FortiOS 7.2.1 CLI Reference
FortiOS 7.2.1 CLI Reference
FortiOS 7.2.1
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
NSE INSTITUTE
https://training.fortinet.com
FORTIGUARD CENTER
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
August 4, 2022
FortiOS 7.2.1 CLI Reference
01-721-791773-20220804
TABLE OF CONTENTS
Change Log 18
FortiOS CLI reference 19
Creation of the CLI reference 19
Availability of commands and options 19
Command tree 20
CLI configuration commands 21
alertemail 22
config alertemail setting 22
antivirus 29
config antivirus settings 29
config antivirus quarantine 30
config antivirus profile 35
application 66
config application name 66
config application custom 68
config application rule-settings 69
config application list 69
config application group 77
authentication 79
config authentication scheme 79
config authentication rule 81
config authentication setting 83
automation 87
config automation setting 87
certificate 88
config certificate ca 88
config certificate remote 89
config certificate local 90
config certificate crl 94
dlp 96
config dlp data-type 96
config dlp dictionary 97
config dlp sensor 98
config dlp filepattern 100
config dlp sensitivity 102
config dlp profile 103
dnsfilter 108
config dnsfilter domain-filter 108
config dnsfilter profile 109
emailfilter 114
config emailfilter bword 114
config emailfilter block-allow-list 116
config emailfilter mheader 118
config emailfilter dnsbl 119
This document describes FortiOS 7.2.1 CLI commands used to configure and manage a FortiGate unit from the
command line interface (CLI). For information on using the CLI, see the FortiOS 7.2.1 Administration Guide, which
contains information such as:
l Connecting to the CLI
l CLI basics
l Command syntax
l Subcommands
l Permissions
The CLI syntax is created by processing the schema from FortiGate models running FortiOS 7.2.1 and reformatting the
resultant CLI output. The following reference models were used to create this CLI reference:
l FGT_140E_POE: a POE model with 40 x GE RJ45 (including 24 x RJ45 GE POE/POE+ ports, 14 x switch ports, 1 x
MGMT port, 1x HA port, 2 x WAN ports), 2 x GE SFP DMZ slots.
l FWF_61F: a WiFi/desktop model with 10x GE RJ45 ports (including 7x Internal Ports, 2x WAN Ports, 1x DMZ Port),
Wireless (802.11 a/b/g/n/ac-W2), 128GB SSD onboard storage.
l FGT_601E: a mid-range model with 2x 240GB SSD storage, NP6 and CP9 acceleration, 2x 10GE SFP+ slots, 8x
GE SFP slots and 10x GE RJ45 ports.
l FGT_2201E: a high-end model with 2x 1TB SSD storage, NP6 and CP9 acceleration, dual AC power supplies, 4x
40GE QSFP+ slots, 20x 10GE SFP+ slots and 14x GE RJ45 ports.
l FGT_VM64: a Virtual Machine model running on VMware ESXi.
If you have comments on this content, its format, or requests for commands that are not included, contact us at
[email protected].
Some FortiOS CLI commands and options are not available on all FortiGate units. The CLI displays an error message if
you attempt to enter a command or option that is not available. You can use the question mark ‘?’ to verify the commands
and options that are available.
Commands and options may not be available for the following reasons:
FortiGate model
All commands are not available on all FortiGate models. For example, a hardware switch can be configured only on
models which have the corresponding hardware switch chipset.
Hardware configuration
For example, settings like mediatype would only be available on units with SFPs.
Commands for extended functionality are not available on all FortiGate models. The CLI Reference may not include all
commands.
Command tree
Enter tree to display the entire FortiOS CLI command tree. To capture the full output, connect to your device using a
terminal emulation program, such as PuTTY, and capture the output to a log file.
l To view all available commands, enter tree.
l To view a specific configuration branch of a tree, enter tree <branch>, for example: tree system.
l To view all available diagnose commands, enter tree diagnose.
l To view all available execute commands, enter tree execute.
Use configuration commands to configure and manage a FortiGate unit from the command line interface (CLI).
The CLI syntax is created by processing the schema from FortiGate models running FortiOS 7.2.1 and reformatting the
resultant CLI output. The following reference models were used to create this CLI reference:
l FGT_140E_POE: a POE model with 40 x GE RJ45 (including 24 x RJ45 GE POE/POE+ ports, 14 x switch ports, 1 x
MGMT port, 1x HA port, 2 x WAN ports), 2 x GE SFP DMZ slots.
l FWF_61F: a WiFi/desktop model with 10x GE RJ45 ports (including 7x Internal Ports, 2x WAN Ports, 1x DMZ Port),
Wireless (802.11 a/b/g/n/ac-W2), 128GB SSD onboard storage.
l FGT_601E: a mid-range model with 2x 240GB SSD storage, NP6 and CP9 acceleration, 2x 10GE SFP+ slots, 8x
GE SFP slots and 10x GE RJ45 ports.
l FGT_2201E: a high-end model with 2x 1TB SSD storage, NP6 and CP9 acceleration, dual AC power supplies, 4x
40GE QSFP+ slots, 20x 10GE SFP+ slots and 14x GE RJ45 ports.
l FGT_VM64: a Virtual Machine model running on VMware ESXi.
The command branches are in alphabetical order. The commands beneath each branch are
not in alphabetical order.
If you have comments on this content, its format, or requests for commands that are not included, contact us at
[email protected].
username Name that appears in the From: field of alert emails string Not
(max. 63 characters). Specified
mailto2 Optional second email address to send alert email to string Not
(max. 63 characters). Specified
mailto3 Optional third email address to send alert email to string Not
(max. 63 characters). Specified
filter-mode How to filter log messages that are sent to alert option - category
emails.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable Fortinet Advanced Mezzanine Card (AMC) interface bypass mode
logs in alert email.
disable Disable Fortinet Advanced Mezzanine Card (AMC) interface bypass mode
logs in alert email.
FIPS-CC-errors Enable/disable FIPS and Common Criteria error logs option - disable
in alert email.
Option Description
enable Enable FIPS and Common Criteria error logs in alert email.
disable Disable FIPS and Common Criteria error logs in alert email.
Option Description
Option Description
local-disk-usage Disk usage percentage at which to send alert email . integer Minimum 75
value: 1
Maximum
value: 99
Option Description
Option Description
Option Description
monitor Enable machine learning based malware detection for monitoring only.
Option Description
Option Description
override- Override the large file scan timeout value in seconds . integer Minimum 0
timeout Zero is the default value and is used to disable this value: 30
command. When disabled, the daemon adjusts the Maximum
large file scan timeout based on the file size. value: 3600
Option Description
quarantine- The amount of disk space to reserve for quarantining integer Minimum 0
quota files . value: 0
Maximum
value:
4294967295
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
https HTTPS.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
store-infected Quarantine infected files found in sessions using the option - imap smtp
selected protocols. pop3 http
ftp nntp
imaps
smtps
pop3s
https ftps
mapi cifs
ssh
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
https HTTPS.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
ftps FTPS.
mapi MAPI.
Option Description
cifs CIFS.
ssh SSH.
store-blocked Quarantine blocked files found in sessions using the option - imap smtp
selected protocols. pop3 http
ftp nntp
imaps
smtps
pop3s ftps
mapi cifs
ssh
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
Option Description
imap IMAP.
smtp SMTP.
Option Description
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
https HTTPS.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
store- Quarantine files detected by machine learning found in option - imap smtp
machine- sessions using the selected protocols. pop3 http
learning ftp nntp
imaps
smtps
pop3s
https ftps
mapi cifs
ssh
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
Option Description
https HTTPS.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
lowspace Select the method for handling additional files when option - ovrw-old
running low on disk space.
Option Description
ovrw-old Overwrite the oldest quarantined files. That is, the files that are closest to
being deleted from the quarantine.
Option Description
FortiAnalyzer FortiAnalyzer
replacemsg- Replacement message group customized for this string Not Specified
group profile.
Option Description
Option Description
analytics- FortiSandbox post-transfer scan: submit supported files and known infected
everything files.
analytics- Do not submit files matching this DLP file-pattern to integer Minimum 0
ignore-filetype FortiSandbox (post-transfer scan only). value: 0
Maximum
value:
4294967295
analytics- Only submit files matching this DLP file-pattern to integer Minimum 0
accept-filetype FortiSandbox (post-transfer scan only). value: 0
Maximum
value:
4294967295
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable use of EMS threat feed when performing AntiVirus scan.
enable Enable use of EMS threat feed when performing AntiVirus scan.
Option Description
Option Description
Option Description
log-only Log FortiSandbox inline scan error, but allow the file.
Option Description
log-only Log FortiSandbox inline scan timeout, but allow the file.
Option Description
Option Description
Option Description
Option Description
legacy Scan archive files only after the entire file is received.
config http
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
Option Description
unknown- Configure the action the FortiGate unit will take on option - block
content- unknown content-encoding.
encoding
Option Description
inspect Inspect HTTP traffic as plain-text with AV scan when unknown content-
encoding is detected.
Option Description
disable Disable Content Disarm and Reconstruction when performing AntiVirus scan.
enable Enable Content Disarm and Reconstruction when performing AntiVirus scan.
config ftp
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
config imap
Option Description
disable Disable.
Option Description
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
executables Treat Windows executable files as viruses for the option - default
purpose of blocking or monitoring.
Option Description
Option Description
disable Disable Content Disarm and Reconstruction when performing AntiVirus scan.
enable Enable Content Disarm and Reconstruction when performing AntiVirus scan.
config pop3
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
executables Treat Windows executable files as viruses for the option - default
purpose of blocking or monitoring.
Option Description
Option Description
disable Disable Content Disarm and Reconstruction when performing AntiVirus scan.
enable Enable Content Disarm and Reconstruction when performing AntiVirus scan.
config smtp
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
executables Treat Windows executable files as viruses for the option - default
purpose of blocking or monitoring.
Option Description
Option Description
disable Disable Content Disarm and Reconstruction when performing AntiVirus scan.
enable Enable Content Disarm and Reconstruction when performing AntiVirus scan.
config mapi
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
executables Treat Windows executable files as viruses for the option - default
purpose of blocking or monitoring.
Option Description
config nntp
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
config cifs
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
config ssh
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
config nac-quar
Option Description
quar-src-ip Quarantine all traffic from the infected hosts source IP.
Option Description
config content-disarm
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
cover-page Enable/disable inserting a cover page into the disarmed option - enable
document.
Option Description
detect-only Enable/disable only detect disarmable files, do not alter option - disable
content.
Option Description
config parameters
signature The text that makes up the actual custom application var-string Not Specified
signature.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable forced inclusion of signatures which normally require SSL deep
inspection.
enable Enable forced inclusion of signatures which normally require SSL deep
inspection.
Option Description
Option Description
Option Description
skype Skype.
edonkey Edonkey.
Option Description
Option Description
Option Description
Option Description
config entries
risk <level> Risk, or impact, of allowing traffic from this integer Minimum
application to occur (1 - 5; Low, Elevated, Medium, value: 0
High, and Critical). Maximum
Risk, or impact, of allowing traffic from this value:
application to occur (1 - 5; Low, Elevated, Medium, 4294967295
High, and Critical).
Option Description
1 Popularity level 1.
2 Popularity level 2.
3 Popularity level 3.
4 Popularity level 4.
5 Popularity level 5.
action Pass or block traffic, or reset connection for traffic option - block
from this application.
Option Description
Option Description
Option Description
Option Description
Option Description
none none
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
config members
config default-network-services
Option Description
http HTTP.
ssh SSH.
telnet TELNET.
ftp FTP.
dns DNS.
smtp SMTP.
pop3 POP3.
imap IMAP.
snmp SNMP.
nntp NNTP.
https HTTPS.
violation- Action for protocols not in the allowlist for selected port. option - block
action
Option Description
Option Description
risk <level> Risk, or impact, of allowing traffic from this integer Minimum
application to occur (1 - 5; Low, Elevated, Medium, value: 0
High, and Critical). Maximum
Risk, or impact, of allowing traffic from this value:
application to occur (1 - 5; Low, Elevated, Medium, 4294967295
High, and Critical).
Option Description
1 Popularity level 1.
2 Popularity level 2.
3 Popularity level 3.
4 Popularity level 4.
5 Popularity level 5.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
srcaddr Authentication is required for the selected IPv4 source string Maximum
<name> address. length: 79
Address name.
srcaddr6 Authentication is required for the selected IPv6 source string Maximum
<name> address. length: 79
Address name.
Option Description
Option Description
Option Description
web-portal Enable/disable web portal for proxy transparent policy . option - enable
Option Description
Option Description
Option Description
cookie-max- Persistent web portal cookie maximum age in minutes . integer Minimum 480
age value: 30
Maximum
value:
10080
cookie- Refresh rate divider of persistent web portal cookie . integer Minimum 2
refresh-div Refresh value = cookie-max-age/cookie-refresh-div. value: 2
Maximum
value: 4
Option Description
Option Description
Option Description
dev-range Address range for the IP based device query. string Maximum
<name> Address name. length: 79
max- Maximum number of automation stitches that are integer Minimum 256 **
concurrent- allowed to run concurrently. value: 32
stitches Maximum
value: 512
**
config certificate ca
CA certificate.
config certificate ca
Description: CA certificate.
edit <name>
set ca {user}
set range [global|vdom]
set source [factory|user|...]
set ssl-inspection-trusted [enable|disable]
set scep-url {string}
set auto-update-days {integer}
set auto-update-days-warning {integer}
set source-ip {ipv4-address}
set ca-identifier {string}
set obsolete [disable|enable]
next
end
config certificate ca
range Either global or VDOM IP address range for the CA option - global
certificate.
Option Description
Option Description
Option Description
source-ip Source IP address for communications to the SCEP ipv4- Not Specified 0.0.0.0
server. address
Option Description
disable Alive.
enable Obsolete.
range Either the global or VDOM IP address range for the option - global
remote certificate.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
renewal Renewal.
acme-ca-url The URL for the ACME CA string Not Specified https://acme-
server . v02.api.letsencrypt.org/directory
range Either global or VDOM IP address range for the option - global
certificate.
Option Description
Option Description
ldap-server LDAP server name for CRL auto-update. string Not Specified
http-url HTTP server URL for CRL auto-update. string Not Specified
scep-url SCEP server URL for CRL auto-update. string Not Specified
scep-cert Local certificate for SCEP communication for CRL string Not Specified Fortinet_
auto-update. CA_SSL
update- Time in seconds before the FortiGate checks for an integer Minimum 0
interval updated CRL. Set to 0 to update only when it expires. value: 0
Maximum
value:
4294967295
source-ip Source IP address for communications to a HTTP or ipv4- Not Specified 0.0.0.0
SCEP CA server. address
pattern Regular expression pattern string without look around. string Not
Specified
verify Regular expression pattern string used to verify the string Not
data type. Specified
Option Description
Option Description
config entries
Option Description
Option Description
Option Description
Option Description
config entries
Option Description
name Name of table containing the file pattern list. string Not
Specified
config entries
Option Description
Option Description
Option Description
xz Match xz files.
msoffice Match MS-Office files. For example, doc, xls, ppt, and so on.
msofficex Match MS-Office XML files. For example, docx, xlsx, pptx, and so on.
Option Description
rm Match rm files.
Create self-explanatory DLP sensitivity levels to be used when setting sensitivity under config fp-doc-source.
config dlp sensitivity
Description: Create self-explanatory DLP sensitivity levels to be used when setting
sensitivity under config fp-doc-source.
Option Description
Option Description
replacemsg- Replacement message group used by this DLP profile. string Not
group Specified
Option Description
Option Description
Option Description
Option Description
smtp SMTP.
pop3 POP3.
imap IMAP.
ftp FTP.
nntp NNTP.
mapi MAPI.
Option Description
cifs CIFS.
Option Description
smtp SMTP.
pop3 POP3.
imap IMAP.
ftp FTP.
nntp NNTP.
mapi MAPI.
cifs CIFS.
config rule
severity Select the severity or threat level that matches this option - medium
filter.
Option Description
info Informational.
low Low.
medium Medium.
high High.
critical Critical.
type Select whether to check the content of messages (an option - file
email message) or files (downloaded files or email
attachments).
Option Description
Option Description
smtp SMTP.
pop3 POP3.
imap IMAP.
ftp FTP.
nntp NNTP.
mapi MAPI.
cifs CIFS.
Option Description
file-type Select the number of a DLP file pattern table to integer Minimum 0
match. value: 0
Maximum
value:
4294967295
Option Description
action Action to take with content that this DLP profile option - allow
matches.
Option Description
allow Allow the content to pass through the FortiGate and do not create a log
message.
log-only Allow the content to pass through the FortiGate, but write a log message.
quarantine-ip Quarantine all traffic from the IP address and write a log message.
expiry Quarantine duration in days, hours, minutes (format = user Not Specified 5m
dddhhmm).
config entries
Option Description
Option Description
allow Allow DNS requests matching the domain filter without logging.
monitor Allow DNS requests matching the domain filter with logging.
Option Description
Option Description
Option Description
Option Description
Option Description
redirect-portal IPv4 address of the SDNS redirect portal. ipv4- Not 0.0.0.0
address Specified
Option Description
Option Description
youtube- Set safe search for YouTube restriction level. option - strict
restrict
Option Description
config ftgd-dns
Option Description
config filters
action Action to take for DNS requests matching the category. option - monitor
Option Description
monitor Allow DNS requests matching the category and log the result.
log Enable/disable DNS filter logging for this DNS profile. option - enable
Option Description
Option Description
src IPv4 address or subnet on the internal network to ipv4- Not 0.0.0.0
compare with the resolved address in DNS query address Specified
replies. If the resolved address matches, the
resolved address is substituted with dst.
dst IPv4 address or subnet on the external network ipv4- Not 0.0.0.0
to substitute for the resolved address in DNS address Specified
query replies. Can be single IP address or
subnet on the external network, but number of
addresses must equal number of mapped IP
addresses in src.
netmask If src and dst are subnets rather than single IP ipv4- Not 255.255.255.255
addresses, enter the netmask for both src and netmask Specified
dst.
Option Description
prefix If src6 and dst6 are subnets rather than single IP integer Minimum 128
addresses, enter the prefix for both src6 and dst6 value: 1
. Maximum
value: 128
Option Description
Option Description
Option Description
Option Description
Option Description
western Western.
japanese Japanese.
korean Korean.
french French.
Option Description
thai Thai.
spanish Spanish.
Option Description
Option Description
ip By IP address.
Option Description
Option Description
Option Description
config entries
Option Description
Option Description
Option Description
config entries
Option Description
Option Description
Option Description
Option Description
ip4-subnet IPv4 network address or network address/subnet mask ipv4- Not 0.0.0.0
bits. classnet Specified 0.0.0.0
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config imap
Option Description
Option Description
Option Description
tag-msg Subject text or header added to spam email. string Not Spam
Specified
config pop3
Option Description
Option Description
Option Description
tag-msg Subject text or header added to spam email. string Not Spam
Specified
config smtp
Option Description
Option Description
Option Description
tag-msg Subject text or header added to spam email. string Not Spam
Specified
Option Description
disable Disable SMTP email header IP checks for spamfsip, spamrbl, and spambal
filters.
enable Enable SMTP email header IP checks for spamfsip, spamrbl, and spambal
filters.
Option Description
config mapi
Option Description
Option Description
config msn-hotmail
Option Description
Option Description
config gmail
Option Description
config other-webmails
Option Description
Option Description
Option Description
Option Description
Option Description
mismatched- FortiClient EMS entry dirty because EMS SN is mismatched with configured
ems-sn SN.
Option Description
https-port FortiClient EMS HTTPS access port number. . integer Minimum 443
value: 1
Maximum
value:
65535
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
fabric-auth Allow this FortiGate unit to load the authentication page provided by EMS to
authenticate itself with EMS.
Option Description
websocket Enable/disable websockets for this FortiGate unit. Override behavior using
websocket-override.
websocket- Allow this FortiGate unit to request malware hash notifications over
malware websocket.
common-tags- Can recieve tag information from New Common Tags API from EMS.
api
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
generic Compatible with any SIM. Assigned if no other dataplan matches the chosen
SIM.
Option Description
Option Description
none No authentication.
pap PAP.
chap CHAP.
Option Description
signal- Signal threshold. Specify the range between 50 - 100, integer Minimum 100
threshold where 50/100 means -50/-100 dBm. value: 50
Maximum
value: 100
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
yes Change the managed extender's administrator password. Use the login-
password option to set the password.
default Keep the managed extender's administrator password set to the factory
default.
login- Set the managed extender's administrator password. password Not Specified
password
Option Description
bandwidth- FortiExtender LAN extension bandwidth limit (Mbps). integer Minimum 1024
limit value: 1
Maximum
value:
16776000
config controller-report
Option Description
config sms-notification
Option Description
config alert
system- Display string when system rebooted. string Not system will
reboot Specified reboot
data- Display string when data exhausted. string Not data plan is
exhausted Specified exhausted
session- Display string when session disconnected. string Not LTE data
disconnect Specified session is
disconnected
low-signal- Display string when signal strength is low. string Not LTE signal
strength Specified strength is too
low
os-image- Display string when falling back to a previous OS string Not system start to
fallback image. Specified fallback OS
image
fgt-backup- Display string when FortiGate backup mode string Not FortiGate
mode-switch switched. Specified backup work
mode switched
config receiver
Option Description
Option Description
Option Description
config modem1
Option Description
Option Description
Option Description
Option Description
Option Description
config auto-switch
Option Description
Option Description
Option Description
Option Description
switch-back- Automatically switch over to preferred SIM/carrier at a string Not Specified 00:01
time specified time in UTC (HH:MM).
config modem2
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config auto-switch
switch-back- Automatically switch over to preferred SIM/carrier at a string Not Specified 00:01
time specified time in UTC (HH:MM).
config lan-extension
Option Description
config backhaul
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable Use the the WTP profile login-password (administrator password) setting.
Option Description
yes Change the managed extender's administrator password. Use the login-
password option to set the password.
default Keep the managed extender's administrator password set to the factory
default.
login- Set the managed extender's administrator password. password Not Specified
password
Option Description
Option Description
bandwidth- FortiExtender LAN extension bandwidth limit (Mbps). integer Minimum 1024
limit value: 1
Maximum
value:
16776000
Option Description
config wan-extension
Option Description
config lan-extension
backhaul-ip IPsec phase1 IPv4/FQDN. Used to specify the external string Not
IP/FQDN when the FortiGate unit is behind a NAT Specified
device.
Option Description
Option Description
Option Description
Option Description
Option Description
config rules
Option Description
Option Description
direction Traffic direction (HTTP, FTP, SSH, CIFS only). option - any
Option Description
any Match files transmitted in the session's originating and reply directions.
Option Description
subnet IP address and subnet mask of address. ipv4- Not 0.0.0.0 0.0.0.0
classnet- Specified
any
Option Description
Option Description
Option Description
Option Description
unknown UNKNOWN.
healthy HEALTHY.
quarantine QUARANTINE.
checkup CHECKUP.
transient TRANSIENT.
infected INFECTED.
start-ip First IP address (inclusive) in the range for the ipv4- Not 0.0.0.0
address. address- Specified
any
end-ip Final IP address (inclusive) in the range for the ipv4- Not 0.0.0.0
address. address- Specified
any
Option Description
ip IP address.
Option Description
Option Description
Option Description
Option Description
Option Description
start-ip First IPv4 address (inclusive) in the range for the ipv4- Not 0.0.0.0
address. address- Specified
any
end-ip Final IPv4 address (inclusive) in the range for the ipv4- Not 0.0.0.0
address. address- Specified
any
associated- Interface associated with the address object. When string Not
interface setting up a policy, only addresses associated with Specified
this interface are available.
color Integer value to determine the color of the icon in integer Minimum 0
the GUI . value: 0
Maximum
value: 32
config tagging
Option Description
config subnet-segment
Option Description
config values
Option Description
template Template.
start-ip First IP address (inclusive) in the range for the ipv6- Not ::
address (format: address Specified
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx).
end-ip Final IP address (inclusive) in the range for the ipv6- Not ::
address (format: address Specified
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx).
color Integer value to determine the color of the icon in integer Minimum 0
the GUI . value: 0
Maximum
value: 32
Option Description
any Wildcard.
Option Description
config tagging
Option Description
any Wildcard.
Option Description
default Default address group type (address may belong to multiple groups).
folder Address folder group (members may not belong to any other group).
Option Description
Option Description
allow-routing Enable/disable use of this group in the static route option - disable
configuration.
Option Description
Option Description
color Integer value to determine the color of the icon in integer Minimum 0
the GUI . value: 0
Maximum
value: 32
Option Description
config tagging
Option Description
Option Description
Option Description
ICMP ICMP.
ICMP6 ICMP6.
IP IP.
Option Description
ftp FTP.
Option Description
tftp TFTP.
ras RAS.
h323 H323.
tns TNS.
mms MMS.
sip SIP.
pptp PPTP.
rtsp RTSP.
pmap PMAP.
rsh RSH.
dcerpc DCERPC.
mgcp MGCP.
iprange Start and end of the IP range associated with user Not Specified
service.
tcp-halfclose- Wait time to close a TCP session waiting for an integer Minimum 0
timer unanswered FIN packet . value: 0
Maximum
value: 86400
tcp-halfopen- Wait time to close a TCP session waiting for an integer Minimum 0
timer unanswered open session packet . value: 0
Maximum
value: 86400
tcp-timewait- Set the length of the TCP TIME-WAIT state in integer Minimum 0
timer seconds . value: 0
Maximum
value: 300
tcp-rst-timer Set the length of the TCP CLOSE state in integer Minimum 0
seconds . value: 5
Maximum
value: 300
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
direction How this service may be used in a firewall policy option - both
(source, destination or both).
Option Description
database Database name this Internet Service belongs to. option - isdb
Option Description
obsolete Indicates whether the Internet Service can be used. integer Minimum 0
value: 0
Maximum
value: 255
Option Description
direction How this service may be used (source, destination or option - both
both).
Option Description
config entry
Option Description
protocol Integer value for the protocol type as defined by IANA . integer Minimum 0
value: 0
Maximum
value: 255
config disable-entry
Option Description
protocol Integer value for the protocol type as defined by IANA . integer Minimum 0
value: 0
Maximum
value: 255
config port-range
config ip6-range
config entry
Option Description
protocol Integer value for the protocol type as defined by IANA . integer Minimum 0
value: 0
Maximum
value: 255
config port-range
end-port Integer value for ending TCP/UDP/SCTP destination integer Minimum 65535
port in range (0 to 65535). value: 0
Maximum
value:
65535
config entry
Option Description
protocol Integer value for the protocol type as defined by IANA . integer Minimum 0
value: 0
Maximum
value: 255
config port-range
end-port Integer value for ending TCP/UDP/SCTP destination integer Minimum 65535
port in range (0 to 65535). value: 0
Maximum
value:
65535
Option Description
config entry
protocol Integer value for the protocol type as defined by IANA integer Minimum 0
. value: 0
Maximum
value: 255
config port-range
Option Description
Option Description
Option Description
Option Description
Option Description
exceed-dscp DSCP mark for traffic in guaranteed-bandwidth and user Not Specified
exceed-bandwidth.
maximum- DSCP mark for traffic in exceed-bandwidth and user Not Specified
dscp maximum-bandwidth.
bandwidth-unit Unit of measurement for maximum bandwidth for this option - kbps
shaper (Kbps, Mbps or Gbps).
Option Description
Option Description
Option Description
Option Description
query Match the query part of the URL as a regular string Not Specified
expression.
Option Description
Option Description
Option Description
Option Description
Option Description
color Integer value to determine the color of the icon in integer Minimum 0
the GUI . value: 0
Maximum
value: 32
config header-group
Option Description
config tagging
Option Description
color Integer value to determine the color of the icon in integer Minimum 0
the GUI . value: 0
Maximum
value: 32
start Schedule start date and time, format hh:mm user Not
yyyy/mm/dd. Specified
end Schedule end date and time, format hh:mm user Not
yyyy/mm/dd. Specified
expiration- Write an event log message this many days before the integer Minimum 3
days schedule expires. value: 0
Maximum
value: 100
Option Description
start Time of day to start the schedule, format hh:mm. user Not
Specified
end Time of day to end the schedule, format hh:mm. user Not
Specified
day One or more days of the week on which the schedule is option - none
valid. Separate the names of the days with a space.
Option Description
sunday Sunday.
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
thursday Thursday.
friday Friday.
saturday Saturday.
none None.
Option Description
Option Description
type IP pool type (overload, one-to-one, fixed port range, or option - overload
port block allocation).
Option Description
startip First IPv4 address (inclusive) in the range for the ipv4- Not 0.0.0.0
address pool (format xxx.xxx.xxx.xxx, Default: 0.0.0.0). address- Specified
any
endip Final IPv4 address (inclusive) in the range for the ipv4- Not 0.0.0.0
address pool (format xxx.xxx.xxx.xxx, Default: 0.0.0.0). address- Specified
any
startport First port number (inclusive) in the range for the address integer Minimum 5117
pool (Default: 5117). value: 5117
Maximum
value:
65533
endport Final port number (inclusive) in the range for the integer Minimum 65533
address pool (Default: 65533). value: 5117
Maximum
value:
65533
source-endip Final IPv4 address (inclusive) in the range of the source ipv4- Not 0.0.0.0
addresses to be translated (format xxx.xxx.xxx.xxx, address- Specified
Default: 0.0.0.0). any
num-blocks- Number of addresses blocks that can be used by a user integer Minimum 8
per-user . value: 1
Maximum
value: 128
Option Description
Option Description
arp-intf Select an interface from available options that will reply string Not
to ARP requests. (If blank, any is selected). Specified
Option Description
Option Description
Option Description
Option Description
type Select the Monitor type used by the health check option -
monitor to check the health of the server (PING | TCP |
HTTP | HTTPS | DNS).
Option Description
Option Description
timeout Time to wait to receive response to a health check from integer Minimum 2
a server. Reaching the timeout means the health check value: 1
failed . Maximum
value: 255
retry Number health check attempts before the server is integer Minimum 3
considered down . value: 1
Maximum
value: 255
port Service port used to perform the health check. If 0, integer Minimum 0
health check monitor inherits port configured for the value: 0
server . Maximum
value:
65535
http-get URL used to send a GET request to check the health of string Not
an HTTP server. Specified
dns-protocol Select the protocol used by the DNS health check option - udp
monitor to check the health of the server (UDP | TCP).
Option Description
udp UDP.
tcp TCP.
dns-request- Fully qualified domain name to resolve for the DNS string Not
domain probe. Specified
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
http HTTP.
https HTTPS.
imaps IMAPS.
pop3s POP3S.
smtps SMTPS.
ssl SSL.
tcp TCP.
Option Description
udp UDP.
ip IP.
Option Description
Option Description
none None.
Option Description
disable Force only the source NAT mapped IP to the external IP for traffic
egressing the external interface of the VIP.
enable Force the source NAT mapped IP to the external IP for all traffic.
Option Description
Option Description
Option Description
tcp TCP.
udp UDP.
sctp SCTP.
icmp ICMP.
extport Incoming port number range that you want to user Not Specified
map to a port number range on the
destination network.
Option Description
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-
cooke-domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
Option Description
same-ip Allow HTTP cookie to match any virtual server with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
Option Description
Option Description
Option Description
Option Description
Option Description
disable Do not add HTTP header indicating SSL offload for WebLogic server.
enable Add HTTP header indicating SSL offload for WebLogic server.
Option Description
disable Do not add HTTP header indicating SSL offload for WebSphere server.
enable Add HTTP header indicating SSL offload for WebSphere server.
ssl-mode Apply SSL offloading between the client and option - half
the FortiGate (half) or from the client to the
FortiGate and from the FortiGate to the
server (full).
Option Description
ssl-certificate The name of the certificate to use for SSL string Not Specified
handshake.
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
custom Custom encryption. Use config ssl-cipher-suites to select the cipher suites
that are allowed.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
client Use the same encryption algorithms for both client and server sessions.
ssl-pfs Select the cipher suites that can be used for option - require
SSL perfect forward secrecy (PFS). Applies
to both client and server sessions.
Option Description
allow Allow use of any cipher suite so PFS may or may not be used depending on
the cipher suite selected.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable.
enable Enable.
Option Description
secure Abort any client initiated SSL re-negotiation attempt that does not use RFC
5746 Secure Renegotiation.
ssl-client- How to expire SSL sessions for the segment option - both
session-state- of the SSL connection between the client and
type the FortiGate.
Option Description
both Expire session states based on time or count, whichever occurs first.
ssl-server- How to expire SSL sessions for the segment option - both
session-state- of the SSL connection between the server
type and the FortiGate.
Option Description
both Expire session states based on time or count, whichever occurs first.
Option Description
Option Description
Option Description
ssl-hpkp-age Number of seconds the client should honor integer Minimum 5184000
the HPKP setting. value: 60
Maximum
value:
157680000
Option Description
Option Description
ssl-hsts-age Number of seconds the client should honor integer Minimum 5184000
the HSTS setting. value: 60
Maximum
value:
157680000
Option Description
monitor <name> Name of the health check monitor to use string Maximum
when polling to determine a virtual server's length: 79
connectivity status.
Health monitor name.
ipv6-mappedport IPv6 port number range on the destination user Not Specified
network to which the external port number
range is mapped.
config realservers
Option Description
port Port for communicating with the real server. Required integer Minimum 0
if port forwarding is enabled. value: 1
Maximum
value: 65535
status Set the status of the real server to active so that it can option - active
accept traffic, or on standby or disabled so no traffic
is sent.
Option Description
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
holddown- Time in seconds that the health check monitor integer Minimum 300
interval continues to monitor and unresponsive server that value: 30
should be active. Maximum
value: 65535
Option Description
http-host HTTP server domain name in HTTP header. string Not Specified
monitor Name of the health check monitor to use when string Maximum
<name> polling to determine a virtual server's connectivity length: 79
status.
Health monitor name.
client-ip Only clients in this IP range can connect to this real user Not Specified
server.
config ssl-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used with. option - ssl-3.0 tls-
1.0 tls-1.1
tls-1.2 tls-
1.3
Option Description
config ssl-server-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used with. option - ssl-3.0 tls-
1.0 tls-1.1
tls-1.2 tls-
1.3
Option Description
Option Description
extip IPv6 address or address range on the external user Not Specified
interface that you want to map to an address or
address range on the destination network.
mappedip Mapped IPv6 address range in the format user Not Specified
startIP-endIP.
Option Description
enable Perform SNAT on traffic from mappedip to the extip for all egress interfaces.
Option Description
Option Description
Option Description
tcp TCP.
udp UDP.
sctp SCTP.
extport Incoming port number range that you want to user Not Specified
map to a port number range on the destination
network.
mappedport Port number range on the destination network user Not Specified
to which the external port number range is
mapped.
Option Description
least-session Sends new sessions to the server with the lowest session count.
Option Description
http HTTP.
https HTTPS.
imaps IMAPS.
pop3s POP3S.
smtps SMTPS.
ssl SSL.
tcp TCP.
udp UDP.
ip IP.
Option Description
Option Description
none None.
Option Description
Option Description
Option Description
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
Option Description
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Domain that HTTP cookie persistence should string Not Specified
domain apply to.
http-cookie- Limit HTTP cookie persistence to the specified string Not Specified
path path.
Option Description
same-ip Allow HTTP cookie to match any virtual server with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
Option Description
Option Description
http-ip-header- For HTTP multiplexing, enter a custom HTTPS string Not Specified
name header name. The original client IP address is
added to this header. If empty, X-Forwarded-
For is used.
Option Description
Option Description
disable Do not add HTTP header indicating SSL offload for WebLogic server.
enable Add HTTP header indicating SSL offload for WebLogic server.
Option Description
disable Do not add HTTP header indicating SSL offload for WebSphere server.
enable Add HTTP header indicating SSL offload for WebSphere server.
ssl-mode Apply SSL offloading between the client and option - half
the FortiGate (half) or from the client to the
FortiGate and from the FortiGate to the server
(full).
Option Description
ssl-certificate The name of the certificate to use for SSL string Not Specified
handshake.
Option Description
Option Description
custom Use config ssl-cipher-suites to select the cipher suites that are allowed.
Option Description
custom Use config ssl-server-cipher-suites to select the cipher suites that are
allowed.
client Use the same encryption algorithms for client and server sessions.
ssl-pfs Select the cipher suites that can be used for option - require
SSL perfect forward secrecy (PFS). Applies to
both client and server sessions.
Option Description
allow Allow use of any cipher suite so PFS may or may not be used depending on
the cipher suite selected.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable.
enable Enable.
Option Description
secure Reject any SSL connection that does not offer a RFC 5746 Secure
Renegotiation Indication.
ssl-client- How to expire SSL sessions for the segment of option - both
session-state- the SSL connection between the client and the
type FortiGate.
Option Description
both Expire session states based on time or count, whichever occurs first.
ssl-server- How to expire SSL sessions for the segment of option - both
session-state- the SSL connection between the server and
type the FortiGate.
Option Description
both Expire session states based on time or count, whichever occurs first.
Option Description
Option Description
Option Description
ssl-hpkp- Certificate to generate primary HPKP pin from. string Not Specified
primary
ssl-hpkp- Certificate to generate backup HPKP pin from. string Not Specified
backup
ssl-hpkp-age Number of minutes the web browser should integer Minimum 5184000
keep HPKP. value: 60
Maximum
value:
157680000
Option Description
Option Description
ssl-hsts-age Number of seconds the client should honor the integer Minimum 5184000
HSTS setting. value: 60
Maximum
value:
157680000
Option Description
monitor Name of the health check monitor to use when string Maximum
<name> polling to determine a virtual server's length: 79
connectivity status.
Health monitor name.
Option Description
disable Disable use of the lower 32 bits of the external IPv6 address as mapped IPv4
address.
enable Enable use of the lower 32 bits of the external IPv6 address as mapped IPv4
address.
ipv4- IPv4 port number range on the destination user Not Specified
mappedport network to which the external port number
range is mapped.
config realservers
port Port for communicating with the real server. Required integer Minimum 0
if port forwarding is enabled. value: 1
Maximum
value: 65535
status Set the status of the real server to active so that it can option - active
accept traffic, or on standby or disabled so no traffic
is sent.
Option Description
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
holddown- Time in seconds that the health check monitor integer Minimum 300
interval continues to monitor an unresponsive server that value: 30
should be active. Maximum
value: 65535
Option Description
http-host HTTP server domain name in HTTP header. string Not Specified
max- Max number of active connections that can directed integer Minimum 0
connections to the real server. When reached, sessions are sent value: 0
to other real servers. Maximum
value:
2147483647
monitor Name of the health check monitor to use when string Maximum
<name> polling to determine a virtual server's connectivity length: 79
status.
Health monitor name.
client-ip Only clients in this IP range can connect to this real user Not Specified
server.
config ssl-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used with. option - ssl-3.0 tls-
1.0 tls-1.1
tls-1.2 tls-
1.3
Option Description
config ssl-server-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used with. option - ssl-3.0 tls-
1.0 tls-1.1
tls-1.2 tls-
1.3
Option Description
color Integer value to determine the color of the icon in integer Minimum 0
the GUI . value: 0
Maximum
value: 32
color Integer value to determine the color of the icon in integer Minimum 0
the GUI . value: 0
Maximum
value: 32
private-key SSH proxy private key, encrypted with a password. user Not
Specified
Option Description
private-key SSH proxy private key, encrypted with a password. user Not
Specified
Option Description
Option Description
status Set the trust status of the public key. option - trusted
Option Description
Option Description
Option Description
Option Description
hostname Hostname of the SSH server to match SSH string Not Specified
certificate principals.
dstmac Set destination MAC address for mirrored traffic. mac- Not ff:ff:ff:ff:ff:ff
address Specified
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
auth-ca Name of the SSH server public key authentication CA. string Not
Specified
config cert-extension
Option Description
yes Critical option, server refuses to authorize if it cannnot recognize the critical
option.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable add dns entry for all vhosts used by access proxy.
disable Do not add dns entry for all vhosts used by access proxy.
config api-gateway
Option Description
http HTTP.
https HTTPS.
tcp-forwarding TCP-FORWARDING.
samlsp SAML-SP.
web-portal VPN-SSL-WEB-PORTAL.
saas SAAS.
Option Description
Option Description
persistence Configure how to make sure that clients connect to option - none
the same server every time they make a request that
is part of the same session.
Option Description
none None.
http-cookie- Enable/disable use of HTTP cookie domain from host option - disable
domain-from- field in HTTP.
host
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Domain that HTTP cookie persistence should apply string Not Specified
domain to.
http-cookie- Limit HTTP cookie persistence to the specified path. string Not Specified
path
http-cookie- Time in minutes that client web browsers should keep integer Minimum 60
age a cookie. Default is 60 minutes. 0 = no time limit. value: 0
Maximum
value: 525600
http-cookie- Control sharing of cookies across API Gateway. Use option - same-ip
share of same-ip means a cookie from one virtual server
can be used by another. Disable stops cookie
sharing.
Option Description
same-ip Allow HTTP cookie to match any API Gateway with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
saml-server SAML service provider configuration for VIP string Not Specified
authentication.
Option Description
Option Description
ssl-algorithm Permitted encryption algorithms for the server side of option - high
SSL full mode sessions according to encryption
strength.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
config realservers
Option Description
port Port for communicating with the real server. integer Minimum 443
value: 1
Maximum
value:
65535
mappedport Port for communicating with the real server. user Not
Specified
status Set the status of the real server to active so that it can option - active
accept traffic, or on standby or disabled so no traffic is
sent.
Option Description
Option Description
ssh SSH.
weight Weight of the real server. If weighted load balancing is integer Minimum 1
enabled, the server with the highest weight gets more value: 1
connections. Maximum
value: 255
health-check Enable to check the responsiveness of the real server option - disable
before forwarding traffic.
Option Description
health-check- Protocol of the health check monitor to use when option - ping
proto polling to determine server's connectivity status.
Option Description
tcp-connect Use a full TCP connection to test the link with the server.
Option Description
ssh-host-key- Enable/disable SSH real server host key validation. option - disable
validation
Option Description
config ssl-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used with. option - tls-1.0 tls-
1.1 tls-1.2
tls-1.3
Option Description
config api-gateway6
Option Description
http HTTP.
Option Description
https HTTPS.
tcp-forwarding TCP-FORWARDING.
samlsp SAML-SP.
web-portal VPN-SSL-WEB-PORTAL.
saas SAAS.
Option Description
Option Description
persistence Configure how to make sure that clients connect to option - none
the same server every time they make a request that
is part of the same session.
Option Description
none None.
http-cookie- Enable/disable use of HTTP cookie domain from host option - disable
domain-from- field in HTTP.
host
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Domain that HTTP cookie persistence should apply string Not Specified
domain to.
http-cookie- Limit HTTP cookie persistence to the specified path. string Not Specified
path
http-cookie- Time in minutes that client web browsers should keep integer Minimum 60
age a cookie. Default is 60 minutes. 0 = no time limit. value: 0
Maximum
value: 525600
http-cookie- Control sharing of cookies across API Gateway. Use option - same-ip
share of same-ip means a cookie from one virtual server
can be used by another. Disable stops cookie
sharing.
Option Description
same-ip Allow HTTP cookie to match any API Gateway with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
saml-server SAML service provider configuration for VIP string Not Specified
authentication.
Option Description
Option Description
ssl-algorithm Permitted encryption algorithms for the server side of option - high
SSL full mode sessions according to encryption
strength.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
config realservers
port Port for communicating with the real server. integer Minimum 443
value: 1
Maximum
value:
65535
mappedport Port for communicating with the real server. user Not
Specified
status Set the status of the real server to active so that it can option - active
accept traffic, or on standby or disabled so no traffic is
sent.
weight Weight of the real server. If weighted load balancing is integer Minimum 1
enabled, the server with the highest weight gets more value: 1
connections. Maximum
value: 255
health-check Enable to check the responsiveness of the real server option - disable
before forwarding traffic.
health-check- Protocol of the health check monitor to use when option - ping
proto polling to determine server's connectivity status.
ssh-host-key- Enable/disable SSH real server host key validation. option - disable
validation
config ssl-cipher-suites
versions SSL/TLS versions that the cipher suite can be used with. option - tls-1.0 tls-
1.1 tls-1.2
tls-1.3
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable add dns entry for all vhosts used by access proxy.
disable Do not add dns entry for all vhosts used by access proxy.
config api-gateway
Option Description
http HTTP.
https HTTPS.
tcp-forwarding TCP-FORWARDING.
samlsp SAML-SP.
web-portal VPN-SSL-WEB-PORTAL.
saas SAAS.
Option Description
Option Description
persistence Configure how to make sure that clients connect to option - none
the same server every time they make a request that
is part of the same session.
Option Description
none None.
http-cookie- Enable/disable use of HTTP cookie domain from host option - disable
domain-from- field in HTTP.
host
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Domain that HTTP cookie persistence should apply string Not Specified
domain to.
http-cookie- Limit HTTP cookie persistence to the specified path. string Not Specified
path
http-cookie- Time in minutes that client web browsers should keep integer Minimum 60
age a cookie. Default is 60 minutes. 0 = no time limit. value: 0
Maximum
value: 525600
http-cookie- Control sharing of cookies across API Gateway. Use option - same-ip
share of same-ip means a cookie from one virtual server
can be used by another. Disable stops cookie
sharing.
Option Description
same-ip Allow HTTP cookie to match any API Gateway with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
saml-server SAML service provider configuration for VIP string Not Specified
authentication.
Option Description
Option Description
ssl-algorithm Permitted encryption algorithms for the server side of option - high
SSL full mode sessions according to encryption
strength.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
config realservers
Option Description
port Port for communicating with the real server. integer Minimum 443
value: 1
Maximum
value:
65535
mappedport Port for communicating with the real server. user Not
Specified
status Set the status of the real server to active so that it can option - active
accept traffic, or on standby or disabled so no traffic is
sent.
Option Description
Option Description
ssh SSH.
weight Weight of the real server. If weighted load balancing is integer Minimum 1
enabled, the server with the highest weight gets more value: 1
connections. Maximum
value: 255
health-check Enable to check the responsiveness of the real server option - disable
before forwarding traffic.
Option Description
health-check- Protocol of the health check monitor to use when option - ping
proto polling to determine server's connectivity status.
Option Description
tcp-connect Use a full TCP connection to test the link with the server.
Option Description
ssh-host-key- Enable/disable SSH real server host key validation. option - disable
validation
Option Description
config ssl-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used with. option - tls-1.0 tls-
1.1 tls-1.2
tls-1.3
Option Description
config api-gateway6
Option Description
http HTTP.
Option Description
https HTTPS.
tcp-forwarding TCP-FORWARDING.
samlsp SAML-SP.
web-portal VPN-SSL-WEB-PORTAL.
saas SAAS.
Option Description
Option Description
persistence Configure how to make sure that clients connect to option - none
the same server every time they make a request that
is part of the same session.
Option Description
none None.
http-cookie- Enable/disable use of HTTP cookie domain from host option - disable
domain-from- field in HTTP.
host
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Domain that HTTP cookie persistence should apply string Not Specified
domain to.
http-cookie- Limit HTTP cookie persistence to the specified path. string Not Specified
path
http-cookie- Time in minutes that client web browsers should keep integer Minimum 60
age a cookie. Default is 60 minutes. 0 = no time limit. value: 0
Maximum
value: 525600
http-cookie- Control sharing of cookies across API Gateway. Use option - same-ip
share of same-ip means a cookie from one virtual server
can be used by another. Disable stops cookie
sharing.
Option Description
same-ip Allow HTTP cookie to match any API Gateway with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
saml-server SAML service provider configuration for VIP string Not Specified
authentication.
Option Description
Option Description
ssl-algorithm Permitted encryption algorithms for the server side of option - high
SSL full mode sessions according to encryption
strength.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
config realservers
port Port for communicating with the real server. integer Minimum 443
value: 1
Maximum
value:
65535
mappedport Port for communicating with the real server. user Not
Specified
status Set the status of the real server to active so that it can option - active
accept traffic, or on standby or disabled so no traffic is
sent.
weight Weight of the real server. If weighted load balancing is integer Minimum 1
enabled, the server with the highest weight gets more value: 1
connections. Maximum
value: 255
health-check Enable to check the responsiveness of the real server option - disable
before forwarding traffic.
health-check- Protocol of the health check monitor to use when option - ping
proto polling to determine server's connectivity status.
ssh-host-key- Enable/disable SSH real server host key validation. option - disable
validation
config ssl-cipher-suites
versions SSL/TLS versions that the cipher suite can be used with. option - tls-1.0 tls-
1.1 tls-1.2
tls-1.3
Option Description
enable Enable IP/MAC binding for packets that would normally go through the
firewall.
disable Disable IP/MAC binding for packets that would normally go through the
firewall.
Option Description
enable Enable IP/MAC binding for packets that would normally go to the firewall.
disable Disable IP/MAC binding for packets that would normally go to the firewall.
Option Description
allow Allow packets from MAC addresses not in the IP/MAC list.
block Block packets from MAC addresses not in the IP/MAC list.
mac MAC address portion of the pair (format = mac- Not 00:00:00:00:00:00
xx:xx:xx:xx:xx:xx in hexadecimal). address Specified
Option Description
Option Description
Option Description
Option Description
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
Option Description
enable Enable range header blocking (treat all partial file downloads as full file
download)
Option Description
Option Description
Option Description
Option Description
Option Description
unknown-http- How to handle HTTP sessions that do not comply option - reject
version with HTTP 0.9, 1.0, or 1.1.
Option Description
reject Reject or tear down HTTP sessions that do not use HTTP 0.9, 1.0, or 1.1.
tunnel Pass HTTP traffic that does not use HTTP 0.9, 1.0, or 1.1 without applying
HTTP protocol optimization, byte-caching, or web caching. TCP protocol
optimization is applied.
best-effort Assume all HTTP sessions comply with HTTP 0.9, 1.0, or 1.1. If a session
uses a different HTTP version, it may not parse correctly and the
connection may be lost.
Option Description
enable Pass non-HTTP sessions through the tunnel without applying protocol
optimization, byte-caching, or web caching. TCP protocol optimization is
applied.
Option Description
enable Allow h2c HTTP connection upgrades. h2c tunnels do not support content
scan.
Option Description
Option Description
block-page- Code number returned for blocked HTTP pages . integer Minimum 403
status-code value: 100
Maximum
value: 599
tcp-window-type TCP window type to use for this protocol. option - auto-tuning
Option Description
system Use system default TCP window size for this protocol.
dynamic Vary TCP window size based on available memory and within limits of tcp-
window-minimum and tcp-window-maximum.
Option Description
Option Description
config ftp
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
. value: 1
Maximum
value: 383 **
Option Description
Option Description
tcp-window-type TCP window type to use for this protocol. option - auto-tuning
Option Description
system Use system default TCP window size for this protocol.
dynamic Vary TCP window size based on available memory and within limits of tcp-
window-minimum and tcp-window-maximum.
Option Description
Option Description
config imap
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned . integer Minimum 10
value: 1
Maximum
value: 383
**
Option Description
Option Description
config mapi
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned . integer Minimum 10
value: 1
Maximum
value: 383
**
Option Description
config pop3
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned . integer Minimum 10
value: 1
Maximum
value: 383
**
Option Description
Option Description
config smtp
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned . integer Minimum 10
value: 1
Maximum
value: 383
**
Option Description
server-busy Enable/disable SMTP server busy when server not option - disable
available.
Option Description
Option Description
config nntp
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned . integer Minimum 10
value: 1
Maximum
value: 383
**
Option Description
config ssh
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
. value: 1
Maximum
value: 383 **
Option Description
tcp-window-type TCP window type to use for this protocol. option - auto-tuning
Option Description
system Use system default TCP window size for this protocol.
dynamic Vary TCP window size based on available memory and within limits of tcp-
window-minimum and tcp-window-maximum.
Option Description
config dns
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned . integer Minimum 10
value: 1
Maximum
value: 383 **
Option Description
tcp-window-type TCP window type to use for this protocol. option - auto-tuning
Option Description
Option Description
system Use system default TCP window size for this protocol.
dynamic Vary TCP window size based on available memory and within limits of tcp-
window-minimum and tcp-window-maximum.
Option Description
keytab Base64 encoded keytab file containing credential of the string Not
server. Specified
config mail-signature
Option Description
signature Email signature to be added to outgoing email (if the string Not
signature contains spaces, enclose with quotation Specified
marks).
Option Description
Option Description
Option Description
use-ssl-server Enable/disable the use of SSL server table for SSL option - disable
offloading.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config ssl
Option Description
disable Disable.
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
allow Bypass the session when unable to retrieve server's certificate for
inspection.
block Block the session when unable to retrieve server's certificate for inspection.
Option Description
Option Description
config https
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
allow Bypass the session when unable to retrieve server's certificate for
inspection.
block Block the session when unable to retrieve server's certificate for inspection.
Option Description
config ftps
Option Description
disable Disable.
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
config pop3s
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
config ssh
Option Description
disable Disable.
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
Option Description
Option Description
high-encryption Allow only AES-CTR, AES-GCM ciphers and high encryption algorithms.
config dot
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
config ssl-server
https-client- Action based on received client certificate during the option - bypass
certificate HTTPS handshake.
Option Description
smtps-client- Action based on received client certificate during the option - bypass
certificate SMTPS handshake.
Option Description
pop3s-client- Action based on received client certificate during the option - bypass
certificate POP3S handshake.
Option Description
imaps-client- Action based on received client certificate during the option - bypass
certificate IMAPS handshake.
Option Description
ftps-client- Action based on received client certificate during the option - bypass
certificate FTPS handshake.
Option Description
ssl-other- Action based on received client certificate during an SSL option - bypass
client- protocol handshake.
certificate
Option Description
ssl-mode SSL/TLS mode for encryption and decryption of traffic. option - full
Option Description
Option Description
ssl-cert Name of certificate for SSL connections to this server . string Not Fortinet_
Specified CA_SSL
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
secure Reject any SSL connection that does not offer a RFC 5746 Secure
Renegotiation Indication.
Option Description
Option Description
Option Description
Option Description
config rule
gateway IPv4 address of the gateway (Format: xxx.xxx.xxx.xxx , ipv4- Not 0.0.0.0
Default: 0.0.0.0). address Specified
groups Select one or more group(s) from available groups that string Maximum
<name> are allowed to use this route. Separate group names length: 79
with a space.
Group name.
identity- Name of the identity-based route that applies to this string Not
based-route portal. Specified
srcaddr Source IPv4 address name and address group string Maximum
<name> names. length: 79
Address name.
Option Description
Option Description
srcaddr6 Source IPv6 address name and address group string Maximum
<name> names. length: 79
Address name.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
learning- Enable to allow everything, but log all of the option - disable
mode meaningful data for security information
gathering. A learning report will be generated.
Option Description
Option Description
Option Description
Option Description
profile- Name of an existing Protocol options profile. string Not Specified default
protocol-
options
ssl-ssh-profile Name of an existing SSL SSH profile. string Not Specified no-inspection
groups Names of user groups that can authenticate with string Maximum
<name> this policy. length: 79
User group name.
users <name> Names of individual users that can authenticate string Maximum
with this policy. length: 79
User name.
Option Description
Option Description
Option Description
Option Description
Option Description
srcaddr <name> Source IPv4 address and address group string Maximum
names. length: 79
Address name.
dstaddr <name> Destination IPv4 address and address group string Maximum
names. length: 79
Address name.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
check-all Flush all current sessions accepted by this policy. These sessions must be
started and re-matched with policies.
Option Description
Option Description
tos ToS (Type of Service) value used for user Not Specified
comparison.
tos-mask Non-zero bit positions are used for user Not Specified
comparison while zero bit positions are
ignored.
Option Description
Option Description
Option Description
Option Description
Option Description
physical-location Match geography address to its physical location using the geography IP
database.
registered- Match geography address to its registered location using the geography IP
location database.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
profile-protocol- Name of an existing Protocol options profile. string Not Specified default
options
ssl-ssh-profile Name of an existing SSL SSH profile. string Not Specified no-inspection
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
session-ttl TTL in seconds for sessions accepted by this user Not Specified
policy .
vlan-cos-fwd VLAN forward direction user priority: 255 integer Minimum 255
passthrough, 0 lowest, 7 highest. value: 0
Maximum
value: 7
vlan-cos-rev VLAN reverse direction user priority: 255 integer Minimum 255
passthrough, 0 lowest, 7 highest. value: 0
Maximum
value: 7
inbound Policy-based IPsec VPN: only traffic from the option - disable
remote network can initiate a VPN.
Option Description
outbound Policy-based IPsec VPN: only traffic from the option - enable
internal network can initiate a VPN.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
fsso-agent-for- FSSO agent to use for NTLM authentication. string Not Specified
ntlm
groups <name> Names of user groups that can authenticate string Maximum
with this policy. length: 79
Group name.
Option Description
Option Description
Option Description
vpntunnel Policy-based IPsec VPN: name of the IPsec string Not Specified
VPN Phase 1.
natip Policy-based IPsec VPN: source NAT IP ipv4- Not Specified 0.0.0.0 0.0.0.0
address for outgoing traffic. classnet
match-vip Enable to match packets that have had their option - disable
destination addresses changed by a VIP.
Option Description
Option Description
enable Enable matching of only those packets that have had their destination
addresses changed by a VIP.
disable Disable matching of only those packets that have had their destination
addresses changed by a VIP.
Option Description
Option Description
Option Description
redirect-url URL users are directed to after seeing and var-string Not Specified
accepting the disclaimer or authenticating.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable TCP NPU session delay in order to guarantee packet order of 3-way
handshake.
disable Disable TCP NPU session delay in order to guarantee packet order of 3-way
handshake.
Option Description
Option Description
Option Description
Option Description
Option Description
users <name> Apply this traffic shaping policy to individual string Maximum
users that have authenticated with the length: 79
FortiGate.
User name.
groups Apply this traffic shaping policy to user groups string Maximum
<name> that have authenticated with the FortiGate. length: 79
Group name.
application IDs of one or more applications that this shaper integer Minimum
<id> applies application control traffic shaping to. value: 0
Application IDs. Maximum
value:
4294967295
tos ToS (Type of Service) value used for user Not Specified
comparison.
tos-mask Non-zero bit positions are used for comparison user Not Specified
while zero bit positions are ignored.
Option Description
per-ip-shaper Per-IP traffic shaper to apply with this policy. string Not Specified
Option Description
Option Description
diffservcode- Change packet's reverse (reply) DiffServ to this user Not Specified
rev value.
Option Description
config shaping-entries
Option Description
limit Hard limit on the real queue size in packets. integer Minimum 1000
value: 5
Maximum
value: 10000
cburst-in- Number of bytes that can be burst as fast as the integer Minimum 0
msec interface can transmit. Formula: cburst = maximum- value: 0
bandwidth*cburst-in-msec. Maximum
value: 2000
min Average queue size in packets at which RED drop integer Minimum 83
becomes a possibility. value: 3
Maximum
value: 3000
max Average queue size in packets at which RED drop integer Minimum 250
probability is maximal. value: 3
Maximum
value: 3000
Option Description
srcaddr- When enabled srcaddr specifies what the source option - disable
negate address must NOT be.
Option Description
Option Description
Option Description
service- When enabled service specifies what the service option - disable
negate must NOT be.
Option Description
Option Description
srcaddr- When enabled srcaddr specifies what the source option - disable
negate address must NOT be.
Option Description
Option Description
Option Description
service- When enabled service specifies what the service option - disable
negate must NOT be.
Option Description
Option Description
Option Description
Option Description
ttl Value/range to match against the packet's Time to Live user Not
value . Specified
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
redirect-url Redirect URL for further explicit web proxy var-string Not
processing. Specified
src IPv4 address or subnet on the internal network to ipv4- Not 0.0.0.0
compare with the resolved address in DNS query address Specified
replies. If the resolved address matches, the
resolved address is substituted with dst.
dst IPv4 address or subnet on the external network ipv4- Not 0.0.0.0
to substitute for the resolved address in DNS address Specified
query replies. Can be single IP address or
subnet on the external network, but number of
addresses must equal number of mapped IP
addresses in src.
netmask If src and dst are subnets rather than single IP ipv4- Not 255.255.255.255
addresses, enter the netmask for both src and netmask Specified
dst.
Option Description
Option Description
Option Description
snat-ip IPv4 address to be used as the source address for ipv4- Not 0.0.0.0
NATed traffic. address Specified
dnat IPv4 DNAT address used for multicast destination ipv4- Not 0.0.0.0
addresses. address- Specified
any
Option Description
protocol Integer value for the protocol type as defined by integer Minimum 0
IANA . value: 0
Maximum
value: 255
Option Description
Option Description
Option Description
Option Description
accept Accept.
deny Deny.
protocol Integer value for the protocol type as defined by integer Minimum 0
IANA . value: 0
Maximum
value: 255
Option Description
Option Description
logtraffic Logging type to be used in this policy (Options: all | utm | option - utm
disable, Default: utm).
Option Description
Address name.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
logtraffic Logging type to be used in this policy (Options: all | utm | option - utm
disable, Default: utm).
Option Description
srcaddr6 IPv6 address object to limit traffic monitoring to network string Maximum
<name> traffic sent from the specified address or range. length: 79
Address name.
dstaddr6 IPv6 address object to limit traffic monitoring to network string Maximum
<name> traffic sent to the specified address or range. length: 79
Address name.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config anomaly
Option Description
Option Description
Option Description
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
Option Description
config anomaly
Option Description
Option Description
Option Description
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
Configure sniffer.
config firewall sniffer
Description: Configure sniffer.
edit <id>
set status [enable|disable]
set logtraffic [all|utm|...]
set ipv6 [enable|disable]
set non-ip [enable|disable]
set interface {string}
set host {string}
set port {string}
set protocol {string}
set vlan {string}
set application-list-status [enable|disable]
set application-list {string}
set ips-sensor-status [enable|disable]
set ips-sensor {string}
set dsri [enable|disable]
set av-profile-status [enable|disable]
set av-profile {string}
set webfilter-profile-status [enable|disable]
set webfilter-profile {string}
set emailfilter-profile-status [enable|disable]
set emailfilter-profile {string}
set dlp-profile-status [enable|disable]
set dlp-profile {string}
set ip-threatfeed-status [enable|disable]
set ip-threatfeed <name1>, <name2>, ...
set file-filter-profile-status [enable|disable]
set file-filter-profile {string}
set ips-dos-status [enable|disable]
config anomaly
Description: Configuration method to edit Denial of Service (DoS) anomaly settings.
edit <name>
set status [disable|enable]
set log [enable|disable]
set action [pass|block]
set quarantine [none|attacker]
set quarantine-expiry {user}
set quarantine-log [disable|enable]
set threshold {integer}
set threshold(default) {integer}
next
end
next
end
Option Description
logtraffic Either log all sessions, only sessions that have a option - utm
security profile applied, or disable all logging for this
policy.
Option Description
Option Description
Option Description
interface Interface name that traffic sniffing will take place on. string Not
Specified
protocol Integer value for the protocol type as defined by IANA . string Not
Specified
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config anomaly
Option Description
Option Description
Option Description
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
Option Description
This command is available for reference model(s) FortiGate 140E-POE, FortiGate 601E,
FortiGate 2201E. It is not available for FortiWiFi 61F, FortiGate VM64.
Option Description
This command is available for reference model(s) FortiGate 140E-POE, FortiGate 601E,
FortiGate 2201E. It is not available for FortiWiFi 61F, FortiGate VM64.
Option Description
Option Description
Option Description
orig-port Original TCP port (1 to 65535, 0 means any port). user Not
Specified
Option Description
Option Description
Option Description
Option Description
Option Description
no-matching- Bypass or drop the connection when no matching cipher option - bypass
cipher-action is found.
Option Description
cert-cache- Maximum capacity of the host certificate cache . integer Minimum 200
capacity value: 0
Maximum
value: 500
kxp-queue- Maximum length of the CP KXP queue. When the integer Minimum 16
threshold * queue becomes full, the proxy switches cipher functions value: 0
to the main CPU . Maximum
value: 512
ssl-queue- Maximum length of the CP SSL queue. When the queue integer Minimum 32
threshold * becomes full, the proxy switches cipher functions to the value: 0
main CPU . Maximum
value: 512
Option Description
Option Description
SCTP SCTP
map-startip Address to be used as the starting point for translation in ipv4- Not 0.0.0.0
the range . address- Specified
any
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
List.
config firewall iprope list
Description: List.
set <group_number> {string}
end
Option Description
incoming-port Accept incoming FTP requests on one or more ports. user Not
Specified
incoming-ip Accept incoming FTP requests from this IP address. An ipv4- Not 0.0.0.0
interface must have this IP address. address- Specified
any
outgoing-ip Outgoing FTP requests will leave from this IP address. ipv4- Not
An interface must have this IP address. address- Specified
any
sec-default- Accept or deny explicit FTP proxy sessions when no option - deny
action FTP proxy firewall policy exists.
Option Description
accept Accept requests. All explicit FTP proxy traffic is accepted whether there is an
explicit FTP proxy policy or not
deny Deny requests unless there is a matching explicit FTP proxy policy.
Option Description
ssl-cert Name of certificate for SSL connections to this server . string Not Fortinet_
Specified CA_SSL
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Hardware status.
config hardware status
Description: Hardware status.
end
addr-type Address type of the remote ICAP server: IPv4, IPv6 option - ip4
or FQDN.
Option Description
ip-address IPv4 address of the ICAP server. ipv4- Not Specified 0.0.0.0
address-
any
fqdn ICAP remote server Fully Qualified Domain Name string Not Specified
(FQDN).
Option Description
Option Description
healthcheck- ICAP Service name to use for health checks. string Not Specified
service
Configure an ICAP server group consisting of multiple forward servers. Supports failover and load balancing.
config icap server-group
Description: Configure an ICAP server group consisting of multiple forward servers.
Supports failover and load balancing.
edit <name>
set ldb-method [weighted|least-session|...]
config server-list
Description: Add ICAP servers to a list to form a server group. Optionally assign
weights to each server.
edit <name>
set weight {integer}
Option Description
least-session Send new sessions to the server with lowest session count.
config server-list
weight Optionally assign a weight of the ICAP server for integer Minimum 10
weighted load balancing value: 1
Maximum
value: 100
Option Description
Option Description
Option Description
ssh Forward file transfer with SSH protocol to ICAP server for further processing.
ftp Forward file transfer with FTP protocol to ICAP server for further processing.
Option Description
204-size-limit 204 response size limit to be saved by ICAP client in integer Minimum 1
megabytes . value: 1
Maximum
value: 10
Option Description
Option Description
request-failure Action to take if the ICAP server cannot be contacted option - error
when processing an HTTP request.
Option Description
error Error.
bypass Bypass.
response- Action to take if the ICAP server cannot be contacted option - error
failure when processing an HTTP response.
Option Description
error Error.
bypass Bypass.
file-transfer- Action to take if the ICAP server cannot be contacted option - error
failure when processing a file transfer.
Option Description
error Error.
bypass Bypass.
request-path Path component of the ICAP URI that identifies the string Not
HTTP request processing service. Specified
response-path Path component of the ICAP URI that identifies the string Not
HTTP response processing service. Specified
file-transfer- Path component of the ICAP URI that identifies the file string Not
path transfer processing service. Specified
methods The allowed HTTP methods that will be sent to ICAP option - delete get
server for further processing. head
options
post put
trace
connect
other
Option Description
delete Forward HTTP request or response with DELETE method to ICAP server for
further processing.
get Forward HTTP request or response with GET method to ICAP server for
further processing.
head Forward HTTP request or response with HEAD method to ICAP server for
further processing.
options Forward HTTP request or response with OPTIONS method to ICAP server for
further processing.
post Forward HTTP request or response with POST method to ICAP server for
further processing.
put Forward HTTP request or response with PUT method to ICAP server for
further processing.
trace Forward HTTP request or response with TRACE method to ICAP server for
further processing.
connect Forward HTTP request or response with CONNECT method to ICAP server
for further processing.
other Forward HTTP request or response with All other methods to ICAP server for
further processing.
Option Description
Option Description
forward Forward response to ICAP server unless a rule specifies not to.
bypass Don't forward request to ICAP server unless a rule specifies to forward the
request.
Option Description
Option Description
Option Description
timeout Time (in seconds) that ICAP client waits for the integer Minimum 30
response from ICAP server. value: 30
Maximum
value: 3600
config icap-headers
Option Description
Option Description
bypass Don't forward request to ICAP server when this rule is matched.
config header-group
Option Description
Option Description
Option Description
Option Description
rule <id> Identifies the predefined or custom IPS signatures integer Minimum
to add to the sensor. value: 0
Rule IPS. Maximum
value:
4294967295
severity Relative severity of the signature, from info to user Not Specified all
critical. Log messages generated by the signature
include the severity.
protocol Protocols to be examined. Use all for every protocol user Not Specified all
and other for unlisted protocols.
os Operating systems to be protected. Use all for every user Not Specified all
operating system and other for unlisted operating
systems.
application Operating systems to be protected. Use all for every user Not Specified all
application and other for unlisted application.
Option Description
Option Description
cve <cve- List of CVE IDs of the signatures to add to the string Maximum
entry> sensor. length: 19
CVE IDs or CVE wildcards.
last-modified Filter by signature last modified date. Formats: user Not Specified
before <date>, after <date>, between <start-date>
<end-date>.
status Status of the signatures included in filter. Only those option - default
filters with a status to enable are used.
Option Description
default Default.
Option Description
Option Description
Option Description
action Action taken with traffic in which signatures are option - default
detected.
Option Description
Option Description
default Pass or drop matching traffic, depending on the default action of the signature.
Option Description
Option Description
none none
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
config exempt-ip
src-ip Source IP address and netmask (applies to packet ipv4- Not 0.0.0.0
matching the signature). classnet Specified 0.0.0.0
dst-ip Destination IP address and netmask (applies to packet ipv4- Not 0.0.0.0
matching the signature). classnet Specified 0.0.0.0
Option Description
config parameter
Option Description
Option Description
Option Description
config metadata
severity Relative severity of the signature, from info to critical. user Not Specified
Log messages generated by the signature include the
severity.
protocol Protocol(s) that the signature scans. Blank for all user Not Specified
protocols.
Option Description
Option Description
Option Description
action Default action (pass or block) for this signature. option - pass
Option Description
fail-open Enable to allow traffic if the IPS buffer is full. Default option - disable
is disable and IPS traffic is blocked when the IPS
buffer is full.
Option Description
Option Description
Option Description
Option Description
periodical After an anomaly is detected, allow the number of packets per second
according to the anomaly configuration.
Option Description
socket-size IPS socket buffer size. Max and default value integer Minimum 64 **
depend on available memory. Can be changed to value: 0
tune performance. Maximum
value: 128 **
engine-count Number of IPS engines running. If set to the default integer Minimum 0
value of 0, FortiOS sets the number to optimize value: 0
performance depending on the number of CPU Maximum
cores. value: 255
sync-session- Enable/disable use of kernel session TTL for IPS option - enable
ttl sessions.
Option Description
Option Description
Option Description
advanced Offload more types of pattern matching resulting in higher throughput than
basic mode. Requires two CP8s or one CP9.
Option Description
packet-log- Packet/pcap log queue depth per IPS engine. integer Minimum 128
queue-depth value: 128
Maximum
value: 4096
config tls-active-probe
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
vdom Virtual domain name for TLS active probe. string Not
Specified
source-ip Source IP address used for TLS active probe. ipv4- Not 0.0.0.0
address Specified
source-ip6 Source IPv6 address used for TLS active probe. ipv6- Not ::
address Specified
packet-log- Number of packets to log after the IPS signature is integer Minimum 0
post-attack detected . value: 0
Maximum
value: 255
packet-log- Maximum memory can be used by packet log . integer Minimum 256
memory value: 64
Maximum
value: 8192
Session status.
config ips session
Description: Session status.
end
IPsec tunnel.
config ipsec tunnel
Description: IPsec tunnel.
end
Option Description
Option Description
Option Description
Option Description
Option Description
botnet- Threat weight score for detected botnet connections. option - critical
connection-
detected
Option Description
low Use the low level score for detected botnet connections.
medium Use the medium level score for detected botnet connections.
high Use the high level score for detected botnet connections.
critical Use the critical level score for detected botnet connections.
config malware
virus-infected Threat weight score for virus (infected) detected. option - critical
Option Description
low Use the low level score for virus (infected) detected.
medium Use the medium level score for virus (infected) detected.
high Use the high level score for virus (infected) detected.
critical Use the critical level score for virus (infected) detected.
Option Description
low Use the low level score for virus detected by FortiNDR.
medium Use the medium level score for virus detected by FortiNDR.
high Use the high level score for virus detected by FortiNDR.
critical Use the critical level score for virus detected by FortiNDR.
Option Description
low Use the low level score for virus detected by FortiSandbox.
medium Use the medium level score for virus detected by FortiSandbox.
high Use the high level score for virus detected by FortiSandbox.
critical Use the critical level score for virus detected by FortiSandbox.
file-blocked Threat weight score for blocked file detected. option - low
Option Description
low Use the low level score for blocked file detected.
medium Use the medium level score for blocked file detected.
high Use the high level score for blocked file detected.
critical Use the critical level score for blocked file detected.
command-blocked Threat weight score for blocked command detected. option - disable
Option Description
low Use the low level score for blocked command detected.
medium Use the medium level score for blocked command detected.
high Use the high level score for blocked command detected.
critical Use the critical level score for blocked command detected.
oversized Threat weight score for oversized file detected. option - disable
Option Description
low Use the low level score for oversized file detected.
medium Use the medium level score for oversized file detected.
high Use the high level score for oversized file detected.
critical Use the critical level score for oversized file detected.
virus-scan-error Threat weight score for virus (scan error) detected. option - high
Option Description
disable Disable threat weight scoring for virus (scan error) detected.
low Use the low level score for virus (scan error) detected.
medium Use the medium level score for virus (scan error) detected.
high Use the high level score for virus (scan error) detected.
critical Use the critical level score for virus (scan error) detected.
switch-proto Threat weight score for switch proto detected. option - disable
Option Description
low Use the low level score for switch proto detected.
medium Use the medium level score for switch proto detected.
high Use the high level score for switch proto detected.
critical Use the critical level score for switch proto detected.
Option Description
virus-file-type- Threat weight score for virus (file type executable) option - medium
executable detected.
Option Description
disable Disable threat weight scoring for virus (filetype executable) detected.
low Use the low level score for virus (filetype executable) detected.
medium Use the medium level score for virus (filetype executable) detected.
high Use the high level score for virus (filetype executable) detected.
critical Use the critical level score for virus (filetype executable) detected.
virus-outbreak- Threat weight score for virus (outbreak prevention) option - critical
prevention event.
Option Description
disable Disable threat weight scoring for virus (outbreak prevention) event.
low Use the low level score for virus (outbreak prevention) event.
medium Use the medium level score for virus (outbreak prevention) event.
high Use the high level score for virus (outbreak prevention) event.
critical Use the critical level score for virus (outbreak prevention) event.
content-disarm Threat weight score for virus (content disarm) option - medium
detected.
Option Description
disable Disable threat weight scoring for virus (content disarm) detected.
low Use the low level score for virus (content disarm) detected.
medium Use the medium level score for virus (content disarm) detected.
high Use the high level score for virus (content disarm) detected.
critical Use the critical level score for virus (content disarm) detected.
malware-list Threat weight score for virus (malware list) detected. option - medium
Option Description
disable Disable threat weight scoring for virus (malware list) detected.
low Use the low level score for virus (malware list) detected.
medium Use the medium level score for virus (malware list) detected.
high Use the high level score for virus (malware list) detected.
critical Use the critical level score for virus (malware list) detected.
ems-threat-feed Threat weight score for virus (EMS threat feed) option - medium
detected.
Option Description
disable Disable threat weight scoring for virus (EMS threat feed) detected.
low Use the low level score for virus (EMS threat feed) detected.
medium Use the medium level score for virus (EMS threat feed) detected.
Option Description
high Use the high level score for virus (EMS threat feed) detected.
critical Use the critical level score for virus (EMS threat feed) detected.
Option Description
low Use the low level score for FortiSandbox malicious malware detected.
medium Use the medium level score for FortiSandbox malicious malware
detected.
high Use the high level score for FortiSandbox malicious malware detected.
critical Use the critical level score for FortiSandbox malicious malware detected.
fsa-high-risk Threat weight score for FortiSandbox high risk option - high
malware detected.
Option Description
disable Disable threat weight scoring for FortiSandbox high risk malware
detected.
low Use the low level score for FortiSandbox high risk malware detected.
medium Use the medium level score for FortiSandbox high risk malware detected.
high Use the high level score for FortiSandbox high risk malware detected.
critical Use the critical level score for FortiSandbox high risk malware detected.
fsa-medium-risk Threat weight score for FortiSandbox medium risk option - medium
malware detected.
Option Description
disable Disable threat weight scoring for FortiSandbox medium risk malware
detected.
low Use the low level score for FortiSandbox medium risk malware detected.
medium Use the medium level score for FortiSandbox medium risk malware
detected.
high Use the high level score for FortiSandbox medium risk malware detected.
Option Description
critical Use the critical level score for FortiSandbox medium risk malware
detected.
config ips
info-severity Threat weight score for IPS info severity events. option - disable
Option Description
disable Disable threat weight scoring for IPS info severity events.
low Use the low level score for IPS info severity events.
medium Use the medium level score for IPS info severity events.
high Use the high level score for IPS info severity events.
critical Use the critical level score for IPS info severity events.
low-severity Threat weight score for IPS low severity events. option - low
Option Description
disable Disable threat weight scoring for IPS low severity events.
low Use the low level score for IPS low severity events.
medium Use the medium level score for IPS low severity events.
high Use the high level score for IPS low severity events.
critical Use the critical level score for IPS low severity events.
medium- Threat weight score for IPS medium severity events. option - medium
severity
Option Description
disable Disable threat weight scoring for IPS medium severity events.
low Use the low level score for IPS medium severity events.
medium Use the medium level score for IPS medium severity events.
high Use the high level score for IPS medium severity events.
critical Use the critical level score for IPS medium severity events.
high-severity Threat weight score for IPS high severity events. option - high
Option Description
disable Disable threat weight scoring for IPS high severity events.
low Use the low level score for IPS high severity events.
medium Use the medium level score for IPS high severity events.
high Use the high level score for IPS high severity events.
critical Use the critical level score for IPS high severity events.
critical- Threat weight score for IPS critical severity events. option - critical
severity
Option Description
disable Disable threat weight scoring for IPS critical severity events.
low Use the low level score for IPS critical severity events.
medium Use the medium level score for IPS critical severity events.
high Use the high level score for IPS critical severity events.
critical Use the critical level score for IPS critical severity events.
config web
category Threat weight score for web category filtering matches. integer Minimum 0
value: 0
Maximum
value: 255
level Threat weight score for web category filtering matches. option - low
Option Description
disable Disable threat weight scoring for web category filtering matches.
low Use the low level score for web category filtering matches.
medium Use the medium level score for web category filtering matches.
high Use the high level score for web category filtering matches.
critical Use the critical level score for web category filtering matches.
Option Description
config application
Option Description
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
config custom-field-name
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
config custom-field-name
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
config custom-field-name
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
config custom-field-name
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
max-size Maximum amount of memory that can be used for integer Minimum 31870197 **
memory logging in bytes. value: 0
Maximum
value:
4294967295
Option Description
severity Log every message above and including this severity option - information
level.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sunday Sunday
monday Monday
tuesday Tuesday
wednesday Wednesday
thursday Thursday
friday Friday
saturday Saturday
roll-time Time of day to roll the log file (hh:mm). user Not Specified
diskfull Action to take when disk is full. The system can option - overwrite
overwrite the oldest log messages or stop logging
when the disk is full .
Option Description
overwrite Overwrite the oldest logs when the log disk is full.
upload Enable/disable uploading log files when they are option - disable
rolled.
Option Description
upload- The type of server to upload log files to. Only FTP is option - ftp-server
destination currently supported.
Option Description
uploadip IP address of the FTP server to upload log files to. ipv4- Not Specified 0.0.0.0
address
uploadport TCP port to use for communicating with the FTP integer Minimum 21
server . value: 0
Maximum
value: 65535
source-ip Source IP address to use for uploading disk log ipv4- Not Specified 0.0.0.0
files. address
uploaduser Username required to log into the FTP server to string Not Specified
upload disk log files.
uploadpass Password required to log into the FTP server to password Not Specified
upload disk log files.
uploaddir The remote directory on the FTP server to upload string Not Specified
log files to.
uploadtype Types of log files to upload. Separate multiple option - traffic event
entries with a space. virus
webfilter
IPS
emailfilter
dlp-archive
anomaly
voip dlp
app-ctrl waf
dns ssh ssl
**
Option Description
uploadsched Set the schedule for uploading log files to the FTP option - disable
server .
Option Description
uploadtime Time of day at which log files are uploaded if user Not Specified
uploadsched is enabled (hh:mm or hh).
Option Description
Option Description
Option Description
Configure filters for local disk logging. Use these filters to determine the log messages to record according to severity
and type.
config log disk filter
Description: Configure filters for local disk logging. Use these filters to determine the
log messages to record according to severity and type.
set severity [emergency|alert|...]
set forward-traffic [enable|disable]
set local-traffic [enable|disable]
set multicast-traffic [enable|disable]
set sniffer-traffic [enable|disable]
set ztna-traffic [enable|disable]
set anomaly [enable|disable]
set voip [enable|disable]
config free-style
Description: Free style filters.
edit <id>
set category [traffic|event|...]
set filter {string}
set filter-type [include|exclude]
next
end
end
severity Log to disk every message above and including this option - information
severity level.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
upload-option Configure how log messages are sent to FortiCloud. option - 5-minute
Option Description
store-and-upload Log to the hard disk and then upload logs to FortiCloud.
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiCloud.
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
override Overriding FortiCloud settings for this VDOM or use option - disable
global settings.
Option Description
Option Description
upload-option Configure how log messages are sent to FortiCloud. option - 5-minute
Option Description
store-and-upload Log to the hard disk and then upload logs to FortiCloud.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable statistics collection for when no external logging destination, such as
FortiAnalyzer, is present (data is not saved).
disable Disable statistics collection for when no external logging destination, such as
FortiAnalyzer, is present (data is not saved).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
source-ip Source IPv4 or IPv6 address used to communicate with string Not
FortiAnalyzer. Specified
upload-option Enable/disable logging to hard disk and then uploading option - 5-minute
to FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
enable Enable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
disable Disable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
source-ip Source IPv4 or IPv6 address used to communicate with string Not
FortiAnalyzer. Specified
upload-option Enable/disable logging to hard disk and then uploading option - 5-minute
to FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
enable Enable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
disable Disable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
Option Description
Option Description
Option Description
severity Log every message above and including this severity option - information
level.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
severity Log every message above and including this severity option - information
level.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
source-ip Source IPv4 or IPv6 address used to communicate with string Not
FortiAnalyzer. Specified
upload-option Enable/disable logging to hard disk and then uploading option - 5-minute
to FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
enable Enable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
disable Disable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
source-ip Source IPv4 or IPv6 address used to communicate with string Not
FortiAnalyzer. Specified
upload-option Enable/disable logging to hard disk and then uploading option - 5-minute
to FortiAnalyzer.
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
config rule
action Permit or deny this IP address and netmask prefix. option - permit
Option Description
prefix IPv4 prefix to define regular filter criteria, such as "any" user Not
or subnets. Specified
Option Description
config rule
action Permit or deny this IP address and netmask prefix. option - permit
Option Description
prefix6 IPv6 prefix to define regular filter criteria, such as user Not Specified
"any" or subnets.
Option Description
config rule
Option Description
action Permit or deny this IP address and netmask prefix. option - permit
Option Description
prefix IPv4 prefix to define regular filter criteria, such as "any" user Not 0.0.0.0
or subnets. Specified 0.0.0.0
action Permit or deny packets that match this rule. option - permit
Option Description
prefix6 IPv6 prefix to define regular filter criteria, such as user Not Specified
"any" or subnets.
Configure key-chain.
config router key-chain
Description: Configure key-chain.
edit <name>
config key
Description: Configuration method to edit key settings.
edit <id>
set accept-lifetime {user}
set send-lifetime {user}
set key-string {password}
set algorithm [md5|hmac-sha1|...]
next
end
next
end
Option Description
md5 MD5.
hmac-sha1 HMAC-SHA1.
hmac-sha256 HMAC-SHA256.
hmac-sha384 HMAC-SHA384.
hmac-sha512 HMAC-SHA512.
Option Description
config rule
Option Description
config rule
Option Description
permit Permit.
deny Deny.
Option Description
Option Description
none None.
match-ip-nexthop Match next hop IP address passed by access-list string Not Specified
or prefix-list.
match-ip6- Match next hop IPv6 address passed by access- string Not Specified
nexthop list6 or prefix-list6.
Option Description
Option Description
prepend Prepend.
replace Replace.
Option Description
Option Description
Option Description
Option Description
none None.
Configure RIP.
config router rip
Description: Configure RIP.
set default-information-originate [enable|disable]
set default-metric {integer}
set max-out-metric {integer}
config distance
Description: Distance.
edit <id>
set prefix {ipv4-classnet-any}
set distance {integer}
set access-list {string}
next
end
config distribute-list
Description: Distribute list.
edit <id>
set status [enable|disable]
set direction [in|out]
set listname {string}
set interface {string}
next
end
config neighbor
Description: Neighbor.
edit <id>
set ip {ipv4-address}
next
end
config network
Description: Network.
edit <id>
set prefix {ipv4-classnet}
next
end
config offset-list
Description: Offset list.
edit <id>
set status [enable|disable]
Option Description
max-out- Maximum metric allowed to output(0 means 'not set'). integer Minimum 0
metric value: 0
Maximum
value: 15
Option Description
1 Version 1.
2 Version 2.
config distance
Option Description
Option Description
config neighbor
config network
config offset-list
Option Description
Option Description
config redistribute
Option Description
config interface
Option Description
none None.
text Text.
md5 MD5.
Option Description
1 Version 1.
2 Version 2.
Option Description
1 Version 1.
2 Version 2.
Option Description
Option Description
Option Description
poisoned Poisoned.
regular Regular.
Configure RIPng.
config router ripng
Description: Configure RIPng.
set default-information-originate [enable|disable]
set default-metric {integer}
set max-out-metric {integer}
config distance
Description: Distance.
edit <id>
set distance {integer}
set prefix6 {ipv6-prefix}
set access-list6 {string}
next
end
config distribute-list
Description: Distribute list.
edit <id>
set status [enable|disable]
set direction [in|out]
set listname {string}
set interface {string}
next
end
config neighbor
Description: Neighbor.
edit <id>
set ip6 {ipv6-address}
set interface {string}
next
end
config network
Description: Network.
edit <id>
set prefix {ipv6-prefix}
next
end
config aggregate-address
Description: Aggregate address.
edit <id>
set prefix6 {ipv6-prefix}
next
end
config offset-list
Description: Offset list.
edit <id>
Option Description
max-out- Maximum metric allowed to output(0 means 'not set'). integer Minimum 0
metric value: 0
Maximum
value: 15
config distance
config distribute-list
Option Description
Option Description
config neighbor
config network
config aggregate-address
config offset-list
Option Description
Option Description
config redistribute
Option Description
config interface
Option Description
Option Description
poisoned Poisoned.
regular Regular.
Option Description
dst Destination IP and mask for this route. ipv4- Not Specified 0.0.0.0
classnet 0.0.0.0
src Source prefix for this route. ipv4- Not Specified 0.0.0.0
classnet 0.0.0.0
Option Description
Option Description
internet- Application name in the Internet service custom string Not Specified
service- database.
custom
Option Description
enable Keep this static route when link monitor or health check is down.
disable Withdraw this static route when link monitor or health check is down. (default)
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
dynamic- Enable use of dynamic gateway retrieved from Router option - disable
gateway Advertisement (RA).
Option Description
Option Description
enable Keep this static route when link monitor or health check is down.
disable Withdraw this static route when link monitor or health check is down. (default)
Option Description
Configure OSPF.
config router ospf
Description: Configure OSPF.
set abr-type [cisco|ibm|...]
set auto-cost-ref-bandwidth {integer}
set distance-external {integer}
Option Description
cisco Cisco.
ibm IBM.
shortcut Shortcut.
standard Standard.
Option Description
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
Option Description
Option Description
Option Description
Option Description
config area
Option Description
Option Description
none None.
text Text.
Option Description
candidate Candidate.
never Never.
always Always.
Option Description
no-summary No summary.
summary Summary.
Option Description
regular Regular.
nssa NSSA.
stub Stub.
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
config range
Option Description
Option Description
config virtual-link
Option Description
none None.
text Text.
config md5-keys
config md5-keys
config filter-list
Option Description
in In.
out Out.
Option Description
none None.
text Text.
cost Cost of the interface, value range from 0 to 65535, 0 integer Minimum 0
means auto-cost. value: 0
Maximum
value:
65535
Option Description
Option Description
Option Description
broadcast Broadcast.
Option Description
non-broadcast Non-broadcast.
point-to-point Point-to-point.
point-to- Point-to-multipoint.
multipoint
Option Description
Option Description
config md5-keys
config md5-keys
config neighbor
cost Cost of the interface, value range from 0 to 65535, 0 integer Minimum 0
means auto-cost. value: 0
Maximum
value:
65535
config summary-address
Option Description
config distribute-list
Option Description
config redistribute
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
cisco Cisco.
ibm IBM.
standard Standard.
auto-cost-ref- Reference bandwidth in terms of megabits per second. integer Minimum 1000
bandwidth value: 1
Maximum
value:
1000000
Option Description
Option Description
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
Option Description
Option Description
config area
Option Description
candidate Candidate.
never Never.
Option Description
always Always.
Option Description
no-summary No summary.
summary Summary.
Option Description
regular Regular.
nssa NSSA.
stub Stub.
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
Option Description
ah Authentication Header.
Option Description
md5 MD5.
sha1 SHA1.
sha256 SHA256.
sha384 SHA384.
sha512 SHA512.
Option Description
null No encryption.
des DES.
3des 3DES.
aes128 AES128.
aes192 AES192.
aes256 AES256.
config ipsec-keys
config range
Option Description
disable disable
enable enable
config virtual-link
Option Description
ah Authentication Header.
Option Description
md5 MD5.
sha1 SHA1.
sha256 SHA256.
sha384 SHA384.
sha512 SHA512.
Option Description
null No encryption.
des DES.
3des 3DES.
aes128 AES128.
aes192 AES192.
aes256 AES256.
config ipsec-keys
config ipsec-keys
config ospf6-interface
cost Cost of the interface, value range from 0 to 65535, 0 integer Minimum 0
means auto-cost. value: 0
Maximum
value:
65535
Option Description
Option Description
broadcast broadcast
point-to-point point-to-point
non-broadcast non-broadcast
point-to- point-to-multipoint
multipoint
Option Description
Option Description
Option Description
Option Description
ah Authentication Header.
Option Description
md5 MD5.
sha1 SHA1.
sha256 SHA256.
sha384 SHA384.
sha512 SHA512.
Option Description
null No encryption.
des DES.
3des 3DES.
aes128 AES128.
aes192 AES192.
aes256 AES256.
config ipsec-keys
config ipsec-keys
cost Cost of the interface, value range from 0 to 65535, 0 integer Minimum 0
means auto-cost. value: 0
Maximum
value:
65535
config redistribute
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
disable disable
enable enable
Configure BGP.
config router bgp
Description: Configure BGP.
set as {user}
set router-id {ipv4-address-any}
set keepalive-timer {integer}
set holdtime-timer {integer}
set always-compare-med [enable|disable]
set bestpath-as-path-ignore [enable|disable]
set bestpath-cmp-confed-aspath [enable|disable]
set bestpath-cmp-routerid [enable|disable]
set bestpath-med-confed [enable|disable]
set bestpath-med-missing-as-worst [enable|disable]
set client-to-client-reflection [enable|disable]
set dampening [enable|disable]
set deterministic-med [enable|disable]
set ebgp-multipath [enable|disable]
set ibgp-multipath [enable|disable]
set enforce-first-as [enable|disable]
set fast-external-failover [enable|disable]
set log-neighbour-changes [enable|disable]
set network-import-check [enable|disable]
set ignore-optional-capability [enable|disable]
set additional-path [enable|disable]
set additional-path6 [enable|disable]
set additional-path-vpnv4 [enable|disable]
set multipath-recursive-distance [enable|disable]
set recursive-next-hop [enable|disable]
set recursive-inherit-priority [enable|disable]
set tag-resolve-mode [disable|preferred|...]
set cluster-id {ipv4-address-any}
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
preferred Use tag-match if a BGP route resolution with another route containing the
same tag is successful.
merge Merge tag-match with best-match if they are using different routes. The
result will exclude the next hops of tag-match whose interfaces have
appeared in best-match.
distance-internal Distance for routes internal to the AS. integer Minimum 200
value: 1
Maximum
value: 255
distance-local Distance for routes local to the AS. integer Minimum 200
value: 1
Maximum
value: 255
Option Description
Option Description
graceful-restart- Time needed for neighbors to restart (sec). integer Minimum 120
time value: 1
Maximum
value: 3600
graceful- Time to hold stale paths of restarting neighbor integer Minimum 360
stalepath-time (sec). value: 1
Maximum
value: 3600
Option Description
config aggregate-address
Option Description
summary-only Enable/disable filter more specific routes from updates. option - disable
Option Description
Option Description
summary-only Enable/disable filter more specific routes from updates. option - disable
Option Description
config neighbor
Option Description
Option Description
Option Description
as-path AS path.
med MED.
Option Description
as-path AS path.
med MED.
Option Description
as-path AS path.
med MED.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
none None.
Option Description
none None.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
default-originate- Route map to specify criteria to originate IPv4 string Not Specified
routemap default.
default-originate- Route map to specify criteria to originate IPv6 string Not Specified
routemap6 default.
distribute-list-in Filter for IPv4 updates from this neighbor. string Not Specified
distribute-list-in6 Filter for IPv6 updates from this neighbor. string Not Specified
distribute-list-in- Filter for VPNv4 updates from this neighbor. string Not Specified
vpnv4
distribute-list-out Filter for IPv4 updates to this neighbor. string Not Specified
distribute-list-out6 Filter for IPv6 updates to this neighbor. string Not Specified
distribute-list-out- Filter for VPNv4 updates to this neighbor. string Not Specified
vpnv4
ebgp-multihop-ttl EBGP multihop TTL for this peer. integer Minimum 255
value: 1
Maximum
value: 255
filter-list-in BGP filter for IPv4 inbound routes. string Not Specified
filter-list-in6 BGP filter for IPv6 inbound routes. string Not Specified
filter-list-out BGP filter for IPv4 outbound routes. string Not Specified
filter-list-out6 BGP filter for IPv6 outbound routes. string Not Specified
Option Description
Option Description
Option Description
prefix-list-in IPv4 Inbound filter for updates from this string Not Specified
neighbor.
prefix-list-in6 IPv6 Inbound filter for updates from this string Not Specified
neighbor.
prefix-list-in-vpnv4 Inbound filter for VPNv4 updates from this string Not Specified
neighbor.
prefix-list-out IPv4 Outbound filter for updates to this string Not Specified
neighbor.
prefix-list-out6 IPv6 Outbound filter for updates to this string Not Specified
neighbor.
prefix-list-out- Outbound filter for VPNv4 updates to this string Not Specified
vpnv4 neighbor.
Option Description
Option Description
route-map-out- IPv4 outbound route map filter if the peer is string Not Specified
preferable preferred.
route-map-out6- IPv6 outbound route map filter if the peer is string Not Specified
preferable preferred.
route-map-out- VPNv4 outbound route map filter if the peer is string Not Specified
vpnv4-preferable preferred.
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
holdtime-timer Interval (sec) before peer considered dead. integer Minimum 4294967295
value: 3
Maximum
value: 65535
Option Description
Option Description
Option Description
config conditional-advertise
Option Description
config conditional-advertise6
Option Description
Option Description
Option Description
Option Description
as-path AS path.
med MED.
Option Description
as-path AS path.
med MED.
Option Description
as-path AS path.
med MED.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
none None.
Option Description
none None.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
default-originate- Route map to specify criteria to originate IPv4 string Not Specified
routemap default.
default-originate- Route map to specify criteria to originate IPv6 string Not Specified
routemap6 default.
distribute-list-in Filter for IPv4 updates from this neighbor. string Not Specified
distribute-list-in6 Filter for IPv6 updates from this neighbor. string Not Specified
distribute-list-in- Filter for VPNv4 updates from this neighbor. string Not Specified
vpnv4
distribute-list-out Filter for IPv4 updates to this neighbor. string Not Specified
distribute-list-out6 Filter for IPv6 updates to this neighbor. string Not Specified
distribute-list-out- Filter for VPNv4 updates to this neighbor. string Not Specified
vpnv4
ebgp-multihop-ttl EBGP multihop TTL for this peer. integer Minimum 255
value: 1
Maximum
value: 255
filter-list-in BGP filter for IPv4 inbound routes. string Not Specified
filter-list-in6 BGP filter for IPv6 inbound routes. string Not Specified
filter-list-out BGP filter for IPv4 outbound routes. string Not Specified
filter-list-out6 BGP filter for IPv6 outbound routes. string Not Specified
interface Specify outgoing interface for peer connection. string Not Specified
For IPv6 peer, the interface should have link-
local address.
Option Description
Option Description
Option Description
prefix-list-in IPv4 Inbound filter for updates from this string Not Specified
neighbor.
prefix-list-in6 IPv6 Inbound filter for updates from this string Not Specified
neighbor.
prefix-list-in-vpnv4 Inbound filter for VPNv4 updates from this string Not Specified
neighbor.
prefix-list-out IPv4 Outbound filter for updates to this string Not Specified
neighbor.
prefix-list-out6 IPv6 Outbound filter for updates to this string Not Specified
neighbor.
prefix-list-out- Outbound filter for VPNv4 updates to this string Not Specified
vpnv4 neighbor.
Option Description
Option Description
route-map-out- IPv4 outbound route map filter if the peer is string Not Specified
preferable preferred.
route-map-out6- IPv6 outbound route map filter if the peer is string Not Specified
preferable preferred.
route-map-out- VPNv4 outbound route map filter if the peer is string Not Specified
vpnv4-preferable preferred.
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
holdtime-timer Interval (sec) before peer considered dead. integer Minimum 4294967295
value: 3
Maximum
value: 65535
Option Description
Option Description
Option Description
Option Description
config neighbor-range
config neighbor-range6
config network
Option Description
Option Description
Option Description
Option Description
config redistribute
Option Description
config redistribute6
Option Description
Option Description
config admin-distance
route-list Access list of routes to apply new distance to. string Not
Specified
config vrf
Option Description
ce CE VRF.
pe PE VRF.
interface Interface which is used to leak routes to target VRF. string Not
Specified
config leak-target
interface Interface which is used to leak routes to target VRF. string Not
Specified
Configure IS-IS.
config router isis
Description: Configure IS-IS.
set is-type [level-1-2|level-1|...]
set adv-passive-only [enable|disable]
set adv-passive-only6 [enable|disable]
set auth-mode-l1 [password|md5]
set auth-mode-l2 [password|md5]
set auth-password-l1 {password}
set auth-password-l2 {password}
set auth-keychain-l1 {string}
set auth-keychain-l2 {string}
set auth-sendonly-l1 [enable|disable]
set auth-sendonly-l2 [enable|disable]
set ignore-lsp-errors [enable|disable]
set lsp-gen-interval-l1 {integer}
set lsp-gen-interval-l2 {integer}
set lsp-refresh-interval {integer}
set max-lsp-lifetime {integer}
set spf-interval-exp-l1 {user}
set spf-interval-exp-l2 {user}
set dynamic-hostname [enable|disable]
set adjacency-check [enable|disable]
set adjacency-check6 [enable|disable]
set overload-bit [enable|disable]
set overload-bit-suppress {option1}, {option2}, ...
set overload-bit-on-startup {integer}
set default-originate [enable|disable]
set default-originate6 [enable|disable]
set metric-style [narrow|wide|...]
set redistribute-l1 [enable|disable]
Option Description
Option Description
Option Description
Option Description
password Password.
md5 MD5.
Option Description
password Password.
md5 MD5.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
external External.
interlevel Inter-level.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
redistribute6-l1- Access-list for IPv6 route redistribution from l1 to l2. string Not
list Specified
Option Description
redistribute6-l2- Access-list for IPv6 route redistribution from l2 to l1. string Not
list Specified
config isis-net
config isis-interface
Option Description
Option Description
Option Description
broadcast Broadcast.
point-to-point Point-to-point.
loopback Loopback.
Option Description
level-1 Level 1.
level-2 Level 2.
Option Description
Option Description
Option Description
Option Description
md5 MD5.
password Password.
Option Description
md5 MD5.
password Password.
Option Description
config summary-address
Option Description
level-1 Level 1.
level-2 Level 2.
config summary-address6
Option Description
level-1 Level 1.
level-2 Level 2.
Option Description
enable Enable.
disable Disable.
Option Description
external External.
internal Internal.
Option Description
level-1 Level 1.
level-2 Level 2.
config redistribute6
Option Description
Option Description
Option Description
level-1 Level 1.
level-2 Level 2.
Configure multicast-flow.
config router multicast-flow
Description: Configure multicast-flow.
edit <name>
set comments {string}
config flows
Description: Multicast-flow entries.
edit <id>
set group-addr {ipv4-address-any}
set source-addr {ipv4-address-any}
next
end
next
end
Option Description
config pim-sm-global
message- Period of time between sending periodic PIM join/prune integer Minimum 60
interval messages in seconds . value: 1
Maximum
value:
65535
Option Description
bsr-allow- Enable/disable accept BSR quick refresh packets from option - disable
quick-refresh neighbors.
Option Description
cisco-register- Checksum entire register packet(for old Cisco IOS option - disable
checksum compatibility).
Option Description
Option Description
cisco-ignore- Use only hash for RP selection (compatibility with old option - disable
rp-set-priority Cisco IOS).
Option Description
Option Description
Option Description
Option Description
Option Description
register-rate- Limit of packets/sec per source registered through this integer Minimum 0
limit RP . value: 0
Maximum
value:
65535
config rp-address
config interface
Option Description
sparse-mode sparse-mode
dense-mode dense-mode
Option Description
Option Description
cisco-exclude- Exclude GenID from hello packets (compatibility with option - disable
genid old Cisco IOS).
Option Description
Option Description
static-group Statically set multicast groups to forward out. string Not Specified
rpf-nbr-fail- Enable/disable fail back for RPF neighbor query. option - disable
back
Option Description
rpf-nbr-fail- Filter for fail back RPF neighbors. string Not Specified
back-filter
config igmp
Option Description
1 Version 1.
last-member- Timeout between IGMPv2 leave and removing group . integer Minimum 1000
query-interval value: 1
Maximum
value:
65535
query-max- Maximum time to wait for a IGMP query response . integer Minimum 10
response- value: 1
time Maximum
value: 25
query-timeout Timeout between queries before becoming querying integer Minimum 255
unit for network . value: 60
Maximum
value: 900
Option Description
Option Description
Option Description
config interface
hello-holdtime Time before old neighbor information expires in seconds integer Minimum
. value: 1
Maximum
value:
65535
register-rate- Limit of packets/sec per source registered through this integer Minimum 0
limit RP (0 means unlimited). value: 0
Maximum
value:
65535
config rp-address
end
end
Configure BFD.
config router bfd
Description: Configure BFD.
config neighbor
Description: Neighbor.
edit <ip>
set interface {string}
next
end
config multihop-template
Description: BFD multi-hop template table.
edit <id>
set src {ipv4-classnet}
set dst {ipv4-classnet}
set bfd-desired-min-tx {integer}
set bfd-required-min-rx {integer}
set bfd-detect-mult {integer}
set auth-mode [none|md5]
set md5-key {password}
config neighbor
config multihop-template
bfd-desired- BFD desired minimal transmit interval (milliseconds). integer Minimum 250
min-tx value: 100
Maximum
value:
30000
bfd-required- BFD required minimal receive interval (milliseconds). integer Minimum 250
min-rx value: 100
Maximum
value:
30000
Option Description
none None.
config neighbor
config multihop-template
bfd-desired- BFD desired minimal transmit interval (milliseconds). integer Minimum 250
min-tx value: 100
Maximum
value:
30000
bfd-required- BFD required minimal receive interval (milliseconds). integer Minimum 250
min-rx value: 100
Maximum
value:
30000
Option Description
none None.
config ppid-filters
Option Description
Option Description
sftp SFTP.
Option Description
scp SCP.
Option Description
sftp SFTP.
scp SCP.
Option Description
config shell-commands
Option Description
action Action to take for SSH shell command matches. option - block
Option Description
Option Description
Option Description
Option Description
Option Description
guaranteed- Guaranteed burst size in bytes (max value = integer Minimum 45000
burst 4294967295). value: 0
Maximum
value:
4294967295
maximum- Maximum burst size in bytes (max value = integer Minimum 67500
burst 4294967295). value: 0
Maximum
value:
4294967295
Option Description
link-down- Clear NAC and dynamic devices on switch ports on link option - enable
flush down event.
Option Description
disable Disable clearing NAC and dynamic devices on a switch port when link down
event happens.
enable Enable clearing NAC and dynamic devices on a switch port when link down
event happens.
config nac-ports
onboarding- Default NAC Onboarding VLAN when NAC devices are string Not
vlan discovered. Specified
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
guest-vlan Enable the guest VLAN feature to allow limited access option - disable
to non-802.1X-compliant clients.
Option Description
auth-fail-vlan Enable to allow limited access to clients that cannot option - disable
authenticate.
Option Description
Option Description
disable Disable the capability to apply the EAP/MAB frame VLAN to the port native
VLAN.
enable Enable the capability to apply the EAP/MAB frame VLAN to the port native
VLAN.
radius- Enable to override the global RADIUS session timeout. option - disable
timeout-
overwrite
Option Description
Option Description
Option Description
Configure allowaccess list for mgmt and internal interfaces on managed FortiSwitch units.
config switch-controller security-policy local-access
mgmt- Allowed access on the switch management interface. option - https ping
allowaccess ssh
Option Description
internal- Allowed access on the switch internal interface. option - https ping
allowaccess ssh
Option Description
country The two-letter ISO 3166 country code in capital ASCII string Not
letters eg. US, CA, DK, DE. Specified
config coordinates
altitude Plus or minus floating point number. For example, string Not
117.47. Specified
Option Description
Option Description
latitude Floating point starting with +/- or ending with (N or S). string Not
For example, +/-16.67 or 16.67N. Specified
longitude Floating point starting with +/- or ending with (N or S). string Not
For example, +/-26.789 or 26.789E. Specified
config elin-number
tx-hold Number of tx-intervals before local LLDP data expires integer Minimum 4
. Packet TTL is tx-hold * tx-interval. value: 1
Maximum
value: 16
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config med-network-policy
Option Description
enable Transmit this TLV if a VLAN has been addded to the port.
Option Description
config med-location-service
Option Description
config custom-tlvs
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config map
Option Description
EF DSCP EF.
Option Description
Option Description
flash Flash.
immediate Immediate.
priority Priority.
routine Routine.
Option Description
Option Description
config cos-queue
Option Description
Option Description
Option Description
override Override global and switch level storm control to use port level configuration.
disabled Disable storm control on the port entirely overriding global and switch level
storm control.
rate Threshold rate in packets per second at which storm integer Minimum 500
traffic is controlled in override mode . value: 0
Maximum
value:
10000000
Option Description
enable Enable storm control for unknown unicast traffic to drop packets which exceed
configured rate limits.
disable Disable storm control for unknown unicast traffic to allow all packets.
Option Description
enable Enable storm control for unknown multicast traffic to drop packets which
exceed configured rate limits.
disable Disable storm control for unknown multicast traffic to allow all packets.
Option Description
enable Enable storm control for broadcast traffic to drop packets which exceed
configured rate limits.
disable Disable storm control for broadcast traffic to allow all packets.
Policy definitions which can define the behavior on auto configured interfaces.
config switch-controller auto-config policy
Description: Policy definitions which can define the behavior on auto configured
interfaces.
edit <name>
set qos-policy {string}
set storm-control-policy {string}
set poe-status [enable|disable]
set igmp-flood-report [enable|disable]
set igmp-flood-traffic [enable|disable]
next
end
Option Description
Option Description
Option Description
Policies which can override the 'default' for specific ISL/ICL/FortiLink interface.
config switch-controller auto-config custom
Description: Policies which can override the 'default' for specific ISL/ICL/FortiLink
interface.
edit <name>
config switch-binding
Description: Switch binding list.
edit <switch-id>
set policy {string}
next
end
next
end
config switch-binding
Option Description
Option Description
Option Description
default-vlan Default VLAN (native) assigned to all switch ports string Not _default
upon discovery. Specified
nac-segment VLAN for NAC segment primary interface. string Not nac_segment
Specified
Option Description
Option Description
Option Description
Option Description
Configure the FortiGate switch controller to send custom commands to managed FortiSwitch devices.
config switch-controller custom-command
Description: Configure the FortiGate switch controller to send custom commands to managed
FortiSwitch devices.
edit <command-name>
set description {string}
set command {var-string}
next
end
Option Description
Option Description
Configure VLAN policy to be applied on the managed FortiSwitch ports through dynamic-port-policy.
config switch-controller vlan-policy
Description: Configure VLAN policy to be applied on the managed FortiSwitch ports through
dynamic-port-policy.
edit <name>
set description {string}
set fortilink {string}
set vlan {string}
set allowed-vlans <vlan-name1>, <vlan-name2>, ...
set untagged-vlans <vlan-name1>, <vlan-name2>, ...
set allowed-vlans-all [enable|disable]
set discard-mode [none|all-untagged|...]
next
end
fortilink FortiLink interface for which this VLAN policy belongs to. string Not
Specified
vlan Native VLAN to be applied when using this VLAN policy. string Not
Specified
allowed-vlans Allowed VLANs to be applied when using this VLAN string Maximum
<vlan- policy. length: 79
name> VLAN name.
untagged- Untagged VLANs to be applied when using this VLAN string Maximum
vlans <vlan- policy. length: 79
name> VLAN name.
allowed- Enable/disable all defined VLANs when using this VLAN option - disable
vlans-all policy.
Option Description
discard-mode Discard mode to be applied when using this VLAN option - none
policy.
Option Description
Configure Dynamic port policy to be applied on the managed FortiSwitch ports through DPP device.
config switch-controller dynamic-port-policy
Description: Configure Dynamic port policy to be applied on the managed FortiSwitch ports
through DPP device.
edit <name>
set description {string}
set fortilink {string}
config policy
Description: Port policies with matching criteria and actions.
edit <name>
set description {string}
fortilink FortiLink interface for which this Dynamic port policy string Not
belongs to. Specified
config policy
Option Description
Option Description
interface-tags Match policy based on the FortiSwitch interface object string Maximum
<tag-name> tags. length: 63
FortiSwitch port tag name.
lldp-profile LLDP profile to be applied when using this policy. string Not
Specified
qos-policy QoS policy to be applied when using this policy. string Not
Specified
802-1x 802.1x security policy to be applied when using this string Not
policy. Specified
vlan-policy VLAN policy to be applied when using this policy. string Not
Specified
Option Description
disable Disable bouncing (administratively bring the link down, up) of a switch port
where this policy is applied.
enable Enable bouncing (administratively bring the link down, up) of a switch port
where this policy is applied.
Option Description
Option Description
Option Description
global Use global setting for DHCP snooping server access list.
enable Override global setting and enable DHCP server access list.
disable Override global setting and disable DHCP server access list.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config ports
Option Description
1000full 1G full-duplex
auto Auto-negotiation.
Option Description
Option Description
Option Description
Option Description
Option Description
bandwidth Member selection based on largest total bandwidth of links of similar speed.
Option Description
flap-duration Period over which flap events are calculated integer Minimum 30
(seconds). value: 5
Maximum
value: 300
Option Description
Option Description
Option Description
Option Description
Option Description
matched-dpp- Matched child policy in the dynamic port string Not Specified
policy policy.
matched-dpp- Matched interface tags in the dynamic port string Not Specified
intf-tags policy.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
both Enable flow control for both transmission and receive pause control frames.
Option Description
75% Back pressure state won't be cleared until bucket count falls below 75% of
pause threshold.
50% Back pressure state won't be cleared until bucket count falls below 50% of
pause threshold.
25% Back pressure state won't be cleared until bucket count falls below 25% of
pause threshold.
Option Description
port-policy Switch controller dynamic port policy from string Not Specified
available options.
qos-policy Switch controller QoS policy from available string Not Specified default
options.
storm-control- Switch controller storm control policy from string Not Specified default
policy available options.
Option Description
Option Description
Option Description
Option Description
mode LACP mode: ignore and do not send control option - static
messages, or negotiate 802.3ad aggregation
passively or actively.
Option Description
static Static aggregation, do not send and ignore any control messages.
Option Description
Option Description
Option Description
Option Description
config ip-source-guard
config binding-entry
local-override Enable to configure local STP settings that override option - disable
global STP settings.
Option Description
hello-time Period of time between successive STP frame Bridge integer Minimum 2
Protocol Data Units . value: 1
Maximum
value: 10
forward-time Period of time a port is in listening and learning state . integer Minimum 15
value: 4
Maximum
value: 30
max-age Maximum time before a bridge port saves its integer Minimum 20
configuration BPDU information . value: 6
Maximum
value: 40
max-hops Maximum number of hops between the root bridge and integer Minimum 20
the furthest bridge . value: 1
Maximum
value: 40
config stp-instance
Option Description
0 0.
4096 4096.
8192 8192.
12288 12288.
16384 16384.
20480 20480.
24576 24576.
28672 28672.
32768 32768.
36864 36864.
40960 40960.
45056 45056.
49152 49152.
53248 53248.
57344 57344.
61440 61440.
config snmp-sysinfo
Option Description
config snmp-community
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config hosts
config snmp-user
Option Description
Option Description
Option Description
Option Description
config switch-log
local-override Enable to configure local logging settings that override option - disable
global logging settings.
Option Description
Option Description
severity Severity of FortiSwitch logs that are added to the option - notification
FortiGate event log.
Option Description
config remote-log
Option Description
Option Description
Option Description
Option Description
Option Description
config storm-control
Option Description
rate Rate in packets per second at which storm traffic is integer Minimum 500
controlled . Storm control drops excess traffic data rates value: 1
beyond this threshold. Maximum
value:
10000000
Option Description
Option Description
Option Description
config mirror
Option Description
Option Description
Option Description
config custom-command
config igmp-snooping
Option Description
aging-time Maximum time to retain a multicast snooping entry for integer Minimum 300
which no packets have been seen . value: 15
Maximum
value: 3600
Option Description
config vlans
proxy IGMP snooping proxy for the VLAN interface. option - global
Option Description
global Use global setting for IGMP snooping proxy on VLAN interface.
querier Enable/disable IGMP snooping querier for the VLAN option - disable
interface.
Option Description
config 802-1X-settings
Option Description
Option Description
Option Description
hello-time Period of time between successive STP frame Bridge integer Minimum 2
Protocol Data Units . value: 1
Maximum
value: 10
forward-time Period of time a port is in listening and learning state . integer Minimum 15
value: 4
Maximum
value: 30
max-age Maximum time before a bridge port expires its integer Minimum 20
configuration BPDU information . value: 6
Maximum
value: 40
max-hops Maximum number of hops between the root bridge and integer Minimum 20
the furthest bridge . value: 1
Maximum
value: 40
rate Rate in packets per second at which storm traffic is integer Minimum 500
controlled . Storm control drops excess traffic data rates value: 1
beyond this threshold. Maximum
value:
10000000
Option Description
Option Description
Option Description
mac-aging- Time after which an inactive MAC is aged out . integer Minimum 300
interval value: 10
Maximum
value:
1000000
Option Description
Option Description
Option Description
default-virtual- Default VLAN for ports when added to the virtual- string Not Specified
switch-vlan switch.
Option Description
Option Description
Option Description
enable Enable DNS resolution of the FortiSwitch unit's IP address by use of its serial
number.
disable Disable DNS resolution of the FortiSwitch unit's IP address by use of its serial
number.
Option Description
Option Description
disable Disable bouncing (administratively bring the link down, up) of a switch port
where a quarantined device was seen last.
enable Enable bouncing (administratively bring the link down, up) of a switch port
where a quarantined device was seen last.
Option Description
by-redirect Quarantined device traffic is redirected only to the FortiGate on the received
VLAN.
update-user- Control which sources update the device user list. option - mac-cache
device lldp dhcp-
snooping l2-
db l3-db
Option Description
dhcp-snooping Update from FortiSwitch DHCP snooping client and server databases.
Option Description
Option Description
config custom-command
Option Description
iot-holdoff MAC entry's creation time. Time must be greater than integer Minimum 5
this value for an entry to be created . value: 0
Maximum
value:
10080
iot-mac-idle MAC entry's idle time. MAC entry is removed after this integer Minimum 1440
value . value: 0
Maximum
value:
10080
dynamic- Periodic time interval to run Dynamic port policy integer Minimum 15
periodic- engine . value: 5
interval Maximum
value: 60
Option Description
Configure FortiSwitch logging (logs are transferred to and inserted into FortiGate event log).
config switch-controller switch-log
Description: Configure FortiSwitch logging (logs are transferred to and inserted into
FortiGate event log).
set status [enable|disable]
set severity [emergency|alert|...]
end
Option Description
severity Severity of FortiSwitch logs that are added to the option - notification
FortiGate event log.
Option Description
Option Description
query-interval Maximum time after which IGMP query will be sent . integer Minimum 125
value: 10
Maximum
value: 1200
Option Description
config targets
Option Description
sample-mode Configure sample mode for the flow tracking. option - perimeter
Option Description
local Set local mode which samples on the specific switch port.
perimeter Set perimeter mode which samples on all switch fabric ports and fortilink port
at the ingress.
device-ingress Set device -ingress mode which samples across all switch ports at the ingress.
sample-rate Configure sample rate for the perimeter and integer Minimum value: 512
device-ingress sampling. 0 Maximum
value: 99999
Option Description
Option Description
max-export- Configure flow max export packet size . integer Minimum value: 512
pkt-size 512 Maximum
value: 9216
timeout- Configure flow session general timeout . integer Minimum value: 3600
general 60 Maximum
value: 604800
timeout-icmp Configure flow session ICMP timeout . integer Minimum value: 300
60 Maximum
value: 604800
timeout-max Configure flow session max timeout . integer Minimum value: 604800
60 Maximum
value: 604800
timeout-tcp Configure flow session TCP timeout . integer Minimum value: 3600
60 Maximum
value: 604800
timeout-tcp- Configure flow session TCP FIN timeout . integer Minimum value: 300
fin 60 Maximum
value: 604800
timeout-tcp- Configure flow session TCP RST timeout . integer Minimum value: 120
rst 60 Maximum
value: 604800
timeout-udp Configure flow session UDP timeout . integer Minimum value: 300
60 Maximum
value: 604800
config collectors
Option Description
config aggregates
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config target-mac
config target-ip
config target-port
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Configure MAC policy to be applied on the managed FortiSwitch devices through NAC device.
config switch-controller mac-policy
Description: Configure MAC policy to be applied on the managed FortiSwitch devices
through NAC device.
edit <name>
set description {string}
set fortilink {string}
set vlan {string}
set traffic-policy {string}
set count [disable|enable]
set bounce-port-link [disable|enable]
next
end
fortilink FortiLink interface for which this MAC policy belongs to. string Not
Specified
vlan Ingress traffic VLAN assignment for the MAC address string Not
matching this MAC policy. Specified
traffic-policy Traffic policy to be applied when using this MAC policy. string Not
Specified
Option Description
Option Description
disable Disable bouncing (administratively bring the link down, up) of a switch port
where this mac-policy is applied.
enable Enable bouncing (administratively bring the link down, up) of a switch port
where this mac-policy is applied.
Option Description
english English.
french French.
spanish Spanish.
portuguese Portuguese.
japanese Japanese.
korean Korean.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
DHE Ban the use of cipher suites using authenticated ephemeral DH key
agreement.
ECDHE Ban the use of cipher suites using authenticated ephemeral ECDH key
agreement.
AES Ban the use of cipher suites using either 128 or 256 bit AES.
AESGCM Ban the use of cipher suites using AES in Galois Counter Mode (GCM).
CAMELLIA Ban the use of cipher suites using either 128 or 256 bit CAMELLIA.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
02 (GMT-10:00) Hawaii
03 (GMT-9:00) Alaska
05 (GMT-7:00) Arizona
10 (GMT-6:00) Saskatchewan
74 (GMT-4:00) Caracas
77 (GMT-4:00) Georgetown
15 (GMT-4:00) La Paz
87 (GMT-4:00) Paraguay
16 (GMT-3:00) Santiago
17 (GMT-3:30) Newfoundland
18 (GMT-3:00) Brasilia
Option Description
75 (GMT-3:00) Uruguay
21 (GMT-2:00) Mid-Atlantic
22 (GMT-1:00) Azores
24 (GMT) Monrovia
79 (GMT) Casablanca
78 (GMT+1:00) Namibia
32 (GMT+2:00) Bucharest
33 (GMT+2:00) Cairo
36 (GMT+2:00) Jerusalem
37 (GMT+3:00) Baghdad
83 (GMT+3:00) Moscow
84 (GMT+3:00) Minsk
40 (GMT+3:00) Nairobi
85 (GMT+3:00) Istanbul
41 (GMT+3:30) Tehran
Option Description
43 (GMT+4:00) Baku
44 (GMT+4:30) Kabul
45 (GMT+5:00) Ekaterinburg
48 (GMT+5:45) Kathmandu
52 (GMT+6:30) Rangoon
54 (GMT+7:00) Krasnoyarsk
58 (GMT+8:00) Perth
59 (GMT+8:00) Taipei
61 (GMT+9:00) Yakutsk
62 (GMT+9:30) Adelaide
63 (GMT+9:30) Darwin
64 (GMT+10:00) Brisbane
67 (GMT+10:00) Hobart
68 (GMT+10:00) Vladivostok
69 (GMT+10:00) Magadan
Option Description
73 (GMT+13:00) Nuku'alofa
86 (GMT+13:00) Samoa
76 (GMT+14:00) Kiritimati
Option Description
tos IP TOS.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
diffie-hellman- diffie-hellman-group1-sha1
group1-sha1
diffie-hellman- diffie-hellman-group14-sha1
group14-sha1
diffie-hellman-group- diffie-hellman-group-exchange-sha1
exchange-sha1
diffie-hellman-group- diffie-hellman-group-exchange-sha256
exchange-sha256
curve25519- [email protected]
[email protected]
ecdh-sha2-nistp256 ecdh-sha2-nistp256
ecdh-sha2-nistp384 ecdh-sha2-nistp384
ecdh-sha2-nistp521 ecdh-sha2-nistp521
Option Description
chacha20- [email protected]
[email protected]
aes128-ctr aes128-ctr
aes192-ctr aes192-ctr
aes256-ctr aes256-ctr
arcfour256 arcfour256
arcfour128 arcfour128
aes128-cbc aes128-cbc
3des-cbc 3des-cbc
blowfish-cbc blowfish-cbc
cast128-cbc cast128-cbc
aes192-cbc aes192-cbc
aes256-cbc aes256-cbc
arcfour arcfour
[email protected] [email protected]
aes128- [email protected]
[email protected]
aes256- [email protected]
[email protected]
Option Description
hmac-md5 hmac-md5
hmac-md5- [email protected]
[email protected]
hmac-md5-96 hmac-md5-96
hmac-md5-96- [email protected]
[email protected]
Option Description
hmac-sha1 hmac-sha1
hmac-sha1- [email protected]
[email protected]
hmac-sha2-256 hmac-sha2-256
hmac-sha2-256- [email protected]
[email protected]
hmac-sha2-512 hmac-sha2-512
hmac-sha2-512- [email protected]
[email protected]
hmac-ripemd160 hmac-ripemd160
hmac- [email protected]
[email protected]
hmac-ripemd160- [email protected]
[email protected]
[email protected] [email protected]
[email protected] [email protected]
umac-64- [email protected]
[email protected]
umac-128- [email protected]
[email protected]
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
traffic Proxy re-authentication timeout begins after traffic has not been
received.
absolute Proxy re-authentication timeout begins when the user was first created.
Option Description
Option Description
Option Description
Option Description
Option Description
restricted Send ARPs for the first 8192 addresses in VIP range.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
pass Bypass the antivirus system when memory is low. Antivirus scanning
resumes when the low memory condition is resolved.
off Stop accepting new AV sessions when entering conserve mode, but
continue to process current active sessions.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Admin users must provide a valid certificate when PKI is enabled for
HTTPS admin access.
Option Description
Option Description
Option Description
Option Description
revert Manually save config and revert the config when timeout.
Option Description
Option Description
Option Description
Option Description
Option Description
wireless-controller- Port used for the control integer Minimum value: 5246
port channel in wireless 1024 Maximum
controller mode . value: 49150
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable enable
disable disable
Option Description
enable enable
disable disable
Option Description
Option Description
enable enable
disable disable
Option Description
Option Description
Option Description
disable Disable detection of those special format files when using Data Leak
Protection.
enable Enable detection of those special format files when using Data Leak
Protection.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
yyyy/MM/dd Year/Month/Day.
dd/MM/yyyy Day/Month/Year.
MM/dd/yyyy Month/Day/Year.
yyyy-MM-dd Year-Month-Day.
dd-MM-yyyy Day-Month-Year.
MM-dd-yyyy Month-Day-Year.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable use of the admin-sport setting for the management port.
disable Disable use of the admin-sport setting for the management port.
Option Description
mini Small sized Internet Service database with very limited IP addresses.
Option Description
enable Enable early TCP NPU session in order to guarantee packet order of 3-
way handshake.
disable Disable early TCP NPU session in order to guarantee packet order of 3-
way handshake.
Option Description
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
vpngrp Administrator access to IPsec, SSL, PPTP, and L2TP option - none
VPN.
Option Description
none No access.
Option Description
Option Description
none No access.
wifi Administrator access to the WiFi controller and Switch option - none
controller.
Option Description
none No access.
Option Description
Option Description
Option Description
Option Description
config netgrp-permission
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
config fwgrp-permission
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
config loggrp-permission
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
config utmgrp-permission
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
This command is available for reference model(s) FortiGate 140E-POE, FortiWiFi 61F,
FortiGate 601E, FortiGate 2201E. It is not available for FortiGate VM64.
Option Description
enable Enable IP checksum re-calculation for packets with iph.reserved bit set.
disable Disable IP checksum re-calculation for packets with iph.reserved bit set.
Option Description
traffic-log-only Per-session accounting only for sessions with traffic logging enabled in firewall
policy.
config fp-anomaly
Option Description
trap-to-host Forward IPv4 invalid header version to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid header length to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid packet length to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid TTL field zero to main CPU for processing.
Option Description
Option Description
trap-to-host Forward IPv4 invalid option parsing to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid TCP packet header length to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid TCP packet length to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid TCP packet checksum to main CPU for processing.
udp-plen-err Invalid IPv4 UDP packet minimum length anomalies. option - drop
Option Description
Option Description
trap-to-host Forward IPv4 invalid UDP packet minimum length to main CPU for
processing.
udp-hlen-err Invalid IPv4 UDP packet header length anomalies. option - drop
Option Description
trap-to-host Forward IPv4 invalid UDP header length to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid UDP packet checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid UDP packet length to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid UDP-Lite packet coverage to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid UDP-Lite packet checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid ICMP short packet to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid ICMP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid ESP short packet to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid L4 unknown protocol short packet to main CPU for
processing.
Option Description
Option Description
ipv6-plen- Invalid IPv6 packet payload length zero anomalies. option - drop
zero
Option Description
trap-to-host Forward IPv6 with invalid packet payload length zero to FortiOS.
Option Description
trap-to-host Forward IPv6 with invalid packet extension header ordering to FortiOS.
ipv6-exthdr- Invalid IPv6 packet chain extension header total length option - drop
len-err anomalies.
Option Description
drop Drop IPv6 with invalid packet chain extension header total length.
trap-to-host Forward IPv6 with invalid packet chain extension header total length to
FortiOS.
Option Description
Option Description
vdom VDOM that the software switch belongs to. string Not
Specified
span-dest-port SPAN destination port name. All traffic on the SPAN string Not
source ports is echoed to the SPAN destination port. Specified
span-source-port Physical interface name. Port spanning echoes all string Maximum
<interface- traffic on the SPAN source ports to the SPAN length: 79
name> destination port.
Physical interface name.
member Names of the interfaces that belong to the virtual string Maximum
<interface- switch. length: 79
name> Physical interface name.
Option Description
switch Switch for normal switch functionality (available in NAT mode only).
intra-switch- Allow any traffic between switch interfaces or require option - implicit
policy firewall policies to allow traffic between switch
interfaces.
Option Description
mac-ttl Duration for which MAC addresses are held in the integer Minimum 300
ARP table . value: 300
Maximum
value:
8640000
Option Description
span-direction The direction in which the SPAN port operates, option - both
either: rx, tx, or both.
Option Description
rx Copies only received packets from source SPAN ports to the destination
SPAN port.
tx Copies only transmitted packets from source SPAN ports to the destination
SPAN port.
both Copies both received and transmitted packets from source SPAN ports to
the destination SPAN port.
Option Description
disable Disable.
mandatory Mandatory.
optional Optional.
Option Description
disable Disable.
mandatory Mandatory.
optional Optional.
Option Description
disable Disable.
mandatory Mandatory.
optional Optional.
Option Description
This command is available for reference model(s) FortiGate 140E-POE, FortiWiFi 61F,
FortiGate 601E, FortiGate 2201E. It is not available for FortiGate VM64.
Option Description
extra-init Extra initialization string for USB LTE/WIMAX devices. string Not
Specified
authtype Authentication type for PDP-IP packet data calls. option - none
Option Description
passwd Authentication password for PDP-IP packet data calls. password Not
Specified
apn Login APN string for PDP-IP packet data calls. string Not
Specified
Option Description
redundant Redundant modem operation mode where the modem is used as a backup
interface.
interface The interface that the modem is acting as a redundant string Not
interface for. Specified
Configure interfaces.
config system interface
Description: Configure interfaces.
edit <name>
set vdom {string}
set vrf {integer}
set cli-conn-status {integer}
set fortilink [enable|disable]
set switch-controller-source-ip [outbound|fixed]
set mode [static|dhcp|...]
config client-options
Description: DHCP client options.
edit <id>
set code {integer}
set type [hex|string|...]
set value {string}
set ip {user}
next
end
Option Description
Option Description
Option Description
Option Description
Option Description
disable None.
Option Description
Option Description
Option Description
Option Description
enable Enable addition of classless static routes retrieved from DHCP server.
disable Disable addition of classless static routes retrieved from DHCP server.
management-ip High Availability in-band management IP ipv4- Not Specified 0.0.0.0 0.0.0.0
address of this interface. classnet-
host
ip Interface IPv4 address and subnet mask, ipv4- Not Specified 0.0.0.0 0.0.0.0
syntax: X.X.X.X/24. classnet-
host
Option Description
Option Description
Option Description
detectserver Gateway's ping server for this IP. user Not Specified
Option Description
ping PING.
Option Description
Option Description
Option Description
link-failed-signal Link-failed-signal.
link-down Link-down.
Option Description
soft-restart Soft-restart-on-extender.
hard-restart Hard-restart-on-extender.
reboot Reboot-on-extender.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
substitute-dst- Destination MAC address that all mac- Not Specified 00:00:00:00:00:00
mac packets are sent to from this interface. address
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
trust-ip-1 Trusted host for dedicated management ipv4- Not Specified 0.0.0.0 0.0.0.0
traffic (0.0.0.0/24 for all hosts). classnet-
any
trust-ip-2 Trusted host for dedicated management ipv4- Not Specified 0.0.0.0 0.0.0.0
traffic (0.0.0.0/24 for all hosts). classnet-
any
trust-ip-3 Trusted host for dedicated management ipv4- Not Specified 0.0.0.0 0.0.0.0
traffic (0.0.0.0/24 for all hosts). classnet-
any
trust-ip6-1 Trusted IPv6 host for dedicated ipv6-prefix Not Specified ::/0
management traffic (::/0 for all hosts).
trust-ip6-2 Trusted IPv6 host for dedicated ipv6-prefix Not Specified ::/0
management traffic (::/0 for all hosts).
trust-ip6-3 Trusted IPv6 host for dedicated ipv6-prefix Not Specified ::/0
management traffic (::/0 for all hosts).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
weight Default weight for static routes (if route integer Minimum 0
has no weight configured). value: 0
Maximum
value: 255
Option Description
Option Description
Option Description
Option Description
Option Description
static Use static aggregation, do not send and ignore any LACP messages.
Option Description
Option Description
system-id Define a system ID for the aggregate mac- Not Specified 00:00:00:00:00:00
interface. address
Option Description
Option Description
Option Description
Option Description
Option Description
alias Alias will be displayed with the interface string Not Specified
name to make it easier to distinguish.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
priority-adjust Enable STP negotiation on HA secondary and make priority lower than HA
primary.
Option Description
Option Description
Option Description
vdom Use VDOM Link Layer Discovery Protocol (LLDP) reception configuration
setting.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Block FortiSwitch port-to-port traffic on the VLAN, only permitting traffic to
and from the FortiGate.
switch-controller- Switch controller traffic policy for the string Not Specified
traffic-policy VLAN.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable DHCP snooping verify source MAC for FortiSwitch devices.
disable Disable DHCP snooping verify source MAC for FortiSwitch devices.
Option Description
Option Description
Option Description
default-vlan Default VLAN (native) assigned to all switch ports upon discovery.
Option Description
Option Description
Option Description
tls TLS.
peap PEAP.
config client-options
Option Description
Option Description
Option Description
config vrrp
Option Description
2 VRRP version 2.
3 VRRP version 3.
Option Description
Option Description
vrdst-priority Priority of the virtual router when the virtual router integer Minimum 0
destination becomes unreachable . value: 0
Maximum
value: 254
Option Description
Option Description
config proxy-arp
Option Description
Option Description
Option Description
ping PING.
config dhcp-snooping-server-list
config tagging
config ipv6
Option Description
Option Description
Option Description
ip6-address Primary IPv6 address prefix. Syntax: ipv6-prefix Not Specified ::/0
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx/xxx.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
dhcp6 Use delegated prefix from a DHCPv6 client to form a delegated IPv6 address.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config ip6-prefix-list
Option Description
Option Description
config ip6-delegated-prefix-list
upstream- Name of the interface that provides delegated string Not Specified
interface information.
Option Description
Option Description
Option Description
config dhcp6-iapd-list
prefix-hint DHCPv6 prefix that will be used as a hint to the ipv6- Not Specified ::/0
upstream DHCPv6 server. network
prefix-hint-plt DHCPv6 prefix hint preferred life time (sec), 0 means integer Minimum 604800
unlimited lease time. value: 0
Maximum
value:
4294967295
prefix-hint-vlt DHCPv6 prefix hint valid life time (sec). integer Minimum 2592000
value: 0
Maximum
value:
4294967295
config vrrp6
Option Description
Option Description
Option Description
This command is available for reference model(s) FortiGate 140E-POE, FortiWiFi 61F. It is not
available for FortiGate 601E, FortiGate 2201E, FortiGate VM64.
Option Description
This command is available for reference model(s) FortiGate 140E-POE, FortiWiFi 61F. It is not
available for FortiGate 601E, FortiGate 2201E, FortiGate VM64.
Option Description
Option Description
config port
Option Description
This command is available for reference model(s) FortiGate 140E-POE, FortiWiFi 61F. It is not
available for FortiGate 601E, FortiGate 2201E, FortiGate VM64.
switch-priority STP switch priority; the lower the number the higher the option - 32768
priority (select from 0, 4096, 8192, 12288, 16384,
20480, 24576, 28672, 32768, 36864, 40960, 45056,
49152, 53248, and 57344).
Option Description
0 0
4096 4096
8192 8192
12288 12288
16384 16384
20480 20480
24576 24576
28672 28672
32768 32768
36864 36864
40960 40960
45056 45056
49152 49152
Option Description
53248 53248
57344 57344
Configure password policy for locally defined administrator passwords and IPsec VPN pre-shared keys.
config system password-policy
Description: Configure password policy for locally defined administrator passwords and
IPsec VPN pre-shared keys.
set status [enable|disable]
set apply-to {option1}, {option2}, ...
set minimum-length {integer}
set min-lower-case-letter {integer}
set min-upper-case-letter {integer}
set min-non-alphanumeric {integer}
set min-number {integer}
set min-change-characters {integer}
set expire-status [enable|disable]
set expire-day {integer}
set reuse-password [enable|disable]
end
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Configure SMS server for sending SMS messages to support user authentication.
config system sms-server
Description: Configure SMS server for sending SMS messages to support user
authentication.
edit <name>
set mail-server {string}
next
end
Option Description
Option Description
remote-group User group name used for remote auth. string Not
Specified
Option Description
peer-group Name of peer group defined under config user group string Not
which has PKI members. Used for peer certificate Specified
authentication (for HTTPS admin access).
trusthost1 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost2 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost3 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost4 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost5 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost6 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost7 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost8 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost9 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost10 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
ip6-trusthost1 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost2 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost3 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost4 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost5 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost6 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost7 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost8 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost9 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost10 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
accprofile Access profile for this administrator. Access profiles string Not
control administrator access to FortiGate features. Specified
Option Description
vdom <name> Virtual domain(s) that the administrator can access. string Maximum
Virtual domain name. length: 79
ssh-certificate Select the certificate to be used by the FortiGate for string Not
authentication with an SSH client. Specified
Option Description
vdom-override Enable to use the names of VDOMs provided by the option - disable
remote authentication server to control the VDOMs
that this administrator can access.
Option Description
Option Description
Option Description
Option Description
Option Description
sms-server Send SMS messages using the FortiGuard SMS option - fortiguard
server or a custom server.
Option Description
sms-custom- Custom SMS server to send SMS messages to. string Not
server Specified
Option Description
Option Description
config trusthost
Option Description
vdom <name> Virtual domain(s) that the administrator can access. string Maximum
Virtual domain name. length: 79
vdom <name> Virtual domain(s) that the administrator can access. string Maximum
Virtual domain name. length: 79
Option Description
Option Description
Option Description
profile-based Application and web-filtering are configured using profiles applied to policy
entries.
Option Description
fortiweb Offload HTTP traffic to FortiWeb for Web Application Firewall inspection.
forticache Offload HTTP traffic to FortiCache for external web caching and WAN
optimization.
Option Description
check-all All sessions affected by a firewall policy change are flushed from the session
table. When new packets are recived they are re-evaluated by stateful
inspection and re-added to the session table.
check-new Estabished sessions for changed firewall policies continue without being
affected by the policy configuration change. New sessions are evaluated
according to the new firewall policy configuration.
check-policy- Sessions are managed individually depending on the firewall policy. Some
option sessions may restart. Some may continue.
gateway Transparent mode IPv4 default gateway IP ipv4- Not Specified 0.0.0.0
address. address
manageip6 Transparent mode IPv6 management IP address ipv6-prefix Not Specified ::/0
and netmask.
ip6 IPv6 address prefix for NAT mode. ipv6-prefix Not Specified ::/0
device Interface to use for management access for NAT string Not Specified
mode.
Option Description
bfd-dont- Enable to not enforce verifying the source port of option - disable
enforce-src- BFD Packets.
port
Option Description
Option Description
Option Description
vpn-stats-log Enable/disable periodic VPN log statistics for one or option - ipsec pptp
more types of VPN. Separate names with a space. l2tp ssl
Option Description
ipsec IPsec.
pptp PPTP.
l2tp L2TP.
ssl SSL.
v4-ecmp-mode IPv4 Equal-cost multi-path (ECMP) routing and load option - source-ip-
balancing mode. based
Option Description
source-dest-ip- Select next hop based on both source and destination IPs.
based
Option Description
disable Perform a policy check only the first time the session is received.
Option Description
Option Description
Option Description
Option Description
Option Description
gui-default- Default columns to display for policy lists on GUI. string Maximum
policy-columns Select column name. length: 79
<name>
Option Description
global Use the global LLDP reception configuration for this VDOM.
Option Description
global Use the global LLDP transmission configuration for this VDOM.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Allow SIP session helper to create an expectation for port 5060.
disable Prevent SIP session helper from creating an expectation for port 5060.
Option Description
enable Record the original SIP source IP address when NAT is used.
disable Do not record the original SIP source IP address when NAT is used.
Option Description
Option Description
sip-tcp-port TCP port the SIP proxy monitors for SIP traffic . integer Minimum 5060
value: 1
Maximum
value: 65535
sip-udp-port UDP port the SIP proxy monitors for SIP traffic . integer Minimum 5060
value: 1
Maximum
value: 65535
sip-ssl-port TCP port the SIP proxy monitors for SIP SSL/TLS integer Minimum 5061
traffic . value: 0
Maximum
value: 65535
sccp-port TCP port the SCCP proxy monitors for SCCP traffic integer Minimum 2000
. value: 0
Maximum
value: 65535
Option Description
Option Description
Option Description
enable Allowing multicast traffic through the FortiGate without creating a multicast
firewall policy.
disable Require a multicast policy to allow multicast traffic to pass through the
FortiGate.
Option Description
Option Description
Option Description
default-voip- Configure how the FortiGate handles VoIP traffic option - proxy-
alg-mode when a policy that accepts the traffic doesn't include based
a VoIP profile.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
location-id Local location ID in the form of an IPv4 address. ipv4- Not Specified 0.0.0.0
address
Option Description
Option Description
Option Description
with-space Format IKE ASN.1 Distinguished Names with spaces between attribute
names and values.
no-space Format IKE ASN.1 Distinguished Names without spaces between attribute
names and values.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
gui-enforce- Enforce change summaries for select tables in the option - require
change- GUI.
summary
Option Description
Option Description
Option Description
Option Description
Option Description
config system ha
Configure HA.
config system ha
Description: Configure HA.
set group-id {integer}
set group-name {string}
set mode [standalone|a-a|...]
set sync-packet-balance [enable|disable]
set password {password}
set key {password}
set hbdev {user}
set session-sync-dev {user}
set route-ttl {integer}
set route-wait {integer}
set route-hold {integer}
set multicast-ttl {integer}
set load-balance-all [enable|disable]
set sync-config [enable|disable]
set encryption [enable|disable]
set authentication [enable|disable]
set hb-interval {integer}
set hb-interval-in-milliseconds [100ms|10ms]
set hb-lost-threshold {integer}
set hello-holddown {integer}
set gratuitous-arps [enable|disable]
set arps {integer}
set arps-interval {integer}
set session-pickup [enable|disable]
set session-pickup-connectionless [enable|disable]
set session-pickup-expectation [enable|disable]
set session-pickup-nat [enable|disable]
set session-pickup-delay [enable|disable]
set link-failed-signal [enable|disable]
set uninterruptible-upgrade [enable|disable]
set uninterruptible-primary-wait {integer}
set standalone-mgmt-vdom [enable|disable]
set ha-mgmt-status [enable|disable]
config ha-mgmt-interfaces
Description: Reserve interfaces to manage individual cluster units.
edit <id>
group-name Cluster group name. Must be the same for all string Not Specified
members.
mode HA mode. Must be the same for all members. option - standalone
FGSP requires standalone.
Option Description
Option Description
password Cluster password. Must be the same for all password Not Specified
members.
hbdev Heartbeat interfaces. Must be the same for all user Not Specified
members. Enter <interface> <priority> pairs to
specify the priority of each heartbeat interface.
Higher priority takes precedence.
route-wait Time to wait before sending new routes to the integer Minimum 0
cluster . value: 0
Maximum
value: 3600
Option Description
Option Description
Option Description
Option Description
Option Description
hello-holddown Time to wait before changing from hello to work integer Minimum 20
state . value: 5
Maximum
value: 300
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
link-failed-signal Enable to shut down all interfaces for 1 sec after option - disable
a failover. Use if gratuitous ARPs do not update
network.
Option Description
Option Description
Option Description
Option Description
ha-eth-type HA heartbeat packet Ethertype (4-digit hex). string Not Specified 8890
l2ep-eth-type Telnet session HA heartbeat packet Ethertype string Not Specified 8893
(4-digit hex).
ha-uptime-diff- Normally you would only reduce this value for integer Minimum 300
margin failover testing. value: 1
Maximum
value: 65535
Option Description
Option Description
schedule Type of A-A load balancing. Use none if you option - round-robin
have external load balancers.
Option Description
none None.
random Random.
ip IP.
ipport IP port.
weight Weight-round-robin weight for each cluster unit. user Not Specified 0 40
Syntax <priority> <weight>.
cpu-threshold Dynamic weighted load balancing CPU usage user Not Specified
weight and high and low thresholds.
http-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of HTTP proxy sessions.
ftp-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of FTP proxy sessions.
imap-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of IMAP proxy sessions.
nntp-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of NNTP proxy sessions.
pop3-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of POP3 proxy sessions.
smtp-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of SMTP proxy sessions.
override Enable and increase the priority of the unit that option - disable
should always be primary (master).
Option Description
priority Increase the priority to select the primary unit . integer Minimum 128
value: 0
Maximum
value: 255
monitor Interfaces to check for port monitoring (or link user Not Specified
failure).
Option Description
enable Enable force reset of secondary member after PING server failure.
disable Disable force reset of secondary member after PING server failure.
Option Description
Option Description
Option Description
Option Description
dst Default route destination for reserved HA management ipv4- Not 0.0.0.0
interface. classnet Specified 0.0.0.0
gateway Default route gateway for reserved HA management ipv4- Not 0.0.0.0
interface. address Specified
config vcluster
override Enable and increase the priority of the unit that should option - disable
always be primary (master).
Option Description
priority Increase the priority to select the primary unit . integer Minimum 128
value: 0
Maximum
value: 255
monitor Interfaces to check for port monitoring (or link failure). user Not
Specified
pingserver- Enable to force the cluster to negotiate after a remote IP option - enable
secondary- monitoring failover.
force-reset
Option Description
enable Enable force reset of secondary member after PING server failure.
disable Disable force reset of secondary member after PING server failure.
Configure HA monitor.
config system ha-monitor
Description: Configure HA monitor.
set monitor-vlan [enable|disable]
set vlan-hb-interval {integer}
set vlan-hb-lost-threshold {integer}
end
Option Description
Option Description
Option Description
usage Use hard disk for logging and WAN Optimization. option - log
Option Description
Option Description
default- Default gateway for dedicated management interface. ipv4- Not 0.0.0.0
gateway address Specified
Option Description
Configure DNS.
Option Description
ssl-certificate Name of local certificate for SSL connections. string Not Specified Fortinet_
Factory
dns-cache-limit Maximum number of records in the DNS cache. integer Minimum 5000
value: 0
Maximum
value:
4294967295
dns-cache-ttl Duration in seconds that the DNS cache retains integer Minimum 1800
information. value: 60
Maximum
value: 86400
cache- Enable/disable response from the DNS server when option - disable
notfound- a record is not in cache.
responses
Option Description
source-ip IP address used by the DNS server as its source IP. ipv4- Not Specified 0.0.0.0
address
Option Description
Option Description
alt-primary Alternate primary DNS server. This is not used as a ipv4- Not Specified 0.0.0.0
failover DNS server. address
alt-secondary Alternate secondary DNS server. This is not used ipv4- Not Specified 0.0.0.0
as a failover DNS server. address
Option Description
disable Disable.
Configure DDNS.
config system ddns
Description: Configure DDNS.
edit <ddnsid>
set ddns-server [dyndns.org|dyns.net|...]
set server-type [ipv4|ipv6]
set ddns-server-addr <addr1>, <addr2>, ...
set ddns-zone {string}
set ddns-ttl {integer}
set ddns-auth [disable|tsig]
set ddns-keyname {string}
set ddns-key {password_aes256}
set ddns-domain {string}
set ddns-username {string}
Option Description
dyns.net www.dyns.net
tzo.com rh.tzo.com
dipdns.net dipdnsserver.dipdns.com
now.net.cn ip.todayisp.com
dhs.org members.dhs.org
easydns.com members.easydns.com
noip.com dynupdate.no-ip.com
Option Description
ddns-zone Zone of your domain name (for example, string Not Specified
DDNS.com).
Option Description
ddns-domain Your fully qualified domain name. For example, string Not Specified
yourname.ddns.com.
Option Description
Option Description
Option Description
ssl-certificate Name of local certificate for SSL connections. string Not Specified Fortinet_
Factory
Configure sFlow.
config system sflow
Description: Configure sFlow.
set collector-ip {ipv4-address}
set collector-port {integer}
set source-ip {ipv4-address}
set interface-select-method [auto|sdwan|...]
set interface {string}
end
collector-ip IP address of the sFlow collector that sFlow agents ipv4- Not 0.0.0.0
added to interfaces in this VDOM send sFlow address Specified
datagrams to .
collector-port UDP port number used for sending sFlow datagrams . integer Minimum 6343
value: 0
Maximum
value:
65535
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Configure sFlow per VDOM to add or change the IP address and UDP port that FortiGate sFlow agents in this VDOM
use to send sFlow datagrams to an sFlow collector.
config system vdom-sflow
Description: Configure sFlow per VDOM to add or change the IP address and UDP port that
FortiGate sFlow agents in this VDOM use to send sFlow datagrams to an sFlow
collector.
set vdom-sflow [enable|disable]
set collector-ip {ipv4-address}
set collector-port {integer}
set source-ip {ipv4-address}
set interface-select-method [auto|sdwan|...]
set interface {string}
end
vdom-sflow Enable/disable the sFlow configuration for the current option - disable
VDOM.
Option Description
collector-ip IP address of the sFlow collector that sFlow agents ipv4- Not 0.0.0.0
added to interfaces in this VDOM send sFlow address Specified
datagrams to .
collector-port UDP port number used for sending sFlow datagrams . integer Minimum 6343
value: 0
Maximum
value:
65535
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Configure NetFlow.
config system netflow
Description: Configure NetFlow.
set collector-ip {string}
set collector-port {integer}
set source-ip {string}
set active-flow-timeout {integer}
set inactive-flow-timeout {integer}
set template-tx-timeout {integer}
set template-tx-counter {integer}
set interface-select-method [auto|sdwan|...]
set interface {string}
end
source-ip Source IP address for communication with the NetFlow string Not
agent. Specified
template-tx- Timeout for periodic template flowset transmission . integer Minimum 1800
timeout value: 60
Maximum
value:
86400
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
source-ip Source IP address for communication with the NetFlow string Not
agent. Specified
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
vdom-dns Enable/disable configuring DNS servers for the current option - disable
VDOM.
Option Description
primary Primary DNS server IP address for the VDOM. ipv4- Not 0.0.0.0
address Specified
secondary Secondary DNS server IP address for the VDOM. ipv4- Not 0.0.0.0
address Specified
Option Description
ssl-certificate Name of local certificate for SSL connections. string Not Fortinet_
Specified Factory
ip6-primary Primary IPv6 DNS server IP address for the VDOM. ipv6- Not ::
address Specified
ip6-secondary Secondary IPv6 DNS server IP address for the VDOM. ipv6- Not ::
address Specified
source-ip Source IP for communications with the DNS server. ipv4- Not 0.0.0.0
address Specified
Option Description
Option Description
alt-primary Alternate primary DNS server. This is not used as a ipv4- Not 0.0.0.0
failover DNS server. address Specified
alt-secondary Alternate secondary DNS server. This is not used as a ipv4- Not 0.0.0.0
failover DNS server. address Specified
Option Description
Option Description
Replacement messages.
config system replacemsg mail
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set header [none|http|...]
set format [none|text|...]
next
end
Option Description
http HTTP
8bit 8 bit.
Option Description
Replacement messages.
config system replacemsg http
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set header [none|http|...]
set format [none|text|...]
next
end
Option Description
http HTTP
8bit 8 bit.
Option Description
Replacement messages.
config system replacemsg webproxy
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set header [none|http|...]
set format [none|text|...]
next
end
Option Description
http HTTP
8bit 8 bit.
Option Description
Replacement messages.
config system replacemsg ftp
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set header [none|http|...]
set format [none|text|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
Replacement messages.
config system replacemsg fortiguard-wf
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set header [none|http|...]
set format [none|text|...]
next
end
Option Description
http HTTP
8bit 8 bit.
Option Description
Replacement messages.
config system replacemsg spam
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set header [none|http|...]
set format [none|text|...]
next
end
Option Description
http HTTP
8bit 8 bit.
Option Description
Replacement messages.
Option Description
http HTTP
8bit 8 bit.
Option Description
Replacement messages.
config system replacemsg admin
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set header [none|http|...]
set format [none|text|...]
next
end
Option Description
http HTTP
8bit 8 bit.
Option Description
Replacement messages.
config system replacemsg auth
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set header [none|http|...]
set format [none|text|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
Replacement messages.
config system replacemsg sslvpn
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set header [none|http|...]
set format [none|text|...]
next
end
Option Description
http HTTP
8bit 8 bit.
Option Description
Replacement messages.
config system replacemsg nac-quar
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set header [none|http|...]
set format [none|text|...]
next
end
Option Description
http HTTP
8bit 8 bit.
Option Description
Replacement messages.
Option Description
http HTTP
8bit 8 bit.
Option Description
Replacement messages.
config system replacemsg utm
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set header [none|http|...]
set format [none|text|...]
next
end
Option Description
http HTTP
8bit 8 bit.
Option Description
Replacement messages.
config system replacemsg icap
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set header [none|http|...]
set format [none|text|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
Replacement messages.
config system replacemsg automation
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set header [none|http|...]
set format [none|text|...]
next
end
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config http
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config ftp
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config spam
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config admin
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config sslvpn
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config traffic-quota
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config custom-message
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config automation
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
Option Description
include The OID subtrees to be included in the view. Maximum string Not
16 allowed. Specified
exclude The OID subtrees to be excluded in the view. Maximum string Not
64 allowed. Specified
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ha-switch Send a trap after an HA failover when the backup unit has taken over.
fm-if-change Send a trap when FortiManager interface changes. Send a FortiManager trap.
bgp-established Send a trap when a BGP FSM transitions to the established state.
bgp-backward- Send a trap when a BGP FSM goes from a high numbered state to a lower
transition numbered state.
Option Description
ips-pkg-update Send a trap when the IPS signature database or engine is updated.
temperature-high Send a trap when a temperature sensor registers a temperature that is too
high.
voltage-alert Send a trap when a voltage sensor registers a voltage that is outside of the
normal range.
load-balance- Send a trap when a server load balance real server goes down.
real-server-down
dhcp Send a trap when the DHCP server exhausts the IP pool, an IP address
already is in use, or a DHCP client interface received a DHCP-NAK.
ospf-nbr-state- Send a trap when there has been a change in the state of a non-virtual OSPF
change neighbor.
ospf-virtnbr- Send a trap when there has been a change in the state of an OSPF virtual
state-change neighbor.
source-ip Source IPv4 address for SNMP traps. ipv4- Not 0.0.0.0
address Specified
Option Description
host-type Control whether the SNMP manager sends SNMP option - any
queries, receives SNMP traps, or both. No traps will be
sent when IP type is subnet.
Option Description
any Accept queries from and send traps to this SNMP manager.
query Accept queries from this SNMP manager but do not send traps.
trap Send traps to this SNMP manager but do not accept SNMP queries from this
SNMP manager.
config hosts6
Option Description
host-type Control whether the SNMP manager sends SNMP option - any
queries, receives SNMP traps, or both.
Option Description
any Accept queries from and send traps to this SNMP manager.
query Accept queries from this SNMP manager but do not send traps.
trap Send traps to this SNMP manager but do not accept SNMP queries from this
SNMP manager.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ha-switch Send a trap after an HA failover when the backup unit has taken over.
fm-if-change Send a trap when FortiManager interface changes. Send a FortiManager trap.
bgp-established Send a trap when a BGP FSM transitions to the established state.
bgp-backward- Send a trap when a BGP FSM goes from a high numbered state to a lower
transition numbered state.
Option Description
ips-pkg-update Send a trap when the IPS signature database or engine is updated.
temperature-high Send a trap when a temperature sensor registers a temperature that is too
high.
voltage-alert Send a trap when a voltage sensor registers a voltage that is outside of the
normal range.
load-balance- Send a trap when a server load balance real server goes down.
real-server-down
dhcp Send a trap when the DHCP server exhausts the IP pool, an IP address
already is in use, or a DHCP client interface received a DHCP-NAK.
ospf-nbr-state- Send a trap when there has been a change in the state of a non-virtual OSPF
change neighbor.
ospf-virtnbr- Send a trap when there has been a change in the state of an OSPF virtual
state-change neighbor.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
mac-acl- MAC access control default action (allow or block option - assign
default-action assigning IP settings).
Option Description
assign Allow the DHCP server to assign IP settings to clients on the MAC access
control list.
block Block the DHCP server from assigning IP settings to clients on the MAC
access control list.
Option Description
dns-service Options for assigning DNS servers to DHCP clients. option - specify
Option Description
local IP address of the interface the DHCP server is added to becomes the client's
DNS server IP address.
Option Description
local IP address of the interface the DHCP server is added to becomes the client's
WiFi Access Controller IP address.
wifi-ac1 WiFi Access Controller 1 IP address (DHCP option ipv4-address Not 0.0.0.0
138, RFC 5417). Specified
wifi-ac2 WiFi Access Controller 2 IP address (DHCP option ipv4-address Not 0.0.0.0
138, RFC 5417). Specified
wifi-ac3 WiFi Access Controller 3 IP address (DHCP option ipv4-address Not 0.0.0.0
138, RFC 5417). Specified
ntp-service Options for assigning Network Time Protocol (NTP) option - specify
servers to DHCP clients.
Option Description
local IP address of the interface the DHCP server is added to becomes the client's
NTP server IP address.
domain Domain name suffix for the IP addresses that the string Not
DHCP server assigns to clients. Specified
default- Default gateway IP address assigned by the DHCP ipv4-address Not 0.0.0.0
gateway server. Specified
next-server IP address of a server (for example, a TFTP sever) ipv4-address Not 0.0.0.0
that DHCP clients can download a boot file from. Specified
timezone- Options for the DHCP server to set the client's time option - disable
option zone.
Option Description
Option Description
02 (GMT-10:00) Hawaii
03 (GMT-9:00) Alaska
05 (GMT-7:00) Arizona
Option Description
10 (GMT-6:00) Saskatchewan
74 (GMT-4:00) Caracas
77 (GMT-4:00) Georgetown
15 (GMT-4:00) La Paz
87 (GMT-4:00) Paraguay
16 (GMT-3:00) Santiago
17 (GMT-3:30) Newfoundland
18 (GMT-3:00) Brasilia
75 (GMT-3:00) Uruguay
21 (GMT-2:00) Mid-Atlantic
22 (GMT-1:00) Azores
24 (GMT) Monrovia
79 (GMT) Casablanca
Option Description
78 (GMT+1:00) Namibia
32 (GMT+2:00) Bucharest
33 (GMT+2:00) Cairo
36 (GMT+2:00) Jerusalem
37 (GMT+3:00) Baghdad
83 (GMT+3:00) Moscow
84 (GMT+3:00) Minsk
40 (GMT+3:00) Nairobi
85 (GMT+3:00) Istanbul
41 (GMT+3:30) Tehran
43 (GMT+4:00) Baku
44 (GMT+4:30) Kabul
45 (GMT+5:00) Ekaterinburg
48 (GMT+5:45) Kathmandu
52 (GMT+6:30) Rangoon
Option Description
54 (GMT+7:00) Krasnoyarsk
58 (GMT+8:00) Perth
59 (GMT+8:00) Taipei
61 (GMT+9:00) Yakutsk
62 (GMT+9:30) Adelaide
63 (GMT+9:30) Darwin
64 (GMT+10:00) Brisbane
67 (GMT+10:00) Hobart
68 (GMT+10:00) Vladivostok
69 (GMT+10:00) Magadan
73 (GMT+13:00) Nuku'alofa
86 (GMT+13:00) Samoa
76 (GMT+14:00) Kiritimati
filename Name of the boot file on the TFTP server. string Not
Specified
Option Description
Option Description
conflicted-ip- Time in seconds to wait after a conflicted IP address integer Minimum 1800
timeout is removed from the DHCP range before it can be value: 60
reused. Maximum
value:
8640000
ipsec-lease- DHCP over IPsec leases expire this many seconds integer Minimum 60
hold after tunnel down (0 to disable forced-expiry). value: 0
Maximum
value:
8640000
Option Description
Option Description
auto-managed- Enable/disable use of this DHCP server once this option - enable
status interface has been assigned an IP address from
FortiIPAM.
Option Description
disable Disable use of this DHCP server once this interface has been assigned an IP
address from FortiIPAM.
enable Enable use of this DHCP server once this interface has been assigned an IP
address from FortiIPAM.
Option Description
Option Description
Option Description
Option Description
config ip-range
Option Description
vci-string One or more VCI strings in quotes separated by spaces. string Maximum
<vci- VCI strings. length: 255
string>
config options
Option Description
Option Description
vci-string One or more VCI strings in quotes separated by spaces. string Maximum
<vci- VCI strings. length: 255
string>
config exclude-range
Option Description
vci-string One or more VCI strings in quotes separated by spaces. string Maximum
<vci- VCI strings. length: 255
string>
Option Description
mac MAC address of the client that will get the mac- Not 00:00:00:00:00:00
reserved IP address. address Specified
action Options for the DHCP server to configure the option - reserved
client with the reserved MAC address.
Option Description
assign Configure the client with this MAC address like any other client.
block Block the DHCP server from assigning IP settings to the client with this MAC
address.
reserved Assign the reserved IP address to the client with this MAC address.
Option Description
circuit-id Option 82 circuit-ID of the client that will get the string Not
reserved IP address. Specified
Option Description
remote-id Option 82 remote-ID of the client that will get the string Not
reserved IP address. Specified
Option Description
Option Description
Option Description
dns-service Options for assigning DNS servers to DHCPv6 clients. option - specify
Option Description
Option Description
domain Domain name suffix for the IP addresses that the string Not Specified
DHCP server assigns to clients.
subnet Subnet or subnet-id if the IP mode is delegated. ipv6-prefix Not Specified ::/0
interface DHCP server can assign IP configurations to clients string Not Specified
connected to this interface.
upstream- Interface name from where delegated information is string Not Specified
interface provided.
Option Description
Option Description
config prefix-range
This command is available for reference model(s) FortiGate 140E-POE, FortiWiFi 61F,
FortiGate 601E, FortiGate 2201E. It is not available for FortiGate VM64.
Configure MODEM.
config system modem
Description: Configure MODEM.
set status [enable|disable]
set pin-init {string}
set network-init {string}
set lockdown-lac {string}
set mode [standalone|redundant]
set auto-dial [enable|disable]
set dial-on-demand [enable|disable]
set idle-timer {integer}
set redial [none|1|...]
set reset {integer}
set holddown-timer {integer}
set connect-timeout {integer}
set interface {string}
set wireless-port {integer}
set dont-send-CR1 [enable|disable]
set phone1 {string}
set dial-cmd1 {string}
set username1 {string}
set passwd1 {password}
set extra-init1 {string}
set peer-modem1 [generic|actiontec|...]
set ppp-echo-request1 [enable|disable]
set authtype1 {option1}, {option2}, ...
set dont-send-CR2 [enable|disable]
set phone2 {string}
set dial-cmd2 {string}
set username2 {string}
set passwd2 {password}
set extra-init2 {string}
set peer-modem2 [generic|actiontec|...]
set ppp-echo-request2 [enable|disable]
set authtype2 {option1}, {option2}, ...
set dont-send-CR3 [enable|disable]
set phone3 {string}
Option Description
lockdown-lac Allow connection only to the specified Location string Not Specified
Area Code (LAC).
Option Description
standalone Standalone.
Option Description
dial-on- Enable/disable to dial the modem when packets are option - disable
demand routed to the modem interface.
Option Description
Option Description
none Forever.
1 One attempt.
2 Two attempts.
3 Three attempts.
4 Four attempts.
5 Five attempts.
6 Six attempts.
7 Seven attempts.
8 Eight attempts.
9 Nine attempts.
10 Ten attempts.
wireless-port Enter wireless port number, 0 for default, 1 for first integer Minimum 0
port, ... value: 0
Maximum
value:
4294967295
Option Description
phone1 Phone number to connect to the dialup account string Not Specified
(must not contain spaces, and should include
standard special characters).
dial-cmd1 Dial command (this is often an ATD or ATDT string Not Specified
command).
username1 User name to access the specified dialup account. string Not Specified
passwd1 Password to access the specified dialup account. password Not Specified
Option Description
Option Description
Option Description
pap PAP
chap CHAP
mschap MSCHAP
mschapv2 MSCHAPv2
Option Description
phone2 Phone number to connect to the dialup account string Not Specified
(must not contain spaces, and should include
standard special characters).
dial-cmd2 Dial command (this is often an ATD or ATDT string Not Specified
command).
username2 User name to access the specified dialup account. string Not Specified
passwd2 Password to access the specified dialup account. password Not Specified
Option Description
Option Description
Option Description
pap PAP
chap CHAP
mschap MSCHAP
mschapv2 MSCHAPv2
Option Description
phone3 Phone number to connect to the dialup account string Not Specified
(must not contain spaces, and should include
standard special characters).
dial-cmd3 Dial command (this is often an ATD or ATDT string Not Specified
command).
username3 User name to access the specified dialup account. string Not Specified
passwd3 Password to access the specified dialup account. password Not Specified
Option Description
Option Description
Option Description
Option Description
pap PAP
chap CHAP
mschap MSCHAP
mschapv2 MSCHAPv2
Option Description
Option Description
none No action.
This command is available for reference model(s) FortiGate 140E-POE, FortiWiFi 61F,
FortiGate 601E, FortiGate 2201E. It is not available for FortiGate VM64.
3G MODEM custom.
config system 3g-modem custom
Description: 3G MODEM custom.
edit <id>
set vendor {string}
set model {string}
set vendor-id {user}
set product-id {user}
set class-id {user}
set init-string {string}
set modeswitch-string {string}
next
end
modeswitch- USB modeswitch arguments. e.g: '-v 1410 -p 9030 -V string Not
string 1410 -P 9032 -u 3' Specified
System status.
config system status
Description: System status.
end
FortiAnalyzer Connectivity.
config system fortianalyzer-connectivity
Description: FortiAnalyzer Connectivity.
end
System checksum.
config system checksum status
Description: System checksum.
end
Option Description
timeout Maximum running time for this script in seconds (0 = no integer Minimum 0
timeout). value: 0
Maximum
value: 300
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
backup Manage and configure this FortiGate locally and back up its configuration to
FortiManager.
Option Description
fortimanager FortiManager.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
fmg-source-ip IPv4 source address that this FortiGate uses when ipv4- Not 0.0.0.0
communicating with FortiManager. address Specified
fmg-source-ip6 IPv6 source address that this FortiGate uses when ipv6- Not ::
communicating with FortiManager. address Specified
vdom Virtual domain (VDOM) name to use when string Not root
communicating with FortiManager. Specified
Option Description
Option Description
enable Enable inclusion of public FortiGuard servers in the override server list.
disable Disable inclusion of public FortiGuard servers in the override server list.
Option Description
default High strength algorithms and medium-strength 128-bit key length algorithms.
Option Description
Option Description
addr-type Indicate whether the FortiGate communicates with the option - ipv4
override server using an IPv4 address, an IPv6 address
or a FQDN.
Option Description
fqdn FQDN.
Configure zones to group two or more interfaces. When a zone is created you can configure policies for the zone instead
of individual interfaces in the zone.
config system zone
Description: Configure zones to group two or more interfaces. When a zone is created you
can configure policies for the zone instead of individual interfaces in the zone.
edit <name>
config tagging
Description: Config object tagging.
edit <name>
set category {string}
set tags <name1>, <name2>, ...
next
end
set description {string}
set intrazone [allow|deny]
set interface <interface-name1>, <interface-name2>, ...
Option Description
interface Add interfaces to this zone. Interfaces must not be string Maximum
<interface- assigned to another zone or have firewall policies length: 79
name> defined.
Select interfaces to add to the zone.
config tagging
Option Description
Option Description
openstack OpenStack.
kubernetes Kubernetes.
Option Description
Option Description
Option Description
Option Description
server-list <ip> Server address list of the remote SDN connector. string Maximum
IPv4 address. length: 15
Option Description
Option Description
api-key IBM cloud API key or service ID API key. password Not
Specified
Option Description
config ip
config route-table
config route
config route
config gcp-project-list
Option Description
Option Description
Option Description
Option Description
Option Description
feed FortiGate unit will pull update from the external resource.
push External Resource update is pushed to the FortiGate unit through the
FortiGate unit's RESTAPI/CLI.
source-ip Source IPv4 address used to communicate with ipv4- Not 0.0.0.0
server. address Specified
Option Description
status Enable/disable using this DNS server for IPS URL filter option - enable
DNS queries.
Option Description
enable Enable this DNS server for IPS URL filter DNS queries.
disable Disable this DNS server for IPS URL filter DNS queries.
Option Description
status Enable/disable this server for IPv6 DNS queries. option - enable
Option Description
Option Description
Option Description
Option Description
hostname- Limit of the number of hostname table entries . integer Minimum 5000
limit value: 0
Maximum
value:
50000
Option Description
Configure redundant Internet connections with multiple outbound links and health-check profiles.
config system sdwan
Description: Configure redundant Internet connections with multiple outbound links and
health-check profiles.
set status [disable|enable]
set load-balance-mode [source-ip-based|weight-based|...]
set speedtest-bypass-routing [disable|enable]
set duplication-max-num {integer}
set neighbor-hold-down [enable|disable]
set neighbor-hold-down-time {integer}
set neighbor-hold-boot-time {integer}
set fail-detect [enable|disable]
set fail-alert-interfaces <name1>, <name2>, ...
config zone
Description: Configure SD-WAN zones.
edit <name>
set service-sla-tie-break [cfg-order|fib-best-match|...]
next
end
config members
Description: FortiGate interfaces added to the SD-WAN.
edit <seq-num>
set interface {string}
set zone {string}
set gateway {ipv4-address}
set source {ipv4-address}
set gateway6 {ipv6-address}
set source6 {ipv6-address}
set cost {integer}
set weight {integer}
set priority {integer}
set priority6 {integer}
set spillover-threshold {integer}
set ingress-spillover-threshold {integer}
set volume-ratio {integer}
Option Description
load-balance- Algorithm or mode to use for load balancing Internet option - source-ip-
mode traffic to SD-WAN members. based
Option Description
source-ip-based Source IP load balancing. All traffic from a source IP is sent to the same
interface.
weight-based Weight-based load balancing. Interfaces with higher weights have higher
priority and get more traffic.
usage-based Usage-based load balancing. All traffic is sent to the first interface on the list.
When the bandwidth on that interface exceeds the spill-over limit new traffic is
sent to the next interface.
source-dest-ip- Source and destination IP load balancing. All traffic from a source IP to a
based destination IP is sent to the same interface.
measured- Volume-based load balancing. Traffic is load balanced based on traffic volume
volume-based (in bytes). More traffic is sent to interfaces with higher volume ratios.
Option Description
Option Description
enable Enable hold switching from the secondary neighbor to the primary neighbor.
disable Disable hold switching from the secondary neighbor to the primary neighbor.
neighbor- Waiting period in seconds when switching from the integer Minimum 0
hold-down- secondary neighbor to the primary neighbor when hold- value: 0
time down is disabled. . Maximum
value:
10000000
neighbor- Waiting period in seconds when switching from the integer Minimum 0
hold-boot- primary neighbor to the secondary neighbor from the value: 0
time neighbor start. . Maximum
value:
10000000
Option Description
config zone
service-sla- Method of selecting member if more than one meets the option - cfg-order
tie-break SLA.
Option Description
cfg-order Members that meet the SLA are selected in the order they are configured.
fib-best-match Members that meet the SLA are selected that match the longest prefix in the
routing table.
input-device Members that meet the SLA are selected by matching the input device.
config members
gateway The default gateway for this interface. Usually the ipv4- Not Specified 0.0.0.0
default gateway of the Internet service provider that address
this interface is connected to.
source Source IP address used in the health-check packet to ipv4- Not Specified 0.0.0.0
the server. address
source6 Source IPv6 address used in the health-check packet ipv6- Not Specified ::
to the server. address
cost Cost of this interface for services in SLA mode . integer Minimum 0
value: 0
Maximum
value:
4294967295
weight Weight of this interface for weighted load balancing. integer Minimum 1
More traffic is directed to interfaces with higher value: 1
weights. Maximum
value: 255
priority Priority of the interface for IPv4 . Used for SD-WAN integer Minimum 1
rules or priority rules. value: 1
Maximum
value: 65535
priority6 Priority of the interface for IPv6 . Used for SD-WAN integer Minimum 1024
rules or priority rules. value: 1
Maximum
value: 65535
spillover- Egress spillover threshold for this interface . When integer Minimum 0
threshold this traffic volume threshold is reached, new sessions value: 0
spill over to other interfaces in the SD-WAN. Maximum
value:
16776000
ingress- Ingress spillover threshold for this interface . When integer Minimum 0
spillover- this traffic volume threshold is reached, new sessions value: 0
threshold spill over to other interfaces in the SD-WAN. Maximum
value:
16776000
Option Description
config health-check
Option Description
Option Description
Option Description
Option Description
Option Description
tcp-echo Use TCP echo to test the link with the server.
udp-echo Use UDP echo to test the link with the server.
dns Use DNS query to test the link with the server.
tcp-connect Use a full TCP connection to test the link with the server.
Option Description
Option Description
user The user name to access probe server. string Not Specified
Option Description
passive The FTP health-check initiates and establishes the data connection.
port The FTP server initiates and establishes the data connection.
ftp-file Full path and file name on the FTP server string Not Specified
to download for FTP health-check to
probe.
http-get URL used to communicate with the server string Not Specified /
if the protocol if the protocol is HTTP.
http-agent String in the http-agent field in the HTTP string Not Specified Chrome/ Safari/
header.
http-match Response string expected from the server string Not Specified
if the protocol is HTTP.
dns-request- Fully qualified domain name to resolve for string Not Specified www.example.com
domain the DNS probe.
dns-match-ip Response IP expected from DNS server if ipv4- Not Specified 0.0.0.0
the protocol is DNS. address
Option Description
Option Description
Option Description
sla-id- Select the ID from the SLA sub-table. The integer Minimum 0
redistribute selected SLA's priority value will be value: 0
distributed into the routing table . Maximum
value: 32
sla-fail-log- Time interval in seconds that SLA fail log integer Minimum 0
period messages will be generated . value: 0
Maximum
value: 3600
source Source IP address used in the health- ipv4- Not Specified 0.0.0.0
check packet to the server. address
Option Description
config sla
config neighbor
Option Description
Option Description
config service
Option Description
Option Description
mode Control how the SD-WAN rule sets the priority of option - manual
interfaces in the SD-WAN.
Option Description
Option Description
load-balance Distribute traffic among all available links based on round robin. ADVPN
feature is not supported in the mode.
hash-mode Hash algorithm for selected priority members for option - round-robin
load balance mode.
Option Description
round-robin All traffic are distributed to selected interfaces in equal portions and circular
order.
source-dest-ip- All traffic from a source IP to a destination IP is sent to the same interface.
based
inbandwidth All traffic are distributed to a selected interface with most available
bandwidth for incoming traffic.
outbandwidth All traffic are distributed to a selected interface with most available
bandwidth for outgoing traffic.
bibandwidth All traffic are distributed to a selected interface with most available
bandwidth for both incoming and outgoing traffic.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sla-compare- Method to compare SLA value for SLA mode. option - order
method
Option Description
number Compare SLA value based on the number of satisfied health-check. Limits
health-checks to only configured member interfaces.
Option Description
zone Use the setting that is configured for the members' zone.
cfg-order Members that meet the SLA are selected in the order they are configured.
fib-best-match Members that meet the SLA are selected that match the longest prefix in the
routing table.
input-device Members that meet the SLA are selected by matching the input device.
Option Description
Option Description
config duplication
Option Description
force Duplicate packets across all interface members of the SD-WAN zone.
on-demand Duplicate packets across all interface members of the SD-WAN zone based
on the link quality.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
key-inbound Require received GRE packets contain this key . integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
diffservcode DiffServ setting to be applied to GRE tunnel outer IP user Not Specified
header.
Option Description
Configure IP in IP Tunneling.
config system ipip-tunnel
Description: Configure IP in IP Tunneling.
edit <name>
set interface {string}
set remote-gw {ipv4-address}
set local-gw {ipv4-address-any}
set use-sdwan [disable|enable]
set auto-asic-offload [enable|disable]
next
end
interface Interface name that is associated with the incoming string Not
traffic from available options. Specified
remote-gw IPv4 address for the remote gateway. ipv4- Not 0.0.0.0
address Specified
local-gw IPv4 address for the local gateway. ipv4- Not 0.0.0.0
address- Specified
any
Option Description
Option Description
Configure Mobile tunnels, an implementation of Network Mobility (NEMO) extensions for Mobile IPv4 RFC5177.
config system mobile-tunnel
Description: Configure Mobile tunnels, an implementation of Network Mobility (NEMO)
extensions for Mobile IPv4 RFC5177.
edit <name>
set status [disable|enable]
set roaming-interface {string}
set home-agent {ipv4-address}
set home-address {ipv4-address}
set renew-interval {integer}
set lifetime {integer}
set reg-interval {integer}
set reg-retry {integer}
set n-mhae-spi {integer}
set n-mhae-key-type [ascii|base64]
set n-mhae-key {password_aes256}
set hash-algorithm {option}
set tunnel-mode {option}
Option Description
roaming- Select the associated interface name from available string Not Specified
interface options.
home-agent IPv4 address of the NEMO HA (Format: ipv4-address Not Specified 0.0.0.0
xxx.xxx.xxx.xxx).
Option Description
Option Description
Option Description
config network
interface Select the associated interface name from available string Not
options. Specified
Option Description
Option Description
Option Description
Option Description
ip-version IP version to use for the VXLAN interface and so for option - ipv4-unicast
communication over the VXLAN. IPv4 or IPv6 unicast or
multicast.
Option Description
remote-ip IPv4 address of the VXLAN interface on the device at string Maximum
<ip> the remote end of the VXLAN. length: 15
IPv4 address.
remote-ip6 IPv6 IP address of the VXLAN interface on the device at string Maximum
<ip6> the remote end of the VXLAN. length: 45
IPv6 address.
Option Description
ip-version IP version to use for the GENEVE interface and so for option - ipv4-unicast
communication over the GENEVE. IPv4 or IPv6
unicast.
Option Description
remote-ip IPv4 address of the GENEVE interface on the device at ipv4- Not 0.0.0.0
the remote end of the GENEVE. address Specified
remote-ip6 IPv6 IP address of the GENEVE interface on the device ipv6- Not ::
at the remote end of the GENEVE. address Specified
Option Description
Option Description
Option Description
secondary Secondary DNS zone, to import entries from other DNS zones.
view Zone view (public to serve public clients, shadow to option - shadow
serve internal clients).
Option Description
Option Description
ip-primary IP address of primary DNS server. Entries in this ipv4- Not Specified 0.0.0.0
primary DNS server and imported into the DNS address-
zone. any
primary-name Domain name of the default DNS server for this string Not Specified dns
zone.
contact Email address of the administrator for this zone. You string Not Specified host
can specify only the username, such as admin or the
full email address, such as [email protected] When
using only a username, the domain of the email will
be this zone.
ttl Default time-to-live value for the entries of this DNS integer Minimum 86400
zone . value: 0
Maximum
value:
2147483647
Option Description
source-ip Source IP for forwarding to DNS server. ipv4- Not Specified 0.0.0.0
address
config dns-entry
Option Description
Option Description
A Host type.
Option Description
Option Description
ipsec-phase1 Maximum number of VPN IPsec phase1 tunnels. integer Minimum value:
0 Maximum
value:
4294967295
ipsec-phase2 Maximum number of VPN IPsec phase2 tunnels. integer Minimum value:
0 Maximum
value:
4294967295
ipsec-phase1- Maximum number of VPN IPsec phase1 interface integer Minimum value:
interface tunnels. 0 Maximum
value:
4294967295
ipsec-phase2- Maximum number of VPN IPsec phase2 interface integer Minimum value:
interface tunnels. 0 Maximum
value:
4294967295
firewall-policy Maximum number of firewall policies (policy, DoS- integer Minimum value:
policy4, DoS-policy6, multicast). 0 Maximum
value:
4294967295
firewall- Maximum number of firewall addresses (IPv4, IPv6, integer Minimum value:
address multicast). 0 Maximum
value:
4294967295
firewall- Maximum number of firewall address groups (IPv4, integer Minimum value:
addrgrp IPv6). 0 Maximum
value:
4294967295
ipsec-phase1 Maximum guaranteed number of VPN IPsec phase 1 user Not Specified
tunnels.
ipsec-phase2 Maximum guaranteed number of VPN IPsec phase 2 user Not Specified
tunnels.
ipsec-phase1- Maximum guaranteed number of VPN IPsec phase1 user Not Specified
interface interface tunnels.
ipsec-phase2- Maximum guaranteed number of VPN IPsec phase2 user Not Specified
interface interface tunnels.
log-disk-quota Log disk quota in megabytes (MB). Range depends user Not Specified
on how much disk space is available.
config host
port Server host port number to communicate with client. integer Minimum 5204
value: 1
Maximum
value:
65535
config voice
Option Description
Option Description
config voice-signaling
Option Description
Option Description
config guest
Option Description
Option Description
config guest-voice-signaling
Option Description
Option Description
Option Description
Option Description
config video-conferencing
Option Description
Option Description
config streaming-video
Option Description
Option Description
config video-signaling
Option Description
Option Description
Option Description
Option Description
enable Enable dynamic server.The speed test server will be found automatically.
Option Description
Option Description
standalone- Cluster group ID . Must be the same for all members. integer Minimum 0
group-id value: 0
Maximum
value: 255
Option Description
unavailable There does not exist layer 2 connection among FGSP members.
Option Description
config cluster-peer
peervd VDOM that contains the session synchronization link string Not root
interface on the peer unit. Usually both peers would Specified
have the same peervd.
peerip IP address of the interface on the peer unit that is used ipv4- Not 0.0.0.0
for the session synchronization link. address Specified
syncvd Sessions from these VDOMs are synchronized using string Maximum
<name> this session synchronization configuration. length: 79
VDOM name.
Option Description
Option Description
config session-sync-filter
srcintf Only sessions from this interface are synchronized. string Not
Specified
srcaddr Only sessions from this IPv4 address are synchronized. ipv4- Not 0.0.0.0
classnet- Specified 0.0.0.0
any
dstaddr Only sessions to this IPv4 address are synchronized. ipv4- Not 0.0.0.0
classnet- Specified 0.0.0.0
any
srcaddr6 Only sessions from this IPv6 address are synchronized. ipv6- Not ::/0
network Specified
dstaddr6 Only sessions to this IPv6 address are synchronized. ipv6- Not ::/0
network Specified
config custom-service
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sunday Sunday.
Option Description
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
thursday Thursday.
friday Friday.
saturday Saturday.
auto- Start time in the designated time window for integer Minimum 2
firmware- automatic patch-level firmware upgrade from value: 0
upgrade-start- FortiGuard in 24 hour time . The actual upgrade Maximum
hour time is selected randomly within the time window. value: 23
auto- End time in the designated time window for integer Minimum 4
firmware- automatic patch-level firmware upgrade from value: 0
upgrade-end- FortiGuard in 24 hour time . When the end time is Maximum
hour smaller than the start time, the end time is value: 23
interpreted as the next day. The actual upgrade
time is selected randomly within the time window.
Option Description
Option Description
antispam- Interval of time between license checks for the integer Minimum 4294967295
license FortiGuard antispam contract. value: 0
Maximum
value:
4294967295
Option Description
Option Description
outbreak- Interval of time between license checks for integer Minimum 4294967295
prevention- FortiGuard Virus Outbreak Prevention contract. value: 0
license Maximum
value:
4294967295
Option Description
Option Description
webfilter- Time-to-live for web filter cache entries in seconds integer Minimum 3600
cache-ttl . value: 300
Maximum
value: 86400
webfilter- Interval of time between license checks for the integer Minimum 4294967295
license FortiGuard web filter contract. value: 0
Maximum
value:
4294967295
sdns-server- IP address of the FortiGuard DNS rating server. user Not Specified
ip
anycast-sdns- IP address of the FortiGuard anycast DNS rating ipv4- Not Specified 0.0.0.0
server-ip server. address
anycast-sdns- Port to connect to on the FortiGuard anycast DNS integer Minimum 853
server-port rating server. value: 1
Maximum
value: 65535
Option Description
include-question- Include DNS question section in the FortiGuard DNS setup message.
section
source-ip Source IPv4 address used to communicate with ipv4- Not Specified 0.0.0.0
FortiGuard. address
source-ip6 Source IPv6 address used to communicate with ipv6- Not Specified ::
FortiGuard. address
proxy-server- Port used to communicate with the proxy server. integer Minimum 0
port value: 0
Maximum
value: 65535
videofilter- Interval of time between license checks for the integer Minimum 4294967295
license FortiGuard video filter contract. value: 0
Maximum
value:
4294967295
Option Description
signature- Time to hold and monitor IPS signatures. Format user Not 0h
hold-time <#d##h> . Specified
Option Description
enable Allow the signatures specified by IDs to be triggered even if they are on hold.
Configure the email server used by the FortiGate various things. For example, for sending email messages to users to
support user authentication features.
config system email-server
Description: Configure the email server used by the FortiGate various things. For
example, for sending email messages to users to support user authentication
features.
set type {option}
set reply-to {string}
set server {string}
set port {integer}
set source-ip {ipv4-address}
set source-ip6 {ipv6-address}
set authenticate [enable|disable]
set validate-server [enable|disable]
set username {string}
set password {password}
set security [none|starttls|...]
set ssl-min-proto-version [default|SSLv3|...]
set interface-select-method [auto|sdwan|...]
set interface {string}
end
Option Description
Option Description
Option Description
Option Description
none None.
starttls STARTTLS.
smtps SSL/TLS.
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Configure alarm.
config system alarm
Description: Configure alarm.
set status [enable|disable]
set audible [enable|disable]
config groups
Description: Alarm groups.
edit <id>
set period {integer}
set admin-auth-failure-threshold {integer}
set admin-auth-lockout-threshold {integer}
set user-auth-failure-threshold {integer}
set user-auth-lockout-threshold {integer}
set replay-attempt-threshold {integer}
set self-test-failure-threshold {integer}
Option Description
Option Description
config groups
config fw-policy-violations
Option Description
ftp FTP.
tftp TFTP.
ras RAS.
h323 H323.
tns TNS.
mms MMS.
sip SIP.
pptp PPTP.
rtsp RTSP.
Option Description
pmap PMAP.
rsh RSH.
dcerpc DCERPC.
mgcp MGCP.
Configure proxy-ARP.
config system proxy-arp
Description: Configure proxy-ARP.
edit <id>
set interface {string}
set ip {ipv4-address}
set end-ip {ipv4-address}
next
end
Option Description
Option Description
Option Description
Configure Type of Service (ToS) based priority table to set network traffic priorities.
config system tos-based-priority
Description: Configure Type of Service (ToS) based priority table to set network traffic
priorities.
edit <id>
set tos {integer}
set priority [low|medium|...]
tos Value of the ToS byte in the IP datagram header . integer Minimum 0
value: 0
Maximum
value: 15
priority ToS based priority level to low, medium or high . option - high
Option Description
Option Description
Option Description
Option Description
Option Description
timeout An inactivity timer for a twamp test session. integer Minimum 300
value: 10
Maximum
value: 3600
Option Description
srcintf Interface that receives the traffic to be monitored. string Not Specified
Option Description
Option Description
Option Description
port Port number of the traffic to be used to monitor the integer Minimum 0
server. value: 1
Maximum
value: 65535
gateway-ip Gateway IP address used to probe the server. ipv4- Not Specified 0.0.0.0
address-
any
gateway-ip6 Gateway IPv6 address used to probe the server. ipv6- Not Specified ::
address
source-ip Source IP address used in packet to the server. ipv4- Not Specified 0.0.0.0
address-
any
source-ip6 Source IPv6 address used in packet to the server. ipv6- Not Specified ::
address
http-get If you are monitoring an HTML server you can send string Not Specified /
an HTTP-GET request with a custom string. Use this
option to define the string.
http-agent String in the http-agent field in the HTTP header. string Not Specified Chrome/
Safari/
http-match String that you expect to see in the HTTP-GET string Not Specified
requests of the traffic to be monitored.
probe-timeout Time to wait before a probe packet is considered integer Minimum 500
lost . value: 500
Maximum
value: 5000
probe-count Number of most recent probes that should be used integer Minimum 30
to calculate latency and jitter . value: 5
Maximum
value: 30
Option Description
Option Description
Option Description
Option Description
Option Description
diffservcode Differentiated services code point (DSCP) in the IP user Not Specified
header of the probe packet.
service- Only use monitor to read quality values. If enabled, option - disable
detection static routes and cascade interfaces will not be
updated.
Option Description
config server-list
Option Description
port Port number of the traffic to be used to monitor the integer Minimum 0
server. value: 1
Maximum
value:
65535
auto-install- Enable/disable auto install the config in USB disk. option - disable
config
Option Description
auto-install- Enable/disable auto install the image in USB disk. option - disable
image
Option Description
default- Default config file name in USB disk. string Not fgt_
config-file Specified system.conf
default- Default image file name in USB disk. string Not image.out
image-file Specified
Configure console.
config system console
Description: Configure console.
set mode [batch|line]
set baudrate [9600|19200|...]
set output [standard|more]
set login [enable|disable]
set fortiexplorer [enable|disable]
end
Option Description
Option Description
9600 9600
19200 19200
38400 38400
57600 57600
115200 115200
Option Description
Option Description
Option Description
Option Description
type Use the FortiGuard NTP server or any other option - fortiguard
available NTP Server.
Option Description
source-ip Source IP address for communication to the NTP ipv4- Not Specified 0.0.0.0
server. address
source-ip6 Source IPv6 address for communication to the ipv6- Not Specified ::
NTP server. address
Option Description
Option Description
Option Description
config ntpserver
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
delay- End to end delay detection or peer to peer delay option - E2E
mechanism detection.
Option Description
request- The delay request value is the logarithmic mean interval integer Minimum 1
interval in seconds between the delay request messages sent value: 1
by the slave to the master. Maximum
value: 6
interface PTP client will reply through this interface. string Not
Specified
Option Description
config server-interface
delay- End to end delay detection or peer to peer delay option - E2E
mechanism detection.
Option Description
Configure WCCP.
config system wccp
Description: Configure WCCP.
edit <service-id>
set router-id {ipv4-address}
router-id IP address known to all cache engines. If all ipv4- Not 0.0.0.0
cache engines connect to the same FortiGate address Specified
interface, use the default 0.0.0.0.
group-address IP multicast address used by the cache routers. ipv4- Not 0.0.0.0
For the FortiGate to ignore multicast WCCP address- Specified
traffic, use the default 0.0.0.0. multicast
Option Description
Option Description
Option Description
Option Description
L2 L2 rewrite.
Option Description
L2 L2 rewrite.
service-type WCCP service type used by the cache server option - auto
for logical interception and redirection of traffic.
Option Description
auto auto
Option Description
assignment- Assignment bucket format for the WCCP cache option - cisco-
bucket-format engine. implementation
Option Description
Option Description
L2 L2 rewrite.
Option Description
Option Description
Configure DNS64.
config system dns64
Description: Configure DNS64.
set status [enable|disable]
set dns64-prefix {ipv6-prefix}
set always-synthesize-aaaa-record [enable|disable]
end
Option Description
Option Description
Configure a RADIUS server to use as a RADIUS Single Sign On (RSSO) server for this VDOM.
config system vdom-radius-server
Description: Configure a RADIUS server to use as a RADIUS Single Sign On (RSSO) server
for this VDOM.
edit <name>
set status [enable|disable]
set radius-server-vdom {string}
next
end
status Enable/disable the RSSO RADIUS server for this option - disable
VDOM.
Option Description
radius-server- Use this option to select another VDOM containing a string Not
vdom VDOM RSSO RADIUS server to use for the current Specified
VDOM.
List session.
config system session-info list
Description: List session.
end
Session statistics.
config system session-info statistics
Description: Session statistics.
end
TTL session.
config system session-info ttl
Description: TTL session.
end
server-port Port to communicate with FortiToken Mobile push integer Minimum 4433
services server . value: 1
Maximum
value:
65535
server-cert Name of the server certificate to be used for SSL . string Not Fortinet_
Specified Factory **
server-ip IPv4 address of FortiToken Mobile push services server ipv4- Not 0.0.0.0
(format: xxx.xxx.xxx.xxx). address Specified
Option Description
Configure geographical location mapping for IP address(es) to override mappings from FortiGuard.
config system geoip-override
Description: Configure geographical location mapping for IP address(es) to override
mappings from FortiGuard.
edit <name>
set description {string}
set country-id {string}
config ip-range
Description: Table of IP ranges assigned to country.
edit <id>
set start-ip {ipv4-address}
set end-ip {ipv4-address}
next
end
config ip6-range
Description: Table of IPv6 ranges assigned to country.
edit <id>
set start-ip {ipv6-address}
set end-ip {ipv6-address}
next
end
next
end
start-ip Starting IP address, inclusive, of the address range ipv4- Not 0.0.0.0
(format: xxx.xxx.xxx.xxx). address Specified
end-ip Ending IP address, inclusive, of the address range ipv4- Not 0.0.0.0
(format: xxx.xxx.xxx.xxx). address Specified
config ip6-range
Configure FortiSandbox.
config system fortisandbox
Description: Configure FortiSandbox.
set status [enable|disable]
set forticloud [enable|disable]
set inline-scan [enable|disable]
set server {string}
set source-ip {string}
set interface-select-method [auto|sdwan|...]
set interface {string}
set enc-algorithm [default|high|...]
set ssl-min-proto-version [default|SSLv3|...]
set email {string}
end
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
enc-algorithm Configure the level of SSL protection for secure option - default
communication with FortiSandbox.
Option Description
Option Description
SSLv3 SSLv3.
Option Description
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Configure FortiNDR.
config system fortindr
Description: Configure FortiNDR.
set status [disable|enable]
set source-ip {string}
set interface-select-method [auto|sdwan|...]
set interface {string}
end
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Global configuration objects that can be configured independently across different ha peers for all VDOMs or for the
defined VDOM scope.
config system vdom-exception
Description: Global configuration objects that can be configured independently across
different ha peers for all VDOMs or for the defined VDOM scope.
edit <id>
set object [log.fortianalyzer.setting|log.fortianalyzer.override-setting|...]
set scope [all|inclusive|...]
set vdom <name1>, <name2>, ...
next
end
Option Description
log.fortianalyzer.setting log.fortianalyzer.setting
log.fortianalyzer.override- log.fortianalyzer.override-setting
setting
log.fortianalyzer2.setting log.fortianalyzer2.setting
log.fortianalyzer2.override- log.fortianalyzer2.override-setting
setting
log.fortianalyzer3.setting log.fortianalyzer3.setting
log.fortianalyzer3.override- log.fortianalyzer3.override-setting
setting
log.fortianalyzer- log.fortianalyzer-cloud.setting
cloud.setting
log.fortianalyzer- log.fortianalyzer-cloud.override-setting
cloud.override-setting
log.syslogd.setting log.syslogd.setting
log.syslogd.override-setting log.syslogd.override-setting
log.syslogd2.setting log.syslogd2.setting
log.syslogd2.override-setting log.syslogd2.override-setting
log.syslogd3.setting log.syslogd3.setting
Option Description
log.syslogd3.override-setting log.syslogd3.override-setting
log.syslogd4.setting log.syslogd4.setting
log.syslogd4.override-setting log.syslogd4.override-setting
system.gre-tunnel system.gre-tunnel
system.central-management system.central-management
system.csf system.csf
user.radius user.radius
Option Description
inclusive Object configuration independent for the listed VDOMs. Other VDOMs use the
global configuration.
exclusive Use the global object configuration for the listed VDOMs. Other VDOMs can
be configured independently.
Add this FortiGate to a Security Fabric or set up a new Security Fabric on this FortiGate.
config system csf
Description: Add this FortiGate to a Security Fabric or set up a new Security Fabric on
this FortiGate.
set status [enable|disable]
set upstream {string}
set upstream-port {integer}
set group-name {string}
set group-password {password}
set accept-auth-by-cert [disable|enable]
set log-unification [disable|enable]
set authorization-request-type [serial|certificate]
set certificate {string}
set fabric-workers {integer}
set downstream-access [enable|disable]
set downstream-accprofile {string}
set configuration-sync [default|local]
Option Description
upstream-port The port number to use to communicate with the integer Minimum 8013
FortiGate upstream from this FortiGate in the Security value: 1
Fabric . Maximum
value:
65535
accept-auth-by- Accept connections with unknown certificates and ask option - enable
cert admin for approval.
Option Description
Option Description
Option Description
Option Description
enable Enable downstream device access to this device's configuration and data.
disable Disable downstream device access to this device's configuration and data.
downstream- Default access profile for requests from downstream string Not
accprofile devices. Specified
Option Description
Option Description
local Global CMDB objects will not be synchronized to and from this device.
Option Description
Option Description
config trusted-list
Option Description
Option Description
Option Description
config fabric-connector
Option Description
Option Description
Option Description
Option Description
ha-failover HA failover.
vdom <name> Virtual domain(s) that this trigger is valid for. string Maximum
Virtual domain name. length: 79
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sunday Sunday.
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
thursday Thursday.
friday Friday.
saturday Saturday.
trigger- Trigger date and time (YYYY-MM-DD HH:MM:SS). datetime Not 0000-00-00
datetime Specified 00:00:00
Option Description
Option Description
minimum- Limit execution to no more than once in this interval integer Minimum 0
interval (in seconds). value: 0
Maximum
value:
2592000
Option Description
Option Description
Option Description
text Plaintext.
Option Description
Option Description
http HTTP.
https HTTPS.
Option Description
post POST.
put PUT.
get GET.
patch PATCH.
delete DELETE.
Option Description
timeout Maximum running time for this script in seconds (0 = integer Minimum 0
no timeout). value: 0
Maximum
value: 300
Option Description
enable CLI script executes on all FortiGate units in the Security Fabric.
disable CLI script executes only on the FortiGate unit that the stitch is triggered.
accprofile Access profile for CLI script action to access string Not
FortiGate features. Specified
Automation destinations.
config system automation-destination
Description: Automation destinations.
edit <name>
set type [fortigate|ha-cluster]
set destination <name1>, <name2>, ...
set ha-group-id {integer}
next
end
Option Description
Automation stitches.
config system automation-stitch
Description: Automation stitches.
edit <name>
set description {var-string}
set status [enable|disable]
Option Description
config actions
Option Description
Option Description
Option Description
Option Description
Option Description
default-profile Default profile for new SSO admin. string Not Specified
Option Description
tolerance Tolerance to the range of time when the assertion is integer Minimum 5
valid (in minutes). value: 0
Maximum
value:
4294967295
life Length of the range of time when the assertion is valid integer Minimum 30
(in minutes). value: 0
Maximum
value:
4294967295
config service-providers
Option Description
config assertion-attributes
Option Description
Option Description
device- The image downloads are complete, but one or more devices have
disconnected disconnected.
cancelled The upgrade was cancelled due to the tree not being ready.
Option Description
none No failure.
Option Description
version- An image matching the device and version could not be found.
unavailable
next-path- The index of the next image to upgrade to. integer Minimum 0
index value: 0
Maximum
value: 10
config node-list
Option Description
time Scheduled time for the upgrade. Format hh:mm user Not
yyyy/mm/dd UTC. Specified
setup-time When the upgrade was configured. Format hh:mm user Not
yyyy/mm/dd UTC. Specified
Option Description
coordinating- Serial number of the FortiGate unit that controls this string Not
fortigate device. Specified
Option Description
ssl-certificate Name of local certificate for SSL connections. string Not Fortinet_
Specified Factory
Option Description
Option Description
Option Description
Option Description
Option Description
dh-keypair- Number of key pairs to pre-generate for each Diffie- integer Minimum 100 **
count Hellman group (per-worker). value: 0
Maximum
value:
50000
Option Description
config dh-group-1
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-2
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-5
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-15
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-16
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-17
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-18
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-20
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-21
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-27
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-28
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-30
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-31
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-32
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
interface Interface(s) on which the ACME client will listen for string Maximum
<interface- challenges. length: 79
name> Interface name.
source-ip Source IPv4 address used to connect to the ACME ipv4- Not 0.0.0.0
server. address Specified
source-ip6 Source IPv6 address used to connect to the ACME ipv6- Not ::
server. address Specified
Option Description
Option Description
fabric-root Use the IPAM server running on the Security Fabric root.
config pools
subnet Configure IPAM pool subnet, Class A - Class B subnet. ipv4- Not 0.0.0.0
classnet Specified 0.0.0.0
config rules
Option Description
Option Description
SMTP proxy.
config test smtp
Description: SMTP proxy.
set <Integer> {string}
end
POP3 proxy.
config test pop3
Description: POP3 proxy.
set <Integer> {string}
end
IMAP proxy.
config test imap
Description: IMAP proxy.
set <Integer> {string}
end
NNTP proxy.
config test nntp
Description: NNTP proxy.
set <Integer> {string}
end
HA relay daemon.
config test harelay
Description: HA relay daemon.
set <Integer> {string}
end
HA sync daemon.
config test hasync
Description: HA sync daemon.
set <Integer> {string}
end
HA talk daemon.
config test hatalk
Description: HA talk daemon.
set <Integer> {string}
end
FortiCloud daemon.
config test forticldd
Description: FortiCloud daemon.
set <Integer> {string}
end
Syslog daemon.
config test syslogd
Description: Syslog daemon.
set <Integer> {string}
end
Fgtlog daemon.
config test fgtlogd
Description: Fgtlog daemon.
set <Integer> {string}
end
WF monitor.
config test wf_monitor
Description: WF monitor.
set <Integer> {string}
end
Override daemon.
config test ovrd
Description: Override daemon.
set <Integer> {string}
end
IPS monitor.
config test ipsmonitor
Description: IPS monitor.
set <Integer> {string}
end
IPS sensor.
config test ipsengine
Description: IPS sensor.
set <Integer> {string}
end
SNMP daemon.
config test snmpd
Description: SNMP daemon.
set <Integer> {string}
end
Aggregate Controller.
config test acd
Description: Aggregate Controller.
set <Integer> {string}
end
DNS proxy.
config test dnsproxy
Description: DNS proxy.
set <Integer> {string}
end
sFlow daemon.
config test sflowd
Description: sFlow daemon.
set <Integer> {string}
end
init process.
config test init
Description: init process.
set <Integer> {string}
end
PPTP client.
config test pptpcd
Description: PPTP client.
set <Integer> {string}
end
WCCP daemon.
config test wccpd
Description: WCCP daemon.
set <Integer> {string}
end
RADIUS daemon.
config test radiusd
Description: RADIUS daemon.
set <Integer> {string}
end
FortiExplorer daemon.
config test fsd
Description: FortiExplorer daemon.
set <Integer> {string}
end
This command is available for reference model(s) FortiGate 140E-POE, FortiWiFi 61F,
FortiGate 601E, FortiGate 2201E. It is not available for FortiGate VM64.
Forticron daemon.
config test forticron
Description: Forticron daemon.
set <Integer> {string}
end
Upload daemon.
config test uploadd
Description: Upload daemon.
set <Integer> {string}
end
Quarantine daemon.
This command is available for reference model(s) FortiGate 140E-POE, FortiWiFi 61F,
FortiGate 601E, FortiGate 2201E. It is not available for FortiGate VM64.
Update daemon.
config test updated
Description: Update daemon.
set <Integer> {string}
end
Radius-das daemon.
config test radius-das
Description: Radius-das daemon.
set <Integer> {string}
end
Wiredapd daemon.
config test wiredapd
Description: Wiredapd daemon.
set <Integer> {string}
end
FortiService daemon.
config test fsvrd
Description: FortiService daemon.
set <Integer> {string}
end
radvd daemon.
config test radvd
Description: radvd daemon.
set <Integer> {string}
end
Kubernetes daemon.
config test kubed
Description: Kubernetes daemon.
set <Integer> {string}
end
Automation daemon.
config test autod
Description: Automation daemon.
set <Integer> {string}
end
BFD daemon.
config test bfd
Description: BFD daemon.
set <Integer> {string}
end
Option Description
Option Description
issuer CA certificate used for client certificate verification. string Not Specified
secret Pre-shared secret key used to access the password Not Specified
primary RADIUS server.
secondary- Secret key to access the secondary server. password Not Specified
secret
tertiary-secret Secret key to access the tertiary server. password Not Specified
Option Description
Option Description
nas-ip IP address used to communicate with the ipv4- Not Specified 0.0.0.0
RADIUS server and used as NAS-IP-Address address
and Called-Station-ID attributes.
Option Description
Option Description
Option Description
Option Description
Option Description
filter-Id Filter-Id
class Class
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
callback-nas- User disconnected and called back, then provided a command prompt.
prompt
Option Description
callback- User disconnected and called back, granted access to the admin unsigned
administrative interface.
Option Description
rsso-radius- UDP port to listen on for RADIUS Start and Stop integer Minimum 1813
server-port records. value: 0
Maximum
value: 65535
Option Description
Option Description
rsso-secret RADIUS secret used by the RADIUS accounting password Not Specified
server.
rsso-endpoint- RADIUS attributes used to extract the user end option - Calling-
attribute point identifier from the RADIUS Start record. Station-Id
Option Description
Option Description
Option Description
Option Description
sso-attribute RADIUS attribute that contains the profile group option - Class
name to be extracted from the RADIUS Start
record.
Option Description
sso-attribute- Key prefix for SSO group value in the SSO string Not Specified
key attribute.
Option Description
enable Enable override old attribute value with new value for the same endpoint.
disable Disable override old attribute value with new value for the same endpoint.
rsso-context- Time in seconds before the logged out user is integer Minimum 28800
timeout removed from the "user context list" of logged on value: 0
users. Maximum
value:
4294967295
rsso-log-period Time interval in seconds that group event log integer Minimum 0
messages will be generated for dynamic profile value: 0
events. Maximum
value:
4294967295
Option Description
Option Description
Option Description
enable Enable replacement of old IP address with new IP address for the same
endpoint on RADIUS accounting start.
disable Disable replacement of old IP address with new IP address for the same
endpoint on RADIUS accounting start.
Option Description
config accounting-server
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
mschap MSCHAP.
chap CHAP.
pap PAP.
ascii ASCII.
Option Description
Option Description
username User name used to sign in to the server. Must have string Not
proper permissions for service. Specified
Option Description
rpc-over-tcp Connect using RPC-over-TCP. Use for MS Exchange 2010 and earlier
versions. Supported in MS Exchange 2013.
rpc-over-http Connect using RPC-over-HTTP. Use for MS Exchange 2016 and later
versions. Supported in MS Exchange 2013.
rpc-over-https Connect using RPC-over-HTTPS. Use for MS Exchange 2016 and later
versions. Supported in MS Exchange 2013.
auth-type Authentication security type used for the RPC protocol option - kerberos
layer.
Option Description
auth-level Authentication security level used for the RPC protocol option - privacy
layer.
Option Description
http-auth-type Authentication security type used for the HTTP option - ntlm
transport.
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable No SSL.
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
keytab Base64 coded keytab file containing a pre-shared key. string Not
Specified
Option Description
none The server is not configured as an Active Directory Domain Server (AD DS).
lds The server is an Active Directory Lightweight Domain Server (AD LDS).
username User name to sign in with. Must have proper string Not
permissions for service. Specified
port Port to be used for communication with the domain integer Minimum 445
controller . value: 0
Maximum
value:
65535
source-ip- FortiGate IPv4 address to be used for communication ipv4- Not 0.0.0.0
address with the domain controller. address Specified
source-port Source port to be used for communication with the integer Minimum 0
domain controller. value: 0
Maximum
value:
65535
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
replication- Port to be used for communication with the domain integer Minimum 0
port controller for replication service. Port number 0 value: 0
indicates automatic discovery. Maximum
value:
65535
Option Description
config extra-server
port Port to be used for communication with the domain integer Minimum 445
controller . value: 0
Maximum
value:
65535
source-ip- FortiGate IPv4 address to be used for communication ipv4- Not 0.0.0.0
address with the domain controller. address Specified
source-port Source port to be used for communication with the integer Minimum 0
domain controller. value: 0
Maximum
value:
65535
Option Description
none None.
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
Option Description
Option Description
email-adfs-1x E-mail address of the user when interoperating with AD FS 1.1 or ADFS 1.0.
Option Description
Option Description
email-adfs-1x E-mail address of the user when interoperating with AD FS 1.1 or ADFS 1.0.
Option Description
Option Description
port Port of the first FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
port2 Port of the second FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
port3 Port of the third FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
port4 Port of the fourth FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
port5 Port of the fifth FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
Option Description
Option Description
Option Description
Option Description
Option Description
status Enable/disable polling for the status of this Active option - enable
Directory server.
Option Description
server Host name or IP address of the Active Directory server. string Not
Specified
port Port to communicate with this Active Directory server. integer Minimum 0
value: 0
Maximum
value:
65535
user User name required to log into this Active Directory string Not
server. Specified
password Password required to log into this Active Directory password Not
server. Specified
ldap-server LDAP server name used in LDAP connection strings. string Not
Specified
logon-history Number of hours of logon history to keep, 0 means keep integer Minimum 8
all history. value: 0
Maximum
value: 48
Option Description
Option Description
Configure FortiToken.
config user fortitoken
Description: Configure FortiToken.
edit <serial-number>
set status [active|lock]
set seed {string}
set comments {var-string}
set license {string}
set activation-code {string}
set activation-expire {integer}
set reg-id {string}
set os-ver {string}
next
end
Option Description
expire-days Time in days before the user's password expires. integer Minimum 180
value: 0
Maximum
value: 999
Option Description
Option Description
Option Description
ldap-server Name of LDAP server with which the user must string Not Specified
authenticate.
radius-server Name of RADIUS server with which the user must string Not Specified
authenticate.
tacacs+-server Name of TACACS+ server with which the user string Not Specified
must authenticate.
Option Description
disable disable
fortitoken FortiToken
Option Description
Option Description
Option Description
passwd-policy Password policy to apply to this user, as defined string Not Specified
in config user password-policy.
workstation Name of the remote user workstation, if you want string Not Specified
to limit the user to authenticate only from a
particular workstation.
Option Description
ppk-secret IKEv2 Postquantum Preshared Key (ASCII string password-3 Not Specified
or hexadecimal encoded with a leading 0x).
Option Description
disable Ignore case and accents. Username at prompt not required to match case or
accents.
enable Do not ignore case and accents. Username at prompt must be an exact
match.
Option Description
auth-cert HTTPS server certificate for policy authentication. string Not Specified
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
auth-portal- Time in minutes before captive portal user have to integer Minimum 3
timeout re-authenticate . value: 1
Maximum
value: 30
radius-ses- Set the RADIUS session timeout to a hard timeout or option - hard-
timeout-act to ignore RADIUS server session timeouts. timeout
Option Description
auth-lockout- Lockout period in seconds after too many login integer Minimum 0
duration failures. value: 0
Maximum
value:
4294967295
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
sslv3 SSLv3.
tlsv1 TLSv1.
tlsv1-1 TLSv1.1.
tlsv1-2 TLSv1.2.
tlsv1-3 TLSv1.3.
Option Description
config auth-ports
Option Description
port Non-standard port for firewall user authentication. integer Minimum 1024
value: 1
Maximum
value:
65535
mandatory- Determine what happens to the peer if the CA certificate option - enable
ca-verify is not installed. Disable to automatically consider the
peer certificate as valid.
Option Description
Option Description
ldap-server Name of an LDAP server defined under the user ldap string Not
command. Performs client access rights check. Specified
Option Description
password Username/password.
ocsp- Online Certificate Status Protocol (OCSP) server for string Not
override- certificate retrieval. Specified
server
Option Description
Option Description
firewall- Firewall address group which includes all quarantine string Not
groups MAC address. Specified
config targets
config macs
Option Description
Option Description
firewall Firewall.
guest Guest.
Option Description
sso-attribute- Name of the RADIUS user group that this local string Not Specified
value user group represents.
Option Description
specify Specify.
Option Description
specify Specify.
disable Disable.
Option Description
sponsor Set the action for the sponsor guest user field. option - optional
Option Description
optional Optional.
mandatory Mandatory.
disabled Disabled.
company Set the action for the company guest user field. option - optional
Option Description
optional Optional.
mandatory Mandatory.
disabled Disabled.
email Enable/disable the guest user email address field. option - enable
Option Description
Option Description
Option Description
Option Description
immediately Immediately.
expire Time in seconds before guest user accounts expire integer Minimum 14400
. value: 1
Maximum
value:
31536000
Option Description
config guest
sponsor Set the action for the sponsor guest user field. string Not
Specified
company Set the action for the company guest user field. string Not
Specified
config rule
description Description for the NAC policy matching pattern. string Not
Specified
Option Description
Option Description
switch-fortilink FortiLink interface for which this NAC policy belongs to. string Not
Specified
switch-mac- Switch MAC policy action to be applied on the matched string Not
policy NAC policy. Specified
ssid-policy SSID policy to be applied on the matched NAC policy. string Not
Specified
Option Description
Option Description
Option Description
config entries
Option Description
Option Description
Option Description
Option Description
config filters
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
register-rate REGISTER request rate limit (per second, per integer Minimum 0
policy). value: 0
Maximum
value:
4294967295
Option Description
none None.
invite-rate INVITE request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
Option Description
Option Description
Option Description
call-keepalive Continue tracking calls with no RTP for this many integer Minimum 0
minutes. value: 0
Maximum
value: 10080
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
subscribe-rate SUBSCRIBE request rate limit (per second, per integer Minimum 0
policy). value: 0
Maximum
value:
4294967295
Option Description
none None.
message-rate MESSAGE request rate limit (per second, per integer Minimum 0
policy). value: 0
Maximum
value:
4294967295
Option Description
none None.
notify-rate NOTIFY request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
refer-rate REFER request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
update-rate UPDATE request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
options-rate OPTIONS request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
ack-rate ACK request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
prack-rate PRACK request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
info-rate INFO request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
publish-rate PUBLISH request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
bye-rate BYE request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
cancel-rate CANCEL request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
malformed- Action for malformed SIP messages without Require option - pass
header-no- header.
require
Option Description
malformed- Action for malformed SIP messages without Proxy- option - pass
header-no- Require header.
proxy-require
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ssl-mode SSL/TLS mode for encryption & decryption of traffic. option - off
Option Description
off No SSL.
Option Description
Option Description
secure Reject any SSL connection that does not offer a RFC 5746 Secure
Renegotiation Indication.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
Option Description
ssl-server- Name of Certificate return to the client in every SSL string Not Specified
certificate connection.
ssl-auth-client Require a client certificate and authenticate it with string Not Specified
the peer/peergrp.
ssl-auth-server Authenticate the server's certificate with the string Not Specified
peer/peergrp.
config sccp
Option Description
Option Description
Option Description
Option Description
Option Description
max-calls Maximum calls per minute per SCCP client (max integer Minimum 0
65535). value: 0
Maximum
value:
65535
config msrp
Option Description
Option Description
Option Description
CA certificate.
config vpn certificate ca
Description: CA certificate.
edit <name>
set ca {user}
set range [global|vdom]
set source [factory|user|...]
set ssl-inspection-trusted [enable|disable]
set scep-url {string}
set auto-update-days {integer}
set auto-update-days-warning {integer}
set source-ip {ipv4-address}
set ca-identifier {string}
set obsolete [disable|enable]
next
end
range Either global or VDOM IP address range for the CA option - vdom
certificate.
Option Description
Option Description
Option Description
source-ip Source IP address for communications to the SCEP ipv4- Not Specified 0.0.0.0
server. address
Option Description
disable Alive.
enable Obsolete.
range Either the global or VDOM IP address range for the option - vdom
remote certificate.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
renewal Renewal.
acme-ca-url The URL for the ACME CA string Not Specified https://acme-
server . v02.api.letsencrypt.org/directory
range Either global or VDOM IP address range for the option - vdom
certificate.
Option Description
Option Description
ldap-server LDAP server name for CRL auto-update. string Not Specified
http-url HTTP server URL for CRL auto-update. string Not Specified
scep-url SCEP server URL for CRL auto-update. string Not Specified
scep-cert Local certificate for SCEP communication for CRL string Not Specified Fortinet_
auto-update. CA_SSL
update- Time in seconds before the FortiGate checks for an integer Minimum 0
interval updated CRL. Set to 0 to update only when it expires. value: 0
Maximum
value:
4294967295
source-ip Source IP address for communications to a HTTP or ipv4- Not Specified 0.0.0.0
SCEP CA server. address
unavail-action Action when server is unavailable (revoke the certificate option - revoke
or ignore the result of the check).
Option Description
source-ip Source IP address for communications to the OCSP ipv4- Not 0.0.0.0
server. address Specified
Option Description
ocsp-option Specify whether the OCSP URL is from certificate or option - server
configured OCSP server.
Option Description
ssl-ocsp- Source IP address to use to communicate with the ipv4- Not 0.0.0.0
source-ip OCSP server. address Specified
Option Description
Option Description
Option Description
Option Description
substring Find a match if the name being searched for is a part or the same as a
certificate subject RDN.
value Find a match if the name being searched for is same as a certificate subject
RDN.
Option Description
subset Find a match if the name being searched for is a subset of a certificate subject.
superset Find a match if the name being searched for is a superset of a certificate
subject.
Option Description
substring Find a match if the name being searched for is a part or the same as a
certificate CN.
value Find a match if the name being searched for is same as a certificate CN.
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
certname- 1024 bit RSA key certificate for re-signing server string Not Fortinet_
rsa1024 certificates for SSL inspection. Specified SSL_
RSA1024
certname- 2048 bit RSA key certificate for re-signing server string Not Fortinet_
rsa2048 certificates for SSL inspection. Specified SSL_
RSA2048
certname- 4096 bit RSA key certificate for re-signing server string Not Fortinet_
rsa4096 certificates for SSL inspection. Specified SSL_
RSA4096
certname- 1024 bit DSA key certificate for re-signing server string Not Fortinet_
dsa1024 certificates for SSL inspection. Specified SSL_
DSA1024
certname- 2048 bit DSA key certificate for re-signing server string Not Fortinet_
dsa2048 certificates for SSL inspection. Specified SSL_
DSA2048
certname- 256 bit ECDSA key certificate for re-signing server string Not Fortinet_
ecdsa256 certificates for SSL inspection. Specified SSL_
ECDSA256
certname- 384 bit ECDSA key certificate for re-signing server string Not Fortinet_
ecdsa384 certificates for SSL inspection. Specified SSL_
ECDSA384
certname- 521 bit ECDSA key certificate for re-signing server string Not Fortinet_
ecdsa521 certificates for SSL inspection. Specified SSL_
ECDSA521
certname- 253 bit EdDSA key certificate for re-signing server string Not Fortinet_
ed25519 certificates for SSL inspection. Specified SSL_
ED25519
certname- 456 bit EdDSA key certificate for re-signing server string Not Fortinet_
ed448 certificates for SSL inspection. Specified SSL_ED448
config crl-verification
Option Description
leaf-crl- CRL verification option when leaf CRL is absent . option - ignore
absence
Option Description
chain-crl- CRL verification option when CRL of any certificate in option - ignore
absence chain is absent .
Option Description
Realm.
config vpn ssl web realm
Description: Realm.
edit <url-path>
set max-concurrent-user {integer}
set login-page {var-string}
set virtual-host {var-string}
set virtual-host-only [enable|disable]
set virtual-host-server-cert {string}
set radius-server {string}
set nas-ip {ipv4-address}
set radius-port {integer}
next
end
Option Description
virtual-host- Name of the server certificate to used for this realm. string Not
server-cert Specified
nas-ip IP address used as a NAS-IP to communicate with the ipv4- Not 0.0.0.0
RADIUS server. address Specified
Option Description
Option Description
av AntiVirus.
fw Firewall.
config check-item-list
Option Description
require Require.
deny Deny.
Option Description
file File.
registry Registry.
process Process.
Portal.
config vpn ssl web portal
Description: Portal.
edit <name>
set tunnel-mode [enable|disable]
set ip-mode [range|user-group|...]
set dhcp-ip-overlap [use-new|use-old]
set auto-connect [enable|disable]
set keep-alive [enable|disable]
set save-password [enable|disable]
set ip-pools <name1>, <name2>, ...
set exclusive-routing [enable|disable]
set service-restriction [enable|disable]
Option Description
ip-mode Method by which users of this SSL-VPN tunnel obtain option - range
IP addresses.
Option Description
range Use the IP addresses available for all SSL-VPN users as defined by the SSL
settings command.
user-group Use the IP addresses associated with individual users or user groups
(usually from external auth servers).
Option Description
use-new Assign DHCP lease to new client and remove old client lease.
Option Description
Option Description
Option Description
ip-pools IPv4 firewall source address objects reserved for SSL- string Maximum
<name> VPN tunnel mode clients. length: 79
Address name.
Option Description
Option Description
Option Description
Option Description
split-tunneling- IPv4 SSL-VPN tunnel mode firewall address objects string Maximum
routing-address that override firewall policy destination addresses to length: 79
<name> control split-tunneling access.
Address name.
Option Description
ipv6-pools IPv6 firewall source address objects reserved for SSL- string Maximum
<name> VPN tunnel mode clients. length: 79
Address name.
ipv6-exclusive- Enable/disable all IPv6 traffic go through tunnel only. option - disable
routing
Option Description
Option Description
Option Description
ipv6-split- Enable to negate IPv6 split tunneling routing address. option - disable
tunneling-
routing-negate
Option Description
ipv6-split- IPv6 SSL-VPN tunnel mode firewall address objects string Maximum
tunneling- that override firewall policy destination addresses to length: 79
routing-address control split-tunneling access.
<name> Address name.
Option Description
display- Enable to display the web portal bookmark widget. option - enable
bookmark
Option Description
user-bookmark Enable to allow web portal users to create their own option - enable
bookmarks.
Option Description
Option Description
user-group- Enable to allow web portal users to create bookmarks option - enable
bookmark for all users in the same user group.
Option Description
display- Enable to display the web portal connection tools option - enable
connection- widget.
tools
Option Description
display-history Enable to display the web portal user login history option - enable
widget.
Option Description
display-status Enable to display the web portal status widget. option - enable
Option Description
rewrite-ip-uri-ui Rewrite contents for URI contains IP and /ui/ . option - disable
Option Description
Option Description
Option Description
custom-lang Change the web portal display language. Overrides string Not
config system global set language. You can use config Specified
system custom-language and execute system custom-
language to add custom language files.
Option Description
Option Description
enable enable
disable disable
Option Description
Option Description
Option Description
prefer-ipv6-dns Prefer to query IPv6 DNS server first if enabled. option - disable
Option Description
Option Description
Option Description
av-fw AntiVirus and firewall software recognized by the Windows Security Center.
custom Custom.
host-check- One or more policies to require the endpoint to have string Maximum
policy <name> specific security software. length: 79
Host check software list name.
limit-user-logins Enable to limit each user to one SSL-VPN session at a option - disable
time.
Option Description
Option Description
Option Description
os-check Enable to let the FortiGate decide action based on option - disable
client OS.
Option Description
Option Description
Option Description
Option Description
skip-check-for- Enable to skip host check if client OS does not support option - enable
unsupported-os it.
Option Description
skip-check-for- Enable to skip host check for browser support. option - enable
browser
Option Description
hide-sso- Enable to prevent SSO credential being sent to client. option - enable
credential
Option Description
Option Description
ftp FTP.
rdp RDP.
sftp SFTP.
smb SMB/CIFS.
ssh SSH.
telnet Telnet.
vnc VNC.
web HTTP/HTTPS.
Option Description
cz Czech.
da Danish.
nl Dutch.
de German.
Option Description
es Spanish.
fi Finish.
fr French.
hr Croatian.
hu Hungarian.
it Italian.
ja Japanese.
ko Korean.
lt Lithuanian.
mk Macedonian (FYROM).
Option Description
no Norwegian.
pt Portuguese.
ru Russian.
sl Slovenian.
sv Swedish.
tuk Turkmen.
tur-f Turkish F.
tur-q Turkish Q.
Option Description
Option Description
preconnection- An arbitrary string which identifies the RDP var-string Not Specified
blob source.
load-balancing- The load balancing information or cookie which var-string Not Specified
info should be provided to the connection broker.
Option Description
Option Description
Option Description
Option Description
alternative Alternative.
sso-credential- Single sign-on credentials are only sent once to option - disable
sent-once remote server.
Option Description
enable Single sign-on credentials are only sent once to remote server.
disable Single sign-on credentials are sent to remote server for every HTTP
request.
config form-data
config mac-addr-check-rule
Option Description
config split-dns
domains Split DNS domains used for SSL-VPN clients separated var-string Not
by comma. Specified
config bookmarks
Option Description
ftp FTP.
rdp RDP.
sftp SFTP.
smb SMB/CIFS.
ssh SSH.
telnet Telnet.
vnc VNC.
web HTTP/HTTPS.
Option Description
cz Czech.
da Danish.
nl Dutch.
de German.
es Spanish.
fi Finish.
fr French.
Option Description
hr Croatian.
hu Hungarian.
it Italian.
ja Japanese.
ko Korean.
lt Lithuanian.
mk Macedonian (FYROM).
no Norwegian.
pt Portuguese.
ru Russian.
sl Slovenian.
Option Description
sv Swedish.
tuk Turkmen.
tur-f Turkish F.
tur-q Turkish Q.
Option Description
Option Description
preconnection- An arbitrary string which identifies the RDP var-string Not Specified
blob source.
load-balancing- The load balancing information or cookie which var-string Not Specified
info should be provided to the connection broker.
Option Description
Option Description
Option Description
Option Description
alternative Alternative.
sso-credential- Single sign-on credentials are only sent once to option - disable
sent-once remote server.
Option Description
enable Single sign-on credentials are only sent once to remote server.
disable Single sign-on credentials are sent to remote server for every HTTP
request.
config form-data
config bookmarks
Option Description
ftp FTP.
rdp RDP.
sftp SFTP.
smb SMB/CIFS.
ssh SSH.
telnet Telnet.
vnc VNC.
web HTTP/HTTPS.
Option Description
cz Czech.
da Danish.
nl Dutch.
de German.
es Spanish.
fi Finish.
fr French.
Option Description
hr Croatian.
hu Hungarian.
it Italian.
ja Japanese.
ko Korean.
lt Lithuanian.
mk Macedonian (FYROM).
no Norwegian.
pt Portuguese.
ru Russian.
sl Slovenian.
sv Swedish.
tuk Turkmen.
Option Description
tur-f Turkish F.
tur-q Turkish Q.
Option Description
Option Description
preconnection- An arbitrary string which identifies the RDP var-string Not Specified
blob source.
load-balancing- The load balancing information or cookie which var-string Not Specified
info should be provided to the connection broker.
Option Description
Option Description
Option Description
Option Description
Option Description
alternative Alternative.
sso-credential- Single sign-on credentials are only sent once to option - disable
sent-once remote server.
Option Description
enable Single sign-on credentials are only sent once to remote server.
disable Single sign-on credentials are sent to remote server for every HTTP
request.
config form-data
Configure SSL-VPN.
config vpn ssl settings
Description: Configure SSL-VPN.
set status [enable|disable]
set reqclientcert [enable|disable]
set user-peer {string}
set ssl-max-proto-ver [tls1-0|tls1-1|...]
set ssl-min-proto-ver [tls1-0|tls1-1|...]
set banned-cipher {option1}, {option2}, ...
set ciphersuite {option1}, {option2}, ...
set ssl-insert-empty-fragment [enable|disable]
set https-redirect [enable|disable]
set x-content-type-options [enable|disable]
set ssl-client-renegotiation [disable|enable]
set force-two-factor-auth [enable|disable]
set unsafe-legacy-renegotiation [enable|disable]
set servercert {string}
set algorithm [high|medium|...]
set idle-timeout {integer}
set auth-timeout {integer}
set login-attempt-limit {integer}
set login-block-time {integer}
set login-timeout {integer}
set dtls-hello-timeout {integer}
set tunnel-ip-pools <name1>, <name2>, ...
set tunnel-ipv6-pools <name1>, <name2>, ...
set dns-suffix {var-string}
set dns-server1 {ipv4-address}
set dns-server2 {ipv4-address}
set wins-server1 {ipv4-address}
set wins-server2 {ipv4-address}
set ipv6-dns-server1 {ipv6-address}
Option Description
Option Description
Option Description
Option Description
Option Description
DHE Ban the use of cipher suites using authenticated ephemeral DH key
agreement.
ECDHE Ban the use of cipher suites using authenticated ephemeral ECDH key
agreement.
AES Ban the use of cipher suites using either 128 or 256 bit AES.
AESGCM Ban the use of cipher suites AES in Galois Counter Mode (GCM).
CAMELLIA Ban the use of cipher suites using either 128 or 256 bit CAMELLIA.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
servercert Name of the server certificate to be used for string Not Specified
SSL-VPNs.
algorithm Force the SSL-VPN security level. High allows option - high
only high. Medium allows medium and high. Low
allows any.
Option Description
default default
idle-timeout SSL-VPN disconnects if idle for specified time in integer Minimum 300
seconds. value: 0
Maximum
value: 259200
login-block-time Time for which a user is blocked from logging in integer Minimum 60
after too many failed login attempts . value: 0
Maximum
value:
4294967295
tunnel-ip-pools Names of the IPv4 IP Pool firewall objects that string Maximum
<name> define the IP addresses reserved for remote length: 79
clients.
Address name.
tunnel-ipv6- Names of the IPv6 IP Pool firewall objects that string Maximum
pools <name> define the IP addresses reserved for remote length: 79
clients.
Address name.
dns-suffix DNS suffix used for SSL-VPN clients. var-string Not Specified
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
tunnel-user- Time out value to clean up user session after integer Minimum 30
session-timeout tunnel connection is dropped . value: 1
Maximum
value: 255
Option Description
Option Description
Option Description
encrypt-and- Encrypt and store user passwords for SSL-VPN option - disable
store-password web sessions.
Option Description
Option Description
dual-stack- Tunnel mode: enable parallel IPv4 and IPv6 option - disable
mode tunnel. Web mode: support IPv4 and IPv6
bookmarks in the portal.
Option Description
tunnel-addr- Method used for assigning address for tunnel. option - first-available
assigned-
method
Option Description
round-robin Assign the available address from the pool with a round robin fashion.
saml-redirect- SAML local redirect port in the machine running integer Minimum 8020
port FortiClient . 0 is to disable redirection on FGT value: 0
side. Maximum
value: 65535
Option Description
enable Enable use of IP pools defined in firewall policy while using web-mode.
disable Disable use of IP pools defined in firewall policy while using web-mode.
Option Description
config authentication-rule
Option Description
Option Description
Option Description
Option Description
Option Description
any Any
local Local
radius RADIUS
tacacs+ TACACS+
ldap LDAP
peer PEER
Client.
config vpn ssl client
Description: Client.
user Username to offer to the peer to authenticate the string Not Specified
client.
psk Pre-shared secret to authenticate with the server password-3 Not Specified
(ASCII string or hexadecimal encoded with a leading
0x).
peer Authenticate peer's certificate with the peer/peergrp. string Not Specified
server IPv4, IPv6 or DNS address of the SSL-VPN server. string Not Specified
Option Description
source-ip IPv4 or IPv6 address to use as a source for the SSL- string Not Specified
VPN connection to the server.
SSL-VPN session.
config vpn ssl monitor
Description: SSL-VPN session.
end
Option Description
ddns Remote VPN gateway has dynamic IP address and is a dynamic DNS
client.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
domain Instruct unity clients about the single default string Not
DNS domain. Specified
Option Description
ipv4-split- IPv4 subnets that should not be sent over string Not
exclude the IPsec tunnel. Specified
ipv6-split- IPv6 subnets that should not be sent over string Not
exclude the IPsec tunnel. Specified
Option Description
Option Description
disable Disable allowing the VPN client to bring up the tunnel when there is no
traffic.
enable Enable allowing the VPN client to bring up the tunnel when there is no
traffic.
Option Description
disable Disable allowing the VPN client to keep the tunnel up when there is no
traffic.
enable Enable allowing the VPN client to keep the tunnel up when there is no
traffic.
Option Description
des-md5 des-md5
des-sha1 des-sha1
des-sha256 des-sha256
des-sha384 des-sha384
des-sha512 des-sha512
3des-md5 3des-md5
3des-sha1 3des-sha1
3des-sha256 3des-sha256
3des-sha384 3des-sha384
3des-sha512 3des-sha512
aes128-md5 aes128-md5
aes128-sha1 aes128-sha1
aes128-sha256 aes128-sha256
aes128-sha384 aes128-sha384
aes128-sha512 aes128-sha512
aes128gcm-prfsha1 aes128gcm-prfsha1
aes128gcm-prfsha256 aes128gcm-prfsha256
aes128gcm-prfsha384 aes128gcm-prfsha384
aes128gcm-prfsha512 aes128gcm-prfsha512
aes192-md5 aes192-md5
Option Description
aes192-sha1 aes192-sha1
aes192-sha256 aes192-sha256
aes192-sha384 aes192-sha384
aes192-sha512 aes192-sha512
aes256-md5 aes256-md5
aes256-sha1 aes256-sha1
aes256-sha256 aes256-sha256
aes256-sha384 aes256-sha384
aes256-sha512 aes256-sha512
aes256gcm-prfsha1 aes256gcm-prfsha1
aes256gcm-prfsha256 aes256gcm-prfsha256
aes256gcm-prfsha384 aes256gcm-prfsha384
aes256gcm-prfsha512 aes256gcm-prfsha512
chacha20poly1305-prfsha1 chacha20poly1305-prfsha1
chacha20poly1305-prfsha256 chacha20poly1305-prfsha256
chacha20poly1305-prfsha384 chacha20poly1305-prfsha384
chacha20poly1305-prfsha512 chacha20poly1305-prfsha512
aria128-md5 aria128-md5
aria128-sha1 aria128-sha1
aria128-sha256 aria128-sha256
aria128-sha384 aria128-sha384
aria128-sha512 aria128-sha512
aria192-md5 aria192-md5
aria192-sha1 aria192-sha1
aria192-sha256 aria192-sha256
aria192-sha384 aria192-sha384
aria192-sha512 aria192-sha512
aria256-md5 aria256-md5
aria256-sha1 aria256-sha1
Option Description
aria256-sha256 aria256-sha256
aria256-sha384 aria256-sha384
aria256-sha512 aria256-sha512
seed-md5 seed-md5
seed-sha1 seed-sha1
seed-sha256 seed-sha256
seed-sha384 seed-sha384
seed-sha512 seed-sha512
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
on-demand Trigger Dead Peer Detection when IPsec traffic is sent but no reply is
received from the peer.
Option Description
Option Description
Option Description
Option Description
1 DH Group 1.
2 DH Group 2.
5 DH Group 5.
14 DH Group 14.
Option Description
15 DH Group 15.
16 DH Group 16.
17 DH Group 17.
18 DH Group 18.
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
27 DH Group 27.
28 DH Group 28.
29 DH Group 29.
30 DH Group 30.
31 DH Group 31.
32 DH Group 32.
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow, but do not require, use of IKEv2 Postquantum Preshared Key (PPK).
Option Description
Option Description
Option Description
disable Disable.
Option Description
Option Description
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
enable Enable copy the dscp in the ESP header to the inner IP Header.
disable Disable copy the dscp in the ESP header to the inner IP Header.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sha1 SHA1.
sha2-256 SHA2-256.
sha2-384 SHA2-384.
sha2-512 SHA2-512.
Option Description
Option Description
Option Description
Option Description
enable Enable cross validation of peer ID and the identity in the peer's certificate as
specified in RFC 4945.
disable Disable cross validation of peer ID and the identity in the peer's certificate
as specified in RFC 4945.
Option Description
Option Description
Option Description
config ipv6-exclude-range
phase1name Phase 1 determines the options required for string Not Specified
phase 2.
Option Description
Option Description
enable Replace source selector with interface IP when using outbound NAT.
Option Description
Option Description
null-md5 null-md5
null-sha1 null-sha1
null-sha256 null-sha256
null-sha384 null-sha384
null-sha512 null-sha512
des-null des-null
des-md5 des-md5
des-sha1 des-sha1
des-sha256 des-sha256
des-sha384 des-sha384
des-sha512 des-sha512
3des-null 3des-null
3des-md5 3des-md5
3des-sha1 3des-sha1
3des-sha256 3des-sha256
3des-sha384 3des-sha384
3des-sha512 3des-sha512
aes128-null aes128-null
aes128-md5 aes128-md5
aes128-sha1 aes128-sha1
aes128-sha256 aes128-sha256
aes128-sha384 aes128-sha384
aes128-sha512 aes128-sha512
aes128gcm aes128gcm
aes192-null aes192-null
aes192-md5 aes192-md5
aes192-sha1 aes192-sha1
aes192-sha256 aes192-sha256
Option Description
aes192-sha384 aes192-sha384
aes192-sha512 aes192-sha512
aes256-null aes256-null
aes256-md5 aes256-md5
aes256-sha1 aes256-sha1
aes256-sha256 aes256-sha256
aes256-sha384 aes256-sha384
aes256-sha512 aes256-sha512
aes256gcm aes256gcm
chacha20poly1305 chacha20poly1305
aria128-null aria128-null
aria128-md5 aria128-md5
aria128-sha1 aria128-sha1
aria128-sha256 aria128-sha256
aria128-sha384 aria128-sha384
aria128-sha512 aria128-sha512
aria192-null aria192-null
aria192-md5 aria192-md5
aria192-sha1 aria192-sha1
aria192-sha256 aria192-sha256
aria192-sha384 aria192-sha384
aria192-sha512 aria192-sha512
aria256-null aria256-null
aria256-md5 aria256-md5
aria256-sha1 aria256-sha1
aria256-sha256 aria256-sha256
aria256-sha384 aria256-sha384
aria256-sha512 aria256-sha512
seed-null seed-null
Option Description
seed-md5 seed-md5
seed-sha1 seed-sha1
seed-sha256 seed-sha256
seed-sha384 seed-sha384
seed-sha512 seed-sha512
Option Description
Option Description
Option Description
1 DH Group 1.
2 DH Group 2.
5 DH Group 5.
14 DH Group 14.
15 DH Group 15.
16 DH Group 16.
17 DH Group 17.
18 DH Group 18.
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
27 DH Group 27.
Option Description
28 DH Group 28.
29 DH Group 29.
30 DH Group 30.
31 DH Group 31.
32 DH Group 32.
Option Description
Option Description
Option Description
Option Description
inbound-dscp- Enable/disable copy the dscp in the ESP header option - phase1
copy to the inner IP Header.
Option Description
phase1 copy the dscp in the ESP header to the inner IP Header according to the
phase1 inbound_dscp_copy setting.
Option Description
enable Enable copy the dscp in the ESP header to the inner IP Header.
disable Disable copy the dscp in the ESP header to the inner IP Header.
keylifekbs Phase2 key life in number of kilobytes of traffic . integer Minimum 5120
value: 5120
Maximum
value:
4294967295
Option Description
Option Description
Option Description
use-old Use the old route and do not add the new route.
use-new Delete the old route and add the new route.
Option Description
Option Description
Option Description
Option Description
diffservcode DSCP value to be applied to the IPsec tunnel user Not Specified
outer IP header.
Option Description
ip IPv4 IP.
Option Description
ip IPv4 IP.
authentication Authentication algorithm. Must be the same for both option - null
ends of the tunnel.
Option Description
null Null.
md5 MD5.
sha1 SHA1.
sha256 SHA256.
sha384 SHA384.
sha512 SHA512.
encryption Encryption algorithm. Must be the same for both ends option - null
of the tunnel.
Option Description
null Null.
des DES.
3des 3DES.
aes128 AES128.
aes192 AES192.
aes256 AES256.
aria128 ARIA128.
aria192 ARIA192.
aria256 ARIA256.
seed Seed.
localspi Local SPI, a hexadecimal 8-digit (4-byte) tag. Discerns user Not
between two traffic streams with different encryption Specified
rules.
Option Description
Concentrator configuration.
config vpn ipsec concentrator
Description: Concentrator configuration.
edit <id>
set name {string}
set src-check [disable|enable]
set member <name1>, <name2>, ...
next
end
Option Description
config mappings
packet-loss- Apply FEC parameters when packet loss is >= integer Minimum 0
threshold threshold . value: 0
Maximum
value: 100
latency- Apply FEC parameters when latency is <= threshold integer Minimum 0
threshold (0 means no threshold). value: 0
Maximum
value:
4294967295
Option Description
Option Description
ddns Remote VPN gateway has dynamic IP address and is a dynamic DNS
client.
Option Description
Option Description
local-gw IPv4 address of the local gateway's ipv4-address Not Specified 0.0.0.0
external interface.
remote-gw IPv4 address of the remote gateway's ipv4-address Not Specified 0.0.0.0
external interface.
Option Description
Option Description
Option Description
Option Description
default-gw IPv4 address of default route gateway to ipv4-address Not Specified 0.0.0.0
use for traffic exiting the interface.
usrgrp User group name for dialup peers. string Not Specified
Option Description
Option Description
sunday Sunday.
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
thursday Thursday.
friday Friday.
saturday Saturday.
Option Description
Option Description
Option Description
exchange-ip- IPv4 address to exchange with peers. ipv4-address Not Specified 0.0.0.0
addr4
Option Description
Option Description
Option Description
Option Description
Option Description
dhcp-ra-giaddr Relay agent gateway IP address to use in ipv4-address Not Specified 0.0.0.0
the giaddr field of DHCP requests.
dhcp6-ra- Relay agent IPv6 link address to use in ipv6-address Not Specified ::
linkaddr DHCP6 requests.
Option Description
Option Description
domain Instruct unity clients about the single string Not Specified
default DNS domain.
banner Message that unity client should display var-string Not Specified
after connecting.
Option Description
ipv4-split- IPv4 subnets that should not be sent over string Not Specified
exclude the IPsec tunnel.
ipv6-split- IPv6 subnets that should not be sent over string Not Specified
exclude the IPsec tunnel.
Option Description
Option Description
disable Disable allowing the VPN client to bring up the tunnel when there is no
traffic.
enable Enable allowing the VPN client to bring up the tunnel when there is no
traffic.
Option Description
disable Disable allowing the VPN client to keep the tunnel up when there is no
traffic.
enable Enable allowing the VPN client to keep the tunnel up when there is no
traffic.
Option Description
des-md5 des-md5
des-sha1 des-sha1
des-sha256 des-sha256
Option Description
des-sha384 des-sha384
des-sha512 des-sha512
3des-md5 3des-md5
3des-sha1 3des-sha1
3des-sha256 3des-sha256
3des-sha384 3des-sha384
3des-sha512 3des-sha512
aes128-md5 aes128-md5
aes128-sha1 aes128-sha1
aes128-sha256 aes128-sha256
aes128-sha384 aes128-sha384
aes128-sha512 aes128-sha512
aes128gcm-prfsha1 aes128gcm-prfsha1
aes128gcm-prfsha256 aes128gcm-prfsha256
aes128gcm-prfsha384 aes128gcm-prfsha384
aes128gcm-prfsha512 aes128gcm-prfsha512
aes192-md5 aes192-md5
aes192-sha1 aes192-sha1
aes192-sha256 aes192-sha256
aes192-sha384 aes192-sha384
aes192-sha512 aes192-sha512
aes256-md5 aes256-md5
aes256-sha1 aes256-sha1
aes256-sha256 aes256-sha256
aes256-sha384 aes256-sha384
aes256-sha512 aes256-sha512
aes256gcm-prfsha1 aes256gcm-prfsha1
aes256gcm-prfsha256 aes256gcm-prfsha256
aes256gcm-prfsha384 aes256gcm-prfsha384
Option Description
aes256gcm-prfsha512 aes256gcm-prfsha512
chacha20poly1305-prfsha1 chacha20poly1305-prfsha1
chacha20poly1305-prfsha256 chacha20poly1305-prfsha256
chacha20poly1305-prfsha384 chacha20poly1305-prfsha384
chacha20poly1305-prfsha512 chacha20poly1305-prfsha512
aria128-md5 aria128-md5
aria128-sha1 aria128-sha1
aria128-sha256 aria128-sha256
aria128-sha384 aria128-sha384
aria128-sha512 aria128-sha512
aria192-md5 aria192-md5
aria192-sha1 aria192-sha1
aria192-sha256 aria192-sha256
aria192-sha384 aria192-sha384
aria192-sha512 aria192-sha512
aria256-md5 aria256-md5
aria256-sha1 aria256-sha1
aria256-sha256 aria256-sha256
aria256-sha384 aria256-sha384
aria256-sha512 aria256-sha512
seed-md5 seed-md5
seed-sha1 seed-sha1
seed-sha256 seed-sha256
seed-sha384 seed-sha384
seed-sha512 seed-sha512
Option Description
Option Description
psksecret- Pre-shared secret for remote side PSK password-3 Not Specified
remote authentication (ASCII string or
hexadecimal encoded with a leading 0x).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
on-demand Trigger Dead Peer Detection when IPsec traffic is sent but no reply is
received from the peer.
Option Description
Option Description
Option Description
Option Description
1 DH Group 1.
2 DH Group 2.
5 DH Group 5.
14 DH Group 14.
15 DH Group 15.
16 DH Group 16.
17 DH Group 17.
18 DH Group 18.
19 DH Group 19.
Option Description
20 DH Group 20.
21 DH Group 21.
27 DH Group 27.
28 DH Group 28.
29 DH Group 29.
30 DH Group 30.
31 DH Group 31.
32 DH Group 32.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow, but do not require, use of IKEv2 Postquantum Preshared Key (PPK).
Option Description
Option Description
disable Disable.
Option Description
Option Description
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
enable Enable copy the dscp in the ESP header to the inner IP Header.
disable Disable copy the dscp in the ESP header to the inner IP Header.
Option Description
Option Description
Option Description
Option Description
Option Description
dependent Short-cut tunnels are brought down if the parent tunnel goes down.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sha1 SHA1.
sha2-256 SHA2-256.
sha2-384 SHA2-384.
sha2-512 SHA2-512.
Option Description
Option Description
Option Description
Option Description
enable Enable cross validation of peer ID and the identity in the peer's certificate as
specified in RFC 4945.
disable Disable cross validation of peer ID and the identity in the peer's certificate
as specified in RFC 4945.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable Ingress/egress IKE traffic must be routed over the same interface.
config ipv4-exclude-range
config ipv6-exclude-range
phase1name Phase 1 determines the options required for string Not Specified
phase 2.
Option Description
Option Description
null-md5 null-md5
null-sha1 null-sha1
null-sha256 null-sha256
null-sha384 null-sha384
null-sha512 null-sha512
des-null des-null
des-md5 des-md5
des-sha1 des-sha1
des-sha256 des-sha256
des-sha384 des-sha384
des-sha512 des-sha512
3des-null 3des-null
3des-md5 3des-md5
3des-sha1 3des-sha1
3des-sha256 3des-sha256
3des-sha384 3des-sha384
3des-sha512 3des-sha512
aes128-null aes128-null
aes128-md5 aes128-md5
aes128-sha1 aes128-sha1
aes128-sha256 aes128-sha256
aes128-sha384 aes128-sha384
aes128-sha512 aes128-sha512
aes128gcm aes128gcm
aes192-null aes192-null
aes192-md5 aes192-md5
aes192-sha1 aes192-sha1
aes192-sha256 aes192-sha256
aes192-sha384 aes192-sha384
Option Description
aes192-sha512 aes192-sha512
aes256-null aes256-null
aes256-md5 aes256-md5
aes256-sha1 aes256-sha1
aes256-sha256 aes256-sha256
aes256-sha384 aes256-sha384
aes256-sha512 aes256-sha512
aes256gcm aes256gcm
chacha20poly1305 chacha20poly1305
aria128-null aria128-null
aria128-md5 aria128-md5
aria128-sha1 aria128-sha1
aria128-sha256 aria128-sha256
aria128-sha384 aria128-sha384
aria128-sha512 aria128-sha512
aria192-null aria192-null
aria192-md5 aria192-md5
aria192-sha1 aria192-sha1
aria192-sha256 aria192-sha256
aria192-sha384 aria192-sha384
aria192-sha512 aria192-sha512
aria256-null aria256-null
aria256-md5 aria256-md5
aria256-sha1 aria256-sha1
aria256-sha256 aria256-sha256
aria256-sha384 aria256-sha384
aria256-sha512 aria256-sha512
seed-null seed-null
seed-md5 seed-md5
Option Description
seed-sha1 seed-sha1
seed-sha256 seed-sha256
seed-sha384 seed-sha384
seed-sha512 seed-sha512
Option Description
Option Description
Option Description
1 DH Group 1.
2 DH Group 2.
5 DH Group 5.
14 DH Group 14.
15 DH Group 15.
16 DH Group 16.
17 DH Group 17.
18 DH Group 18.
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
27 DH Group 27.
28 DH Group 28.
Option Description
29 DH Group 29.
30 DH Group 30.
31 DH Group 31.
32 DH Group 32.
Option Description
Option Description
Option Description
Option Description
inbound-dscp- Enable/disable copy the dscp in the ESP header option - phase1
copy to the inner IP Header.
Option Description
phase1 copy the dscp in the ESP header to the inner IP Header according to the
phase1 inbound_dscp_copy setting.
enable Enable copy the dscp in the ESP header to the inner IP Header.
disable Disable copy the dscp in the ESP header to the inner IP Header.
Option Description
Option Description
keylifekbs Phase2 key life in number of kilobytes of traffic . integer Minimum 5120
value: 5120
Maximum
value:
4294967295
Option Description
Option Description
Option Description
use-old Use the old route and do not add the new route.
use-new Delete the old route and add the new route.
Option Description
Option Description
Option Description
Option Description
diffservcode DSCP value to be applied to the IPsec tunnel user Not Specified
outer IP header.
Option Description
ip IPv4 IP.
Option Description
Option Description
ip IPv4 IP.
Option Description
Option Description
remote-gw IPv4 address of the remote gateway's external interface. ipv4- Not 0.0.0.0
address Specified
local-gw IPv4 address of the local gateway's external interface. ipv4- Not 0.0.0.0
address- Specified
any
auth-alg Authentication algorithm. Must be the same for both option - null
ends of the tunnel.
Option Description
null null
md5 md5
sha1 sha1
sha256 sha256
sha384 sha384
sha512 sha512
enc-alg Encryption algorithm. Must be the same for both ends of option - null
the tunnel.
Option Description
null null
des des
3des 3des
aes128 aes128
aes192 aes192
aes256 aes256
aria128 aria128
aria192 aria192
aria256 aria256
seed seed
local-spi Local SPI, a hexadecimal 8-digit (4-byte) tag. Discerns user Not
between two traffic streams with different encryption Specified
rules.
Option Description
phase2name Phase 2 tunnel name that you defined in the string Not
FortiClient dialup configuration. Specified
Option Description
Configure PPTP.
config vpn pptp
Description: Configure PPTP.
set status [enable|disable]
set ip-mode [range|usrgrp]
set eip {ipv4-address}
set sip {ipv4-address}
set local-ip {ipv4-address}
set usrgrp {string}
end
Option Description
Option Description
range PPTP client IP from manual config (range from sip to eip).
local-ip Local IP to be used for peer's remote IP. ipv4- Not 0.0.0.0
address Specified
Configure L2TP.
config vpn l2tp
Description: Configure L2TP.
set status [enable|disable]
set eip {ipv4-address}
set sip {ipv4-address}
set usrgrp {string}
set enforce-ipsec [enable|disable]
set lcp-echo-interval {integer}
set lcp-max-echo-fails {integer}
set hello-interval {integer}
set compress [enable|disable]
end
Option Description
Option Description
lcp-echo- Time in seconds between PPPoE Link Control Protocol integer Minimum 5
interval (LCP) echo requests. value: 0
Maximum
value:
32767
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ip-allocation- Class B subnet reserved for private IP address ipv4- Not 10.254.0.0
block assignment. classnet- Specified 255.255.0.0
any
Option Description
auto- Control deletion of child short-cut tunnels when the option - independent
discovery- parent tunnel goes down.
shortcut-
mode
Option Description
dependent Short-cut tunnels are brought down if the parent tunnel goes down.
Option Description
config overlays
Option Description
config subnets
Option Description
config forticlient-access
Option Description
config auth-groups
List gateways.
config vpn ike gateway
Description: List gateways.
set <name> {string}
end
Option Description
Option Description
config signature
config main-class
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config custom-signature
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config header-length
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config content-length
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
Option Description
length Maximum length of parameter in URL, HTTP POST integer Minimum 8192
request or HTTP body in bytes (0 to 2147483647). value: 0
Maximum
value:
2147483647
Option Description
allow Allow.
block Block.
Option Description
Option Description
config line-length
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config url-param-length
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config version
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config method
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config method
Option Description
Option Description
Option Description
Option Description
config hostname
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config malformed
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config max-cookie
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config max-header-line
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config max-range-segment
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config exception
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config method
config method
config method-policy
Option Description
Option Description
config address-list
Option Description
Option Description
Option Description
config url-access
Option Description
bypass Allow the HTTP request, also bypass further WAF scanning.
permit Allow the HTTP request, and continue further WAF scanning.
Option Description
Option Description
config access-pattern
Option Description
Option Description
Option Description
header-via- Action to take on the HTTP via header in forwarded option - pass
request requests: forwards (pass), adds, or removes the
HTTP header.
Option Description
header-via- Action to take on the HTTP via header in forwarded option - pass
response responses: forwards (pass), adds, or removes the
HTTP header.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config headers
dstaddr6 Destination address and address group names (IPv6). string Maximum
<name> Address name. length: 79
Option Description
Option Description
Option Description
append Append content to existing HTTP header or create new header if HTTP
header is not found.
new-on-not- Create new header only if existing HTTP header is not found.
found
new Create new header regardless if existing HTTP header is found or not.
Option Description
fast-policy- Enable/disable fast matching algorithm for explicit and option - enable
match transparent proxy policy.
Option Description
ldap-user- Enable/disable LDAP user cache for explicit and option - disable
cache transparent proxy user.
Option Description
proxy-fqdn Fully Qualified Domain Name to connect to the explicit string Not default.fqdn
web proxy. Specified
strict-web- Enable/disable strict web checking to block web sites option - disable
check that send incorrect headers that don't conform to
HTTP 1.1.
Option Description
Option Description
forward- Period of time before the source IP's traffic is no integer Minimum 30
server- longer assigned to the forwarding server . value: 6
affinity- Maximum
timeout value: 60
webproxy- Name of the web proxy profile to apply when explicit string Not
profile proxy traffic is allowed by default and traffic is Specified
accepted that does not match an explicit proxy policy.
Option Description
Option Description
learn-client- IPv6 Source address name (srcaddr or srcaddr6 must string Maximum
ip-srcaddr6 be set). length: 79
<name> Address name.
status Enable/disable the explicit Web proxy for HTTP and option - disable
HTTPS session.
Option Description
Option Description
Option Description
http-incoming- Accept incoming HTTP requests on one or more ports . user Not
port Specified
incoming-ip Restrict the explicit HTTP proxy to only accept ipv4- Not 0.0.0.0
sessions from this IP address. An interface must have address- Specified
this IP address. any
outgoing-ip Outgoing HTTP requests will have this IP address as ipv4- Not
their source address. An interface must have this IP address- Specified
address. any
Option Description
incoming-ip6 Restrict the explicit web proxy to only accept sessions ipv6- Not ::
from this IPv6 address. An interface must have this address Specified
IPv6 address.
outgoing-ip6 Outgoing HTTP requests will leave this IPv6. Multiple ipv6- Not
interfaces can be specified. Interfaces must have address Specified
these IPv6 addresses.
Option Description
pref-dns-result Prefer resolving addresses using the configured IPv4 option - ipv4
or IPv6 DNS server .
Option Description
unknown-http- How to handle HTTP sessions that do not comply with option - reject
version HTTP 0.9, 1.0, or 1.1.
Option Description
reject Reject or tear down HTTP sessions that do not use HTTP 0.9, 1.0, or 1.1.
best-effort Assume all HTTP sessions comply with HTTP 0.9, 1.0, or 1.1. If a session
uses a different HTTP version, it may not parse correctly and the connection
may be lost.
realm Authentication realm used to identify the explicit web string Not default
proxy (maximum of 63 characters). Specified
sec-default- Accept or deny explicit web proxy sessions when no option - deny
action web proxy firewall policy exists.
Option Description
accept Accept requests. All explicit web proxy traffic is accepted whether there is an
explicit web proxy policy or not.
deny Deny requests unless there is a matching explicit web proxy policy.
Option Description
Option Description
Option Description
pac-file-server- Port number that PAC traffic from client web browsers user Not
port uses to connect to the explicit web proxy . Specified
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
config pac-policy
Option Description
Option Description
port Port number that the forwarding server integer Minimum 3128
expects to receive HTTP sessions on . value: 1
Maximum
value:
65535
Option Description
monitor URL for forward server health check string Not http://www.google.com
monitoring . Specified
Option Description
Configure a forward server group consisting or multiple forward servers. Supports failover and load balancing.
config web-proxy forward-server-group
Description: Configure a forward server group consisting or multiple forward servers.
Supports failover and load balancing.
edit <name>
set affinity [enable|disable]
set ldb-method [weighted|least-session|...]
set group-down-option [block|pass]
config server-list
Description: Add web forward servers to a list to form a server group. Optionally
assign weights to each server.
edit <name>
set weight {integer}
next
end
next
end
Option Description
Option Description
weighted Load balance traffic to forward servers based on assigned weights. Weights
are ratios of total number of sessions.
least-session Send new sessions to the server with lowest session count.
active-passive Send new sessions to the next active server in the list. Servers are selected
with highest weight first and then in order as they are configured. Traffic
switches back to the first server upon failure recovery.
group-down- Action to take when all of the servers in the forward option - block
option server group are down: block sessions until at least one
server is back up or pass sessions to their destination.
Option Description
block Block sessions until at least one server in the group is back up.
pass Pass sessions to their destination bypassing servers in the forward server
group.
config server-list
weight Optionally assign a weight of the forwarding server for integer Minimum 10
weighted load balancing value: 1
Maximum
value: 100
Option Description
Option Description
timeout Period of time before WISP requests time out . integer Minimum 5
value: 1
Maximum
value: 15
status Enable/disable exempting the URLs matching the URL option - enable
pattern from web proxy forwarding and caching.
Option Description
url-pattern URL pattern to be exempted from web proxy forwarding string Not
and caching. Specified
Option Description
Option Description
config entries
pattern-type Banned word pattern type: wildcard pattern or Perl option - wildcard
regular expression.
Option Description
Option Description
Option Description
western Western.
japanese Japanese.
korean Korean.
french French.
thai Thai.
spanish Spanish.
cyrillic Cyrillic.
score Score, to be applied every time the word appears on a integer Minimum 10
web page . value: 0
Maximum
value:
4294967295
Option Description
config entries
Option Description
category Categories that this content type applies to. user Not all
Specified
one-arm-ips- Enable/disable DNS resolver for one-arm IPS URL filter option - disable
urlfilter operation.
Option Description
enable Enable DNS resolver for one-arm IPS URL filter operation.
disable Disable DNS resolver for one-arm IPS URL filter operation.
Option Description
config entries
Option Description
Option Description
Option Description
Option Description
exempt If action is set to exempt, select the security profile option - av web-
operations that exempt URLs skip. Separate multiple content
options with a space. activex-
java-cookie
dlp
fortiguard
range-block
antiphish all
Option Description
av AntiVirus scanning.
Option Description
dns-address- Resolve IPv4 address, IPv6 address, or both from DNS option - ipv4
family server.
Option Description
both Resolve both IPv4 and IPv6 addresses from DNS server.
geo-filter Filter based on geographical location. Route will NOT var-string Not
be installed if the resolved IP address belongs to the Specified
country in the filter.
geo-filter Filter based on geographical location. Route will NOT var-string Not
be installed if the resolved IPv6 address belongs to the Specified
country in the filter.
dns-retry- Retry interval. Refresh DNS faster than TTL to capture integer Minimum 0
interval multiple IPs for hosts. 0 means use DNS server's TTL value: 0
only. Maximum
value:
2147483
extended-ttl Extend time to live beyond reported by DNS. Use of 0 integer Minimum 0
means use DNS server's TTL. value: 0
Maximum
value:
2147483
Option Description
Option Description
Option Description
js JS block.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
web-extended- Enable/disable extended any filter action logging for option - disable
all-action-log web filtering.
Option Description
Option Description
config override
Option Description
Option Description
Option Description
Option Description
Option Description
profile- Profile attribute to retrieve from the RADIUS server. option - Login-LAT-
attribute Service
Option Description
Option Description
ovrd-user- User groups with permission to use the override. string Maximum
group User group name. length: 79
<name>
profile Web filter profile with permission to create overrides. string Maximum
<name> Web profile. length: 79
config web
Option Description
Option Description
Option Description
Option Description
Option Description
vimeo-restrict Set Vimeo-restrict ("7" = don't show mature content, string Not Specified
"134" = don't show unrated and mature content). A
value of cookie "content_rating".
Option Description
config ftgd-wf
Option Description
max-quota- Maximum FortiGuard quota used by single page view in integer Minimum 300
timeout seconds (excludes streams). value: 1
Maximum
value:
86400
Option Description
Option Description
Option Description
config filters
Option Description
Option Description
Option Description
Option Description
config quota
Option Description
Option Description
B Quota in bytes.
KB Quota in kilobytes.
MB Quota in megabytes.
GB Quota in gigabytes.
config antiphish
Option Description
Option Description
Option Description
enable Enable checking of GET URI for username and password fields.
disable Disable checking of GET URI for username and password fields.
Option Description
enable Enable checking of HTTP Basic Auth field for known credentials.
disable Disable checking of HTTP Basic Auth field for known credentials.
Option Description
max-body-len Maximum size of a POST body to check for integer Minimum 65536
credentials. value: 0
Maximum
value:
4294967295
Option Description
domain- Domain for which to verify received credentials string Not Specified
controller against.
ldap LDAP server for which to verify received string Not Specified
credentials against.
config inspection-entries
Option Description
config custom-patterns
Option Description
type Pattern will be treated either as a regex pattern or literal option - regex
string.
Option Description
Option Description
Option Description
ovrd-auth- Port to use for FortiGuard Web Filter HTTP override integer Minimum 8008
port-http authentication. value: 0
Maximum
value:
65535
ovrd-auth- Port to use for FortiGuard Web Filter HTTPS override integer Minimum 8010
port-https authentication in proxy mode. value: 0
Maximum
value:
65535
ovrd-auth- Port to use for FortiGuard Web Filter HTTPS override integer Minimum 8015
port-https- authentication in flow mode. value: 0
flow Maximum
value:
65535
ovrd-auth- Port to use for FortiGuard Web Filter Warning override integer Minimum 8020
port-warning authentication. value: 0
Maximum
value:
65535
Option Description
Option Description
Option Description
request- Limit size of URL request packets sent to FortiGuard integer Minimum 0
packet-size- server . value: 576
limit Maximum
value:
10000
Option Description
scope Override either the specific user, user group, IPv4 option - user
address, or IPv6 address.
Option Description
user Name of the user which the override applies. string Not
Specified
user-group Specify the user group for which the override applies. string Not
Specified
old-profile Name of the web filter profile which the override string Not
applies. Specified
new-profile Name of the new web filter profile used by the override. string Not
Specified
expires Override expiration date and time, from 5 minutes to user Not 1969/12/31
365 from now (format: yyyy/mm/dd hh:mm:ss). Specified 16:00:00
Option Description
query Code used to prefix a query (must end with an equals string Not
character). Specified
safesearch Safe search method. You can disable safe search, add option - disable
the safe search string to URLs, or insert a safe search
header.
Option Description
Option Description
safesearch-str In URL mode, it is the safe search parameter used in string Not
the URL. In translate mode, it provides either the regex Specified
to translate the URL, or the special case to translate the
URL
Option Description
Option Description
Option Description
config inter-controller-peer
peer-port Port used by the wireless controller's for inter-controller integer Minimum 5246
communications . value: 1024
Maximum
value:
49150
Option Description
Option Description
Option Description
Option Description
disable Use 802.3 Ethernet frames with 802.3 data tunnel mode.
Option Description
fiapp-eth-type Ethernet type for Fortinet Inter-Access Point integer Minimum 5252
Protocol . value: 0
Maximum
value: 65535
ipsec-base-ip Base IP address for IPsec VPN tunnels between ipv4- Not Specified 169.254.0.1
the access points and the wireless controller . address
Option Description
Option Description
nac-interval Interval in seconds between two WiFi network integer Minimum 120
access control . value: 10
Maximum
value: 600
Option Description
ap-log-server- IP address that FortiGate or FortiAPs send log ipv4- Not Specified 0.0.0.0
ip messages to. address
ap-log-server- Port that FortiGate or FortiAPs send log messages integer Minimum 0
port to. value: 0
Maximum
value: 65535
Option Description
config value-list
config value-list
Option Description
config oi-list
config nai-list
Option Description
config eap-method
Option Description
eap-identity Identity.
eap-md5 MD5.
eap-tls TLS.
eap-ttls TTLS.
eap-peap PEAP.
Option Description
eap-sim SIM.
eap-aka AKA.
eap-aka-prime AKA'.
config auth-param
Option Description
Option Description
Option Description
config mcc-mnc-list
Option Description
Option Description
port-restricted- Port-restricted IPv4 address and single NATed IPv4 address available.
and-single-
NATed
port-restricted- Port-restricted IPv4 address and double NATed IPv4 address available.
and-double-
NATed
config value-list
Option Description
up Link up.
Option Description
symmetric Symmetric WAN link (uplink and downlink speeds are the same).
asymmetric Asymmetric WAN link (uplink and downlink speeds are not the same).
Option Description
Option Description
Option Description
Option Description
Option Description
tls-port Set TLS VPN (HTTPS) port service status. option - unknown
Option Description
pptp-vpn-port Set Point to Point Tunneling Protocol (PPTP) VPN port option - unknown
service status.
Option Description
Option Description
Option Description
Option Description
ikev2-port Set IKEv2 port service for IPsec VPN status. option - unknown
Option Description
ikev2-xx-port Set UDP port 4500 (which may be used by IKEv2 for option - unknown
IPsec VPN) service status.
Option Description
esp-port Set ESP port service (used by IPsec VPNs) status. option - unknown
Option Description
config icon-list
Option Description
Option Description
reserved Reserved.
config service-description
config dscp-range
config aoc-list
Option Description
config plan-info
config nai-list
Option Description
Option Description
wildcard Wildcard.
Option Description
Option Description
Option Description
Option Description
Option Description
unspecified Unspecified.
assembly Assembly.
business Business.
educational Educational.
institutional Institutional.
mercantile Mercantile.
residential Residential.
storage Storage.
vehicular Vehicular.
outdoor Outdoor.
Option Description
unspecified Unspecified.
arena Arena.
stadium Stadium.
amphitheater Amphitheater.
Option Description
library Library.
museum Museum.
restaurant Restaurant.
theater Theater.
bar Bar.
bank Bank.
factory Factory.
hospital Hospital.
Option Description
dormitory Dormitory.
airplane Airplane.
bus Bus.
ferry Ferry.
train Train.
kiosk Kiosk.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ssid IEEE 802.11 service set identifier (SSID) for string Not Specified fortinet
the wireless interface. Users who wish to use
the wireless network must configure their
computers to access this SSID name.
Option Description
Option Description
open Open.
osen OSEN.
Option Description
Option Description
Option Description
Option Description
excluded Wi-Fi Agile Multiband AP does not want the Wi-Fi Agile Multiband STA to
use the cellular data connection.
Option Description
prefer-not Wi-Fi Agile Multiband AP prefers the Wi-Fi Agile Multiband STA should not
use cellular data connection.
prefer-use Wi-Fi Agile Multiband AP prefers the Wi-Fi Agile Multiband STA should use
cellular data connection.
Option Description
Option Description
Option Description
ft-r0-key-lifetime Lifetime of the PMK-R0 key in FT, 1-65535 integer Minimum 480
minutes. value: 1
Maximum
value: 65535
Option Description
Option Description
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
Option Description
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
radius-mac- RADIUS MAC MPSK cache timeout interval . integer Minimum 86400
mpsk-timeout value: 300
Maximum
value: 864000
radius-mac-auth- Selective user groups that are permitted for string Maximum
usergroups RADIUS mac authentication. length: 79
<name> User group name.
Option Description
Option Description
Option Description
Option Description
sae-private-key Private key used for WPA3 SAE-PK string Not Specified
authentication.
Option Description
Option Description
ip IP address and subnet mask for the local ipv4- Not Specified 0.0.0.0
standalone NAT subnet. classnet-host 0.0.0.0
dhcp-lease-time DHCP lease time in seconds for NAT IP integer Minimum 2400
address. value: 300
Maximum
value:
8640000
Option Description
local-standalone- IPv4 addresses for the local standalone DNS. ipv4-address Not Specified
dns-ip
Option Description
Option Description
Option Description
portal-message- Replacement message group for this VAP string Not Specified
override-group (only available when security is set to a captive
portal type).
Option Description
Option Description
security-exempt- Optional security exempt list for captive portal string Not Specified
list authentication.
security-redirect- Optional URL for redirecting users after they var-string Not Specified
url pass captive portal authentication.
Option Description
schedule Firewall schedules for enabling this VAP on the string Maximum
<name> FortiAP. This VAP will be enabled when at least length: 35
one of the schedules is valid. Separate multiple
schedule names with a space.
Schedule name.
Option Description
Option Description
Option Description
Option Description
port-macauth- LAN port MAC authentication idle timeout value integer Minimum 600
timeout . value: 60
Maximum
value: 65535
Option Description
Option Description
Option Description
Option Description
Option Description
captive-portal- Hard timeout - AP will always clear the session integer Minimum 0
auth-timeout after timeout regardless of traffic . value: 0
Maximum
value: 864000
Option Description
6000 6 Mbps.
12000 12 Mbps.
24000 24 Mbps.
Option Description
Option Description
Option Description
enable Enable DHCP enforcement, data from clients that have not completed the
DHCP process will be blocked.
disable Disable DHCP enforcement, clients can access the network without DHCP
process.
Option Description
netbios-ns Suppress NetBIOS name services packets with UDP port 137.
netbios-ds Suppress NetBIOS datagram services packets with UDP port 138.
Option Description
Option Description
drop-icmp6ra Drop ICMP6 Router Advertisement (RA) packets that originate from
wireless clients.
drop-icmp6rs Drop ICMP6 Router Solicitation (RS) packets to be sent to wireless clients.
drop-dhcp6s Drop DHCP6 server generated packets that originate from wireless clients.
ndp-proxy Enable IPv6 ndp proxy - send back na on behalf of the client and drop the
ns.
drop-ns-dad Drop ICMP6 NS-DAD when target address is not found in ndp proxy cache.
drop-ns-nondad Drop ICMP6 NS-NonDAD when target address is not found in ndp proxy
cache.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
primary-wag- Primary wireless access gateway profile name. string Not Specified
profile
tunnel-echo- The time interval to send echo to both primary integer Minimum 300
interval and secondary tunnel peers . value: 1
Maximum
value: 65535
tunnel-fallback- The time interval for secondary tunnel to fall integer Minimum 7200
interval back to primary tunnel . value: 0
Maximum
value: 65535
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
rates-11ac-mcs- Comma separated list of max supported VHT string Not Specified
map MCS for spatial streams 1 through 8.
Option Description
Option Description
Option Description
address-group- Configure MAC address filtering policy for MAC option - disable
policy addresses that are in the address-group.
Option Description
disable Disable MAC address filtering policy for MAC addresses that are in the
address-group
allow Allow clients with MAC addresses that are in the address-group.
deny Block clients with MAC addresses that are in the address-group.
Option Description
mac-filter-policy- Allow or block clients with MAC addresses that option - allow
other are not in the filter list.
Option Description
allow Allow clients with MAC addresses that are not in the filter list.
deny Block clients with MAC addresses that are not in the filter list.
Option Description
bstm-rssi- Time interval for client to voluntarily leave AP integer Minimum 200
disassoc-timer before forcing a disassociation due to low RSSI value: 1
. Maximum
value: 2000
Option Description
Option Description
name AP name.
Option Description
Option Description
Option Description
Option Description
l3-roaming-mode Select the way that layer 3 roaming traffic is option - direct
passed .
Option Description
direct Layer 3 roaming traffic is passed between home AP and guest AP directly.
indirect Layer 3 roaming traffic is passed between home AP and guest AP through
controllers.
config portal-message-overrides
config vlan-pool
config mac-filter-list
mac-filter- Deny or allow the client with this MAC address. option - deny
policy
Option Description
echo-interval Time between echo requests sent by the managed integer Minimum 30
WTP, AP, or FortiAP . value: 1
Maximum
value: 255
client-idle- Time after which a client is considered idle and times integer Minimum 300
timeout out . value: 20
Maximum
value: 3600
client-idle- Time after which a client is considered idle and integer Minimum 20
rehome- disconnected from the home controller . value: 2
timeout Maximum
value: 3600
fake-ap-log Time between recording logs about fake APs if integer Minimum 1
periodic fake AP logging is configured . value: 1
Maximum
value: 1440
sta-locate- Time between running client presence flushes to integer Minimum 1800
timer remove clients that are listed but no longer present . value: 0
Maximum
value: 86400
ipsec-intf- Time period to keep IPsec VPN interfaces up after integer Minimum 120
cleanup WTP sessions are disconnected . value: 30
Maximum
value: 3600
Option Description
-- NO_COUNTRY_SET
AF AFGHANISTAN
AL ALBANIA
DZ ALGERIA
AS AMERICAN SAMOA
AO ANGOLA
AR ARGENTINA
AM ARMENIA
AU AUSTRALIA
AT AUSTRIA
AZ AZERBAIJAN
BS BAHAMAS
BH BAHRAIN
BD BANGLADESH
BB BARBADOS
BY BELARUS
BE BELGIUM
Option Description
BZ BELIZE
BJ BENIN
BM BERMUDA
BT BHUTAN
BO BOLIVIA
BW BOTSWANA
BR BRAZIL
BN BRUNEI DARUSSALAM
BG BULGARIA
BF BURKINA-FASO
KH CAMBODIA
CM CAMEROON
KY CAYMAN ISLANDS
TD CHAD
CL CHILE
CN CHINA
CX CHRISTMAS ISLAND
CO COLOMBIA
CG CONGO REPUBLIC
CR COSTA RICA
HR CROATIA
CY CYPRUS
CZ CZECH REPUBLIC
DK DENMARK
DM DOMINICA
DO DOMINICAN REPUBLIC
Option Description
EC ECUADOR
EG EGYPT
SV EL SALVADOR
ET ETHIOPIA
EE ESTONIA
GF FRENCH GUIANA
PF FRENCH POLYNESIA
FO FAEROE ISLANDS
FJ FIJI
FI FINLAND
FR FRANCE
GE GEORGIA
DE GERMANY
GH GHANA
GI GIBRALTAR
GR GREECE
GL GREENLAND
GD GRENADA
GP GUADELOUPE
GU GUAM
GT GUATEMALA
GY GUYANA
HT HAITI
HN HONDURAS
HK HONG KONG
HU HUNGARY
IS ICELAND
IN INDIA
ID INDONESIA
Option Description
IQ IRAQ
IE IRELAND
IM ISLE OF MAN
IL ISRAEL
IT ITALY
CI COTE_D_IVOIRE
JM JAMAICA
JO JORDAN
KZ KAZAKHSTAN
KE KENYA
KR KOREA REPUBLIC
KW KUWAIT
LA LAOS
LV LATVIA
LB LEBANON
LS LESOTHO
LY LIBYA
LI LIECHTENSTEIN
LT LITHUANIA
LU LUXEMBOURG
MO MACAU SAR
MK MACEDONIA, FYRO
MG MADAGASCAR
MW MALAWI
MY MALAYSIA
MV MALDIVES
ML MALI
MT MALTA
MH MARSHALL ISLANDS
Option Description
MQ MARTINIQUE
MR MAURITANIA
MU MAURITIUS
YT MAYOTTE
MX MEXICO
FM MICRONESIA
MD REPUBLIC OF MOLDOVA
MC MONACO
MA MOROCCO
MZ MOZAMBIQUE
MM MYANMAR
NA NAMIBIA
NP NEPAL
NL NETHERLANDS
AN NETHERLANDS ANTILLES
AW ARUBA
NZ NEW ZEALAND
NI NICARAGUA
NE NIGER
NO NORWAY
OM OMAN
PK PAKISTAN
PW PALAU
PA PANAMA
PY PARAGUAY
PE PERU
PH PHILIPPINES
Option Description
PL POLAND
PT PORTUGAL
PR PUERTO RICO
QA QATAR
RE REUNION
RO ROMANIA
RU RUSSIA
RW RWANDA
BL SAINT BARTHELEMY
LC SAINT LUCIA
MF SAINT MARTIN
SA SAUDI ARABIA
SN SENEGAL
RS REPUBLIC OF SERBIA
ME MONTENEGRO
SL SIERRA LEONE
SG SINGAPORE
SK SLOVAKIA
SI SLOVENIA
ZA SOUTH AFRICA
ES SPAIN
LK SRI LANKA
SE SWEDEN
SR SURINAME
CH SWITZERLAND
TW TAIWAN
Option Description
TZ TANZANIA
TH THAILAND
TG TOGO
TN TUNISIA
TR TURKEY
TM TURKMENISTAN
UG UGANDA
UA UKRAINE
GB UNITED KINGDOM
US UNITED STATES2
UY URUGUAY
UZ UZBEKISTAN
VU VANUATU
VE VENEZUELA
VN VIET NAM
VI VIRGIN ISLANDS
YE YEMEN
ZM ZAMBIA
ZW ZIMBABWE
JP JAPAN14
CA CANADA2
Option Description
enable Allow VAPs to use the same SSID name in the same VDOM.
disable Do not allow VAPs to use the same SSID name in the same VDOM.
Option Description
Option Description
Option Description
Option Description
device-holdoff Lower limit of creation time of device for identification integer Minimum 5
in minutes . value: 0
Maximum
value: 60
device-idle Upper limit of idle time of device for identification in integer Minimum 1440
minutes . value: 0
Maximum
value:
14400
Option Description
darrp-optimize Time for running Dynamic Automatic Radio Resource integer Minimum 86400
Provisioning . value: 0
Maximum
value:
86400
darrp-optimize- Firewall schedules for DARRP running time. DARRP string Maximum
schedules will run periodically based on darrp-optimize within the length: 35
<name> schedules. Separate multiple schedule names with a
space.
Schedule name.
config offending-ssid
ssid-pattern Define offending SSID pattern (case insensitive). For string Not
example, word, word*, *word, wo*rd. Specified
Option Description
Option Description
addrgrp-log Lowest severity level to log address group message. option - notification
Option Description
ble-log Lowest severity level to log BLE detection message. option - notification
Option Description
Option Description
clb-log Lowest severity level to log client load balancing option - notification
message.
Option Description
dhcp-starv- Lowest severity level to log DHCP starvation event option - notification
log message.
Option Description
led-sched-log Lowest severity level to log LED schedule event option - notification
message.
Option Description
radio-event- Lowest severity level to log radio event message. option - notification
log
Option Description
rogue-event- Lowest severity level to log rogue AP event message. option - notification
log
Option Description
Option Description
sta-event-log Lowest severity level to log station event message. option - notification
Option Description
sta-locate-log Lowest severity level to log station locate message. option - notification
Option Description
Option Description
Option Description
wtp-event-log Lowest severity level to log WTP event message. option - notification
Option Description
Option Description
Option Description
default This controller is the one and only controller that the AP could join after
applying AP local configuration.
specify Specified controller is the one and only controller that the AP could join after
applying AP local configuration.
ac-timer Maximum waiting time for the AP to join the validation integer Minimum 10
controller after applying AP local configuration . value: 3
Maximum
value: 30
ac-ip IP address of the validation controller that AP must be ipv4- Not 0.0.0.0
able to join after applying AP local configuration. address Specified
ac-port Port of the validation controller that AP must be able to integer Minimum 0
join after applying AP local configuration . value: 1024
Maximum
value:
49150
config command-list
Option Description
Configure Bonjour profiles. Bonjour is Apple's zero configuration networking protocol. Bonjour profiles allow APs and
FortiAPs to connnect to networks using Bonjour.
config wireless-controller bonjour-profile
Description: Configure Bonjour profiles. Bonjour is Apple's zero configuration networking
protocol. Bonjour profiles allow APs and FortiAPs to connnect to networks using
Bonjour.
edit <name>
set comment {string}
config policy-list
Description: Bonjour policy list.
edit <policy-id>
set description {string}
set from-vlan {string}
set to-vlan {string}
set services {option1}, {option2}, ...
next
end
next
end
from-vlan VLAN ID from which the Bonjour service is advertised . string Not 0
Specified
to-vlan VLAN ID to which the Bonjour service is made available string Not all
. Specified
services Bonjour services for the VLAN connecting to the Bonjour option - all
network.
Option Description
airplay AirPlay.
bit-torrent BitTorrent.
ftp FTP.
ichat iChat.
itunes iTunes.
printers Printers.
samba Samba.
scanners Scanners.
ssh SSH.
chromecast ChromeCast.
selection- Period in seconds to measure average channel load, integer Minimum 3600
period noise floor, spectral RSSI . value: 0
Maximum
value:
65535
monitor- Period in seconds to measure average transmit retries integer Minimum 300
period and receive errors . value: 0
Maximum
value:
65535
weight-rogue- Weight in DARRP channel score calculation for rogue integer Minimum 10
ap APs . value: 0
Maximum
value: 2000
weight-noise- Weight in DARRP channel score calculation for noise integer Minimum 40
floor floor . value: 0
Maximum
value: 2000
weight- Weight in DARRP channel score calculation for channel integer Minimum 20
channel-load load . value: 0
Maximum
value: 2000
weight- Weight in DARRP channel score calculation for spectral integer Minimum 40
spectral-rssi RSSI . value: 0
Maximum
value: 2000
weight- Weight in DARRP channel score calculation for weather integer Minimum 1000
weather- channel . value: 0
channel Maximum
value: 2000
weight-dfs- Weight in DARRP channel score calculation for DFS integer Minimum 500
channel channel . value: 0
Maximum
value: 2000
threshold- Threshold in dBm to reject channel in DARRP channel string Not -85
noise-floor selection phase 1 due to noise floor . Specified
threshold- Threshold in dBm to reject channel in DARRP channel string Not -65
spectral-rssi selection phase 1 due to spectral RSSI . Specified
threshold-tx- Threshold in percentage for transmit retries to trigger integer Minimum 300
retries channel reselection in DARRP monitor stage . value: 0
Maximum
value: 1000
Option Description
Option Description
Option Description
darrp- Time for running Dynamic Automatic Radio Resource integer Minimum 86400
optimize Provisioning . value: 0
Maximum
value:
86400
darrp- Firewall schedules for DARRP running time. DARRP string Maximum
optimize- will run periodically based on darrp-optimize within the length: 35
schedules schedules. Separate multiple schedule names with a
<name> space.
Schedule name.
Option Description
vaps <name> List of SSIDs to be included in the VAP group. string Maximum
VAP name. length: 35
Option Description
foreign Enable the scan and monitor foreign channels. Foreign channels are all other
available channels than the current operating channel.
both Enable the scan and monitor both foreign and home channels. Select this
option to monitor all WiFi channels.
Option Description
ap-bgscan- Wait time for channel inactivity before scanning this integer Minimum 20
idle channel . value: 0
Maximum
value: 1000
ap-bgscan- Firewall schedules for turning off FortiAP radio string Maximum
disable- background scan. Background scan will be disabled length: 35
schedules when at least one of the schedules is valid. Separate
<name> multiple schedule names with a space.
Schedule name.
Option Description
ap-scan- Minimum signal level/threshold in dBm required for the string Not -90
threshold AP to report detected rogue AP . Specified
Option Description
Option Description
Option Description
Option Description
Option Description
long-duration- Threshold value for long duration attack detection . integer Minimum 8200
thresh value: 1000
Maximum
value:
32767
Option Description
Option Description
Option Description
auth-flood- The threshold value for authentication frame flooding. integer Minimum 30
thresh value: 1
Maximum
value: 100
Option Description
assoc-flood- The threshold value for association frame flooding. integer Minimum 30
thresh value: 1
Maximum
value: 100
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
deauth- Threshold value per second to deauth unknown src for integer Minimum 10
unknown-src- DoS attack (0: no limit). value: 0
thresh Maximum
value:
65535
Option Description
Option Description
Option Description
Option Description
Option Description
ip IPv4 address.
server-fqdn FQDN of syslog server that FortiAP units send log string Not
messages to. Specified
server-ip IP address of syslog server that FortiAP units send log ipv4- Not 0.0.0.0
messages to. address Specified
server-port Port number of syslog server that FortiAP units send integer Minimum 514
log messages to . value: 0
Maximum
value:
65535
log-level Lowest level of log messages that FortiAP units send option - information
to this server .
Option Description
emergency Level 0
alert Level 1
critical Level 2
error Level 3
warning Level 4
notification Level 5
information Level 6
debugging Level 7
Configure WTP profiles or FortiAP profiles that define radio settings for manageable FortiAP platforms.
config wireless-controller wtp-profile
Description: Configure WTP profiles or FortiAP profiles that define radio settings for
manageable FortiAP platforms.
edit <name>
set comment {var-string}
config platform
Description: WTP, FortiAP, or AP platform.
set type [AP-11N|220B|...]
set mode [single-5G|dual-5G]
set ddscan [enable|disable]
end
set control-message-offload {option1}, {option2}, ...
set apcfg-profile {string}
set ble-profile {string}
set syslog-profile {string}
set wan-port-mode [wan-lan|wan-only]
config lan
Description: WTP LAN port mapping.
set port-mode [offline|nat-to-wan|...]
set port-ssid {string}
set port1-mode [offline|nat-to-wan|...]
set port1-ssid {string}
set port2-mode [offline|nat-to-wan|...]
set port2-ssid {string}
set port3-mode [offline|nat-to-wan|...]
set port3-ssid {string}
set port4-mode [offline|nat-to-wan|...]
set port4-ssid {string}
set port5-mode [offline|nat-to-wan|...]
set port5-ssid {string}
set port6-mode [offline|nat-to-wan|...]
set port6-ssid {string}
set port7-mode [offline|nat-to-wan|...]
Option Description
syslog-profile System log server configuration profile name. string Not Specified
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
-- NO_COUNTRY_SET
AF AFGHANISTAN
AL ALBANIA
DZ ALGERIA
AS AMERICAN SAMOA
AO ANGOLA
AR ARGENTINA
AM ARMENIA
AU AUSTRALIA
AT AUSTRIA
AZ AZERBAIJAN
BS BAHAMAS
BH BAHRAIN
BD BANGLADESH
BB BARBADOS
BY BELARUS
BE BELGIUM
BZ BELIZE
BJ BENIN
BM BERMUDA
BT BHUTAN
BO BOLIVIA
BW BOTSWANA
BR BRAZIL
BN BRUNEI DARUSSALAM
BG BULGARIA
BF BURKINA-FASO
KH CAMBODIA
Option Description
CM CAMEROON
KY CAYMAN ISLANDS
TD CHAD
CL CHILE
CN CHINA
CX CHRISTMAS ISLAND
CO COLOMBIA
CG CONGO REPUBLIC
CR COSTA RICA
HR CROATIA
CY CYPRUS
CZ CZECH REPUBLIC
DK DENMARK
DM DOMINICA
DO DOMINICAN REPUBLIC
EC ECUADOR
EG EGYPT
SV EL SALVADOR
ET ETHIOPIA
EE ESTONIA
GF FRENCH GUIANA
PF FRENCH POLYNESIA
FO FAEROE ISLANDS
FJ FIJI
FI FINLAND
FR FRANCE
GE GEORGIA
Option Description
DE GERMANY
GH GHANA
GI GIBRALTAR
GR GREECE
GL GREENLAND
GD GRENADA
GP GUADELOUPE
GU GUAM
GT GUATEMALA
GY GUYANA
HT HAITI
HN HONDURAS
HK HONG KONG
HU HUNGARY
IS ICELAND
IN INDIA
ID INDONESIA
IQ IRAQ
IE IRELAND
IM ISLE OF MAN
IL ISRAEL
IT ITALY
CI COTE_D_IVOIRE
JM JAMAICA
JO JORDAN
KZ KAZAKHSTAN
KE KENYA
KR KOREA REPUBLIC
KW KUWAIT
Option Description
LA LAOS
LV LATVIA
LB LEBANON
LS LESOTHO
LY LIBYA
LI LIECHTENSTEIN
LT LITHUANIA
LU LUXEMBOURG
MO MACAU SAR
MK MACEDONIA, FYRO
MG MADAGASCAR
MW MALAWI
MY MALAYSIA
MV MALDIVES
ML MALI
MT MALTA
MH MARSHALL ISLANDS
MQ MARTINIQUE
MR MAURITANIA
MU MAURITIUS
YT MAYOTTE
MX MEXICO
FM MICRONESIA
MD REPUBLIC OF MOLDOVA
MC MONACO
MA MOROCCO
MZ MOZAMBIQUE
MM MYANMAR
NA NAMIBIA
Option Description
NP NEPAL
NL NETHERLANDS
AN NETHERLANDS ANTILLES
AW ARUBA
NZ NEW ZEALAND
NI NICARAGUA
NE NIGER
NO NORWAY
OM OMAN
PK PAKISTAN
PW PALAU
PA PANAMA
PY PARAGUAY
PE PERU
PH PHILIPPINES
PL POLAND
PT PORTUGAL
PR PUERTO RICO
QA QATAR
RE REUNION
RO ROMANIA
RU RUSSIA
RW RWANDA
BL SAINT BARTHELEMY
LC SAINT LUCIA
MF SAINT MARTIN
Option Description
SA SAUDI ARABIA
SN SENEGAL
RS REPUBLIC OF SERBIA
ME MONTENEGRO
SL SIERRA LEONE
SG SINGAPORE
SK SLOVAKIA
SI SLOVENIA
ZA SOUTH AFRICA
ES SPAIN
LK SRI LANKA
SE SWEDEN
SR SURINAME
CH SWITZERLAND
TW TAIWAN
TZ TANZANIA
TH THAILAND
TG TOGO
TN TUNISIA
TR TURKEY
TM TURKMENISTAN
UG UGANDA
UA UKRAINE
GB UNITED KINGDOM
Option Description
US UNITED STATES2
UY URUGUAY
UZ UZBEKISTAN
VU VANUATU
VE VENEZUELA
VN VIET NAM
VI VIRGIN ISLANDS
YE YEMEN
ZM ZAMBIA
ZW ZIMBABWE
JP JAPAN14
CA CANADA2
Option Description
Option Description
Option Description
Option Description
Option Description
yes Change the managed WTP, FortiAP or AP's administrator password. Use the
login-password option to set the password.
default Keep the managed WTP, FortiAP or AP's administrator password set to the
factory default.
login-passwd Set the managed WTP, FortiAP, or AP's password Not Specified
administrator password.
Option Description
poe-mode Set the WTP, FortiAP, or AP's PoE mode. option - auto
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
wan-port-auth- Set WAN port 802.1x supplicant user name. string Not Specified
usrname
wan-port-auth- Set WAN port 802.1x supplicant password. password Not Specified
password
Option Description
config platform
type WTP, FortiAP or AP platform type. There are built-in option - 221E
WTP profiles for all supported FortiAP models. You can
select a built-in profile and customize it or create a new
profile.
Option Description
220B FAP220B/221B.
210B FAP210B.
222B FAP222B.
112B FAP112B.
320B FAP320B.
11C FAP11C.
14C FAP14C.
223B FAP223B.
28C FAP28C.
320C FAP320C.
221C FAP221C.
25D FAP25D.
222C FAP222C.
224D FAP224D.
214B FK214B.
21D FAP21D.
24D FAP24D.
112D FAP112D.
223C FAP223C.
321C FAP321C.
C220C FAPC220C.
C225C FAPC225C.
C23JD FAPC23JD.
C24JE FAPC24JE.
S321C FAPS321C.
S322C FAPS322C.
S323C FAPS323C.
S311C FAPS311C.
Option Description
S313C FAPS313C.
S321CR FAPS321CR.
S322CR FAPS322CR.
S323CR FAPS323CR.
S421E FAPS421E.
S422E FAPS422E.
S423E FAPS423E.
421E FAP421E.
423E FAP423E.
221E FAP221E.
222E FAP222E.
223E FAP223E.
224E FAP224E.
231E FAP231E.
S221E FAPS221E.
S223E FAPS223E.
321E FAP321E.
431F FAP431F.
431FL FAP431FL.
432F FAP432F.
432FR FAP432FR.
433F FAP433F.
433FL FAP433FL.
231F FAP231F.
231FL FAP231FL.
234F FAP234F.
23JF FAP23JF.
831F FAP831F.
231G FAP231G.
Option Description
233G FAP233G.
431G FAP431G.
433G FAP433G.
U421E FAPU421EV.
U422EV FAPU422EV.
U423E FAPU423EV.
U221EV FAPU221EV.
U223EV FAPU223EV.
U24JEV FAPU24JEV.
U321EV FAPU321EV.
U323EV FAPU323EV.
U431F FAPU431F.
U433F FAPU433F.
U231F FAPU231F.
U234F FAPU234F.
U432F FAPU432F.
Option Description
single-5G Configure radios as one 5GHz band, one 2.4GHz band, and one dedicated
monitor or sniffer.
dual-5G Configure radios as one lower 5GHz band, one higher 5GHz band and one
2.4GHz band respectively.
ddscan Enable/disable use of one radio for dedicated full-band option - disable
scanning to detect RF characterization and wireless
threat management.
Option Description
Option Description
offline Offline.
Option Description
offline Offline.
Option Description
offline Offline.
Option Description
offline Offline.
Option Description
Option Description
offline Offline.
Option Description
offline Offline.
Option Description
offline Offline.
Option Description
offline Offline.
Option Description
offline Offline.
Option Description
offline Offline.
config deny-mac-list
mac A WiFi device with this MAC address is denied mac- Not 00:00:00:00:00:00
access to this WTP, FortiAP or AP. address Specified
dest-ip Destination IP and mask for the split-tunneling subnet. ipv4- Not 0.0.0.0
classnet Specified 0.0.0.0
config radio-1
Option Description
monitor Radio 1 operates as a dedicated monitor. As a monitor, the radio scans for
other WiFi access points and adds them to the Rogue AP monitor list.
Option Description
802.11a 802.11a.
802.11b 802.11b.
802.11g 802.11g/b.
802.11ac 802.11ac/n/a.
Option Description
802.11g-only 802.11g.
802.11ac,n-only 802.11ac/n.
802.11ac-only 802.11ac.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ac-vo Use AC VO priority to send out packets in the power save queue.
no-obss-scan Do not put OBSS scan IE into beacon and probe response frames.
client-rate-follow Adapt transmitting PHY rate with receiving PHY rate from a client.
Option Description
power-save Tag client as operating in power save mode if excessive transmit retries
occur.
aggr-limit Set aggregation limit to a lower value when data rate is low.
retry-limit Set software retry limit to a lower value when data rate is low.
Option Description
Option Description
enable Enable support for both HT20 and HT40 on the same radio.
disable Disable support for both HT20 and HT40 on the same radio.
Option Description
bss-color BSS color value for this 11ax radio . integer Minimum 0
value: 0
Maximum
value: 63
bss-color- BSS color mode for this 11ax radio . option - auto
mode
Option Description
static Set BSS color value on this radio based on 'bss-color' CLI.
short-guard- Use either the short guard interval (Short option - disable
interval GI) of 400 ns or the long guard interval
(Long GI) of 800 ns.
Option Description
Option Description
Option Description
Option Description
beacon- Beacon interval. The time between beacon integer Minimum 100
interval frames in milliseconds. Actual range of value: 0
beacon interval depends on the AP platform Maximum
type . value: 65535
Option Description
frag-threshold Maximum packet size that can be sent integer Minimum 2346
without fragmentation . value: 800
Maximum
value: 2346
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
open Open.
Option Description
sam-cwp- Identification string from the captive portal string Not Specified
match-string login form.
Option Description
Option Description
ip IPv4 address.
Option Description
udp UDP.
tcp TCP.
Option Description
Option Description
Option Description
Option Description
Option Description
config radio-2
Option Description
monitor Radio 2 operates as a dedicated monitor. As a monitor, the radio scans for
other WiFi access points and adds them to the Rogue AP monitor list.
Option Description
802.11a 802.11a.
802.11b 802.11b.
802.11g 802.11g/b.
Option Description
802.11ac 802.11ac/n/a.
802.11g-only 802.11g.
802.11ac,n-only 802.11ac/n.
802.11ac-only 802.11ac.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ac-vo Use AC VO priority to send out packets in the power save queue.
no-obss-scan Do not put OBSS scan IE into beacon and probe response frames.
client-rate-follow Adapt transmitting PHY rate with receiving PHY rate from a client.
Option Description
power-save Tag client as operating in power save mode if excessive transmit retries
occur.
aggr-limit Set aggregation limit to a lower value when data rate is low.
retry-limit Set software retry limit to a lower value when data rate is low.
Option Description
Option Description
enable Enable support for both HT20 and HT40 on the same radio.
disable Disable support for both HT20 and HT40 on the same radio.
Option Description
bss-color BSS color value for this 11ax radio . integer Minimum 0
value: 0
Maximum
value: 63
bss-color- BSS color mode for this 11ax radio . option - auto
mode
Option Description
static Set BSS color value on this radio based on 'bss-color' CLI.
short-guard- Use either the short guard interval (Short option - disable
interval GI) of 400 ns or the long guard interval
(Long GI) of 800 ns.
Option Description
Option Description
Option Description
Option Description
beacon- Beacon interval. The time between beacon integer Minimum 100
interval frames in milliseconds. Actual range of value: 0
beacon interval depends on the AP platform Maximum
type . value: 65535
Option Description
frag-threshold Maximum packet size that can be sent integer Minimum 2346
without fragmentation . value: 800
Maximum
value: 2346
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
open Open.
Option Description
sam-cwp- Identification string from the captive portal string Not Specified
match-string login form.
Option Description
Option Description
ip IPv4 address.
Option Description
udp UDP.
tcp TCP.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config radio-3
Option Description
monitor Radio 3 operates as a dedicated monitor. As a monitor, the radio scans for
other WiFi access points and adds them to the Rogue AP monitor list.
Option Description
802.11a 802.11a.
802.11b 802.11b.
802.11g 802.11g/b.
802.11ac 802.11ac/n/a.
802.11g-only 802.11g.
802.11ac,n-only 802.11ac/n.
802.11ac-only 802.11ac.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ac-vo Use AC VO priority to send out packets in the power save queue.
no-obss-scan Do not put OBSS scan IE into beacon and probe response frames.
client-rate-follow Adapt transmitting PHY rate with receiving PHY rate from a client.
Option Description
power-save Tag client as operating in power save mode if excessive transmit retries
occur.
aggr-limit Set aggregation limit to a lower value when data rate is low.
retry-limit Set software retry limit to a lower value when data rate is low.
Option Description
Option Description
enable Enable support for both HT20 and HT40 on the same radio.
disable Disable support for both HT20 and HT40 on the same radio.
Option Description
bss-color BSS color value for this 11ax radio . integer Minimum 0
value: 0
Maximum
value: 63
bss-color- BSS color mode for this 11ax radio . option - auto
mode
Option Description
static Set BSS color value on this radio based on 'bss-color' CLI.
short-guard- Use either the short guard interval (Short option - disable
interval GI) of 400 ns or the long guard interval
(Long GI) of 800 ns.
Option Description
Option Description
Option Description
Option Description
beacon- Beacon interval. The time between beacon integer Minimum 100
interval frames in milliseconds. Actual range of value: 0
beacon interval depends on the AP platform Maximum
type . value: 65535
Option Description
frag-threshold Maximum packet size that can be sent integer Minimum 2346
without fragmentation . value: 800
Maximum
value: 2346
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
open Open.
Option Description
sam-cwp- Identification string from the captive portal string Not Specified
match-string login form.
Option Description
Option Description
ip IPv4 address.
Option Description
udp UDP.
tcp TCP.
Option Description
Option Description
Option Description
Option Description
Option Description
config radio-4
Option Description
Option Description
monitor Radio 3 operates as a dedicated monitor. As a monitor, the radio scans for
other WiFi access points and adds them to the Rogue AP monitor list.
Option Description
802.11a 802.11a.
802.11b 802.11b.
802.11g 802.11g/b.
802.11ac 802.11ac/n/a.
802.11g-only 802.11g.
802.11ac,n-only 802.11ac/n.
802.11ac-only 802.11ac.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ac-vo Use AC VO priority to send out packets in the power save queue.
no-obss-scan Do not put OBSS scan IE into beacon and probe response frames.
client-rate-follow Adapt transmitting PHY rate with receiving PHY rate from a client.
Option Description
power-save Tag client as operating in power save mode if excessive transmit retries
occur.
aggr-limit Set aggregation limit to a lower value when data rate is low.
retry-limit Set software retry limit to a lower value when data rate is low.
Option Description
Option Description
enable Enable support for both HT20 and HT40 on the same radio.
disable Disable support for both HT20 and HT40 on the same radio.
Option Description
Option Description
bss-color BSS color value for this 11ax radio . integer Minimum 0
value: 0
Maximum
value: 63
bss-color- BSS color mode for this 11ax radio . option - auto
mode
Option Description
static Set BSS color value on this radio based on 'bss-color' CLI.
short-guard- Use either the short guard interval (Short option - disable
interval GI) of 400 ns or the long guard interval
(Long GI) of 800 ns.
Option Description
Option Description
Option Description
Option Description
beacon- Beacon interval. The time between beacon integer Minimum 100
interval frames in milliseconds. Actual range of value: 0
beacon interval depends on the AP platform Maximum
type . value: 65535
Option Description
frag-threshold Maximum packet size that can be sent integer Minimum 2346
without fragmentation . value: 800
Maximum
value: 2346
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
open Open.
Option Description
sam-cwp- Identification string from the captive portal string Not Specified
match-string login form.
Option Description
Option Description
ip IPv4 address.
Option Description
udp UDP.
Option Description
tcp TCP.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ekahau-tag WiFi frame MAC address or WiFi Tag. mac- Not Specified 01:18:8e:00:00:00
address
Option Description
Option Description
Option Description
Option Description
Option Description
foreign FortiPresence monitors foreign channels only. Foreign channels mean all
other available channels than the current operating channel of the WTP, AP,
or FortiAP.
both Enable FortiPresence on both foreign and home channels. Select this option
to have FortiPresence monitor all WiFi channels.
Option Description
Option Description
Option Description
Option Description
Option Description
config esl-ses-dongle
compliance- Compliance levels for the ESL solution integration . option - compliance-
level level-2
Option Description
Option Description
Option Description
-1 No esl-channel is set.
0 ESL channel 0.
1 ESL channel 1.
2 ESL channel 2.
3 ESL channel 3.
4 ESL channel 4.
5 ESL channel 5.
6 ESL channel 6.
7 ESL channel 7.
8 ESL channel 8.
9 ESL channel 9.
Option Description
127 Managed channel enabled, indicates that the APC (server) is setting the esl-
channel via the slot channel
Option Description
a About 15mW.
b About 7mW.
c About 5mW.
d About 1mW.
e About 13mW.
f About 10mW.
g About 3mW.
h About 2mW.
Option Description
ip IPv4 address.
Option Description
Option Description
Option Description
Configure Wireless Termination Points (WTPs), that is, FortiAPs or APs to be managed by FortiGate.
config wireless-controller wtp
Description: Configure Wireless Termination Points (WTPs), that is, FortiAPs or APs to be
managed by FortiGate.
edit <wtp-id>
set index {integer}
set uuid {uuid}
set admin [discovered|disable|...]
set name {string}
set location {string}
set region {string}
set region-x {string}
set region-y {string}
set firmware-provision {string}
set firmware-provision-latest [disable|once]
set wtp-profile {string}
set apcfg-profile {string}
set bonjour-profile {string}
set override-led-state [enable|disable]
set led-state [enable|disable]
set override-wan-port-mode [enable|disable]
set wan-port-mode [wan-lan|wan-only]
set override-ip-fragment [enable|disable]
set ip-fragment-preventing {option1}, {option2}, ...
set tun-mtu-uplink {integer}
set tun-mtu-downlink {integer}
set override-split-tunnel [enable|disable]
set split-tunneling-acl-path [tunnel|local]
set split-tunneling-acl-local-ap-subnet [enable|disable]
config split-tunneling-acl
Description: Split tunneling ACL filter list.
edit <id>
set dest-ip {ipv4-classnet}
next
end
Option Description
discovered FortiGate wireless controller discovers the WTP, AP, or FortiAP though
discovery or join request messages.
disable FortiGate wireless controller is configured to not provide service to this WTP.
location Field for describing the physical location of the string Not Specified
WTP, AP or FortiAP.
Option Description
wtp-profile WTP profile name to apply to this WTP, AP or string Not Specified
FortiAP.
override-led- Enable to override the profile LED state setting option - disable
state for this FortiAP. You must enable this option to
use the led-state command to turn off the
FortiAP's LEDs.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
override-lan Enable to override the WTP profile LAN port option - disable
setting.
Option Description
Option Description
Option Description
Option Description
disable Use the the WTP profile login-password (administrator password) setting.
Option Description
yes Change the managed WTP, FortiAP or AP's administrator password. Use the
login-password option to set the password.
default Keep the managed WTP, FortiAP or AP's administrator password set to the
factory default.
login-passwd Set the managed WTP, FortiAP, or AP's password Not Specified
administrator password.
Option Description
Option Description
config split-tunneling-acl
dest-ip Destination IP and mask for the split-tunneling subnet. ipv4- Not 0.0.0.0
classnet Specified 0.0.0.0
config lan
Option Description
offline Offline.
Option Description
offline Offline.
Option Description
offline Offline.
Option Description
offline Offline.
Option Description
offline Offline.
Option Description
offline Offline.
Option Description
offline Offline.
Option Description
offline Offline.
Option Description
Option Description
offline Offline.
Option Description
offline Offline.
config radio-1
override-band Enable to override the WTP profile band setting. option - disable
Option Description
Option Description
802.11a 802.11a.
802.11b 802.11b.
802.11g 802.11g/b.
802.11ac 802.11ac/n/a.
802.11g-only 802.11g.
802.11ac,n-only 802.11ac/n.
802.11ac-only 802.11ac.
override- Enable to override the WTP profile power level option - disable
txpower configuration.
Option Description
Option Description
auto-power- Target of automatic transmit power adjustment in string Not Specified -70
target dBm .
power-mode Set radio effective isotropic radiated power . This option - percentage
power takes into account both radio transmit power
and antenna gain. Higher power level settings may
be constrained by local regulatory requirements
and AP capabilities.
Option Description
power-level Radio EIRP power level as a percentage of the integer Minimum 100
maximum EIRP power . value: 0
Maximum
value: 100
override-vaps Enable to override WTP profile Virtual Access Point option - disable
(VAP) settings.
Option Description
Option Description
vaps <name> Manually selected list of Virtual Access Points string Maximum
(VAPs). length: 35
Virtual Access Point (VAP) name.
Option Description
drma-manual- Radio mode to be used for DRMA manual mode . option - ncf
mode
Option Description
ncf Select and set the radio mode based on NCF score.
ncf-peek Select the radio mode based on NCF score, but do not apply.
config radio-2
override-band Enable to override the WTP profile band setting. option - disable
Option Description
Option Description
802.11a 802.11a.
802.11b 802.11b.
802.11g 802.11g/b.
802.11ac 802.11ac/n/a.
802.11g-only 802.11g.
802.11ac,n-only 802.11ac/n.
802.11ac-only 802.11ac.
override- Enable to override the WTP profile power level option - disable
txpower configuration.
Option Description
Option Description
auto-power- Target of automatic transmit power adjustment in string Not Specified -70
target dBm .
power-mode Set radio effective isotropic radiated power . This option - percentage
power takes into account both radio transmit power
and antenna gain. Higher power level settings may
be constrained by local regulatory requirements
and AP capabilities.
Option Description
power-level Radio EIRP power level as a percentage of the integer Minimum 100
maximum EIRP power . value: 0
Maximum
value: 100
override-vaps Enable to override WTP profile Virtual Access Point option - disable
(VAP) settings.
Option Description
Option Description
vaps <name> Manually selected list of Virtual Access Points string Maximum
(VAPs). length: 35
Virtual Access Point (VAP) name.
Option Description
drma-manual- Radio mode to be used for DRMA manual mode . option - ncf
mode
Option Description
ncf Select and set the radio mode based on NCF score.
ncf-peek Select the radio mode based on NCF score, but do not apply.
config radio-3
override-band Enable to override the WTP profile band setting. option - disable
Option Description
Option Description
802.11a 802.11a.
802.11b 802.11b.
802.11g 802.11g/b.
802.11ac 802.11ac/n/a.
802.11g-only 802.11g.
802.11ac,n-only 802.11ac/n.
802.11ac-only 802.11ac.
override- Enable to override the WTP profile power level option - disable
txpower configuration.
Option Description
Option Description
auto-power- Target of automatic transmit power adjustment in string Not Specified -70
target dBm .
power-mode Set radio effective isotropic radiated power . This option - percentage
power takes into account both radio transmit power
and antenna gain. Higher power level settings may
be constrained by local regulatory requirements
and AP capabilities.
Option Description
power-level Radio EIRP power level as a percentage of the integer Minimum 100
maximum EIRP power . value: 0
Maximum
value: 100
override-vaps Enable to override WTP profile Virtual Access Point option - disable
(VAP) settings.
Option Description
Option Description
vaps <name> Manually selected list of Virtual Access Points string Maximum
(VAPs). length: 35
Virtual Access Point (VAP) name.
Option Description
drma-manual- Radio mode to be used for DRMA manual mode . option - ncf
mode
Option Description
ncf Select and set the radio mode based on NCF score.
ncf-peek Select the radio mode based on NCF score, but do not apply.
config radio-4
override-band Enable to override the WTP profile band setting. option - disable
Option Description
Option Description
802.11a 802.11a.
802.11b 802.11b.
802.11g 802.11g/b.
802.11ac 802.11ac/n/a.
802.11g-only 802.11g.
802.11ac,n-only 802.11ac/n.
802.11ac-only 802.11ac.
override- Enable to override the WTP profile power level option - disable
txpower configuration.
Option Description
Option Description
auto-power- Target of automatic transmit power adjustment in string Not Specified -70
target dBm .
power-mode Set radio effective isotropic radiated power . This option - percentage
power takes into account both radio transmit power
and antenna gain. Higher power level settings may
be constrained by local regulatory requirements
and AP capabilities.
Option Description
power-level Radio EIRP power level as a percentage of the integer Minimum 100
maximum EIRP power . value: 0
Maximum
value: 100
override-vaps Enable to override WTP profile Virtual Access Point option - disable
(VAP) settings.
Option Description
Option Description
vaps <name> Manually selected list of Virtual Access Points string Maximum
(VAPs). length: 35
Virtual Access Point (VAP) name.
Option Description
drma-manual- Radio mode to be used for DRMA manual mode . option - ncf
mode
Option Description
ncf Select and set the radio mode based on NCF score.
ncf-peek Select the radio mode based on NCF score, but do not apply.
platform-type FortiAP models to define the WTP group platform type. option -
Option Description
220B FAP220B/221B.
210B FAP210B.
222B FAP222B.
112B FAP112B.
320B FAP320B.
11C FAP11C.
14C FAP14C.
223B FAP223B.
28C FAP28C.
320C FAP320C.
221C FAP221C.
25D FAP25D.
222C FAP222C.
224D FAP224D.
214B FK214B.
21D FAP21D.
24D FAP24D.
112D FAP112D.
223C FAP223C.
321C FAP321C.
C220C FAPC220C.
C225C FAPC225C.
C23JD FAPC23JD.
C24JE FAPC24JE.
S321C FAPS321C.
S322C FAPS322C.
Option Description
S323C FAPS323C.
S311C FAPS311C.
S313C FAPS313C.
S321CR FAPS321CR.
S322CR FAPS322CR.
S323CR FAPS323CR.
S421E FAPS421E.
S422E FAPS422E.
S423E FAPS423E.
421E FAP421E.
423E FAP423E.
221E FAP221E.
222E FAP222E.
223E FAP223E.
224E FAP224E.
231E FAP231E.
S221E FAPS221E.
S223E FAPS223E.
321E FAP321E.
431F FAP431F.
431FL FAP431FL.
432F FAP432F.
432FR FAP432FR.
433F FAP433F.
433FL FAP433FL.
231F FAP231F.
231FL FAP231FL.
234F FAP234F.
23JF FAP23JF.
Option Description
831F FAP831F.
231G FAP231G.
233G FAP233G.
431G FAP431G.
433G FAP433G.
U421E FAPU421EV.
U422EV FAPU422EV.
U423E FAPU423EV.
U221EV FAPU221EV.
U223EV FAPU223EV.
U24JEV FAPU24JEV.
U321EV FAPU321EV.
U323EV FAPU323EV.
U431F FAPU431F.
U433F FAPU433F.
U231F FAPU231F.
U234F FAPU234F.
U432F FAPU432F.
uplink Maximum uplink bandwidth for Virtual Access Points . integer Minimum 0
value: 0
Maximum
value:
2097152
downlink Maximum downlink bandwidth for Virtual Access Points integer Minimum 0
. value: 0
Maximum
value:
2097152
Option Description
Option Description
Option Description
enable Enable WMM Unscheduled Automatic Power Save Delivery (U-APSD) power
save mode.
disable Disable WMM Unscheduled Automatic Power Save Delivery (U-APSD) power
save mode.
Option Description
Option Description
Option Description
dscp-wmm-vo DSCP mapping for voice access (default = 48 56). integer Minimum
<id> DSCP WMM mapping numbers (0 - 63). value: 0
Maximum
value: 63
dscp-wmm-vi DSCP mapping for video access (default = 32 40). integer Minimum
<id> DSCP WMM mapping numbers (0 - 63). value: 0
Maximum
value: 63
dscp-wmm-be DSCP mapping for best effort access (default = 0 24). integer Minimum
<id> DSCP WMM mapping numbers (0 - 63). value: 0
Maximum
value: 63
dscp-wmm-bk DSCP mapping for background access (default = 8 16). integer Minimum
<id> DSCP WMM mapping numbers (0 - 63). value: 0
Maximum
value: 63
Option Description
Configure wireless access gateway (WAG) profiles used for tunnels on AP.
config wireless-controller wag-profile
Description: Configure wireless access gateway (WAG) profiles used for tunnels on AP.
edit <name>
set comment {var-string}
set tunnel-type [l2tpv3|gre]
set wag-ip {ipv4-address}
set wag-port {integer}
set ping-interval {integer}
set ping-number {integer}
set return-packet-timeout {integer}
set dhcp-ip-addr {ipv4-address}
next
end
Option Description
wag-port UDP port of the wireless access gateway. integer Minimum 1701
value: 0
Maximum
value:
65535
ping-interval Interval between two tunnel monitoring echo packets . integer Minimum 1
value: 1
Maximum
value:
65535
return-packet- Window of time for the return packets from the tunnel's integer Minimum 160
timeout remote end . value: 1
Maximum
value:
65535
dhcp-ip-addr IP address of the monitoring DHCP request packet sent ipv4- Not 0.0.0.0
through the tunnel. address Specified
Option Description
Option Description
Configure SNMP.
config wireless-controller snmp
Description: Configure SNMP.
set engine-id {string}
set contact-info {string}
set trap-high-cpu-threshold {integer}
set trap-high-mem-threshold {integer}
config community
Description: SNMP Community Configuration.
edit <id>
set name {string}
set status [enable|disable]
set query-v1-status [enable|disable]
set query-v2c-status [enable|disable]
set trap-v1-status [enable|disable]
set trap-v2c-status [enable|disable]
config hosts
Description: Configure IPv4 SNMP managers (hosts).
edit <id>
set ip {user}
next
end
config community
Option Description
Option Description
Option Description
Option Description
Option Description
config hosts
config user
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config mpsk-group
Option Description
no-vlan No VLAN.
config mpsk-key
Option Description
unlimited Unlimited.
concurrent- Number of clients that can connect using this integer Minimum 256
clients pre-shared key . value: 1
Maximum
value:
65535
config layer3-ipv4-rules
Option Description
config layer3-ipv6-rules
srcaddr Source IPv6 address (any | local-LAN | IPv6 address user Not
[/prefix length]), default = any. Specified
Option Description
Option Description
Copyright© 2022 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.