FortiOS 7.4.4 CLI Reference
FortiOS 7.4.4 CLI Reference
FortiOS 7.4.4
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTIGUARD LABS
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
Change Log 16
FortiOS CLI reference 17
Availability of commands and options 17
Command tree 17
CLI configuration commands 19
alertemail 20
config alertemail setting 20
antivirus 27
config antivirus exempt-list 27
config antivirus profile 28
config antivirus quarantine 58
config antivirus settings 62
application 64
config application custom 64
config application group 65
config application list 66
config application name 75
config application rule-settings 77
authentication 78
config authentication rule 78
config authentication scheme 80
config authentication setting 83
automation 86
config automation setting 86
casb 87
config casb profile 87
config casb saas-application 90
config casb user-activity 91
certificate 97
config certificate ca 97
config certificate crl 99
config certificate local 100
config certificate remote 105
diameter-filter 106
config diameter-filter profile 106
dlp 109
config dlp data-type 109
config dlp dictionary 110
config dlp exact-data-match 112
config dlp filepattern 113
config dlp fp-doc-source 117
config dlp profile 120
config dlp sensitivity 125
config dlp sensor 126
This document describes FortiOS 7.4.4 CLI commands used to configure and manage a FortiGate unit from the
command line interface (CLI). For information on using the CLI, see the FortiOS 7.4.4 Administration Guide, which
contains information such as:
l Connecting to the CLI
l CLI basics
l Command syntax
l Subcommands
l Permissions
Some FortiOS CLI commands and options are not available on all FortiGate units. The CLI displays an error message if
you attempt to enter a command or option that is not available. You can use the question mark ‘?’ to verify the commands
and options that are available.
Commands and options may not be available for the following reasons:
FortiGate model
All commands are not available on all FortiGate models. For example, a hardware switch can be configured only on
models which have the corresponding hardware switch chipset.
Hardware configuration
For example, settings like mediatype would only be available on units with SFPs.
Commands for extended functionality are not available on all FortiGate models. The CLI Reference may not include all
commands.
Command tree
Enter tree to display the entire FortiOS CLI command tree. To capture the full output, connect to your device using a
terminal emulation program, such as PuTTY, and capture the output to a log file.
l To view all available commands, enter tree.
l To view a specific configuration branch of a tree, enter tree <branch>, for example: tree system.
Use configuration commands to configure and manage a FortiGate unit from the command line interface (CLI).
The CLI syntax is created by processing the schema from FortiGate models running FortiOS 7.4.4 and reformatting the
resultant CLI output. If you have comments on this content, its format, or requests for commands that are not included,
contact us at [email protected].
Option Description
Option Description
FIPS-CC-errors Enable/disable FIPS and Common Criteria error logs option - disable
in alert email.
Option Description
enable Enable FIPS and Common Criteria error logs in alert email.
disable Disable FIPS and Common Criteria error logs in alert email.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable Fortinet Advanced Mezzanine Card (AMC) interface bypass mode
logs in alert email.
disable Disable Fortinet Advanced Mezzanine Card (AMC) interface bypass mode
logs in alert email.
Option Description
Option Description
filter-mode How to filter log messages that are sent to alert option - category
emails.
Option Description
Option Description
Option Description
local-disk-usage Disk usage percentage at which to send alert email. integer Minimum 75
value: 1
Maximum
value: 99
Option Description
mailto2 Optional second email address to send alert email to string Maximum
(max. 63 characters). length: 63
mailto3 Optional third email address to send alert email to string Maximum
(max. 63 characters). length: 63
Option Description
Option Description
Option Description
username Name that appears in the From: field of alert emails string Maximum
(max. 63 characters). length: 63
Option Description
Option Description
Option Description
Option Description
analytics- Only submit files matching this DLP file-pattern to integer Minimum 0
accept-filetype FortiSandbox (post-transfer scan only). value: 0
Maximum
value:
4294967295
Option Description
analytics- Do not submit files matching this DLP file-pattern to integer Minimum 0
ignore-filetype FortiSandbox (post-transfer scan only). value: 0
Maximum
value:
4294967295
Option Description
Option Description
disable Disable use of EMS threat feed when performing AntiVirus scan.
enable Enable use of EMS threat feed when performing AntiVirus scan.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
log-only Log FortiSandbox inline scan error, but allow the file.
Option Description
analytics- FortiSandbox post-transfer scan: submit supported files and known infected
everything files.
Option Description
log-only Log FortiSandbox inline scan timeout, but allow the file.
Option Description
Option Description
Option Description
legacy Scan archive files only after the entire file is received.
config cifs
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
Option Description
config content-disarm
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
cover-page Enable/disable inserting a cover page into the disarmed option - enable
document.
Option Description
detect-only Enable/disable only detect disarmable files, do not alter option - disable
content.
Option Description
config ftp
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
config http
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable Content Disarm and Reconstruction when performing AntiVirus scan.
enable Enable Content Disarm and Reconstruction when performing AntiVirus scan.
config imap
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
Option Description
executables Treat Windows executable files as viruses for the option - default
purpose of blocking or monitoring.
Option Description
Option Description
disable Disable Content Disarm and Reconstruction when performing AntiVirus scan.
enable Enable Content Disarm and Reconstruction when performing AntiVirus scan.
config mapi
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
executables Treat Windows executable files as viruses for the option - default
purpose of blocking or monitoring.
Option Description
Option Description
quar-src-ip Quarantine all traffic from the infected hosts source IP.
Option Description
config nntp
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
config pop3
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
executables Treat Windows executable files as viruses for the option - default
purpose of blocking or monitoring.
Option Description
Option Description
disable Disable Content Disarm and Reconstruction when performing AntiVirus scan.
enable Enable Content Disarm and Reconstruction when performing AntiVirus scan.
config smtp
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
executables Treat Windows executable files as viruses for the option - default
purpose of blocking or monitoring.
Option Description
Option Description
disable Disable Content Disarm and Reconstruction when performing AntiVirus scan.
enable Enable Content Disarm and Reconstruction when performing AntiVirus scan.
config ssh
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
FortiAnalyzer FortiAnalyzer
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
https HTTPS.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
Option Description
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
https HTTPS.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
lowspace Select the method for handling additional files when option - ovrw-old
running low on disk space.
Option Description
ovrw-old Overwrite the oldest quarantined files. That is, the files that are closest to
being deleted from the quarantine.
quarantine- The amount of disk space to reserve for quarantining integer Minimum 0
quota files. value: 0
Maximum
value:
4294967295
store-infected Quarantine infected files found in sessions using the option - imap smtp
selected protocols. pop3 http
ftp nntp
imaps
smtps
pop3s
https ftps
mapi cifs
ssh
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
https HTTPS.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
store- Quarantine files detected by machine learning found in option - imap smtp
machine- sessions using the selected protocols. pop3 http
learning ftp nntp
imaps
smtps
pop3s
https ftps
mapi cifs
ssh
Option Description
imap IMAP.
Option Description
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
https HTTPS.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
Option Description
Option Description
Option Description
monitor Enable machine learning based malware detection for monitoring only.
override- Override the large file scan timeout value in seconds. integer Minimum 0
timeout Zero is the default value and is used to disable this value: 30
command. When disabled, the daemon adjusts the Maximum
large file scan timeout based on the file size. value: 3600
Option Description
signature The text that makes up the actual custom application var-string Maximum
signature. length: 4095
Option Description
1 Popularity level 1.
2 Popularity level 2.
3 Popularity level 3.
4 Popularity level 4.
5 Popularity level 5.
risk <level> Risk, or impact, of allowing traffic from this integer Minimum
application to occur (1 - 5; Low, Elevated, Medium, value: 0
High, and Critical). Maximum
Risk, or impact, of allowing traffic from this value:
application to occur (1 - 5; Low, Elevated, Medium, 4294967295
High, and Critical).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable forced inclusion of signatures which normally require SSL deep
inspection.
enable Enable forced inclusion of signatures which normally require SSL deep
inspection.
Option Description
Option Description
Option Description
Option Description
skype Skype.
edonkey Edonkey.
Option Description
Option Description
config default-network-services
Option Description
http HTTP.
ssh SSH.
telnet TELNET.
ftp FTP.
dns DNS.
smtp SMTP.
pop3 POP3.
imap IMAP.
snmp SNMP.
nntp NNTP.
https HTTPS.
violation- Action for protocols not in the allowlist for selected option - block
action port.
Option Description
config entries
risk <level> Risk, or impact, of allowing traffic from this integer Minimum
application to occur (1 - 5; Low, Elevated, Medium, value: 0
High, and Critical). Maximum
Risk, or impact, of allowing traffic from this value:
application to occur (1 - 5; Low, Elevated, Medium, 4294967295
High, and Critical).
Option Description
1 Popularity level 1.
2 Popularity level 2.
3 Popularity level 3.
4 Popularity level 4.
5 Popularity level 5.
action Pass or block traffic, or reset connection for traffic option - block
from this application.
Option Description
Option Description
Option Description
Option Description
Option Description
none none
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
config parameters
config members
config metadata
Option Description
Option Description
Option Description
Option Description
Option Description
srcaddr Authentication is required for the selected IPv4 source string Maximum
<name> address. length: 79
Address name.
srcaddr6 Authentication is required for the selected IPv6 source string Maximum
<name> address. length: 79
Address name.
Option Description
Option Description
Option Description
web-portal Enable/disable web portal for proxy transparent policy. option - enable
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
cookie-max- Persistent web portal cookie maximum age in minutes. integer Minimum 480
age value: 30
Maximum
value:
10080
cookie- Refresh rate divider of persistent web portal cookie. integer Minimum 2
refresh-div Refresh value = cookie-max-age/cookie-refresh-div. value: 2
Maximum
value: 4
dev-range Address range for the IP based device query. string Maximum
<name> Address name. length: 79
Option Description
Option Description
Option Description
max- Maximum number of automation stitches that are integer Minimum 512 **
concurrent- allowed to run concurrently. value: 32
stitches Maximum
value: 1024
**
config saas-application
Option Description
Option Description
Option Description
Option Description
Option Description
config access-rule
Option Description
Option Description
config option
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config control-options
Option Description
config operations
Option Description
header Header.
path Path.
Option Description
new-on-not- Create new header only if existing HTTP header is not found.
found
Option Description
request Request.
Option Description
Option Description
Option Description
config match
Option Description
config rules
Option Description
domains Domains.
host Host.
path Path.
Option Description
Option Description
Option Description
negate Enable/disable what the matching strategy must not option - disable
be.
Option Description
config certificate ca
CA certificate.
config certificate ca
Description: CA certificate.
edit <name>
set auto-update-days {integer}
set auto-update-days-warning {integer}
set ca {user}
set ca-identifier {string}
set est-url {string}
set fabric-ca [disable|enable]
set obsolete [disable|enable]
set range [global|vdom]
set scep-url {string}
set source [factory|user|...]
set source-ip {ipv4-address}
set ssl-inspection-trusted [enable|disable]
next
end
config certificate ca
Option Description
Option Description
disable Alive.
enable Obsolete.
range Either global or VDOM IP address range for the CA option - global
certificate.
Option Description
Option Description
source-ip Source IP address for communications to the SCEP ipv4- Not Specified 0.0.0.0
server. address
Option Description
range Either global or VDOM IP address range for the option - global
certificate.
Option Description
scep-cert Local certificate for SCEP communication for CRL string Maximum Fortinet_
auto-update. length: 35 CA_SSL
Option Description
source-ip Source IP address for communications to a HTTP or ipv4- Not Specified 0.0.0.0
SCEP CA server. address
update- Time in seconds before the FortiGate checks for an integer Minimum 0
interval updated CRL. Set to 0 to update only when it expires. value: 0
Maximum
value:
4294967295
Option Description
renewal Renewal.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
range Either the global or VDOM IP address range for the option - global
remote certificate.
Option Description
Option Description
cmd-flags- Action to be taken for messages with cmd flag reserve option - block
reserve-set bits set.
Option Description
command- Action to be taken for messages with invalid command option - block
code-invalid code.
Option Description
Option Description
disable Disable.
enable Enable.
Option Description
Option Description
monitor-all- Enable/disable logging for all User Name and Result option - disable
messages Code AVP messages.
Option Description
disable Disable.
enable Enable.
Option Description
request-error- Action to be taken for request messages with error flag option - block
flag-set set.
Option Description
Option Description
disable Disable.
enable Enable.
pattern Regular expression pattern string without look around. string Maximum
length: 255
verify Regular expression pattern string used to verify the string Maximum
data type. length: 255
Option Description
verify2 Extra regular expression pattern string used to verify string Maximum
the data type. length: 255
Option Description
Option Description
Option Description
Option Description
Option Description
config columns
Option Description
name Name of table containing the file pattern list. string Maximum
length: 63
config entries
Option Description
Option Description
Option Description
xz Match xz files.
msoffice Match MS-Office files. For example, doc, xls, ppt, and so on.
msofficex Match MS-Office XML files. For example, docx, xlsx, pptx, and so on.
Option Description
rm Match rm files.
This command is available for model(s): FortiGate 1000D, FortiGate 1001F, FortiGate 101F,
FortiGate 1101E, FortiGate 1801F, FortiGate 2000E, FortiGate 201E, FortiGate 201F,
FortiGate 2201E, FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D,
FortiGate 3001F, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3201F,
FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E, FortiGate 3700D,
FortiGate 3701F, FortiGate 401E, FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E, FortiGate 601E,
FortiGate 601F, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80F Bypass, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-
POE, FortiGate 81F, FortiGate 900D, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F
3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi
40F 3G4G, FortiWiFi 40F, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R,
FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000F, FortiGate 100F, FortiGate 1100E, FortiGate 140E-
POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F, FortiGate 2200E,
FortiGate 3000F, FortiGate 300E, FortiGate 3200F, FortiGate 3300E, FortiGate 3400E,
FortiGate 3500F, FortiGate 3600E, FortiGate 3700F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 4200F, FortiGate 4400F,
FortiGate 5001E, FortiGate 500E, FortiGate 600E, FortiGate 600F, FortiGate 60E DSLJ,
FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 80E-POE, FortiGate 80E,
FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL,
FortiWiFi 60E.
Create a DLP fingerprint database by allowing the FortiGate to access a file server containing files from which to create
fingerprints.
config dlp fp-doc-source
Description: Create a DLP fingerprint database by allowing the FortiGate to access a
file server containing files from which to create fingerprints.
edit <name>
set date {integer}
set file-path {string}
set file-pattern {string}
set keep-modified [enable|disable]
set password {password}
set period [none|daily|...]
set remove-deleted [enable|disable]
set scan-on-creation [enable|disable]
set scan-subdirectories [enable|disable]
set sensitivity {string}
set server {string}
set server-type {option}
set tod-hour {integer}
set tod-min {integer}
set username {string}
set vdom [mgmt|current]
set weekday [sunday|monday|...]
next
end
date Day of the month on which to scan the server. integer Minimum 1
value: 1
Maximum
value: 31
file-path Path on the server to the fingerprint files (max 119 string Maximum
characters). length: 119
file-pattern Files matching this pattern on the server are string Maximum *
fingerprinted. Optionally use the * and ? wildcards. length: 35
keep-modified Enable so that when a file is changed on the server option - enable
the FortiGate keeps the old fingerprint and adds a
new fingerprint to the database.
Option Description
enable Keep the old fingerprint and add a new fingerprint when a file is changed on
the server.
disable Replace the old fingerprint with the new fingerprint when a file is changed on
the server.
password Password required to log into the file server. password Not
Specified
period Frequency for which the FortiGate checks the server option - none
for new or changed files.
Option Description
Option Description
enable Keep the fingerprint database up to date when a file is deleted from the
server.
disable Do not check for deleted files on the server. Saves system resources.
Option Description
enable Keep the fingerprint database up to date when a file is added or changed on
the server.
disable Do not check for added or changed files on the server. Saves system
resources.
Option Description
sensitivity Select a sensitivity or threat level for matches with string Maximum
this fingerprint database. Add sensitivities using length: 35
sensitivity.
server-type Protocol used to communicate with the file server. option - samba
Currently only Samba (SMB) servers are supported.
Option Description
tod-hour Hour of the day on which to scan the server. integer Minimum 1
value: 0
Maximum
value: 23
tod-min Minute of the hour on which to scan the server. integer Minimum 0
value: 0
Maximum
value: 59
username User name required to log into the file server. string Maximum
length: 35
vdom Select the VDOM that can communicate with the file option - mgmt
server.
Option Description
mgmt Communicate with the file server through the management VDOM.
current Communicate with the file server through the VDOM containing this DLP
fingerprint database configuration.
weekday Day of the week on which to scan the server. option - sunday
Option Description
sunday Sunday
monday Monday
tuesday Tuesday
wednesday Wednesday
thursday Thursday
friday Friday
saturday Saturday
Option Description
Option Description
Option Description
Option Description
smtp SMTP.
pop3 POP3.
imap IMAP.
Option Description
ftp FTP.
nntp NNTP.
mapi MAPI.
cifs CIFS.
Option Description
replacemsg- Replacement message group used by this DLP profile. string Maximum
group length: 35
Option Description
smtp SMTP.
pop3 POP3.
imap IMAP.
ftp FTP.
nntp NNTP.
mapi MAPI.
cifs CIFS.
severity Select the severity or threat level that matches this option - medium
filter.
Option Description
info Informational.
low Low.
medium Medium.
high High.
critical Critical.
type Select whether to check the content of messages (an option - file
email message) or files (downloaded files or email
attachments).
Option Description
Option Description
smtp SMTP.
pop3 POP3.
imap IMAP.
ftp FTP.
nntp NNTP.
Option Description
mapi MAPI.
cifs CIFS.
Option Description
file-size Match files greater than or equal to this size (KB). integer Minimum 0
value: 0
Maximum
value:
1644544 **
file-type Select the number of a DLP file pattern table to integer Minimum 0
match. value: 0
Maximum
value:
4294967295
Option Description
action Action to take with content that this DLP profile option - allow
matches.
Option Description
allow Allow the content to pass through the FortiGate and do not create a log
message.
log-only Allow the content to pass through the FortiGate, but write a log message.
quarantine-ip Quarantine all traffic from the IP address and write a log message.
expiry Quarantine duration in days, hours, minutes (format = user Not Specified 5m
dddhhmm).
This command is available for model(s): FortiGate 1000D, FortiGate 1001F, FortiGate 101F,
FortiGate 1101E, FortiGate 1801F, FortiGate 2000E, FortiGate 201E, FortiGate 201F,
FortiGate 2201E, FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D,
FortiGate 3001F, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3201F,
FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E, FortiGate 3700D,
FortiGate 3701F, FortiGate 401E, FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E, FortiGate 601E,
FortiGate 601F, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80F Bypass, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-
POE, FortiGate 81F, FortiGate 900D, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F
3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi
40F 3G4G, FortiWiFi 40F, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R,
FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000F, FortiGate 100F, FortiGate 1100E, FortiGate 140E-
POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F, FortiGate 2200E,
FortiGate 3000F, FortiGate 300E, FortiGate 3200F, FortiGate 3300E, FortiGate 3400E,
FortiGate 3500F, FortiGate 3600E, FortiGate 3700F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 4200F, FortiGate 4400F,
FortiGate 5001E, FortiGate 500E, FortiGate 600E, FortiGate 600F, FortiGate 60E DSLJ,
FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 80E-POE, FortiGate 80E,
FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL,
FortiWiFi 60E.
Option Description
config entries
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1001F, FortiGate 101F,
FortiGate 1101E, FortiGate 1801F, FortiGate 2000E, FortiGate 201E, FortiGate 201F,
FortiGate 2201E, FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D,
FortiGate 3001F, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3201F,
FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E, FortiGate 3700D,
FortiGate 3701F, FortiGate 401E, FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E, FortiGate 601E,
FortiGate 601F, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80F Bypass, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-
POE, FortiGate 81F, FortiGate 900D, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F
3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi
40F 3G4G, FortiWiFi 40F, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R,
FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000F, FortiGate 100F, FortiGate 1100E, FortiGate 140E-
POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F, FortiGate 2200E,
FortiGate 3000F, FortiGate 300E, FortiGate 3200F, FortiGate 3300E, FortiGate 3400E,
FortiGate 3500F, FortiGate 3600E, FortiGate 3700F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 4200F, FortiGate 4400F,
FortiGate 5001E, FortiGate 500E, FortiGate 600E, FortiGate 600F, FortiGate 60E DSLJ,
FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 80E-POE, FortiGate 80E,
FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL,
FortiWiFi 60E.
chunk-size Maximum fingerprint chunk size. Caution, changing integer Minimum 2800
this setting will flush the entire database. value: 100
Maximum
value: 100000
Option Description
size Maximum total size of files within the storage (MB). integer Minimum 16
value: 16
Maximum
value:
4294967295
Option Description
Option Description
allow Allow DNS requests matching the domain filter without logging.
monitor Allow DNS requests matching the domain filter with logging.
Option Description
Option Description
Option Description
Option Description
redirect-portal IPv4 address of the SDNS redirect portal. ipv4- Not 0.0.0.0
address Specified
Option Description
Option Description
Option Description
Option Description
disable Disable removal of the encrypted client hello service parameter from
supporting DNS RRs.
enable Enable removal of the encrypted client hello service parameter from
supporting DNS RRs.
youtube- Set safe search for YouTube restriction level. option - strict
restrict
Option Description
config dns-translation
Option Description
src IPv4 address or subnet on the internal ipv4- Not Specified 0.0.0.0
network to compare with the resolved address address
in DNS query replies. If the resolved address
matches, the resolved address is substituted
with dst.
dst IPv4 address or subnet on the external ipv4- Not Specified 0.0.0.0
network to substitute for the resolved address address
in DNS query replies. Can be single IP
address or subnet on the external network, but
number of addresses must equal number of
mapped IP addresses in src.
netmask If src and dst are subnets rather than single IP ipv4- Not Specified 255.255.255.255
addresses, enter the netmask for both src and netmask
dst.
Option Description
prefix If src6 and dst6 are subnets rather than single integer Minimum 128
IP addresses, enter the prefix for both src6 value: 1
and dst6. Maximum
value: 128
config ftgd-dns
Option Description
config filters
action Action to take for DNS requests matching the category. option - monitor
Option Description
monitor Allow DNS requests matching the category and log the result.
log Enable/disable DNS filter logging for this DNS profile. option - enable
Option Description
vnp-cpus CPUs enabled to run DPDK VNP engines. string Maximum all
length: 1022
vnpsp-cpus CPUs enabled to run DPDK VNP slow path. string Maximum all
length: 1022
ips-cpus CPUs enabled to run DPDK IPS engines. string Maximum all
length: 1022
isolated-cpus CPUs isolated to run only the DPDK engines with the string Maximum none
exception of processes that have affinity explicitly set by length: 1022
either a user configuration or by their implementation.
Option Description
enable Enable DPDK operation. *The minimum system requirements for DPDK is
2 vCPUs and 4GB memory.
Option Description
Option Description
Option Description
Option Description
traffic-log-only Enable per-session accounting only for VNP sessions with traffic logging
turned on in firewall policy.
enable Enable per-session accounting for all VNP sessions. *Affect performance.
Option Description
config entries
Option Description
Option Description
ip By IP address.
Option Description
Option Description
ip4-subnet IPv4 network address/subnet mask bits. ipv4- Not Specified 0.0.0.0
classnet 0.0.0.0
ip6-subnet IPv6 network address/subnet mask bits. ipv6- Not Specified ::/128
network
Option Description
config entries
Option Description
Option Description
Option Description
Option Description
Option Description
western Western.
japanese Japanese.
korean Korean.
french French.
thai Thai.
spanish Spanish.
config entries
Option Description
Option Description
Option Description
Option Description
config entries
Option Description
Option Description
ip4-subnet IPv4 network address or network address/subnet ipv4- Not Specified 0.0.0.0
mask bits. classnet 0.0.0.0
ip6-subnet IPv6 network address/subnet mask bits. ipv6- Not Specified ::/128
network
config entries
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config gmail
Option Description
config imap
Option Description
Option Description
Option Description
Option Description
tag-msg Subject text or header added to spam email. string Maximum Spam
length: 63
config mapi
Option Description
Option Description
config msn-hotmail
Option Description
config other-webmails
Option Description
config pop3
Option Description
Option Description
Option Description
tag-msg Subject text or header added to spam email. string Maximum Spam
length: 63
config smtp
Option Description
Option Description
Option Description
tag-msg Subject text or header added to spam email. string Maximum Spam
length: 63
Option Description
disable Disable SMTP email header IP checks for spamfsip, spamrbl, and spambal
filters.
enable Enable SMTP email header IP checks for spamfsip, spamrbl, and spambal
filters.
Option Description
config yahoo-mail
Option Description
Option Description
fabric-auth Allow this FortiGate unit to load the authentication page provided by EMS to
authenticate itself with EMS.
websocket Enable/disable websockets for this FortiGate unit. Override behavior using
websocket-override.
websocket- Allow this FortiGate unit to request malware hash notifications over
malware websocket.
common-tags- Can recieve tag information from New Common Tags API from EMS.
api
ztna-server-info Allow this FortiGate to send vdom's ZTNA server information to EMS.
Option Description
Option Description
https-port FortiClient EMS HTTPS access port number.. integer Minimum 443
value: 1
Maximum
value:
65535
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
send-tags-to-all- Relax restrictions on tags to send all EMS tags to all option - disable
vdoms VDOMs
Option Description
Option Description
Option Description
Option Description
Option Description
fabric-auth Allow this FortiGate unit to load the authentication page provided by EMS to
authenticate itself with EMS.
Option Description
websocket Enable/disable websockets for this FortiGate unit. Override behavior using
websocket-override.
websocket- Allow this FortiGate unit to request malware hash notifications over
malware websocket.
common-tags- Can recieve tag information from New Common Tags API from EMS.
api
ztna-server-info Allow this FortiGate to send vdom's ZTNA server information to EMS.
Option Description
Option Description
https-port FortiClient EMS HTTPS access port number.. integer Minimum 443
value: 1
Maximum
value:
65535
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
send-tags-to-all- Relax restrictions on tags to send all EMS tags to all option - disable
vdoms VDOMs
Option Description
Option Description
Option Description
Option Description
override Override global EMS table for this VDOM. option - disable
Option Description
This command is available for model(s): FortiGate 100F, FortiGate 101F, FortiGate 1100E,
FortiGate 200E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 60E-POE, FortiGate 60E,
FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 80E-POE, FortiGate 80E, FortiGate
80F Bypass, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 1101E,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1,
FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 70F, FortiGate
71F, FortiGate 800D, FortiGate 80F-POE, FortiGate 81F-POE, FortiGate 900D, FortiGate
90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL,
FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
domain-name OAM domain name. Maintenance Domain Identifier text Not Specified
(MDID).
config service
Option Description
Option Description
cos Set Class of service (CoS) bit for continuity-check integer Minimum 0
messages. range[0 - 7] value: 0
Maximum
value: 7
Option Description
None None
Hostname Hostname
Option Description
none No authentication.
pap PAP.
chap CHAP.
Option Description
Option Description
Option Description
Option Description
signal- Signal threshold. Specify the range between 50 - 100, integer Minimum 100
threshold where 50/100 means -50/-100 dBm. value: 50
Maximum
value: 100
Option Description
Option Description
generic Compatible with any SIM. Assigned if no other dataplan matches the chosen
SIM.
Option Description
bandwidth- FortiExtender LAN extension bandwidth limit (Mbps). integer Minimum 1024
limit value: 1
Maximum
value:
16776000
Option Description
Option Description
login- Set the managed extender's administrator password. password Not Specified
password
Option Description
yes Change the managed extender's administrator password. Use the login-
password option to set the password.
default Keep the managed extender's administrator password set to the factory
default.
Option Description
Option Description
FG FG-CONNECTOR model.
config cellular
config controller-report
Option Description
config sms-notification
Option Description
config alert
system- Display string when system rebooted. string Maximum system will
reboot length: 63 reboot
data- Display string when data exhausted. string Maximum data plan is
exhausted length: 63 exhausted
session- Display string when session disconnected. string Maximum LTE data
disconnect length: 63 session is
disconnected
low-signal- Display string when signal strength is low. string Maximum LTE signal
strength length: 63 strength is too
low
os-image- Display string when falling back to a previous OS string Maximum system start to
fallback image. length: 63 fallback OS
image
fgt-backup- Display string when FortiGate backup mode string Maximum FortiGate
mode-switch switched. length: 63 backup work
mode switched
config receiver
Option Description
Option Description
config modem1
Option Description
Option Description
Option Description
Option Description
Option Description
config auto-switch
Option Description
Option Description
Option Description
Option Description
config modem2
Option Description
Option Description
Option Description
Option Description
Option Description
config auto-switch
config lan-extension
Option Description
config backhaul
Option Description
Option Description
Option Description
-- NO_COUNTRY_SET
AF AFGHANISTAN
AL ALBANIA
DZ ALGERIA
AS AMERICAN SAMOA
AO ANGOLA
AR ARGENTINA
AM ARMENIA
AU AUSTRALIA
AT AUSTRIA
AZ AZERBAIJAN
BS BAHAMAS
BH BAHRAIN
BD BANGLADESH
BB BARBADOS
BY BELARUS
BE BELGIUM
BZ BELIZE
BJ BENIN
BM BERMUDA
BT BHUTAN
BO BOLIVIA
BW BOTSWANA
BR BRAZIL
BN BRUNEI DARUSSALAM
BG BULGARIA
Option Description
BF BURKINA-FASO
KH CAMBODIA
CM CAMEROON
KY CAYMAN ISLANDS
TD CHAD
CL CHILE
CN CHINA
CX CHRISTMAS ISLAND
CO COLOMBIA
CG CONGO REPUBLIC
CR COSTA RICA
HR CROATIA
CY CYPRUS
CZ CZECH REPUBLIC
DK DENMARK
DJ DJIBOUTI
DM DOMINICA
DO DOMINICAN REPUBLIC
EC ECUADOR
EG EGYPT
SV EL SALVADOR
ET ETHIOPIA
EE ESTONIA
GF FRENCH GUIANA
PF FRENCH POLYNESIA
FO FAEROE ISLANDS
FJ FIJI
Option Description
FI FINLAND
FR FRANCE
GA GABON
GE GEORGIA
GM GAMBIA
DE GERMANY
GH GHANA
GI GIBRALTAR
GR GREECE
GL GREENLAND
GD GRENADA
GP GUADELOUPE
GU GUAM
GT GUATEMALA
GY GUYANA
HT HAITI
HN HONDURAS
HK HONG KONG
HU HUNGARY
IS ICELAND
IN INDIA
ID INDONESIA
IQ IRAQ
IE IRELAND
IM ISLE OF MAN
IL ISRAEL
IT ITALY
CI COTE_D_IVOIRE
JM JAMAICA
Option Description
JO JORDAN
KZ KAZAKHSTAN
KE KENYA
KR KOREA REPUBLIC
KW KUWAIT
LA LAOS
LV LATVIA
LB LEBANON
LS LESOTHO
LR LIBERIA
LY LIBYA
LI LIECHTENSTEIN
LT LITHUANIA
LU LUXEMBOURG
MO MACAU SAR
MK MACEDONIA, FYRO
MG MADAGASCAR
MW MALAWI
MY MALAYSIA
MV MALDIVES
ML MALI
MT MALTA
MH MARSHALL ISLANDS
MQ MARTINIQUE
MR MAURITANIA
MU MAURITIUS
YT MAYOTTE
MX MEXICO
FM MICRONESIA
Option Description
MD REPUBLIC OF MOLDOVA
MC MONACO
MN MONGOLIA
MA MOROCCO
MZ MOZAMBIQUE
MM MYANMAR
NA NAMIBIA
NP NEPAL
NL NETHERLANDS
AN NETHERLANDS ANTILLES
AW ARUBA
NZ NEW ZEALAND
NI NICARAGUA
NE NIGER
NG NIGERIA
NO NORWAY
OM OMAN
PK PAKISTAN
PW PALAU
PA PANAMA
PY PARAGUAY
PE PERU
PH PHILIPPINES
PL POLAND
PT PORTUGAL
PR PUERTO RICO
QA QATAR
Option Description
RE REUNION
RO ROMANIA
RU RUSSIA
RW RWANDA
BL SAINT BARTHELEMY
LC SAINT LUCIA
MF SAINT MARTIN
SA SAUDI ARABIA
SN SENEGAL
RS REPUBLIC OF SERBIA
ME MONTENEGRO
SL SIERRA LEONE
SG SINGAPORE
SK SLOVAKIA
SI SLOVENIA
SO SOMALIA
ZA SOUTH AFRICA
ES SPAIN
LK SRI LANKA
SR SURINAME
SZ SWAZILAND
SE SWEDEN
CH SWITZERLAND
TW TAIWAN
TZ TANZANIA
TH THAILAND
Option Description
TG TOGO
TN TUNISIA
TR TURKEY
TM TURKMENISTAN
UG UGANDA
UA UKRAINE
GB UNITED KINGDOM
US UNITED STATES2
UY URUGUAY
UZ UZBEKISTAN
VU VANUATU
VE VENEZUELA
VN VIET NAM
VI VIRGIN ISLANDS
YE YEMEN
ZM ZAMBIA
ZW ZIMBABWE
JP JAPAN14
CA CANADA2
config radio-1
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
CH1 Channel 1
CH2 Channel 2
CH3 Channel 3
CH4 Channel 4
CH5 Channel 5
CH6 Channel 6
CH7 Channel 7
CH8 Channel 8
CH9 Channel 9
CH10 Channel 10
CH11 Channel 11
Option Description
Option Description
Option Description
Option Description
lan-ext-vap Wi-Fi LAN-Extention VAP. Select only one VAP. string Maximum
length: 31
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
CH36 Channel 36
CH40 Channel 40
CH44 Channel 44
CH48 Channel 48
CH52 Channel 52
CH56 Channel 56
CH60 Channel 60
CH64 Channel 64
Option Description
Option Description
Option Description
Option Description
Option Description
lan-ext-vap Wi-Fi LAN-Extention VAP. Select only one VAP. string Maximum
length: 31
Option Description
Option Description
bss-color- Wi-Fi 802.11AX bss color partial enable / disable, option - enable
partial default = enable.
Option Description
Option Description
Option Description
Option Description
target-wake- Wi-Fi 802.11AX target wake time enable / disable, option - enable
time default = enable.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
yes Change the managed extender's administrator password. Use the login-
password option to set the password.
default Keep the managed extender's administrator password set to the factory
default.
Option Description
Option Description
Option Description
disable Use the the WTP profile login-password (administrator password) setting.
config wan-extension
Option Description
config lan-extension
backhaul-ip IPsec phase1 IPv4/FQDN. Used to specify the external string Maximum
IP/FQDN when the FortiGate unit is behind a NAT length: 63
device.
Option Description
Option Description
Option Description
Option Description
Option Description
config rules
Option Description
Option Description
Option Description
direction Traffic direction (HTTP, FTP, SSH, CIFS, and MAPI option - any
only).
Option Description
any Match files transmitted in the session's originating and reply directions.
Option Description
Option Description
config anomaly
Option Description
Option Description
Option Description
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
auth-ca Name of the SSH server public key authentication CA. string Maximum
length: 79
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
yes Critical option, server refuses to authorize if it cannnot recognize the critical
option.
Option Description
Option Description
Option Description
enable add dns entry for all vhosts used by access proxy.
disable Do not add dns entry for all vhosts used by access proxy.
Option Description
Option Description
Option Description
Option Description
Option Description
svr-pool-ttl Time-to-live in the server pool for idle connections to integer Minimum 15
servers. value: 0
Maximum
value:
2147483647
Option Description
config api-gateway
Option Description
http HTTP.
https HTTPS.
tcp-forwarding TCP-FORWARDING.
samlsp SAML-SP.
web-portal VPN-SSL-WEB-PORTAL.
saas SAAS.
Option Description
Option Description
Option Description
Option Description
persistence Configure how to make sure that clients connect to option - none
the same server every time they make a request
that is part of the same session.
Option Description
none None.
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Domain that HTTP cookie persistence should apply string Maximum
domain to. length: 35
http-cookie- Limit HTTP cookie persistence to the specified path. string Maximum
path length: 35
http-cookie-age Time in minutes that client web browsers should integer Minimum 60
keep a cookie. Default is 60 minutes. 0 = no time value: 0
limit. Maximum
value: 525600
Option Description
same-ip Allow HTTP cookie to match any API Gateway with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
Option Description
Option Description
ssl-algorithm Permitted encryption algorithms for the server side option - high
of SSL full mode sessions according to encryption
strength.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
Option Description
config quic
Option Description
Option Description
config realservers
Option Description
port Port for communicating with the real server. integer Minimum 443
value: 1
Maximum
value: 65535
mappedport Port for communicating with the real server. user Not Specified
status Set the status of the real server to active so that it option - active
can accept traffic, or on standby or disabled so no
traffic is sent.
Option Description
Option Description
ssh SSH.
Option Description
enable Enable use of external browser as user-agent for SAML user authentication.
disable Disable use of external browser as user-agent for SAML user authentication.
Option Description
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
Option Description
health-check- Protocol of the health check monitor to use when option - ping
proto polling to determine server's connectivity status.
Option Description
tcp-connect Use a full TCP connection to test the link with the server.
Option Description
Option Description
ssh-host-key- Enable/disable SSH real server host key validation. option - disable
validation
Option Description
config ssl-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - tls-1.0 tls-
with. 1.1 tls-1.2
tls-1.3
Option Description
Option Description
http HTTP.
https HTTPS.
tcp-forwarding TCP-FORWARDING.
samlsp SAML-SP.
web-portal VPN-SSL-WEB-PORTAL.
saas SAAS.
Option Description
Option Description
Option Description
Option Description
persistence Configure how to make sure that clients connect to option - none
the same server every time they make a request
that is part of the same session.
Option Description
none None.
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Domain that HTTP cookie persistence should apply string Maximum
domain to. length: 35
http-cookie- Limit HTTP cookie persistence to the specified path. string Maximum
path length: 35
http-cookie-age Time in minutes that client web browsers should integer Minimum 60
keep a cookie. Default is 60 minutes. 0 = no time value: 0
limit. Maximum
value: 525600
Option Description
same-ip Allow HTTP cookie to match any API Gateway with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
Option Description
Option Description
Option Description
ssl-algorithm Permitted encryption algorithms for the server side option - high
of SSL full mode sessions according to encryption
strength.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
Option Description
config realservers
port Port for communicating with the real server. integer Minimum 443
value: 1
Maximum
value: 65535
mappedport Port for communicating with the real server. user Not Specified
status Set the status of the real server to active so that it option - active
can accept traffic, or on standby or disabled so no
traffic is sent.
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
health-check- Protocol of the health check monitor to use when option - ping
proto polling to determine server's connectivity status.
ssh-host-key- Enable/disable SSH real server host key validation. option - disable
validation
config ssl-cipher-suites
versions SSL/TLS versions that the cipher suite can be used option - tls-1.0 tls-
with. 1.1 tls-1.2
tls-1.3
Option Description
enable add dns entry for all vhosts used by access proxy.
disable Do not add dns entry for all vhosts used by access proxy.
Option Description
Option Description
Option Description
Option Description
Option Description
svr-pool-ttl Time-to-live in the server pool for idle connections to integer Minimum 15
servers. value: 0
Maximum
value:
2147483647
Option Description
config api-gateway
Option Description
http HTTP.
https HTTPS.
tcp-forwarding TCP-FORWARDING.
samlsp SAML-SP.
Option Description
web-portal VPN-SSL-WEB-PORTAL.
saas SAAS.
Option Description
Option Description
Option Description
Option Description
persistence Configure how to make sure that clients connect to option - none
the same server every time they make a request
that is part of the same session.
Option Description
none None.
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Domain that HTTP cookie persistence should apply string Maximum
domain to. length: 35
http-cookie- Limit HTTP cookie persistence to the specified path. string Maximum
path length: 35
http-cookie-age Time in minutes that client web browsers should integer Minimum 60
keep a cookie. Default is 60 minutes. 0 = no time value: 0
limit. Maximum
value: 525600
Option Description
same-ip Allow HTTP cookie to match any API Gateway with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
Option Description
Option Description
ssl-algorithm Permitted encryption algorithms for the server side option - high
of SSL full mode sessions according to encryption
strength.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
Option Description
Option Description
config quic
Option Description
Option Description
config realservers
Option Description
port Port for communicating with the real server. integer Minimum 443
value: 1
Maximum
value: 65535
mappedport Port for communicating with the real server. user Not Specified
status Set the status of the real server to active so that it option - active
can accept traffic, or on standby or disabled so no
traffic is sent.
Option Description
Option Description
ssh SSH.
Option Description
enable Enable use of external browser as user-agent for SAML user authentication.
disable Disable use of external browser as user-agent for SAML user authentication.
Option Description
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
Option Description
health-check- Protocol of the health check monitor to use when option - ping
proto polling to determine server's connectivity status.
Option Description
tcp-connect Use a full TCP connection to test the link with the server.
Option Description
Option Description
ssh-host-key- Enable/disable SSH real server host key validation. option - disable
validation
Option Description
config ssl-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - tls-1.0 tls-
with. 1.1 tls-1.2
tls-1.3
Option Description
config api-gateway6
Option Description
http HTTP.
https HTTPS.
tcp-forwarding TCP-FORWARDING.
samlsp SAML-SP.
web-portal VPN-SSL-WEB-PORTAL.
saas SAAS.
Option Description
Option Description
Option Description
Option Description
persistence Configure how to make sure that clients connect to option - none
the same server every time they make a request
that is part of the same session.
Option Description
none None.
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Domain that HTTP cookie persistence should apply string Maximum
domain to. length: 35
http-cookie- Limit HTTP cookie persistence to the specified path. string Maximum
path length: 35
http-cookie-age Time in minutes that client web browsers should integer Minimum 60
keep a cookie. Default is 60 minutes. 0 = no time value: 0
limit. Maximum
value: 525600
Option Description
same-ip Allow HTTP cookie to match any API Gateway with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
Option Description
Option Description
ssl-algorithm Permitted encryption algorithms for the server side option - high
of SSL full mode sessions according to encryption
strength.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
Option Description
config quic
config realservers
port Port for communicating with the real server. integer Minimum 443
value: 1
Maximum
value: 65535
mappedport Port for communicating with the real server. user Not Specified
status Set the status of the real server to active so that it option - active
can accept traffic, or on standby or disabled so no
traffic is sent.
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
health-check- Protocol of the health check monitor to use when option - ping
proto polling to determine server's connectivity status.
ssh-host-key- Enable/disable SSH real server host key validation. option - disable
validation
config ssl-cipher-suites
versions SSL/TLS versions that the cipher suite can be used option - tls-1.0 tls-
with. 1.1 tls-1.2
tls-1.3
This command is available for model(s): FortiGate 1000F, FortiGate 1001F, FortiGate 100F,
FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200F, FortiGate 201F,
FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F, FortiGate 2601F,
FortiGate 3000D, FortiGate 3000F, FortiGate 3001F, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3200F, FortiGate 3201F, FortiGate 3300E,
FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3500F, FortiGate 3501F,
FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3700F, FortiGate 3701F,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F,
FortiGate 401E, FortiGate 401F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F.
It is not available for: FortiGate 1000D, FortiGate 200E, FortiGate 201E, FortiGate 40F 3G4G,
FortiGate 40F, FortiGate 5001E1, FortiGate 5001E, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate
81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
Option Description
Option Description
This command is available for model(s): FortiGate 1000F, FortiGate 1001F, FortiGate 100F,
FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200F, FortiGate 201F,
FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F, FortiGate 2601F,
FortiGate 3000D, FortiGate 3000F, FortiGate 3001F, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3200F, FortiGate 3201F, FortiGate 3300E,
FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3500F, FortiGate 3501F,
FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3700F, FortiGate 3701F,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F,
FortiGate 401E, FortiGate 401F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F.
It is not available for: FortiGate 1000D, FortiGate 200E, FortiGate 201E, FortiGate 40F 3G4G,
FortiGate 40F, FortiGate 5001E1, FortiGate 5001E, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate
81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
Option Description
Option Description
Option Description
Option Description
unknown UNKNOWN.
healthy HEALTHY.
quarantine QUARANTINE.
checkup CHECKUP.
transient TRANSIENT.
infected INFECTED.
end-ip Final IP address (inclusive) in the range for the ipv4- Not Specified 0.0.0.0
address. address-
any
Option Description
Option Description
Option Description
ip IP address.
Option Description
start-ip First IP address (inclusive) in the range for the ipv4- Not Specified 0.0.0.0
address. address-
any
Option Description
subnet IP address and subnet mask of address. ipv4- Not Specified 0.0.0.0 0.0.0.0
classnet-
any
Option Description
wildcard IP address and wildcard netmask. ipv4- Not Specified 0.0.0.0 0.0.0.0
classnet-
any
config list
Option Description
config subnet-segment
Option Description
config values
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
end-ip Final IP address (inclusive) in the range for the ipv6- Not Specified ::
address (format: address
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx).
Option Description
Option Description
any Wildcard.
start-ip First IP address (inclusive) in the range for the ipv6- Not Specified ::
address (format: address
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx).
Option Description
template Template.
config subnet-segment
Option Description
any Wildcard.
config tagging
allow-routing Enable/disable use of this group in the static route option - disable
configuration.
Option Description
Option Description
Option Description
Option Description
Option Description
default Default address group type (address may belong to multiple groups).
folder Address folder group (members may not belong to any other group).
config tagging
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
Option Description
Option Description
identity- Name of the identity-based route that applies to this string Maximum
based-route portal. length: 35
Option Description
Option Description
Option Description
Option Description
orig-port Original TCP port (1 to 65535, 0 means any user Not Specified
port).
Option Description
enable Use the original source port if it has not been used.
Option Description
Option Description
dstmac Set destination MAC address for mirrored traffic. mac- Not ff:ff:ff:ff:ff:ff
address Specified
Option Description
Option Description
dst IPv4 address or subnet on the external ipv4- Not Specified 0.0.0.0
network to substitute for the resolved address address
in DNS query replies. Can be single IP
address or subnet on the external network, but
number of addresses must equal number of
mapped IP addresses in src.
netmask If src and dst are subnets rather than single IP ipv4- Not Specified 255.255.255.255
addresses, enter the netmask for both src and netmask
dst.
src IPv4 address or subnet on the internal ipv4- Not Specified 0.0.0.0
network to compare with the resolved address address
in DNS query replies. If the resolved address
matches, the resolved address is substituted
with dst.
Option Description
config rule
gateway IPv4 address of the gateway (Format: xxx.xxx.xxx.xxx ipv4- Not Specified 0.0.0.0
, Default: 0.0.0.0). address
groups Select one or more group(s) from available groups string Maximum
<name> that are allowed to use this route. Separate group length: 79
names with a space.
Group name.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config entry
Option Description
protocol Integer value for the protocol type as defined by IANA. integer Minimum 0
value: 0
Maximum
value: 255
end-port Integer value for ending TCP/UDP/SCTP destination integer Minimum 65535
port in range (0 to 65535). value: 0
Maximum
value: 65535
Option Description
config entry
Option Description
protocol Integer value for the protocol type as defined by IANA. integer Minimum 0
value: 0
Maximum
value: 255
config port-range
end-port Integer value for ending TCP/UDP/SCTP destination integer Minimum 65535
port in range (0 to 65535). value: 0
Maximum
value: 65535
protocol Integer value for the protocol type as defined by IANA. integer Minimum 0
value: 0
Maximum
value: 255
config port-range
config disable-entry
Option Description
protocol Integer value for the protocol type as defined by IANA. integer Minimum 0
value: 0
Maximum
value: 255
config port-range
end-port Integer value for ending TCP/UDP/SCTP destination integer Minimum 65535
port in range (0 to 65535). value: 0
Maximum
value: 65535
config ip6-range
config entry
Option Description
protocol Integer value for the protocol type as defined by IANA. integer Minimum 0
value: 0
Maximum
value: 255
config port-range
end-port Integer value for ending TCP/UDP/SCTP destination integer Minimum 65535
port in range (0 to 65535). value: 0
Maximum
value: 65535
direction How this service may be used (source, destination or option - both
both).
Option Description
Option Description
database Database name this Internet Service belongs to. option - isdb
Option Description
direction How this service may be used in a firewall policy option - both
(source, destination or both).
Option Description
obsolete Indicates whether the Internet Service can be used. integer Minimum 0
value: 0
Maximum
value: 255
map-startip Address to be used as the starting point for translation ipv4- Not Specified 0.0.0.0
in the range. address-
any
Option Description
SCTP SCTP
Option Description
enable Enable IP/MAC binding for packets that would normally go through the
firewall.
disable Disable IP/MAC binding for packets that would normally go through the
firewall.
Option Description
enable Enable IP/MAC binding for packets that would normally go to the firewall.
disable Disable IP/MAC binding for packets that would normally go to the firewall.
Option Description
allow Allow packets from MAC addresses not in the IP/MAC list.
block Block packets from MAC addresses not in the IP/MAC list.
ip IPv4 address portion of the pair (format: ipv4- Not Specified 0.0.0.0
xxx.xxx.xxx.xxx). address
mac MAC address portion of the pair (format = mac- Not Specified 00:00:00:00:00:00
xx:xx:xx:xx:xx:xx in hexadecimal). address
Option Description
Option Description
arp-intf Select an interface from available options that will reply string Maximum
to ARP requests. (If blank, any is selected). length: 15
Option Description
Option Description
Option Description
Option Description
endip Final IPv4 address (inclusive) in the range for the ipv4- Not 0.0.0.0
address pool (format xxx.xxx.xxx.xxx, Default: 0.0.0.0). address- Specified
any
endport Final port number (inclusive) in the range for the integer Minimum 65533
address pool (Default: 65533). value: 5117
Maximum
value:
65533
Option Description
num-blocks- Number of addresses blocks that can be used by a user. integer Minimum 8
per-user value: 1
Maximum
value: 128
Option Description
source-endip Final IPv4 address (inclusive) in the range of the source ipv4- Not 0.0.0.0
addresses to be translated (format xxx.xxx.xxx.xxx, address- Specified
Default: 0.0.0.0). any
startip First IPv4 address (inclusive) in the range for the ipv4- Not 0.0.0.0
address pool (format xxx.xxx.xxx.xxx, Default: 0.0.0.0). address- Specified
any
startport First port number (inclusive) in the range for the address integer Minimum 5117
pool (Default: 5117). value: 5117
Maximum
value:
65533
Option Description
disable Do not include the subnetwork address and broadcast IP address in the
NAT64 IP pool.
enable Include the subnetwork address and broadcast IP address in the NAT64 IP
pool.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
dns-protocol Select the protocol used by the DNS health check option - udp
monitor to check the health of the server (UDP | TCP).
Option Description
udp UDP.
tcp TCP.
dns-request- Fully qualified domain name to resolve for the DNS string Maximum
domain probe. length: 255
http-get URL used to send a GET request to check the health of string Maximum
an HTTP server. length: 255
port Service port used to perform the health check. If 0, integer Minimum 0
health check monitor inherits port configured for the value: 0
server. Maximum
value:
65535
retry Number health check attempts before the server is integer Minimum 3
considered down. value: 1
Maximum
value: 255
timeout Time to wait to receive response to a health check from integer Minimum 2
a server. Reaching the timeout means the health check value: 1
failed. Maximum
value: 255
type Select the Monitor type used by the health check option -
monitor to check the health of the server (PING | TCP |
HTTP | HTTPS | DNS).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
intf <name> Incoming interface name from available options. string Maximum
Address name. length: 79
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
intf <name> Incoming interface name from available options. string Maximum
Address name. length: 79
Option Description
Option Description
Option Description
Option Description
associated- Interface associated with the address object. When string Maximum
interface setting up a policy, only addresses associated with length: 35
this interface are available.
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
end-ip Final IPv4 address (inclusive) in the range for the ipv4- Not 0.0.0.0
address. address- Specified
any
start-ip First IPv4 address (inclusive) in the range for the ipv4- Not 0.0.0.0
address. address- Specified
any
Option Description
Option Description
Option Description
dnat IPv4 DNAT address used for multicast ipv4- Not Specified 0.0.0.0
destination addresses. address-
any
Option Description
protocol Integer value for the protocol type as defined by integer Minimum 0
IANA. value: 0
Maximum
value: 255
Option Description
snat-ip IPv4 address to be used as the source address ipv4- Not Specified 0.0.0.0
for NATed traffic. address
Option Description
Option Description
Option Description
accept Accept.
deny Deny.
Option Description
Option Description
protocol Integer value for the protocol type as defined by integer Minimum 0
IANA. value: 0
Maximum
value: 255
Option Description
Option Description
advanced-filter Advanced freeform filter that will be used over existing var-string Maximum
filter settings if set. Can only be used by super admin. length: 255
hosts <host> IPv4 or IPv6 hosts to filter in this traffic sniffer. string Maximum
IPv4 or IPv6 host. length: 255
interface Interface name that on-demand packet sniffer will take string Maximum
place. length: 35
Option Description
ports <port> Ports to filter for in this traffic sniffer. integer Minimum
Port to filter in this traffic sniffer. value: 1
Maximum
value:
65536
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable TCP NPU session delay in order to guarantee packet order of 3-way
handshake.
disable Disable TCP NPU session delay in order to guarantee packet order of 3-way
handshake.
Option Description
Option Description
Option Description
Option Description
Option Description
dstaddr <name> Destination IPv4 address and address group string Maximum
names. length: 79
Address name.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
check-all Flush all current sessions accepted by this policy. These sessions must be
started and re-matched with policies.
Option Description
Option Description
Option Description
physical-location Match geography address to its physical location using the geography IP
database.
registered- Match geography address to its registered location using the geography IP
location database.
groups <name> Names of user groups that can authenticate string Maximum
with this policy. length: 79
Group name.
Option Description
inbound Policy-based IPsec VPN: only traffic from the option - disable
remote network can initiate a VPN.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
match-vip Enable to match packets that have had their option - enable
destination addresses changed by a VIP.
Option Description
Option Description
enable Enable matching of only those packets that have had their destination
addresses changed by a VIP.
disable Disable matching of only those packets that have had their destination
addresses changed by a VIP.
Option Description
Option Description
Option Description
Option Description
natip Policy-based IPsec VPN: source NAT IP ipv4- Not Specified 0.0.0.0 0.0.0.0
address for outgoing traffic. classnet
Option Description
Option Description
Option Description
Option Description
outbound Policy-based IPsec VPN: only traffic from the option - enable
internal network can initiate a VPN.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
policy-expiry- Policy expiry date and time, in epoch format. user Not Specified
date-utc
Option Description
enable Use the original source port if it has not been used.
Option Description
Option Description
redirect-url URL users are directed to after seeing and var-string Maximum
accepting the disclaimer or authenticating. length: 1023
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
session-ttl TTL in seconds for sessions accepted by this user Not Specified
policy.
Option Description
srcaddr <name> Source IPv4 address and address group string Maximum
names. length: 79
Address name.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
tos ToS (Type of Service) value used for user Not Specified
comparison.
tos-mask Non-zero bit positions are used for user Not Specified
comparison while zero bit positions are
ignored.
Option Description
Option Description
vlan-cos-fwd VLAN forward direction user priority: 255 integer Minimum 255
passthrough, 0 lowest, 7 highest. value: 0
Maximum
value: 7
vlan-cos-rev VLAN reverse direction user priority: 255 integer Minimum 255
passthrough, 0 lowest, 7 highest. value: 0
Maximum
value: 7
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config cifs
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
(MB). value: 1
Maximum
value: 1606
**
Option Description
tcp-window-type TCP window type to use for this protocol. option - auto-tuning
Option Description
system Use system default TCP window size for this protocol.
dynamic Vary TCP window size based on available memory and within limits of tcp-
window-minimum and tcp-window-maximum.
Option Description
config server-keytab
keytab Base64 encoded keytab file containing credential of the string Maximum
server. length: 8191
config dns
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
config ftp
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
(MB). value: 1
Maximum
value: 1606 **
Option Description
tcp-window-type TCP window type to use for this protocol. option - auto-tuning
Option Description
system Use system default TCP window size for this protocol.
dynamic Vary TCP window size based on available memory and within limits of tcp-
window-minimum and tcp-window-maximum.
Option Description
Option Description
config http
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
Option Description
enable Enable range header blocking (treat all partial file downloads as full file
download)
Option Description
Option Description
Option Description
Option Description
unknown-http- How to handle HTTP sessions that do not comply option - reject
version with HTTP 0.9, 1.0, or 1.1.
Option Description
reject Reject or tear down HTTP sessions that do not use HTTP 0.9, 1.0, or 1.1.
tunnel Pass HTTP traffic that does not use HTTP 0.9, 1.0, or 1.1 without applying
HTTP protocol optimization, byte-caching, or web caching. TCP protocol
optimization is applied.
best-effort Assume all HTTP sessions comply with HTTP 0.9, 1.0, or 1.1. If a session
uses a different HTTP version, it may not parse correctly and the
connection may be lost.
Option Description
enable Pass non-HTTP sessions through the tunnel without applying protocol
optimization, byte-caching, or web caching. TCP protocol optimization is
applied.
Option Description
enable Allow h2c HTTP connection upgrades. h2c tunnels do not support content
scan.
unknown-content- Configure the action the FortiGate unit will take on option - block
encoding unknown content-encoding.
Option Description
Option Description
Option Description
Option Description
block-page- Code number returned for blocked HTTP pages. integer Minimum 403
status-code value: 100
Maximum
value: 599
tcp-window-type TCP window type to use for this protocol. option - auto-tuning
Option Description
system Use system default TCP window size for this protocol.
dynamic Vary TCP window size based on available memory and within limits of tcp-
window-minimum and tcp-window-maximum.
Option Description
Option Description
config imap
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
(MB). value: 1
Maximum
value: 1606
**
Option Description
Option Description
config mail-signature
Option Description
signature Email signature to be added to outgoing email (if the string Maximum
signature contains spaces, enclose with quotation length: 1023
marks).
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
(MB). value: 1
Maximum
value: 1606
**
Option Description
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
(MB). value: 1
Maximum
value: 1606
**
Option Description
config pop3
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
(MB). value: 1
Maximum
value: 1606
**
Option Description
Option Description
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
(MB). value: 1
Maximum
value: 1606
**
Option Description
server-busy Enable/disable SMTP server busy when server not option - disable
available.
Option Description
Option Description
config ssh
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned integer Minimum 10
(MB). value: 1
Maximum
value: 1606 **
Option Description
tcp-window-type TCP window type to use for this protocol. option - auto-tuning
Option Description
Option Description
system Use system default TCP window size for this protocol.
dynamic Vary TCP window size based on available memory and within limits of tcp-
window-minimum and tcp-window-maximum.
Option Description
Option Description
color Integer value to determine the color of the icon integer Minimum 0
in the GUI. value: 0
Maximum
value: 32
Option Description
query Match the query part of the URL as a regular string Maximum
expression. length: 255
Option Description
Option Description
Option Description
config header-group
Option Description
config tagging
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
Option Description
config tagging
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
redirect-url Redirect URL for further explicit web proxy var-string Maximum
processing. length: 1023
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
end Schedule end date and time, format hh:mm user Not
yyyy/mm/dd. Specified
end-utc Schedule end date and time, in epoch format. user Not
Specified
expiration- Write an event log message this many days before the integer Minimum 3
days schedule expires. value: 0
Maximum
value: 100
Option Description
start Schedule start date and time, format hh:mm user Not
yyyy/mm/dd. Specified
start-utc Schedule start date and time, in epoch format. user Not
Specified
day One or more days of the week on which the schedule is option - none
valid. Separate the names of the days with a space.
Option Description
sunday Sunday.
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
thursday Thursday.
friday Friday.
saturday Saturday.
none None.
end Time of day to end the schedule, format hh:mm. user Not
Specified
Option Description
start Time of day to start the schedule, format hh:mm. user Not
Specified
Option Description
Option Description
Option Description
Option Description
groups Names of user groups that can authenticate with string Maximum
<name> this policy. length: 79
User group name.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
learning- Enable to allow everything, but log all of the option - disable
mode meaningful data for security information
gathering. A learning report will be generated.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
srcaddr Source IPv4 address name and address group string Maximum
<name> names. length: 79
Address name.
Option Description
srcaddr6 Source IPv6 address name and address group string Maximum
<name> names. length: 79
Address name.
Option Description
Option Description
users <name> Names of individual users that can authenticate string Maximum
with this policy. length: 79
User name.
Option Description
Option Description
Option Description
Option Description
Option Description
ftp FTP.
tftp TFTP.
ras RAS.
h323 H323.
tns TNS.
mms MMS.
sip SIP.
pptp PPTP.
rtsp RTSP.
pmap PMAP.
rsh RSH.
dcerpc DCERPC.
mgcp MGCP.
iprange Start and end of the IP range associated with user Not Specified
service.
Option Description
ICMP ICMP.
ICMP6 ICMP6.
IP IP.
Option Description
tcp-halfclose- Wait time to close a TCP session waiting for an integer Minimum 0
timer unanswered FIN packet. value: 0
Maximum
value: 86400
tcp-halfopen- Wait time to close a TCP session waiting for an integer Minimum 0
timer unanswered open session packet. value: 0
Maximum
value: 86400
tcp-rst-timer Set the length of the TCP CLOSE state in integer Minimum 0
seconds. value: 5
Maximum
value: 300
tcp-timewait- Set the length of the TCP TIME-WAIT state in integer Minimum 0
timer seconds. value: 0
Maximum
value: 300
Option Description
Option Description
bandwidth-unit Unit of measurement for maximum bandwidth for this option - kbps
shaper (Kbps, Mbps or Gbps).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
exceed- Exceed bandwidth used for DSCP/VLAN CoS multi- integer Minimum 0
bandwidth stage marking. Units depend on the bandwidth-unit value: 0
setting. Maximum
value:
80000000 **
exceed-cos VLAN CoS mark for traffic in [guaranteed-bandwidth, user Not Specified
exceed-bandwidth].
exceed-dscp DSCP mark for traffic in guaranteed-bandwidth and user Not Specified
exceed-bandwidth.
maximum-cos VLAN CoS mark for traffic in [exceed-bandwidth, user Not Specified
maximum-bandwidth].
maximum- DSCP mark for traffic in exceed-bandwidth and user Not Specified
dscp maximum-bandwidth.
Option Description
Option Description
Option Description
application IDs of one or more applications that this shaper integer Minimum
<id> applies application control traffic shaping to. value: 0
Application IDs. Maximum
value:
4294967295
Option Description
Option Description
diffservcode- Change packet's reverse (reply) DiffServ to this user Not Specified
rev value.
groups Apply this traffic shaping policy to user groups string Maximum
<name> that have authenticated with the FortiGate. length: 79
Group name.
Option Description
Option Description
Option Description
Option Description
per-ip-shaper Per-IP traffic shaper to apply with this policy. string Maximum
length: 35
Option Description
tos ToS (Type of Service) value used for user Not Specified
comparison.
tos-mask Non-zero bit positions are used for comparison user Not Specified
while zero bit positions are ignored.
Option Description
Option Description
users <name> Apply this traffic shaping policy to individual string Maximum
users that have authenticated with the length: 79
FortiGate.
User name.
Option Description
config shaping-entries
Option Description
Option Description
limit Hard limit on the real queue size in packets. integer Minimum 1000
value: 5
Maximum
value: 10000
cburst-in- Number of bytes that can be burst as fast as the integer Minimum 0
msec interface can transmit. Formula: cburst = maximum- value: 0
bandwidth*cburst-in-msec. Maximum
value: 2000
min Average queue size in packets at which RED drop integer Minimum 83
becomes a possibility. value: 3
Maximum
value: 3000
max Average queue size in packets at which RED drop integer Minimum 250
probability is maximal. value: 3
Maximum
value: 3000
Configure sniffer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
interface Interface name that traffic sniffing will take place string Maximum
on. length: 35
Option Description
Option Description
Option Description
Option Description
logtraffic Either log all sessions, only sessions that have a option - utm
security profile applied, or disable all logging for
this policy.
Option Description
Option Description
protocol Integer value for the protocol type as defined by string Maximum
IANA. length: 63
Option Description
Option Description
config anomaly
Option Description
Option Description
Option Description
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
Option Description
status Set the trust status of the public key. option - trusted
Option Description
Option Description
Option Description
private-key SSH proxy private key, encrypted with a password. user Not
Specified
Option Description
private-key SSH proxy private key, encrypted with a password. user Not
Specified
Option Description
Option Description
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
ssl-cert List of certificate names to use for SSL connections to string Maximum
<name> this server. (default = "Fortinet_SSL"). length: 79
Certificate list.
Option Description
secure Reject any SSL connection that does not offer a RFC 5746 Secure
Renegotiation Indication.
Option Description
Option Description
Option Description
ssl-mode SSL/TLS mode for encryption and decryption of traffic. option - full
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
http1-1 Enable all ALPN including HTTP1.1 except HTTP2 and SPDY.
http2 Enable all ALPN including HTTP2 except HTTP1.1 and SPDY.
use-ssl-server Enable/disable the use of SSL server table for SSL option - disable
offloading.
Option Description
config dot
Option Description
disable Disable.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
config ftps
Option Description
disable Disable.
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
Option Description
disable Disable.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
allow Bypass the session when unable to retrieve server's certificate for
inspection.
block Block the session when unable to retrieve server's certificate for inspection.
Option Description
Option Description
config imaps
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
config smtps
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
disable Disable.
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
Option Description
Option Description
high-encryption Allow only AES-CTR, AES-GCM ciphers and high encryption algorithms.
config ssl
Option Description
disable Disable.
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
allow Bypass the session when unable to retrieve server's certificate for
inspection.
block Block the session when unable to retrieve server's certificate for inspection.
Option Description
Option Description
Option Description
config ssl-exempt
Option Description
https-client- Action based on received client certificate during the option - bypass
certificate HTTPS handshake.
Option Description
smtps-client- Action based on received client certificate during the option - bypass
certificate SMTPS handshake.
Option Description
pop3s-client- Action based on received client certificate during the option - bypass
certificate POP3S handshake.
Option Description
imaps-client- Action based on received client certificate during the option - bypass
certificate IMAPS handshake.
Option Description
ftps-client- Action based on received client certificate during the option - bypass
certificate FTPS handshake.
Option Description
Option Description
Option Description
cert-cache- Maximum capacity of the host certificate cache. integer Minimum 200
capacity value: 0
Maximum
value: 500
kxp-queue- Maximum length of the CP KXP queue. When the integer Minimum 16
threshold * queue becomes full, the proxy switches cipher functions value: 0
to the main CPU. Maximum
value: 512
no-matching- Bypass or drop the connection when no matching cipher option - bypass
cipher-action is found.
Option Description
Option Description
Option Description
ssl-queue- Maximum length of the CP SSL queue. When the queue integer Minimum 32
threshold * becomes full, the proxy switches cipher functions to the value: 0
main CPU. Maximum
value: 512
Option Description
Option Description
Option Description
ttl Value/range to match against the packet's Time to user Not Specified
Live value.
Option Description
Option Description
extport Incoming port number range that you want to user Not Specified
map to a port number range on the
destination network.
Option Description
Option Description
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-
cooke-domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
Option Description
same-ip Allow HTTP cookie to match any virtual server with same IP.
Option Description
Option Description
Option Description
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
ipv6-mappedport IPv6 port number range on the destination user Not Specified
network to which the external port number
range is mapped.
Option Description
monitor <name> Name of the health check monitor to use string Maximum
when polling to determine a virtual server's length: 79
connectivity status.
Health monitor name.
Option Description
disable Force only the source NAT mapped IP to the external IP for traffic
egressing the external interface of the VIP.
enable Force the source NAT mapped IP to the external IP for all traffic.
Option Description
Option Description
Option Description
Option Description
Option Description
none None.
Option Description
Option Description
Option Description
tcp TCP.
udp UDP.
sctp SCTP.
icmp ICMP.
Option Description
http HTTP.
https HTTPS.
imaps IMAPS.
pop3s POP3S.
smtps SMTPS.
ssl SSL.
tcp TCP.
udp UDP.
ip IP.
Option Description
enable Match only destinations in 'src-filter' for the reverse SNAT rule.
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
custom Custom encryption. Use config ssl-cipher-suites to select the cipher suites
that are allowed.
Option Description
disable Disable.
enable Enable.
Option Description
secure Abort any client initiated SSL re-negotiation attempt that does not use RFC
5746 Secure Renegotiation.
ssl-client- How to expire SSL sessions for the segment option - both
session-state- of the SSL connection between the client and
type the FortiGate.
Option Description
both Expire session states based on time or count, whichever occurs first.
Option Description
Option Description
ssl-hpkp-age Number of seconds the client should honor integer Minimum 5184000
the HPKP setting. value: 60
Maximum
value:
157680000
Option Description
Option Description
ssl-hsts-age Number of seconds the client should honor integer Minimum 5184000
the HSTS setting. value: 60
Maximum
value:
157680000
Option Description
Option Description
Option Description
Option Description
Option Description
ssl-mode Apply SSL offloading between the client and option - half
the FortiGate (half) or from the client to the
FortiGate and from the FortiGate to the
server (full).
Option Description
ssl-pfs Select the cipher suites that can be used for option - require
SSL perfect forward secrecy (PFS). Applies
to both client and server sessions.
Option Description
allow Allow use of any cipher suite so PFS may or may not be used depending on
the cipher suite selected.
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
client Use the same encryption algorithms for both client and server sessions.
Option Description
Option Description
Option Description
Option Description
ssl-server- How to expire SSL sessions for the segment option - both
session-state- of the SSL connection between the server
type and the FortiGate.
Option Description
both Expire session states based on time or count, whichever occurs first.
Option Description
Option Description
Option Description
disable Do not add HTTP header indicating SSL offload for WebLogic server.
enable Add HTTP header indicating SSL offload for WebLogic server.
Option Description
disable Do not add HTTP header indicating SSL offload for WebSphere server.
enable Add HTTP header indicating SSL offload for WebSphere server.
config gslb-public-ips
Option Description
Option Description
Option Description
port Port for communicating with the real server. Required integer Minimum 0
if port forwarding is enabled. value: 1
Maximum
value: 65535
status Set the status of the real server to active so that it can option - active
accept traffic, or on standby or disabled so no traffic
is sent.
Option Description
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
holddown- Time in seconds that the system waits before re- integer Minimum 300
interval activating a previously down active server in the value: 30
active-standby mode. This is to prevent any flapping Maximum
issues. value: 65535
Option Description
Option Description
monitor Name of the health check monitor to use when string Maximum
<name> polling to determine a virtual server's connectivity length: 79
status.
Health monitor name.
client-ip Only clients in this IP range can connect to this real user Not Specified
server.
config ssl-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - ssl-3.0 tls-
with. 1.0 tls-1.1
tls-1.2 tls-
1.3
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - ssl-3.0 tls-
with. 1.0 tls-1.1
tls-1.2 tls-
1.3
Option Description
Option Description
Option Description
disable Disable use of the lower 32 bits of the external IPv6 address as mapped IPv4
address.
enable Enable use of the lower 32 bits of the external IPv6 address as mapped IPv4
address.
extip IPv6 address or address range on the external user Not Specified
interface that you want to map to an address or
address range on the destination network.
extport Incoming port number range that you want to user Not Specified
map to a port number range on the destination
network.
Option Description
Option Description
Option Description
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
Option Description
same-ip Allow HTTP cookie to match any virtual server with same IP.
Option Description
Option Description
Option Description
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
ipv4- IPv4 port number range on the destination user Not Specified
mappedport network to which the external port number
range is mapped.
Option Description
least-session Sends new sessions to the server with the lowest session count.
mappedip Mapped IPv6 address range in the format user Not Specified
startIP-endIP.
mappedport Port number range on the destination network user Not Specified
to which the external port number range is
mapped.
monitor Name of the health check monitor to use when string Maximum
<name> polling to determine a virtual server's length: 79
connectivity status.
Health monitor name.
Option Description
enable Perform SNAT on traffic from mappedip to the extip for all egress interfaces.
Option Description
Option Description
Option Description
disable Disable this FortiGate unit's ability to respond to NDP requests for this virtual
IP address.
enable Enable this FortiGate unit's ability to respond to NDP requests for this virtual
IP address.
Option Description
Option Description
none None.
Option Description
Option Description
tcp TCP.
udp UDP.
sctp SCTP.
Option Description
http HTTP.
https HTTPS.
imaps IMAPS.
pop3s POP3S.
smtps SMTPS.
ssl SSL.
tcp TCP.
udp UDP.
ip IP.
Option Description
enable Match only destinations in 'src-filter' for the reverse SNAT rule.
Option Description
Option Description
custom Use config ssl-cipher-suites to select the cipher suites that are allowed.
Option Description
disable Disable.
enable Enable.
Option Description
secure Reject any SSL connection that does not offer a RFC 5746 Secure
Renegotiation Indication.
ssl-client- How to expire SSL sessions for the segment of option - both
session-state- the SSL connection between the client and the
type FortiGate.
Option Description
both Expire session states based on time or count, whichever occurs first.
Option Description
Option Description
ssl-hpkp-age Number of minutes the web browser should integer Minimum 5184000
keep HPKP. value: 60
Maximum
value:
157680000
Option Description
Option Description
ssl-hsts-age Number of seconds the client should honor the integer Minimum 5184000
HSTS setting. value: 60
Maximum
value:
157680000
Option Description
Option Description
Option Description
Option Description
Option Description
ssl-mode Apply SSL offloading between the client and option - half
the FortiGate (half) or from the client to the
FortiGate and from the FortiGate to the server
(full).
Option Description
ssl-pfs Select the cipher suites that can be used for option - require
SSL perfect forward secrecy (PFS). Applies to
both client and server sessions.
Option Description
allow Allow use of any cipher suite so PFS may or may not be used depending on
the cipher suite selected.
Option Description
Option Description
custom Use config ssl-server-cipher-suites to select the cipher suites that are
allowed.
client Use the same encryption algorithms for client and server sessions.
Option Description
Option Description
Option Description
ssl-server- How to expire SSL sessions for the segment of option - both
session-state- the SSL connection between the server and
type the FortiGate.
Option Description
both Expire session states based on time or count, whichever occurs first.
Option Description
Option Description
disable Do not add HTTP header indicating SSL offload for WebLogic server.
enable Add HTTP header indicating SSL offload for WebLogic server.
Option Description
disable Do not add HTTP header indicating SSL offload for WebSphere server.
enable Add HTTP header indicating SSL offload for WebSphere server.
Option Description
Option Description
port Port for communicating with the real server. Required integer Minimum 0
if port forwarding is enabled. value: 1
Maximum
value: 65535
status Set the status of the real server to active so that it can option - active
accept traffic, or on standby or disabled so no traffic
is sent.
Option Description
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
holddown- Time in seconds that the system waits before re- integer Minimum 300
interval activating a previously down active server in the value: 30
active-standby mode. This is to prevent any flapping Maximum
issues. value: 65535
Option Description
Option Description
max- Max number of active connections that can directed integer Minimum 0
connections to the real server. When reached, sessions are sent value: 0
to other real servers. Maximum
value:
2147483647
monitor Name of the health check monitor to use when string Maximum
<name> polling to determine a virtual server's connectivity length: 79
status.
Health monitor name.
client-ip Only clients in this IP range can connect to this real user Not Specified
server.
config ssl-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - ssl-3.0 tls-
with. 1.0 tls-1.1
tls-1.2 tls-
1.3
Option Description
config ssl-server-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - ssl-3.0 tls-
with. 1.0 tls-1.1
tls-1.2 tls-
1.3
Option Description
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
incoming-ip Accept incoming FTP requests from this IP address. An ipv4- Not 0.0.0.0
interface must have this IP address. address- Specified
any
incoming-port Accept incoming FTP requests on one or more ports. user Not
Specified
outgoing-ip Outgoing FTP requests will leave from this IP address. ipv4- Not
An interface must have this IP address. address- Specified
any
sec-default- Accept or deny explicit FTP proxy sessions when no option - deny
action FTP proxy firewall policy exists.
Option Description
accept Accept requests. All explicit FTP proxy traffic is accepted whether there is an
explicit FTP proxy policy or not
deny Deny requests unless there is a matching explicit FTP proxy policy.
server-data- Determine mode of data session on FTP server side. option - client
mode
Option Description
client Use the same transmission mode for client and server data sessions.
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
ssl-cert List of certificate names to use for SSL connections to string Maximum
<name> this server. length: 79
Certificate list.
Option Description
Option Description
Option Description
204-size-limit 204 response size limit to be saved by ICAP client in integer Minimum 1
megabytes. value: 1
Maximum
value: 10
Option Description
Option Description
Option Description
ssh Forward file transfer with SSH protocol to ICAP server for further processing.
ftp Forward file transfer with FTP protocol to ICAP server for further processing.
file-transfer- Action to take if the ICAP server cannot be contacted option - error
failure when processing a file transfer.
Option Description
error Error.
bypass Bypass.
file-transfer- Path component of the ICAP URI that identifies the file string Maximum
path transfer processing service. length: 127
Option Description
methods The allowed HTTP methods that will be sent to ICAP option - delete get
server for further processing. head
options
post put
trace
connect
other
Option Description
delete Forward HTTP request or response with DELETE method to ICAP server for
further processing.
get Forward HTTP request or response with GET method to ICAP server for
further processing.
head Forward HTTP request or response with HEAD method to ICAP server for
further processing.
Option Description
options Forward HTTP request or response with OPTIONS method to ICAP server for
further processing.
post Forward HTTP request or response with POST method to ICAP server for
further processing.
put Forward HTTP request or response with PUT method to ICAP server for
further processing.
trace Forward HTTP request or response with TRACE method to ICAP server for
further processing.
connect Forward HTTP request or response with CONNECT method to ICAP server
for further processing.
other Forward HTTP request or response with All other methods to ICAP server for
further processing.
Option Description
Option Description
request-failure Action to take if the ICAP server cannot be contacted option - error
when processing an HTTP request.
Option Description
error Error.
bypass Bypass.
request-path Path component of the ICAP URI that identifies the string Maximum
HTTP request processing service. length: 127
Option Description
forward Forward response to ICAP server unless a rule specifies not to.
bypass Don't forward request to ICAP server unless a rule specifies to forward the
request.
Option Description
response- Action to take if the ICAP server cannot be contacted option - error
failure when processing an HTTP response.
Option Description
error Error.
bypass Bypass.
response-path Path component of the ICAP URI that identifies the string Maximum
HTTP response processing service. length: 127
Option Description
Option Description
timeout Time (in seconds) that ICAP client waits for the integer Minimum 30
response from ICAP server. value: 30
Maximum
value: 3600
config icap-headers
Option Description
Option Description
bypass Don't forward request to ICAP server when this rule is matched.
config header-group
Option Description
Configure an ICAP server group consisting of multiple forward servers. Supports failover and load balancing.
Option Description
least-session Send new sessions to the server with lowest session count.
config server-list
weight Optionally assign a weight of the forwarding server for integer Minimum 10
weighted load balancing. value: 1
Maximum
value: 100
addr-type Address type of the remote ICAP server: IPv4, IPv6 option - ip4
or FQDN.
Option Description
fqdn ICAP remote server Fully Qualified Domain Name string Maximum
(FQDN). length: 255
Option Description
healthcheck- ICAP Service name to use for health checks. string Maximum
service length: 127
ip-address IPv4 address of the ICAP server. ipv4- Not Specified 0.0.0.0
address-
any
Option Description
action Default action (pass or block) for this signature. option - pass
Option Description
Option Description
Option Description
protocol Protocol(s) that the signature scans. Blank for all user Not Specified
protocols.
severity Relative severity of the signature, from info to critical. user Not Specified
Log messages generated by the signature include the
severity.
Option Description
config parameter
Option Description
periodical After an anomaly is detected, allow the number of packets per second
according to the anomaly configuration.
Option Description
advanced Offload more types of pattern matching resulting in higher throughput than
basic mode. Requires two CP8s or one CP9.
Option Description
engine-count Number of IPS engines running. If set to the default integer Minimum 0
value of 0, FortiOS sets the number to optimize value: 0
performance depending on the number of CPU Maximum
cores. value: 255
Option Description
ot Exclude ot signatures.
fail-open Enable to allow traffic if the IPS buffer is full. Default option - disable
is disable and IPS traffic is blocked when the IPS
buffer is full.
Option Description
Option Description
disable Disable IPS daemon's use of CPUs other than CPU 0 (all daemons run on all
CPUs).
Option Description
packet-log- Packet/pcap log queue depth per IPS engine. integer Minimum 128
queue-depth value: 128
Maximum
value: 4096
Option Description
socket-size IPS socket buffer size. Max and default value integer Minimum 128 **
depend on available memory. Can be changed to value: 0
tune performance. Maximum
value: 256 **
sync-session- Enable/disable use of kernel session TTL for IPS option - enable
ttl sessions.
Option Description
Option Description
config tls-active-probe
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
vdom Virtual domain name for TLS active probe. string Maximum
length: 31
source-ip Source IP address used for TLS active probe. ipv4- Not 0.0.0.0
address Specified
source-ip6 Source IPv6 address used for TLS active probe. ipv6- Not ::
address Specified
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config entries
rule <id> Identifies the predefined or custom IPS signatures integer Minimum
to add to the sensor. value: 0
Rule IPS. Maximum
value:
4294967295
severity Relative severity of the signature, from info to user Not Specified all
critical. Log messages generated by the signature
include the severity.
protocol Protocols to be examined. Use all for every protocol user Not Specified all
and other for unlisted protocols.
os Operating systems to be protected. Use all for every user Not Specified all
operating system and other for unlisted operating
systems.
application Operating systems to be protected. Use all for every user Not Specified all
application and other for unlisted application.
Option Description
Option Description
cve <cve- List of CVE IDs of the signatures to add to the string Maximum
entry> sensor. length: 19
CVE IDs or CVE wildcards.
last-modified Filter by signature last modified date. Formats: user Not Specified
before <date>, after <date>, between <start-date>
<end-date>.
status Status of the signatures included in filter. Only those option - default
filters with a status to enable are used.
Option Description
default Default.
Option Description
Option Description
Option Description
action Action taken with traffic in which signatures are option - default
detected.
Option Description
default Pass or drop matching traffic, depending on the default action of the signature.
Option Description
Option Description
none none
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
config exempt-ip
src-ip Source IP address and netmask (applies to packet ipv4- Not Specified 0.0.0.0
matching the signature). classnet 0.0.0.0
dst-ip Destination IP address and netmask (applies to ipv4- Not Specified 0.0.0.0
packet matching the signature). classnet 0.0.0.0
packet-log- Maximum memory can be used by packet log. integer Minimum 256
memory value: 64
Maximum
value: 8192
packet-log- Number of packets to log after the IPS signature is integer Minimum 0
post-attack detected. value: 0
Maximum
value: 255
Option Description
Option Description
Configure filters for local disk logging. Use these filters to determine the log messages to record according to severity
and type.
config log disk filter
Description: Configure filters for local disk logging. Use these filters to determine
the log messages to record according to severity and type.
set anomaly [enable|disable]
set dlp-archive [enable|disable]
set forti-switch [enable|disable]
set forward-traffic [enable|disable]
config free-style
Description: Free style filters.
edit <id>
set category [traffic|event|...]
set filter {string}
set filter-type [include|exclude]
next
end
set gtp [enable|disable]
set local-traffic [enable|disable]
set multicast-traffic [enable|disable]
set severity [emergency|alert|...]
set sniffer-traffic [enable|disable]
set voip [enable|disable]
set ztna-traffic [enable|disable]
end
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
severity Log to disk every message above and including this option - information
severity level.
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
diskfull Action to take when disk is full. The system can option - overwrite
overwrite the oldest log messages or stop logging
when the disk is full.
Option Description
overwrite Overwrite the oldest logs when the log disk is full.
Option Description
Option Description
Option Description
sunday Sunday
monday Monday
tuesday Tuesday
wednesday Wednesday
thursday Thursday
friday Friday
saturday Saturday
Option Description
roll-time Time of day to roll the log file (hh:mm). user Not Specified
source-ip Source IP address to use for uploading disk log ipv4- Not Specified 0.0.0.0
files. address
Option Description
upload Enable/disable uploading log files when they are option - disable
rolled.
Option Description
Option Description
upload- The type of server to upload log files to. Only FTP is option - ftp-server
destination currently supported.
Option Description
Option Description
uploaddir The remote directory on the FTP server to upload string Maximum
log files to. length: 63
uploadip IP address of the FTP server to upload log files to. ipv4- Not Specified 0.0.0.0
address
uploadpass Password required to log into the FTP server to password Not Specified
upload disk log files.
uploadport TCP port to use for communicating with the FTP integer Minimum 21
server. value: 0
Maximum
value: 65535
uploadsched Set the schedule for uploading log files to the FTP option - disable
server.
Option Description
uploadtime Time of day at which log files are uploaded if user Not Specified
uploadsched is enabled (hh:mm or hh).
uploadtype Types of log files to upload. Separate multiple option - traffic event
entries with a space. virus
webfilter
IPS
emailfilter
dlp-archive
anomaly
voip dlp
app-ctrl waf
dns ssh ssl
**
Option Description
Option Description
uploaduser Username required to log into the FTP server to string Maximum
upload disk log files. length: 35
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
source-ip Source IPv4 or IPv6 address used to communicate with string Maximum
FortiAnalyzer. length: 63
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
upload-option Enable/disable logging to hard disk and then uploading option - 5-minute
to FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
severity Log every message above and including this severity option - information
level.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
severity Log every message above and including this severity option - information
level.
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
enable Enable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
disable Disable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
Option Description
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
Option Description
Option Description
enable Enable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
disable Disable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
enable Enable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
disable Disable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
source-ip Source IPv4 or IPv6 address used to communicate with string Maximum
FortiAnalyzer. length: 63
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
upload-option Enable/disable logging to hard disk and then uploading option - 5-minute
to FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
enable Enable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
disable Disable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
Option Description
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
Option Description
Option Description
enable Enable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
disable Disable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
enable Enable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
disable Disable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
source-ip Source IPv4 or IPv6 address used to communicate with string Maximum
FortiAnalyzer. length: 63
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
upload-option Enable/disable logging to hard disk and then uploading option - 5-minute
to FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
enable Enable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
disable Disable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
Option Description
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
Option Description
Option Description
enable Enable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
disable Disable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
enable Enable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
disable Disable this FortiGate unit to fallback to the primary FortiAnalyzer when it is
available.
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
source-ip Source IPv4 or IPv6 address used to communicate with string Maximum
FortiAnalyzer. length: 63
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
upload-option Enable/disable logging to hard disk and then uploading option - 5-minute
to FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
override Overriding FortiCloud settings for this VDOM or use option - disable
global settings.
Option Description
Option Description
Option Description
Option Description
upload-option Configure how log messages are sent to FortiCloud. option - 5-minute
Option Description
store-and-upload Log to the hard disk and then upload logs to FortiCloud.
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiCloud.
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
upload-option Configure how log messages are sent to FortiCloud. option - 5-minute
Option Description
store-and-upload Log to the hard disk and then upload logs to FortiCloud.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
severity Log every message above and including this severity option - information
level.
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
max-size Maximum amount of memory that can be used for integer Minimum 168439726 **
memory logging in bytes. value: 0
Maximum
value:
4294967295
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
enable Enable statistics collection for when no external logging destination, such as
FortiAnalyzer, is present (data is not saved).
disable Disable statistics collection for when no external logging destination, such as
FortiAnalyzer, is present (data is not saved).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Option Description
botnet- Threat weight score for detected botnet connections. option - critical
connection-
detected
Option Description
low Use the low level score for detected botnet connections.
medium Use the medium level score for detected botnet connections.
high Use the high level score for detected botnet connections.
critical Use the critical level score for detected botnet connections.
Option Description
Option Description
Option Description
config application
Option Description
config geolocation
Option Description
config ips
info-severity Threat weight score for IPS info severity events. option - disable
Option Description
disable Disable threat weight scoring for IPS info severity events.
low Use the low level score for IPS info severity events.
Option Description
medium Use the medium level score for IPS info severity events.
high Use the high level score for IPS info severity events.
critical Use the critical level score for IPS info severity events.
low-severity Threat weight score for IPS low severity events. option - low
Option Description
disable Disable threat weight scoring for IPS low severity events.
low Use the low level score for IPS low severity events.
medium Use the medium level score for IPS low severity events.
high Use the high level score for IPS low severity events.
critical Use the critical level score for IPS low severity events.
medium- Threat weight score for IPS medium severity events. option - medium
severity
Option Description
disable Disable threat weight scoring for IPS medium severity events.
low Use the low level score for IPS medium severity events.
medium Use the medium level score for IPS medium severity events.
high Use the high level score for IPS medium severity events.
critical Use the critical level score for IPS medium severity events.
high-severity Threat weight score for IPS high severity events. option - high
Option Description
disable Disable threat weight scoring for IPS high severity events.
low Use the low level score for IPS high severity events.
medium Use the medium level score for IPS high severity events.
high Use the high level score for IPS high severity events.
critical Use the critical level score for IPS high severity events.
critical- Threat weight score for IPS critical severity events. option - critical
severity
Option Description
disable Disable threat weight scoring for IPS critical severity events.
low Use the low level score for IPS critical severity events.
medium Use the medium level score for IPS critical severity events.
high Use the high level score for IPS critical severity events.
critical Use the critical level score for IPS critical severity events.
config level
config malware
virus-infected Threat weight score for virus (infected) detected. option - critical
Option Description
low Use the low level score for virus (infected) detected.
medium Use the medium level score for virus (infected) detected.
high Use the high level score for virus (infected) detected.
Option Description
critical Use the critical level score for virus (infected) detected.
inline-block Threat weight score for malware detected by inline option - critical
block.
Option Description
disable Disable threat weight scoring for virus detected by inline block.
low Use the low level score for virus detected by inline block.
medium Use the medium level score for virus detected by inline block.
high Use the high level score for virus detected by inline block.
critical Use the critical level score for virus detected by inline block.
file-blocked Threat weight score for blocked file detected. option - low
Option Description
low Use the low level score for blocked file detected.
medium Use the medium level score for blocked file detected.
high Use the high level score for blocked file detected.
critical Use the critical level score for blocked file detected.
command-blocked Threat weight score for blocked command detected. option - disable
Option Description
low Use the low level score for blocked command detected.
medium Use the medium level score for blocked command detected.
high Use the high level score for blocked command detected.
critical Use the critical level score for blocked command detected.
oversized Threat weight score for oversized file detected. option - disable
Option Description
low Use the low level score for oversized file detected.
Option Description
medium Use the medium level score for oversized file detected.
high Use the high level score for oversized file detected.
critical Use the critical level score for oversized file detected.
virus-scan-error Threat weight score for virus (scan error) detected. option - high
Option Description
disable Disable threat weight scoring for virus (scan error) detected.
low Use the low level score for virus (scan error) detected.
medium Use the medium level score for virus (scan error) detected.
high Use the high level score for virus (scan error) detected.
critical Use the critical level score for virus (scan error) detected.
switch-proto Threat weight score for switch proto detected. option - disable
Option Description
low Use the low level score for switch proto detected.
medium Use the medium level score for switch proto detected.
high Use the high level score for switch proto detected.
critical Use the critical level score for switch proto detected.
Option Description
virus-file-type- Threat weight score for virus (file type executable) option - medium
executable detected.
Option Description
disable Disable threat weight scoring for virus (filetype executable) detected.
low Use the low level score for virus (filetype executable) detected.
medium Use the medium level score for virus (filetype executable) detected.
high Use the high level score for virus (filetype executable) detected.
critical Use the critical level score for virus (filetype executable) detected.
virus-outbreak- Threat weight score for virus (outbreak prevention) option - critical
prevention event.
Option Description
disable Disable threat weight scoring for virus (outbreak prevention) event.
low Use the low level score for virus (outbreak prevention) event.
medium Use the medium level score for virus (outbreak prevention) event.
high Use the high level score for virus (outbreak prevention) event.
critical Use the critical level score for virus (outbreak prevention) event.
content-disarm Threat weight score for virus (content disarm) option - medium
detected.
Option Description
disable Disable threat weight scoring for virus (content disarm) detected.
low Use the low level score for virus (content disarm) detected.
medium Use the medium level score for virus (content disarm) detected.
high Use the high level score for virus (content disarm) detected.
critical Use the critical level score for virus (content disarm) detected.
malware-list Threat weight score for virus (malware list) detected. option - medium
Option Description
disable Disable threat weight scoring for virus (malware list) detected.
low Use the low level score for virus (malware list) detected.
medium Use the medium level score for virus (malware list) detected.
high Use the high level score for virus (malware list) detected.
critical Use the critical level score for virus (malware list) detected.
ems-threat-feed Threat weight score for virus (EMS threat feed) option - medium
detected.
Option Description
disable Disable threat weight scoring for virus (EMS threat feed) detected.
low Use the low level score for virus (EMS threat feed) detected.
medium Use the medium level score for virus (EMS threat feed) detected.
high Use the high level score for virus (EMS threat feed) detected.
critical Use the critical level score for virus (EMS threat feed) detected.
Option Description
low Use the low level score for FortiSandbox malicious malware detected.
medium Use the medium level score for FortiSandbox malicious malware
detected.
high Use the high level score for FortiSandbox malicious malware detected.
critical Use the critical level score for FortiSandbox malicious malware detected.
fsa-high-risk Threat weight score for FortiSandbox high risk option - high
malware detected.
Option Description
disable Disable threat weight scoring for FortiSandbox high risk malware
detected.
low Use the low level score for FortiSandbox high risk malware detected.
medium Use the medium level score for FortiSandbox high risk malware detected.
high Use the high level score for FortiSandbox high risk malware detected.
critical Use the critical level score for FortiSandbox high risk malware detected.
fsa-medium-risk Threat weight score for FortiSandbox medium risk option - medium
malware detected.
Option Description
disable Disable threat weight scoring for FortiSandbox medium risk malware
detected.
low Use the low level score for FortiSandbox medium risk malware detected.
medium Use the medium level score for FortiSandbox medium risk malware
detected.
high Use the high level score for FortiSandbox medium risk malware detected.
critical Use the critical level score for FortiSandbox medium risk malware
detected.
config web
category Threat weight score for web category filtering matches. integer Minimum 0
value: 0
Maximum
value: 255
level Threat weight score for web category filtering matches. option - low
Option Description
disable Disable threat weight scoring for web category filtering matches.
low Use the low level score for web category filtering matches.
medium Use the medium level score for web category filtering matches.
high Use the high level score for web category filtering matches.
critical Use the critical level score for web category filtering matches.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1100E, FortiGate 1101E,
FortiGate 2000E, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 3000D,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3300E,
FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
400E, FortiGate 401E, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 800D, FortiGate 900D.
It is not available for: FortiGate 1000F, FortiGate 1001F, FortiGate 100F, FortiGate 101F,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2600F, FortiGate 2601F,
FortiGate 3000F, FortiGate 3001F, FortiGate 3200F, FortiGate 3201F, FortiGate 3500F,
FortiGate 3501F, FortiGate 3700F, FortiGate 3701F, FortiGate 400F, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 600F, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate
80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate
81F, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
Option Description
threshold IPsec engine status check threshold. Example: Log is user Not
generated if IPsec engine 0 is busy each of every 15 Specified
consecutive interval checks.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 200F, FortiGate 201F, FortiGate 2200E,
FortiGate 2201E, FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D,
FortiGate 3000F, FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E,
FortiGate 3400E, FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E,
FortiGate 3601E, FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E,
FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E,
FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F,
FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E,
FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate
60F, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate 80F Bypass,
FortiGate 80F-POE, FortiGate 80F, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60F, FortiWiFi 61F,
FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 140E-POE, FortiGate 140E, FortiGate 200E, FortiGate 201E,
FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 61E,
FortiGate 80E-POE, FortiGate 80E, FortiGate 81E-POE, FortiGate 81E, FortiGate 90E,
FortiGate 91E, FortiGate VM64, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 61E.
multipliers HPE type interval multipliers. An event log is generated user Not
after every (interval * multiplier)seconds as configured Specified
for any HPE type when drops occur for that HPE type.
An attack log is generated after every (4 * multiplier)
number of continuous event logs.
Option Description
config service-index
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1001F, FortiGate 101F,
FortiGate 1101E, FortiGate 1801F, FortiGate 2000E, FortiGate 201E, FortiGate 201F,
FortiGate 2201E, FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D,
FortiGate 3001F, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3201F,
FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E, FortiGate 3700D,
FortiGate 3701F, FortiGate 401E, FortiGate 401F, FortiGate 4201F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 501E, FortiGate 601E, FortiGate 601F, FortiGate 61E, FortiGate
61F, FortiGate 71F, FortiGate 800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 81F, FortiGate 900D, FortiGate 91E, FortiGate VM64, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi
81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000F, FortiGate 100F, FortiGate 1100E, FortiGate 140E-
POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F, FortiGate 2200E,
FortiGate 3000F, FortiGate 300E, FortiGate 3200F, FortiGate 3300E, FortiGate 3400E,
FortiGate 3500F, FortiGate 3600E, FortiGate 3700F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4200F, FortiGate 4400F, FortiGate 5001E, FortiGate 500E, FortiGate 600E,
FortiGate 600F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E,
FortiGate 60F, FortiGate 70F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass,
FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 80F 2R.
Option Description
custom Custom.
Option Description
sunday Sunday.
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
thursday Thursday.
friday Friday.
saturday Saturday.
Option Description
Option Description
pdf PDF.
max-pdf- Maximum number of PDF reports to keep at one time integer Minimum 31
report (oldest report is overwritten). value: 1
Maximum
value: 365
Option Description
dummy-option Use this option if you need none of the above options.
Option Description
config body-item
Option Description
text Text.
image Image.
chart Chart.
misc Miscellaneous.
Option Description
heading1 Heading 1.
Option Description
heading2 Heading 2.
heading3 Heading 3.
Option Description
Option Description
config parameters
name Field name that match field of parameters defined in string Maximum
dataset. length: 127
config page
Option Description
a4 A4 paper.
Option Description
Option Description
Option Description
config header-item
Option Description
text Text.
image Image.
config footer
Option Description
text Text.
image Image.
This command is available for model(s): FortiGate 1000D, FortiGate 1001F, FortiGate 101F,
FortiGate 1101E, FortiGate 1801F, FortiGate 2000E, FortiGate 201E, FortiGate 201F,
FortiGate 2201E, FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D,
FortiGate 3001F, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3201F,
FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E, FortiGate 3700D,
FortiGate 3701F, FortiGate 401E, FortiGate 401F, FortiGate 4201F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 501E, FortiGate 601E, FortiGate 601F, FortiGate 61E, FortiGate
61F, FortiGate 71F, FortiGate 800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 81F, FortiGate 900D, FortiGate 91E, FortiGate VM64, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi
81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000F, FortiGate 100F, FortiGate 1100E, FortiGate 140E-
POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F, FortiGate 2200E,
FortiGate 3000F, FortiGate 300E, FortiGate 3200F, FortiGate 3300E, FortiGate 3400E,
FortiGate 3500F, FortiGate 3600E, FortiGate 3700F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4200F, FortiGate 4400F, FortiGate 5001E, FortiGate 500E, FortiGate 600E,
FortiGate 600F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E,
FortiGate 60F, FortiGate 70F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass,
FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 80F 2R.
Option Description
Option Description
Option Description
config rule
action Permit or deny this IP address and netmask prefix. option - permit
Option Description
prefix IPv4 prefix to define regular filter criteria, such as user Not Specified
"any" or subnets.
wildcard Wildcard to define Cisco-style wildcard filter criteria. user Not Specified
Option Description
config rule
action Permit or deny this IP address and netmask prefix. option - permit
Option Description
prefix6 IPv6 prefix to define regular filter criteria, such as user Not Specified
"any" or subnets.
Option Description
config rule
Option Description
Configure BFD.
config router bfd
Description: Configure BFD.
config multihop-template
Description: BFD multi-hop template table.
edit <id>
set src {ipv4-classnet}
set dst {ipv4-classnet}
set bfd-desired-min-tx {integer}
set bfd-required-min-rx {integer}
set bfd-detect-mult {integer}
set auth-mode [none|md5]
set md5-key {password}
next
end
config neighbor
Description: Neighbor.
edit <ip>
config multihop-template
bfd-desired- BFD desired minimal transmit interval (milliseconds). integer Minimum 250
min-tx value: 100
Maximum
value: 30000
bfd-required- BFD required minimal receive interval (milliseconds). integer Minimum 250
min-rx value: 100
Maximum
value: 30000
Option Description
none None.
config neighbor
config multihop-template
bfd-desired- BFD desired minimal transmit interval (milliseconds). integer Minimum 250
min-tx value: 100
Maximum
value: 30000
bfd-required- BFD required minimal receive interval (milliseconds). integer Minimum 250
min-rx value: 100
Maximum
value: 30000
Option Description
none None.
config neighbor
Configure BGP.
config router bgp
Description: Configure BGP.
set additional-path [enable|disable]
set additional-path-select {integer}
set additional-path-select-vpnv4 {integer}
set additional-path-select-vpnv6 {integer}
set additional-path-select6 {integer}
set additional-path-vpnv4 [enable|disable]
set additional-path-vpnv6 [enable|disable]
set additional-path6 [enable|disable]
config admin-distance
Description: Administrative distance modifications.
edit <id>
set neighbour-prefix {ipv4-classnet}
set route-list {string}
set distance {integer}
next
end
config aggregate-address
Description: BGP aggregate address table.
edit <id>
set prefix {ipv4-classnet-any}
set as-set [enable|disable]
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
distance-internal Distance for routes internal to the AS. integer Minimum 200
value: 1
Maximum
value: 255
distance-local Distance for routes local to the AS. integer Minimum 200
value: 1
Maximum
value: 255
Option Description
Option Description
Option Description
Option Description
Option Description
graceful-restart- Time needed for neighbors to restart (sec). integer Minimum 120
time value: 1
Maximum
value: 3600
graceful- Time to hold stale paths of restarting neighbor integer Minimum 360
stalepath-time (sec). value: 1
Maximum
value: 3600
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
preferred Use tag-match if a BGP route resolution with another route containing the
same tag is successful.
merge Merge tag-match with best-match if they are using different routes. The
result will exclude the next hops of tag-match whose interfaces have
appeared in best-match.
config admin-distance
route-list Access list of routes to apply new distance to. string Maximum
length: 35
config aggregate-address
Option Description
Option Description
config aggregate-address6
Option Description
Option Description
config neighbor
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
as-path AS path.
med MED.
Option Description
as-path AS path.
med MED.
Option Description
as-path AS path.
med MED.
Option Description
as-path AS path.
med MED.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
none None.
Option Description
none None.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
distribute-list-in Filter for IPv4 updates from this neighbor. string Maximum
length: 35
distribute-list-in6 Filter for IPv6 updates from this neighbor. string Maximum
length: 35
distribute-list-in- Filter for VPNv4 updates from this neighbor. string Maximum
vpnv4 length: 35
distribute-list-in- Filter for VPNv6 updates from this neighbor. string Maximum
vpnv6 length: 35
ebgp-multihop-ttl EBGP multihop TTL for this peer. integer Minimum 255
value: 1
Maximum
value: 255
Option Description
Option Description
Option Description
Option Description
Option Description
prefix-list-in IPv4 Inbound filter for updates from this string Maximum
neighbor. length: 35
prefix-list-in6 IPv6 Inbound filter for updates from this string Maximum
neighbor. length: 35
prefix-list-in-vpnv4 Inbound filter for VPNv4 updates from this string Maximum
neighbor. length: 35
prefix-list-in-vpnv6 Inbound filter for VPNv6 updates from this string Maximum
neighbor. length: 35
Option Description
Option Description
route-map-out- IPv4 outbound route map filter if the peer is string Maximum
preferable preferred. length: 35
route-map-out6- IPv6 outbound route map filter if the peer is string Maximum
preferable preferred. length: 35
route-map-out- VPNv4 outbound route map filter if the peer is string Maximum
vpnv4-preferable preferred. length: 35
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
Option Description
extended Extended.
both Both.
disable Disable
holdtime-timer Interval (sec) before peer considered dead. integer Minimum 4294967295
value: 3
Maximum
value: 65535
Option Description
Option Description
Option Description
Option Description
Option Description
config conditional-advertise
Option Description
config conditional-advertise6
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
as-path AS path.
med MED.
Option Description
as-path AS path.
med MED.
Option Description
as-path AS path.
med MED.
Option Description
as-path AS path.
med MED.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
none None.
Option Description
none None.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
distribute-list-in Filter for IPv4 updates from this neighbor. string Maximum
length: 35
distribute-list-in6 Filter for IPv6 updates from this neighbor. string Maximum
length: 35
distribute-list-in- Filter for VPNv4 updates from this neighbor. string Maximum
vpnv4 length: 35
distribute-list-in- Filter for VPNv6 updates from this neighbor. string Maximum
vpnv6 length: 35
ebgp-multihop-ttl EBGP multihop TTL for this peer. integer Minimum 255
value: 1
Maximum
value: 255
Option Description
Option Description
Option Description
Option Description
Option Description
prefix-list-in IPv4 Inbound filter for updates from this string Maximum
neighbor. length: 35
prefix-list-in6 IPv6 Inbound filter for updates from this string Maximum
neighbor. length: 35
prefix-list-in-vpnv4 Inbound filter for VPNv4 updates from this string Maximum
neighbor. length: 35
prefix-list-in-vpnv6 Inbound filter for VPNv6 updates from this string Maximum
neighbor. length: 35
Option Description
Option Description
route-map-out- IPv4 outbound route map filter if the peer is string Maximum
preferable preferred. length: 35
route-map-out6- IPv6 outbound route map filter if the peer is string Maximum
preferable preferred. length: 35
route-map-out- VPNv4 outbound route map filter if the peer is string Maximum
vpnv4-preferable preferred. length: 35
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
holdtime-timer Interval (sec) before peer considered dead. integer Minimum 4294967295
value: 3
Maximum
value: 65535
Option Description
Option Description
Option Description
Option Description
config neighbor-range
config neighbor-range6
config network
Option Description
Option Description
Option Description
config network6
Option Description
Option Description
Option Description
config redistribute6
Option Description
config vrf
Option Description
ce CE VRF.
pe PE VRF.
config leak-target
interface Interface which is used to leak routes to target VRF. string Maximum
length: 15
config vrf6
Option Description
ce CE VRF.
pe PE VRF.
config leak-target
interface Interface which is used to leak routes to target VRF. string Maximum
length: 15
Option Description
Option Description
Option Description
config rule
Option Description
Option Description
rt Route Target.
Configure IS-IS.
config router isis
Description: Configure IS-IS.
set adjacency-check [enable|disable]
set adjacency-check6 [enable|disable]
set adv-passive-only [enable|disable]
set adv-passive-only6 [enable|disable]
set auth-keychain-l1 {string}
Option Description
Option Description
Option Description
Option Description
Option Description
password Password.
md5 MD5.
Option Description
password Password.
md5 MD5.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
external External.
interlevel Inter-level.
Option Description
Option Description
Option Description
redistribute6-l1- Access-list for IPv6 route redistribution from l1 to l2. string Maximum
list length: 35
Option Description
redistribute6-l2- Access-list for IPv6 route redistribution from l2 to l1. string Maximum
list length: 35
Option Description
Option Description
Option Description
broadcast Broadcast.
point-to-point Point-to-point.
loopback Loopback.
Option Description
level-1 Level 1.
level-2 Level 2.
Option Description
Option Description
Option Description
Option Description
md5 MD5.
password Password.
Option Description
md5 MD5.
password Password.
Option Description
config isis-net
config redistribute
Option Description
enable Enable.
disable Disable.
Option Description
external External.
internal Internal.
Option Description
level-1 Level 1.
level-2 Level 2.
config redistribute6
Option Description
Option Description
Option Description
level-1 Level 1.
level-2 Level 2.
config summary-address
Option Description
level-1 Level 1.
level-2 Level 2.
Option Description
level-1 Level 1.
level-2 Level 2.
Configure key-chain.
config router key-chain
Description: Configure key-chain.
edit <name>
config key
Description: Configuration method to edit key settings.
edit <id>
set accept-lifetime {user}
set send-lifetime {user}
set key-string {password}
set algorithm [md5|hmac-sha1|...]
next
end
next
end
Option Description
md5 MD5.
hmac-sha1 HMAC-SHA1.
hmac-sha256 HMAC-SHA256.
hmac-sha384 HMAC-SHA384.
hmac-sha512 HMAC-SHA512.
cmac-aes128 CMAC-AES128.
Configure multicast-flow.
config router multicast-flow
Description: Configure multicast-flow.
edit <name>
set comments {string}
config flows
Description: Multicast-flow entries.
edit <id>
set group-addr {ipv4-address-any}
set source-addr {ipv4-address-any}
next
end
next
end
config flows
Option Description
config interface
Option Description
sparse-mode sparse-mode
dense-mode dense-mode
Option Description
Option Description
hello-holdtime Time before old neighbor information expires. integer Minimum 105
value: 1
Maximum
value: 65535
cisco-exclude- Exclude GenID from hello packets (compatibility with option - disable
genid old Cisco IOS).
Option Description
Option Description
rpf-nbr-fail- Enable/disable fail back for RPF neighbor query. option - disable
back
Option Description
config join-group
Option Description
1 Version 1.
last-member- Timeout between IGMPv2 leave and removing group. integer Minimum 1000
query-interval value: 1
Maximum
value:
65535
query-max- Maximum time to wait for a IGMP query response. integer Minimum 10
response- value: 1
time Maximum
value: 25
query-timeout Timeout between queries before becoming querying integer Minimum 255
unit for network. value: 60
Maximum
value: 900
Option Description
message- Period of time between sending periodic PIM join/prune integer Minimum 60
interval messages in seconds. value: 1
Maximum
value:
65535
Option Description
bsr-allow- Enable/disable accept BSR quick refresh packets from option - disable
quick-refresh neighbors.
Option Description
cisco-register- Checksum entire register packet(for old Cisco IOS option - disable
checksum compatibility).
Option Description
Option Description
cisco-ignore- Use only hash for RP selection (compatibility with old option - disable
rp-set-priority Cisco IOS).
Option Description
Option Description
Option Description
Option Description
Option Description
register-rate- Limit of packets/sec per source registered through this integer Minimum 0
limit RP. value: 0
Maximum
value:
65535
Option Description
enable Enable use of SDWAN when checking RPF neighbor and sending of REG
packet.
disable Disable use of SDWAN when checking RPF neighbor and sending of REG
packet.
config rp-address
Option Description
Option Description
config interface
config pim-sm-global
register-rate- Limit of packets/sec per source registered through this integer Minimum 0
limit RP (0 means unlimited). value: 0
Maximum
value:
65535
Configure OSPF.
config router ospf
Description: Configure OSPF.
set abr-type [cisco|ibm|...]
config area
Description: OSPF area configuration.
edit <id>
set shortcut [disable|enable|...]
set authentication [none|text|...]
set default-cost {integer}
set nssa-translator-role [candidate|never|...]
set stub-type [no-summary|summary]
set type [regular|nssa|...]
set nssa-default-information-originate [enable|always|...]
set nssa-default-information-originate-metric {integer}
set nssa-default-information-originate-metric-type [1|2]
set nssa-redistribution [enable|disable]
set comments {var-string}
config range
Description: OSPF area range configuration.
edit <id>
set prefix {ipv4-classnet-any}
set advertise [disable|enable]
set substitute {ipv4-classnet-any}
set substitute-status [enable|disable]
next
end
config virtual-link
Description: OSPF virtual link configuration.
edit <name>
set authentication [none|text|...]
set authentication-key {password}
set keychain {string}
set dead-interval {integer}
set hello-interval {integer}
set retransmit-interval {integer}
set transmit-delay {integer}
set peer {ipv4-address-any}
Option Description
cisco Cisco.
ibm IBM.
shortcut Shortcut.
standard Standard.
Option Description
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config area
Option Description
Option Description
none None.
text Text.
Option Description
candidate Candidate.
never Never.
always Always.
Option Description
no-summary No summary.
summary Summary.
Option Description
regular Regular.
nssa NSSA.
stub Stub.
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
config range
Option Description
Option Description
config virtual-link
Option Description
none None.
text Text.
config md5-keys
config md5-keys
config filter-list
Option Description
in In.
out Out.
config distribute-list
Option Description
config neighbor
cost Cost of the interface, value range from 0 to 65535, 0 integer Minimum 0
means auto-cost. value: 0
Maximum
value: 65535
config network
config ospf-interface
Option Description
none None.
text Text.
cost Cost of the interface, value range from 0 to 65535, 0 integer Minimum 0
means auto-cost. value: 0
Maximum
value:
65535
Option Description
Option Description
Option Description
broadcast Broadcast.
non-broadcast Non-broadcast.
point-to-point Point-to-point.
point-to- Point-to-multipoint.
multipoint
Option Description
Option Description
config md5-keys
config md5-keys
Option Description
Option Description
1 Type 1.
2 Type 2.
config summary-address
Option Description
Option Description
cisco Cisco.
ibm IBM.
standard Standard.
auto-cost-ref- Reference bandwidth in terms of megabits per second. integer Minimum 1000
bandwidth value: 1
Maximum
value:
1000000
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
Option Description
Option Description
Option Description
config area
Option Description
candidate Candidate.
never Never.
always Always.
Option Description
no-summary No summary.
summary Summary.
Option Description
regular Regular.
nssa NSSA.
stub Stub.
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
Option Description
ah Authentication Header.
Option Description
md5 MD5.
sha1 SHA1.
sha256 SHA256.
sha384 SHA384.
sha512 SHA512.
Option Description
null No encryption.
des DES.
3des 3DES.
aes128 AES128.
aes192 AES192.
aes256 AES256.
config ipsec-keys
config ipsec-keys
Option Description
disable disable
enable enable
config virtual-link
Option Description
ah Authentication Header.
Option Description
md5 MD5.
sha1 SHA1.
sha256 SHA256.
sha384 SHA384.
sha512 SHA512.
Option Description
null No encryption.
des DES.
3des 3DES.
aes128 AES128.
aes192 AES192.
aes256 AES256.
config ipsec-keys
config ospf6-interface
cost Cost of the interface, value range from 0 to 65535, 0 integer Minimum 0
means auto-cost. value: 0
Maximum
value:
65535
Option Description
Option Description
broadcast broadcast
point-to-point point-to-point
non-broadcast non-broadcast
point-to- point-to-multipoint
multipoint
Option Description
Option Description
Option Description
Option Description
ah Authentication Header.
Option Description
md5 MD5.
sha1 SHA1.
sha256 SHA256.
sha384 SHA384.
sha512 SHA512.
Option Description
null No encryption.
des DES.
3des 3DES.
aes128 AES128.
aes192 AES192.
aes256 AES256.
config ipsec-keys
config ipsec-keys
config neighbor
cost Cost of the interface, value range from 0 to 65535, 0 integer Minimum 0
means auto-cost. value: 0
Maximum
value:
65535
config redistribute
Option Description
Option Description
1 Type 1.
2 Type 2.
config summary-address
Option Description
disable disable
enable enable
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config rule
action Permit or deny this IP address and netmask prefix. option - permit
Option Description
prefix IPv4 prefix to define regular filter criteria, such as user Not Specified 0.0.0.0
"any" or subnets. 0.0.0.0
action Permit or deny packets that match this rule. option - permit
Option Description
prefix6 IPv6 prefix to define regular filter criteria, such as user Not Specified
"any" or subnets.
Configure RIP.
config router rip
Description: Configure RIP.
set default-information-originate [enable|disable]
set default-metric {integer}
config distance
Description: Distance.
edit <id>
set prefix {ipv4-classnet-any}
set distance {integer}
set access-list {string}
next
end
config distribute-list
Option Description
max-out- Maximum metric allowed to output(0 means 'not set'). integer Minimum 0
metric value: 0
Maximum
value: 15
Option Description
1 Version 1.
2 Version 2.
config distance
config distribute-list
Option Description
Option Description
config interface
Option Description
none None.
text Text.
md5 MD5.
Option Description
1 Version 1.
2 Version 2.
Option Description
1 Version 1.
2 Version 2.
Option Description
Option Description
Option Description
poisoned Poisoned.
regular Regular.
config neighbor
config offset-list
Option Description
Option Description
Option Description
Configure RIPng.
config router ripng
Description: Configure RIPng.
config aggregate-address
Description: Aggregate address.
edit <id>
set prefix6 {ipv6-prefix}
next
end
set default-information-originate [enable|disable]
set default-metric {integer}
config distance
Description: Distance.
edit <id>
set distance {integer}
set prefix6 {ipv6-prefix}
set access-list6 {string}
next
end
config distribute-list
Description: Distribute list.
edit <id>
set status [enable|disable]
set direction [in|out]
set listname {string}
set interface {string}
next
end
set garbage-timer {integer}
Option Description
max-out- Maximum metric allowed to output(0 means 'not set'). integer Minimum 0
metric value: 0
Maximum
value: 15
config aggregate-address
config distribute-list
Option Description
Option Description
Option Description
Option Description
poisoned Poisoned.
regular Regular.
config neighbor
config offset-list
Option Description
Option Description
Option Description
config rule
Option Description
permit Permit.
deny Deny.
Option Description
Option Description
Option Description
none None.
match-ip6- Match next hop IPv6 address passed by access- string Maximum
nexthop list6 or prefix-list6. length: 35
Option Description
Option Description
prepend Prepend.
replace Replace.
Option Description
Option Description
Option Description
Option Description
none None.
Option Description
Option Description
dst Destination IP and mask for this route. ipv4- Not Specified 0.0.0.0
classnet 0.0.0.0
Option Description
Option Description
enable Keep this static route when link monitor or health check is down.
disable Withdraw this static route when link monitor or health check is down. (default)
preferred- Preferred source IP for this route. ipv4- Not Specified 0.0.0.0
source address
src Source prefix for this route. ipv4- Not Specified 0.0.0.0
classnet 0.0.0.0
Option Description
Option Description
Option Description
Option Description
Option Description
enable Keep this static route when link monitor or health check is down.
disable Withdraw this static route when link monitor or health check is down. (default)
Option Description
Option Description
Option Description
Option Description
config metadata
config parameters
Option Description
Option Description
Option Description
config metadata
config ppid-filters
Option Description
Option Description
sftp SFTP.
Option Description
scp SCP.
Option Description
Option Description
sftp SFTP.
scp SCP.
config shell-commands
Option Description
Option Description
action Action to take for SSH shell command matches. option - block
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
config action
Option Description
Option Description
config classifier
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Policies which can override the 'default' for specific ISL/ICL/FortiLink interface.
config switch-controller auto-config custom
Description: Policies which can override the 'default' for specific ISL/ICL/FortiLink
interface.
edit <name>
config switch-binding
Description: Switch binding list.
edit <switch-id>
set policy {string}
next
end
next
end
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Policy definitions which can define the behavior on auto configured interfaces.
config switch-controller auto-config policy
Description: Policy definitions which can define the behavior on auto configured
interfaces.
edit <name>
set igmp-flood-report [enable|disable]
set igmp-flood-traffic [enable|disable]
set poe-status [enable|disable]
set qos-policy {string}
set storm-control-policy {string}
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Configure the FortiGate switch controller to send custom commands to managed FortiSwitch devices.
config switch-controller custom-command
Description: Configure the FortiGate switch controller to send custom commands to
managed FortiSwitch devices.
edit <command-name>
set command {var-string}
set description {string}
next
end
This command is available for model(s): FortiGate 40F 3G4G, FortiGate 60F, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81F-POE, FortiGate 81F,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100F,
FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F,
FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1,
FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D,
FortiGate 80E-POE, FortiGate 80E, FortiGate 81E-POE, FortiGate 81E, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi
60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F,
FortiWiFi 80F 2R, FortiWiFi 81F 2R.
DSL policy.
config switch-controller dsl policy
Description: DSL policy.
edit <name>
set append_padding [disable|enable]
set cpe-aele [disable|enable]
set cpe-aele-mode [ELE_M0|ELE_DS|...]
set cs {option1}, {option2}, ...
set ds-bitswap [disable|enable]
set pause-frame [disable|enable]
set profile [auto-30a|auto-17a|...]
set type {option}
set us-bitswap [disable|enable]
next
end
Option Description
disable Disable.
enable Enable.
Option Description
disable Disable.
enable Enable.
Option Description
Option Description
Option Description
disable Disable.
enable Enable.
Option Description
disable Disable.
enable Enable.
Option Description
Option Description
Proscend Proscend.
Option Description
disable Disable.
enable Enable.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Configure Dynamic port policy to be applied on the managed FortiSwitch ports through DPP device.
config switch-controller dynamic-port-policy
Description: Configure Dynamic port policy to be applied on the managed FortiSwitch
ports through DPP device.
edit <name>
set description {string}
set fortilink {string}
config policy
Description: Port policies with matching criteria and actions.
edit <name>
set description {string}
set status [enable|disable]
set category [device|interface-tag]
set match-type [dynamic|override]
set match-period {integer}
set interface-tags <tag-name1>, <tag-name2>, ...
set mac {string}
set hw-vendor {string}
set type {string}
set family {string}
set host {string}
set lldp-profile {string}
set qos-policy {string}
set 802-1x {string}
set vlan-policy {string}
set bounce-port-link [disable|enable]
fortilink FortiLink interface for which this Dynamic port policy string Maximum
belongs to. length: 15
config policy
Option Description
Option Description
match-type Match and retain the devices based on the type. option - dynamic
Option Description
match-period Number of days the matched devices will be retained. integer Minimum 0
value: 0
Maximum
value: 120
interface-tags Match policy based on the FortiSwitch interface object string Maximum
<tag-name> tags. length: 63
FortiSwitch port tag name.
lldp-profile LLDP profile to be applied when using this policy. string Maximum
length: 63
qos-policy QoS policy to be applied when using this policy. string Maximum
length: 63
802-1x 802.1x security policy to be applied when using this string Maximum
policy. length: 31
vlan-policy VLAN policy to be applied when using this policy. string Maximum
length: 63
Option Description
disable Disable bouncing (administratively bring the link down, up) of a switch port
where this policy is applied.
enable Enable bouncing (administratively bring the link down, up) of a switch port
where this policy is applied.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
max-export- Configure flow max export packet size. integer Minimum value: 512
pkt-size 512 Maximum
value: 9216
sample-mode Configure sample mode for the flow tracking. option - perimeter
Option Description
local Set local mode which samples on the specific switch port.
perimeter Set perimeter mode which samples on all switch fabric ports and fortilink port
at the ingress.
device-ingress Set device -ingress mode which samples across all switch ports at the ingress.
sample-rate Configure sample rate for the perimeter and integer Minimum value: 512
device-ingress sampling. 0 Maximum
value: 99999
timeout- Configure flow session general timeout. integer Minimum value: 3600
general 60 Maximum
value: 604800
timeout-icmp Configure flow session ICMP timeout. integer Minimum value: 300
60 Maximum
value: 604800
timeout-max Configure flow session max timeout. integer Minimum value: 604800
60 Maximum
value: 604800
timeout-tcp Configure flow session TCP timeout. integer Minimum value: 3600
60 Maximum
value: 604800
timeout-tcp- Configure flow session TCP FIN timeout. integer Minimum value: 300
fin 60 Maximum
value: 604800
timeout-tcp- Configure flow session TCP RST timeout. integer Minimum value: 120
rst 60 Maximum
value: 604800
timeout-udp Configure flow session UDP timeout. integer Minimum value: 300
60 Maximum
value: 604800
config aggregates
ip IP address to group all matching traffic sessions to a ipv4- Not Specified 0.0.0.0
flow. classnet 0.0.0.0
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
access-vlan- Intra VLAN traffic behavior with loss of connection to the option - legacy
mode FortiGate.
Option Description
fail-open When connection to FortiGate is lost, traffic on the VLAN may continue directly
between end points.
fail-close When connection to FortiGate is lost, traffic between endpoints on the VLAN is
blocked.
link-down- Clear NAC and dynamic devices on switch ports on link option - enable
flush down event.
Option Description
disable Disable clearing NAC and dynamic devices on a switch port when link down
event happens.
Option Description
enable Enable clearing NAC and dynamic devices on a switch port when link down
event happens.
config nac-ports
onboarding- Default NAC Onboarding VLAN when NAC devices are string Maximum
vlan discovered. length: 15
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
disable Disable bouncing (administratively bring the link down, up) of a switch port
where a quarantined device was seen last.
enable Enable bouncing (administratively bring the link down, up) of a switch port
where a quarantined device was seen last.
default-virtual- Default VLAN for ports when added to the string Maximum
switch-vlan virtual-switch. length: 15
Option Description
hostname Hostname.
mode Mode.
description Description.
Option Description
ascii Allow user to choose values for circuit-id and remote-id. Format: cid=
[hostname,interface,mode,vlan,description] rid=
[hostname,xx:xx:xx:xx:xx:xx,ip]
Option Description
legacy Generate predefine fixed format for circuit-id and remote. Format:
cid=hostname-[<vlan:16><mod:8><port:8>].32bit, rid= [mac(0..6)].48bit
Option Description
hostname Hostname.
ip IP address.
Option Description
dhcp-snoop- Expiry time for DHCP snooping server integer Minimum value: 86400
client-db-exp database entries. 300 Maximum
value: 259200
Option Description
Option Description
Option Description
Option Description
Option Description
mac-aging- Time after which an inactive MAC is aged integer Minimum value: 300
interval out. 10 Maximum
value: 1000000
Option Description
mac-retention- Time in hours after which an inactive MAC integer Minimum value: 24
period is removed from client DB (0 = aged out 0 Maximum
based on mac-aging-interval). value: 168
mac-violation- Set timeout for Learning Limit Violations (0 integer Minimum value: 0
timer = disabled). 0 Maximum
value:
4294967295
Option Description
by-redirect Quarantined device traffic is redirected only to the FortiGate on the received
VLAN.
Option Description
enable Enable DNS resolution of the FortiSwitch unit's IP address with switch name.
disable Disable DNS resolution of the FortiSwitch unit's IP address with switch name.
update-user- Control which sources update the device option - mac-cache lldp
device user list. dhcp-snooping
l2-db l3-db
Option Description
dhcp-snooping Update from FortiSwitch DHCP snooping client and server databases.
Option Description
Option Description
description Configure the VLAN description to that of the FortiOS interface description if
available; otherwise use the interface name.
name Configure the VLAN description to that of the FortiOS interface name.
Option Description
config custom-command
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
query-interval Maximum time after which IGMP query will be sent. integer Minimum 125
value: 10
Maximum
value: 1200
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
default-vlan Default VLAN (native) assigned to all switch ports string Maximum _default
upon discovery. length: 63
nac-segment VLAN for NAC segment primary interface. string Maximum nac_segment
length: 63
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
auto-isl-auth- Auto inter-switch LAG macsec profile for encryption. string Maximum
macsec- length: 63
profile
auto-isl-auth- Auto inter-switch LAG authentication reauth period in integer Minimum 3600
reauth seconds. value: 180
Maximum
value: 3600
Option Description
Option Description
config custom-tlvs
Option Description
config med-network-policy
Option Description
enable Transmit this TLV if a VLAN has been addded to the port.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
tx-hold Number of tx-intervals before local LLDP data expires. integer Minimum 4
Packet TTL is tx-hold * tx-interval. value: 1
Maximum
value: 16
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
config address-civic
country The two-letter ISO 3166 country code in capital ASCII string Maximum
letters eg. US, CA, DK, DE. length: 47
config coordinates
altitude Plus or minus floating point number. For example, string Maximum
117.47. length: 15
Option Description
Option Description
latitude Floating point starting with +/- or ending with (N or S). string Maximum
For example, +/-16.67 or 16.67N. length: 15
longitude Floating point starting with +/- or ending with (N or S). string Maximum
For example, +/-26.789 or 26.789E. length: 15
config elin-number
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Configure MAC policy to be applied on the managed FortiSwitch devices through NAC device.
config switch-controller mac-policy
Description: Configure MAC policy to be applied on the managed FortiSwitch devices
through NAC device.
edit <name>
set bounce-port-link [disable|enable]
set count [disable|enable]
set description {string}
set fortilink {string}
set traffic-policy {string}
set vlan {string}
next
end
Option Description
disable Disable bouncing (administratively bring the link down, up) of a switch port
where this mac-policy is applied.
enable Enable bouncing (administratively bring the link down, up) of a switch port
where this mac-policy is applied.
Option Description
fortilink FortiLink interface for which this MAC policy belongs to. string Maximum
length: 15
traffic-policy Traffic policy to be applied when using this MAC policy. string Maximum
length: 63
vlan Ingress traffic VLAN assignment for the MAC address string Maximum
matching this MAC policy. length: 15
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
global Use global setting for DHCP snooping server access list.
enable Override global setting and enable DHCP server access list.
disable Override global setting and disable DHCP server access list.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config 802-1X-settings
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config custom-command
config dhcp-snooping-static-client
config igmp-snooping
Option Description
aging-time Maximum time to retain a multicast snooping entry for integer Minimum 300
which no packets have been seen. value: 15
Maximum
value: 3600
Option Description
proxy IGMP snooping proxy for the VLAN interface. option - global
Option Description
global Use global setting for IGMP snooping proxy on VLAN interface.
querier Enable/disable IGMP snooping querier for the VLAN option - disable
interface.
Option Description
config ip-source-guard
config binding-entry
config mirror
Option Description
Option Description
config ports
Option Description
1000full 1G full-duplex
auto Auto-negotiation.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
bandwidth Member selection based on largest total bandwidth of links of similar speed.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
both Enable flow control for both transmission and receive pause control frames.
Option Description
75% Back pressure state won't be cleared until bucket count falls below 75% of
pause threshold.
50% Back pressure state won't be cleared until bucket count falls below 50% of
pause threshold.
25% Back pressure state won't be cleared until bucket count falls below 25% of
pause threshold.
Option Description
storm-control- Switch controller storm control policy from string Maximum default
policy available options. length: 63
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
static Static aggregation, do not send and ignore any control messages.
Option Description
Option Description
Option Description
config dhcp-snoop-option82-override
config remote-log
Option Description
Option Description
Option Description
Option Description
config route-offload-router
config snmp-community
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config snmp-sysinfo
Option Description
config snmp-trap-threshold
config snmp-user
Option Description
Option Description
Option Description
Option Description
config static-mac
Option Description
Option Description
rate Rate in packets per second at which storm control integer Minimum 500
drops excess traffic. value: 0
Maximum
value:
10000000
Option Description
Option Description
Option Description
config stp-instance
Option Description
0 0.
4096 4096.
8192 8192.
12288 12288.
16384 16384.
20480 20480.
24576 24576.
28672 28672.
32768 32768.
36864 36864.
40960 40960.
45056 45056.
49152 49152.
53248 53248.
57344 57344.
61440 61440.
config stp-settings
local-override Enable to configure local STP settings that override option - disable
global STP settings.
Option Description
hello-time Period of time between successive STP frame Bridge integer Minimum 2
Protocol Data Units. value: 1
Maximum
value: 10
forward-time Period of time a port is in listening and learning state. integer Minimum 15
value: 4
Maximum
value: 30
max-age Maximum time before a bridge port saves its integer Minimum 20
configuration BPDU information. value: 6
Maximum
value: 40
max-hops Maximum number of hops between the root bridge and integer Minimum 20
the furthest bridge. value: 1
Maximum
value: 40
config switch-log
local-override Enable to configure local logging settings that override option - disable
global logging settings.
Option Description
Option Description
severity Severity of FortiSwitch logs that are added to the option - notification
FortiGate event log.
Option Description
config vlan
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
1sec 1 sec.
2sec 2 sec.
4sec 4 sec.
8sec 8 sec.
16sec 16 sec.
32sec 32 sec.
Option Description
Option Description
l2-mcast L2 multicast.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
config map
Option Description
EF DSCP EF.
Option Description
Option Description
flash Flash.
immediate Immediate.
priority Priority.
routine Routine.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
config cos-queue
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
auth-fail-vlan Enable to allow limited access to clients that cannot option - disable
authenticate.
Option Description
authserver- Configure timeout option for the tagged VLAN which option - disable
timeout- allows limited access when the authentication server is
tagged unavailable.
Option Description
lldp-voice LLDP voice timeout for the tagged VLAN on this interface.
authserver- Tagged VLAN name for which the timeout option is string Maximum
timeout- applied to (only one VLAN ID). length: 15
tagged-vlanid
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable the capability to apply the EAP/MAB frame VLAN to the port native
VLAN.
enable Enable the capability to apply the EAP/MAB frame VLAN to the port native
VLAN.
guest-vlan Enable the guest VLAN feature to allow limited access option - disable
to non-802.1X-compliant clients.
Option Description
Option Description
Option Description
Option Description
radius- Enable to override the global RADIUS session timeout. option - disable
timeout-
overwrite
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Configure allowaccess list for mgmt and internal interfaces on managed FortiSwitch units.
config switch-controller security-policy local-access
Description: Configure allowaccess list for mgmt and internal interfaces on managed
FortiSwitch units.
edit <name>
set internal-allowaccess {option1}, {option2}, ...
set mgmt-allowaccess {option1}, {option2}, ...
next
end
internal- Allowed access on the switch internal interface. option - https ping
allowaccess ssh
Option Description
Option Description
mgmt- Allowed access on the switch management interface. option - https ping
allowaccess ssh
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
enable Enable storm control for broadcast traffic to drop packets which exceed
configured rate limits.
disable Disable storm control for broadcast traffic to allow all packets.
rate Threshold rate in packets per second at which storm integer Minimum 500
traffic is controlled in override mode. value: 0
Maximum
value:
10000000
Option Description
override Override global and switch level storm control to use port level configuration.
disabled Disable storm control on the port entirely overriding global and switch level
storm control.
Option Description
enable Enable storm control for unknown multicast traffic to drop packets which
exceed configured rate limits.
disable Disable storm control for unknown multicast traffic to allow all packets.
Option Description
enable Enable storm control for unknown unicast traffic to drop packets which exceed
configured rate limits.
disable Disable storm control for unknown unicast traffic to allow all packets.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
rate Rate in packets per second at which storm control drops integer Minimum 500
excess traffic. value: 0
Maximum
value:
10000000
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
forward-time Period of time a port is in listening and learning state. integer Minimum 15
value: 4
Maximum
value: 30
hello-time Period of time between successive STP frame Bridge integer Minimum 2
Protocol Data Units. value: 1
Maximum
value: 10
max-age Maximum time before a bridge port expires its integer Minimum 20
configuration BPDU information. value: 6
Maximum
value: 40
max-hops Maximum number of hops between the root bridge and integer Minimum 20
the furthest bridge. value: 1
Maximum
value: 40
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Configure FortiSwitch logging (logs are transferred to and inserted into FortiGate event log).
config switch-controller switch-log
Description: Configure FortiSwitch logging (logs are transferred to and inserted into
FortiGate event log).
set severity [emergency|alert|...]
set status [enable|disable]
end
severity Severity of FortiSwitch logs that are added to the option - notification
FortiGate event log.
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
caputp-echo- Echo interval for the caputp echo requests from swtp. integer Minimum 30
interval value: 8
Maximum
value: 600
caputp-max- Maximum retransmission count for the caputp tunnel integer Minimum 5
retransmit packets. value: 0
Maximum
value: 64
dynamic- Periodic time interval to run Dynamic port policy integer Minimum 60
periodic- engine. value: 5
interval Maximum
value: 180
iot-holdoff MAC entry's creation time. Time must be greater than integer Minimum 5
this value for an entry to be created. value: 0
Maximum
value:
10080
iot-mac-idle MAC entry's idle time. MAC entry is removed after this integer Minimum 1440
value. value: 0
Maximum
value:
10080
Option Description
Option Description
compatible Least restrictive. Supports the widest variety of hardware and software
versions.
strict Highest level of security. Supports only the latest generation of hardware and
latest software version.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
guaranteed- Guaranteed burst size in bytes (max value = integer Minimum 45000
burst 4294967295). value: 0
Maximum
value:
4294967295
maximum- Maximum burst size in bytes (max value = integer Minimum 67500
burst 4294967295). value: 0
Maximum
value:
4294967295
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
config target-ip
config target-mac
config target-port
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Configure VLAN policy to be applied on the managed FortiSwitch ports through dynamic-port-policy.
config switch-controller vlan-policy
Description: Configure VLAN policy to be applied on the managed FortiSwitch ports
through dynamic-port-policy.
edit <name>
set allowed-vlans <vlan-name1>, <vlan-name2>, ...
set allowed-vlans-all [enable|disable]
set description {string}
set discard-mode [none|all-untagged|...]
set fortilink {string}
set untagged-vlans <vlan-name1>, <vlan-name2>, ...
set vlan {string}
next
end
allowed-vlans Allowed VLANs to be applied when using this VLAN string Maximum
<vlan- policy. length: 79
name> VLAN name.
allowed- Enable/disable all defined VLANs when using this VLAN option - disable
vlans-all policy.
Option Description
discard-mode Discard mode to be applied when using this VLAN option - none
policy.
Option Description
fortilink FortiLink interface for which this VLAN policy belongs to. string Maximum
length: 15
untagged- Untagged VLANs to be applied when using this VLAN string Maximum
vlans <vlan- policy. length: 79
name> VLAN name.
vlan Native VLAN to be applied when using this VLAN policy. string Maximum
length: 15
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate 60E DSLJ,
FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E,
FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate
80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE,
FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate
91E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate VM64.
3G MODEM custom.
config system 3g-modem custom
Description: 3G MODEM custom.
edit <id>
set class-id {user}
set init-string {string}
set model {string}
set modeswitch-string {string}
set product-id {user}
set vendor {string}
set vendor-id {user}
next
end
class-id USB interface class in hexadecimal format (00-ff). user Not Specified
modeswitch- USB modeswitch arguments. For example: '-v 1410 - string Maximum
string p 9030 -V 1410 -P 9032 -u 3'. length: 127
Option Description
Option Description
none No access.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
Option Description
none No access.
Option Description
none No access.
Option Description
Option Description
Option Description
none No access.
vpngrp Administrator access to IPsec, SSL, PPTP, and L2TP option - none
VPN.
Option Description
none No access.
Option Description
none No access.
wifi Administrator access to the WiFi controller and Switch option - none
controller.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
config netgrp-permission
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
config sysgrp-permission
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
config utmgrp-permission
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
interface Interface(s) on which the ACME client will listen for string Maximum
<interface- challenges. length: 79
name> Interface name.
source-ip Source IPv4 address used to connect to the ACME ipv4- Not 0.0.0.0
server. address Specified
source-ip6 Source IPv6 address used to connect to the ACME ipv6- Not ::
server. address Specified
Option Description
accprofile Access profile for this administrator. Access profiles string Maximum
control administrator access to FortiGate features. length: 35
Option Description
Option Description
Option Description
Option Description
ip6-trusthost1 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost10 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost2 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost3 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost4 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost5 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost6 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost7 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost8 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost9 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
Option Description
peer-group Name of peer group defined under config user group string Maximum
which has PKI members. Used for peer certificate length: 35
authentication (for HTTPS admin access).
Option Description
remote-group User group name used for remote auth. string Maximum
length: 35
sms-custom- Custom SMS server to send SMS messages to. string Maximum
server length: 35
sms-server Send SMS messages using the FortiGuard SMS option - fortiguard
server or a custom server.
Option Description
ssh-certificate Select the certificate to be used by the FortiGate for string Maximum
authentication with an SSH client. length: 35
trusthost1 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost10 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost2 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost3 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost4 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost5 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost6 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost7 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost8 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost9 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
Option Description
Option Description
Option Description
vdom <name> Virtual domain(s) that the administrator can access. string Maximum
Virtual domain name. length: 79
vdom-override Enable to use the names of VDOMs provided by the option - disable
remote authentication server to control the VDOMs
that this administrator can access.
Option Description
Option Description
This command is available for model(s): FortiGate 100F, FortiGate 101F, FortiGate 200F,
FortiGate 201F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 60F, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 80F-POE, FortiGate
80F, FortiGate 81F-POE, FortiGate 81F, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 60F, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R
3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 1100E,
FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F,
FortiGate 2000E, FortiGate 200E, FortiGate 201E, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E,
FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate
60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 61E, FortiGate
800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 81E-POE,
FortiGate 81E, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 61E.
affinity- Affinity setting (64-bit hexadecimal value in the format string Maximum
cpumask of 0xxxxxxxxxxxxxxxxx). length: 127
This command is available for model(s): FortiGate 100F, FortiGate 101F, FortiGate 200F,
FortiGate 201F, FortiGate 60F, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81F-POE, FortiGate 81F, FortiGate VM64, FortiGateRugged
60F 3G4G, FortiGateRugged 60F, FortiWiFi 60F, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 1100E,
FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F,
FortiGate 2000E, FortiGate 200E, FortiGate 201E, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate 60E DSLJ,
FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 61E, FortiGate 800D,
FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 81E-POE, FortiGate
81E, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 61E.
Option Description
rxqid ID of the receive queue (when the interface has integer Minimum 0
multiple queues) on which to perform packet value: 0
redistribution (255 = all queues). Maximum
value: 255
Configure alarm.
config system alarm
Description: Configure alarm.
set audible [enable|disable]
config groups
Description: Alarm groups.
edit <id>
set period {integer}
set admin-auth-failure-threshold {integer}
set admin-auth-lockout-threshold {integer}
set user-auth-failure-threshold {integer}
set user-auth-lockout-threshold {integer}
set replay-attempt-threshold {integer}
set self-test-failure-threshold {integer}
set log-full-warning-threshold {integer}
set encryption-failure-threshold {integer}
set decryption-failure-threshold {integer}
config fw-policy-violations
Description: Firewall policy violations.
edit <id>
set threshold {integer}
Option Description
Option Description
config groups
config fw-policy-violations
Option Description
config trusthost
Option Description
auto-install- Enable/disable auto install the config in USB disk. option - disable
config
Option Description
auto-install- Enable/disable auto install the image in USB disk. option - disable
image
Option Description
default- Default config file name in USB disk. string Maximum fgt_
config-file length: 127 system.conf
default- Default image file name in USB disk. string Maximum image.out
image-file length: 127
Option Description
timeout Maximum running time for this script in seconds (0 = no integer Minimum 0
timeout). value: 0
Maximum
value: 300
accprofile Access profile for CLI script action to access string Maximum
FortiGate features. length: 35
Option Description
Option Description
Option Description
Option Description
Option Description
enable CLI script executes on all FortiGate units in the Security Fabric.
disable CLI script executes only on the FortiGate unit that the stitch is triggered.
Option Description
enable Enable use of your FortiCare email address as the email-to address.
disable Disable use of your FortiCare email address as the email-to address.
Option Description
text Plaintext.
Option Description
post POST.
put PUT.
get GET.
patch PATCH.
delete DELETE.
minimum- Limit execution to no more than once in this interval integer Minimum 0
interval (in seconds). value: 0
Maximum
value:
2592000
Option Description
http HTTP.
https HTTPS.
Option Description
Option Description
timeout Maximum running time for this script in seconds (0 = integer Minimum 0
no timeout). value: 0
Maximum
value: 300
Option Description
config http-headers
Automation destinations.
config system automation-destination
Description: Automation destinations.
edit <name>
Option Description
Automation stitches.
config system automation-stitch
Description: Automation stitches.
edit <name>
config actions
Description: Configure stitch actions.
edit <id>
set action {string}
set delay {integer}
set required [enable|disable]
next
end
set description {var-string}
set destination <name1>, <name2>, ...
set status [enable|disable]
set trigger {string}
next
end
Option Description
config actions
Option Description
Option Description
Option Description
ha-failover HA failover.
Option Description
Option Description
trigger- Trigger date and time (YYYY-MM-DD HH:MM:SS). datetime Not 0000-00-00
datetime Specified 00:00:00
Option Description
Option Description
Option Description
sunday Sunday.
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
thursday Thursday.
friday Friday.
saturday Saturday.
vdom <name> Virtual domain(s) that this trigger is valid for. string Maximum
Virtual domain name. length: 79
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 2500E, FortiGate 400E Bypass, FortiGate
800D, FortiGate 80F Bypass, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiGateRugged 70F 3G4G, FortiGateRugged 70F.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100F,
FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F, FortiGate 300E,
FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F, FortiGate 3201F,
FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3500F,
FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3700F,
FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E, FortiGate 400F,
FortiGate 401E, FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F,
FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E,
FortiGate 81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate
VM64, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi
60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-
POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
auto-recover * Automatically recover from bypass mode after system option - enable
reboot.
Option Description
enable Recover interfaces from bypass mode. The actual mode is determined by
poweron-bypass setting.
Option Description
2 2 second
4 4 second
6 6 second
8 8 second
10 10 second
12 12 second
14 14 second
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
default High strength algorithms and medium-strength 128-bit key length algorithms.
fmg-source-ip IPv4 source address that this FortiGate uses when ipv4- Not 0.0.0.0
communicating with FortiManager. address Specified
fmg-source-ip6 IPv6 source address that this FortiGate uses when ipv6- Not ::
communicating with FortiManager. address Specified
Option Description
Option Description
enable Enable inclusion of public FortiGuard servers in the override server list.
disable Disable inclusion of public FortiGuard servers in the override server list.
Option Description
Option Description
ltefw-upgrade- Schedule next LTE firmware upgrade time (Local string Maximum
time * Time). Format: YYYY-MM-DD HH:MM:SS length: 35
Option Description
backup Manage and configure this FortiGate locally and back up its configuration to
FortiManager.
Option Description
Option Description
Option Description
fortimanager FortiManager.
use-elbc-vdom Enable/disable use of special ELBC config sync VDOM option - disable
* to connect to FortiManager.
Option Description
enable enable
disable disable
vdom Virtual domain (VDOM) name to use when string Maximum root
communicating with FortiManager. length: 31
config server-list
Option Description
Option Description
fqdn FQDN.
Configure console.
config system console
Description: Configure console.
set fortiexplorer [enable|disable]
set login [enable|disable]
set output [standard|more]
end
Option Description
Option Description
Option Description
Add this FortiGate to a Security Fabric or set up a new Security Fabric on this FortiGate.
config system csf
Description: Add this FortiGate to a Security Fabric or set up a new Security Fabric on
this FortiGate.
set accept-auth-by-cert [disable|enable]
set authorization-request-type [serial|certificate]
set certificate {string}
set configuration-sync [default|local]
set downstream-access [enable|disable]
set downstream-accprofile {string}
Option Description
Option Description
Option Description
Option Description
enable Enable downstream device access to this device's configuration and data.
disable Disable downstream device access to this device's configuration and data.
Option Description
local Global CMDB objects will not be synchronized to and from this device.
Option Description
file-quota- Warn when the set percentage of quota has been integer Minimum 90
warning used. value: 1
Maximum
value: 99
Option Description
group-password Security Fabric group password. All FortiGates in a password Not Specified
Security Fabric must have the same group
password.
Option Description
Option Description
source-ip Source IP address for communication with the ipv4- Not Specified 0.0.0.0
upstream FortiGate. address
Option Description
Option Description
upstream-port The port number to use to communicate with the integer Minimum 8013
FortiGate upstream from this FortiGate in the value: 1
Security Fabric. Maximum
value: 65535
config fabric-connector
Option Description
vdom <name> Virtual domains that the connector has access to. If string Maximum
none are set, the connector will only have access to length: 79
the VDOM that it joins the Security Fabric through.
Virtual domain name.
config trusted-list
Option Description
Option Description
Option Description
Configure DDNS.
config system ddns
Description: Configure DDNS.
edit <ddnsid>
set addr-type [ipv4|ipv6]
set bound-ip {string}
set clear-text [disable|enable]
set ddns-auth [disable|tsig]
set ddns-domain {string}
set ddns-key {password_aes256}
set ddns-keyname {string}
set ddns-password {password}
set ddns-server [dyndns.org|dyns.net|...]
set ddns-server-addr <addr1>, <addr2>, ...
set ddns-sn {string}
set ddns-ttl {integer}
set ddns-username {string}
set ddns-zone {string}
set monitor-interface <interface-name1>, <interface-name2>, ...
set server-type [ipv4|ipv6]
set ssl-certificate {string}
set update-interval {integer}
set use-public-ip [disable|enable]
next
end
Option Description
Option Description
Option Description
Option Description
dyns.net www.dyns.net
tzo.com rh.tzo.com
Option Description
dipdns.net dipdnsserver.dipdns.com
now.net.cn ip.todayisp.com
dhs.org members.dhs.org
easydns.com members.easydns.com
noip.com dynupdate.no-ip.com
Option Description
ssl-certificate Name of local certificate for SSL connections. string Maximum Fortinet_
length: 35 Factory
Option Description
default- Default gateway for dedicated management interface. ipv4- Not 0.0.0.0
gateway address Specified
Option Description
Option Description
Option Description
Option Description
Option Description
none No failure.
version- An image matching the device and version could not be found.
unavailable
ha-reboot- Serial number of the FortiGate unit that will control the string Maximum
controller reboot process for the federated upgrade of the HA length: 79
cluster.
Option Description
device- The image downloads are complete, but one or more devices have
disconnected disconnected.
cancelled The upgrade was cancelled due to the tree not being ready.
Option Description
Option Description
dns-service Options for assigning DNS servers to DHCPv6 clients. option - specify
Option Description
domain Domain name suffix for the IP addresses that the string Maximum
DHCP server assigns to clients. length: 35
Option Description
Option Description
Option Description
Option Description
subnet Subnet or subnet-id if the IP mode is delegated. ipv6-prefix Not Specified ::/0
config prefix-range
Option Description
auto-managed- Enable/disable use of this DHCP server once this option - enable
status interface has been assigned an IP address from
FortiIPAM.
Option Description
disable Disable use of this DHCP server once this interface has been assigned an IP
address from FortiIPAM.
enable Enable use of this DHCP server once this interface has been assigned an IP
address from FortiIPAM.
Option Description
Option Description
Option Description
default- Default gateway IP address assigned by the DHCP ipv4-address Not Specified 0.0.0.0
gateway server.
Option Description
Option Description
local IP address of the interface the DHCP server is added to becomes the client's
DNS server IP address.
domain Domain name suffix for the IP addresses that the string Maximum
DHCP server assigns to clients. length: 35
filename Name of the boot file on the TFTP server. string Maximum
length: 127
Option Description
Option Description
ipsec-lease- DHCP over IPsec leases expire this many seconds integer Minimum 60
hold after tunnel down (0 to disable forced-expiry). value: 0
Maximum
value:
8640000
mac-acl- MAC access control default action (allow or block option - assign
default-action assigning IP settings).
Option Description
assign Allow the DHCP server to assign IP settings to clients on the MAC access
control list.
block Block the DHCP server from assigning IP settings to clients on the MAC
access control list.
netmask Netmask assigned by the DHCP server. ipv4-netmask Not Specified 0.0.0.0
next-server IP address of a server (for example, a TFTP sever) ipv4-address Not Specified 0.0.0.0
that DHCP clients can download a boot file from.
Option Description
local IP address of the interface the DHCP server is added to becomes the client's
NTP server IP address.
Option Description
Option Description
Option Description
Option Description
timezone- Options for the DHCP server to set the client's time option - disable
option zone.
Option Description
Option Description
Option Description
local IP address of the interface the DHCP server is added to becomes the client's
WiFi Access Controller IP address.
wifi-ac1 WiFi Access Controller 1 IP address (DHCP option ipv4-address Not Specified 0.0.0.0
138, RFC 5417).
wifi-ac2 WiFi Access Controller 2 IP address (DHCP option ipv4-address Not Specified 0.0.0.0
138, RFC 5417).
wifi-ac3 WiFi Access Controller 3 IP address (DHCP option ipv4-address Not Specified 0.0.0.0
138, RFC 5417).
config exclude-range
Option Description
Option Description
lease-time Lease time in seconds, 0 means default lease time. integer Minimum 0
value: 300
Maximum
value:
8640000
config ip-range
Option Description
Option Description
lease-time Lease time in seconds, 0 means default lease time. integer Minimum 0
value: 300
Maximum
value:
8640000
config options
Option Description
Option Description
Option Description
config reserved-address
Option Description
mac MAC address of the client that will get the mac- Not Specified 00:00:00:00:00:00
reserved IP address. address
Option Description
assign Configure the client with this MAC address like any other client.
block Block the DHCP server from assigning IP settings to the client with this MAC
address.
reserved Assign the reserved IP address to the client with this MAC address.
Option Description
circuit-id Option 82 circuit-ID of the client that will get string Maximum
the reserved IP address. length: 312
Option Description
remote-id Option 82 remote-ID of the client that will get string Maximum
the reserved IP address. length: 312
This command is available for model(s): FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiGateRugged 70F 3G4G, FortiGateRugged 70F.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100F,
FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate
81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
Option Description
Option Description
Option Description
Option Description
Option Description
contact Email address of the administrator for this zone. You string Maximum host
can specify only the username, such as admin or the length: 255
full email address, such as [email protected] When
using only a username, the domain of the email will
be this zone.
ip-primary IP address of primary DNS server. Entries in this ipv4- Not Specified 0.0.0.0
primary DNS server and imported into the DNS address-
zone. any
primary-name Domain name of the default DNS server for this string Maximum dns
zone. length: 255
source-ip Source IP for forwarding to DNS server. ipv4- Not Specified 0.0.0.0
address
source-ip6 IPv6 source IP address for forwarding to DNS ipv6- Not Specified ::
server. address
Option Description
ttl Default time-to-live value for the entries of this DNS integer Minimum 86400
zone. value: 0
Maximum
value:
2147483647
Option Description
secondary Secondary DNS zone, to import entries from other DNS zones.
view Zone view (public to serve public clients, shadow to option - shadow
serve internal clients).
Option Description
config dns-entry
Option Description
Option Description
A Host type.
Option Description
Option Description
Option Description
Option Description
Configure DNS.
config system dns
Description: Configure DNS.
set alt-primary {ipv4-address}
set alt-secondary {ipv4-address}
set cache-notfound-responses [disable|enable]
set dns-cache-limit {integer}
set dns-cache-ttl {integer}
set domain <domain1>, <domain2>, ...
set fqdn-cache-ttl {integer}
set fqdn-max-refresh {integer}
set fqdn-min-refresh {integer}
set interface {string}
set interface-select-method [auto|sdwan|...]
set ip6-primary {ipv6-address}
alt-primary Alternate primary DNS server. This is not used as a ipv4- Not Specified 0.0.0.0
failover DNS server. address
alt-secondary Alternate secondary DNS server. This is not used ipv4- Not Specified 0.0.0.0
as a failover DNS server. address
cache- Enable/disable response from the DNS server when option - disable
notfound- a record is not in cache.
responses
Option Description
dns-cache-limit Maximum number of records in the DNS cache. integer Minimum 5000
value: 0
Maximum
value:
4294967295
dns-cache-ttl Duration in seconds that the DNS cache retains integer Minimum 1800
information. value: 60
Maximum
value: 86400
fqdn-max- FQDN cache maximum refresh time in seconds. integer Minimum 3600
refresh value: 3600
Maximum
value: 86400
Option Description
Option Description
disable Disable.
Option Description
Option Description
source-ip IP address used by the DNS server as its source IP. ipv4- Not Specified 0.0.0.0
address
ssl-certificate Name of local certificate for SSL connections. string Maximum Fortinet_
length: 35 Factory
Configure DNS64.
config system dns64
Description: Configure DNS64.
set always-synthesize-aaaa-record [enable|disable]
set dns64-prefix {ipv6-prefix}
set status [enable|disable]
end
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
forticontroller FortiController.
dual- Dual-FortiController.
forticontroller
Configure the email server used by the FortiGate various things. For example, for sending email messages to users to
support user authentication features.
config system email-server
Description: Configure the email server used by the FortiGate various things. For
example, for sending email messages to users to support user authentication features.
set authenticate [enable|disable]
set interface {string}
set interface-select-method [auto|sdwan|...]
set password {password}
set port {integer}
set security [none|starttls|...]
set server {string}
set source-ip {ipv4-address}
set source-ip6 {ipv6-address}
set ssl-min-proto-version [default|SSLv3|...]
Option Description
Option Description
Option Description
none None.
starttls STARTTLS.
smtps SSL/TLS.
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
full Check server certificate and verify the domain matches in the server
certificate.
source-ip Source IPv4 address used to communicate with ipv4- Not 0.0.0.0
server. address Specified
Option Description
Option Description
Option Description
feed FortiGate unit will pull update from the external resource.
push External Resource update is pushed to the FortiGate unit through the
FortiGate unit's RESTAPI/CLI.
loopback- IPv4 address and subnet mask for hub's loopback ipv4- Not Specified 0.0.0.0
address-block address, syntax: X.X.X.X/24. classnet- 0.0.0.0
host
Option Description
Option Description
Option Description
Option Description
config advertised-subnets
Option Description
overlay- IPv4 address and subnet mask for the overlay tunnel , ipv4- Not Specified 0.0.0.0
tunnel-block syntax: X.X.X.X/24. classnet- 0.0.0.0
host
remote-gw IP address of the hub gateway (Set by hub). ipv4- Not Specified 0.0.0.0
address-
any
overlay-policy The overlay policy to allow ADVPN thru traffic. integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none No failure.
version- An image matching the device and version could not be found.
unavailable
ha-reboot- Serial number of the FortiGate unit that will control the string Maximum
controller reboot process for the federated upgrade of the HA length: 79
cluster.
next-path- The index of the next image to upgrade to. integer Minimum 0
index value: 0
Maximum
value: 10
Option Description
device- The image downloads are complete, but one or more devices have
disconnected disconnected.
cancelled The upgrade was cancelled due to the tree not being ready.
config known-ha-members
config node-list
Option Description
Option Description
coordinating- Serial number of the FortiGate unit that controls this string Maximum
fortigate device. length: 79
Option Description
Option Description
Option Description
Option Description
antispam- Interval of time between license checks for the integer Minimum 4294967295
license FortiGuard antispam contract. value: 0
Maximum
value:
4294967295
anycast-sdns- IP address of the FortiGuard anycast DNS rating ipv4- Not Specified 0.0.0.0
server-ip server. address
anycast-sdns- Port to connect to on the FortiGuard anycast DNS integer Minimum 853
server-port rating server. value: 1
Maximum
value: 65535
Option Description
auto- Allowed day. Disallow any day of the week to use option -
firmware- auto-firmware-upgrade-delay instead, which waits
upgrade-day for designated days before installing an automatic
patch-level firmware upgrade.
Option Description
sunday Sunday.
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
thursday Thursday.
friday Friday.
saturday Saturday.
auto- End time in the designated time window for integer Minimum 4
firmware- automatic patch-level firmware upgrade from value: 0
upgrade-end- FortiGuard in 24 hour time. When the end time is Maximum
hour smaller than the start time, the end time is value: 23
interpreted as the next day. The actual upgrade
time is selected randomly within the time window.
auto- Start time in the designated time window for integer Minimum 1
firmware- automatic patch-level firmware upgrade from value: 0
upgrade-start- FortiGuard in 24 hour time. The actual upgrade Maximum
hour time is selected randomly within the time window. value: 23
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
outbreak- Interval of time between license checks for integer Minimum 4294967295
prevention- FortiGuard Virus Outbreak Prevention contract. value: 0
license Maximum
value:
4294967295
Option Description
Option Description
Option Description
proxy-server- Port used to communicate with the proxy server. integer Minimum 0
port value: 0
Maximum
value: 65535
Option Description
Option Description
include-question- Include DNS question section in the FortiGuard DNS setup message.
section
sdns-server- IP address of the FortiGuard DNS rating server. user Not Specified
ip
source-ip Source IPv4 address used to communicate with ipv4- Not Specified 0.0.0.0
FortiGuard. address
source-ip6 Source IPv6 address used to communicate with ipv6- Not Specified ::
FortiGuard. address
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
webfilter- Time-to-live for web filter cache entries in integer Minimum 3600
cache-ttl seconds. value: 300
Maximum
value: 86400
Option Description
webfilter- Interval of time between license checks for the integer Minimum 4294967295
license FortiGuard web filter contract. value: 0
Maximum
value:
4294967295
Configure FortiNDR.
config system fortindr
Description: Configure FortiNDR.
set interface {string}
set interface-select-method [auto|sdwan|...]
set source-ip {string}
set status [disable|enable]
end
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Configure FortiSandbox.
config system fortisandbox
Description: Configure FortiSandbox.
set email {string}
set enc-algorithm [default|high|...]
set forticloud [enable|disable]
set inline-scan [enable|disable]
set interface {string}
set interface-select-method [auto|sdwan|...]
set server {string}
set source-ip {string}
set ssl-min-proto-version [default|SSLv3|...]
set status [enable|disable]
end
enc-algorithm Configure the level of SSL protection for secure option - default
communication with FortiSandbox.
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
Option Description
Option Description
server-cert Name of the server certificate to be used for SSL. string Maximum Fortinet_
length: 35 GUI_Server
server-ip IPv4 address of FortiToken Mobile push services server ipv4- Not 0.0.0.0
(format: xxx.xxx.xxx.xxx). address Specified
server-port Port to communicate with FortiToken Mobile push integer Minimum 4433
services server. value: 1
Maximum
value:
65535
Option Description
ip-version IP version to use for the GENEVE interface and so for option - ipv4-unicast
communication over the GENEVE. IPv4 or IPv6
unicast.
Option Description
remote-ip IPv4 address of the GENEVE interface on the device at ipv4- Not 0.0.0.0
the remote end of the GENEVE. address Specified
remote-ip6 IPv6 IP address of the GENEVE interface on the device ipv6- Not ::
at the remote end of the GENEVE. address Specified
Option Description
Configure geographical location mapping for IP address(es) to override mappings from FortiGuard.
config system geoip-override
Description: Configure geographical location mapping for IP address(es) to override
mappings from FortiGuard.
edit <name>
set country-id {string}
set description {string}
config ip-range
Description: Table of IP ranges assigned to country.
edit <id>
set start-ip {ipv4-address}
set end-ip {ipv4-address}
next
end
config ip6-range
Description: Table of IPv6 ranges assigned to country.
edit <id>
set start-ip {ipv6-address}
set end-ip {ipv6-address}
next
end
config ip-range
start-ip Starting IP address, inclusive, of the address range ipv4- Not 0.0.0.0
(format: xxx.xxx.xxx.xxx). address Specified
end-ip Ending IP address, inclusive, of the address range ipv4- Not 0.0.0.0
(format: xxx.xxx.xxx.xxx). address Specified
config ip6-range
admin-ble-button * press the BLE button can enable BLE option - enable
function
Option Description
Option Description
Option Description
Option Description
enable Admin users must provide a valid certificate when PKI is enabled for
HTTPS admin access.
Option Description
Option Description
DHE Ban the use of cipher suites using authenticated ephemeral DH key
agreement.
ECDHE Ban the use of cipher suites using authenticated ephemeral ECDH key
agreement.
AES Ban the use of cipher suites using either 128 or 256 bit AES.
AESGCM Ban the use of cipher suites using AES in Galois Counter Mode (GCM).
CAMELLIA Ban the use of cipher suites using either 128 or 256 bit CAMELLIA.
Option Description
Option Description
admin-reset-button * Press the reset button can reset to factory option - enable
default.
Option Description
Option Description
Option Description
enable Enable SCP support for system configuration backup, restore, and
firmware file upload.
disable Disable SCP support for system configuration backup, restore, and
firmware file upload.
admin-server-cert Server certificate that the FortiGate uses string Maximum Fortinet_GUI_
for HTTPS administrative connections. length: 35 Server
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
auth-cert Server certificate that the FortiGate uses string Maximum Fortinet_
for HTTPS firewall authentication length: 35 Factory
connections.
Option Description
Option Description
Option Description
Option Description
Option Description
pass Bypass the antivirus system when memory is low. Antivirus scanning
resumes when the low memory condition is resolved.
off Stop accepting new AV sessions when entering conserve mode, but
continue to process current active sessions.
Option Description
Option Description
cfg-revert-timeout Time-out for reverting to the last saved integer Minimum 600
configuration.. value: 10
Maximum
value:
4294967295
Option Description
revert Manually save config and revert the config when timeout.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
device-idle-timeout Time in seconds that a device must be idle integer Minimum 300
to automatically log the device user out.. value: 30
Maximum
value:
31536000
Option Description
Option Description
enable Enable early TCP NPU session in order to guarantee packet order of 3-
way handshake.
disable Disable early TCP NPU session in order to guarantee packet order of 3-
way handshake.
Option Description
extender-controller- Configure reserved network subnet for ipv4- Not Specified 10.252.0.1
reserved-network managed LAN extension FortiExtender classnet- 255.255.0.0
units. This is available when the host
FortiExtender daemon is running.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable VIP and ZTNA server integration with the FortiGSLB cloud
service.
enable Enable VIP and ZTNA server integration with the FortiGSLB cloud
service.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
yyyy/MM/dd Year/Month/Day.
dd/MM/yyyy Day/Month/Year.
Option Description
MM/dd/yyyy Month/Day/Year.
yyyy-MM-dd Year-Month-Day.
dd-MM-yyyy Day-Month-Year.
MM-dd-yyyy Month-Day-Year.
gui-date-time-source Source from which the FortiGate GUI uses option - system
to display date and time entries.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
hyper-scale-vdom- Number of VDOMs for hyper scale license. integer Minimum 250
num * value: 1
Maximum
value: 250
Option Description
Option Description
auto auto
Option Description
mini Small sized Internet Service database with very limited IP addresses.
ip-src-port-range IP source port range used for traffic user Not Specified 1024-25000
originating from the FortiGate unit.
Option Description
ipsec-ha-seqjump- ESP jump ahead rate (1G - 10G pps integer Minimum 10
rate equivalent). value: 1
Maximum
value: 10
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
english English.
french French.
spanish Spanish.
portuguese Portuguese.
japanese Japanese.
korean Korean.
Option Description
Option Description
Option Description
Option Description
enable Enable logging the event of a single CPU core reaching CPU usage
threshold.
disable Disable logging the event of a single CPU core reaching CPU usage
threshold.
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable use of the admin-sport setting for the management port.
disable Disable use of the admin-sport setting for the management port.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
traffic Proxy keep-alive timeout begins after traffic has not been received.
Option Description
re- Proxy keep-alive timeout begins when the user was authenticated.
authentication
proxy-re- The time limit that users must re- integer Minimum 30
authentication-time authenticate if proxy-keep-alive-mode is value: 1
set to re-authenticate (1 - 86400 sec, Maximum
default=30s. value: 86400
Option Description
Option Description
Option Description
cubic Cubic.
bbr BBR.
bbr2 BBR2.
reno Reno.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable detection of those special format files when using Data Loss
Prevention.
enable Enable detection of those special format files when using Data Loss
Prevention.
Option Description
ssd-trim-freq * How often to run SSD Trim. SSD Trim option - weekly
prevents SSD drive data loss by finding
and isolating errors.
Option Description
ssd-trim-hour * Hour of the day on which to run SSD Trim. integer Minimum 1
value: 0
Maximum
value: 23
Option Description
sunday Sunday
monday Monday
tuesday Tuesday
wednesday Wednesday
thursday Thursday
friday Friday
saturday Saturday
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
Option Description
Option Description
Option Description
switch-controller- Configure reserved network subnet for ipv4- Not Specified 10.255.0.1
reserved-network * managed switches. This is available when classnet- 255.255.0.0
the switch controller is enabled. host
Option Description
Option Description
Option Description
tos IP TOS.
Option Description
Option Description
Option Description
restricted Send ARPs for the first 8192 addresses in VIP range.
Option Description
Option Description
wad-restart-end-time WAD workers daily restart end time user Not Specified
(hh:mm).
Option Description
wad-restart-start- WAD workers daily restart time (hh:mm). user Not Specified
time
Option Description
Option Description
Option Description
wireless-controller- Port used for the control channel in integer Minimum 5246
port wireless controller mode. value: 1024
Maximum
value: 49150
Option Description
split-mode The configuration mode for the split port interface. option - disable
Option Description
Option Description
Option Description
Option Description
diffservcode DiffServ setting to be applied to GRE tunnel outer IP user Not Specified
header.
Option Description
Option Description
key-inbound * Require received GRE packets contain this key. integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
Option Description
Option Description
Configure HA monitor.
config system ha-monitor
Description: Configure HA monitor.
set monitor-vlan [enable|disable]
set vlan-hb-interval {integer}
set vlan-hb-lost-threshold {integer}
end
Option Description
Configure HA.
config system ha
Description: Configure HA.
set arps {integer}
set arps-interval {integer}
set authentication [enable|disable]
set cpu-threshold {user}
set encryption [enable|disable]
set evpn-ttl {integer}
set failover-hold-time {integer}
set ftp-proxy-threshold {user}
set gratuitous-arps [enable|disable]
set group-id {integer}
set group-name {string}
set ha-direct [enable|disable]
set ha-eth-type {string}
config ha-mgmt-interfaces
Description: Reserve interfaces to manage individual cluster units.
edit <id>
set interface {string}
set dst {ipv4-classnet}
set gateway {ipv4-address}
set gateway6 {ipv6-address}
next
end
set ha-mgmt-status [enable|disable]
set ha-uptime-diff-margin {integer}
set hb-interval {integer}
set hb-interval-in-milliseconds [100ms|10ms]
set hb-lost-threshold {integer}
set hbdev {user}
set hc-eth-type {string}
set hello-holddown {integer}
set http-proxy-threshold {user}
set imap-proxy-threshold {user}
set ipsec-phase2-proposal {option1}, {option2}, ...
set key {password}
set l2ep-eth-type {string}
set link-failed-signal [enable|disable]
set load-balance-all [enable|disable]
set logical-sn [enable|disable]
set memory-based-failover [enable|disable]
set memory-compatible-mode [enable|disable]
set memory-failover-flip-timeout {integer}
set memory-failover-monitor-period {integer}
set memory-failover-sample-rate {integer}
set memory-failover-threshold {integer}
set memory-threshold {user}
set mode [standalone|a-a|...]
set monitor {user}
set multicast-ttl {integer}
set nntp-proxy-threshold {user}
set override [enable|disable]
Option Description
Option Description
Option Description
group-name Cluster group name. Must be the same for string Maximum
all members. length: 32
Option Description
Option Description
ha-uptime-diff- Normally you would only reduce this value integer Minimum 300
margin for failover testing. value: 1
Maximum
value: 65535
Option Description
hbdev Heartbeat interfaces. Must be the same for user Not Specified
all members. Enter <interface> <priority>
pairs to specify the priority of each heartbeat
interface. Higher priority takes precedence.
Option Description
aes128-sha1 aes128-sha1
aes128-sha256 aes128-sha256
aes128-sha384 aes128-sha384
aes128-sha512 aes128-sha512
aes192-sha1 aes192-sha1
aes192-sha256 aes192-sha256
aes192-sha384 aes192-sha384
aes192-sha512 aes192-sha512
Option Description
aes256-sha1 aes256-sha1
aes256-sha256 aes256-sha256
aes256-sha384 aes256-sha384
aes256-sha512 aes256-sha512
aes128gcm aes128gcm
aes256gcm aes256gcm
chacha20poly1305 chacha20poly1305
link-failed-signal Enable to shut down all interfaces for 1 sec option - disable
after a failover. Use if gratuitous ARPs do
not update network.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
monitor Interfaces to check for port monitoring (or user Not Specified
link failure).
override Enable and increase the priority of the unit option - disable
that should always be primary (master).
Option Description
password Cluster password. Must be the same for all password Not Specified
members.
Option Description
enable Enable force reset of secondary member after PING server failure.
disable Disable force reset of secondary member after PING server failure.
priority Increase the priority to select the primary integer Minimum 128
unit. value: 0
Maximum
value: 255
schedule Type of A-A load balancing. Use none if you option - round-robin
have external load balancers.
Option Description
none None.
random Random.
ip IP.
ipport IP port.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
unicast-gateway Default route gateway for unicast interface. ipv4- Not Specified 0.0.0.0
* address
Option Description
Option Description
Option Description
Option Description
config ha-mgmt-interfaces
dst Default route destination for reserved HA ipv4- Not Specified 0.0.0.0
management interface. classnet 0.0.0.0
gateway Default route gateway for reserved HA management ipv4- Not Specified 0.0.0.0
interface. address
gateway6 Default IPv6 gateway for reserved HA management ipv6- Not Specified ::
interface. address
config unicast-peers
config vcluster
override Enable and increase the priority of the unit that should option - disable
always be primary (master).
Option Description
priority Increase the priority to select the primary unit. integer Minimum 128
value: 0
Maximum
value: 255
monitor Interfaces to check for port monitoring (or link failure). user Not Specified
pingserver- Enable to force the cluster to negotiate after a remote option - enable
secondary- IP monitoring failover.
force-reset
Option Description
enable Enable force reset of secondary member after PING server failure.
disable Disable force reset of secondary member after PING server failure.
This command is available for model(s): FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiGateRugged 70F 3G4G, FortiGateRugged 70F.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100F,
FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate
81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
iec101- Send periodic test frame for probing link status. option - enable
keepalive
Option Description
Option Description
iec101-t0 Time out for repetition of frames in milliseconds. integer Minimum 500
value: 1
Maximum
value:
30000
iec101-trp Time interval during which repetitions are permitted in integer Minimum 2500
milliseconds. value: 1
Maximum
value:
300000
Option Description
iec104-t3 Time-out for sending test frames in case of a long idle integer Minimum 20
state in seconds. value: 1
Maximum
value:
172800
Option Description
modbus- Time out for serial remote station response in integer Minimum 500
serial- milliseconds. value: 10
timeout-resp Maximum
value:
30000
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
dh-keypair- Number of key pairs to pre-generate for each Diffie- integer Minimum 100 **
count Hellman group (per-worker). value: 0
Maximum
value:
50000
Option Description
Option Description
Option Description
config dh-group-1
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-14
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-15
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-16
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-17
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-19
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-2
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-20
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-21
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-28
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-29
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-30
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-31
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-5
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
Configure interfaces.
config system interface
Description: Configure interfaces.
edit <name>
set ac-name {string}
set aggregate {string}
set aggregate-type [physical|vxlan]
set algorithm [L2|L3|...]
set alias {string}
set allowaccess {option1}, {option2}, ...
set ap-discover [enable|disable]
set arpforward [enable|disable]
set atm-protocol [none|ipoa]
set auth-cert {string}
set auth-portal-addr {string}
set auth-type [auto|pap|...]
set auto-auth-extension-device [enable|disable]
set bandwidth-measure-time {integer}
set bfd [global|enable|...]
set bfd-desired-min-tx {integer}
set bfd-detect-mult {integer}
set bfd-required-min-rx {integer}
set broadcast-forward [enable|disable]
set cli-conn-status {integer}
config client-options
Description: DHCP client options.
edit <id>
set code {integer}
set type [hex|string|...]
set value {string}
set ip {user}
next
end
set color {integer}
set dedicated-to [none|management]
set default-purdue-level [1|1.5|...]
set defaultgw [enable|disable]
set description {var-string}
set detected-peer-mtu {integer}
set detectprotocol {option1}, {option2}, ...
set detectserver {user}
set device-identification [enable|disable]
set device-user-identification [enable|disable]
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ping PING.
detectserver Gateway's ping server for this IP. user Not Specified
Option Description
Option Description
Option Description
Option Description
enable Enable addition of classless static routes retrieved from DHCP server.
disable Disable addition of classless static routes retrieved from DHCP server.
Option Description
Option Description
Option Description
Option Description
Option Description
disable None.
dhcp-relay- IP address used by the DHCP relay as its ipv4- Not Specified 0.0.0.0
source-ip source IP. address
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
tls TLS.
peap PEAP.
Option Description
Option Description
disable Disable.
cos0 CoS 0.
cos1 CoS 1.
cos2 CoS 2.
cos3 CoS 3.
cos4 CoS 4.
cos5 CoS 5.
cos6 CoS 6.
cos7 CoS 7.
Option Description
Option Description
Option Description
Option Description
soft-restart Soft-restart-on-extender.
hard-restart Hard-restart-on-extender.
reboot Reboot-on-extender.
Option Description
link-failed-signal Link-failed-signal.
link-down Link-down.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
none none
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable.
cos0 CoS 0.
cos1 CoS 1.
cos2 CoS 2.
Option Description
cos3 CoS 3.
cos4 CoS 4.
cos5 CoS 5.
cos6 CoS 6.
cos7 CoS 7.
Option Description
profile1 interconnect profile1 [(10G & IC > 7m/20db-loss) or (25G/27G & IC < 1m)]
ip Interface IPv4 address and subnet mask, ipv4- Not Specified 0.0.0.0 0.0.0.0
syntax: X.X.X.X/24. classnet-
host
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
static Use static aggregation, do not send and ignore any LACP messages.
Option Description
Option Description
vdom Use VDOM Link Layer Discovery Protocol (LLDP) reception configuration
setting.
Option Description
macaddr Change the interface's MAC address. mac- Not Specified 00:00:00:00:00:00
address
Option Description
management-ip High Availability in-band management IP ipv4- Not Specified 0.0.0.0 0.0.0.0
address of this interface. classnet-
host
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
vc-encaps VC encapsulation.
Option Description
Option Description
Option Description
Option Description
vdsl VDSL.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
priority-adjust Enable STP negotiation on HA secondary and make priority lower than HA
primary.
Option Description
Option Description
Option Description
substitute-dst- Destination MAC address that all mac- Not Specified 00:00:00:00:00:00
mac packets are sent to from this interface. address
Option Description
default Use the hashing that the driver selects during initialization for distribution.
Option Description
enable Block FortiSwitch port-to-port traffic on the VLAN, only permitting traffic to
and from the FortiGate.
Option Description
monitor Monitor ARP traffic and update DHCP client database with MAC-VLAN-IP.
Option Description
Option Description
Option Description
enable Enable DHCP snooping verify source MAC for FortiSwitch devices.
disable Disable DHCP snooping verify source MAC for FortiSwitch devices.
Option Description
default-vlan Default VLAN (native) assigned to all switch ports upon discovery.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
system-id Define a system ID for the aggregate mac- Not Specified 00:00:00:00:00:00
interface. address
Option Description
Option Description
Option Description
trust-ip-1 Trusted host for dedicated management ipv4- Not Specified 0.0.0.0 0.0.0.0
traffic (0.0.0.0/24 for all hosts). classnet-
any
trust-ip-2 Trusted host for dedicated management ipv4- Not Specified 0.0.0.0 0.0.0.0
traffic (0.0.0.0/24 for all hosts). classnet-
any
trust-ip-3 Trusted host for dedicated management ipv4- Not Specified 0.0.0.0 0.0.0.0
traffic (0.0.0.0/24 for all hosts). classnet-
any
trust-ip6-1 Trusted IPv6 host for dedicated ipv6-prefix Not Specified ::/0
management traffic (::/0 for all hosts).
trust-ip6-2 Trusted IPv6 host for dedicated ipv6-prefix Not Specified ::/0
management traffic (::/0 for all hosts).
trust-ip6-3 Trusted IPv6 host for dedicated ipv6-prefix Not Specified ::/0
management traffic (::/0 for all hosts).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
weight Default weight for static routes (if route integer Minimum 0
has no weight configured). value: 0
Maximum
value: 255
Option Description
allow Allow.
deny Deny.
Option Description
Option Description
PSK PSK.
radius RADIUS.
Option Description
Option Description
Option Description
Option Description
TKIP TKIP.
AES AES.
Option Description
Option Description
open Open.
wep64 WEP64.
wep128 WEP128.
config client-options
Option Description
config dhcp-snooping-server-list
config egress-queues
config ipv6
Option Description
Option Description
Option Description
ip6-address Primary IPv6 address prefix. Syntax: ipv6-prefix Not Specified ::/0
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx/xxx.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
dhcp6 Use delegated prefix from a DHCPv6 client to form a delegated IPv6 address.
Option Description
Option Description
Option Description
disable Use address of the egress interface as source address of the relay message.
enable Use address of this interface as source address of the relay message.
dhcp6-relay- IPv6 address used by the DHCP6 relay as its source ipv6- Not Specified ::
source-ip IP. address
Option Description
Option Description
Option Description
Option Description
config ip6-extra-addr
config ip6-prefix-list
Option Description
Option Description
config ip6-delegated-prefix-list
Option Description
Option Description
Option Description
config dhcp6-iapd-list
prefix-hint DHCPv6 prefix that will be used as a hint to the ipv6- Not Specified ::/0
upstream DHCPv6 server. network
prefix-hint-plt DHCPv6 prefix hint preferred life time (sec), 0 means integer Minimum 604800
unlimited lease time. value: 0
Maximum
value:
4294967295
prefix-hint-vlt DHCPv6 prefix hint valid life time (sec). integer Minimum 2592000
value: 0
Maximum
value:
4294967295
Option Description
Option Description
Option Description
Option Description
config l2tp-client-settings
Option Description
Option Description
config mirroring-filter
config secondaryip
Option Description
Option Description
detectserver Gateway's ping server for this IP. user Not Specified
Option Description
ping PING.
config tagging
config vrrp
Option Description
2 VRRP version 2.
3 VRRP version 3.
Option Description
Option Description
vrdst-priority Priority of the virtual router when the virtual router integer Minimum 0
destination becomes unreachable. value: 0
Maximum
value: 254
Option Description
Option Description
config proxy-arp
config wifi-mac-list
Option Description
open Open.
wep64 WEP64.
wep128 WEP128.
owe OWE.
Option Description
TKIP TKIP.
AES AES.
wifi- WiFi pre-shared key for WPA-PSK or password for password Not Specified
passphrase WPA3-SAE and WPA2/WPA3-ENTERPRISE.
Option Description
wifi-private- Password for private key file for WPA2/WPA3- password Not Specified
key-password ENTERPRISE.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
fabric-root Use the IPAM server running on the Security Fabric root.
Option Description
config pools
subnet Configure IPAM pool subnet, Class A - Class B subnet. ipv4- Not 0.0.0.0
classnet Specified 0.0.0.0
config exclude
exclude- Configure subnet to exclude from the IPAM pool. ipv4- Not Specified 0.0.0.0
subnet classnet 0.0.0.0
Option Description
Option Description
Configure IP in IP Tunneling.
config system ipip-tunnel
Description: Configure IP in IP Tunneling.
edit <name>
set auto-asic-offload [enable|disable]
set interface {string}
set local-gw {ipv4-address-any}
set remote-gw {ipv4-address}
set use-sdwan [disable|enable]
Option Description
interface Interface name that is associated with the incoming string Maximum
traffic from available options. length: 15
local-gw IPv4 address for the local gateway. ipv4- Not 0.0.0.0
address- Specified
any
remote-gw IPv4 address for the remote gateway. ipv4- Not 0.0.0.0
address Specified
Option Description
Option Description
status Enable/disable using this DNS server for IPS URL filter option - enable
DNS queries.
Option Description
enable Enable this DNS server for IPS URL filter DNS queries.
disable Disable this DNS server for IPS URL filter DNS queries.
status Enable/disable this server for IPv6 DNS queries. option - enable
Option Description
Option Description
enable Allow the signatures specified by IDs to be triggered even if they are on hold.
signature- Time to hold and monitor IPS signatures. Format user Not 0h
hold-time <#d##h>. Specified
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1100E, FortiGate 1101E, FortiGate 1800F,
FortiGate 1801F, FortiGate 2200E, FortiGate 2201E, FortiGate 2600F, FortiGate 2601F,
FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3300E, FortiGate 3301E, FortiGate 3700D, FortiGate 400E, FortiGate 401E,
FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 800D.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100F,
FortiGate 101F, FortiGate 140E-POE, FortiGate 140E, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2500E, FortiGate 3000F,
FortiGate 3001F, FortiGate 3200F, FortiGate 3201F, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700F,
FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400F,
FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 5001E1, FortiGate 5001E,
FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate
601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate
60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-
POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E,
FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F,
FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E,
FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE,
FortiWiFi 81F 2R.
Option Description
Option Description
1k-bytes 1K bytes.
2k-bytes 2K bytes.
4k-bytes 4K bytes.
8k-bytes 8K bytes.
Option Description
half-packet One burst unit equals two time slots in which one packet is sent.
1-packet 1 packet.
2-packets 2 packets.
4-packets 4 packets.
16-packets 16 packets.
65-packets 65 packets.
Option Description
diffservcode Differentiated services code point (DSCP) in the IP user Not Specified
header of the probe packet.
gateway-ip Gateway IP address used to probe the server. ipv4- Not Specified 0.0.0.0
address-
any
gateway-ip6 Gateway IPv6 address used to probe the server. ipv6- Not Specified ::
address
http-agent String in the http-agent field in the HTTP header. string Maximum Chrome/
length: 1024 Safari/
http-get If you are monitoring an HTML server you can send string Maximum /
an HTTP-GET request with a custom string. Use this length: 1024
option to define the string.
http-match String that you expect to see in the HTTP-GET string Maximum
requests of the traffic to be monitored. length: 1024
port Port number of the traffic to be used to monitor the integer Minimum 0
server. value: 1
Maximum
value: 65535
probe-count Number of most recent probes that should be used integer Minimum 30
to calculate latency and jitter. value: 5
Maximum
value: 30
probe-timeout Time to wait before a probe packet is considered integer Minimum 500
lost. value: 20
Maximum
value: 5000
Option Description
Option Description
Option Description
Option Description
service- Only use monitor to read quality values. If enabled, option - disable
detection static routes and cascade interfaces will not be
updated.
Option Description
source-ip Source IP address used in packet to the server. ipv4- Not Specified 0.0.0.0
address-
any
source-ip6 Source IPv6 address used in packet to the server. ipv6- Not Specified ::
address
Option Description
Option Description
Option Description
Option Description
config server-list
Option Description
Option Description
port Port number of the traffic to be used to monitor the integer Minimum 0
server. value: 1
Maximum
value:
65535
Option Description
Option Description
config guest-voice-signaling
Option Description
Option Description
config softphone
Option Description
Option Description
config streaming-video
Option Description
Option Description
Option Description
Option Description
config video-signaling
Option Description
Option Description
config voice
Option Description
Option Description
config voice-signaling
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate 60E DSLJ,
FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E,
FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate
80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE,
FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate
91E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate VM64.
allow-modify- Allow FortiGate to modify the wireless WAN interface option - enable
mtu-size * MTU size.
Option Description
allow-modify- Allow FortiGate to modify the wireless profile table if option - enable
wireless- the internal LTE modem is running the GENERIC
profile-table * modem firmware.
Option Description
apn Login APN string for PDP-IP packet data calls. string Maximum
length: 127
authtype Authentication type for PDP-IP packet data calls. option - none
Option Description
Option Description
band- Bitmaps for the allowed 3G and LTE bands.Ex: string Maximum
restrictions * 0000000000000000-0000000000001008 (3G Mask- length: 35
LTE Mask)
Option Description
Option Description
extra-init Extra initialization string for USB LTE/WIMAX devices. string Maximum
length: 127
force- Force to use wireless profile index , 0 if don't force. integer Minimum 0
wireless- value: 0
profile * Maximum
value: 16
Option Description
Option Description
interface The interface that the modem is acting as a redundant string Maximum
interface for. length: 63
Option Description
Option Description
redundant Redundant modem operation mode where the modem is used as a backup
interface.
Option Description
lte LTE
Option Description
passwd Authentication password for PDP-IP packet data calls. password Not
Specified
Option Description
Option Description
config data-plan
Option Description
Option Description
monthly 1-31(day)
daily 1-24(hour)
Option Description
sunday Sunday
monday Monday
tuesday Tuesday
wednesday Wednesday
thursday Thursday
friday Friday
saturday Saturday
Option Description
delay-switch- Instead of SIM switching shortly after data limit is string Maximum NA
time reached, schedule a delay switch time in format length: 35
hh:mm.
config sim-switch
Option Description
disable Disable SIM auto switch when SIM state is empty or in error.
enable Enable SIM auto switch when SIM state is empty or in error.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Configure Mobile tunnels, an implementation of Network Mobility (NEMO) extensions for Mobile IPv4 RFC5177.
config system mobile-tunnel
Description: Configure Mobile tunnels, an implementation of Network Mobility (NEMO)
extensions for Mobile IPv4 RFC5177.
edit <name>
set hash-algorithm {option}
set home-address {ipv4-address}
set home-agent {ipv4-address}
set lifetime {integer}
set n-mhae-key {password_aes256}
set n-mhae-key-type [ascii|base64]
set n-mhae-spi {integer}
config network
Description: NEMO network configuration.
edit <id>
set interface {string}
set prefix {ipv4-classnet}
next
end
set reg-interval {integer}
set reg-retry {integer}
set renew-interval {integer}
set roaming-interface {string}
set status [disable|enable]
set tunnel-mode {option}
next
end
Option Description
home-agent IPv4 address of the NEMO HA (Format: ipv4-address Not Specified 0.0.0.0
xxx.xxx.xxx.xxx).
Option Description
roaming- Select the associated interface name from available string Maximum
interface options. length: 15
Option Description
Option Description
interface Select the associated interface name from available string Maximum
options. length: 15
prefix Class IP and Netmask with correction ipv4- Not Specified 0.0.0.0
(Format:xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx or classnet 0.0.0.0
xxx.xxx.xxx.xxx/x).
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate 60E DSLJ,
FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E,
FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate
80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE,
FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate
91E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate VM64.
Configure MODEM.
config system modem
Description: Configure MODEM.
set action [dial|stop|...]
set altmode [enable|disable]
set authtype1 {option1}, {option2}, ...
set authtype2 {option1}, {option2}, ...
Option Description
Option Description
none No action.
Option Description
Option Description
pap PAP
chap CHAP
mschap MSCHAP
mschapv2 MSCHAPv2
Option Description
pap PAP
chap CHAP
mschap MSCHAP
mschapv2 MSCHAPv2
Option Description
pap PAP
chap CHAP
mschap MSCHAP
Option Description
mschapv2 MSCHAPv2
Option Description
dial-on- Enable/disable to dial the modem when packets are option - disable
demand routed to the modem interface.
Option Description
Option Description
Option Description
Option Description
Option Description
standalone Standalone.
passwd1 Password to access the specified dialup account. password Not Specified
passwd2 Password to access the specified dialup account. password Not Specified
passwd3 Password to access the specified dialup account. password Not Specified
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
none Forever.
1 One attempt.
2 Two attempts.
3 Three attempts.
4 Four attempts.
5 Five attempts.
6 Six attempts.
7 Seven attempts.
8 Eight attempts.
9 Nine attempts.
10 Ten attempts.
Option Description
Option Description
username1 User name to access the specified dialup account. string Maximum
length: 63
username2 User name to access the specified dialup account. string Maximum
length: 63
username3 User name to access the specified dialup account. string Maximum
length: 63
wireless-port Enter wireless port number: 0 for default, 1 for first integer Minimum 0
port, and so on. value: 0
Maximum
value:
4294967295
Option Description
Configure NetFlow.
config system netflow
Description: Configure NetFlow.
set active-flow-timeout {integer}
config collectors
Description: Netflow collectors.
edit <id>
set collector-ip {string}
set collector-port {integer}
set source-ip {string}
set interface-select-method [auto|sdwan|...]
set interface {string}
next
end
set inactive-flow-timeout {integer}
set template-tx-counter {integer}
set template-tx-timeout {integer}
end
template-tx- Timeout for periodic template flowset transmission. integer Minimum 1800
timeout value: 60
Maximum
value:
86400
config collectors
source-ip Source IP address for communication with the NetFlow string Maximum
agent. length: 63
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Option Description
Option Description
hostname- Limit of the number of hostname table entries. integer Minimum 5000
limit value: 0
Maximum
value:
50000
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1100E, FortiGate 1101E,
FortiGate 2000E, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 3000D,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3300E,
FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
400E, FortiGate 401E, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 800D, FortiGate 900D.
It is not available for: FortiGate 1000F, FortiGate 1001F, FortiGate 100F, FortiGate 101F,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2600F, FortiGate 2601F,
FortiGate 3000F, FortiGate 3001F, FortiGate 3200F, FortiGate 3201F, FortiGate 3500F,
FortiGate 3501F, FortiGate 3700F, FortiGate 3701F, FortiGate 400F, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 600F, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate
80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate
81F, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
fastpath Enable/disable NP6 offloading (also called fast path). option - enable
Option Description
Option Description
Option Description
global-hash- Hash outbound SA traffic among all NPs with more weights on NPs connected
weighted to switch 0. It's applicable to the case that ingress traffic is from switch 1.
ipsec- Enable/disable hash function for IPsec outbound traffic. option - disable
outbound-
hash *
Option Description
Option Description
Option Description
traffic-log-only Per-session accounting only for sessions with traffic logging enabled in firewall
policy.
session- {disable | enable} Toggle between using fixed or random option - disable
timeout-fixed timeouts for refreshing NP6 sessions.
Option Description
enable Enable Refresh NP6 sessions randomly where the time between refreshes is
within the random range.
session- Set the fixed timeout for refreshing NP6 sessions. integer Minimum 40
timeout- value: 0
interval Maximum
value: 1000
session- Set the random timeout range for refreshing NP6 integer Minimum 8
timeout- sessions. value: 0
random-range Maximum
value: 1000
tcp-syn-fin TCP SYN flood SYN/FIN flag set anomalies. option - allow
Option Description
tcp-fin-noack TCP SYN flood with FIN flag set without ACK setting option - trap-to-host
anomalies.
Option Description
allow Allow TCP packets with FIN flag set without ack setting to pass.
drop Drop TCP packets with FIN flag set without ack setting.
trap-to-host Forward TCP packets with FIN flag set without ack setting to FortiOS.
tcp-fin-only TCP SYN flood with only FIN flag set anomalies. option - trap-to-host
Option Description
allow Allow TCP packets with FIN flag set only to pass.
trap-to-host Forward TCP packets with FIN flag set only to FortiOS.
tcp-no-flag TCP SYN flood with no flag set anomalies. option - allow
Option Description
tcp-syn-data TCP SYN flood packets with data anomalies. option - allow
Option Description
Option Description
Option Description
Option Description
Option Description
icmp-frag Layer 3 fragmented packets that could be part of layer option - allow
4 ICMP anomalies.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow IPv4 with strict source record route option to pass.
trap-to-host Forward IPv4 with strict source record route option to FortiOS.
Option Description
allow Allow IPv4 with loose source record route option to pass.
trap-to-host Forward IPv4 with loose source record route option to FortiOS.
Option Description
Option Description
Option Description
Option Description
Option Description
trap-to-host Forward IPv4 invalid TCP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid UDP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid ICMP checksum to main CPU for processing.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow IPv6 with network service access point address option to pass.
drop Drop IPv6 with network service access point address option.
trap-to-host Forward IPv6 with network service access point address option to FortiOS.
Option Description
Option Description
config hpe
tcpsyn-ack- Maximum TCP carries SYN and ACK flags packet integer Minimum 600000
max rate. value: 1000
Maximum
value:
1000000000
tcpfin-rst-max Maximum TCP carries FIN or RST flags packet rate. integer Minimum 600000
value: 1000
Maximum
value:
1000000000
ip-others-max Maximum IP packet rate for other packets. integer Minimum 200000
value: 1000
Maximum
value:
1000000000
l2-others-max Maximum L2 packet rate for L2 packets that are not integer Minimum 200000
ARP packets. value: 1000
Maximum
value:
1000000000
pri-type-max Maximum overflow rate of priority type traffic. integer Minimum 200000
Includes L2: HA, 802.3ad LACP, heartbeats. L3: value: 1000
OSPF. L4_TCP: BGP. L4_UDP: IKE, SLBC, BFD. Maximum
value:
1000000000
Option Description
This command is available for model(s): FortiGate 100F, FortiGate 101F, FortiGate 200F,
FortiGate 201F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 60F, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81F-
POE, FortiGate 81F, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged
70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60F,
FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE,
FortiWiFi 81F 2R.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 1100E,
FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F,
FortiGate 2000E, FortiGate 200E, FortiGate 201E, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1,
FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate
601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE,
FortiGate 60E, FortiGate 61E, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate
81E-POE, FortiGate 81E, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 61E.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
traffic-log-only Per-session accounting only for sessions with traffic logging enabled in
firewall policy.
Option Description
config fp-anomaly
tcp-syn-fin TCP SYN flood SYN/FIN flag set anomalies. option - allow
Option Description
tcp-fin-noack TCP SYN flood with FIN flag set without ACK setting option - trap-to-host
anomalies.
Option Description
allow Allow TCP packets with FIN flag set without ack setting to pass.
drop Drop TCP packets with FIN flag set without ack setting.
trap-to-host Forward TCP packets with FIN flag set without ack setting to FortiOS.
tcp-fin-only TCP SYN flood with only FIN flag set anomalies. option - trap-to-host
Option Description
allow Allow TCP packets with FIN flag set only to pass.
trap-to-host Forward TCP packets with FIN flag set only to FortiOS.
tcp-no-flag TCP SYN flood with no flag set anomalies. option - allow
Option Description
tcp-syn-data TCP SYN flood packets with data anomalies. option - allow
Option Description
Option Description
Option Description
Option Description
Option Description
icmp-frag Layer 3 fragmented packets that could be part of layer option - allow
4 ICMP anomalies.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow IPv4 with strict source record route option to pass.
trap-to-host Forward IPv4 with strict source record route option to FortiOS.
Option Description
allow Allow IPv4 with loose source record route option to pass.
trap-to-host Forward IPv4 with loose source record route option to FortiOS.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
trap-to-host Forward IPv4 invalid TCP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid UDP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid ICMP checksum to main CPU for processing.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow IPv6 with network service access point address option to pass.
drop Drop IPv6 with network service access point address option.
trap-to-host Forward IPv6 with network service access point address option to FortiOS.
Option Description
Option Description
config hpe
tcpsyn-max Maximum TCP SYN only packet rate. integer Minimum 600000
value: 1000
Maximum
value:
1000000000
tcpsyn-ack- Maximum TCP carries SYN and ACK flags packet integer Minimum 600000
max rate. value: 1000
Maximum
value:
1000000000
tcpfin-rst-max Maximum TCP carries FIN or RST flags packet rate. integer Minimum 600000
value: 1000
Maximum
value:
1000000000
tcp-others- Maximum TCP packet rate for TCP packets that integer Minimum 600000
max match none of the 3 types above. value: 1000
Maximum
value:
1000000000
ip-others-max Maximum IP packet rate for other packets. integer Minimum 200000
value: 1000
Maximum
value:
1000000000
l2-others-max Maximum L2 packet rate for L2 packets that are not integer Minimum 200000
ARP packets. value: 1000
Maximum
value:
1000000000
pri-type-max Maximum overflow rate of priority type traffic. integer Minimum 200000
Includes L2: HA, 802.3ad LACP, heartbeats. L3: value: 1000
OSPF. L4_TCP: BGP. L4_UDP: IKE, SLBC, BFD. Maximum
value:
1000000000
Option Description
This command is available for model(s): FortiGate 1000F, FortiGate 1001F, FortiGate 1800F,
FortiGate 1801F, FortiGate 2600F, FortiGate 2601F, FortiGate 3000F, FortiGate 3001F,
FortiGate 3200F, FortiGate 3201F, FortiGate 3500F, FortiGate 3501F, FortiGate 3700F,
FortiGate 3701F, FortiGate 400F, FortiGate 401F, FortiGate 4200F, FortiGate 4201F,
FortiGate 4400F, FortiGate 4401F, FortiGate 600F, FortiGate 601F.
It is not available for: FortiGate 1000D, FortiGate 100F, FortiGate 101F, FortiGate 1100E,
FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E,
FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D,
FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate
80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
interface Set NPU interface port for NPU group mapping. string Maximum
length: 15
This command is available for model(s): FortiGate 100F, FortiGate 101F, FortiGate 60F,
FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGateRugged 60F 3G4G, FortiGateRugged
60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 60F, FortiWiFi 61F.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 1100E,
FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F,
FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate
2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate
3000D, FortiGate 3000F, FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E,
FortiGate 3400E, FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E,
FortiGate 3601E, FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E,
FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E,
FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F,
FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E,
FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate
60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 61E, FortiGate
800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE,
FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 61E,
FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
prp-port-in Ingress port configured to allow the PRP trailer not string Maximum
<interface- be stripped off when the PRP packets come in. All of length: 35
name> the traffic originating from these ports will always be
sent to the host.
Physical interface name.
prp-port-out Egress port configured to allow the PRP trailer not be string Maximum
<interface- stripped off when the PRP packets go out. length: 35
name> Physical interface name.
This command is available for model(s): FortiGate 1000F, FortiGate 1001F, FortiGate 1800F,
FortiGate 1801F, FortiGate 2600F, FortiGate 2601F, FortiGate 3000F, FortiGate 3001F,
FortiGate 3200F, FortiGate 3201F, FortiGate 3500F, FortiGate 3501F, FortiGate 3700F,
FortiGate 3701F, FortiGate 400F, FortiGate 401F, FortiGate 4200F, FortiGate 4201F,
FortiGate 4400F, FortiGate 4401F, FortiGate 600F, FortiGate 601F.
It is not available for: FortiGate 1000D, FortiGate 100F, FortiGate 101F, FortiGate 1100E,
FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E,
FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D,
FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate
80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
name NPU VDOM link name in format npuX_vlink. X means x- string Maximum
th pair of npu-vlink. Maximum 14 characters. length: 19
This command is available for model(s): FortiGate 1000D, FortiGate 1000F, FortiGate 1001F,
FortiGate 100F, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F,
FortiGate 3001F, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3200F, FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate 60E DSLJ,
FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E,
FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate
80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE,
FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D, FortiGateRugged 60F
3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi
40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi
60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi
81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 90E, FortiGate 91E, FortiGate VM64.
Option Description
dedicated- Enable to dedicate one CPU for GUI and CLI option - disable
management- connections when NPs are busy.
cpu *
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
bi-directional Offload TCP and IP Tunnel sessions in both directions between 10G and
1G interfaces (normal operation).
host-shortcut Only offload TCP and IP Tunnel sessions received by 1G interfaces. Select
if packets are dropped for offloaded traffic between 10G to 1G interfaces.
htab-dedi-queue- Set the number of dedicate queue for hash table integer Minimum 1
nr * messages. value: 1
Maximum
value: 2
Option Description
Option Description
100Mbps 100Mbps.
200Mbps 200Mbps.
300Mbps 300Mbps.
400Mbps 400Mbps.
500Mbps 500Mbps.
600Mbps 600Mbps.
700Mbps 700Mbps.
800Mbps 800Mbps.
900Mbps 900Mbps.
1Gbps 1Gbps.
2Gbps 2Gbps.
4Gbps 4Gbps.
8Gbps 8Gbps.
10Gbps 10Gbps.
Option Description
Option Description
enable Enable NPU offload when doing interface-based traffic shaping according
to the egress-shaping-profile.
disable Disable NPU offload when doing interface-based traffic shaping according
to the egress-shaping-profile.
Option Description
Option Description
enable Enable IP checksum re-calculation for packets with iph.reserved bit set.
disable Disable IP checksum re-calculation for packets with iph.reserved bit set.
Option Description
Option Description
Option Description
rr Round Robin.
Hash Hash.
Option Description
Option Description
max-receive-unit Set the maximum packet size for receive, larger integer Minimum 10000
* packets will be silently dropped. value: 64
Maximum
value:
10000
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
2G 2Gbps.
4G 4Gbps.
5G 5Gbps.
6G 6Gbps.
7G 7Gbps.
8G 8Gbps.
9G 9Gbps.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config dsw-dts-profile
profile-id Set NPU DSW DTS profile profile id. integer Minimum 0
value: 1
Maximum
value: 32
Option Description
Option Description
config dsw-queue-dts-profile
Option Description
Option Description
Option Description
Option Description
config fp-anomaly
tcp-syn-fin * TCP SYN flood SYN/FIN flag set anomalies. option - allow
Option Description
Option Description
tcp-fin-noack * TCP SYN flood with FIN flag set without ACK setting option - trap-to-host
anomalies.
Option Description
allow Allow TCP packets with FIN flag set without ack setting to pass.
drop Drop TCP packets with FIN flag set without ack setting.
trap-to-host Forward TCP packets with FIN flag set without ack setting to FortiOS.
tcp-fin-only * TCP SYN flood with only FIN flag set anomalies. option - trap-to-host
Option Description
allow Allow TCP packets with FIN flag set only to pass.
trap-to-host Forward TCP packets with FIN flag set only to FortiOS.
tcp-no-flag * TCP SYN flood with no flag set anomalies. option - allow
Option Description
tcp-syn-data * TCP SYN flood packets with data anomalies. option - allow
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
icmp-frag * Layer 3 fragmented packets that could be part of layer option - allow
4 ICMP anomalies.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow IPv4 with strict source record route option to pass.
trap-to-host Forward IPv4 with strict source record route option to FortiOS.
Option Description
allow Allow IPv4 with loose source record route option to pass.
trap-to-host Forward IPv4 with loose source record route option to FortiOS.
Option Description
Option Description
Option Description
Option Description
Option Description
trap-to-host Forward IPv4 invalid TCP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid UDP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid ICMP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid SCTP checksum to main CPU for processing.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow IPv6 with network service access point address option to pass.
drop Drop IPv6 with network service access point address option.
trap-to-host Forward IPv6 with network service access point address option to FortiOS.
Option Description
Option Description
config hpe
all-protocol Maximum packet rate of each host queue except high integer Minimum 400000
priority traffic, set 0 to disable. value: 0
Maximum
value:
32000000
tcpsyn-ack- Maximum TCP carries SYN and ACK flags packet rate. integer Minimum 40000
max value: 1000
Maximum
value:
32000000
tcpfin-rst-max Maximum TCP carries FIN or RST flags packet rate. integer Minimum 40000
value: 1000
Maximum
value:
32000000
ip-others-max Maximum IP packet rate for other packets. integer Minimum 5000
value: 1000
Maximum
value:
32000000
arp-max Maximum ARP packet rate. Entry is valid when ARP is integer Minimum 5000
removed from high-priority traffic. value: 1000
Maximum
value:
32000000
l2-others-max Maximum L2 packet rate for L2 packets that are not integer Minimum 5000
ARP packets. value: 1000
Maximum
value:
32000000
high-priority Maximum packet rate for high priority traffic packets. integer Minimum 400000
value: 1000
Maximum
value:
32000000
enable- Enable/Disable NPU Host Protection Engine (HPE) for option - disable
shaper packet type shaper.
Option Description
config ip-reassembly
Option Description
config isf-np-queues
config profile
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config ip-protocol
config ip-service
config scheduler
Option Description
config npu-tcam
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config mask
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config pri-act
config sact
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config tact
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config port-cpu-map
config port-npu-map
interface Set NPU interface port for NPU group mapping. string Maximum
length: 15
ports-using-npu Set ha/aux ports to handle traffic with NPU (otherwise string Maximum
<interface- traffic goes to Intel-NIC and then CPU). length: 15
name> Available interfaces for NPU path.
config priority-protocol
Option Description
Option Description
Option Description
config sw-eh-hash
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config sw-tr-hash
Option Description
Option Description
include Include TCP/UDP source and destination port for unicast trunk traffic.
exclude Exclude TCP/UDP source and destination port for unicast trunk traffic.
Option Description
Option Description
Option Description
Option Description
source-ip Source IP address for communication to the NTP ipv4- Not Specified 0.0.0.0
server. address
source-ip6 Source IPv6 address for communication to the ipv6- Not Specified ::
NTP server. address
type Use the FortiGuard NTP server or any other option - fortiguard
available NTP Server.
Option Description
config ntpserver
Option Description
Option Description
Option Description
ip-type Choose to connect to IPv4 or/and IPv6 NTP server. option - Both
Option Description
Both Enable look up for both IPv4 and IPv6 NTP server.
Option Description
Option Description
disable Disable.
mandatory Mandatory.
optional Optional.
Option Description
disable Disable.
mandatory Mandatory.
optional Optional.
Option Description
disable Disable.
mandatory Mandatory.
optional Optional.
Option Description
Option Description
Option Description
Option Description
Option Description
Configure password policy for locally defined administrator passwords and IPsec VPN pre-shared keys.
config system password-policy
Description: Configure password policy for locally defined administrator passwords and
IPsec VPN pre-shared keys.
set apply-to {option1}, {option2}, ...
set expire-day {integer}
set expire-status [enable|disable]
set min-change-characters {integer}
set min-lower-case-letter {integer}
set min-non-alphanumeric {integer}
set min-number {integer}
set min-upper-case-letter {integer}
set minimum-length {integer}
set reuse-password [enable|disable]
set status [enable|disable]
end
Option Description
Option Description
Option Description
Option Description
Option Description
config pools
client-subnet Subnets from which PCP requests are accepted. string Maximum
<subnet> Client subnets. length: 79
Option Description
extport Incoming port number range that you want to user Not Specified
map to a port number on the internal network.
Option Description
Option Description
third-party-subnet Subnets from which third party requests are string Maximum
<subnet> accepted. length: 79
Third party subnets.
Option Description
This command is available for model(s): FortiGate 1000F, FortiGate 1001F, FortiGate 100F,
FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1800F, FortiGate 1801F, FortiGate 200F, FortiGate 201F, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000F, FortiGate 3001F, FortiGate 300E, FortiGate 301E,
FortiGate 3200F, FortiGate 3201F, FortiGate 3500F, FortiGate 3501F, FortiGate 3700F,
FortiGate 3701F, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E,
FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F,
FortiGate 4400F, FortiGate 4401F, FortiGate 600F, FortiGate 601F, FortiGate 60E DSLJ,
FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E,
FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 80E-POE, FortiGate 80E, FortiGate
80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E,
FortiGate 81F-POE, FortiGate 81F, FortiGate 90E, FortiGate 91E, FortiGateRugged 60F
3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi
40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi
60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi
81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000D, FortiGate 2000E, FortiGate 200E, FortiGate 201E,
FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 3000D, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3960E, FortiGate 3980E,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 601E, FortiGate 800D, FortiGate 900D, FortiGate VM64.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
timeout An inactivity timer for a twamp test session. integer Minimum 300
value: 10
Maximum
value: 3600
Option Description
Configure proxy-ARP.
config system proxy-arp
Description: Configure proxy-ARP.
delay- End to end delay detection or peer to peer delay option - E2E
mechanism detection.
Option Description
interface PTP client will reply through this interface. string Maximum
length: 15
Option Description
request- The delay request value is the logarithmic mean interval integer Minimum 1
interval in seconds between the delay request messages sent value: 1
by the slave to the master. Maximum
value: 6
Option Description
Option Description
delay- End to end delay detection or peer to peer delay option - E2E
mechanism detection.
Option Description
Option Description
config admin
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config auth
Option Description
http HTTP
8bit 8 bit.
Option Description
config automation
Option Description
http HTTP
8bit 8 bit.
Option Description
config custom-message
Option Description
http HTTP
8bit 8 bit.
Option Description
config fortiguard-wf
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config http
Option Description
http HTTP
8bit 8 bit.
Option Description
config icap
Option Description
http HTTP
8bit 8 bit.
Option Description
config mail
Option Description
http HTTP
8bit 8 bit.
Option Description
config nac-quar
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config sslvpn
Option Description
http HTTP
8bit 8 bit.
Option Description
config traffic-quota
Option Description
http HTTP
8bit 8 bit.
Option Description
config utm
Option Description
http HTTP
8bit 8 bit.
Option Description
config webproxy
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
Replacement messages.
config system replacemsg admin
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg alertmail
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg auth
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg automation
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg custom-message
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg ftp
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg http
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg icap
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg mail
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg nac-quar
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg spam
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg traffic-quota
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg utm
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg webproxy
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
next
end
Option Description
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
life Length of the range of time when the assertion is valid integer Minimum 30
(in minutes). value: 0
Maximum
value:
4294967295
Option Description
Option Description
tolerance Tolerance to the range of time when the assertion is integer Minimum 5
valid (in minutes). value: 0
Maximum
value:
4294967295
config service-providers
Option Description
config assertion-attributes
Option Description
Option Description
api-key IBM cloud API key or service ID API key. password Not
Specified
Option Description
Option Description
Option Description
Option Description
server-cert Trust servers that contain this certificate only. string Maximum
length: 127
server-list Server address list of the remote SDN connector. string Maximum
<ip> IPv4 address. length: 15
Option Description
Option Description
Option Description
openstack OpenStack.
kubernetes Kubernetes.
Option Description
Option Description
config compartment-list
config external-account-list
config external-ip
config forwarding-rule
config gcp-project-list
config nic
config ip
config oci-region-list
config route
config route-table
config route
config route
Option Description
Configure redundant Internet connections with multiple outbound links and health-check profiles.
config system sdwan
Description: Configure redundant Internet connections with multiple outbound links and
health-check profiles.
set app-perf-log-period {integer}
config duplication
Description: Create SD-WAN duplication rule.
edit <id>
set service-id <id1>, <id2>, ...
set srcaddr <name1>, <name2>, ...
set dstaddr <name1>, <name2>, ...
set srcaddr6 <name1>, <name2>, ...
set dstaddr6 <name1>, <name2>, ...
set srcintf <name1>, <name2>, ...
set dstintf <name1>, <name2>, ...
set service <name1>, <name2>, ...
set packet-duplication [disable|force|...]
Option Description
load-balance- Algorithm or mode to use for load balancing Internet option - source-ip-
mode traffic to SD-WAN members. based
Option Description
source-ip-based Source IP load balancing. All traffic from a source IP is sent to the same
interface.
weight-based Weight-based load balancing. Interfaces with higher weights have higher
priority and get more traffic.
usage-based Usage-based load balancing. All traffic is sent to the first interface on the list.
When the bandwidth on that interface exceeds the spill-over limit new traffic is
sent to the next interface.
source-dest-ip- Source and destination IP load balancing. All traffic from a source IP to a
based destination IP is sent to the same interface.
measured- Volume-based load balancing. Traffic is load balanced based on traffic volume
volume-based (in bytes). More traffic is sent to interfaces with higher volume ratios.
neighbor- Waiting period in seconds when switching from the integer Minimum 0
hold-boot- primary neighbor to the secondary neighbor from the value: 0
time neighbor start.. Maximum
value:
10000000
Option Description
enable Enable hold switching from the secondary neighbor to the primary neighbor.
disable Disable hold switching from the secondary neighbor to the primary neighbor.
neighbor- Waiting period in seconds when switching from the integer Minimum 0
hold-down- secondary neighbor to the primary neighbor when hold- value: 0
time down is disabled.. Maximum
value:
10000000
Option Description
Option Description
config duplication
Option Description
Option Description
force Duplicate packets across all interface members of the SD-WAN zone.
on-demand Duplicate packets across all interface members of the SD-WAN zone based
on the link quality.
Option Description
Option Description
config health-check
Option Description
Option Description
Option Description
Option Description
Option Description
tcp-echo Use TCP echo to test the link with the server.
udp-echo Use UDP echo to test the link with the server.
dns Use DNS query to test the link with the server.
tcp-connect Use a full TCP connection to test the link with the server.
Option Description
Option Description
Option Description
passive The FTP health-check initiates and establishes the data connection.
port The FTP server initiates and establishes the data connection.
ftp-file Full path and file name on the FTP server string Maximum
to download for FTP health-check to length: 254
probe.
http-agent String in the http-agent field in the HTTP string Maximum Chrome/ Safari/
header. length: 1024
dns-request- Fully qualified domain name to resolve for string Maximum www.example.com
domain the DNS probe. length: 255
dns-match-ip Response IP expected from DNS server if ipv4- Not Specified 0.0.0.0
the protocol is DNS. address
Option Description
Option Description
Option Description
sla-id- Select the ID from the SLA sub-table. The integer Minimum 0
redistribute selected SLA's priority value will be value: 0
distributed into the routing table. Maximum
value: 32
sla-fail-log- Time interval in seconds that SLA fail log integer Minimum 0
period messages will be generated. value: 0
Maximum
value: 3600
source Source IP address used in the health- ipv4- Not Specified 0.0.0.0
check packet to the server. address
source6 Source IPv6 address used in the health- ipv6- Not Specified ::
check packet to server. address
Option Description
config members
gateway The default gateway for this interface. Usually the ipv4- Not Specified 0.0.0.0
default gateway of the Internet service provider that address
this interface is connected to.
preferred- Preferred source of route for this member. ipv4- Not Specified 0.0.0.0
source address
source Source IP address used in the health-check packet to ipv4- Not Specified 0.0.0.0
the server. address
source6 Source IPv6 address used in the health-check packet ipv6- Not Specified ::
to the server. address
cost Cost of this interface for services in SLA mode. integer Minimum 0
value: 0
Maximum
value:
4294967295
weight Weight of this interface for weighted load balancing. integer Minimum 1
More traffic is directed to interfaces with higher value: 1
weights. Maximum
value: 255
priority Priority of the interface for IPv4. Used for SD-WAN integer Minimum 1
rules or priority rules. value: 1
Maximum
value: 65535
priority6 Priority of the interface for IPv6. Used for SD-WAN integer Minimum 1024
rules or priority rules. value: 1
Maximum
value: 65535
spillover- Egress spillover threshold for this interface. When integer Minimum 0
threshold this traffic volume threshold is reached, new sessions value: 0
spill over to other interfaces in the SD-WAN. Maximum
value:
16776000
ingress- Ingress spillover threshold for this interface. When integer Minimum 0
spillover- this traffic volume threshold is reached, new sessions value: 0
threshold spill over to other interfaces in the SD-WAN. Maximum
value:
16776000
Option Description
config neighbor
Option Description
Option Description
Option Description
Option Description
Option Description
mode Control how the SD-WAN rule sets the priority of option - manual
interfaces in the SD-WAN.
Option Description
Option Description
hash-mode Hash algorithm for selected priority members for option - round-robin
load balance mode.
Option Description
round-robin All traffic are distributed to selected interfaces in equal portions and circular
order.
source-dest-ip- All traffic from a source IP to a destination IP is sent to the same interface.
based
inbandwidth All traffic are distributed to a selected interface with most available
bandwidth for incoming traffic.
outbandwidth All traffic are distributed to a selected interface with most available
bandwidth for outgoing traffic.
bibandwidth All traffic are distributed to a selected interface with most available
bandwidth for both incoming and outgoing traffic.
shortcut-priority High priority of ADVPN shortcut for this service. option - auto
Option Description
auto Auto enable a high priority of ADVPN shortcut for this service if ADVPN2.0
enabled.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Traffic remains in the original session path if the path is within the SLA.
Option Description
Option Description
Option Description
Option Description
Option Description
sla-compare- Method to compare SLA value for SLA mode. option - order
method
Option Description
number Compare SLA value based on the number of satisfied health-check. Limits
health-checks to only configured member interfaces.
Option Description
zone Use the setting that is configured for the members' zone.
Option Description
cfg-order Members that meet the SLA are selected in the order they are configured.
fib-best-match Members that meet the SLA are selected that match the longest prefix in the
routing table.
input-device Members that meet the SLA are selected by matching the input device.
Option Description
Option Description
Option Description
Option Description
config sla
config zone
Option Description
advpn-health- Health check for ADVPN local overlay link quality. string Maximum
check length: 35
service-sla- Method of selecting member if more than one meets the option - cfg-order
tie-break SLA.
Option Description
cfg-order Members that meet the SLA are selected in the order they are configured.
fib-best-match Members that meet the SLA are selected that match the longest prefix in the
routing table.
input-device Members that meet the SLA are selected by matching the input device.
minimum-sla- Minimum number of members which meet SLA when integer Minimum 1
meet- the neighbor is preferred. value: 1
members Maximum
value: 255
This command is available for model(s): FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiGateRugged 70F 3G4G, FortiGateRugged 70F.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100F,
FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate
81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
Option Description
ftp FTP.
tftp TFTP.
ras RAS.
h323 H323.
tns TNS.
mms MMS.
sip SIP.
pptp PPTP.
rtsp RTSP.
pmap PMAP.
rsh RSH.
dcerpc DCERPC.
mgcp MGCP.
config port
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
bfd-dont- Enable to not enforce verifying the source port of option - disable
enforce-src- BFD Packets.
port
Option Description
Option Description
Option Description
Option Description
default-voip- Configure how the FortiGate handles VoIP traffic option - proxy-
alg-mode when a policy that accepts the traffic doesn't include based
a VoIP profile.
Option Description
Option Description
Option Description
enable Enable detection of unknown ESP packets and drop the ESP packet if it's
unknown.
device Interface to use for management access for NAT string Maximum
mode. length: 35
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
check-all All sessions affected by a firewall policy change are flushed from the session
table. When new packets are received they are re-evaluated by stateful
inspection and re-added to the session table.
check-new Established sessions for changed firewall policies continue without being
affected by the policy configuration change. New sessions are evaluated
according to the new firewall policy configuration.
check-policy- Sessions are managed individually depending on the firewall policy. Some
option sessions may restart. Some may continue.
Option Description
Option Description
disable Perform a policy check only the first time the session is received.
gateway Transparent mode IPv4 default gateway IP ipv4- Not Specified 0.0.0.0
address. address
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
gui-default- Default columns to display for policy lists on GUI. string Maximum
policy-columns Select column name. length: 79
<name>
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
gui-enforce- Enforce change summaries for select tables in the option - require
change- GUI.
summary
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
fortiweb Offload HTTP traffic to FortiWeb for Web Application Firewall inspection.
forticache Offload HTTP traffic to FortiCache for external web caching and WAN
optimization.
Option Description
with-space Format IKE ASN.1 Distinguished Names with spaces between attribute
names and values.
no-space Format IKE ASN.1 Distinguished Names without spaces between attribute
names and values.
Option Description
Option Description
Option Description
internet- Maximum number of tuple entries. A smaller value integer Minimum 32768
service-app- limits the FortiGate unit from learning about internet value: 0
ctrl-size applications. Maximum
value:
4294967295
Option Description
ip6 IPv6 address prefix for NAT mode. ipv6-prefix Not Specified ::/0
Option Description
Option Description
global Use the global LLDP reception configuration for this VDOM.
Option Description
global Use the global LLDP transmission configuration for this VDOM.
location-id Local location ID in the form of an IPv4 address. ipv4- Not Specified 0.0.0.0
address
manageip6 Transparent mode IPv6 management IP address ipv6-prefix Not Specified ::/0
and netmask.
Option Description
Option Description
enable Allowing multicast traffic through the FortiGate without creating a multicast
firewall policy.
disable Require a multicast policy to allow multicast traffic to pass through the
FortiGate.
Option Description
Option Description
Option Description
Option Description
Option Description
profile-based Application and web-filtering are configured using profiles applied to policy
entries.
Option Description
Option Description
Option Description
sccp-port TCP port the SCCP proxy monitors for SCCP traffic. integer Minimum 2000
value: 0
Maximum
value: 65535
Option Description
Option Description
Option Description
enable Allow SIP session helper to create an expectation for port 5060.
disable Prevent SIP session helper from creating an expectation for port 5060.
Option Description
enable Record the original SIP source IP address when NAT is used.
disable Do not record the original SIP source IP address when NAT is used.
sip-ssl-port * TCP port the SIP proxy monitors for SIP SSL/TLS integer Minimum 5061
traffic. value: 0
Maximum
value: 65535
sip-tcp-port TCP port the SIP proxy monitors for SIP traffic. integer Minimum 5060
value: 1
Maximum
value: 65535
sip-udp-port UDP port the SIP proxy monitors for SIP traffic. integer Minimum 5060
value: 1
Maximum
value: 65535
Option Description
Option Description
Option Description
Option Description
Option Description
v4-ecmp-mode IPv4 Equal-cost multi-path (ECMP) routing and load option - source-ip-
balancing mode. based
Option Description
source-dest-ip- Select next hop based on both source and destination IPs.
based
Option Description
Option Description
vpn-stats-log Enable/disable periodic VPN log statistics for one or option - ipsec pptp
more types of VPN. Separate names with a space. l2tp ssl
Option Description
ipsec IPsec.
pptp PPTP.
l2tp L2TP.
ssl SSL.
Option Description
Configure sFlow.
config system sflow
Description: Configure sFlow.
config collectors
Description: sFlow collectors.
edit <id>
set collector-ip {ipv4-address}
set collector-port {integer}
set source-ip {ipv4-address}
set interface-select-method [auto|sdwan|...]
set interface {string}
next
end
end
collector-ip IP addresses of the sFlow collectors that sFlow ipv4- Not Specified 0.0.0.0
agents added to interfaces in this VDOM send sFlow address
datagrams to.
collector-port UDP port number used for sending sFlow datagrams. integer Minimum 6343
value: 0
Maximum
value: 65535
source-ip Source IP address for sFlow agent. ipv4- Not Specified 0.0.0.0
address
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1100E, FortiGate 1101E, FortiGate 1800F,
FortiGate 1801F, FortiGate 2600F, FortiGate 2601F, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3200F, FortiGate 3201F, FortiGate 3300E,
FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3500F, FortiGate 3501F,
FortiGate 3600E, FortiGate 3601E, FortiGate 3700F, FortiGate 3701F, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F,
FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E,
FortiGate 501E, FortiGate 600E, FortiGate 600F, FortiGate 601E, FortiGate 601F.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100F,
FortiGate 101F, FortiGate 140E-POE, FortiGate 140E, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 3000D, FortiGate 3100D, FortiGate 3200D, FortiGate 3700D,
FortiGate 3960E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 5001E1, FortiGate 5001E,
FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F,
FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-
POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate
81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E,
FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F,
FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E,
FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE,
FortiWiFi 81F 2R.
channel SMC NTP client will send NTP packets through this integer Minimum 5
channel. value: 1
Maximum
value:
65535
ntpsync Enable/disable setting the FortiGate SMC system time option - disable
by synchronizing with an NTP server.
Option Description
config ntpserver
Configure SMS server for sending SMS messages to support user authentication.
config system sms-server
Description: Configure SMS server for sending SMS messages to support user
authentication.
edit <name>
set mail-server {string}
next
end
Option Description
mem-low Send a trap when used memory is high, free memory is low, or freeable
memory is high.
ha-switch Send a trap after an HA failover when the backup unit has taken over.
fm-if-change Send a trap when FortiManager interface changes. Send a FortiManager trap.
bgp-established Send a trap when a BGP FSM transitions to the established state.
bgp-backward- Send a trap when a BGP FSM goes from a high numbered state to a lower
transition numbered state.
Option Description
ips-pkg-update Send a trap when the IPS signature database or engine is updated.
temperature-high Send a trap when a temperature sensor registers a temperature that is too
high.
voltage-alert Send a trap when a voltage sensor registers a voltage that is outside of the
normal range.
faz Send a trap when Fortianalyzer main server failover and alternate server take
over, or alternate server failover and main server take over.
load-balance- Send a trap when a server load balance real server goes down.
real-server-down
dhcp Send a trap when the DHCP server exhausts the IP pool, an IP address
already is in use, or a DHCP client interface received a DHCP-NAK.
ospf-nbr-state- Send a trap when there has been a change in the state of a non-virtual OSPF
change neighbor.
ospf-virtnbr- Send a trap when there has been a change in the state of an OSPF virtual
state-change neighbor.
Option Description
Option Description
Option Description
Option Description
Option Description
config hosts
source-ip Source IPv4 address for SNMP traps. ipv4- Not Specified 0.0.0.0
address
Option Description
Option Description
host-type Control whether the SNMP manager sends SNMP option - any
queries, receives SNMP traps, or both. No traps will
be sent when IP type is subnet.
Option Description
any Accept queries from and send traps to this SNMP manager.
query Accept queries from this SNMP manager but do not send traps.
trap Send traps to this SNMP manager but do not accept SNMP queries from this
SNMP manager.
config hosts6
source-ipv6 Source IPv6 address for SNMP traps. ipv6- Not Specified ::
address
ipv6 SNMP manager IPv6 address prefix. ipv6-prefix Not Specified ::/0
Option Description
host-type Control whether the SNMP manager sends SNMP option - any
queries, receives SNMP traps, or both.
Option Description
any Accept queries from and send traps to this SNMP manager.
query Accept queries from this SNMP manager but do not send traps.
trap Send traps to this SNMP manager but do not accept SNMP queries from this
SNMP manager.
Option Description
Option Description
Option Description
Option Description
Option Description
mem-low Send a trap when used memory is high, free memory is low, or freeable
memory is high.
ha-switch Send a trap after an HA failover when the backup unit has taken over.
fm-if-change Send a trap when FortiManager interface changes. Send a FortiManager trap.
bgp-established Send a trap when a BGP FSM transitions to the established state.
bgp-backward- Send a trap when a BGP FSM goes from a high numbered state to a lower
transition numbered state.
Option Description
ips-pkg-update Send a trap when the IPS signature database or engine is updated.
temperature-high Send a trap when a temperature sensor registers a temperature that is too
high.
voltage-alert Send a trap when a voltage sensor registers a voltage that is outside of the
normal range.
faz Send a trap when Fortianalyzer main server failover and alternate server take
over, or alternate server failover and main server take over.
load-balance- Send a trap when a server load balance real server goes down.
real-server-down
dhcp Send a trap when the DHCP server exhausts the IP pool, an IP address
already is in use, or a DHCP client interface received a DHCP-NAK.
ospf-nbr-state- Send a trap when there has been a change in the state of a non-virtual OSPF
change neighbor.
ospf-virtnbr- Send a trap when there has been a change in the state of an OSPF virtual
state-change neighbor.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ctrl-port Port of the controller to get access token. integer Minimum 5200
value: 1
Maximum
value:
65535
Option Description
enable Enable dynamic server.The speed test server will be found automatically.
mode Protocol Auto, TCP or UDP used for speed test. option - Auto
Option Description
Auto Dynamically selects TCP or UDP based on the speed test setting
server-port Port of the server to run speed test. integer Minimum 5201
value: 1
Maximum
value:
65535
Option Description
Option Description
Option Description
update-shaper Set egress shaper based on the test result. option - disable
Option Description
port Server host port number to communicate with client. integer Minimum 5204
value: 1
Maximum
value: 65535
latency- Speed test latency threshold in milliseconds for the Auto integer Minimum 60
threshold mode. If the latency exceeds this threshold, the speed value: 0
test will use the UDP protocol; otherwise, it will use the Maximum
TCP protocol. value: 2000
multiple-tcp- Number of parallel client streams for the TCP protocol integer Minimum 4
stream to run during the speed test. value: 1
Maximum
value: 64
Option Description
[email protected] [email protected]
aes128-ctr aes128-ctr
aes192-ctr aes192-ctr
aes256-ctr aes256-ctr
arcfour256 arcfour256
arcfour128 arcfour128
aes128-cbc aes128-cbc
Option Description
3des-cbc 3des-cbc
blowfish-cbc blowfish-cbc
cast128-cbc cast128-cbc
aes192-cbc aes192-cbc
aes256-cbc aes256-cbc
arcfour arcfour
[email protected] [email protected]
[email protected] [email protected]
[email protected] [email protected]
Option Description
ssh-rsa ssh-rsa
ecdsa-sha2- ecdsa-sha2-nistp521
nistp521
ecdsa-sha2- ecdsa-sha2-nistp384
nistp384
ecdsa-sha2- ecdsa-sha2-nistp256
nistp256
rsa-sha2-256 rsa-sha2-256
rsa-sha2-512 rsa-sha2-512
ssh-ed25519 ssh-ed25519
Option Description
Option Description
Option Description
diffie-hellman- diffie-hellman-group1-sha1
group1-sha1
diffie-hellman- diffie-hellman-group14-sha1
group14-sha1
diffie-hellman- diffie-hellman-group14-sha256
group14-sha256
diffie-hellman- diffie-hellman-group16-sha512
group16-sha512
diffie-hellman- diffie-hellman-group18-sha512
group18-sha512
diffie-hellman-group- diffie-hellman-group-exchange-sha1
exchange-sha1
diffie-hellman-group- diffie-hellman-group-exchange-sha256
exchange-sha256
curve25519- [email protected]
[email protected]
ecdh-sha2-nistp256 ecdh-sha2-nistp256
ecdh-sha2-nistp384 ecdh-sha2-nistp384
ecdh-sha2-nistp521 ecdh-sha2-nistp521
Option Description
hmac-md5 hmac-md5
[email protected] [email protected]
hmac-md5-96 hmac-md5-96
[email protected] [email protected]
hmac-sha1 hmac-sha1
[email protected] [email protected]
hmac-sha2-256 hmac-sha2-256
[email protected] [email protected]
hmac-sha2-512 hmac-sha2-512
[email protected] [email protected]
hmac-ripemd160 hmac-ripemd160
[email protected] [email protected]
[email protected] [email protected]
[email protected] [email protected]
[email protected] [email protected]
[email protected] [email protected]
[email protected] [email protected]
vdom <name> Virtual domain(s) that the administrator can access. string Maximum
Virtual domain name. length: 79
vdom <name> Virtual domain(s) that the administrator can access. string Maximum
Virtual domain name. length: 79
vdom <name> Virtual domain(s) that the administrator can access. string Maximum
Virtual domain name. length: 79
Option Description
Option Description
Option Description
unavailable There does not exist layer 2 connection among FGSP members.
standalone- Cluster group ID. Must be the same for all members. integer Minimum 0
group-id value: 0
Maximum
value: 255
peervd VDOM that contains the session synchronization link string Maximum root
interface on the peer unit. Usually both peers would length: 31
have the same peervd.
peerip IP address of the interface on the peer unit that is ipv4- Not Specified 0.0.0.0
used for the session synchronization link. address
syncvd Sessions from these VDOMs are synchronized using string Maximum
<name> this session synchronization configuration. length: 79
VDOM name.
Option Description
Option Description
srcintf Only sessions from this interface are synchronized. string Maximum
length: 15
srcaddr Only sessions from this IPv4 address are synchronized. ipv4- Not 0.0.0.0
classnet- Specified 0.0.0.0
any
dstaddr Only sessions to this IPv4 address are synchronized. ipv4- Not 0.0.0.0
classnet- Specified 0.0.0.0
any
srcaddr6 Only sessions from this IPv6 address are synchronized. ipv6- Not ::/0
network Specified
dstaddr6 Only sessions to this IPv6 address are synchronized. ipv6- Not ::/0
network Specified
config custom-service
src-port-range Custom service source port range. user Not Specified 0-0
dst-port-range Custom service destination port range. user Not Specified 0-0
Option Description
Option Description
usage Use hard disk for logging or WAN Optimization. option - log **
Option Description
Option Description
This command is available for model(s): FortiGate 1000F, FortiGate 1001F, FortiGate 100F,
FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1800F, FortiGate 1801F, FortiGate 200F, FortiGate 201F, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000F, FortiGate 3001F, FortiGate 300E, FortiGate 301E,
FortiGate 3200F, FortiGate 3201F, FortiGate 3500F, FortiGate 3501F, FortiGate 3700F,
FortiGate 3701F, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E,
FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F,
FortiGate 4400F, FortiGate 4401F, FortiGate 600F, FortiGate 601F, FortiGate 60E DSLJ,
FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E,
FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 80E-POE, FortiGate 80E, FortiGate
80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E,
FortiGate 81F-POE, FortiGate 81F, FortiGate 90E, FortiGate 91E, FortiGateRugged 60F
3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi
40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi
60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi
81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000D, FortiGate 2000E, FortiGate 200E, FortiGate 201E,
FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 3000D, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3960E, FortiGate 3980E,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 601E, FortiGate 800D, FortiGate 900D, FortiGate VM64.
switch-priority STP switch priority; the lower the number the higher the option - 32768
priority (select from 0, 4096, 8192, 12288, 16384,
20480, 24576, 28672, 32768, 36864, 40960, 45056,
49152, 53248, and 57344).
Option Description
0 0
4096 4096
8192 8192
12288 12288
16384 16384
20480 20480
24576 24576
28672 28672
32768 32768
36864 36864
40960 40960
45056 45056
49152 49152
Option Description
53248 53248
57344 57344
intra-switch- Allow any traffic between switch interfaces or require option - implicit
policy firewall policies to allow traffic between switch
interfaces.
Option Description
mac-ttl Duration for which MAC addresses are held in the integer Minimum 300
ARP table. value: 300
Maximum
value:
8640000
member Names of the interfaces that belong to the virtual string Maximum
<interface- switch. length: 79
name> Interface name.
name Interface name (name cannot be in use by any other string Maximum
interfaces, VLANs, or inter-VDOM links). length: 15
Option Description
span-dest-port SPAN destination port name. All traffic on the SPAN string Maximum
source ports is echoed to the SPAN destination port. length: 15
span-direction The direction in which the SPAN port operates, option - both
either: rx, tx, or both.
Option Description
rx Copies only received packets from source SPAN ports to the destination
SPAN port.
tx Copies only transmitted packets from source SPAN ports to the destination
SPAN port.
both Copies both received and transmitted packets from source SPAN ports to
the destination SPAN port.
span-source-port Physical interface name. Port spanning echoes all string Maximum
<interface- traffic on the SPAN source ports to the SPAN length: 79
name> destination port.
Physical interface name.
Option Description
switch Switch for normal switch functionality (available in NAT mode only).
vdom VDOM that the software switch belongs to. string Maximum
length: 31
Show timezone.
Configure Type of Service (ToS) based priority table to set network traffic priorities.
config system tos-based-priority
Description: Configure Type of Service (ToS) based priority table to set network traffic
priorities.
edit <id>
set priority [low|medium|...]
set tos {integer}
next
end
priority ToS based priority level to low, medium or high. option - high
Option Description
tos Value of the ToS byte in the IP datagram header. integer Minimum 0
value: 0
Maximum
value: 15
alt-primary Alternate primary DNS server. This is not used as a ipv4- Not 0.0.0.0
failover DNS server. address Specified
alt-secondary Alternate secondary DNS server. This is not used as a ipv4- Not 0.0.0.0
failover DNS server. address Specified
Option Description
ip6-primary Primary IPv6 DNS server IP address for the VDOM. ipv6- Not ::
address Specified
ip6-secondary Secondary IPv6 DNS server IP address for the VDOM. ipv6- Not ::
address Specified
primary Primary DNS server IP address for the VDOM. ipv4- Not 0.0.0.0
address Specified
Option Description
secondary Secondary DNS server IP address for the VDOM. ipv4- Not 0.0.0.0
address Specified
Option Description
source-ip Source IP for communications with the DNS server. ipv4- Not 0.0.0.0
address Specified
ssl-certificate Name of local certificate for SSL connections. string Maximum Fortinet_
length: 35 Factory
vdom-dns Enable/disable configuring DNS servers for the current option - disable
VDOM.
Option Description
Global configuration objects that can be configured independently across different ha peers for all VDOMs or for the
defined VDOM scope.
config system vdom-exception
Description: Global configuration objects that can be configured independently across
different ha peers for all VDOMs or for the defined VDOM scope.
edit <id>
set object [log.fortianalyzer.setting|log.fortianalyzer.override-setting|...]
set scope [all|inclusive|...]
set vdom <name1>, <name2>, ...
Option Description
log.fortianalyzer.setting log.fortianalyzer.setting
log.fortianalyzer.override- log.fortianalyzer.override-setting
setting
log.fortianalyzer2.setting log.fortianalyzer2.setting
log.fortianalyzer2.override- log.fortianalyzer2.override-setting
setting
log.fortianalyzer3.setting log.fortianalyzer3.setting
log.fortianalyzer3.override- log.fortianalyzer3.override-setting
setting
log.fortianalyzer- log.fortianalyzer-cloud.setting
cloud.setting
log.fortianalyzer- log.fortianalyzer-cloud.override-setting
cloud.override-setting
log.syslogd.setting log.syslogd.setting
log.syslogd.override-setting log.syslogd.override-setting
log.syslogd2.setting log.syslogd2.setting
log.syslogd2.override-setting log.syslogd2.override-setting
log.syslogd3.setting log.syslogd3.setting
log.syslogd3.override-setting log.syslogd3.override-setting
log.syslogd4.setting log.syslogd4.setting
log.syslogd4.override-setting log.syslogd4.override-setting
system.gre-tunnel system.gre-tunnel
system.central-management system.central-management
Option Description
system.csf system.csf
user.radius user.radius
log.syslogd.setting log.syslogd.setting
log.syslogd.override-setting log.syslogd.override-setting
firewall.address firewall.address
Option Description
inclusive Object configuration independent for the listed VDOMs. Other VDOMs use the
global configuration.
exclusive Use the global object configuration for the listed VDOMs. Other VDOMs can
be configured independently.
Option Description
Option Description
Option Description
source-ip Source IP address for communication with the NetFlow string Maximum
agent. length: 63
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
ipsec-phase1 Maximum guaranteed number of VPN IPsec phase 1 user Not Specified
tunnels.
ipsec-phase1- Maximum guaranteed number of VPN IPsec phase1 user Not Specified
interface interface tunnels.
ipsec-phase2 Maximum guaranteed number of VPN IPsec phase 2 user Not Specified
tunnels.
ipsec-phase2- Maximum guaranteed number of VPN IPsec phase2 user Not Specified
interface interface tunnels.
log-disk-quota Log disk quota in megabytes (MB). Range depends user Not Specified
on how much disk space is available.
Configure a RADIUS server to use as a RADIUS Single Sign On (RSSO) server for this VDOM.
config system vdom-radius-server
Description: Configure a RADIUS server to use as a RADIUS Single Sign On (RSSO) server
for this VDOM.
edit <name>
set radius-server-vdom {string}
set status [enable|disable]
next
end
name Name of the VDOM that you are adding the RADIUS string Maximum
server to. length: 31
radius-server- Use this option to select another VDOM containing a string Maximum
vdom VDOM RSSO RADIUS server to use for the current length: 31
VDOM.
status Enable/disable the RSSO RADIUS server for this option - disable
VDOM.
Option Description
Configure sFlow per VDOM to add or change the IP address and UDP port that FortiGate sFlow agents in this VDOM
use to send sFlow datagrams to an sFlow collector.
config system vdom-sflow
Description: Configure sFlow per VDOM to add or change the IP address and UDP port that
FortiGate sFlow agents in this VDOM use to send sFlow datagrams to an sFlow collector.
config collectors
Description: sFlow collectors.
edit <id>
set collector-ip {ipv4-address}
set collector-port {integer}
set source-ip {ipv4-address}
set interface-select-method [auto|sdwan|...]
set interface {string}
next
end
set vdom-sflow [enable|disable]
end
vdom-sflow Enable/disable the sFlow configuration for the current option - disable
VDOM.
Option Description
config collectors
collector-ip IP addresses of the sFlow collectors that sFlow ipv4- Not Specified 0.0.0.0
agents added to interfaces in this VDOM send sFlow address
datagrams to.
collector-port UDP port number used for sending sFlow datagrams. integer Minimum 6343
value: 0
Maximum
value: 65535
source-ip Source IP address for sFlow agent. ipv4- Not Specified 0.0.0.0
address
Option Description
This command is available for model(s): FortiGateRugged 70F 3G4G, FortiGateRugged 70F.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100F,
FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate
81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F,
FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E,
FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE,
FortiWiFi 81F 2R.
psu-1- Percentage threshold at which the first PSU voltage integer Minimum 80
threshold-low- drops to trigger a low voltage alarm value: 1
percent Maximum
value: 99
psu-2- Percentage threshold at which the second PSU voltage integer Minimum 80
threshold-low- drops to trigger a low voltage alarm value: 1
percent Maximum
value: 99
Option Description
This command is available for model(s): FortiGate 1000F, FortiGate 1001F, FortiGate 100F,
FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1800F, FortiGate 1801F, FortiGate 200F, FortiGate 201F, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000F, FortiGate 3001F, FortiGate 300E, FortiGate 301E,
FortiGate 3200F, FortiGate 3201F, FortiGate 3500F, FortiGate 3501F, FortiGate 3700F,
FortiGate 3701F, FortiGate 400E Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E,
FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F,
FortiGate 4400F, FortiGate 4401F, FortiGate 600F, FortiGate 601F, FortiGate 60E DSLJ,
FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E,
FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 80E-POE, FortiGate 80E, FortiGate
80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E,
FortiGate 81F-POE, FortiGate 81F, FortiGate 90E, FortiGate 91E, FortiGateRugged 60F
3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi
40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi
60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi
81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000D, FortiGate 2000E, FortiGate 200E, FortiGate 201E,
FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 3000D, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3960E, FortiGate 3980E,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 601E, FortiGate 800D, FortiGate 900D, FortiGate VM64.
Option Description
Option Description
config port
Option Description
Option Description
Option Description
Option Description
Option Description
ssl-certificate Name of local certificate for SSL connections. string Maximum Fortinet_
length: 35 Factory
Option Description
ip-version IP version to use for the VXLAN interface and so for option - ipv4-unicast
communication over the VXLAN. IPv4 or IPv6 unicast or
multicast.
Option Description
Option Description
remote-ip IPv4 address of the VXLAN interface on the device at string Maximum
<ip> the remote end of the VXLAN. length: 15
IPv4 address.
remote-ip6 IPv6 IP address of the VXLAN interface on the device at string Maximum
<ip6> the remote end of the VXLAN. length: 45
IPv6 address.
Configure WCCP.
config system wccp
Description: Configure WCCP.
edit <service-id>
set assignment-bucket-format [wccp-v2|cisco-implementation]
set assignment-dstaddr-mask {ipv4-netmask-any}
set assignment-method [HASH|MASK|...]
set assignment-srcaddr-mask {ipv4-netmask-any}
set assignment-weight {integer}
set authentication [enable|disable]
set cache-engine-method [GRE|L2]
set cache-id {ipv4-address}
set forward-method [GRE|L2|...]
set group-address {ipv4-address-multicast}
set password {password}
set ports {user}
set ports-defined [source|destination]
set primary-hash {option1}, {option2}, ...
set priority {integer}
set protocol {integer}
set return-method [GRE|L2|...]
set router-id {ipv4-address}
set router-list {user}
set server-list {user}
set server-type [forward|proxy]
set service-type [auto|standard|...]
next
end
assignment- Assignment bucket format for the WCCP cache option - cisco-
bucket-format engine. implementation
Option Description
Option Description
Option Description
Option Description
L2 L2 rewrite.
Option Description
L2 L2 rewrite.
group-address IP multicast address used by the cache routers. ipv4- Not 0.0.0.0
For the FortiGate to ignore multicast WCCP address- Specified
traffic, use the default 0.0.0.0. multicast
Option Description
Option Description
Option Description
L2 L2 rewrite.
router-id IP address known to all cache engines. If all ipv4- Not 0.0.0.0
cache engines connect to the same FortiGate address Specified
interface, use the default 0.0.0.0.
Option Description
service-type WCCP service type used by the cache server option - auto
for logical interception and redirection of traffic.
Option Description
auto auto
This command is available for model(s): FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E
DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100F,
FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate
81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-
POE, FortiWiFi 81F 2R.
Option Description
rogue Rogue.
accepted Accepted.
suppressed Suppressed.
This command is available for model(s): FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E
DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F.
It is not available for: FortiGate 1000D, FortiGate 1000F, FortiGate 1001F, FortiGate 100F,
FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 3000F, FortiGate 3001F,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3200F,
FortiGate 3201F, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3700F, FortiGate 3701F, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 400F, FortiGate 401E, FortiGate 401F, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 600F, FortiGate 601E, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
70F, FortiGate 71F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate
81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G,
FortiGateRugged 70F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-
POE, FortiWiFi 81F 2R.
Option Description
802.11a 802.11a.
802.11b 802.11b.
802.11g 802.11g.
Option Description
Option Description
disable 20 MHz.
Option Description
World World.
Americas Americas.
EMEA EMEA.
Israel Israel.
Japan Japan.
Option Description
CLIENT Client.
AP Access point.
SCAN Scan.
Option Description
Option Description
Configure zones to group two or more interfaces. When a zone is created you can configure policies for the zone instead
of individual interfaces in the zone.
config system zone
Description: Configure zones to group two or more interfaces. When a zone is created you
can configure policies for the zone instead of individual interfaces in the zone.
edit <name>
set description {string}
set interface <interface-name1>, <interface-name2>, ...
set intrazone [allow|deny]
config tagging
Description: Config object tagging.
edit <name>
set category {string}
set tags <name1>, <name2>, ...
next
end
next
end
interface Add interfaces to this zone. Interfaces must not be string Maximum
<interface- assigned to another zone or have firewall policies length: 79
name> defined.
Select interfaces to add to the zone.
Option Description
config tagging
Option Description
Option Description
Option Description
none The server is not configured as an Active Directory Domain Server (AD DS).
lds The server is an Active Directory Lightweight Domain Server (AD LDS).
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
port Port to be used for communication with the domain integer Minimum 445
controller. value: 0
Maximum
value:
65535
replication- Port to be used for communication with the domain integer Minimum 0
port controller for replication service. Port number 0 value: 0
indicates automatic discovery. Maximum
value:
65535
source-ip- FortiGate IPv4 address to be used for communication ipv4- Not 0.0.0.0
address with the domain controller. address Specified
source-port Source port to be used for communication with the integer Minimum 0
domain controller. value: 0
Maximum
value:
65535
username User name to sign in with. Must have proper string Maximum
permissions for service. length: 64
config extra-server
port Port to be used for communication with the domain integer Minimum 445
controller. value: 0
Maximum
value:
65535
source-ip- FortiGate IPv4 address to be used for communication ipv4- Not 0.0.0.0
address with the domain controller. address Specified
source-port Source port to be used for communication with the integer Minimum 0
domain controller. value: 0
Maximum
value:
65535
auth-level Authentication security level used for the RPC protocol option - privacy
layer.
Option Description
auth-type Authentication security type used for the RPC protocol option - kerberos
layer.
Option Description
Option Description
Option Description
rpc-over-tcp Connect using RPC-over-TCP. Use for MS Exchange 2010 and earlier
versions. Supported in MS Exchange 2013.
rpc-over-http Connect using RPC-over-HTTP. Use for MS Exchange 2016 and later
versions. Supported in MS Exchange 2013.
rpc-over-https Connect using RPC-over-HTTPS. Use for MS Exchange 2016 and later
versions. Supported in MS Exchange 2013.
http-auth-type Authentication security type used for the HTTP option - ntlm
transport.
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
Option Description
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
username User name used to sign in to the server. Must have string Maximum
proper permissions for service. length: 64
Option Description
Option Description
Option Description
disable Do not check server's identity against its certificate and subject alternative
name(s).
enable Check server's identity against its certificate and subject alternative name(s).
Option Description
Option Description
Configure FortiToken.
config user fortitoken
Description: Configure FortiToken.
edit <serial-number>
set activation-code {string}
set activation-expire {integer}
set comments {var-string}
set license {string}
set os-ver {string}
set reg-id {string}
set seed {string}
set status [active|lock]
next
end
Option Description
ldap-server LDAP server name used in LDAP connection strings. string Maximum
length: 35
password Password required to log into this Active Directory password Not Specified
server.
port Port to communicate with this Active Directory server. integer Minimum 0
value: 0
Maximum
value: 65535
Option Description
Option Description
status Enable/disable polling for the status of this Active option - enable
Directory server.
Option Description
user User name required to log into this Active Directory string Maximum
server. length: 35
config adgrp
Option Description
Option Description
port Port of the first FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
port2 Port of the second FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
port3 Port of the third FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
port4 Port of the fourth FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
port5 Port of the fifth FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
Option Description
Option Description
Option Description
Option Description
company Set the action for the company guest user field. option - optional
Option Description
optional Optional.
mandatory Mandatory.
disabled Disabled.
email Enable/disable the guest user email address field. option - enable
Option Description
expire Time in seconds before guest user accounts integer Minimum 14400
expire. value: 1
Maximum
value:
31536000
Option Description
immediately Immediately.
Option Description
firewall Firewall.
guest Guest.
Option Description
Option Description
Option Description
specify Specify.
disable Disable.
Option Description
sponsor Set the action for the sponsor guest user field. option - optional
Option Description
optional Optional.
mandatory Mandatory.
disabled Disabled.
sso-attribute- Name of the RADIUS user group that this local string Maximum
value user group represents. length: 511
Option Description
specify Specify.
Option Description
config guest
sponsor Set the action for the sponsor guest user field. string Maximum
length: 35
company Set the action for the company guest user field. string Maximum
length: 35
config match
keytab Base64 coded keytab file containing a pre-shared key. string Maximum
length: 8191
Option Description
Option Description
cn CN in subject.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable No SSL.
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
Option Description
Option Description
Option Description
ldap-server Name of LDAP server with which the user must string Maximum
authenticate. length: 35
ppk-secret IKEv2 Postquantum Preshared Key (ASCII string password-3 Not Specified
or hexadecimal encoded with a leading 0x).
radius-server Name of RADIUS server with which the user must string Maximum
authenticate. length: 35
Option Description
Option Description
tacacs+-server Name of TACACS+ server with which the user string Maximum
must authenticate. length: 35
Option Description
disable disable
fortitoken FortiToken
Option Description
Option Description
Option Description
Option Description
disable Ignore case and accents. Username at prompt not required to match case or
accents.
enable Do not ignore case and accents. Username at prompt must be an exact
match.
workstation Name of the remote user workstation, if you want string Maximum
to limit the user to authenticate only from a length: 35
particular workstation.
Option Description
description Description for the NAC policy matching pattern. string Maximum
length: 63
match-period Number of days the matched devices will be retained integer Minimum 0
(0 - always retain) value: 0
Maximum
value: 120
match-type Match and retain the devices based on the type. option - dynamic
Option Description
Option Description
ssid-policy SSID policy to be applied on the matched NAC policy. string Maximum
length: 35
Option Description
switch-fortilink * FortiLink interface for which this NAC policy belongs string Maximum
to. length: 15
expire-days Time in days before the user's password expires. integer Minimum 180
value: 0
Maximum
value: 999
Option Description
Option Description
Option Description
Option Description
mandatory- Determine what happens to the peer if the CA certificate option - enable
ca-verify is not installed. Disable to automatically consider the
peer certificate as valid.
Option Description
Option Description
none None.
Option Description
mfa-password Unified password for remote authentication. This field password Not
may be left empty when RADIUS authentication is used, Specified
in which case the FortiGate will use the RADIUS
username as a password.
ocsp- Online Certificate Status Protocol (OCSP) server for string Maximum
override- certificate retrieval. length: 35
server
Option Description
Option Description
none None.
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
firewall- Firewall address group which includes all quarantine string Maximum
groups MAC address. length: 79
Option Description
config targets
config macs
Option Description
account-key- Define subject identity field in certificate for user option - othername
cert-field access right checking.
Option Description
cn CN in subject.
Option Description
Option Description
Option Description
Option Description
Option Description
legacy Calling & Called station identifier is the value previously used by each
daemon.
MAC Calling & Called station identifier is the value of MAC address.
Option Description
Option Description
filter-Id Filter-Id
class Class
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
nas-ip IP address used to communicate with the ipv4- Not Specified 0.0.0.0
RADIUS server and used as NAS-IP-Address address
and Called-Station-ID attributes.
Option Description
Option Description
Option Description
Option Description
rsso-context- Time in seconds before the logged out user is integer Minimum 28800
timeout removed from the "user context list" of logged on value: 0
users. Maximum
value:
4294967295
rsso-endpoint- RADIUS attributes used to extract the user end option - Calling-
attribute point identifier from the RADIUS Start record. Station-Id
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable replacement of old IP address with new IP address for the same
endpoint on RADIUS accounting start.
disable Disable replacement of old IP address with new IP address for the same
endpoint on RADIUS accounting start.
Option Description
Option Description
rsso-log-period Time interval in seconds that group event log integer Minimum 0
messages will be generated for dynamic profile value: 0
events. Maximum
value:
4294967295
Option Description
rsso-radius- UDP port to listen on for RADIUS Start and Stop integer Minimum 1813
server-port records. value: 0
Maximum
value: 65535
rsso-secret RADIUS secret used by the RADIUS accounting password Not Specified
server.
Option Description
secondary- Secret key to access the secondary server. password Not Specified
secret
secret Pre-shared secret key used to access the password Not Specified
primary RADIUS server.
Option Description
sso-attribute RADIUS attribute that contains the profile group option - Class
name to be extracted from the RADIUS Start
record.
Option Description
Option Description
sso-attribute- Key prefix for SSO group value in the SSO string Maximum
key attribute. length: 35
Option Description
enable Enable override old attribute value with new value for the same endpoint.
disable Disable override old attribute value with new value for the same endpoint.
status-ttl Time for which server reachability is cached so integer Minimum 300
that when a server is unreachable, it will not be value: 0
retried for at least this period of time. Maximum
value: 600
Option Description
Option Description
Option Description
callback-nas- User disconnected and called back, then provided a command prompt.
prompt
callback- User disconnected and called back, granted access to the admin unsigned
administrative interface.
tertiary-secret Secret key to access the tertiary server. password Not Specified
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
udp UDP.
tcp TCP.
Option Description
Option Description
config accounting-server
Option Description
Option Description
Option Description
Option Description
Option Description
email-adfs-1x E-mail address of the user when interoperating with AD FS 1.1 or ADFS 1.0.
Option Description
Option Description
Option Description
Option Description
email-adfs-1x E-mail address of the user when interoperating with AD FS 1.1 or ADFS 1.0.
Option Description
Option Description
auth-lockout- Lockout period in seconds after too many login integer Minimum 0
duration failures. value: 0
Maximum
value:
4294967295
Option Description
auth-portal- Time in minutes before captive portal user have to integer Minimum 3
timeout re-authenticate. value: 1
Maximum
value: 30
Option Description
Option Description
Option Description
Option Description
sslv3 SSLv3.
tlsv1 TLSv1.
tlsv1-1 TLSv1.1.
tlsv1-2 TLSv1.2.
tlsv1-3 TLSv1.3.
Option Description
SSLv3 SSLv3.
Option Description
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
Option Description
default-user- Default password policy to apply to all local users string Maximum
password- unless otherwise specified, as defined in config user length: 35
policy password-policy.
Option Description
radius-ses- Set the RADIUS session timeout to a hard timeout or option - hard-
timeout-act to ignore RADIUS server session timeouts. timeout
Option Description
config auth-ports
Option Description
port Non-standard port for firewall user authentication. integer Minimum 1024
value: 1
Maximum
value: 65535
Option Description
mschap MSCHAP.
chap CHAP.
pap PAP.
ascii ASCII.
Option Description
Option Description
status-ttl Time for which server reachability is cached so that integer Minimum 300
when a server is unreachable, it will not be retried for value: 0
at least this period of time. Maximum
value: 600
Option Description
Option Description
config word
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
severity Relative severity of the signature (low, medium, high, option - low medium
critical). high critical
Option Description
low low
medium medium
high high
critical critical
config exemption
Option Description
Option Description
config msrp
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
max-calls Maximum calls per minute per SCCP client (max integer Minimum 0
65535). value: 0
Maximum
value:
65535
Option Description
Option Description
Option Description
Option Description
Option Description
register-rate REGISTER request rate limit (per second, per integer Minimum 0
policy). value: 0
Maximum
value:
4294967295
Option Description
none None.
invite-rate INVITE request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
Option Description
Option Description
Option Description
call-keepalive Continue tracking calls with no RTP for this many integer Minimum 0
minutes. value: 0
Maximum
value: 10080
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
subscribe-rate SUBSCRIBE request rate limit (per second, per integer Minimum 0
policy). value: 0
Maximum
value:
4294967295
Option Description
none None.
message-rate MESSAGE request rate limit (per second, per integer Minimum 0
policy). value: 0
Maximum
value:
4294967295
Option Description
none None.
notify-rate NOTIFY request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
refer-rate REFER request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
update-rate UPDATE request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
options-rate OPTIONS request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
ack-rate ACK request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
prack-rate PRACK request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
info-rate INFO request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
publish-rate PUBLISH request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
bye-rate BYE request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
cancel-rate CANCEL request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
call-id-regex Validate PCRE regular expression for Call-Id header var-string Maximum
value. length: 511
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
malformed- Action for malformed SIP messages without Require option - pass
header-no- header.
require
Option Description
Option Description
malformed- Action for malformed SIP messages without Proxy- option - pass
header-no- Require header.
proxy-require
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ssl-mode * SSL/TLS mode for encryption & decryption of traffic. option - off
Option Description
off No SSL.
Option Description
Option Description
secure Reject any SSL connection that does not offer a RFC 5746 Secure
Renegotiation Indication.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
Option Description
ssl-server- Name of Certificate return to the client in every SSL string Maximum
certificate * connection. length: 35
CA certificate.
config vpn certificate ca
Description: CA certificate.
edit <name>
set auto-update-days {integer}
set auto-update-days-warning {integer}
set ca {user}
set ca-identifier {string}
set est-url {string}
Option Description
Option Description
disable Alive.
enable Obsolete.
range Either global or VDOM IP address range for the CA option - vdom
certificate.
Option Description
Option Description
source-ip Source IP address for communications to the SCEP ipv4- Not Specified 0.0.0.0
server. address
Option Description
range Either global or VDOM IP address range for the option - vdom
certificate.
Option Description
scep-cert Local certificate for SCEP communication for CRL string Maximum Fortinet_
auto-update. length: 35 CA_SSL
Option Description
source-ip Source IP address for communications to a HTTP or ipv4- Not Specified 0.0.0.0
SCEP CA server. address
update- Time in seconds before the FortiGate checks for an integer Minimum 0
interval updated CRL. Set to 0 to update only when it expires. value: 0
Maximum
value:
4294967295
Option Description
renewal Renewal.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
source-ip Source IP address for dynamic AIA and OCSP queries. string Maximum
length: 63
unavail-action Action when server is unavailable (revoke the certificate option - revoke
or ignore the result of the check).
Option Description
range Either the global or VDOM IP address range for the option - vdom
remote certificate.
Option Description
Option Description
certname- 1024 bit DSA key certificate for re-signing server string Maximum Fortinet_
dsa1024 certificates for SSL inspection. length: 35 SSL_
DSA1024
certname- 2048 bit DSA key certificate for re-signing server string Maximum Fortinet_
dsa2048 certificates for SSL inspection. length: 35 SSL_
DSA2048
certname- 256 bit ECDSA key certificate for re-signing server string Maximum Fortinet_
ecdsa256 certificates for SSL inspection. length: 35 SSL_
ECDSA256
certname- 384 bit ECDSA key certificate for re-signing server string Maximum Fortinet_
ecdsa384 certificates for SSL inspection. length: 35 SSL_
ECDSA384
certname- 521 bit ECDSA key certificate for re-signing server string Maximum Fortinet_
ecdsa521 certificates for SSL inspection. length: 35 SSL_
ECDSA521
certname- 253 bit EdDSA key certificate for re-signing server string Maximum Fortinet_
ed25519 certificates for SSL inspection. length: 35 SSL_
ED25519
certname- 456 bit EdDSA key certificate for re-signing server string Maximum Fortinet_
ed448 certificates for SSL inspection. length: 35 SSL_ED448
certname- 1024 bit RSA key certificate for re-signing server string Maximum Fortinet_
rsa1024 certificates for SSL inspection. length: 35 SSL_
RSA1024
certname- 2048 bit RSA key certificate for re-signing server string Maximum Fortinet_
rsa2048 certificates for SSL inspection. length: 35 SSL_
RSA2048
certname- 4096 bit RSA key certificate for re-signing server string Maximum Fortinet_
rsa4096 certificates for SSL inspection. length: 35 SSL_
RSA4096
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
substring Find a match if the name being searched for is a part or the same as a
certificate CN.
value Find a match if the name being searched for is same as a certificate CN.
Option Description
ocsp-option Specify whether the OCSP URL is from certificate or option - server
configured OCSP server.
Option Description
Option Description
proxy Proxy server FQDN or IP for OCSP/CA queries during string Maximum
certificate verification. length: 127
source-ip Source IP address for dynamic AIA and OCSP string Maximum
queries. length: 63
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
substring Find a match if the name being searched for is a part or the same as a
certificate subject RDN.
value Find a match if the name being searched for is same as a certificate subject
RDN.
Option Description
subset Find a match if the name being searched for is a subset of a certificate subject.
superset Find a match if the name being searched for is a superset of a certificate
subject.
config crl-verification
Option Description
leaf-crl- CRL verification option when leaf CRL is absent. option - ignore
absence
Option Description
chain-crl- CRL verification option when CRL of any certificate in option - ignore
absence chain is absent.
Option Description
Concentrator configuration.
config vpn ipsec concentrator
Description: Concentrator configuration.
edit <id>
set member <name1>, <name2>, ...
set name {string}
set src-check [disable|enable]
next
end
Option Description
config mappings
packet-loss- Apply FEC parameters when packet loss is >= integer Minimum 0
threshold threshold. value: 0
Maximum
value: 100
latency- Apply FEC parameters when latency is <= threshold integer Minimum 0
threshold (0 means no threshold). value: 0
Maximum
value:
4294967295
phase2name Phase 2 tunnel name that you defined in the string Maximum
FortiClient dialup configuration. length: 35
Option Description
Option Description
auth-alg Authentication algorithm. Must be the same for both option - null
ends of the tunnel.
Option Description
null null
md5 md5
sha1 sha1
sha256 sha256
sha384 sha384
sha512 sha512
enc-alg Encryption algorithm. Must be the same for both ends of option - null
the tunnel.
Option Description
null null
des des
Option Description
3des 3des
aes128 aes128
aes192 aes192
aes256 aes256
aria128 aria128
aria192 aria192
aria256 aria256
seed seed
Option Description
local-gw IPv4 address of the local gateway's external interface. ipv4- Not 0.0.0.0
address- Specified
any
local-spi Local SPI, a hexadecimal 8-digit (4-byte) tag. Discerns user Not
between two traffic streams with different encryption Specified
rules.
Option Description
remote-gw IPv4 address of the remote gateway's external ipv4- Not 0.0.0.0
interface. address Specified
authentication Authentication algorithm. Must be the same for both option - null
ends of the tunnel.
Option Description
null Null.
md5 MD5.
sha1 SHA1.
sha256 SHA256.
sha384 SHA384.
sha512 SHA512.
encryption Encryption algorithm. Must be the same for both ends option - null
of the tunnel.
Option Description
null Null.
des DES.
3des 3DES.
aes128 AES128.
aes192 AES192.
aes256 AES256.
aria128 ARIA128.
aria192 ARIA192.
aria256 ARIA256.
seed Seed.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
dependent Short-cut tunnels are brought down if the parent tunnel goes down.
Option Description
Option Description
Option Description
enable Enable cross validation of peer ID and the identity in the peer's certificate as
specified in RFC 4945.
disable Disable cross validation of peer ID and the identity in the peer's certificate
as specified in RFC 4945.
Option Description
Option Description
none Disable cross validation of peer username and the identity in the peer's
certificate.
cn Validate CN in subject.
Option Description
Option Description
Option Description
disable Disable allowing the VPN client to bring up the tunnel when there is no
traffic.
enable Enable allowing the VPN client to bring up the tunnel when there is no
traffic.
Option Description
disable Disable allowing the VPN client to keep the tunnel up when there is no
traffic.
enable Enable allowing the VPN client to keep the tunnel up when there is no
traffic.
Option Description
default-gw IPv4 address of default route gateway to ipv4-address Not Specified 0.0.0.0
use for traffic exiting the interface.
Option Description
dhcp-ra-giaddr Relay agent gateway IP address to use in ipv4-address Not Specified 0.0.0.0
the giaddr field of DHCP requests.
dhcp6-ra- Relay agent IPv6 link address to use in ipv6-address Not Specified ::
linkaddr DHCP6 requests.
Option Description
1 DH Group 1.
2 DH Group 2.
5 DH Group 5.
14 DH Group 14.
15 DH Group 15.
Option Description
16 DH Group 16.
17 DH Group 17.
18 DH Group 18.
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
27 DH Group 27.
28 DH Group 28.
29 DH Group 29.
30 DH Group 30.
31 DH Group 31.
32 DH Group 32.
Option Description
Option Description
Option Description
on-demand Trigger Dead Peer Detection when IPsec traffic is sent but no reply is
received from the peer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
exchange-ip- IPv4 address to exchange with peers. ipv4-address Not Specified 0.0.0.0
addr4
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable copy the dscp in the ESP header to the inner IP Header.
disable Disable copy the dscp in the ESP header to the inner IP Header.
Option Description
Option Description
Option Description
Option Description
ipv4-split- IPv4 subnets that should not be sent over string Maximum
exclude the IPsec tunnel. length: 79
ipv6-split- IPv6 subnets that should not be sent over string Maximum
exclude the IPsec tunnel. length: 79
local-gw IPv4 address of the local gateway's ipv4-address Not Specified 0.0.0.0
external interface.
Option Description
Option Description
disable Ingress/egress IKE traffic must be routed over the same interface.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
Option Description
sunday Sunday.
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
thursday Thursday.
friday Friday.
saturday Saturday.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow, but do not require, use of IKEv2 Postquantum Preshared Key (PPK).
Option Description
des-md5 des-md5
des-sha1 des-sha1
des-sha256 des-sha256
des-sha384 des-sha384
des-sha512 des-sha512
3des-md5 3des-md5
3des-sha1 3des-sha1
3des-sha256 3des-sha256
3des-sha384 3des-sha384
3des-sha512 3des-sha512
aes128-md5 aes128-md5
aes128-sha1 aes128-sha1
aes128-sha256 aes128-sha256
aes128-sha384 aes128-sha384
aes128-sha512 aes128-sha512
aes128gcm-prfsha1 aes128gcm-prfsha1
aes128gcm-prfsha256 aes128gcm-prfsha256
aes128gcm-prfsha384 aes128gcm-prfsha384
aes128gcm-prfsha512 aes128gcm-prfsha512
aes192-md5 aes192-md5
aes192-sha1 aes192-sha1
aes192-sha256 aes192-sha256
aes192-sha384 aes192-sha384
aes192-sha512 aes192-sha512
aes256-md5 aes256-md5
aes256-sha1 aes256-sha1
aes256-sha256 aes256-sha256
aes256-sha384 aes256-sha384
aes256-sha512 aes256-sha512
Option Description
aes256gcm-prfsha1 aes256gcm-prfsha1
aes256gcm-prfsha256 aes256gcm-prfsha256
aes256gcm-prfsha384 aes256gcm-prfsha384
aes256gcm-prfsha512 aes256gcm-prfsha512
chacha20poly1305-prfsha1 chacha20poly1305-prfsha1
chacha20poly1305-prfsha256 chacha20poly1305-prfsha256
chacha20poly1305-prfsha384 chacha20poly1305-prfsha384
chacha20poly1305-prfsha512 chacha20poly1305-prfsha512
aria128-md5 aria128-md5
aria128-sha1 aria128-sha1
aria128-sha256 aria128-sha256
aria128-sha384 aria128-sha384
aria128-sha512 aria128-sha512
aria192-md5 aria192-md5
aria192-sha1 aria192-sha1
aria192-sha256 aria192-sha256
aria192-sha384 aria192-sha384
aria192-sha512 aria192-sha512
aria256-md5 aria256-md5
aria256-sha1 aria256-sha1
aria256-sha256 aria256-sha256
aria256-sha384 aria256-sha384
aria256-sha512 aria256-sha512
seed-md5 seed-md5
seed-sha1 seed-sha1
seed-sha256 seed-sha256
seed-sha384 seed-sha384
seed-sha512 seed-sha512
psksecret- Pre-shared secret for remote side PSK password-3 Not Specified
remote authentication (ASCII string or
hexadecimal encoded with a leading 0x).
Option Description
allow Allow, but do not require, use of a Quantum Key Distribution (QKD) server.
Option Description
Option Description
remote-gw IPv4 address of the remote gateway's ipv4-address Not Specified 0.0.0.0
external interface.
remote-gw-end- Last IPv4 address in the range. ipv4- Not Specified 0.0.0.0
ip address-any
Option Description
remote-gw-start- First IPv4 address in the range. ipv4- Not Specified 0.0.0.0
ip address-any
remote-gw- IPv4 address and subnet mask. ipv4- Not Specified 0.0.0.0 0.0.0.0
subnet classnet-any
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sha1 SHA1.
sha2-256 SHA2-256.
sha2-384 SHA2-384.
sha2-512 SHA2-512.
Option Description
Option Description
udp-fallback-tcp Use UDP transport for IKE, with fallback to TCP transport.
Option Description
ddns Remote VPN gateway has dynamic IP address and is a dynamic DNS
client.
Option Description
Option Description
Option Description
Option Description
disable Disable.
config ipv4-exclude-range
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable cross validation of peer ID and the identity in the peer's certificate as
specified in RFC 4945.
disable Disable cross validation of peer ID and the identity in the peer's certificate
as specified in RFC 4945.
Option Description
Option Description
none Disable cross validation of peer username and the identity in the peer's
certificate.
cn Validate CN in subject.
Option Description
Option Description
Option Description
disable Disable allowing the VPN client to bring up the tunnel when there is no
traffic.
enable Enable allowing the VPN client to bring up the tunnel when there is no
traffic.
Option Description
disable Disable allowing the VPN client to keep the tunnel up when there is no
traffic.
enable Enable allowing the VPN client to keep the tunnel up when there is no
traffic.
Option Description
Option Description
Option Description
1 DH Group 1.
2 DH Group 2.
5 DH Group 5.
14 DH Group 14.
15 DH Group 15.
16 DH Group 16.
17 DH Group 17.
18 DH Group 18.
19 DH Group 19.
Option Description
20 DH Group 20.
21 DH Group 21.
27 DH Group 27.
28 DH Group 28.
29 DH Group 29.
30 DH Group 30.
31 DH Group 31.
32 DH Group 32.
Option Description
Option Description
domain Instruct unity clients about the single default string Maximum
DNS domain. length: 63
Option Description
on-demand Trigger Dead Peer Detection when IPsec traffic is sent but no reply is
received from the peer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable copy the dscp in the ESP header to the inner IP Header.
disable Disable copy the dscp in the ESP header to the inner IP Header.
Option Description
ipv4-split- IPv4 subnets that should not be sent over string Maximum
exclude the IPsec tunnel. length: 79
ipv6-split- IPv6 subnets that should not be sent over string Maximum
exclude the IPsec tunnel. length: 79
Option Description
Option Description
disable Ingress/egress IKE traffic must be routed over the same interface.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow, but do not require, use of IKEv2 Postquantum Preshared Key (PPK).
Option Description
des-md5 des-md5
des-sha1 des-sha1
des-sha256 des-sha256
des-sha384 des-sha384
des-sha512 des-sha512
3des-md5 3des-md5
3des-sha1 3des-sha1
3des-sha256 3des-sha256
3des-sha384 3des-sha384
3des-sha512 3des-sha512
aes128-md5 aes128-md5
aes128-sha1 aes128-sha1
aes128-sha256 aes128-sha256
aes128-sha384 aes128-sha384
aes128-sha512 aes128-sha512
aes128gcm-prfsha1 aes128gcm-prfsha1
aes128gcm-prfsha256 aes128gcm-prfsha256
aes128gcm-prfsha384 aes128gcm-prfsha384
aes128gcm-prfsha512 aes128gcm-prfsha512
aes192-md5 aes192-md5
aes192-sha1 aes192-sha1
aes192-sha256 aes192-sha256
aes192-sha384 aes192-sha384
aes192-sha512 aes192-sha512
aes256-md5 aes256-md5
Option Description
aes256-sha1 aes256-sha1
aes256-sha256 aes256-sha256
aes256-sha384 aes256-sha384
aes256-sha512 aes256-sha512
aes256gcm-prfsha1 aes256gcm-prfsha1
aes256gcm-prfsha256 aes256gcm-prfsha256
aes256gcm-prfsha384 aes256gcm-prfsha384
aes256gcm-prfsha512 aes256gcm-prfsha512
chacha20poly1305-prfsha1 chacha20poly1305-prfsha1
chacha20poly1305-prfsha256 chacha20poly1305-prfsha256
chacha20poly1305-prfsha384 chacha20poly1305-prfsha384
chacha20poly1305-prfsha512 chacha20poly1305-prfsha512
aria128-md5 aria128-md5
aria128-sha1 aria128-sha1
aria128-sha256 aria128-sha256
aria128-sha384 aria128-sha384
aria128-sha512 aria128-sha512
aria192-md5 aria192-md5
aria192-sha1 aria192-sha1
aria192-sha256 aria192-sha256
aria192-sha384 aria192-sha384
aria192-sha512 aria192-sha512
aria256-md5 aria256-md5
aria256-sha1 aria256-sha1
aria256-sha256 aria256-sha256
aria256-sha384 aria256-sha384
aria256-sha512 aria256-sha512
seed-md5 seed-md5
seed-sha1 seed-sha1
Option Description
seed-sha256 seed-sha256
seed-sha384 seed-sha384
seed-sha512 seed-sha512
Option Description
allow Allow, but do not require, use of a Quantum Key Distribution (QKD) server.
Option Description
Option Description
Option Description
remote-gw- IPv4 address and subnet mask. ipv4- Not 0.0.0.0 0.0.0.0
subnet classnet-any Specified
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sha1 SHA1.
sha2-256 SHA2-256.
sha2-384 SHA2-384.
sha2-512 SHA2-512.
Option Description
Option Description
Option Description
udp-fallback-tcp Use UDP transport for IKE, with fallback to TCP transport.
Option Description
ddns Remote VPN gateway has dynamic IP address and is a dynamic DNS
client.
Option Description
Option Description
Option Description
Option Description
disable Disable.
config ipv4-exclude-range
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
1 DH Group 1.
2 DH Group 2.
5 DH Group 5.
14 DH Group 14.
15 DH Group 15.
16 DH Group 16.
17 DH Group 17.
18 DH Group 18.
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
27 DH Group 27.
28 DH Group 28.
29 DH Group 29.
30 DH Group 30.
31 DH Group 31.
32 DH Group 32.
Option Description
diffservcode DSCP value to be applied to the IPsec tunnel user Not Specified
outer IP header.
Option Description
ip IPv4 IP.
Option Description
Option Description
phase1 copy the DCSP in the ESP header to the inner IP Header according to the
phase1 inbound_dscp_copy setting.
enable Enable copying of the DSCP in the ESP header to the inner IP header.
disable Disable copying of the DSCP in the ESP header to the inner IP header.
Option Description
Option Description
Option Description
Option Description
keylifekbs Phase2 key life in number of kilobytes of traffic. integer Minimum 5120
value: 5120
Maximum
value:
4294967295
Option Description
Option Description
Option Description
null-md5 null-md5
null-sha1 null-sha1
null-sha256 null-sha256
null-sha384 null-sha384
Option Description
null-sha512 null-sha512
des-null des-null
des-md5 des-md5
des-sha1 des-sha1
des-sha256 des-sha256
des-sha384 des-sha384
des-sha512 des-sha512
3des-null 3des-null
3des-md5 3des-md5
3des-sha1 3des-sha1
3des-sha256 3des-sha256
3des-sha384 3des-sha384
3des-sha512 3des-sha512
aes128-null aes128-null
aes128-md5 aes128-md5
aes128-sha1 aes128-sha1
aes128-sha256 aes128-sha256
aes128-sha384 aes128-sha384
aes128-sha512 aes128-sha512
aes128gcm aes128gcm
aes192-null aes192-null
aes192-md5 aes192-md5
aes192-sha1 aes192-sha1
aes192-sha256 aes192-sha256
aes192-sha384 aes192-sha384
aes192-sha512 aes192-sha512
aes256-null aes256-null
aes256-md5 aes256-md5
aes256-sha1 aes256-sha1
Option Description
aes256-sha256 aes256-sha256
aes256-sha384 aes256-sha384
aes256-sha512 aes256-sha512
aes256gcm aes256gcm
chacha20poly1305 chacha20poly1305
aria128-null aria128-null
aria128-md5 aria128-md5
aria128-sha1 aria128-sha1
aria128-sha256 aria128-sha256
aria128-sha384 aria128-sha384
aria128-sha512 aria128-sha512
aria192-null aria192-null
aria192-md5 aria192-md5
aria192-sha1 aria192-sha1
aria192-sha256 aria192-sha256
aria192-sha384 aria192-sha384
aria192-sha512 aria192-sha512
aria256-null aria256-null
aria256-md5 aria256-md5
aria256-sha1 aria256-sha1
aria256-sha256 aria256-sha256
aria256-sha384 aria256-sha384
aria256-sha512 aria256-sha512
seed-null seed-null
seed-md5 seed-md5
seed-sha1 seed-sha1
seed-sha256 seed-sha256
seed-sha384 seed-sha384
seed-sha512 seed-sha512
Option Description
Option Description
use-old Use the old route and do not add the new route.
use-new Delete the old route and add the new route.
Option Description
Option Description
ip IPv4 IP.
Option Description
Option Description
Option Description
Option Description
1 DH Group 1.
2 DH Group 2.
5 DH Group 5.
14 DH Group 14.
15 DH Group 15.
16 DH Group 16.
17 DH Group 17.
18 DH Group 18.
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
27 DH Group 27.
28 DH Group 28.
29 DH Group 29.
30 DH Group 30.
31 DH Group 31.
32 DH Group 32.
Option Description
diffservcode DSCP value to be applied to the IPsec tunnel user Not Specified
outer IP header.
Option Description
ip IPv4 IP.
Option Description
Option Description
phase1 copy the DCSP in the ESP header to the inner IP Header according to the
phase1 inbound_dscp_copy setting.
Option Description
enable Enable copying of the DSCP in the ESP header to the inner IP header.
disable Disable copying of the DSCP in the ESP header to the inner IP header.
Option Description
Option Description
Option Description
Option Description
keylifekbs Phase2 key life in number of kilobytes of traffic. integer Minimum 5120
value: 5120
Maximum
value:
4294967295
Option Description
Option Description
Option Description
null-md5 null-md5
null-sha1 null-sha1
null-sha256 null-sha256
null-sha384 null-sha384
null-sha512 null-sha512
des-null des-null
des-md5 des-md5
des-sha1 des-sha1
des-sha256 des-sha256
des-sha384 des-sha384
des-sha512 des-sha512
3des-null 3des-null
3des-md5 3des-md5
3des-sha1 3des-sha1
3des-sha256 3des-sha256
Option Description
3des-sha384 3des-sha384
3des-sha512 3des-sha512
aes128-null aes128-null
aes128-md5 aes128-md5
aes128-sha1 aes128-sha1
aes128-sha256 aes128-sha256
aes128-sha384 aes128-sha384
aes128-sha512 aes128-sha512
aes128gcm aes128gcm
aes192-null aes192-null
aes192-md5 aes192-md5
aes192-sha1 aes192-sha1
aes192-sha256 aes192-sha256
aes192-sha384 aes192-sha384
aes192-sha512 aes192-sha512
aes256-null aes256-null
aes256-md5 aes256-md5
aes256-sha1 aes256-sha1
aes256-sha256 aes256-sha256
aes256-sha384 aes256-sha384
aes256-sha512 aes256-sha512
aes256gcm aes256gcm
chacha20poly1305 chacha20poly1305
aria128-null aria128-null
aria128-md5 aria128-md5
aria128-sha1 aria128-sha1
aria128-sha256 aria128-sha256
aria128-sha384 aria128-sha384
aria128-sha512 aria128-sha512
Option Description
aria192-null aria192-null
aria192-md5 aria192-md5
aria192-sha1 aria192-sha1
aria192-sha256 aria192-sha256
aria192-sha384 aria192-sha384
aria192-sha512 aria192-sha512
aria256-null aria256-null
aria256-md5 aria256-md5
aria256-sha1 aria256-sha1
aria256-sha256 aria256-sha256
aria256-sha384 aria256-sha384
aria256-sha512 aria256-sha512
seed-null seed-null
seed-md5 seed-md5
seed-sha1 seed-sha1
seed-sha256 seed-sha256
seed-sha384 seed-sha384
seed-sha512 seed-sha512
Option Description
Option Description
use-old Use the old route and do not add the new route.
Option Description
use-new Delete the old route and add the new route.
Option Description
Option Description
Option Description
ip IPv4 IP.
Option Description
enable Replace source selector with interface IP when using outbound NAT.
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
password Password to use for connectivity to the KMIP server. password Not
Specified
server- Enable/disable KMIP server identity check (verify server option - disable
identity-check FQDN/IP address against the server certificate).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
username User name to use for connectivity to the KMIP server. string Maximum
length: 63
id ID integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
cert Client certificate to use for connectivity to the KMIP string Maximum
server. length: 35
Configure L2TP.
config vpn l2tp
Description: Configure L2TP.
set compress [enable|disable]
set eip {ipv4-address}
set enforce-ipsec [enable|disable]
set hello-interval {integer}
set lcp-echo-interval {integer}
set lcp-max-echo-fails {integer}
set sip {ipv4-address}
set status [enable|disable]
set usrgrp {string}
end
Option Description
Option Description
lcp-echo- Time in seconds between PPPoE Link Control Protocol integer Minimum 5
interval (LCP) echo requests. value: 0
Maximum
value:
32767
Option Description
Configure PPTP.
Option Description
range PPTP client IP from manual config (range from sip to eip).
local-ip Local IP to be used for peer's remote IP. ipv4- Not 0.0.0.0
address Specified
Option Description
peer Authenticate Quantum Key Device's certificate with the string Maximum
peer/peergrp. length: 35
Client.
config vpn ssl client
Description: Client.
edit <name>
set certificate {string}
set class-id {integer}
set comment {var-string}
set distance {integer}
set interface {string}
set ipv4-subnets {string}
set ipv6-subnets {string}
set peer {string}
set port {integer}
set priority {integer}
set psk {password-3}
set realm {string}
set server {string}
set source-ip {string}
psk Pre-shared secret to authenticate with the server password-3 Not Specified
(ASCII string or hexadecimal encoded with a leading
0x).
server IPv4, IPv6 or DNS address of the SSL-VPN server. string Maximum
length: 63
source-ip IPv4 or IPv6 address to use as a source for the SSL- string Maximum
VPN connection to the server. length: 63
Option Description
Configure SSL-VPN.
config vpn ssl settings
Description: Configure SSL-VPN.
set algorithm [high|medium|...]
set auth-session-check-source-ip [enable|disable]
set auth-timeout {integer}
config authentication-rule
Description: Authentication rule for SSL-VPN.
edit <id>
set source-interface <name1>, <name2>, ...
set source-address <name1>, <name2>, ...
set source-address-negate [enable|disable]
set source-address6 <name1>, <name2>, ...
set source-address6-negate [enable|disable]
set users <name1>, <name2>, ...
set groups <name1>, <name2>, ...
set portal {string}
set realm {string}
set client-cert [enable|disable]
set user-peer {string}
set cipher [any|high|...]
set auth [any|local|...]
next
end
set auto-tunnel-static-route [enable|disable]
set banned-cipher {option1}, {option2}, ...
set browser-language-detection [enable|disable]
set check-referer [enable|disable]
set ciphersuite {option1}, {option2}, ...
set client-sigalgs [no-rsa-pss|all]
algorithm Force the SSL-VPN security level. High allows option - high
only high. Medium allows medium and high. Low
allows any.
Option Description
default default
Option Description
Option Description
banned-cipher Select one or more cipher technologies that option - SHA1 SHA256
cannot be used in SSL-VPN negotiations. Only SHA384
applies to TLS 1.2 and below.
Option Description
DHE Ban the use of cipher suites using authenticated ephemeral DH key
agreement.
ECDHE Ban the use of cipher suites using authenticated ephemeral ECDH key
agreement.
AES Ban the use of cipher suites using either 128 or 256 bit AES.
AESGCM Ban the use of cipher suites AES in Galois Counter Mode (GCM).
CAMELLIA Ban the use of cipher suites using either 128 or 256 bit CAMELLIA.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
dual-stack- Tunnel mode: enable parallel IPv4 and IPv6 option - disable
mode tunnel. Web mode: support IPv4 and IPv6
bookmarks in the portal.
Option Description
Option Description
encrypt-and- Encrypt and store user passwords for SSL-VPN option - disable
store-password web sessions.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
idle-timeout SSL-VPN disconnects if idle for specified time in integer Minimum 300
seconds. value: 0
Maximum
value: 259200
login-block-time Time for which a user is blocked from logging in integer Minimum 60
after too many failed login attempts. value: 0
Maximum
value:
4294967295
Option Description
Option Description
saml-redirect- SAML local redirect port in the machine running integer Minimum 8020
port FortiClient. 0 is to disable redirection on FGT value: 0
side. Maximum
value: 65535
server- Server hostname for HTTPS. When set, will be string Maximum
hostname used for SSL VPN web proxy host header for length: 255
any redirection.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
tunnel-addr- Method used for assigning address for tunnel. option - first-available
assigned-
method
Option Description
round-robin Assign the available address from the pool with a round robin fashion.
Option Descript