
network.
Option Description
Option Description
Option Description
Option Description
Option Description
mode HA mode. Must be the same for all members. option - standalone
FGSP requires standalone.
Option Description
monitor Interfaces to check for port monitoring (or link user Not Specified
failure).
nntp-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of NNTP proxy sessions.
override Enable and increase the priority of the unit that option - disable
should always be primary (master).
Option Description
password Cluster password. Must be the same for all password Not Specified
members.
Option Description
enable Enable force reset of secondary member after PING server failure.
disable Disable force reset of secondary member after PING server failure.
pop3-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of POP3 proxy sessions.
priority Increase the priority to select the primary unit. integer Minimum 128
value: 0
Maximum
value: 255
route-ttl TTL for primary unit routes. Increase to maintain integer Minimum 10
active routes during failover. value: 5
Maximum
value: 3600
route-wait Time to wait before sending new routes to the integer Minimum 0
cluster. value: 0
Maximum
value: 3600
schedule Type of A-A load balancing. Use none if you option - round-robin
have external load balancers.
Option Description
none None.
random Random.
ip IP.
ipport IP port.
Option Description
Option Description
Option Description
Option Description
Option Description
smtp-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of SMTP proxy sessions.
Option Description
Option Description
Option Description
Option Description
Option Description
unicast-gateway Default route gateway for unicast interface. ipv4- Not Specified 0.0.0.0
* address
Option Description
Option Description
Option Description
Option Description
weight Weight-round-robin weight for each cluster unit. user Not Specified 0 40
Syntax <priority> <weight>.
dst Default route destination for reserved HA ipv4- Not Specified 0.0.0.0
management interface. classnet 0.0.0.0
gateway Default route gateway for reserved HA management ipv4- Not Specified 0.0.0.0
interface. address
gateway6 Default IPv6 gateway for reserved HA management ipv6- Not Specified ::
interface. address
config unicast-peers
config vcluster
override Enable and increase the priority of the unit that should option - disable
always be primary (master).
Option Description
priority Increase the priority to select the primary unit. integer Minimum 128
value: 0
Maximum
value: 255
monitor Interfaces to check for port monitoring (or link failure). user Not
Specified
pingserver- Enable to force the cluster to negotiate after a remote IP option - enable
secondary- monitoring failover.
force-reset
Option Description
enable Enable force reset of secondary member after PING server failure.
disable Disable force reset of secondary member after PING server failure.
Option Description
Option Description
dh-keypair- Number of key pairs to pre-generate for each Diffie- integer Minimum 100 **
count Hellman group (per-worker). value: 0
Maximum
value:
50000
Option Description
Option Description
Option Description
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-14
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-15
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-16
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-17
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-19
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-2
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-20
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-21
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-28
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-29
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-30
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-31
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-5
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
Configure interfaces.
config system interface
Description: Configure interfaces.
edit <name>
set ac-name {string}
set aggregate {string}
set aggregate-type [physical|vxlan]
set algorithm [L2|L3|...]
set alias {string}
set allowaccess {option1}, {option2}, ...
set ap-discover [enable|disable]
set arpforward [enable|disable]
set atm-protocol [none|ipoa]
set auth-cert {string}
set auth-portal-addr {string}
set auth-type [auto|pap|...]
set auto-auth-extension-device [enable|disable]
set bandwidth-measure-time {integer}
set bfd [global|enable|...]
set bfd-desired-min-tx {integer}
set bfd-detect-mult {integer}
set bfd-required-min-rx {integer}
set broadcast-forward [enable|disable]
set cli-conn-status {integer}
config client-options
Description: DHCP client options.
edit <id>
set code {integer}
set type [hex|string|...]
set value {string}
set ip {user}
next
end
set color {integer}
set dedicated-to [none|management]
set defaultgw [enable|disable]
set description {var-string}
set detected-peer-mtu {integer}
set detectprotocol {option1}, {option2}, ...
set detectserver {user}
set device-identification [enable|disable]
set device-user-identification [enable|disable]
set devindex {integer}
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ping PING.
detectserver Gateway's ping server for this IP. user Not Specified
Option Description
Option Description
Option Description
enable Enable addition of classless static routes retrieved from DHCP server.
disable Disable addition of classless static routes retrieved from DHCP server.
Option Description
Option Description
Option Description
Option Description
disable None.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
tls TLS.
peap PEAP.
Option Description
Option Description
disable Disable.
cos0 CoS 0.
cos1 CoS 1.
cos2 CoS 2.
cos3 CoS 3.
cos4 CoS 4.
cos5 CoS 5.
cos6 CoS 6.
cos7 CoS 7.
Option Description
Option Description
Option Description
Option Description
soft-restart Soft-restart-on-extender.
hard-restart Hard-restart-on-extender.
reboot Reboot-on-extender.
Option Description
link-failed-signal Link-failed-signal.
link-down Link-down.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
none none
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable.
cos0 CoS 0.
cos1 CoS 1.
cos2 CoS 2.
cos3 CoS 3.
cos4 CoS 4.
cos5 CoS 5.
cos6 CoS 6.
cos7 CoS 7.
Option Description
Option Description
profile1 interconnect profile1 [(10G & IC > 7m/20db-loss) or (25G/27G & IC < 1m)]
ip Interface IPv4 address and subnet mask, ipv4- Not Specified 0.0.0.0 0.0.0.0
syntax: X.X.X.X/24. classnet-
host
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
static Use static aggregation, do not send and ignore any LACP messages.
Option Description
Option Description
vdom Use VDOM Link Layer Discovery Protocol (LLDP) reception configuration
setting.
Option Description
macaddr Change the interface's MAC address. mac- Not Specified 00:00:00:00:00:00 **
address
Option Description
Option Description
management-ip High Availability in-band management IP ipv4- Not Specified 0.0.0.0 0.0.0.0
address of this interface. classnet-
host
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
vc-encaps VC encapsulation.
Option Description
Option Description
Option Description
Option Description
vdsl VDSL.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
priority-adjust Enable STP negotiation on HA secondary and make priority lower than HA
primary.
Option Description
Option Description
Option Description
substitute-dst- Destination MAC address that all mac- Not Specified 00:00:00:00:00:00
mac packets are sent to from this interface. address
Option Description
Option Description
enable Block FortiSwitch port-to-port traffic on the VLAN, only permitting traffic to
and from the FortiGate.
Option Description
Option Description
Option Description
Option Description
enable Enable DHCP snooping verify source MAC for FortiSwitch devices.
disable Disable DHCP snooping verify source MAC for FortiSwitch devices.
Option Description
default-vlan Default VLAN (native) assigned to all switch ports upon discovery.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
system-id Define a system ID for the aggregate mac- Not Specified 00:00:00:00:00:00
interface. address
Option Description
Option Description
Option Description
Option Description
trust-ip-1 Trusted host for dedicated management ipv4- Not Specified 0.0.0.0 0.0.0.0
traffic (0.0.0.0/24 for all hosts). classnet-
any
trust-ip-2 Trusted host for dedicated management ipv4- Not Specified 0.0.0.0 0.0.0.0
traffic (0.0.0.0/24 for all hosts). classnet-
any
trust-ip-3 Trusted host for dedicated management ipv4- Not Specified 0.0.0.0 0.0.0.0
traffic (0.0.0.0/24 for all hosts). classnet-
any
trust-ip6-1 Trusted IPv6 host for dedicated ipv6-prefix Not Specified ::/0
management traffic (::/0 for all hosts).
trust-ip6-2 Trusted IPv6 host for dedicated ipv6-prefix Not Specified ::/0
management traffic (::/0 for all hosts).
trust-ip6-3 Trusted IPv6 host for dedicated ipv6-prefix Not Specified ::/0
management traffic (::/0 for all hosts).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
weight Default weight for static routes (if route integer Minimum 0
has no weight configured). value: 0
Maximum
value: 255
Option Description
allow Allow.
deny Deny.
Option Description
Option Description
PSK PSK.
radius RADIUS.
Option Description
Option Description
Option Description
Option Description
TKIP TKIP.
AES AES.
Option Description
Option Description
open Open.
wep64 WEP64.
wep128 WEP128.
Option Description
config dhcp-snooping-server-list
config egress-queues
config ipv6
Option Description
Option Description
Option Description
ip6-address Primary IPv6 address prefix. Syntax: ipv6-prefix Not Specified ::/0
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx/xxx.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
dhcp6 Use delegated prefix from a DHCPv6 client to form a delegated IPv6 address.
Option Description
Option Description
Option Description
disable Use address of the egress interface as source address of the relay message.
enable Use address of this interface as source address of the relay message.
Option Description
Option Description
Option Description
Option Description
config ip6-extra-addr
config ip6-prefix-list
Option Description
Option Description
config ip6-delegated-prefix-list
Option Description
Option Description
Option Description
config dhcp6-iapd-list
prefix-hint DHCPv6 prefix that will be used as a hint to the ipv6- Not Specified ::/0
upstream DHCPv6 server. network
prefix-hint-plt DHCPv6 prefix hint preferred life time (sec), 0 means integer Minimum 604800
unlimited lease time. value: 0
Maximum
value:
4294967295
prefix-hint-vlt DHCPv6 prefix hint valid life time (sec). integer Minimum 2592000
value: 0
Maximum
value:
4294967295
config vrrp6
Option Description
Option Description
Option Description
config l2tp-client-settings
Option Description
Option Description
config secondaryip
Option Description
Option Description
detectserver Gateway's ping server for this IP. user Not Specified
Option Description
ping PING.
config vrrp
Option Description
2 VRRP version 2.
3 VRRP version 3.
Option Description
Option Description
vrdst-priority Priority of the virtual router when the virtual router integer Minimum 0
destination becomes unreachable. value: 0
Maximum
value: 254
Option Description
Option Description
config wifi-mac-list
config wifi-networks
Option Description
open Open.
wep64 WEP64.
wep128 WEP128.
Option Description
Option Description
TKIP TKIP.
AES AES.
Option Description
fabric-root Use the IPAM server running on the Security Fabric root.
Option Description
config pools
subnet Configure IPAM pool subnet, Class A - Class B subnet. ipv4- Not 0.0.0.0
classnet Specified 0.0.0.0
config rules
Option Description
Option Description
Configure IP in IP Tunneling.
config system ipip-tunnel
Description: Configure IP in IP Tunneling.
edit <name>
set auto-asic-offload [enable|disable]
set interface {string}
set local-gw {ipv4-address-any}
set remote-gw {ipv4-address}
set use-sdwan [disable|enable]
next
end
Option Description
interface Interface name that is associated with the incoming string Maximum
traffic from available options. length: 15
local-gw IPv4 address for the local gateway. ipv4- Not 0.0.0.0
address- Specified
any
remote-gw IPv4 address for the remote gateway. ipv4- Not 0.0.0.0
address Specified
Option Description
Option Description
status Enable/disable using this DNS server for IPS URL filter option - enable
DNS queries.
Option Description
enable Enable this DNS server for IPS URL filter DNS queries.
disable Disable this DNS server for IPS URL filter DNS queries.
status Enable/disable this server for IPv6 DNS queries. option - enable
Option Description
Option Description
enable Allow the signatures specified by IDs to be triggered even if they are on hold.
signature- Time to hold and monitor IPS signatures. Format user Not 0h
hold-time <#d##h>. Specified
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1100E, FortiGate 1101E, FortiGate
1500DT, FortiGate 1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2200E, FortiGate
2201E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3700D,
FortiGate 400E, FortiGate 401E, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 800D.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100EF,
FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 140E-POE,
FortiGate 140E, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E, FortiGate
201F, FortiGate 2500E, FortiGate 3000F, FortiGate 3001F, FortiGate 3200F, FortiGate
3201F, FortiGate 3400E, FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate
3600E, FortiGate 3601E, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate
3980E, FortiGate 400E Bypass, FortiGate 400F, FortiGate 401F, FortiGate 40F 3G4G,
FortiGate 40F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate 60E DSLJ,
FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E,
FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 80E-POE, FortiGate 80E, FortiGate
80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E,
FortiGate 81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 900G, FortiGate 901G,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
Option Description
Option Description
1k-bytes 1K bytes.
2k-bytes 2K bytes.
4k-bytes 4K bytes.
8k-bytes 8K bytes.
Option Description
half-packet One burst unit equals two time slots in which one packet is sent.
1-packet 1 packet.
2-packets 2 packets.
4-packets 4 packets.
16-packets 16 packets.
65-packets 65 packets.
Option Description
diffservcode Differentiated services code point (DSCP) in the IP user Not Specified
header of the probe packet.
gateway-ip Gateway IP address used to probe the server. ipv4- Not Specified 0.0.0.0
address-
any
gateway-ip6 Gateway IPv6 address used to probe the server. ipv6- Not Specified ::
address
http-agent String in the http-agent field in the HTTP header. string Maximum Chrome/
length: 1024 Safari/
http-get If you are monitoring an HTML server you can send string Maximum /
an HTTP-GET request with a custom string. Use this length: 1024
option to define the string.
http-match String that you expect to see in the HTTP-GET string Maximum
requests of the traffic to be monitored. length: 1024
port Port number of the traffic to be used to monitor the integer Minimum 0
server. value: 1
Maximum
value: 65535
probe-count Number of most recent probes that should be used integer Minimum 30
to calculate latency and jitter. value: 5
Maximum
value: 30
probe-timeout Time to wait before a probe packet is considered integer Minimum 500
lost. value: 20
Maximum
value: 5000
Option Description
Option Description
Option Description
Option Description
service- Only use monitor to read quality values. If enabled, option - disable
detection static routes and cascade interfaces will not be
updated.
Option Description
source-ip Source IP address used in packet to the server. ipv4- Not Specified 0.0.0.0
address-
any
source-ip6 Source IPv6 address used in packet to the server. ipv6- Not Specified ::
address
Option Description
Option Description
Option Description
Option Description
config server-list
Option Description
port Port number of the traffic to be used to monitor the integer Minimum 0
server. value: 1
Maximum
value:
65535
Option Description
Option Description
config guest-voice-signaling
Option Description
Option Description
config softphone
Option Description
Option Description
config streaming-video
Option Description
Option Description
Option Description
Option Description
config video-signaling
Option Description
Option Description
config voice
Option Description
Option Description
config voice-signaling
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate
81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 900G, FortiGate 901G, FortiGate 90E,
FortiGate 91E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F
3G4G, FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ,
FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F
2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate VM64.
allow-modify- Allow FortiGate to modify the wireless WAN interface option - enable
mtu-size * MTU size.
Option Description
allow-modify- Allow FortiGate to modify the wireless profile table if option - enable
wireless- the internal LTE modem is running the GENERIC
profile-table * modem firmware.
Option Description
apn Login APN string for PDP-IP packet data calls. string Maximum
length: 127
authtype Authentication type for PDP-IP packet data calls. option - none
Option Description
Option Description
band- Bitmaps for the allowed 3G and LTE bands.Ex: string Maximum
restrictions * 0000000000000000-0000000000001008 (3G Mask- length: 35
LTE Mask)
connection- Set connection-based SIM card hot swap time option - 5-minutes
hot-swap * interval.
Option Description
5-minutes Perform SIM card hot swap if current card is not able to connect for 5 minutes.
10-minutes Perform SIM card hot swap if current card is not able to connect for 10
minutes.
data-limit * LTE Modem data limit mega bytes, 0 for unlimited integer Minimum 0
data. value: 0
Maximum
value:
100000
Option Description
extra-init Extra initialization string for USB LTE/WIMAX devices. string Maximum
length: 127
force- Force to use wireless profile index , 0 if don't force. integer Minimum 0
wireless- value: 0
profile * Maximum
value: 16
Option Description
Option Description
interface The interface that the modem is acting as a redundant string Maximum
interface for. length: 63
Option Description
Option Description
redundant Redundant modem operation mode where the modem is used as a backup
interface.
Option Description
lte LTE
Option Description
passwd Authentication password for PDP-IP packet data calls. password Not
Specified
sim-hot-swap Enable/disable SIM card auto detection and hot swap. option - enable
*
Option Description
sim-slot * SIM card slot. 1: right slot. 2: left slot. integer Minimum 1
value: 1
Maximum
value: 2
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Configure Mobile tunnels, an implementation of Network Mobility (NEMO) extensions for Mobile IPv4 RFC5177.
config system mobile-tunnel
Description: Configure Mobile tunnels, an implementation of Network Mobility (NEMO)
extensions for Mobile IPv4 RFC5177.
edit <name>
set hash-algorithm {option}
set home-address {ipv4-address}
set home-agent {ipv4-address}
set lifetime {integer}
set n-mhae-key {password_aes256}
set n-mhae-key-type [ascii|base64]
set n-mhae-spi {integer}
config network
Description: NEMO network configuration.
edit <id>
set interface {string}
set prefix {ipv4-classnet}
next
end
set reg-interval {integer}
set reg-retry {integer}
set renew-interval {integer}
set roaming-interface {string}
set status [disable|enable]
set tunnel-mode {option}
next
end
Option Description
home-agent IPv4 address of the NEMO HA (Format: ipv4-address Not Specified 0.0.0.0
xxx.xxx.xxx.xxx).
Option Description
roaming- Select the associated interface name from available string Maximum
interface options. length: 15
Option Description
Option Description
config network
interface Select the associated interface name from available string Maximum
options. length: 15
prefix Class IP and Netmask with correction ipv4- Not Specified 0.0.0.0
(Format:xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx or classnet 0.0.0.0
xxx.xxx.xxx.xxx/x).
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate
81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 900G, FortiGate 901G, FortiGate 90E,
FortiGate 91E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F
3G4G, FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ,
FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F
2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate VM64.
Configure MODEM.
config system modem
Description: Configure MODEM.
set action [dial|stop|...]
set altmode [enable|disable]
set authtype1 {option1}, {option2}, ...
set authtype2 {option1}, {option2}, ...
set authtype3 {option1}, {option2}, ...
set auto-dial [enable|disable]
set connect-timeout {integer}
set dial-cmd1 {string}
set dial-cmd2 {string}
set dial-cmd3 {string}
set dial-on-demand [enable|disable]
set distance {integer}
set dont-send-CR1 [enable|disable]
set dont-send-CR2 [enable|disable]
set dont-send-CR3 [enable|disable]
set extra-init1 {string}
set extra-init2 {string}
set extra-init3 {string}
set holddown-timer {integer}
set idle-timer {integer}
set interface {string}
set lockdown-lac {string}
Option Description
none No action.
Option Description
Option Description
pap PAP
chap CHAP
mschap MSCHAP
mschapv2 MSCHAPv2
Option Description
pap PAP
chap CHAP
mschap MSCHAP
mschapv2 MSCHAPv2
Option Description
pap PAP
chap CHAP
mschap MSCHAP
mschapv2 MSCHAPv2
Option Description
dial-on- Enable/disable to dial the modem when packets are option - disable
demand routed to the modem interface.
Option Description
Option Description
Option Description
Option Description
Option Description
standalone Standalone.
passwd1 Password to access the specified dialup account. password Not Specified
passwd2 Password to access the specified dialup account. password Not Specified
passwd3 Password to access the specified dialup account. password Not Specified
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
none Forever.
1 One attempt.
2 Two attempts.
3 Three attempts.
4 Four attempts.
5 Five attempts.
6 Six attempts.
7 Seven attempts.
8 Eight attempts.
9 Nine attempts.
10 Ten attempts.
Option Description
Option Description
username1 User name to access the specified dialup account. string Maximum
length: 63
username2 User name to access the specified dialup account. string Maximum
length: 63
username3 User name to access the specified dialup account. string Maximum
length: 63
wireless-port Enter wireless port number: 0 for default, 1 for first integer Minimum 0
port, and so on. value: 0
Maximum
value:
4294967295
Option Description
Configure NetFlow.
config system netflow
Description: Configure NetFlow.
set active-flow-timeout {integer}
config collectors
Description: Netflow collectors.
edit <id>
set collector-ip {string}
set collector-port {integer}
set source-ip {string}
set interface-select-method [auto|sdwan|...]
set interface {string}
next
end
set inactive-flow-timeout {integer}
set template-tx-counter {integer}
set template-tx-timeout {integer}
end
template-tx- Timeout for periodic template flowset transmission. integer Minimum 1800
timeout value: 60
Maximum
value:
86400
source-ip Source IP address for communication with the NetFlow string Maximum
agent. length: 63
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Option Description
Option Description
hostname- Limit of the number of hostname table entries. integer Minimum 5000
limit value: 0
Maximum
value:
50000
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1100E, FortiGate 1101E,
FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E, FortiGate 5001E1, FortiGate 5001E,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate 800D, FortiGate
900D.
It is not available for: FortiGate 1000F, FortiGate 1001F, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1800F, FortiGate 1801F, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2600F, FortiGate 2601F, FortiGate 3000F, FortiGate 3001F,
FortiGate 3200F, FortiGate 3201F, FortiGate 3500F, FortiGate 3501F, FortiGate 3700F,
FortiGate 3701F, FortiGate 400F, FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 600F,
FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E,
FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 80E-
POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate
81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900G, FortiGate
901G, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
fastpath Enable/disable NP6 offloading (also called fast path). option - enable
Option Description
Option Description
Option Description
global-hash- Hash outbound SA traffic among all NPs with more weights on NPs connected
weighted to switch 0. It's applicable to the case that ingress traffic is from switch 1.
ipsec- Enable/disable hash function for IPsec outbound traffic. option - disable
outbound-
hash *
Option Description
Option Description
Option Description
Option Description
traffic-log-only Per-session accounting only for sessions with traffic logging enabled in firewall
policy.
session- {disable | enable} Toggle between using fixed or random option - disable
timeout-fixed timeouts for refreshing NP6 sessions.
Option Description
enable Enable Refresh NP6 sessions randomly where the time between refreshes is
within the random range.
session- Set the fixed timeout for refreshing NP6 sessions. integer Minimum 40
timeout- value: 0
interval Maximum
value: 1000
session- Set the random timeout range for refreshing NP6 integer Minimum 8
timeout- sessions. value: 0
random-range Maximum
value: 1000
config fp-anomaly
tcp-syn-fin TCP SYN flood SYN/FIN flag set anomalies. option - allow
Option Description
tcp-fin-noack TCP SYN flood with FIN flag set without ACK setting option - trap-to-host
anomalies.
Option Description
allow Allow TCP packets with FIN flag set without ack setting to pass.
drop Drop TCP packets with FIN flag set without ack setting.
trap-to-host Forward TCP packets with FIN flag set without ack setting to FortiOS.
tcp-fin-only TCP SYN flood with only FIN flag set anomalies. option - trap-to-host
Option Description
allow Allow TCP packets with FIN flag set only to pass.
trap-to-host Forward TCP packets with FIN flag set only to FortiOS.
tcp-no-flag TCP SYN flood with no flag set anomalies. option - allow
Option Description
tcp-syn-data TCP SYN flood packets with data anomalies. option - allow
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
icmp-frag Layer 3 fragmented packets that could be part of layer option - allow
4 ICMP anomalies.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow IPv4 with strict source record route option to pass.
trap-to-host Forward IPv4 with strict source record route option to FortiOS.
Option Description
allow Allow IPv4 with loose source record route option to pass.
trap-to-host Forward IPv4 with loose source record route option to FortiOS.
Option Description
Option Description
Option Description
Option Description
Option Description
trap-to-host Forward IPv4 invalid TCP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid UDP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid ICMP checksum to main CPU for processing.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow IPv6 with network service access point address option to pass.
drop Drop IPv6 with network service access point address option.
trap-to-host Forward IPv6 with network service access point address option to FortiOS.
Option Description
Option Description
config hpe
tcpsyn-ack- Maximum TCP carries SYN and ACK flags packet integer Minimum 600000
max rate. value: 1000
Maximum
value:
1000000000
tcpfin-rst-max Maximum TCP carries FIN or RST flags packet rate. integer Minimum 600000
value: 1000
Maximum
value:
1000000000
ip-others-max Maximum IP packet rate for other packets. integer Minimum 200000
value: 1000
Maximum
value:
1000000000
l2-others-max Maximum L2 packet rate for L2 packets that are not integer Minimum 200000
ARP packets. value: 1000
Maximum
value:
1000000000
pri-type-max Maximum overflow rate of priority type traffic. integer Minimum 200000
Includes L2: HA, 802.3ad LACP, heartbeats. L3: value: 1000
OSPF. L4_TCP: BGP. L4_UDP: IKE, SLBC, BFD. Maximum
value:
1000000000
Option Description
This command is available for model(s): FortiGate 100F, FortiGate 101F, FortiGate 200F,
FortiGate 201F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 60F, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81F-
POE, FortiGate 81F, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged
70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60F,
FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE,
FortiWiFi 81F 2R.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100EF,
FortiGate 100E, FortiGate 101E, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F, FortiGate 1801F,
FortiGate 2000E, FortiGate 200E, FortiGate 201E, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1,
FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 61E, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate
81E-POE, FortiGate 81E, FortiGate 900D, FortiGate 900G, FortiGate 901G, FortiGate 90E,
FortiGate 91E, FortiGate VM64, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 61E.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
traffic-log-only Per-session accounting only for sessions with traffic logging enabled in
firewall policy.
Option Description
config fp-anomaly
tcp-syn-fin TCP SYN flood SYN/FIN flag set anomalies. option - allow
Option Description
tcp-fin-noack TCP SYN flood with FIN flag set without ACK setting option - trap-to-host
anomalies.
Option Description
allow Allow TCP packets with FIN flag set without ack setting to pass.
drop Drop TCP packets with FIN flag set without ack setting.
trap-to-host Forward TCP packets with FIN flag set without ack setting to FortiOS.
tcp-fin-only TCP SYN flood with only FIN flag set anomalies. option - trap-to-host
Option Description
allow Allow TCP packets with FIN flag set only to pass.
trap-to-host Forward TCP packets with FIN flag set only to FortiOS.
tcp-no-flag TCP SYN flood with no flag set anomalies. option - allow
Option Description
tcp-syn-data TCP SYN flood packets with data anomalies. option - allow
Option Description
Option Description
Option Description
Option Description
Option Description
icmp-frag Layer 3 fragmented packets that could be part of layer option - allow
4 ICMP anomalies.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow IPv4 with strict source record route option to pass.
trap-to-host Forward IPv4 with strict source record route option to FortiOS.
Option Description
allow Allow IPv4 with loose source record route option to pass.
trap-to-host Forward IPv4 with loose source record route option to FortiOS.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
trap-to-host Forward IPv4 invalid TCP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid UDP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid ICMP checksum to main CPU for processing.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow IPv6 with network service access point address option to pass.
drop Drop IPv6 with network service access point address option.
trap-to-host Forward IPv6 with network service access point address option to FortiOS.
Option Description
Option Description
config hpe
ip-others-max Maximum IP packet rate for other packets. integer Minimum 1000000
value: 10000
Maximum
value:
4000000000
l2-others-max Maximum L2 packet rate for L2 packets that are not integer Minimum 1000000
ARP packets. value: 10000
Maximum
value:
4000000000
Option Description
This command is available for model(s): FortiGate 100F, FortiGate 101F, FortiGate 60F,
FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGateRugged 60F 3G4G, FortiGateRugged
60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 60F, FortiWiFi 61F.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100EF,
FortiGate 100E, FortiGate 101E, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F, FortiGate 1801F,
FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate
2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate
3000D, FortiGate 3000F, FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E,
FortiGate 3400E, FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E,
FortiGate 3601E, FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E,
FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E,
FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F,
FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E,
FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate
60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 61E, FortiGate
800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE,
FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate
VM64, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi
60E, FortiWiFi 61E, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE,
FortiWiFi 81F 2R.
prp-port-in Ingress port configured to allow the PRP trailer not string Maximum
<interface- be stripped off when the PRP packets come in. All of length: 35
name> the traffic originating from these ports will always be
sent to the host.
Physical interface name.
prp-port-out Egress port configured to allow the PRP trailer not be string Maximum
<interface- stripped off when the PRP packets go out. length: 35
name> Physical interface name.
This command is available for model(s): FortiGate 1000F, FortiGate 1001F, FortiGate 1800F,
FortiGate 1801F, FortiGate 2600F, FortiGate 2601F, FortiGate 3000F, FortiGate 3001F,
FortiGate 3200F, FortiGate 3201F, FortiGate 3500F, FortiGate 3501F, FortiGate 3700F,
FortiGate 3701F, FortiGate 400F, FortiGate 401F, FortiGate 4200F, FortiGate 4201F,
FortiGate 4400F, FortiGate 4401F, FortiGate 600F, FortiGate 601F, FortiGate 900G,
FortiGate 901G.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E,
FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D,
FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate
80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate
1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate
1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate
81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 900G, FortiGate 901G, FortiGateRugged
60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F,
FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 90E, FortiGate 91E, FortiGate VM64.
Option Description
dedicated- Enable to dedicate one CPU for GUI and CLI option - disable
management- connections when NPs are busy.
cpu *
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
bi-directional Offload TCP and IP Tunnel sessions in both directions between 10G and
1G interfaces (normal operation).
host-shortcut Only offload TCP and IP Tunnel sessions received by 1G interfaces. Select
if packets are dropped for offloaded traffic between 10G to 1G interfaces.
htab-dedi-queue- Set the number of dedicate queue for hash table integer Minimum 1
nr * messages. value: 1
Maximum
value: 2
Option Description
Option Description
100Mbps 100Mbps.
200Mbps 200Mbps.
300Mbps 300Mbps.
400Mbps 400Mbps.
500Mbps 500Mbps.
600Mbps 600Mbps.
700Mbps 700Mbps.
800Mbps 800Mbps.
900Mbps 900Mbps.
1Gbps 1Gbps.
2Gbps 2Gbps.
4Gbps 4Gbps.
8Gbps 8Gbps.
10Gbps 10Gbps.
Option Description
Option Description
enable Enable NPU offload when doing interface-based traffic shaping according
to the egress-shaping-profile.
disable Disable NPU offload when doing interface-based traffic shaping according
to the egress-shaping-profile.
Option Description
Option Description
enable Enable IP checksum re-calculation for packets with iph.reserved bit set.
disable Disable IP checksum re-calculation for packets with iph.reserved bit set.
Option Description
Option Description
Option Description
rr Round Robin.
Hash Hash.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable internal link failure check and recovery after boot up.
disable Disable internal link failure check and recovery after boot up.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
2G 2Gbps.
Option Description
4G 4Gbps.
5G 5Gbps.
6G 6Gbps.
7G 7Gbps.
8G 8Gbps.
9G 9Gbps.
Option Description
Option Description
Option Description
Option Description
Option Description
config dos-options
Option Description
Option Description
config dsw-dts-profile
profile-id Set NPU DSW DTS profile profile id. integer Minimum 0
value: 1
Maximum
value: 32
Option Description
config dsw-queue-dts-profile
Option Description
Option Description
Option Description
Option Description
tcp-syn-fin * TCP SYN flood SYN/FIN flag set anomalies. option - allow
Option Description
tcp-fin-noack * TCP SYN flood with FIN flag set without ACK setting option - trap-to-host
anomalies.
Option Description
allow Allow TCP packets with FIN flag set without ack setting to pass.
drop Drop TCP packets with FIN flag set without ack setting.
trap-to-host Forward TCP packets with FIN flag set without ack setting to FortiOS.
tcp-fin-only * TCP SYN flood with only FIN flag set anomalies. option - trap-to-host
Option Description
allow Allow TCP packets with FIN flag set only to pass.
trap-to-host Forward TCP packets with FIN flag set only to FortiOS.
tcp-no-flag * TCP SYN flood with no flag set anomalies. option - allow
Option Description
tcp-syn-data * TCP SYN flood packets with data anomalies. option - allow
Option Description
Option Description
Option Description
Option Description
Option Description
icmp-frag * Layer 3 fragmented packets that could be part of layer option - allow
4 ICMP anomalies.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow IPv4 with strict source record route option to pass.
trap-to-host Forward IPv4 with strict source record route option to FortiOS.
Option Description
allow Allow IPv4 with loose source record route option to pass.
trap-to-host Forward IPv4 with loose source record route option to FortiOS.
Option Description
Option Description
Option Description
Option Description
Option Description
trap-to-host Forward IPv4 invalid TCP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid UDP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid ICMP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid SCTP checksum to main CPU for processing.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow IPv6 with network service access point address option to pass.
drop Drop IPv6 with network service access point address option.
trap-to-host Forward IPv6 with network service access point address option to FortiOS.
Option Description
Option Description
config hpe
all-protocol Maximum packet rate of each host queue except high integer Minimum 400000
priority traffic, set 0 to disable. value: 0
Maximum
value:
32000000
tcpsyn-ack- Maximum TCP carries SYN and ACK flags packet rate. integer Minimum 40000
max value: 1000
Maximum
value:
32000000
tcpfin-rst-max Maximum TCP carries FIN or RST flags packet rate. integer Minimum 40000
value: 1000
Maximum
value:
32000000
ip-others-max Maximum IP packet rate for other packets. integer Minimum 5000
value: 1000
Maximum
value:
32000000
arp-max Maximum ARP packet rate. Entry is valid when ARP is integer Minimum 5000
removed from high-priority traffic. value: 1000
Maximum
value:
32000000
l2-others-max Maximum L2 packet rate for L2 packets that are not integer Minimum 5000
ARP packets. value: 1000
Maximum
value:
32000000
high-priority Maximum packet rate for high priority traffic packets. integer Minimum 400000
value: 1000
Maximum
value:
32000000
enable- Enable/Disable NPU Host Protection Engine (HPE) for option - disable
shaper packet type shaper.
Option Description
config ip-reassembly
Option Description
config isf-np-queues
config profile
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config ip-protocol
config ip-service
config scheduler
Option Description
config port-cpu-map
config port-npu-map
interface Set NPU interface port for NPU group mapping. string Maximum
length: 15
config port-path-option
ports-using-npu Set ha/aux ports to handle traffic with NPU (otherise string Maximum
<interface- traffic goes to Intel-NIC and then CPU). length: 15
name> Available interfaces for NPU path.
config priority-protocol
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config sw-tr-hash
Option Description
Option Description
include Include TCP/UDP source and destination port for unicast trunk traffic.
exclude Exclude TCP/UDP source and destination port for unicast trunk traffic.
Option Description
Option Description
Option Description
Option Description
source-ip Source IP address for communication to the NTP ipv4- Not Specified 0.0.0.0
server. address
source-ip6 Source IPv6 address for communication to the ipv6- Not Specified ::
NTP server. address
type Use the FortiGuard NTP server or any other option - fortiguard
available NTP Server.
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable.
mandatory Mandatory.
optional Optional.
Option Description
disable Disable.
mandatory Mandatory.
optional Optional.
Option Description
disable Disable.
mandatory Mandatory.
optional Optional.
Option Description
Option Description
Option Description
Option Description
Option Description
Configure password policy for locally defined administrator passwords and IPsec VPN pre-shared keys.
config system password-policy
Description: Configure password policy for locally defined administrator passwords and
IPsec VPN pre-shared keys.
set apply-to {option1}, {option2}, ...
set expire-day {integer}
set expire-status [enable|disable]
set min-change-characters {integer}
set min-lower-case-letter {integer}
set min-non-alphanumeric {integer}
set min-number {integer}
set min-upper-case-letter {integer}
set minimum-length {integer}
set reuse-password [enable|disable]
set status [enable|disable]
end
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000F, FortiGate 1001F, FortiGate 100EF,
FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate
1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate
200F, FortiGate 201F, FortiGate 2600F, FortiGate 2601F, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3200F, FortiGate 3201F, FortiGate 3500F,
FortiGate 3501F, FortiGate 3700F, FortiGate 3701F, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 600F,
FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E,
FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 80E-
POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate
81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900G, FortiGate
901G, FortiGate 90E, FortiGate 91E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F,
FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E,
FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE,
FortiWiFi 81F 2R.
It is not available for: FortiGate 1000D, FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E,
FortiGate 200E, FortiGate 201E, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 3000D, FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E,
FortiGate 3400E, FortiGate 3401E, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3960E, FortiGate 3980E, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E,
FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate 800D, FortiGate 900D, FortiGate
VM64.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
timeout An inactivity timer for a twamp test session. integer Minimum 300
value: 10
Maximum
value: 3600
Option Description
Configure proxy-ARP.
config system proxy-arp
Description: Configure proxy-ARP.
delay- End to end delay detection or peer to peer delay option - E2E
mechanism detection.
Option Description
interface PTP client will reply through this interface. string Maximum
length: 15
Option Description
request- The delay request value is the logarithmic mean interval integer Minimum 1
interval in seconds between the delay request messages sent value: 1
by the slave to the master. Maximum
value: 6
Option Description
Option Description
delay- End to end delay detection or peer to peer delay option - E2E
mechanism detection.
Option Description
Option Description
config admin
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config auth
Option Description
http HTTP
8bit 8 bit.
Option Description
config automation
Option Description
http HTTP
8bit 8 bit.
Option Description
config custom-message
Option Description
http HTTP
8bit 8 bit.
Option Description
config fortiguard-wf
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config http
Option Description
http HTTP
8bit 8 bit.
Option Description
config icap
Option Description
http HTTP
8bit 8 bit.
Option Description
config mail
Option Description
http HTTP
8bit 8 bit.
Option Description
config nac-quar
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config sslvpn
Option Description
http HTTP
8bit 8 bit.
Option Description
config traffic-quota
Option Description
http HTTP
8bit 8 bit.
Option Description
config utm
Option Description
http HTTP
8bit 8 bit.
Option Description
config webproxy
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
Replacement messages.
config system replacemsg admin
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg alertmail
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg auth
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg automation
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg custom-message
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg ftp
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg http
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg icap
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg mail
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg nac-quar
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg spam
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg traffic-quota
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg utm
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg webproxy
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
life Length of the range of time when the assertion is valid integer Minimum 30
(in minutes). value: 0
Maximum
value:
4294967295
Option Description
Option Description
tolerance Tolerance to the range of time when the assertion is integer Minimum 5
valid (in minutes). value: 0
Maximum
value:
4294967295
config service-providers
Option Description
config assertion-attributes
Option Description
Option Description
api-key IBM cloud API key or service ID API key. password Not
Specified
Option Description
Option Description
Option Description
Option Description
server-cert Trust servers that contain this certificate only. string Maximum
length: 127
server-list <ip> Server address list of the remote SDN connector. string Maximum
IPv4 address. length: 15
Option Description
Option Description
Option Description
openstack OpenStack.
kubernetes Kubernetes.
Option Description
Option Description
config external-account-list
config external-ip
config forwarding-rule
config nic
config ip
config route
config route
config route
config route
Configure redundant Internet connections with multiple outbound links and health-check profiles.
config system sdwan
Description: Configure redundant Internet connections with multiple outbound links and
health-check profiles.
config duplication
Description: Create SD-WAN duplication rule.
edit <id>
set service-id <id1>, <id2>, ...
set srcaddr <name1>, <name2>, ...
set dstaddr <name1>, <name2>, ...
set srcaddr6 <name1>, <name2>, ...
set dstaddr6 <name1>, <name2>, ...
set srcintf <name1>, <name2>, ...
set dstintf <name1>, <name2>, ...
set service <name1>, <name2>, ...
set packet-duplication [disable|force|...]
set sla-match-service [enable|disable]
set packet-de-duplication [enable|disable]
next
Option Description
load-balance- Algorithm or mode to use for load balancing Internet option - source-ip-
mode traffic to SD-WAN members. based
Option Description
source-ip-based Source IP load balancing. All traffic from a source IP is sent to the same
interface.
weight-based Weight-based load balancing. Interfaces with higher weights have higher
priority and get more traffic.
usage-based Usage-based load balancing. All traffic is sent to the first interface on the list.
When the bandwidth on that interface exceeds the spill-over limit new traffic is
sent to the next interface.
source-dest-ip- Source and destination IP load balancing. All traffic from a source IP to a
based destination IP is sent to the same interface.
measured- Volume-based load balancing. Traffic is load balanced based on traffic volume
volume-based (in bytes). More traffic is sent to interfaces with higher volume ratios.
neighbor- Waiting period in seconds when switching from the integer Minimum 0
hold-boot- primary neighbor to the secondary neighbor from the value: 0
time neighbor start.. Maximum
value:
10000000
Option Description
enable Enable hold switching from the secondary neighbor to the primary neighbor.
disable Disable hold switching from the secondary neighbor to the primary neighbor.
neighbor- Waiting period in seconds when switching from the integer Minimum 0
hold-down- secondary neighbor to the primary neighbor when hold- value: 0
time down is disabled.. Maximum
value:
10000000
Option Description
Option Description
config duplication
Option Description
force Duplicate packets across all interface members of the SD-WAN zone.
on-demand Duplicate packets across all interface members of the SD-WAN zone based
on the link quality.
Option Description
Option Description
config health-check
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
tcp-echo Use TCP echo to test the link with the server.
udp-echo Use UDP echo to test the link with the server.
dns Use DNS query to test the link with the server.
tcp-connect Use a full TCP connection to test the link with the server.
Option Description
Option Description
Option Description
passive The FTP health-check initiates and establishes the data connection.
port The FTP server initiates and establishes the data connection.
ftp-file Full path and file name on the FTP server string Maximum
to download for FTP health-check to length: 254
probe.
http-agent String in the http-agent field in the HTTP string Maximum Chrome/ Safari/
header. length: 1024
dns-request- Fully qualified domain name to resolve for string Maximum www.example.com
domain the DNS probe. length: 255
dns-match-ip Response IP expected from DNS server if ipv4- Not Specified 0.0.0.0
the protocol is DNS. address
Option Description
Option Description
Option Description
sla-id- Select the ID from the SLA sub-table. The integer Minimum 0
redistribute selected SLA's priority value will be value: 0
distributed into the routing table. Maximum
value: 32
sla-fail-log- Time interval in seconds that SLA fail log integer Minimum 0
period messages will be generated. value: 0
Maximum
value: 3600
source Source IP address used in the health- ipv4- Not Specified 0.0.0.0
check packet to the server. address
Option Description
config sla
config members
gateway The default gateway for this interface. Usually the ipv4- Not Specified 0.0.0.0
default gateway of the Internet service provider that address
this interface is connected to.
source Source IP address used in the health-check packet to ipv4- Not Specified 0.0.0.0
the server. address
source6 Source IPv6 address used in the health-check packet ipv6- Not Specified ::
to the server. address
cost Cost of this interface for services in SLA mode. integer Minimum 0
value: 0
Maximum
value:
4294967295
weight Weight of this interface for weighted load balancing. integer Minimum 1
More traffic is directed to interfaces with higher value: 1
weights. Maximum
value: 255
priority Priority of the interface for IPv4. Used for SD-WAN integer Minimum 1
rules or priority rules. value: 1
Maximum
value: 65535
priority6 Priority of the interface for IPv6. Used for SD-WAN integer Minimum 1024
rules or priority rules. value: 1
Maximum
value: 65535
spillover- Egress spillover threshold for this interface. When integer Minimum 0
threshold this traffic volume threshold is reached, new sessions value: 0
spill over to other interfaces in the SD-WAN. Maximum
value:
16776000
ingress- Ingress spillover threshold for this interface. When integer Minimum 0
spillover- this traffic volume threshold is reached, new sessions value: 0
threshold spill over to other interfaces in the SD-WAN. Maximum
value:
16776000
Option Description
config neighbor
Option Description
Option Description
Option Description
Option Description
mode Control how the SD-WAN rule sets the priority of option - manual
interfaces in the SD-WAN.
Option Description
load-balance Distribute traffic among all available links based on round robin. ADVPN
feature is not supported in the mode.
hash-mode Hash algorithm for selected priority members for option - round-robin
load balance mode.
Option Description
round-robin All traffic are distributed to selected interfaces in equal portions and circular
order.
source-dest-ip- All traffic from a source IP to a destination IP is sent to the same interface.
based
inbandwidth All traffic are distributed to a selected interface with most available
bandwidth for incoming traffic.
outbandwidth All traffic are distributed to a selected interface with most available
bandwidth for outgoing traffic.
bibandwidth All traffic are distributed to a selected interface with most available
bandwidth for both incoming and outgoing traffic.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sla-compare- Method to compare SLA value for SLA mode. option - order
method
Option Description
number Compare SLA value based on the number of satisfied health-check. Limits
health-checks to only configured member interfaces.
Option Description
zone Use the setting that is configured for the members' zone.
cfg-order Members that meet the SLA are selected in the order they are configured.
fib-best-match Members that meet the SLA are selected that match the longest prefix in the
routing table.
input-device Members that meet the SLA are selected by matching the input device.
Option Description
Option Description
Option Description
config zone
service-sla- Method of selecting member if more than one meets the option - cfg-order
tie-break SLA.
Option Description
cfg-order Members that meet the SLA are selected in the order they are configured.
fib-best-match Members that meet the SLA are selected that match the longest prefix in the
routing table.
input-device Members that meet the SLA are selected by matching the input device.
Option Description
ftp FTP.
tftp TFTP.
ras RAS.
h323 H323.
tns TNS.
mms MMS.
sip SIP.
pptp PPTP.
rtsp RTSP.
pmap PMAP.
rsh RSH.
dcerpc DCERPC.
mgcp MGCP.
config port
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
bfd-dont- Enable to not enforce verifying the source port of option - disable
enforce-src- BFD Packets.
port
Option Description
Option Description
Option Description
Option Description
default-voip- Configure how the FortiGate handles VoIP traffic option - proxy-
alg-mode when a policy that accepts the traffic doesn't include based
a VoIP profile.
Option Description
Option Description
Option Description
enable Enable detection of unknown ESP packets and drop the ESP packet if it's
unknown.
device Interface to use for management access for NAT string Maximum
mode. length: 35
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
check-all All sessions affected by a firewall policy change are flushed from the session
table. When new packets are recived they are re-evaluated by stateful
inspection and re-added to the session table.
check-new Estabished sessions for changed firewall policies continue without being
affected by the policy configuration change. New sessions are evaluated
according to the new firewall policy configuration.
check-policy- Sessions are managed individually depending on the firewall policy. Some
option sessions may restart. Some may continue.
Option Description
Option Description
disable Perform a policy check only the first time the session is received.
gateway Transparent mode IPv4 default gateway IP ipv4- Not Specified 0.0.0.0
address. address
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
gui-default- Default columns to display for policy lists on GUI. string Maximum
policy-columns Select column name. length: 79
<name>
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
gui-enforce- Enforce change summaries for select tables in the option - require
change- GUI.
summary
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
fortiweb Offload HTTP traffic to FortiWeb for Web Application Firewall inspection.
forticache Offload HTTP traffic to FortiCache for external web caching and WAN
optimization.
Option Description
with-space Format IKE ASN.1 Distinguished Names with spaces between attribute
names and values.
no-space Format IKE ASN.1 Distinguished Names without spaces between attribute
names and values.
Option Description
Option Description
Option Description
Option Description
ip6 IPv6 address prefix for NAT mode. ipv6-prefix Not Specified ::/0
Option Description
Option Description
Option Description
global Use the global LLDP reception configuration for this VDOM.
Option Description
global Use the global LLDP transmission configuration for this VDOM.
location-id Local location ID in the form of an IPv4 address. ipv4- Not Specified 0.0.0.0
address
manageip6 Transparent mode IPv6 management IP address ipv6-prefix Not Specified ::/0
and netmask.
Option Description
Option Description
enable Allowing multicast traffic through the FortiGate without creating a multicast
firewall policy.
disable Require a multicast policy to allow multicast traffic to pass through the
FortiGate.
Option Description
Option Description
Option Description
Option Description
Option Description
profile-based Application and web-filtering are configured using profiles applied to policy
entries.
Option Description
Option Description
Option Description
sccp-port TCP port the SCCP proxy monitors for SCCP traffic. integer Minimum 2000
value: 0
Maximum
value: 65535
Option Description
Option Description
Option Description
enable Allow SIP session helper to create an expectation for port 5060.
disable Prevent SIP session helper from creating an expectation for port 5060.
Option Description
enable Record the original SIP source IP address when NAT is used.
disable Do not record the original SIP source IP address when NAT is used.
sip-ssl-port * TCP port the SIP proxy monitors for SIP SSL/TLS integer Minimum 5061
traffic. value: 0
Maximum
value: 65535
sip-tcp-port TCP port the SIP proxy monitors for SIP traffic. integer Minimum 5060
value: 1
Maximum
value: 65535
sip-udp-port UDP port the SIP proxy monitors for SIP traffic. integer Minimum 5060
value: 1
Maximum
value: 65535
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
v4-ecmp-mode IPv4 Equal-cost multi-path (ECMP) routing and load option - source-ip-
balancing mode. based
Option Description
source-dest-ip- Select next hop based on both source and destination IPs.
based
Option Description
vpn-stats-log Enable/disable periodic VPN log statistics for one or option - ipsec pptp
more types of VPN. Separate names with a space. l2tp ssl
Option Description
ipsec IPsec.
Option Description
pptp PPTP.
l2tp L2TP.
ssl SSL.
Option Description
Configure sFlow.
config system sflow
Description: Configure sFlow.
set collector-ip {ipv4-address}
set collector-port {integer}
set interface {string}
set interface-select-method [auto|sdwan|...]
set source-ip {ipv4-address}
end
collector-ip IP address of the sFlow collector that sFlow agents ipv4- Not 0.0.0.0
added to interfaces in this VDOM send sFlow address Specified
datagrams to.
collector-port UDP port number used for sending sFlow datagrams. integer Minimum 6343
value: 0
Maximum
value:
65535
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1100E, FortiGate 1101E, FortiGate 1800F,
FortiGate 1801F, FortiGate 2600F, FortiGate 2601F, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3200F, FortiGate 3201F, FortiGate 3300E,
FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3500F, FortiGate 3501F,
FortiGate 3600E, FortiGate 3601E, FortiGate 3700F, FortiGate 3701F, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E,
FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate
900G, FortiGate 901G.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100EF,
FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 3000D, FortiGate 3100D, FortiGate 3200D, FortiGate 3700D,
FortiGate 3960E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 5001E1, FortiGate 5001E,
FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F,
FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-
POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate
81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E,
FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F,
FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E,
FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE,
FortiWiFi 81F 2R.
channel SMC NTP client will send NTP packets through this integer Minimum 5
channel. value: 1
Maximum
value:
65535
ntpsync Enable/disable setting the FortiGate SMC system time option - disable
by synchronizing with an NTP server.
Option Description
config ntpserver
Configure SMS server for sending SMS messages to support user authentication.
config system sms-server
Description: Configure SMS server for sending SMS messages to support user
authentication.
edit <name>
set mail-server {string}
next
end
Option Description
ha-switch Send a trap after an HA failover when the backup unit has taken over.
fm-if-change Send a trap when FortiManager interface changes. Send a FortiManager trap.
bgp-established Send a trap when a BGP FSM transitions to the established state.
bgp-backward- Send a trap when a BGP FSM goes from a high numbered state to a lower
transition numbered state.
Option Description
ips-pkg-update Send a trap when the IPS signature database or engine is updated.
temperature-high Send a trap when a temperature sensor registers a temperature that is too
high.
voltage-alert Send a trap when a voltage sensor registers a voltage that is outside of the
normal range.
load-balance- Send a trap when a server load balance real server goes down.
real-server-down
dhcp Send a trap when the DHCP server exhausts the IP pool, an IP address
already is in use, or a DHCP client interface received a DHCP-NAK.
ospf-nbr-state- Send a trap when there has been a change in the state of a non-virtual OSPF
change neighbor.
ospf-virtnbr- Send a trap when there has been a change in the state of an OSPF virtual
state-change neighbor.
Option Description
Option Description
Option Description
Option Description
Option Description
config hosts
source-ip Source IPv4 address for SNMP traps. ipv4- Not Specified 0.0.0.0
address
Option Description
Option Description
host-type Control whether the SNMP manager sends SNMP option - any
queries, receives SNMP traps, or both. No traps will
be sent when IP type is subnet.
Option Description
any Accept queries from and send traps to this SNMP manager.
query Accept queries from this SNMP manager but do not send traps.
trap Send traps to this SNMP manager but do not accept SNMP queries from this
SNMP manager.
config hosts6
source-ipv6 Source IPv6 address for SNMP traps. ipv6- Not Specified ::
address
ipv6 SNMP manager IPv6 address prefix. ipv6-prefix Not Specified ::/0
Option Description
host-type Control whether the SNMP manager sends SNMP option - any
queries, receives SNMP traps, or both.
Option Description
any Accept queries from and send traps to this SNMP manager.
query Accept queries from this SNMP manager but do not send traps.
trap Send traps to this SNMP manager but do not accept SNMP queries from this
SNMP manager.
Option Description
Option Description
Option Description
Option Description
Option Description
ha-switch Send a trap after an HA failover when the backup unit has taken over.
fm-if-change Send a trap when FortiManager interface changes. Send a FortiManager trap.
bgp-established Send a trap when a BGP FSM transitions to the established state.
bgp-backward- Send a trap when a BGP FSM goes from a high numbered state to a lower
transition numbered state.
Option Description
ips-pkg-update Send a trap when the IPS signature database or engine is updated.
temperature-high Send a trap when a temperature sensor registers a temperature that is too
high.
voltage-alert Send a trap when a voltage sensor registers a voltage that is outside of the
normal range.
load-balance- Send a trap when a server load balance real server goes down.
real-server-down
dhcp Send a trap when the DHCP server exhausts the IP pool, an IP address
already is in use, or a DHCP client interface received a DHCP-NAK.
ospf-nbr-state- Send a trap when there has been a change in the state of a non-virtual OSPF
change neighbor.
ospf-virtnbr- Send a trap when there has been a change in the state of an OSPF virtual
state-change neighbor.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable dynamic server.The speed test server will be found automatically.
mode Protocol Auto, TCP or UDP used for speed test. option - Auto
Option Description
Auto Dynamically selects TCP or UDP based on the speed test setting
Option Description
Option Description
Option Description
config host
port Server host port number to communicate with client. integer Minimum 5204
value: 1
Maximum
value: 65535
latency- Speed test latency threshold in milliseconds for the Auto integer Minimum 60
threshold mode. If the latency exceeds this threshold, the speed value: 0
test will use the UDP protocol; otherwise, it will use the Maximum
TCP protocol. value: 2000
multiple-tcp- Number of parallel client streams for the TCP protocol integer Minimum 4
stream to run during the speed test. value: 1
Maximum
value: 64
vdom <name> Virtual domain(s) that the administrator can access. string Maximum
Virtual domain name. length: 79
vdom <name> Virtual domain(s) that the administrator can access. string Maximum
Virtual domain name. length: 79
vdom <name> Virtual domain(s) that the administrator can access. string Maximum
Virtual domain name. length: 79
Option Description
Option Description
unavailable There does not exist layer 2 connection among FGSP members.
standalone- Cluster group ID. Must be the same for all members. integer Minimum 0
group-id value: 0
Maximum
value: 255
peervd VDOM that contains the session synchronization link string Maximum root
interface on the peer unit. Usually both peers would length: 31
have the same peervd.
peerip IP address of the interface on the peer unit that is ipv4- Not Specified 0.0.0.0
used for the session synchronization link. address
syncvd Sessions from these VDOMs are synchronized using string Maximum
<name> this session synchronization configuration. length: 79
VDOM name.
Option Description
Option Description
srcintf Only sessions from this interface are synchronized. string Maximum
length: 15
srcaddr Only sessions from this IPv4 address are synchronized. ipv4- Not 0.0.0.0
classnet- Specified 0.0.0.0
any
dstaddr Only sessions to this IPv4 address are synchronized. ipv4- Not 0.0.0.0
classnet- Specified 0.0.0.0
any
srcaddr6 Only sessions from this IPv6 address are synchronized. ipv6- Not ::/0
network Specified
dstaddr6 Only sessions to this IPv6 address are synchronized. ipv6- Not ::/0
network Specified
config custom-service
src-port-range Custom service source port range. user Not Specified 0-0
dst-port-range Custom service destination port range. user Not Specified 0-0
Option Description
Option Description
usage Use hard disk for logging or WAN Optimization. option - log **
Option Description
Option Description
This command is available for model(s): FortiGate 1000F, FortiGate 1001F, FortiGate 100EF,
FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate
1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate
200F, FortiGate 201F, FortiGate 2600F, FortiGate 2601F, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3200F, FortiGate 3201F, FortiGate 3500F,
FortiGate 3501F, FortiGate 3700F, FortiGate 3701F, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 600F,
FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E,
FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 80E-
POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate
81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900G, FortiGate
901G, FortiGate 90E, FortiGate 91E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F,
FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E,
FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE,
FortiWiFi 81F 2R.
It is not available for: FortiGate 1000D, FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E,
FortiGate 200E, FortiGate 201E, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 3000D, FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E,
FortiGate 3400E, FortiGate 3401E, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3960E, FortiGate 3980E, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E,
FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate 800D, FortiGate 900D, FortiGate
VM64.
switch-priority STP switch priority; the lower the number the higher the option - 32768
priority (select from 0, 4096, 8192, 12288, 16384,
20480, 24576, 28672, 32768, 36864, 40960, 45056,
49152, 53248, and 57344).
Option Description
0 0
4096 4096
8192 8192
12288 12288
16384 16384
20480 20480
24576 24576
28672 28672
32768 32768
36864 36864
40960 40960
45056 45056
49152 49152
Option Description
53248 53248
57344 57344
intra-switch- Allow any traffic between switch interfaces or require option - implicit
policy firewall policies to allow traffic between switch
interfaces.
Option Description
mac-ttl Duration for which MAC addresses are held in the integer Minimum 300
ARP table. value: 300
Maximum
value:
8640000
member Names of the interfaces that belong to the virtual string Maximum
<interface- switch. length: 79
name> Physical interface name.
name Interface name (name cannot be in use by any other string Maximum
interfaces, VLANs, or inter-VDOM links). length: 15
Option Description
span-dest-port SPAN destination port name. All traffic on the SPAN string Maximum
source ports is echoed to the SPAN destination port. length: 15
span-direction The direction in which the SPAN port operates, option - both
either: rx, tx, or both.
Option Description
rx Copies only received packets from source SPAN ports to the destination
SPAN port.
tx Copies only transmitted packets from source SPAN ports to the destination
SPAN port.
both Copies both received and transmitted packets from source SPAN ports to
the destination SPAN port.
span-source-port Physical interface name. Port spanning echoes all string Maximum
<interface- traffic on the SPAN source ports to the SPAN length: 79
name> destination port.
Physical interface name.
Option Description
switch Switch for normal switch functionality (available in NAT mode only).
vdom VDOM that the software switch belongs to. string Maximum
length: 31
Configure Type of Service (ToS) based priority table to set network traffic priorities.
priority ToS based priority level to low, medium or high. option - high
Option Description
tos Value of the ToS byte in the IP datagram header. integer Minimum 0
value: 0
Maximum
value: 15
alt-primary Alternate primary DNS server. This is not used as a ipv4- Not 0.0.0.0
failover DNS server. address Specified
alt-secondary Alternate secondary DNS server. This is not used as a ipv4- Not 0.0.0.0
failover DNS server. address Specified
Option Description
ip6-primary Primary IPv6 DNS server IP address for the VDOM. ipv6- Not ::
address Specified
ip6-secondary Secondary IPv6 DNS server IP address for the VDOM. ipv6- Not ::
address Specified
primary Primary DNS server IP address for the VDOM. ipv4- Not 0.0.0.0
address Specified
Option Description
secondary Secondary DNS server IP address for the VDOM. ipv4- Not 0.0.0.0
address Specified
Option Description
source-ip Source IP for communications with the DNS server. ipv4- Not 0.0.0.0
address Specified
ssl-certificate Name of local certificate for SSL connections. string Maximum Fortinet_
length: 35 Factory
vdom-dns Enable/disable configuring DNS servers for the current option - disable
VDOM.
Option Description
Global configuration objects that can be configured independently across different ha peers for all VDOMs or for the
defined VDOM scope.
config system vdom-exception
Description: Global configuration objects that can be configured independently across
different ha peers for all VDOMs or for the defined VDOM scope.
edit <id>
set object [log.fortianalyzer.setting|log.fortianalyzer.override-setting|...]
set scope [all|inclusive|...]
set vdom <name1>, <name2>, ...
next
end
Option Description
log.fortianalyzer.setting log.fortianalyzer.setting
log.fortianalyzer.override- log.fortianalyzer.override-setting
setting
log.fortianalyzer2.setting log.fortianalyzer2.setting
log.fortianalyzer2.override- log.fortianalyzer2.override-setting
setting
log.fortianalyzer3.setting log.fortianalyzer3.setting
log.fortianalyzer3.override- log.fortianalyzer3.override-setting
setting
log.fortianalyzer- log.fortianalyzer-cloud.setting
cloud.setting
log.fortianalyzer- log.fortianalyzer-cloud.override-setting
cloud.override-setting
log.syslogd.setting log.syslogd.setting
log.syslogd.override-setting log.syslogd.override-setting
log.syslogd2.setting log.syslogd2.setting
log.syslogd2.override-setting log.syslogd2.override-setting
log.syslogd3.setting log.syslogd3.setting
log.syslogd3.override-setting log.syslogd3.override-setting
log.syslogd4.setting log.syslogd4.setting
log.syslogd4.override-setting log.syslogd4.override-setting
system.gre-tunnel system.gre-tunnel
system.central-management system.central-management
system.csf system.csf
user.radius user.radius
log.syslogd.setting log.syslogd.setting
log.syslogd.override-setting log.syslogd.override-setting
Option Description
inclusive Object configuration independent for the listed VDOMs. Other VDOMs use the
global configuration.
exclusive Use the global object configuration for the listed VDOMs. Other VDOMs can
be configured independently.
Option Description
Option Description
Option Description
config collectors
source-ip Source IP address for communication with the NetFlow string Maximum
agent. length: 63
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
ipsec-phase1 Maximum guaranteed number of VPN IPsec phase 1 user Not Specified
tunnels.
ipsec-phase1- Maximum guaranteed number of VPN IPsec phase1 user Not Specified
interface interface tunnels.
ipsec-phase2 Maximum guaranteed number of VPN IPsec phase 2 user Not Specified
tunnels.
ipsec-phase2- Maximum guaranteed number of VPN IPsec phase2 user Not Specified
interface interface tunnels.
log-disk-quota Log disk quota in megabytes (MB). Range depends user Not Specified
on how much disk space is available.
Configure a RADIUS server to use as a RADIUS Single Sign On (RSSO) server for this VDOM.
config system vdom-radius-server
Description: Configure a RADIUS server to use as a RADIUS Single Sign On (RSSO) server
for this VDOM.
edit <name>
set radius-server-vdom {string}
set status [enable|disable]
next
end
name Name of the VDOM that you are adding the RADIUS string Maximum
server to. length: 31
radius-server- Use this option to select another VDOM containing a string Maximum
vdom VDOM RSSO RADIUS server to use for the current length: 31
VDOM.
status Enable/disable the RSSO RADIUS server for this option - disable
VDOM.
Option Description
Configure sFlow per VDOM to add or change the IP address and UDP port that FortiGate sFlow agents in this VDOM
use to send sFlow datagrams to an sFlow collector.
config system vdom-sflow
Description: Configure sFlow per VDOM to add or change the IP address and UDP port that
FortiGate sFlow agents in this VDOM use to send sFlow datagrams to an sFlow collector.
set collector-ip {ipv4-address}
set collector-port {integer}
set interface {string}
set interface-select-method [auto|sdwan|...]
set source-ip {ipv4-address}
collector-ip IP address of the sFlow collector that sFlow agents ipv4- Not 0.0.0.0
added to interfaces in this VDOM send sFlow address Specified
datagrams to.
collector-port UDP port number used for sending sFlow datagrams. integer Minimum 6343
value: 0
Maximum
value:
65535
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
vdom-sflow Enable/disable the sFlow configuration for the current option - disable
VDOM.
Option Description
This command is available for model(s): FortiGateRugged 70F 3G4G, FortiGateRugged 70F.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100EF,
FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate
1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate
1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F, FortiGate 300E,
FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F, FortiGate 3201F,
FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3500F,
FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3700F,
FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1,
FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate
VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi
40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E,
FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE,
FortiWiFi 81F 2R.
psu-1- Threshold at which 1st PSU voltage drop to trigger low integer Minimum 60
threshold-low voltage alarm, in percent of voltage. value: 1
Maximum
value: 99
psu-2- Threshold at which 2nd PSU voltage drop to trigger low integer Minimum 60
threshold-low voltage alarm, in percent of voltage. value: 1
Maximum
value: 99
Option Description
This command is available for model(s): FortiGate 1000F, FortiGate 1001F, FortiGate 100EF,
FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate
1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate
200F, FortiGate 201F, FortiGate 2600F, FortiGate 2601F, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3200F, FortiGate 3201F, FortiGate 3500F,
FortiGate 3501F, FortiGate 3700F, FortiGate 3701F, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 600F,
FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E,
FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 80E-
POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate
81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900G, FortiGate
901G, FortiGate 90E, FortiGate 91E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F,
FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E,
FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE,
FortiWiFi 81F 2R.
It is not available for: FortiGate 1000D, FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E,
FortiGate 200E, FortiGate 201E, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 3000D, FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E,
FortiGate 3400E, FortiGate 3401E, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3960E, FortiGate 3980E, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E,
FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate 800D, FortiGate 900D, FortiGate
VM64.
Option Description
Option Description
config port
Option Description
Option Description
Option Description
Option Description
Option Description
ssl-certificate Name of local certificate for SSL connections. string Maximum Fortinet_
length: 35 Factory
Option Description
ip-version IP version to use for the VXLAN interface and so for option - ipv4-unicast
communication over the VXLAN. IPv4 or IPv6 unicast or
multicast.
Option Description
remote-ip IPv4 address of the VXLAN interface on the device at string Maximum
<ip> the remote end of the VXLAN. length: 15
IPv4 address.
remote-ip6 IPv6 IP address of the VXLAN interface on the device at string Maximum
<ip6> the remote end of the VXLAN. length: 45
IPv6 address.
Configure WCCP.
assignment- Assignment bucket format for the WCCP cache option - cisco-
bucket-format engine. implementation
Option Description
Option Description
Option Description
Option Description
L2 L2 rewrite.
Option Description
L2 L2 rewrite.
group-address IP multicast address used by the cache routers. ipv4- Not 0.0.0.0
For the FortiGate to ignore multicast WCCP address- Specified
traffic, use the default 0.0.0.0. multicast
Option Description
Option Description
Option Description
L2 L2 rewrite.
router-id IP address known to all cache engines. If all ipv4- Not 0.0.0.0
cache engines connect to the same FortiGate address Specified
interface, use the default 0.0.0.0.
Option Description
service-type WCCP service type used by the cache server option - auto
for logical interception and redirection of traffic.
Option Description
auto auto
This command is available for model(s): FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E
DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100EF,
FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate
1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate
1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F, FortiGate 300E,
FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F, FortiGate 3201F,
FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3500F,
FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3700F,
FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1,
FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate
VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-
POE, FortiWiFi 81F 2R.
Option Description
rogue Rogue.
accepted Accepted.
suppressed Suppressed.
This command is available for model(s): FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E
DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100EF,
FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate
1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate
1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F, FortiGate 300E,
FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F, FortiGate 3201F,
FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3500F,
FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3700F,
FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1,
FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate
VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-
POE, FortiWiFi 81F 2R.
Option Description
802.11a 802.11a.
802.11b 802.11b.
802.11g 802.11g.
Option Description
Option Description
disable 20 MHz.
Option Description
World World.
Americas Americas.
EMEA EMEA.
Israel Israel.
Japan Japan.
Option Description
CLIENT Client.
AP Access point.
SCAN Scan.
Option Description
Option Description
Configure zones to group two or more interfaces. When a zone is created you can configure policies for the zone instead
of individual interfaces in the zone.
config system zone
Description: Configure zones to group two or more interfaces. When a zone is created you
can configure policies for the zone instead of individual interfaces in the zone.
edit <name>
set description {string}
set interface <interface-name1>, <interface-name2>, ...
set intrazone [allow|deny]
config tagging
Description: Config object tagging.
edit <name>
set category {string}
set tags <name1>, <name2>, ...
next
end
next
end
interface Add interfaces to this zone. Interfaces must not be string Maximum
<interface- assigned to another zone or have firewall policies length: 79
name> defined.
Select interfaces to add to the zone.
Option Description
config tagging
Option Description
Option Description
Option Description
none The server is not configured as an Active Directory Domain Server (AD DS).
lds The server is an Active Directory Lightweight Domain Server (AD LDS).
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
port Port to be used for communication with the domain integer Minimum 445
controller. value: 0
Maximum
value:
65535
replication- Port to be used for communication with the domain integer Minimum 0
port controller for replication service. Port number 0 value: 0
indicates automatic discovery. Maximum
value:
65535
source-ip- FortiGate IPv4 address to be used for communication ipv4- Not 0.0.0.0
address with the domain controller. address Specified
source-port Source port to be used for communication with the integer Minimum 0
domain controller. value: 0
Maximum
value:
65535
username User name to sign in with. Must have proper string Maximum
permissions for service. length: 64
config extra-server
port Port to be used for communication with the domain integer Minimum 445
controller. value: 0
Maximum
value:
65535
source-ip- FortiGate IPv4 address to be used for communication ipv4- Not 0.0.0.0
address with the domain controller. address Specified
source-port Source port to be used for communication with the integer Minimum 0
domain controller. value: 0
Maximum
value:
65535
auth-level Authentication security level used for the RPC protocol option - privacy
layer.
Option Description
auth-type Authentication security type used for the RPC protocol option - kerberos
layer.
Option Description
Option Description
Option Description
rpc-over-tcp Connect using RPC-over-TCP. Use for MS Exchange 2010 and earlier
versions. Supported in MS Exchange 2013.
rpc-over-http Connect using RPC-over-HTTP. Use for MS Exchange 2016 and later
versions. Supported in MS Exchange 2013.
rpc-over-https Connect using RPC-over-HTTPS. Use for MS Exchange 2016 and later
versions. Supported in MS Exchange 2013.
http-auth-type Authentication security type used for the HTTP option - ntlm
transport.
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
Option Description
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
username User name used to sign in to the server. Must have string Maximum
proper permissions for service. length: 64
Option Description
Option Description
disable Do not check server's identity against its certificate and subject alternative
name(s).
enable Check server's identity against its certificate and subject alternative name(s).
Option Description
Option Description
Configure FortiToken.
config user fortitoken
Description: Configure FortiToken.
Option Description
ldap-server LDAP server name used in LDAP connection strings. string Maximum
length: 35
password Password required to log into this Active Directory password Not Specified
server.
port Port to communicate with this Active Directory server. integer Minimum 0
value: 0
Maximum
value: 65535
Option Description
Option Description
status Enable/disable polling for the status of this Active option - enable
Directory server.
Option Description
user User name required to log into this Active Directory string Maximum
server. length: 35
config adgrp
Option Description
Option Description
port Port of the first FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
port2 Port of the second FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
port3 Port of the third FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
port4 Port of the fourth FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
port5 Port of the fifth FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
Option Description
Option Description
Option Description
Option Description
company Set the action for the company guest user field. option - optional
Option Description
optional Optional.
mandatory Mandatory.
disabled Disabled.
email Enable/disable the guest user email address field. option - enable
Option Description
expire Time in seconds before guest user accounts integer Minimum 14400
expire. value: 1
Maximum
value:
31536000
Option Description
immediately Immediately.
Option Description
firewall Firewall.
guest Guest.
Option Description
Option Description
Option Description
specify Specify.
disable Disable.
Option Description
sponsor Set the action for the sponsor guest user field. option - optional
Option Description
optional Optional.
mandatory Mandatory.
disabled Disabled.
sso-attribute- Name of the RADIUS user group that this local string Maximum
value user group represents. length: 511
Option Description
specify Specify.
Option Description
config guest
sponsor Set the action for the sponsor guest user field. string Maximum
length: 35
company Set the action for the company guest user field. string Maximum
length: 35
config match
keytab Base64 coded keytab file containing a pre-shared key. string Maximum
length: 8191
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable No SSL.
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
Option Description
Option Description
Option Description
ldap-server Name of LDAP server with which the user must string Maximum
authenticate. length: 35
ppk-secret IKEv2 Postquantum Preshared Key (ASCII string password-3 Not Specified
or hexadecimal encoded with a leading 0x).
radius-server Name of RADIUS server with which the user must string Maximum
authenticate. length: 35
Option Description
Option Description
tacacs+-server Name of TACACS+ server with which the user string Maximum
must authenticate. length: 35
Option Description
disable disable
fortitoken FortiToken
Option Description
Option Description
Option Description
Option Description
disable Ignore case and accents. Username at prompt not required to match case or
accents.
enable Do not ignore case and accents. Username at prompt must be an exact
match.
workstation Name of the remote user workstation, if you want string Maximum
to limit the user to authenticate only from a length: 35
particular workstation.
Option Description
description Description for the NAC policy matching pattern. string Maximum
length: 63
ssid-policy SSID policy to be applied on the matched NAC policy. string Maximum
length: 35
Option Description
switch-fortilink FortiLink interface for which this NAC policy belongs to. string Maximum
* length: 15
switch-mac- Switch MAC policy action to be applied on the matched string Maximum
policy * NAC policy. length: 63
expire-days Time in days before the user's password expires. integer Minimum 180
value: 0
Maximum
value: 999
Option Description
Option Description
Option Description
password Username/password.
ldap-server Name of an LDAP server defined under the user ldap string Maximum
command. Performs client access rights check. length: 35
Option Description
ocsp- Online Certificate Status Protocol (OCSP) server for string Maximum
override- certificate retrieval. length: 35
server
Option Description
Option Description
none None.
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
firewall- Firewall address group which includes all quarantine string Maximum
groups MAC address. length: 79
Option Description
config targets
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
filter-Id Filter-Id
class Class
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
nas-ip IP address used to communicate with the ipv4- Not Specified 0.0.0.0
RADIUS server and used as NAS-IP-Address address
and Called-Station-ID attributes.
Option Description
Option Description
Option Description
Option Description
rsso-context- Time in seconds before the logged out user is integer Minimum 28800
timeout removed from the "user context list" of logged on value: 0
users. Maximum
value:
4294967295
rsso-endpoint- RADIUS attributes used to extract the user end option - Calling-
attribute point identifier from the RADIUS Start record. Station-Id
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable replacement of old IP address with new IP address for the same
endpoint on RADIUS accounting start.
disable Disable replacement of old IP address with new IP address for the same
endpoint on RADIUS accounting start.
Option Description
Option Description
rsso-log-period Time interval in seconds that group event log integer Minimum 0
messages will be generated for dynamic profile value: 0
events. Maximum
value:
4294967295
Option Description
rsso-radius- UDP port to listen on for RADIUS Start and Stop integer Minimum 1813
server-port records. value: 0
Maximum
value: 65535
rsso-secret RADIUS secret used by the RADIUS accounting password Not Specified
server.
Option Description
secondary- Secret key to access the secondary server. password Not Specified
secret
secret Pre-shared secret key used to access the password Not Specified
primary RADIUS server.
sso-attribute RADIUS attribute that contains the profile group option - Class
name to be extracted from the RADIUS Start
record.
Option Description
Option Description
sso-attribute- Key prefix for SSO group value in the SSO string Maximum
key attribute. length: 35
Option Description
enable Enable override old attribute value with new value for the same endpoint.
disable Disable override old attribute value with new value for the same endpoint.
Option Description
callback-nas- User disconnected and called back, then provided a command prompt.
prompt
callback- User disconnected and called back, granted access to the admin unsigned
administrative interface.
tertiary-secret Secret key to access the tertiary server. password Not Specified
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
email-adfs-1x E-mail address of the user when interoperating with AD FS 1.1 or ADFS 1.0.
Option Description
Option Description
email-adfs-1x E-mail address of the user when interoperating with AD FS 1.1 or ADFS 1.0.
Option Description
config rule
Option Description
auth-lockout- Lockout period in seconds after too many login integer Minimum 0
duration failures. value: 0
Maximum
value:
4294967295
Option Description
auth-portal- Time in minutes before captive portal user have to integer Minimum 3
timeout re-authenticate. value: 1
Maximum
value: 30
Option Description
Option Description
Option Description
Option Description
sslv3 SSLv3.
tlsv1 TLSv1.
tlsv1-1 TLSv1.1.
tlsv1-2 TLSv1.2.
tlsv1-3 TLSv1.3.
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
Option Description
Option Description
radius-ses- Set the RADIUS session timeout to a hard timeout or option - hard-
timeout-act to ignore RADIUS server session timeouts. timeout
Option Description
config auth-ports
Option Description
port Non-standard port for firewall user authentication. integer Minimum 1024
value: 1
Maximum
value: 65535
Option Description
mschap MSCHAP.
chap CHAP.
pap PAP.
ascii ASCII.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config entries
Option Description
Option Description
config msrp
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
max-calls Maximum calls per minute per SCCP client (max integer Minimum 0
65535). value: 0
Maximum
value:
65535
Option Description
Option Description
Option Description
Option Description
Option Description
register-rate REGISTER request rate limit (per second, per integer Minimum 0
policy). value: 0
Maximum
value:
4294967295
Option Description
none None.
invite-rate INVITE request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
Option Description
Option Description
Option Description
call-keepalive Continue tracking calls with no RTP for this many integer Minimum 0
minutes. value: 0
Maximum
value: 10080
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
subscribe-rate SUBSCRIBE request rate limit (per second, per integer Minimum 0
policy). value: 0
Maximum
value:
4294967295
Option Description
none None.
message-rate MESSAGE request rate limit (per second, per integer Minimum 0
policy). value: 0
Maximum
value:
4294967295
Option Description
none None.
notify-rate NOTIFY request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
refer-rate REFER request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
update-rate UPDATE request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
options-rate OPTIONS request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
ack-rate ACK request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
prack-rate PRACK request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
info-rate INFO request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
publish-rate PUBLISH request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
bye-rate BYE request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
cancel-rate CANCEL request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
call-id-regex Validate PCRE regular expression for Call-Id header var-string Maximum
value. length: 511
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
malformed- Action for malformed SIP messages without Require option - pass
header-no- header.
require
Option Description
Option Description
malformed- Action for malformed SIP messages without Proxy- option - pass
header-no- Require header.
proxy-require
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ssl-mode * SSL/TLS mode for encryption & decryption of traffic. option - off
Option Description
off No SSL.
Option Description
Option Description
secure Reject any SSL connection that does not offer a RFC 5746 Secure
Renegotiation Indication.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
Option Description
ssl-server- Name of Certificate return to the client in every SSL string Maximum
certificate * connection. length: 35
CA certificate.
config vpn certificate ca
Description: CA certificate.
edit <name>
set auto-update-days {integer}
set auto-update-days-warning {integer}
set ca {user}
set ca-identifier {string}
set obsolete [disable|enable]
set range [global|vdom]
Option Description
disable Alive.
enable Obsolete.
range Either global or VDOM IP address range for the CA option - vdom
certificate.
Option Description
Option Description
source-ip Source IP address for communications to the SCEP ipv4- Not Specified 0.0.0.0
server. address
Option Description
range Either global or VDOM IP address range for the option - vdom
certificate.
Option Description
scep-cert Local certificate for SCEP communication for CRL string Maximum Fortinet_
auto-update. length: 35 CA_SSL
Option Description
source-ip Source IP address for communications to a HTTP or ipv4- Not Specified 0.0.0.0
SCEP CA server. address
update- Time in seconds before the FortiGate checks for an integer Minimum 0
interval updated CRL. Set to 0 to update only when it expires. value: 0
Maximum
value:
4294967295
Option Description
renewal Renewal.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
source-ip Source IP address for dynamic AIA and OCSP queries. string Maximum
length: 63
unavail-action Action when server is unavailable (revoke the certificate option - revoke
or ignore the result of the check).
Option Description
range Either the global or VDOM IP address range for the option - vdom
remote certificate.
Option Description
Option Description
certname- 1024 bit DSA key certificate for re-signing server string Maximum Fortinet_
dsa1024 certificates for SSL inspection. length: 35 SSL_
DSA1024
certname- 2048 bit DSA key certificate for re-signing server string Maximum Fortinet_
dsa2048 certificates for SSL inspection. length: 35 SSL_
DSA2048
certname- 256 bit ECDSA key certificate for re-signing server string Maximum Fortinet_
ecdsa256 certificates for SSL inspection. length: 35 SSL_
ECDSA256
certname- 384 bit ECDSA key certificate for re-signing server string Maximum Fortinet_
ecdsa384 certificates for SSL inspection. length: 35 SSL_
ECDSA384
certname- 521 bit ECDSA key certificate for re-signing server string Maximum Fortinet_
ecdsa521 certificates for SSL inspection. length: 35 SSL_
ECDSA521
certname- 253 bit EdDSA key certificate for re-signing server string Maximum Fortinet_
ed25519 certificates for SSL inspection. length: 35 SSL_
ED25519
certname- 456 bit EdDSA key certificate for re-signing server string Maximum Fortinet_
ed448 certificates for SSL inspection. length: 35 SSL_ED448
certname- 1024 bit RSA key certificate for re-signing server string Maximum Fortinet_
rsa1024 certificates for SSL inspection. length: 35 SSL_
RSA1024
certname- 2048 bit RSA key certificate for re-signing server string Maximum Fortinet_
rsa2048 certificates for SSL inspection. length: 35 SSL_
RSA2048
certname- 4096 bit RSA key certificate for re-signing server string Maximum Fortinet_
rsa4096 certificates for SSL inspection. length: 35 SSL_
RSA4096
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
substring Find a match if the name being searched for is a part or the same as a
certificate CN.
value Find a match if the name being searched for is same as a certificate CN.
Option Description
ocsp-option Specify whether the OCSP URL is from certificate or option - server
configured OCSP server.
Option Description
Option Description
proxy Proxy server FQDN or IP for OCSP/CA queries during string Maximum
certificate verification. length: 127
source-ip Source IP address for dynamic AIA and OCSP string Maximum
queries. length: 63
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
substring Find a match if the name being searched for is a part or the same as a
certificate subject RDN.
value Find a match if the name being searched for is same as a certificate subject
RDN.
Option Description
subset Find a match if the name being searched for is a subset of a certificate subject.
superset Find a match if the name being searched for is a superset of a certificate
subject.
config crl-verification
Option Description
leaf-crl- CRL verification option when leaf CRL is absent. option - ignore
absence
Option Description
chain-crl- CRL verification option when CRL of any certificate in option - ignore
absence chain is absent.
Option Description
Concentrator configuration.
config vpn ipsec concentrator
Description: Concentrator configuration.
edit <id>
set member <name1>, <name2>, ...
set name {string}
set src-check [disable|enable]
Option Description
config mappings
packet-loss- Apply FEC parameters when packet loss is >= integer Minimum 0
threshold threshold. value: 0
Maximum
value: 100
latency- Apply FEC parameters when latency is <= threshold integer Minimum 0
threshold (0 means no threshold). value: 0
Maximum
value:
4294967295
phase2name Phase 2 tunnel name that you defined in the string Maximum
FortiClient dialup configuration. length: 35
Option Description
Option Description
auth-alg Authentication algorithm. Must be the same for both option - null
ends of the tunnel.
Option Description
null null
md5 md5
sha1 sha1
sha256 sha256
sha384 sha384
sha512 sha512
enc-alg Encryption algorithm. Must be the same for both ends of option - null
the tunnel.
Option Description
null null
des des
Option Description
3des 3des
aes128 aes128
aes192 aes192
aes256 aes256
aria128 aria128
aria192 aria192
aria256 aria256
seed seed
Option Description
local-gw IPv4 address of the local gateway's external interface. ipv4- Not 0.0.0.0
address- Specified
any
local-spi Local SPI, a hexadecimal 8-digit (4-byte) tag. Discerns user Not
between two traffic streams with different encryption Specified
rules.
Option Description
remote-gw IPv4 address of the remote gateway's external ipv4- Not 0.0.0.0
interface. address Specified
authentication Authentication algorithm. Must be the same for both option - null
ends of the tunnel.
Option Description
null Null.
md5 MD5.
sha1 SHA1.
sha256 SHA256.
sha384 SHA384.
sha512 SHA512.
encryption Encryption algorithm. Must be the same for both ends option - null
of the tunnel.
Option Description
null Null.
des DES.
3des 3DES.
aes128 AES128.
aes192 AES192.
aes256 AES256.
aria128 ARIA128.
aria192 ARIA192.
aria256 ARIA256.
seed Seed.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
dependent Short-cut tunnels are brought down if the parent tunnel goes down.
Option Description
Option Description
Option Description
enable Enable cross validation of peer ID and the identity in the peer's certificate as
specified in RFC 4945.
disable Disable cross validation of peer ID and the identity in the peer's certificate
as specified in RFC 4945.
Option Description
Option Description
Option Description
disable Disable allowing the VPN client to bring up the tunnel when there is no
traffic.
enable Enable allowing the VPN client to bring up the tunnel when there is no
traffic.
Option Description
disable Disable allowing the VPN client to keep the tunnel up when there is no
traffic.
enable Enable allowing the VPN client to keep the tunnel up when there is no
traffic.
default-gw IPv4 address of default route gateway to ipv4-address Not Specified 0.0.0.0
use for traffic exiting the interface.
Option Description
dhcp-ra-giaddr Relay agent gateway IP address to use in ipv4-address Not Specified 0.0.0.0
the giaddr field of DHCP requests.
dhcp6-ra- Relay agent IPv6 link address to use in ipv6-address Not Specified ::
linkaddr DHCP6 requests.
Option Description
1 DH Group 1.
2 DH Group 2.
5 DH Group 5.
Option Description
14 DH Group 14.
15 DH Group 15.
16 DH Group 16.
17 DH Group 17.
18 DH Group 18.
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
27 DH Group 27.
28 DH Group 28.
29 DH Group 29.
30 DH Group 30.
31 DH Group 31.
32 DH Group 32.
Option Description
Option Description
Option Description
on-demand Trigger Dead Peer Detection when IPsec traffic is sent but no reply is
received from the peer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
exchange-ip- IPv4 address to exchange with peers. ipv4-address Not Specified 0.0.0.0
addr4
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable copy the dscp in the ESP header to the inner IP Header.
disable Disable copy the dscp in the ESP header to the inner IP Header.
Option Description
internal-domain- List of domains for which the client directs string Maximum
list <domain- DNS queries to the internal DNS servers length: 79
name> for resolution. DNS servers are
configured in the mode-cfg settings. One
or more internal domain names in quotes
separated by spaces, like "abc.com
xyz.com 123.com"
Domain name.
Option Description
Option Description
ipv4-split- IPv4 subnets that should not be sent over string Maximum
exclude the IPsec tunnel. length: 79
ipv6-split- IPv6 subnets that should not be sent over string Maximum
exclude the IPsec tunnel. length: 79
local-gw IPv4 address of the local gateway's ipv4-address Not Specified 0.0.0.0
external interface.
Option Description
Option Description
disable Ingress/egress IKE traffic must be routed over the same interface.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
Option Description
sunday Sunday.
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
thursday Thursday.
friday Friday.
saturday Saturday.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow, but do not require, use of IKEv2 Postquantum Preshared Key (PPK).
Option Description
des-md5 des-md5
des-sha1 des-sha1
des-sha256 des-sha256
des-sha384 des-sha384
des-sha512 des-sha512
3des-md5 3des-md5
3des-sha1 3des-sha1
3des-sha256 3des-sha256
3des-sha384 3des-sha384
3des-sha512 3des-sha512
aes128-md5 aes128-md5
aes128-sha1 aes128-sha1
aes128-sha256 aes128-sha256
aes128-sha384 aes128-sha384
aes128-sha512 aes128-sha512
aes128gcm-prfsha1 aes128gcm-prfsha1
Option Description
aes128gcm-prfsha256 aes128gcm-prfsha256
aes128gcm-prfsha384 aes128gcm-prfsha384
aes128gcm-prfsha512 aes128gcm-prfsha512
aes192-md5 aes192-md5
aes192-sha1 aes192-sha1
aes192-sha256 aes192-sha256
aes192-sha384 aes192-sha384
aes192-sha512 aes192-sha512
aes256-md5 aes256-md5
aes256-sha1 aes256-sha1
aes256-sha256 aes256-sha256
aes256-sha384 aes256-sha384
aes256-sha512 aes256-sha512
aes256gcm-prfsha1 aes256gcm-prfsha1
aes256gcm-prfsha256 aes256gcm-prfsha256
aes256gcm-prfsha384 aes256gcm-prfsha384
aes256gcm-prfsha512 aes256gcm-prfsha512
chacha20poly1305-prfsha1 chacha20poly1305-prfsha1
chacha20poly1305-prfsha256 chacha20poly1305-prfsha256
chacha20poly1305-prfsha384 chacha20poly1305-prfsha384
chacha20poly1305-prfsha512 chacha20poly1305-prfsha512
aria128-md5 aria128-md5
aria128-sha1 aria128-sha1
aria128-sha256 aria128-sha256
aria128-sha384 aria128-sha384
aria128-sha512 aria128-sha512
aria192-md5 aria192-md5
aria192-sha1 aria192-sha1
aria192-sha256 aria192-sha256
Option Description
aria192-sha384 aria192-sha384
aria192-sha512 aria192-sha512
aria256-md5 aria256-md5
aria256-sha1 aria256-sha1
aria256-sha256 aria256-sha256
aria256-sha384 aria256-sha384
aria256-sha512 aria256-sha512
seed-md5 seed-md5
seed-sha1 seed-sha1
seed-sha256 seed-sha256
seed-sha384 seed-sha384
seed-sha512 seed-sha512
psksecret- Pre-shared secret for remote side PSK password-3 Not Specified
remote authentication (ASCII string or
hexadecimal encoded with a leading 0x).
Option Description
Option Description
remote-gw IPv4 address of the remote gateway's ipv4-address Not Specified 0.0.0.0
external interface.
remote-gw-end- Last IPv4 address in the range. ipv4- Not Specified 0.0.0.0
ip address-any
Option Description
remote-gw-start- First IPv4 address in the range. ipv4- Not Specified 0.0.0.0
ip address-any
remote-gw- IPv4 address and subnet mask. ipv4- Not Specified 0.0.0.0 0.0.0.0
subnet classnet-any
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sha1 SHA1.
sha2-256 SHA2-256.
sha2-384 SHA2-384.
sha2-512 SHA2-512.
Option Description
Option Description
ddns Remote VPN gateway has dynamic IP address and is a dynamic DNS
client.
Option Description
Option Description
Option Description
Option Description
disable Disable.
config ipv4-exclude-range
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable cross validation of peer ID and the identity in the peer's certificate as
specified in RFC 4945.
Option Description
disable Disable cross validation of peer ID and the identity in the peer's certificate
as specified in RFC 4945.
Option Description
Option Description
disable Disable allowing the VPN client to bring up the tunnel when there is no
traffic.
enable Enable allowing the VPN client to bring up the tunnel when there is no
traffic.
Option Description
disable Disable allowing the VPN client to keep the tunnel up when there is no
traffic.
enable Enable allowing the VPN client to keep the tunnel up when there is no
traffic.
Option Description
1 DH Group 1.
2 DH Group 2.
5 DH Group 5.
14 DH Group 14.
15 DH Group 15.
16 DH Group 16.
17 DH Group 17.
18 DH Group 18.
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
27 DH Group 27.
28 DH Group 28.
29 DH Group 29.
30 DH Group 30.
31 DH Group 31.
32 DH Group 32.
Option Description
Option Description
domain Instruct unity clients about the single default string Maximum
DNS domain. length: 63
Option Description
on-demand Trigger Dead Peer Detection when IPsec traffic is sent but no reply is
received from the peer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable copy the dscp in the ESP header to the inner IP Header.
disable Disable copy the dscp in the ESP header to the inner IP Header.
Option Description
internal-domain- List of domains for which the client directs string Maximum
list <domain- DNS queries to the internal DNS servers for length: 79
name> resolution. DNS servers are configured in
the mode-cfg settings. One or more internal
domain names in quotes separated by
spaces, like "abc.com xyz.com 123.com"
Domain name.
ipv4-split- IPv4 subnets that should not be sent over string Maximum
exclude the IPsec tunnel. length: 79
ipv6-split- IPv6 subnets that should not be sent over string Maximum
exclude the IPsec tunnel. length: 79
Option Description
Option Description
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow, but do not require, use of IKEv2 Postquantum Preshared Key (PPK).
Option Description
des-md5 des-md5
des-sha1 des-sha1
des-sha256 des-sha256
des-sha384 des-sha384
des-sha512 des-sha512
3des-md5 3des-md5
3des-sha1 3des-sha1
3des-sha256 3des-sha256
3des-sha384 3des-sha384
3des-sha512 3des-sha512
aes128-md5 aes128-md5
aes128-sha1 aes128-sha1
aes128-sha256 aes128-sha256
aes128-sha384 aes128-sha384
aes128-sha512 aes128-sha512
aes128gcm-prfsha1 aes128gcm-prfsha1
aes128gcm-prfsha256 aes128gcm-prfsha256
aes128gcm-prfsha384 aes128gcm-prfsha384
aes128gcm-prfsha512 aes128gcm-prfsha512
aes192-md5 aes192-md5
aes192-sha1 aes192-sha1
aes192-sha256 aes192-sha256
Option Description
aes192-sha384 aes192-sha384
aes192-sha512 aes192-sha512
aes256-md5 aes256-md5
aes256-sha1 aes256-sha1
aes256-sha256 aes256-sha256
aes256-sha384 aes256-sha384
aes256-sha512 aes256-sha512
aes256gcm-prfsha1 aes256gcm-prfsha1
aes256gcm-prfsha256 aes256gcm-prfsha256
aes256gcm-prfsha384 aes256gcm-prfsha384
aes256gcm-prfsha512 aes256gcm-prfsha512
chacha20poly1305-prfsha1 chacha20poly1305-prfsha1
chacha20poly1305-prfsha256 chacha20poly1305-prfsha256
chacha20poly1305-prfsha384 chacha20poly1305-prfsha384
chacha20poly1305-prfsha512 chacha20poly1305-prfsha512
aria128-md5 aria128-md5
aria128-sha1 aria128-sha1
aria128-sha256 aria128-sha256
aria128-sha384 aria128-sha384
aria128-sha512 aria128-sha512
aria192-md5 aria192-md5
aria192-sha1 aria192-sha1
aria192-sha256 aria192-sha256
aria192-sha384 aria192-sha384
aria192-sha512 aria192-sha512
aria256-md5 aria256-md5
aria256-sha1 aria256-sha1
aria256-sha256 aria256-sha256
aria256-sha384 aria256-sha384
Option Description
aria256-sha512 aria256-sha512
seed-md5 seed-md5
seed-sha1 seed-sha1
seed-sha256 seed-sha256
seed-sha384 seed-sha384
seed-sha512 seed-sha512
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sha1 SHA1.
sha2-256 SHA2-256.
sha2-384 SHA2-384.
sha2-512 SHA2-512.
Option Description
Option Description
ddns Remote VPN gateway has dynamic IP address and is a dynamic DNS
client.
Option Description
Option Description
Option Description
disable Disable.
config ipv4-exclude-range
config ipv6-exclude-range
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
1 DH Group 1.
2 DH Group 2.
5 DH Group 5.
14 DH Group 14.
15 DH Group 15.
16 DH Group 16.
17 DH Group 17.
18 DH Group 18.
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
27 DH Group 27.
28 DH Group 28.
29 DH Group 29.
30 DH Group 30.
31 DH Group 31.
32 DH Group 32.
Option Description
diffservcode DSCP value to be applied to the IPsec tunnel user Not Specified
outer IP header.
Option Description
Option Description
ip IPv4 IP.
Option Description
Option Description
phase1 copy the DCSP in the ESP header to the inner IP Header according to the
phase1 inbound_dscp_copy setting.
enable Enable copying of the DSCP in the ESP header to the inner IP header.
disable Disable copying of the DSCP in the ESP header to the inner IP header.
Option Description
Option Description
Option Description
Option Description
keylifekbs Phase2 key life in number of kilobytes of traffic. integer Minimum 5120
value: 5120
Maximum
value:
4294967295
Option Description
Option Description
Option Description
null-md5 null-md5
null-sha1 null-sha1
null-sha256 null-sha256
null-sha384 null-sha384
null-sha512 null-sha512
des-null des-null
des-md5 des-md5
des-sha1 des-sha1
des-sha256 des-sha256
des-sha384 des-sha384
des-sha512 des-sha512
3des-null 3des-null
Option Description
3des-md5 3des-md5
3des-sha1 3des-sha1
3des-sha256 3des-sha256
3des-sha384 3des-sha384
3des-sha512 3des-sha512
aes128-null aes128-null
aes128-md5 aes128-md5
aes128-sha1 aes128-sha1
aes128-sha256 aes128-sha256
aes128-sha384 aes128-sha384
aes128-sha512 aes128-sha512
aes128gcm aes128gcm
aes192-null aes192-null
aes192-md5 aes192-md5
aes192-sha1 aes192-sha1
aes192-sha256 aes192-sha256
aes192-sha384 aes192-sha384
aes192-sha512 aes192-sha512
aes256-null aes256-null
aes256-md5 aes256-md5
aes256-sha1 aes256-sha1
aes256-sha256 aes256-sha256
aes256-sha384 aes256-sha384
aes256-sha512 aes256-sha512
aes256gcm aes256gcm
chacha20poly1305 chacha20poly1305
aria128-null aria128-null
aria128-md5 aria128-md5
aria128-sha1 aria128-sha1
Option Description
aria128-sha256 aria128-sha256
aria128-sha384 aria128-sha384
aria128-sha512 aria128-sha512
aria192-null aria192-null
aria192-md5 aria192-md5
aria192-sha1 aria192-sha1
aria192-sha256 aria192-sha256
aria192-sha384 aria192-sha384
aria192-sha512 aria192-sha512
aria256-null aria256-null
aria256-md5 aria256-md5
aria256-sha1 aria256-sha1
aria256-sha256 aria256-sha256
aria256-sha384 aria256-sha384
aria256-sha512 aria256-sha512
seed-null seed-null
seed-md5 seed-md5
seed-sha1 seed-sha1
seed-sha256 seed-sha256
seed-sha384 seed-sha384
seed-sha512 seed-sha512
Option Description
Option Description
use-old Use the old route and do not add the new route.
use-new Delete the old route and add the new route.
Option Description
Option Description
ip IPv4 IP.
Option Description
Option Description
Option Description
Option Description
1 DH Group 1.
2 DH Group 2.
5 DH Group 5.
Option Description
14 DH Group 14.
15 DH Group 15.
16 DH Group 16.
17 DH Group 17.
18 DH Group 18.
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
27 DH Group 27.
28 DH Group 28.
29 DH Group 29.
30 DH Group 30.
31 DH Group 31.
32 DH Group 32.
Option Description
diffservcode DSCP value to be applied to the IPsec tunnel user Not Specified
outer IP header.
Option Description
ip IPv4 IP.
Option Description
Option Description
phase1 copy the DCSP in the ESP header to the inner IP Header according to the
phase1 inbound_dscp_copy setting.
enable Enable copying of the DSCP in the ESP header to the inner IP header.
disable Disable copying of the DSCP in the ESP header to the inner IP header.
Option Description
Option Description
Option Description
Option Description
keylifekbs Phase2 key life in number of kilobytes of traffic. integer Minimum 5120
value: 5120
Maximum
value:
4294967295
Option Description
Option Description
Option Description
null-md5 null-md5
null-sha1 null-sha1
null-sha256 null-sha256
null-sha384 null-sha384
null-sha512 null-sha512
des-null des-null
des-md5 des-md5
des-sha1 des-sha1
des-sha256 des-sha256
des-sha384 des-sha384
des-sha512 des-sha512
3des-null 3des-null
3des-md5 3des-md5
3des-sha1 3des-sha1
3des-sha256 3des-sha256
3des-sha384 3des-sha384
3des-sha512 3des-sha512
aes128-null aes128-null
aes128-md5 aes128-md5
aes128-sha1 aes128-sha1
aes128-sha256 aes128-sha256
aes128-sha384 aes128-sha384
Option Description
aes128-sha512 aes128-sha512
aes128gcm aes128gcm
aes192-null aes192-null
aes192-md5 aes192-md5
aes192-sha1 aes192-sha1
aes192-sha256 aes192-sha256
aes192-sha384 aes192-sha384
aes192-sha512 aes192-sha512
aes256-null aes256-null
aes256-md5 aes256-md5
aes256-sha1 aes256-sha1
aes256-sha256 aes256-sha256
aes256-sha384 aes256-sha384
aes256-sha512 aes256-sha512
aes256gcm aes256gcm
chacha20poly1305 chacha20poly1305
aria128-null aria128-null
aria128-md5 aria128-md5
aria128-sha1 aria128-sha1
aria128-sha256 aria128-sha256
aria128-sha384 aria128-sha384
aria128-sha512 aria128-sha512
aria192-null aria192-null
aria192-md5 aria192-md5
aria192-sha1 aria192-sha1
aria192-sha256 aria192-sha256
aria192-sha384 aria192-sha384
aria192-sha512 aria192-sha512
aria256-null aria256-null
Option Description
aria256-md5 aria256-md5
aria256-sha1 aria256-sha1
aria256-sha256 aria256-sha256
aria256-sha384 aria256-sha384
aria256-sha512 aria256-sha512
seed-null seed-null
seed-md5 seed-md5
seed-sha1 seed-sha1
seed-sha256 seed-sha256
seed-sha384 seed-sha384
seed-sha512 seed-sha512
Option Description
Option Description
use-old Use the old route and do not add the new route.
use-new Delete the old route and add the new route.
Option Description
Option Description
Option Description
ip IPv4 IP.
Option Description
enable Replace source selector with interface IP when using outbound NAT.
Configure L2TP.
config vpn l2tp
Description: Configure L2TP.
set compress [enable|disable]
set eip {ipv4-address}
set enforce-ipsec [enable|disable]
set hello-interval {integer}
set lcp-echo-interval {integer}
set lcp-max-echo-fails {integer}
set sip {ipv4-address}
set status [enable|disable]
set usrgrp {string}
end
Option Description
Option Description
lcp-echo- Time in seconds between PPPoE Link Control Protocol integer Minimum 5
interval (LCP) echo requests. value: 0
Maximum
value:
32767
Option Description
Option Description
auto- Control deletion of child short-cut tunnels when the option - independent
discovery- parent tunnel goes down.
shortcut-
mode
Option Description
dependent Short-cut tunnels are brought down if the parent tunnel goes down.
Option Description
ip-allocation- Class B subnet reserved for private IP address ipv4- Not 10.254.0.0
block assignment. classnet- Specified 255.255.0.0
any
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config auth-groups
config overlays
Option Description
Option Description
subnet IPv4 address and subnet mask. ipv4- Not Specified 0.0.0.0
classnet- 0.0.0.0
any
Configure PPTP.
config vpn pptp
Description: Configure PPTP.
set eip {ipv4-address}
set ip-mode [range|usrgrp]
set local-ip {ipv4-address}
set sip {ipv4-address}
set status [enable|disable]
set usrgrp {string}
end
Option Description
range PPTP client IP from manual config (range from sip to eip).
Option Description
local-ip Local IP to be used for peer's remote IP. ipv4- Not 0.0.0.0
address Specified
Option Description
Client.
config vpn ssl client
Description: Client.
edit <name>
set certificate {string}
set class-id {integer}
set comment {var-string}
set distance {integer}
set interface {string}
set ipv4-subnets {string}
set ipv6-subnets {string}
set peer {string}
set port {integer}
set priority {integer}
set psk {password-3}
set realm {string}
set server {string}
set source-ip {string}
set status [enable|disable]
set user {string}
next
end
psk Pre-shared secret to authenticate with the server password-3 Not Specified
(ASCII string or hexadecimal encoded with a leading
0x).
server IPv4, IPv6 or DNS address of the SSL-VPN server. string Maximum
length: 63
source-ip IPv4 or IPv6 address to use as a source for the SSL- string Maximum
VPN connection to the server. length: 63
Option Description
Configure SSL-VPN.
config vpn ssl settings
Description: Configure SSL-VPN.
set algorithm [high|medium|...]
set auth-session-check-source-ip [enable|disable]
set auth-timeout {integer}
config authentication-rule
Description: Authentication rule for SSL-VPN.
edit <id>
set source-interface <name1>, <name2>, ...
set source-address <name1>, <name2>, ...
set source-address-negate [enable|disable]
set source-address6 <name1>, <name2>, ...
set source-address6-negate [enable|disable]
set users <name1>, <name2>, ...
set groups <name1>, <name2>, ...
set portal {string}
set realm {string}
set client-cert [enable|disable]
set user-peer {string}
set cipher [any|high|...]
set auth [any|local|...]
next
end
set auto-tunnel-static-route [enable|disable]
set banned-cipher {option1}, {option2}, ...
set browser-language-detection [enable|disable]
set check-referer [enable|disable]
set ciphersuite {option1}, {option2}, ...
set client-sigalgs [no-rsa-pss|all]
set default-portal {string}
set deflate-compression-level {integer}
set deflate-min-data-size {integer}
set dns-server1 {ipv4-address}
set dns-server2 {ipv4-address}
set dns-suffix {var-string}
algorithm Force the SSL-VPN security level. High allows option - high
only high. Medium allows medium and high. Low
allows any.
Option Description
default default
Option Description
Option Description
Option Description
DHE Ban the use of cipher suites using authenticated ephemeral DH key
agreement.
ECDHE Ban the use of cipher suites using authenticated ephemeral ECDH key
agreement.
Option Description
AES Ban the use of cipher suites using either 128 or 256 bit AES.
AESGCM Ban the use of cipher suites AES in Galois Counter Mode (GCM).
CAMELLIA Ban the use of cipher suites using either 128 or 256 bit CAMELLIA.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
dual-stack- Tunnel mode: enable parallel IPv4 and IPv6 option - disable
mode tunnel. Web mode: support IPv4 and IPv6
bookmarks in the portal.
Option Description
Option Description
encrypt-and- Encrypt and store user passwords for SSL-VPN option - disable
store-password web sessions.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
idle-timeout SSL-VPN disconnects if idle for specified time in integer Minimum 300
seconds. value: 0
Maximum
value: 259200
login-block-time Time for which a user is blocked from logging in integer Minimum 60
after too many failed login attempts. value: 0
Maximum
value:
4294967295
Option Description
Option Description
saml-redirect- SAML local redirect port in the machine running integer Minimum 8020
port FortiClient. 0 is to disable redirection on FGT value: 0
side. Maximum
value: 65535
server- Server hostname for HTTPS. When set, will be string Maximum
hostname used for SSL VPN web proxy host header for length: 255
any redirection.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
tunnel-addr- Method used for assigning address for tunnel. option - first-available
assigned-
method
Option Description
round-robin Assign the available address from the pool with a round robin fashion.
Option Description
tunnel-ip-pools Names of the IPv4 IP Pool firewall objects that string Maximum
<name> define the IP addresses reserved for remote length: 79
clients.
Address name.
tunnel-ipv6- Names of the IPv6 IP Pool firewall objects that string Maximum
pools <name> define the IP addresses reserved for remote length: 79
clients.
Address name.
tunnel-user- Time out value to clean up user session after integer Minimum 30
session-timeout tunnel connection is dropped. value: 1
Maximum
value: 255
Option Description
Option Description
Option Description
Option Description
config authentication-rule
Option Description
Option Description
Option Description
Option Description
Option Description
any Any
local Local
radius RADIUS
tacacs+ TACACS+
ldap LDAP
peer PEER
Option Description
Option Description
av AntiVirus.
fw Firewall.
config check-item-list
Option Description
require Require.
deny Deny.
Option Description
file File.
registry Registry.
process Process.
Portal.
config vpn ssl web portal
Description: Portal.
edit <name>
set allow-user-access {option1}, {option2}, ...
set auto-connect [enable|disable]
config bookmark-group
Description: Portal bookmark group.
edit <name>
config bookmarks
Description: Bookmark table.
edit <name>
set apptype [ftp|rdp|...]
set url {var-string}
set host {var-string}
set folder {var-string}
set domain {var-string}
set additional-params {var-string}
set description {var-string}
set keyboard-layout [ar-101|ar-102|...]
set security [any|rdp|...]
set send-preconnection-id [enable|disable]
set preconnection-id {integer}
Option Description
Option Description
client-src-range Allow client to add source range for the tunnel traffic. option - disable
Option Description
Option Description
custom-lang Change the web portal display language. Overrides string Maximum
config system global set language. You can use config length: 35
system custom-language and execute system custom-
language to add custom language files.
Option Description
Option Description
use-new Assign DHCP lease to new client and remove old client lease.
dhcp-ra-giaddr Relay agent gateway IP address to use in the giaddr ipv4- Not 0.0.0.0
field of DHCP requests. address Specified
dhcp6-ra- Relay agent IPv6 link address to use in DHCP6 ipv6- Not ::
linkaddr requests. address Specified
display- Enable to display the web portal bookmark widget. option - enable
bookmark
Option Description
display- Enable to display the web portal connection tools option - enable
connection- widget.
tools
Option Description
display-history Enable to display the web portal user login history option - enable
widget.
Option Description
display-status Enable to display the web portal status widget. option - enable
Option Description
Option Description
Option Description
Option Description
hide-sso- Enable to prevent SSO credential being sent to client. option - enable
credential
Option Description
Option Description
av-fw AntiVirus and firewall software recognized by the Windows Security Center.
custom Custom.
host-check- One or more policies to require the endpoint to have string Maximum
policy <name> specific security software. length: 79
Host check software list name.
ip-mode Method by which users of this SSL-VPN tunnel obtain option - range
IP addresses.
Option Description
range Use the IP addresses available for all SSL-VPN users as defined by the SSL
settings command.
user-group Use the IP addresses associated with individual users or user groups
(usually from external auth servers).
ip-pools IPv4 firewall source address objects reserved for SSL- string Maximum
<name> VPN tunnel mode clients. length: 79
Address name.
ipv6-exclusive- Enable/disable all IPv6 traffic go through tunnel only. option - disable
routing
Option Description
ipv6-pools IPv6 firewall source address objects reserved for SSL- string Maximum
<name> VPN tunnel mode clients. length: 79
Address name.
Option Description
Option Description
ipv6-split- IPv6 SSL-VPN tunnel mode firewall address objects string Maximum
tunneling- that override firewall policy destination addresses to length: 79
routing-address control split-tunneling access.
<name> Address name.
ipv6-split- Enable to negate IPv6 split tunneling routing address. option - disable
tunneling-
routing-negate
Option Description
Option Description
Option Description
limit-user-logins Enable to limit each user to one SSL-VPN session at a option - disable
time.
Option Description
Option Description
Option Description
os-check Enable to let the FortiGate decide action based on option - disable
client OS.
Option Description
prefer-ipv6-dns Prefer to query IPv6 DNS server first if enabled. option - disable
Option Description
rewrite-ip-uri-ui Rewrite contents for URI contains IP and /ui/. option - disable
Option Description
Option Description
Option Description
skip-check-for- Enable to skip host check for browser support. option - enable
browser
Option Description
skip-check-for- Enable to skip host check if client OS does not support option - enable
unsupported-os it.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable enable
disable disable
Option Description
split-tunneling- IPv4 SSL-VPN tunnel mode firewall address objects string Maximum
routing-address that override firewall policy destination addresses to length: 79
<name> control split-tunneling access.
Address name.
Option Description
Option Description
Option Description
Option Description
Option Description
user-bookmark Enable to allow web portal users to create their own option - enable
bookmarks.
Option Description
user-group- Enable to allow web portal users to create bookmarks option - enable
bookmark for all users in the same user group.
Option Description
Option Description
config bookmark-group
config bookmarks
Option Description
ftp FTP.
rdp RDP.
sftp SFTP.
smb SMB/CIFS.
ssh SSH.
telnet Telnet.
vnc VNC.
web HTTP/HTTPS.
Option Description
cz Czech.
da Danish.
nl Dutch.
de German.
es Spanish.
fi Finnish.
fr French.
Option Description
hr Croatian.
hu Hungarian.
it Italian.
ja Japanese.
ko Korean.
lt Lithuanian.
mk Macedonian (FYROM).
no Norwegian.
pt Portuguese.
ru Russian.
sl Slovenian.
sv Swedish.
Option Description
tuk Turkmen.
tur-f Turkish F.
tur-q Turkish Q.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
alternative Alternative.
sso-credential- Single sign-on credentials are only sent once to option - disable
sent-once remote server.
Option Description
enable Single sign-on credentials are only sent once to remote server.
disable Single sign-on credentials are sent to remote server for every HTTP
request.
Option Description
default Default.
da Danish.
nl Dutch.
fi Finnish.
fr French.
de German.
it Italian.
pt Portuguese.
no Norwegian.
gd Scottish Gaelic.
Option Description
es Spanish.
sv Swedish.
config form-data
config mac-addr-check-rule
config os-check-list
Option Description
config split-dns
domains Split DNS domains used for SSL-VPN clients var-string Maximum
separated by comma. length: 1024
Realm.
config vpn ssl web realm
Description: Realm.
edit <url-path>
set login-page {var-string}
set max-concurrent-user {integer}
set nas-ip {ipv4-address}
set radius-port {integer}
set radius-server {string}
set virtual-host {var-string}
set virtual-host-only [enable|disable]
set virtual-host-server-cert {string}
next
end
nas-ip IP address used as a NAS-IP to communicate with the ipv4- Not 0.0.0.0
RADIUS server. address Specified
Option Description
virtual-host- Name of the server certificate to used for this realm. string Maximum
server-cert length: 35
Option Description
ftp FTP.
rdp RDP.
sftp SFTP.
smb SMB/CIFS.
ssh SSH.
telnet Telnet.
vnc VNC.
web HTTP/HTTPS.
Option Description
cz Czech.
Option Description
da Danish.
nl Dutch.
de German.
es Spanish.
fi Finnish.
fr French.
hr Croatian.
hu Hungarian.
it Italian.
ja Japanese.
ko Korean.
lt Lithuanian.
Option Description
mk Macedonian (FYROM).
no Norwegian.
pt Portuguese.
ru Russian.
sl Slovenian.
sv Swedish.
tuk Turkmen.
tur-f Turkish F.
tur-q Turkish Q.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
alternative Alternative.
sso-credential- Single sign-on credentials are only sent once to option - disable
sent-once remote server.
Option Description
enable Single sign-on credentials are only sent once to remote server.
disable Single sign-on credentials are sent to remote server for every HTTP
request.
Option Description
default Default.
da Danish.
nl Dutch.
fi Finnish.
fr French.
de German.
it Italian.
pt Portuguese.
no Norwegian.
gd Scottish Gaelic.
es Spanish.
sv Swedish.
config form-data
Option Description
ftp FTP.
rdp RDP.
sftp SFTP.
smb SMB/CIFS.
ssh SSH.
telnet Telnet.
vnc VNC.
web HTTP/HTTPS.
Option Description
cz Czech.
Option Description
da Danish.
nl Dutch.
de German.
es Spanish.
fi Finnish.
fr French.
hr Croatian.
hu Hungarian.
it Italian.
ja Japanese.
ko Korean.
lt Lithuanian.
Option Description
mk Macedonian (FYROM).
no Norwegian.
pt Portuguese.
ru Russian.
sl Slovenian.
sv Swedish.
tuk Turkmen.
tur-f Turkish F.
tur-q Turkish Q.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
alternative Alternative.
sso-credential- Single sign-on credentials are only sent once to option - disable
sent-once remote server.
Option Description
enable Single sign-on credentials are only sent once to remote server.
disable Single sign-on credentials are sent to remote server for every HTTP
request.
Option Description
default Default.
da Danish.
nl Dutch.
fi Finnish.
fr French.
de German.
it Italian.
pt Portuguese.
no Norwegian.
gd Scottish Gaelic.
es Spanish.
sv Swedish.
config form-data
Option Description
Option Description
Option Description
Option Description
Option Description
config header-length
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config content-length
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config param-length
Option Description
length Maximum length of parameter in URL, HTTP POST integer Minimum 8192
request or HTTP body in bytes (0 to 2147483647). value: 0
Maximum
value:
2147483647
Option Description
allow Allow.
block Block.
Option Description
Option Description
config line-length
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config url-param-length
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config method
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config method
Option Description
Option Description
Option Description
Option Description
config hostname
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config malformed
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config max-cookie
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config max-header-line
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config max-url-param
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config max-range-segment
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config exception
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config method
config method-policy
Option Description
Option Description
config signature
config main-class
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config custom-signature
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config url-access
Option Description
bypass Allow the HTTP request, also bypass further WAF scanning.
permit Allow the HTTP request, and continue further WAF scanning.
Option Description
Option Description
config access-pattern
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1001F, FortiGate 101E,
FortiGate 101F, FortiGate 1101E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3001F, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3201F, FortiGate 3301E, FortiGate 3401E,
FortiGate 3501F, FortiGate 3601E, FortiGate 3700D, FortiGate 3701F, FortiGate 401E,
FortiGate 401F, FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E,
FortiGate 601E, FortiGate 601F, FortiGate 61E, FortiGate 61F, FortiGate 71F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 901G, FortiGate 91E, FortiGate VM64, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi
81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000F, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 1100E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E,
FortiGate 200F, FortiGate 2200E, FortiGate 3000F, FortiGate 300E, FortiGate 3200F,
FortiGate 3300E, FortiGate 3400E, FortiGate 3500F, FortiGate 3600E, FortiGate 3700F,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 600F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 70F, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 900G,
FortiGate 90E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 80F 2R.
Option Description
peer If peer-accept is set to one, select the name of one peer string Maximum
to add to this authentication group. The peer must have length: 35
added with the wanopt peer command.
peer-accept Determine if this auth group accepts, any peer, a list of option - any
defined peers, or just one peer.
Option Description
any Accept any peer that can authenticate with this auth group.
defined Accept only the peers added with the wanopt peer command.
one Accept the peer added to this auth group using the peer option.
psk Pre-shared key used by the peers in this authentication password Not
group. Specified
This command is available for model(s): FortiGate 1000D, FortiGate 1001F, FortiGate 101E,
FortiGate 101F, FortiGate 1101E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3001F, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3201F, FortiGate 3301E, FortiGate 3401E,
FortiGate 3501F, FortiGate 3601E, FortiGate 3700D, FortiGate 3701F, FortiGate 401E,
FortiGate 401F, FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E,
FortiGate 601E, FortiGate 601F, FortiGate 61E, FortiGate 61F, FortiGate 71F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 901G, FortiGate 91E, FortiGate VM64, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi
81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000F, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 1100E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E,
FortiGate 200F, FortiGate 2200E, FortiGate 3000F, FortiGate 300E, FortiGate 3200F,
FortiGate 3300E, FortiGate 3400E, FortiGate 3500F, FortiGate 3600E, FortiGate 3700F,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 600F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 70F, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 900G,
FortiGate 90E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 80F 2R.
Option Description
Option Description
device-id Set identifier for this cache device. string Maximum default_
length: 35 dev_id
prefer-scenario Set the preferred cache behavior towards the balance option - balance
between latency and hit-ratio.
Option Description
config dst-peer
config src-peer
This command is available for model(s): FortiGate 1000D, FortiGate 1001F, FortiGate 101E,
FortiGate 101F, FortiGate 1101E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3001F, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3201F, FortiGate 3301E, FortiGate 3401E,
FortiGate 3501F, FortiGate 3601E, FortiGate 3700D, FortiGate 3701F, FortiGate 401E,
FortiGate 401F, FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E,
FortiGate 601E, FortiGate 601F, FortiGate 61E, FortiGate 61F, FortiGate 71F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 901G, FortiGate 91E, FortiGate VM64, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi
81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000F, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 1100E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E,
FortiGate 200F, FortiGate 2200E, FortiGate 3000F, FortiGate 300E, FortiGate 3200F,
FortiGate 3300E, FortiGate 3400E, FortiGate 3500F, FortiGate 3600E, FortiGate 3700F,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 600F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 70F, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 900G,
FortiGate 90E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 80F 2R.
Option Description
host-domain- Suffix portion of the fully qualified domain name. For string Maximum
name-suffix example, fortinet.com in "www.fortinet.com". length: 79
<name> Suffix portion of the fully qualified domain name.
Option Description
Option Description
Option Description
Option Description
Option Description
config rules
name WAN optimization content delivery network rule name. string Maximum
length: 35
Option Description
Option Description
config match-entries
Option Description
pattern Pattern string for matching target (Referrer or URL string Maximum
<string> pattern). For example, a, a*c, *a*, a*c*e, and *. length: 79
Pattern strings.
config skip-entries
Option Description
pattern Pattern string for matching target (Referrer or URL string Maximum
<string> pattern). For example, a, a*c, *a*, a*c*e, and *. length: 79
Pattern strings.
config content-id
Option Description
start-skip Number of characters in URL to skip after start-str has integer Minimum 0
been matched. value: 0
Maximum
value:
4294967295
Option Description
end-skip Number of characters in URL to skip after end-str has integer Minimum 0
been matched. value: 0
Maximum
value:
4294967295
Option Description
range-str Name of content ID within the start string and end string Maximum
string. length: 35
This command is available for model(s): FortiGate 1000D, FortiGate 1001F, FortiGate 101E,
FortiGate 101F, FortiGate 1101E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3001F, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3201F, FortiGate 3301E, FortiGate 3401E,
FortiGate 3501F, FortiGate 3601E, FortiGate 3700D, FortiGate 3701F, FortiGate 401E,
FortiGate 401F, FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E,
FortiGate 601E, FortiGate 601F, FortiGate 61E, FortiGate 61F, FortiGate 71F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 901G, FortiGate 91E, FortiGate VM64, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi
81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000F, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 1100E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E,
FortiGate 200F, FortiGate 2200E, FortiGate 3000F, FortiGate 300E, FortiGate 3200F,
FortiGate 3300E, FortiGate 3400E, FortiGate 3500F, FortiGate 3600E, FortiGate 3700F,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 600F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 70F, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 900G,
FortiGate 90E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 80F 2R.
This command is available for model(s): FortiGate 1000D, FortiGate 1001F, FortiGate 101E,
FortiGate 101F, FortiGate 1101E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3001F, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3201F, FortiGate 3301E, FortiGate 3401E,
FortiGate 3501F, FortiGate 3601E, FortiGate 3700D, FortiGate 3701F, FortiGate 401E,
FortiGate 401F, FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E,
FortiGate 601E, FortiGate 601F, FortiGate 61E, FortiGate 61F, FortiGate 71F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 901G, FortiGate 91E, FortiGate VM64, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi
81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000F, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 1100E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E,
FortiGate 200F, FortiGate 2200E, FortiGate 3000F, FortiGate 300E, FortiGate 3200F,
FortiGate 3300E, FortiGate 3400E, FortiGate 3500F, FortiGate 3600E, FortiGate 3700F,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 600F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 70F, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 900G,
FortiGate 90E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 80F 2R.
Option Description
disable Disable transparent mode. Client packets source addresses are changed to
the source address of the FortiGate internal interface. Similar to source NAT.
config cifs
Option Description
secure-tunnel Enable/disable securing the WAN Opt tunnel using option - disable
SSL. Secure and non-secure tunnels use the same TCP
port (7810).
Option Description
Option Description
prefer- Select dynamic or fixed-size data chunking for WAN option - fix
chunking Optimization.
Option Description
dynamic Select dynamic data chunking to help to detect persistent data chunks in a
changed file or in an embedded unknown protocol.
Option Description
Option Description
private For profiles that accept aggressive protocols such as HTTP and FTP so that
these aggressive protocols do not share tunnels with less-aggressive
protocols.
config ftp
Option Description
secure-tunnel Enable/disable securing the WAN Opt tunnel using option - disable
SSL. Secure and non-secure tunnels use the same TCP
port (7810).
Option Description
Option Description
prefer- Select dynamic or fixed-size data chunking for WAN option - fix
chunking Optimization.
Option Description
dynamic Select dynamic data chunking to help to detect persistent data chunks in a
changed file or in an embedded unknown protocol.
Option Description
Option Description
private For profiles that accept aggressive protocols such as HTTP and FTP so that
these aggressive protocols do not share tunnels with less-aggressive
protocols.
config http
Option Description
secure-tunnel Enable/disable securing the WAN Opt tunnel using option - disable
SSL. Secure and non-secure tunnels use the same TCP
port (7810).
Option Description
Option Description
Option Description
prefer- Select dynamic or fixed-size data chunking for WAN option - fix
chunking Optimization.
Option Description
dynamic Select dynamic data chunking to help to detect persistent data chunks in a
changed file or in an embedded unknown protocol.
Option Description
Option Description
private For profiles that accept aggressive protocols such as HTTP and FTP so that
these aggressive protocols do not share tunnels with less-aggressive
protocols.
Option Description
secure-tunnel Enable/disable securing the WAN Opt tunnel using option - disable
SSL. Secure and non-secure tunnels use the same TCP
port (7810).
Option Description
Option Description
Option Description
private For profiles that accept aggressive protocols such as HTTP and FTP so that
these aggressive protocols do not share tunnels with less-aggressive
protocols.
config tcp
Option Description
secure-tunnel Enable/disable securing the WAN Opt tunnel using option - disable
SSL. Secure and non-secure tunnels use the same TCP
port (7810).
Option Description
Option Description
byte-caching- Select whether TCP byte-caching uses system memory option - mem-only
opt only or both memory and disk space.
Option Description
Option Description
private For profiles that accept aggressive protocols such as HTTP and FTP so that
these aggressive protocols do not share tunnels with less-aggressive
protocols.
port Port numbers or port number ranges for TCP. Only user Not
packets with a destination port number that matches this Specified
port number or range are accepted by this profile.
Option Description
ssl-port Port numbers or port number ranges on which to expect user Not
HTTPS traffic for SSL/TLS offloading. Specified
This command is available for model(s): FortiGate 1000D, FortiGate 1001F, FortiGate 101E,
FortiGate 101F, FortiGate 1101E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3001F, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3201F, FortiGate 3301E, FortiGate 3401E,
FortiGate 3501F, FortiGate 3601E, FortiGate 3700D, FortiGate 3701F, FortiGate 401E,
FortiGate 401F, FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E,
FortiGate 601E, FortiGate 601F, FortiGate 61E, FortiGate 61F, FortiGate 71F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 901G, FortiGate 91E, FortiGate VM64, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi
81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000F, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 1100E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E,
FortiGate 200F, FortiGate 2200E, FortiGate 3000F, FortiGate 300E, FortiGate 3200F,
FortiGate 3300E, FortiGate 3400E, FortiGate 3500F, FortiGate 3600E, FortiGate 3700F,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 600F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 70F, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 900G,
FortiGate 90E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 80F 2R.
local-cache-id ID that this device uses to connect to the remote device. string Maximum
length: 35
remote- ID of the remote device to which the device connects. string Maximum
cache-id length: 35
remote- IP address of the remote device to which the device ipv4- Not 0.0.0.0
cache-ip connects. address- Specified
any
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1001F, FortiGate 101E,
FortiGate 101F, FortiGate 1101E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3001F, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3201F, FortiGate 3301E, FortiGate 3401E,
FortiGate 3501F, FortiGate 3601E, FortiGate 3700D, FortiGate 3701F, FortiGate 401E,
FortiGate 401F, FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E,
FortiGate 601E, FortiGate 601F, FortiGate 61E, FortiGate 61F, FortiGate 71F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 901G, FortiGate 91E, FortiGate VM64, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi
81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000F, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 1100E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E,
FortiGate 200F, FortiGate 2200E, FortiGate 3000F, FortiGate 300E, FortiGate 3200F,
FortiGate 3300E, FortiGate 3400E, FortiGate 3500F, FortiGate 3600E, FortiGate 3700F,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 600F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 70F, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 900G,
FortiGate 90E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 80F 2R.
Option Description
simple Use the same TCP option value in SYN/SYNACK packets. Backward
compatible.
diff-req-resp Use different TCP option values in SYN/SYNACK packets to avoid false
positive detection.
host-id Local host ID (must also be entered in the remote string Maximum default-id
FortiGate's peer list). length: 35
Option Description
balanced Optimize tunnel to balance between system memory usage and throughput.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
This command is available for model(s): FortiGate 1000D, FortiGate 1001F, FortiGate 101E,
FortiGate 101F, FortiGate 1101E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3001F, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3201F, FortiGate 3301E, FortiGate 3401E,
FortiGate 3501F, FortiGate 3601E, FortiGate 3700D, FortiGate 3701F, FortiGate 401E,
FortiGate 401F, FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E,
FortiGate 601E, FortiGate 601F, FortiGate 61E, FortiGate 61F, FortiGate 71F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 901G, FortiGate 91E, FortiGate VM64, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi
81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000F, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 1100E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E,
FortiGate 200F, FortiGate 2200E, FortiGate 3000F, FortiGate 300E, FortiGate 3200F,
FortiGate 3300E, FortiGate 3400E, FortiGate 3500F, FortiGate 3600E, FortiGate 3700F,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 600F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 70F, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 900G,
FortiGate 90E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 80F 2R.
Option Description
Option Description
Option Description
Option Description
default-ttl Default object expiry time. This only applies to those integer Minimum 1440
objects that do not have an expiry time set by the web value: 1
server. Maximum
value:
5256000
Option Description
fresh-factor Frequency that the server is checked to see if any integer Minimum 100
objects have expired. The higher the fresh factor, the value: 1
less often the checks occur. Maximum
value: 100
Option Description
Option Description
Option Description
Option Description
Option Description
max-object- Maximum cacheable object size in kB. All objects that integer Minimum 512000
size exceed this are delivered to the client but not stored in value: 1
the web cache. Maximum
value:
2147483
max-ttl Maximum time an object can stay in the web cache integer Minimum 7200
without checking to see if it has expired on the server. value: 1
Maximum
value:
5256000
min-ttl Minimum time an object can stay in the web cache integer Minimum 5
without checking to see if it has expired on the server. value: 1
Maximum
value:
5256000
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
static Only one server connection exists during the proxy session.
multiplex Established connections are held until the proxy session ends.
http-incoming- Accept incoming HTTP requests on one or more ports. user Not
port Specified
Option Description
incoming-ip Restrict the explicit HTTP proxy to only accept ipv4- Not 0.0.0.0
sessions from this IP address. An interface must have address- Specified
this IP address. any
incoming-ip6 Restrict the explicit web proxy to only accept sessions ipv6- Not ::
from this IPv6 address. An interface must have this address Specified
IPv6 address.
Option Description
Option Description
outgoing-ip Outgoing HTTP requests will have this IP address as ipv4- Not
their source address. An interface must have this IP address- Specified
address. any
outgoing-ip6 Outgoing HTTP requests will leave this IPv6. Multiple ipv6- Not
interfaces can be specified. Interfaces must have address Specified
these IPv6 addresses.
pac-file-server- Port number that PAC traffic from client web browsers user Not
port uses to connect to the explicit web proxy. Specified
Option Description
Option Description
pref-dns-result Prefer resolving addresses using the configured IPv4 option - ipv4
or IPv6 DNS server.
Option Description
realm Authentication realm used to identify the explicit web string Maximum default
proxy (maximum of 63 characters). length: 63
sec-default- Accept or deny explicit web proxy sessions when no option - deny
action web proxy firewall policy exists.
Option Description
accept Accept requests. All explicit web proxy traffic is accepted whether there is an
explicit web proxy policy or not.
deny Deny requests unless there is a matching explicit web proxy policy.
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
status Enable/disable the explicit Web proxy for HTTP and option - disable
HTTPS session.
Option Description
Option Description
Option Description
unknown-http- How to handle HTTP sessions that do not comply with option - reject
version HTTP 0.9, 1.0, or 1.1.
Option Description
reject Reject or tear down HTTP sessions that do not use HTTP 0.9, 1.0, or 1.1.
best-effort Assume all HTTP sessions comply with HTTP 0.9, 1.0, or 1.1. If a session
uses a different HTTP version, it may not parse correctly and the connection
may be lost.
config pac-policy
Option Description
Configure a forward server group consisting or multiple forward servers. Supports failover and load balancing.
config web-proxy forward-server-group
Description: Configure a forward server group consisting or multiple forward servers.
Supports failover and load balancing.
edit <name>
set affinity [enable|disable]
set group-down-option [block|pass]
set ldb-method [weighted|least-session|...]
config server-list
Description: Add web forward servers to a list to form a server group.
Optionally assign weights to each server.
edit <name>
set weight {integer}
next
end
next
end
Option Description
group-down- Action to take when all of the servers in the forward option - block
option server group are down: block sessions until at least one
server is back up or pass sessions to their destination.
Option Description
block Block sessions until at least one server in the group is back up.
pass Pass sessions to their destination bypassing servers in the forward server
group.
Option Description
weighted Load balance traffic to forward servers based on assigned weights. Weights
are ratios of total number of sessions.
least-session Send new sessions to the server with lowest session count.
active-passive Send new sessions to the next active server in the list. Servers are selected
with highest weight first and then in order as they are configured. Traffic
switches back to the first server upon failure recovery.
config server-list
weight Optionally assign a weight of the forwarding server for integer Minimum 10
weighted load balancing. value: 1
Maximum
value: 100
Option Description
Option Description
monitor URL for forward server health check string Maximum http://www.google.com
monitoring. length: 255
port Port number that the forwarding server integer Minimum 3128
expects to receive HTTP sessions on. value: 1
Maximum
value:
65535
Option Description
fast-policy- Enable/disable fast matching algorithm for explicit and option - enable
match transparent proxy policy.
Option Description
Option Description
forward- Period of time before the source IP's traffic is no integer Minimum 30
server- longer assigned to the forwarding server. value: 6
affinity- Maximum
timeout value: 60
ldap-user- Enable/disable LDAP user cache for explicit and option - disable
cache transparent proxy user.
Option Description
Option Description
Option Description
learn-client- IPv6 Source address name (srcaddr or srcaddr6 must string Maximum
ip-srcaddr6 be set). length: 79
<name> Address name.
Option Description
Option Description
enable Enable deep inspection for application level category policy matching.
disable Disable deep inspection for application level category policy matching.
proxy-fqdn Fully Qualified Domain Name to connect to the explicit string Maximum default.fqdn
web proxy. length: 255
strict-web- Enable/disable strict web checking to block web sites option - disable
check that send incorrect headers that don't conform to
HTTP 1.1.
Option Description
webproxy- Name of the web proxy profile to apply when explicit string Maximum
profile proxy traffic is allowed by default and traffic is length: 63
accepted that does not match an explicit proxy policy.
Option Description
Option Description
header-via- Action to take on the HTTP via header in forwarded option - pass
request requests: forwards (pass), adds, or removes the
HTTP header.
Option Description
header-via- Action to take on the HTTP via header in forwarded option - pass
response responses: forwards (pass), adds, or removes the
HTTP header.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config headers
dstaddr6 Destination address and address group names (IPv6). string Maximum
<name> Address name. length: 79
Option Description
Option Description
Option Description
Option Description
append Append content to existing HTTP header or create new header if HTTP
header is not found.
new-on-not- Create new header only if existing HTTP header is not found.
found
new Create new header regardless if existing HTTP header is found or not.
Option Description
Option Description
status Enable/disable exempting the URLs matching the URL option - enable
pattern from web proxy forwarding and caching.
Option Description
url-pattern URL pattern to be exempted from web proxy forwarding string Maximum
and caching. length: 511
timeout Period of time before WISP requests time out. integer Minimum 5
value: 1
Maximum
value: 15
config entries
Option Description
category Categories that this content type applies to. user Not all
Specified
config entries
pattern-type Banned word pattern type: wildcard pattern or Perl option - wildcard
regular expression.
Option Description
Option Description
Option Description
western Western.
japanese Japanese.
korean Korean.
Option Description
french French.
thai Thai.
spanish Spanish.
cyrillic Cyrillic.
score Score, to be applied every time the word appears on a integer Minimum 10
web page. value: 0
Maximum
value:
4294967295
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ovrd-auth- Port to use for FortiGuard Web Filter HTTP override integer Minimum 8008
port-http authentication. value: 0
Maximum
value:
65535
ovrd-auth- Port to use for FortiGuard Web Filter HTTPS override integer Minimum 8010
port-https authentication in proxy mode. value: 0
Maximum
value:
65535
ovrd-auth- Port to use for FortiGuard Web Filter HTTPS override integer Minimum 8015
port-https- authentication in flow mode. value: 0
flow Maximum
value:
65535
ovrd-auth- Port to use for FortiGuard Web Filter Warning override integer Minimum 8020
port-warning authentication. value: 0
Maximum
value:
65535
request- Limit size of URL request packets sent to FortiGuard integer Minimum 0
packet-size- server. value: 576
limit Maximum
value:
10000
Option Description
Option Description
Option Description
dns-retry- Retry interval. Refresh DNS faster than TTL to capture integer Minimum 0
interval multiple IPs for hosts. 0 means use DNS server's TTL value: 0
only. Maximum
value:
2147483
extended-ttl Extend time to live beyond reported by DNS. Use of 0 integer Minimum 0
means use DNS server's TTL. value: 0
Maximum
value:
2147483
geo-filter Filter based on geographical location. Route will NOT var-string Maximum
be installed if the resolved IP address belongs to the length: 255
country in the filter.
geo-filter Filter based on geographical location. Route will NOT var-string Maximum
be installed if the resolved IPv6 address belongs to the length: 255
country in the filter.
expires Override expiration date and time, from 5 minutes to user Not Specified 1969/12/31
365 from now (format: yyyy/mm/dd hh:mm:ss). 16:00:00
ip IPv4 address which the override applies. ipv4- Not Specified 0.0.0.0
address
ip6 IPv6 address which the override applies. ipv6- Not Specified ::
address
new-profile Name of the new web filter profile used by the string Maximum
override. length: 35
old-profile Name of the web filter profile which the override string Maximum
applies. length: 35
scope Override either the specific user, user group, IPv4 option - user
address, or IPv6 address.
Option Description
Option Description
user Name of the user which the override applies. string Maximum
length: 64
user-group Specify the user group for which the override string Maximum
applies. length: 63
Option Description
Option Description
Option Description
Option Description
Option Description
js JS block.
Option Description
Option Description
Option Description
Option Description
web-extended- Enable/disable extended any filter action logging for option - disable
all-action-log web filtering.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config antiphish
Option Description
Option Description
Option Description
enable Enable checking of GET URI for username and password fields.
disable Disable checking of GET URI for username and password fields.
Option Description
enable Enable checking of HTTP Basic Auth field for known credentials.
disable Disable checking of HTTP Basic Auth field for known credentials.
Option Description
max-body-len Maximum size of a POST body to check for integer Minimum 65536
credentials. value: 0
Maximum
value:
4294967295
Option Description
config inspection-entries
Option Description
config custom-patterns
Option Description
type Pattern will be treated either as a regex pattern or literal option - regex
string.
Option Description
config ftgd-wf
Option Description
max-quota- Maximum FortiGuard quota used by single page view in integer Minimum 300
timeout seconds (excludes streams). value: 1
Maximum
value:
86400
Option Description
Option Description
Option Description
config filters
Option Description
Option Description
Option Description
Option Description
config quota
Option Description
Option Description
B Quota in bytes.
KB Quota in kilobytes.
MB Quota in megabytes.
GB Quota in gigabytes.
config override
Option Description
Option Description
Option Description
Option Description
profile- Profile attribute to retrieve from the RADIUS server. option - Login-LAT-
attribute Service
Option Description
Option Description
ovrd-user- User groups with permission to use the override. string Maximum
group User group name. length: 79
<name>
profile Web filter profile with permission to create overrides. string Maximum
<name> Web profile. length: 79
config web
Option Description
Option Description
Option Description
Option Description
vimeo-restrict Set Vimeo-restrict ("7" = don't show mature content, string Maximum
"134" = don't show unrated and mature content). A length: 63
value of cookie "content_rating".
Option Description
Option Description
query Code used to prefix a query (must end with an equals string Maximum
character). length: 15
safesearch Safe search method. You can disable safe search, add option - disable
the safe search string to URLs, or insert a safe search
header.
Option Description
Option Description
safesearch-str Safe search parameter used in the URL in URL mode. string Maximum
In translate mode, it provides either the regex to length: 255
translate the URL or the special case to translate the
URL.
Option Description
Option Description
one-arm-ips- Enable/disable DNS resolver for one-arm IPS URL option - disable
urlfilter filter operation.
Option Description
enable Enable DNS resolver for one-arm IPS URL filter operation.
disable Disable DNS resolver for one-arm IPS URL filter operation.
config entries
Option Description
Option Description
Option Description
Option Description
exempt If action is set to exempt, select the security profile option - av web-
operations that exempt URLs skip. Separate multiple content
options with a space. activex-
java-cookie
dlp
fortiguard
range-block
antiphish all
Option Description
av AntiVirus scanning.
Option Description
dns-address- Resolve IPv4 address, IPv6 address, or both from option - ipv4
family DNS server.
Option Description
both Resolve both IPv4 and IPv6 addresses from DNS server.
Option Description
config layer3-ipv6-rules
srcaddr Source IPv6 address (any | local-LAN | IPv6 address user Not
[/prefix length]), default = any. Specified
Option Description
Option Description
ac-ip IP address of the validation controller that AP must be ipv4- Not 0.0.0.0
able to join after applying AP local configuration. address Specified
ac-port Port of the validation controller that AP must be able to integer Minimum 0
join after applying AP local configuration. value: 1024
Maximum
value:
49150
ac-timer Maximum waiting time for the AP to join the validation integer Minimum 10
controller after applying AP local configuration. value: 3
Maximum
value: 30
Option Description
default This controller is the one and only controller that the AP could join after
applying AP local configuration.
specify Specified controller is the one and only controller that the AP could join after
applying AP local configuration.
Option Description
Option Description
darrp- Time for running Dynamic Automatic Radio Resource integer Minimum 86400
optimize Provisioning. value: 0
Maximum
value:
86400
darrp- Firewall schedules for DARRP running time. DARRP string Maximum
optimize- will run periodically based on darrp-optimize within the length: 35
schedules schedules. Separate multiple schedule names with a
<name> space.
Schedule name.
Option Description
Option Description
monitor- Period in seconds to measure average transmit retries integer Minimum 300
period and receive errors. value: 0
Maximum
value:
65535
Option Description
selection- Period in seconds to measure average channel load, integer Minimum 3600
period noise floor, spectral RSSI. value: 0
Maximum
value:
65535
threshold- Threshold in dBm to reject channel in DARRP channel string Maximum -85
noise-floor selection phase 1 due to noise floor. length: 7
threshold- Threshold in dBm to reject channel in DARRP channel string Maximum -65
spectral-rssi selection phase 1 due to spectral RSSI. length: 7
threshold-tx- Threshold in percentage for transmit retries to trigger integer Minimum 300
retries channel reselection in DARRP monitor stage. value: 0
Maximum
value: 1000
weight- Weight in DARRP channel score calculation for channel integer Minimum 20
channel-load load. value: 0
Maximum
value: 2000
weight-dfs- Weight in DARRP channel score calculation for DFS integer Minimum 0
channel channel. value: 0
Maximum
value: 2000
weight-noise- Weight in DARRP channel score calculation for noise integer Minimum 40
floor floor. value: 0
Maximum
value: 2000
weight-rogue- Weight in DARRP channel score calculation for rogue integer Minimum 10
ap APs. value: 0
Maximum
value: 2000
weight- Weight in DARRP channel score calculation for spectral integer Minimum 40
spectral-rssi RSSI. value: 0
Maximum
value: 2000
weight- Weight in DARRP channel score calculation for weather integer Minimum 0
weather- channel. value: 0
channel Maximum
value: 2000
Option Description
Option Description
Option Description
Configure Bonjour profiles. Bonjour is Apple's zero configuration networking protocol. Bonjour profiles allow APs and
FortiAPs to connnect to networks using Bonjour.
config wireless-controller bonjour-profile
Description: Configure Bonjour profiles. Bonjour is Apple's zero configuration
networking protocol. Bonjour profiles allow APs and FortiAPs to connnect to networks using
Bonjour.
edit <name>
set comment {string}
config policy-list
Description: Bonjour policy list.
edit <policy-id>
set description {string}
set from-vlan {string}
set to-vlan {string}
set services {option1}, {option2}, ...
next
end
next
end
config policy-list
from-vlan VLAN ID from which the Bonjour service is advertised. string Maximum 0
length: 63
to-vlan VLAN ID to which the Bonjour service is made available. string Maximum all
length: 63
services Bonjour services for the VLAN connecting to the option - all
Bonjour network.
Option Description
airplay AirPlay.
bit-torrent BitTorrent.
ftp FTP.
ichat iChat.
itunes iTunes.
printers Printers.
samba Samba.
scanners Scanners.
ssh SSH.
chromecast ChromeCast.
acd-process- Configure the number cw_acd daemons for multi- integer Minimum 0
count core CPU support. value: 0
Maximum
value: 255
Option Description
ap-log-server- IP address that FortiGate or FortiAPs send log ipv4- Not Specified 0.0.0.0
ip messages to. address
ap-log-server- Port that FortiGate or FortiAPs send log messages integer Minimum 0
port to. value: 0
Maximum
value: 65535
Option Description
Option Description
disable Use 802.3 Ethernet frames with 802.3 data tunnel mode.
Option Description
fiapp-eth-type Ethernet type for Fortinet Inter-Access Point integer Minimum 5252
Protocol. value: 0
Maximum
value: 65535
Option Description
ipsec-base-ip Base IP address for IPsec VPN tunnels between ipv4- Not Specified 169.254.0.1
the access points and the wireless controller. address
Option Description
nac-interval Interval in seconds between two WiFi network integer Minimum 120
access control. value: 10
Maximum
value: 600
Option Description
Option Description
config mcc-mnc-list
Option Description
Option Description
port-restricted- Port-restricted IPv4 address and single NATed IPv4 address available.
and-single-
NATed
port-restricted- Port-restricted IPv4 address and double NATed IPv4 address available.
and-double-
NATed
Option Description
config nai-list
Option Description
config eap-method
Option Description
eap-identity Identity.
eap-md5 MD5.
Option Description
eap-tls TLS.
eap-ttls TTLS.
eap-peap PEAP.
eap-sim SIM.
eap-aka AKA.
eap-aka-prime AKA'.
config auth-param
Option Description
Option Description
Option Description
Option Description
config oi-list
config value-list
config aoc-list
Option Description
config plan-info
esp-port Set ESP port service (used by IPsec VPNs) status. option - unknown
Option Description
Option Description
Option Description
Option Description
ikev2-port Set IKEv2 port service for IPsec VPN status. option - unknown
Option Description
Option Description
ikev2-xx-port Set UDP port 4500 (which may be used by IKEv2 for option - unknown
IPsec VPN) service status.
Option Description
pptp-vpn-port Set Point to Point Tunneling Protocol (PPTP) VPN port option - unknown
service status.
Option Description
Option Description
tls-port Set TLS VPN (HTTPS) port service status. option - unknown
Option Description
Option Description
Option Description
config nai-list
Option Description
reserved Reserved.
config service-description
Option Description
Option Description
up Link up.
Option Description
symmetric Symmetric WAN link (uplink and downlink speeds are the same).
asymmetric Asymmetric WAN link (uplink and downlink speeds are not the same).