FortiOS 7.0.9 CLI Reference
FortiOS 7.0.9 CLI Reference
FortiOS 7.0.9
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
NSE INSTITUTE
https://training.fortinet.com
FORTIGUARD CENTER
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
Change Log 19
FortiOS CLI reference 20
Availability of commands and options 20
Command tree 20
CLI configuration commands 22
alertemail 23
config alertemail setting 23
antivirus 30
config antivirus profile 30
config antivirus quarantine 58
config antivirus settings 63
application 65
config application custom 65
config application group 66
config application list 67
config application name 76
config application rule-settings 78
authentication 79
config authentication rule 79
config authentication scheme 81
config authentication setting 83
certificate 86
config certificate ca 86
config certificate crl 87
config certificate local 89
config certificate remote 92
dlp 94
config dlp filepattern 94
config dlp fp-doc-source 97
config dlp sensitivity 100
config dlp sensor 101
config dlp settings 106
dnsfilter 108
config dnsfilter domain-filter 108
config dnsfilter profile 109
dpdk 115
config dpdk cpus 115
config dpdk global 116
emailfilter 119
config emailfilter block-allow-list 119
config emailfilter bword 121
config emailfilter dnsbl 123
config emailfilter fortishield 124
config emailfilter iptrust 125
Change Log
This document describes FortiOS 7.0.9 CLI commands used to configure and manage a FortiGate unit from the
command line interface (CLI). For information on using the CLI, see the FortiOS 7.0.9 Administration Guide, which
contains information such as:
l Connecting to the CLI
l CLI basics
l Command syntax
l Subcommands
l Permissions
Some FortiOS CLI commands and options are not available on all FortiGate units. The CLI displays an error message if
you attempt to enter a command or option that is not available. You can use the question mark ‘?’ to verify the commands
and options that are available.
Commands and options may not be available for the following reasons:
FortiGate model
All commands are not available on all FortiGate models. For example, a hardware switch can be configured only on
models which have the corresponding hardware switch chipset.
Hardware configuration
For example, settings like mediatype would only be available on units with SFPs.
Commands for extended functionality are not available on all FortiGate models. The CLI Reference may not include all
commands.
Command tree
Enter tree to display the entire FortiOS CLI command tree. To capture the full output, connect to your device using a
terminal emulation program, such as PuTTY, and capture the output to a log file.
l To view all available commands, enter tree.
l To view a specific configuration branch of a tree, enter tree <branch>, for example: tree system.
Use configuration commands to configure and manage a FortiGate unit from the command line interface (CLI).
The CLI syntax is created by processing the schema from FortiGate models running FortiOS 7.0.9 and reformatting the
resultant CLI output.
If you have comments on this content, its format, or requests for commands that are not included, contact us at
[email protected].
Option Description
Option Description
FIPS-CC-errors Enable/disable FIPS and Common Criteria error logs option - disable
in alert email.
Option Description
enable Enable FIPS and Common Criteria error logs in alert email.
disable Disable FIPS and Common Criteria error logs in alert email.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable Fortinet Advanced Mezzanine Card (AMC) interface bypass mode
logs in alert email.
disable Disable Fortinet Advanced Mezzanine Card (AMC) interface bypass mode
logs in alert email.
Option Description
Option Description
filter-mode How to filter log messages that are sent to alert option - category
emails.
Option Description
Option Description
Option Description
local-disk-usage Disk usage percentage at which to send alert email. integer Minimum 75
value: 1
Maximum
value: 99
Option Description
mailto2 Optional second email address to send alert email to string Not
(max. 63 characters). Specified
mailto3 Optional third email address to send alert email to string Not
(max. 63 characters). Specified
Option Description
Option Description
Option Description
username Name that appears in the From: field of alert emails string Not
(max. 63 characters). Specified
Option Description
Option Description
analytics- Only submit files matching this DLP file-pattern to integer Minimum 0
accept-filetype FortiSandbox. value: 0
Maximum
value:
4294967295
Option Description
analytics- Do not submit files matching this DLP file-pattern to integer Minimum 0
ignore-filetype FortiSandbox. value: 0
Maximum
value:
4294967295
Option Description
Option Description
Option Description
disable Disable use of EMS threat feed when performing AntiVirus scan.
enable Enable use of EMS threat feed when performing AntiVirus scan.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
replacemsg- Replacement message group customized for this string Not Specified
group profile.
Option Description
legacy Scan archive files only after the entire file is received.
config cifs
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
config content-disarm
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
cover-page Enable/disable inserting a cover page into the disarmed option - enable
document.
Option Description
detect-only Enable/disable only detect disarmable files, do not alter option - disable
content.
Option Description
config ftp
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
Option Description
config http
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
unknown- Configure the action the FortiGate unit will take on option - block
content- unknown content-encoding.
encoding
Option Description
inspect Inspect HTTP traffic as plain-text with AV scan when unknown content-
encoding is detected.
Option Description
disable Disable Content Disarm and Reconstruction when performing AntiVirus scan.
enable Enable Content Disarm and Reconstruction when performing AntiVirus scan.
config imap
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
Option Description
executables Treat Windows executable files as viruses for the option - default
purpose of blocking or monitoring.
Option Description
Option Description
disable Disable Content Disarm and Reconstruction when performing AntiVirus scan.
enable Enable Content Disarm and Reconstruction when performing AntiVirus scan.
config mapi
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
executables Treat Windows executable files as viruses for the option - default
purpose of blocking or monitoring.
Option Description
config nac-quar
Option Description
quar-src-ip Quarantine all traffic from the infected hosts source IP.
Option Description
config nntp
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
executables Treat Windows executable files as viruses for the option - default
purpose of blocking or monitoring.
Option Description
Option Description
disable Disable Content Disarm and Reconstruction when performing AntiVirus scan.
enable Enable Content Disarm and Reconstruction when performing AntiVirus scan.
config smtp
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
executables Treat Windows executable files as viruses for the option - default
purpose of blocking or monitoring.
Option Description
Option Description
disable Disable Content Disarm and Reconstruction when performing AntiVirus scan.
enable Enable Content Disarm and Reconstruction when performing AntiVirus scan.
config ssh
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
Option Description
FortiAnalyzer FortiAnalyzer
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
Option Description
https HTTPS.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
https HTTPS.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
lowspace Select the method for handling additional files when option - ovrw-old
running low on disk space.
Option Description
ovrw-old Overwrite the oldest quarantined files. That is, the files that are closest to
being deleted from the quarantine.
quarantine- The amount of disk space to reserve for quarantining integer Minimum 0
quota files. value: 0
Maximum
value:
4294967295
store-blocked Quarantine blocked files found in sessions using the option - imap smtp
selected protocols. pop3 http
ftp nntp
imaps
smtps
pop3s ftps
mapi cifs
ssh
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
store-infected Quarantine infected files found in sessions using the option - imap smtp
selected protocols. pop3 http
ftp nntp
imaps
smtps
pop3s
https ftps
mapi cifs
ssh
Option Description
imap IMAP.
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
https HTTPS.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
store- Quarantine files detected by machine learning found in option - imap smtp
machine- sessions using the selected protocols. pop3 http
learning ftp nntp
imaps
smtps
pop3s
https ftps
mapi cifs
ssh
Option Description
imap IMAP.
Option Description
smtp SMTP.
pop3 POP3.
http HTTP.
ftp FTP.
nntp NNTP.
imaps IMAPS.
smtps SMTPS.
pop3s POP3S.
https HTTPS.
ftps FTPS.
mapi MAPI.
cifs CIFS.
ssh SSH.
Option Description
Option Description
Option Description
monitor Enable machine learning based malware detection for monitoring only.
override- Override the large file scan timeout value in seconds. integer Minimum 0
timeout Zero is the default value and is used to disable this value: 30
command. When disabled, the daemon adjusts the Maximum
large file scan timeout based on the file size. value: 3600
Option Description
signature The text that makes up the actual custom application var-string Not Specified
signature.
Option Description
1 Popularity level 1.
2 Popularity level 2.
3 Popularity level 3.
4 Popularity level 4.
5 Popularity level 5.
risk <level> Risk, or impact, of allowing traffic from this integer Minimum
application to occur (1 - 5; Low, Elevated, Medium, value: 0
High, and Critical). Maximum
Risk, or impact, of allowing traffic from this value:
application to occur (1 - 5; Low, Elevated, Medium, 4294967295
High, and Critical).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable forced inclusion of signatures which normally require SSL deep
inspection.
enable Enable forced inclusion of signatures which normally require SSL deep
inspection.
Option Description
Option Description
Option Description
Option Description
skype Skype.
edonkey Edonkey.
Option Description
Option Description
config default-network-services
Option Description
http HTTP.
ssh SSH.
telnet TELNET.
ftp FTP.
dns DNS.
smtp SMTP.
pop3 POP3.
imap IMAP.
snmp SNMP.
nntp NNTP.
https HTTPS.
violation- Action for protocols not in the allowlist for selected option - block
action port.
Option Description
config entries
risk <level> Risk, or impact, of allowing traffic from this integer Minimum
application to occur (1 - 5; Low, Elevated, Medium, value: 0
High, and Critical). Maximum
Risk, or impact, of allowing traffic from this value:
application to occur (1 - 5; Low, Elevated, Medium, 4294967295
High, and Critical).
Option Description
1 Popularity level 1.
2 Popularity level 2.
3 Popularity level 3.
4 Popularity level 4.
5 Popularity level 5.
action Pass or block traffic, or reset connection for traffic option - block
from this application.
Option Description
Option Description
Option Description
Option Description
Option Description
none none
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
config parameters
config metadata
config parameters
Option Description
Option Description
srcaddr Authentication is required for the selected IPv4 source string Maximum
<name> address. length: 79
Address name.
srcaddr6 Authentication is required for the selected IPv6 source string Maximum
<name> address. length: 79
Address name.
Option Description
Option Description
Option Description
web-portal Enable/disable web portal for proxy transparent policy. option - enable
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
dev-range Address range for the IP based device query. string Maximum
<name> Address name. length: 79
config certificate ca
CA certificate.
config certificate ca
Description: CA certificate.
edit <name>
set auto-update-days {integer}
set auto-update-days-warning {integer}
set ca {user}
set ca-identifier {string}
set name {string}
set range [global|vdom]
set scep-url {string}
set source [factory|user|...]
set source-ip {ipv4-address}
set ssl-inspection-trusted [enable|disable]
next
end
config certificate ca
range Either global or VDOM IP address range for the CA option - global
certificate.
Option Description
Option Description
source-ip Source IP address for communications to the SCEP ipv4- Not Specified 0.0.0.0
server. address
Option Description
http-url HTTP server URL for CRL auto-update. string Not Specified
ldap-server LDAP server name for CRL auto-update. string Not Specified
range Either global or VDOM IP address range for the option - global
certificate.
Option Description
scep-cert Local certificate for SCEP communication for CRL string Not Specified Fortinet_
auto-update. CA_SSL
scep-url SCEP server URL for CRL auto-update. string Not Specified
Option Description
source-ip Source IP address for communications to a HTTP or ipv4- Not Specified 0.0.0.0
SCEP CA server. address
update- Time in seconds before the FortiGate checks for an integer Minimum 0
interval updated CRL. Set to 0 to update only when it expires. value: 0
Maximum
value:
4294967295
acme-ca-url The URL for the ACME CA string Not Specified https://acme-
server. v02.api.letsencrypt.org/directory
Option Description
renewal Renewal.
Option Description
Option Description
Option Description
Option Description
Option Description
range Either the global or VDOM IP address range for the option - global
remote certificate.
Option Description
Option Description
name Name of table containing the file pattern list. string Not Specified
Option Description
Option Description
xz Match xz files.
Option Description
msoffice Match MS-Office files. For example, doc, xls, ppt, and so on.
msofficex Match MS-Office XML files. For example, docx, xlsx, pptx, and so on.
rm Match rm files.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 101E, FortiGate 101F,
FortiGate 1101E, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E, FortiGate 601E,
FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate 80F Bypass,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi
80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 1100E,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F,
FortiGate 2200E, FortiGate 300E, FortiGate 3300E, FortiGate 3400E, FortiGate 3500F,
FortiGate 3600E, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 4200F, FortiGate 4400F, FortiGate 5001E, FortiGate 500E, FortiGate 600E,
FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 80E-
POE, FortiGate 80E, FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiWiFi 60E DSL,
FortiWiFi 60E.
Create a DLP fingerprint database by allowing the FortiGate to access a file server containing files from which to create
fingerprints.
config dlp fp-doc-source
Description: Create a DLP fingerprint database by allowing the FortiGate to access a
file server containing files from which to create fingerprints.
edit <name>
set date {integer}
set file-path {string}
date Day of the month on which to scan the server. integer Minimum 1
value: 1
Maximum
value: 31
file-path Path on the server to the fingerprint files (max 119 string Not
characters). Specified
file-pattern Files matching this pattern on the server are string Not *
fingerprinted. Optionally use the * and ? wildcards. Specified
keep-modified Enable so that when a file is changed on the server option - enable
the FortiGate keeps the old fingerprint and adds a
new fingerprint to the database.
Option Description
enable Keep the old fingerprint and add a new fingerprint when a file is changed on
the server.
disable Replace the old fingerprint with the new fingerprint when a file is changed on
the server.
password Password required to log into the file server. password Not
Specified
period Frequency for which the FortiGate checks the server option - none
for new or changed files.
Option Description
Option Description
enable Keep the fingerprint database up to date when a file is deleted from the
server.
disable Do not check for deleted files on the server. Saves system resources.
Option Description
enable Keep the fingerprint database up to date when a file is added or changed on
the server.
disable Do not check for added or changed files on the server. Saves system
resources.
Option Description
sensitivity Select a sensitivity or threat level for matches with string Not
this fingerprint database. Add sensitivities using Specified
sensitivity.
server-type Protocol used to communicate with the file server. option - samba
Currently only Samba (SMB) servers are supported.
Option Description
tod-hour Hour of the day on which to scan the server. integer Minimum 1
value: 0
Maximum
value: 23
tod-min Minute of the hour on which to scan the server. integer Minimum 0
value: 0
Maximum
value: 59
username User name required to log into the file server. string Not
Specified
vdom Select the VDOM that can communicate with the file option - mgmt
server.
Option Description
mgmt Communicate with the file server through the management VDOM.
current Communicate with the file server through the VDOM containing this DLP
fingerprint database configuration.
weekday Day of the week on which to scan the server. option - sunday
Option Description
sunday Sunday
monday Monday
tuesday Tuesday
wednesday Wednesday
thursday Thursday
friday Friday
saturday Saturday
Create self-explanatory DLP sensitivity levels to be used when setting sensitivity under config fp-doc-source.
config dlp sensitivity
Description: Create self-explanatory DLP sensitivity levels to be used when setting
sensitivity under config fp-doc-source.
edit <name>
set name {string}
next
end
Option Description
Option Description
Option Description
Option Description
smtp SMTP.
pop3 POP3.
imap IMAP.
ftp FTP.
nntp NNTP.
mapi MAPI.
cifs CIFS.
Option Description
replacemsg- Replacement message group used by this DLP sensor. string Not
group Specified
Option Description
smtp SMTP.
pop3 POP3.
imap IMAP.
ftp FTP.
nntp NNTP.
mapi MAPI.
cifs CIFS.
config filter
severity Select the severity or threat level that matches this option - medium
filter.
Option Description
info Informational.
low Low.
medium Medium.
high High.
critical Critical.
type Select whether to check the content of messages (an option - file
email message) or files (downloaded files or email
attachments).
Option Description
Option Description
smtp SMTP.
pop3 POP3.
imap IMAP.
ftp FTP.
nntp NNTP.
mapi MAPI.
cifs CIFS.
Option Description
Option Description
file-size Match any file over with a size over the threshold.
company- Enter a company identifier watermark to match. Only string Not Specified
identifier watermarks that your company has placed on the
files are matched.
file-type Select the number of a DLP file pattern table to integer Minimum 0
match. value: 0
Maximum
value:
4294967295
regexp Enter a regular expression to match (max. 255 string Not Specified
characters).
Option Description
action Action to take with content that this DLP sensor option - allow
matches.
Option Description
allow Allow the content to pass through the FortiGate and do not create a log
message.
log-only Allow the content to pass through the FortiGate, but write a log message.
quarantine-ip Quarantine all traffic from the IP address and write a log message.
expiry Quarantine duration in days, hours, minutes (format = user Not Specified 5m
dddhhmm).
This command is available for model(s): FortiGate 1000D, FortiGate 101E, FortiGate 101F,
FortiGate 1101E, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E, FortiGate 601E,
FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate 80F Bypass,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi
80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 1100E,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F,
FortiGate 2200E, FortiGate 300E, FortiGate 3300E, FortiGate 3400E, FortiGate 3500F,
FortiGate 3600E, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 4200F, FortiGate 4400F, FortiGate 5001E, FortiGate 500E, FortiGate 600E,
FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 80E-
POE, FortiGate 80E, FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiWiFi 60E DSL,
FortiWiFi 60E.
chunk-size Maximum fingerprint chunk size. Caution, changing integer Minimum 2800
this setting will flush the entire database. value: 100
Maximum
value: 100000
Option Description
size Maximum total size of files within the storage (MB). integer Minimum 16
value: 16
Maximum
value:
4294967295
Option Description
Option Description
allow Allow DNS requests matching the domain filter without logging.
monitor Allow DNS requests matching the domain filter with logging.
Option Description
Option Description
Option Description
Option Description
redirect-portal IPv4 address of the SDNS redirect portal. ipv4- Not 0.0.0.0
address Specified
Option Description
Option Description
Option Description
youtube- Set safe search for YouTube restriction level. option - strict
restrict
Option Description
config dns-translation
Option Description
src IPv4 address or subnet on the internal ipv4- Not Specified 0.0.0.0
network to compare with the resolved address address
in DNS query replies. If the resolved address
matches, the resolved address is substituted
with dst.
dst IPv4 address or subnet on the external ipv4- Not Specified 0.0.0.0
network to substitute for the resolved address address
in DNS query replies. Can be single IP
address or subnet on the external network, but
number of addresses must equal number of
mapped IP addresses in src.
netmask If src and dst are subnets rather than single IP ipv4- Not Specified 255.255.255.255
addresses, enter the netmask for both src and netmask
dst.
Option Description
prefix If src6 and dst6 are subnets rather than single integer Minimum 128
IP addresses, enter the prefix for both src6 value: 1
and dst6. Maximum
value: 128
config domain-filter
config ftgd-dns
Option Description
action Action to take for DNS requests matching the category. option - monitor
Option Description
monitor Allow DNS requests matching the category and log the result.
log Enable/disable DNS filter logging for this DNS profile. option - enable
Option Description
vnp-cpus CPUs enabled to run DPDK VNP engines. string Not all
Specified
ips-cpus CPUs enabled to run DPDK IPS engines. string Not all
Specified
isolated-cpus CPUs isolated to run only the DPDK engines with the string Not none
exception of processes that have affinity explicitly set by Specified
either a user configuration or by their implementation.
Option Description
enable Enable DPDK operation. *The minimum system requirements for DPDK is
2 vCPUs and 4GB memory.
Option Description
Option Description
Option Description
Option Description
traffic-log-only Enable per-session accounting only for VNP sessions with traffic logging
turned on in firewall policy.
enable Enable per-session accounting for all VNP sessions. *Affect performance.
Option Description
config entries
Option Description
Option Description
ip By IP address.
Option Description
Option Description
ip4-subnet IPv4 network address/subnet mask bits. ipv4- Not Specified 0.0.0.0
classnet 0.0.0.0
ip6-subnet IPv6 network address/subnet mask bits. ipv6- Not Specified ::/128
network
Option Description
config entries
Option Description
Option Description
Option Description
Option Description
Option Description
western Western.
japanese Japanese.
korean Korean.
french French.
thai Thai.
spanish Spanish.
config entries
Option Description
Option Description
Option Description
Option Description
config entries
Option Description
Option Description
ip4-subnet IPv4 network address or network address/subnet ipv4- Not Specified 0.0.0.0
mask bits. classnet 0.0.0.0
ip6-subnet IPv6 network address/subnet mask bits. ipv6- Not Specified ::/128
network
config entries
Option Description
fieldbody Pattern for the header field body. string Not Specified
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config gmail
Option Description
config imap
Option Description
Option Description
Option Description
tag-msg Subject text or header added to spam email. string Not Spam
Specified
Option Description
Option Description
config msn-hotmail
Option Description
config other-webmails
Option Description
config pop3
Option Description
Option Description
Option Description
tag-msg Subject text or header added to spam email. string Not Spam
Specified
config smtp
Option Description
Option Description
Option Description
tag-msg Subject text or header added to spam email. string Not Spam
Specified
Option Description
disable Disable SMTP email header IP checks for spamfsip, spamrbl, and spambal
filters.
enable Enable SMTP email header IP checks for spamfsip, spamrbl, and spambal
filters.
Option Description
config yahoo-mail
Option Description
Option Description
fabric-auth Allow this FortiGate unit to load the authentication page provided by EMS to
authenticate itself with EMS.
websocket Enable/disable websockets for this FortiGate unit. Override behavior using
websocket-override.
websocket- Allow this FortiGate unit to request malware hash notifications over
malware websocket.
common-tags- Can recieve tag information from New Common Tags API from EMS.
api
Option Description
Option Description
mismatched- FortiClient EMS entry dirty because EMS SN is mismatched with configured
ems-sn SN.
Option Description
Option Description
https-port FortiClient EMS HTTPS access port number.. integer Minimum 443
value: 1
Maximum
value:
65535
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
none No authentication.
pap PAP.
chap CHAP.
Option Description
Option Description
Option Description
Option Description
signal- Signal threshold. Specify the range between 50 - 100, integer Minimum 100
threshold where 50/100 means -50/-100 dBm. value: 50
Maximum
value: 100
Option Description
Option Description
generic Compatible with any SIM. Assigned if no other dataplan matches the chosen
SIM.
Option Description
bandwidth- FortiExtender LAN extension bandwidth limit (Mbps). integer Minimum 1024
limit value: 1
Maximum
value:
16776000
Option Description
Option Description
login- Set the managed extender's administrator password. password Not Specified
password
Option Description
yes Change the managed extender's administrator password. Use the login-
password option to set the password.
default Keep the managed extender's administrator password set to the factory
default.
Option Description
Option Description
config cellular
config controller-report
Option Description
config sms-notification
Option Description
system- Display string when system rebooted. string Not system will
reboot Specified reboot
data- Display string when data exhausted. string Not data plan is
exhausted Specified exhausted
session- Display string when session disconnected. string Not LTE data
disconnect Specified session is
disconnected
low-signal- Display string when signal strength is low. string Not LTE signal
strength Specified strength is too
low
os-image- Display string when falling back to a previous OS string Not system start to
fallback image. Specified fallback OS
image
fgt-backup- Display string when FortiGate backup mode string Not FortiGate
mode-switch switched. Specified backup work
mode switched
config receiver
Option Description
Option Description
Option Description
config modem1
Option Description
Option Description
Option Description
Option Description
Option Description
config auto-switch
Option Description
Option Description
Option Description
Option Description
switch-back- Automatically switch over to preferred SIM/carrier at a string Not Specified 00:01
time specified time in UTC (HH:MM).
config modem2
Option Description
Option Description
Option Description
Option Description
Option Description
config auto-switch
switch-back- Automatically switch over to preferred SIM/carrier at a string Not Specified 00:01
time specified time in UTC (HH:MM).
config lan-extension
Option Description
config backhaul
Option Description
Option Description
Option Description
Option Description
bandwidth- FortiExtender LAN extension bandwidth limit (Mbps). integer Minimum 1024
limit value: 1
Maximum
value:
16776000
Option Description
Option Description
login- Set the managed extender's administrator password. password Not Specified
password
Option Description
yes Change the managed extender's administrator password. Use the login-
password option to set the password.
default Keep the managed extender's administrator password set to the factory
default.
Option Description
Option Description
Option Description
disable Use the the WTP profile login-password (administrator password) setting.
config wan-extension
Option Description
Option Description
Option Description
Option Description
config rules
Option Description
Option Description
Option Description
direction Traffic direction (HTTP, FTP, SSH, CIFS only). option - any
Option Description
any Match files transmitted in the session's originating and reply directions.
Option Description
Option Description
config anomaly
Option Description
Option Description
Option Description
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
Option Description
config anomaly
Option Description
Option Description
Option Description
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
auth-ca Name of the SSH server public key authentication CA. string Not
Specified
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config cert-extension
Option Description
yes Critical option, server refuses to authorize if it cannnot recognize the critical
option.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
http HTTP
https HTTPS
tcp-forwarding TCP-FORWARDING
samlsp SAML-SP
web-portal VPN-SSL-WEB-PORTAL
Option Description
Option Description
persistence Configure how to make sure that clients connect to option - none
the same server every time they make a request that
is part of the same session.
Option Description
none None.
http-cookie- Enable/disable use of HTTP cookie domain from host option - disable
domain-from- field in HTTP.
host
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Domain that HTTP cookie persistence should apply string Not Specified
domain to.
http-cookie- Limit HTTP cookie persistence to the specified path. string Not Specified
path
http-cookie- Time in minutes that client web browsers should keep integer Minimum 60
age a cookie. Default is 60 minutes. 0 = no time limit. value: 0
Maximum
value: 525600
http-cookie- Control sharing of cookies across API Gateway. Use option - same-ip
share of same-ip means a cookie from one virtual server
can be used by another. Disable stops cookie
sharing.
Option Description
same-ip Allow HTTP cookie to match any API Gateway with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
saml-server SAML service provider configuration for VIP string Not Specified
authentication.
Option Description
Option Description
ssl-algorithm Permitted encryption algorithms for the server side of option - high
SSL full mode sessions according to encryption
strength.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
config realservers
Option Description
address Address or address group of the real server. string Not Specified
domain Wildcard domain name of the real server. string Not Specified
port Port for communicating with the real server. integer Minimum 443
value: 1
Maximum
value: 65535
mappedport Port for communicating with the real server. user Not Specified
status Set the status of the real server to active so that it option - active
can accept traffic, or on standby or disabled so no
traffic is sent.
Option Description
Option Description
ssh SSH.
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
http-host HTTP server domain name in HTTP header. string Not Specified
Option Description
health-check- Protocol of the health check monitor to use when option - ping
proto polling to determine server's connectivity status.
Option Description
tcp-connect Use a full TCP connection to test the link with the server.
Option Description
ssh-client-cert Set access-proxy SSH client certificate profile. string Not Specified
ssh-host-key- Enable/disable SSH real server host key validation. option - disable
validation
Option Description
config ssl-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - tls-1.0 tls-
with. 1.1 tls-1.2
tls-1.3
Option Description
config api-gateway6
Option Description
http HTTP
https HTTPS
tcp-forwarding TCP-FORWARDING
Option Description
samlsp SAML-SP
web-portal VPN-SSL-WEB-PORTAL
Option Description
Option Description
persistence Configure how to make sure that clients connect to option - none
the same server every time they make a request that
is part of the same session.
Option Description
none None.
http-cookie- Enable/disable use of HTTP cookie domain from host option - disable
domain-from- field in HTTP.
host
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Domain that HTTP cookie persistence should apply string Not Specified
domain to.
http-cookie- Limit HTTP cookie persistence to the specified path. string Not Specified
path
http-cookie- Time in minutes that client web browsers should keep integer Minimum 60
age a cookie. Default is 60 minutes. 0 = no time limit. value: 0
Maximum
value: 525600
http-cookie- Control sharing of cookies across API Gateway. Use option - same-ip
share of same-ip means a cookie from one virtual server
can be used by another. Disable stops cookie
sharing.
Option Description
same-ip Allow HTTP cookie to match any API Gateway with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
saml-server SAML service provider configuration for VIP string Not Specified
authentication.
Option Description
Option Description
ssl-algorithm Permitted encryption algorithms for the server side of option - high
SSL full mode sessions according to encryption
strength.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
address Address or address group of the real server. string Not Specified
domain Wildcard domain name of the real server. string Not Specified
port Port for communicating with the real server. integer Minimum 443
value: 1
Maximum
value: 65535
mappedport Port for communicating with the real server. user Not Specified
status Set the status of the real server to active so that it option - active
can accept traffic, or on standby or disabled so no
traffic is sent.
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
http-host HTTP server domain name in HTTP header. string Not Specified
health-check- Protocol of the health check monitor to use when option - ping
proto polling to determine server's connectivity status.
ssh-client-cert Set access-proxy SSH client certificate profile. string Not Specified
ssh-host-key- Enable/disable SSH real server host key validation. option - disable
validation
versions SSL/TLS versions that the cipher suite can be used option - tls-1.0 tls-
with. 1.1 tls-1.2
tls-1.3
Option Description
Option Description
Option Description
Option Description
config api-gateway
Option Description
http HTTP
Option Description
https HTTPS
tcp-forwarding TCP-FORWARDING
samlsp SAML-SP
web-portal VPN-SSL-WEB-PORTAL
Option Description
Option Description
persistence Configure how to make sure that clients connect to option - none
the same server every time they make a request that
is part of the same session.
Option Description
none None.
http-cookie- Enable/disable use of HTTP cookie domain from host option - disable
domain-from- field in HTTP.
host
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Domain that HTTP cookie persistence should apply string Not Specified
domain to.
http-cookie- Limit HTTP cookie persistence to the specified path. string Not Specified
path
http-cookie- Time in minutes that client web browsers should keep integer Minimum 60
age a cookie. Default is 60 minutes. 0 = no time limit. value: 0
Maximum
value: 525600
http-cookie- Control sharing of cookies across API Gateway. Use option - same-ip
share of same-ip means a cookie from one virtual server
can be used by another. Disable stops cookie
sharing.
Option Description
same-ip Allow HTTP cookie to match any API Gateway with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
saml-server SAML service provider configuration for VIP string Not Specified
authentication.
Option Description
Option Description
ssl-algorithm Permitted encryption algorithms for the server side of option - high
SSL full mode sessions according to encryption
strength.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
config realservers
Option Description
address Address or address group of the real server. string Not Specified
domain Wildcard domain name of the real server. string Not Specified
port Port for communicating with the real server. integer Minimum 443
value: 1
Maximum
value: 65535
mappedport Port for communicating with the real server. user Not Specified
status Set the status of the real server to active so that it option - active
can accept traffic, or on standby or disabled so no
traffic is sent.
Option Description
Option Description
Option Description
ssh SSH.
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
http-host HTTP server domain name in HTTP header. string Not Specified
Option Description
health-check- Protocol of the health check monitor to use when option - ping
proto polling to determine server's connectivity status.
Option Description
tcp-connect Use a full TCP connection to test the link with the server.
Option Description
ssh-client-cert Set access-proxy SSH client certificate profile. string Not Specified
ssh-host-key- Enable/disable SSH real server host key validation. option - disable
validation
Option Description
config ssl-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - tls-1.0 tls-
with. 1.1 tls-1.2
tls-1.3
Option Description
config api-gateway6
Option Description
http HTTP
https HTTPS
tcp-forwarding TCP-FORWARDING
samlsp SAML-SP
web-portal VPN-SSL-WEB-PORTAL
Option Description
Option Description
persistence Configure how to make sure that clients connect to option - none
the same server every time they make a request that
is part of the same session.
Option Description
none None.
http-cookie- Enable/disable use of HTTP cookie domain from host option - disable
domain-from- field in HTTP.
host
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Domain that HTTP cookie persistence should apply string Not Specified
domain to.
http-cookie- Limit HTTP cookie persistence to the specified path. string Not Specified
path
http-cookie- Time in minutes that client web browsers should keep integer Minimum 60
age a cookie. Default is 60 minutes. 0 = no time limit. value: 0
Maximum
value: 525600
http-cookie- Control sharing of cookies across API Gateway. Use option - same-ip
share of same-ip means a cookie from one virtual server
can be used by another. Disable stops cookie
sharing.
Option Description
same-ip Allow HTTP cookie to match any API Gateway with same IP.
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
saml-server SAML service provider configuration for VIP string Not Specified
authentication.
Option Description
Option Description
ssl-algorithm Permitted encryption algorithms for the server side of option - high
SSL full mode sessions according to encryption
strength.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
config realservers
address Address or address group of the real server. string Not Specified
domain Wildcard domain name of the real server. string Not Specified
port Port for communicating with the real server. integer Minimum 443
value: 1
Maximum
value: 65535
mappedport Port for communicating with the real server. user Not Specified
status Set the status of the real server to active so that it option - active
can accept traffic, or on standby or disabled so no
traffic is sent.
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
http-host HTTP server domain name in HTTP header. string Not Specified
health-check- Protocol of the health check monitor to use when option - ping
proto polling to determine server's connectivity status.
ssh-client-cert Set access-proxy SSH client certificate profile. string Not Specified
ssh-host-key- Enable/disable SSH real server host key validation. option - disable
validation
config ssl-cipher-suites
versions SSL/TLS versions that the cipher suite can be used option - tls-1.0 tls-
with. 1.1 tls-1.2
tls-1.3
This command is available for model(s): FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 200F, FortiGate 201F, FortiGate 2200E,
FortiGate 2201E, FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3300E,
FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3500F, FortiGate 3501F,
FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3800D, FortiGate 3960E,
FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E, FortiGate 4200F,
FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E.
It is not available for: FortiGate 1000D, FortiGate 200E, FortiGate 201E, FortiGate 40F 3G4G,
FortiGate 40F, FortiGate 5001E1, FortiGate 5001E, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE,
FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
Option Description
This command is available for model(s): FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 200F, FortiGate 201F, FortiGate 2200E,
FortiGate 2201E, FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D,
FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3300E,
FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3500F, FortiGate 3501F,
FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3800D, FortiGate 3960E,
FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E, FortiGate 4200F,
FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E.
It is not available for: FortiGate 1000D, FortiGate 200E, FortiGate 201E, FortiGate 40F 3G4G,
FortiGate 40F, FortiGate 5001E1, FortiGate 5001E, FortiGate 60E DSLJ, FortiGate 60E DSL,
FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate
800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE,
FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
Option Description
Option Description
Option Description
unknown UNKNOWN.
healthy HEALTHY.
quarantine QUARANTINE.
checkup CHECKUP.
transient TRANSIENT.
infected INFECTED.
end-ip Final IP address (inclusive) in the range for the ipv4- Not 0.0.0.0
address. address- Specified
any
Option Description
Option Description
Option Description
ip IP address.
Option Description
start-ip First IP address (inclusive) in the range for the ipv4- Not 0.0.0.0
address. address- Specified
any
Option Description
subnet IP address and subnet mask of address. ipv4- Not 0.0.0.0 0.0.0.0
classnet- Specified
any
Option Description
config list
config tagging
Option Description
config subnet-segment
Option Description
config values
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
end-ip Final IP address (inclusive) in the range for the ipv6- Not ::
address (format: address Specified
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx).
Option Description
Option Description
any Wildcard.
start-ip First IP address (inclusive) in the range for the ipv6- Not ::
address (format: address Specified
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx).
Option Description
template Template.
config subnet-segment
Option Description
any Wildcard.
config tagging
allow-routing Enable/disable use of this group in the static route option - disable
configuration.
Option Description
Option Description
Option Description
Option Description
Option Description
default Default address group type (address may belong to multiple groups).
folder Address folder group (members may not belong to any other group).
config tagging
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
Option Description
identity- Name of the identity-based route that applies to this string Not
based-route portal. Specified
Option Description
Option Description
Option Description
orig-port Original TCP port (1 to 65535, 0 means any user Not Specified
port).
Option Description
Option Description
Option Description
dstmac Set destination MAC address for mirrored traffic. mac- Not ff:ff:ff:ff:ff:ff
address Specified
Option Description
Option Description
dst IPv4 address or subnet on the external ipv4- Not Specified 0.0.0.0
network to substitute for the resolved address address
in DNS query replies. Can be single IP
address or subnet on the external network, but
number of addresses must equal number of
mapped IP addresses in src.
netmask If src and dst are subnets rather than single IP ipv4- Not Specified 255.255.255.255
addresses, enter the netmask for both src and netmask
dst.
src IPv4 address or subnet on the internal ipv4- Not Specified 0.0.0.0
network to compare with the resolved address address
in DNS query replies. If the resolved address
matches, the resolved address is substituted
with dst.
gateway IPv4 address of the gateway (Format: xxx.xxx.xxx.xxx ipv4- Not Specified 0.0.0.0
, Default: 0.0.0.0). address
groups Select one or more group(s) from available groups string Maximum
<name> that are allowed to use this route. Separate group length: 79
names with a space.
Group name.
Option Description
Option Description
Option Description
Option Description
Option Description
interface Monitored interface name from available interfaces. string Not Specified
Option Description
logtraffic Logging type to be used in this policy (Options: all | option - utm
utm | disable, Default: utm).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
interface Monitored interface name from available interfaces. string Not Specified
Option Description
logtraffic Logging type to be used in this policy (Options: all | option - utm
utm | disable, Default: utm).
Option Description
Option Description
Option Description
protocol Integer value for the protocol type as defined by IANA. integer Minimum 0
value: 0
Maximum
value: 255
config port-range
end-port Integer value for ending TCP/UDP/SCTP destination integer Minimum 65535
port in range (0 to 65535). value: 0
Maximum
value: 65535
config entry
protocol Integer value for the protocol type as defined by IANA. integer Minimum 0
value: 0
Maximum
value: 255
config port-range
end-port Integer value for ending TCP/UDP/SCTP destination integer Minimum 65535
port in range (0 to 65535). value: 0
Maximum
value: 65535
config entry
protocol Integer value for the protocol type as defined by IANA. integer Minimum 0
value: 0
Maximum
value: 255
config port-range
config disable-entry
protocol Integer value for the protocol type as defined by IANA. integer Minimum 0
value: 0
Maximum
value: 255
config port-range
end-port Integer value for ending TCP/UDP/SCTP destination integer Minimum 65535
port in range (0 to 65535). value: 0
Maximum
value: 65535
config ip-range
protocol Integer value for the protocol type as defined by IANA. integer Minimum 0
value: 0
Maximum
value: 255
config port-range
end-port Integer value for ending TCP/UDP/SCTP destination integer Minimum 65535
port in range (0 to 65535). value: 0
Maximum
value: 65535
direction How this service may be used (source, destination or option - both
both).
Option Description
Option Description
database Database name this Internet Service belongs to. option - isdb
Option Description
direction How this service may be used in a firewall policy option - both
(source, destination or both).
Option Description
obsolete Indicates whether the Internet Service can be used. integer Minimum 0
value: 0
Maximum
value: 255
map-startip Address to be used as the starting point for translation ipv4- Not Specified 0.0.0.0
in the range. address-
any
Option Description
SCTP SCTP
Option Description
enable Enable IP/MAC binding for packets that would normally go through the
firewall.
disable Disable IP/MAC binding for packets that would normally go through the
firewall.
Option Description
enable Enable IP/MAC binding for packets that would normally go to the firewall.
disable Disable IP/MAC binding for packets that would normally go to the firewall.
Option Description
allow Allow packets from MAC addresses not in the IP/MAC list.
block Block packets from MAC addresses not in the IP/MAC list.
ip IPv4 address portion of the pair (format: ipv4- Not Specified 0.0.0.0
xxx.xxx.xxx.xxx). address
mac MAC address portion of the pair (format = mac- Not Specified 00:00:00:00:00:00
xx:xx:xx:xx:xx:xx in hexadecimal). address
Option Description
Option Description
arp-intf Select an interface from available options that will reply string Not
to ARP requests. (If blank, any is selected). Specified
Option Description
Option Description
Option Description
Option Description
endip Final IPv4 address (inclusive) in the range for the ipv4- Not 0.0.0.0
address pool (format xxx.xxx.xxx.xxx, Default: 0.0.0.0). address- Specified
any
endport Final port number (inclusive) in the range for the integer Minimum 65533
address pool (Default: 65533). value: 5117
Maximum
value:
65533
Option Description
num-blocks- Number of addresses blocks that can be used by a user. integer Minimum 8
per-user value: 1
Maximum
value: 128
Option Description
source-endip Final IPv4 address (inclusive) in the range of the source ipv4- Not 0.0.0.0
addresses to be translated (format xxx.xxx.xxx.xxx, address- Specified
Default: 0.0.0.0). any
startip First IPv4 address (inclusive) in the range for the ipv4- Not 0.0.0.0
address pool (format xxx.xxx.xxx.xxx, Default: 0.0.0.0). address- Specified
any
startport First port number (inclusive) in the range for the address integer Minimum 5117
pool (Default: 5117). value: 5117
Maximum
value:
65533
Option Description
disable Do not include the subnetwork address and broadcast IP address in the
NAT64 IP pool.
enable Include the subnetwork address and broadcast IP address in the NAT64 IP
pool.
type IP pool type (overload, one-to-one, fixed port range, or option - overload
port block allocation).
Option Description
Option Description
Option Description
List.
config firewall iprope list
Description: List.
set <group_number> {string}
end
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
dns-protocol Select the protocol used by the DNS health check option - udp
monitor to check the health of the server (UDP | TCP).
Option Description
udp UDP.
tcp TCP.
dns-request- Fully qualified domain name to resolve for the DNS string Not
domain probe. Specified
http-get URL used to send a GET request to check the health of string Not
an HTTP server. Specified
port Service port used to perform the health check. If 0, integer Minimum 0
health check monitor inherits port configured for the value: 0
server. Maximum
value:
65535
retry Number health check attempts before the server is integer Minimum 3
considered down. value: 1
Maximum
value: 255
timeout Time to wait to receive response to a health check from integer Minimum 2
a server. Reaching the timeout means the health check value: 1
failed. Maximum
value: 255
type Select the Monitor type used by the health check option -
monitor to check the health of the server (PING | TCP |
HTTP | HTTPS | DNS).
Option Description
Option Description
Option Description
Option Description
Option Description
intf Incoming interface name from available options. string Not Specified
service- When enabled service specifies what the service option - disable
negate must NOT be.
Option Description
srcaddr- When enabled srcaddr specifies what the source option - disable
negate address must NOT be.
Option Description
Option Description
Option Description
Option Description
intf Incoming interface name from available options. string Not Specified
service- When enabled service specifies what the service option - disable
negate must NOT be.
Option Description
srcaddr- When enabled srcaddr specifies what the source option - disable
negate address must NOT be.
Option Description
Option Description
associated- Interface associated with the address object. When string Not
interface setting up a policy, only addresses associated with Specified
this interface are available.
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
end-ip Final IPv4 address (inclusive) in the range for the ipv4- Not 0.0.0.0
address. address- Specified
any
start-ip First IPv4 address (inclusive) in the range for the ipv4- Not 0.0.0.0
address. address- Specified
any
Option Description
config tagging
config tagging
Option Description
Option Description
dnat IPv4 DNAT address used for multicast ipv4- Not Specified 0.0.0.0
destination addresses. address-
any
Option Description
protocol Integer value for the protocol type as defined by integer Minimum 0
IANA. value: 0
Maximum
value: 255
Option Description
snat-ip IPv4 address to be used as the source address ipv4- Not Specified 0.0.0.0
for NATed traffic. address
Option Description
Option Description
accept Accept.
deny Deny.
Option Description
Option Description
protocol Integer value for the protocol type as defined by integer Minimum 0
IANA. value: 0
Maximum
value: 255
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
captive-portal- Enable to exempt some users from the captive option - disable
exempt portal.
Option Description
Option Description
Option Description
enable Enable TCP NPU session delay in order to guarantee packet order of 3-way
handshake.
disable Disable TCP NPU session delay in order to guarantee packet order of 3-way
handshake.
Option Description
Option Description
Option Description
Option Description
dstaddr <name> Destination IPv4 address and address group string Maximum
names. length: 79
Address name.
Option Description
Option Description
Option Description
Option Description
Option Description
check-all Flush all current sessions accepted by this policy. These sessions must be
started and re-matched with policies.
Option Description
fsso-agent-for- FSSO agent to use for NTLM authentication. string Not Specified
ntlm
Option Description
Option Description
Option Description
physical-location Match geography address to its physical location using the geography IP
database.
registered- Match geography address to its registered location using the geography IP
location database.
groups <name> Names of user groups that can authenticate string Maximum
with this policy. length: 79
Group name.
Option Description
inbound Policy-based IPsec VPN: only traffic from the option - disable
remote network can initiate a VPN.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
match-vip Enable to match packets that have had their option - disable
destination addresses changed by a VIP.
Option Description
Option Description
enable Enable matching of only those packets that have had their destination
addresses changed by a VIP.
disable Disable matching of only those packets that have had their destination
addresses changed by a VIP.
Option Description
Option Description
Option Description
Option Description
natip Policy-based IPsec VPN: source NAT IP ipv4- Not Specified 0.0.0.0 0.0.0.0
address for outgoing traffic. classnet
Option Description
Option Description
Option Description
Option Description
outbound Policy-based IPsec VPN: only traffic from the option - enable
internal network can initiate a VPN.
Option Description
Option Description
Option Description
Option Description
Option Description
profile-protocol- Name of an existing Protocol options profile. string Not Specified default
options
Option Description
Option Description
redirect-url URL users are directed to after seeing and var-string Not Specified
accepting the disclaimer or authenticating.
Option Description
Option Description
Option Description
Option Description
Option Description
session-ttl TTL in seconds for sessions accepted by this user Not Specified
policy.
Option Description
srcaddr <name> Source IPv4 address and address group string Maximum
names. length: 79
Address name.
Option Description
srcaddr6 Source IPv6 address name and address group string Maximum
<name> names. length: 79
Address name.
Option Description
ssl-ssh-profile Name of an existing SSL SSH profile. string Not Specified no-inspection
Option Description
Option Description
Option Description
Option Description
tos ToS (Type of Service) value used for user Not Specified
comparison.
tos-mask Non-zero bit positions are used for comparison user Not Specified
while zero bit positions are ignored.
Option Description
Option Description
vlan-cos-fwd VLAN forward direction user priority: 255 integer Minimum 255
passthrough, 0 lowest, 7 highest. value: 0
Maximum
value: 7
vlan-cos-rev VLAN reverse direction user priority: 255 integer Minimum 255
passthrough, 0 lowest, 7 highest. value: 0
Maximum
value: 7
vpntunnel Policy-based IPsec VPN: name of the IPsec string Not Specified
VPN Phase 1.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config cifs
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned. integer Minimum 10
value: 1
Maximum
value: 1606
**
Option Description
tcp-window-type TCP window type to use for this protocol. option - auto-tuning
Option Description
system Use system default TCP window size for this protocol.
dynamic Vary TCP window size based on available memory and within limits of tcp-
window-minimum and tcp-window-maximum.
Option Description
config server-keytab
keytab Base64 encoded keytab file containing credential of the string Not
server. Specified
config dns
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
config ftp
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
Option Description
Option Description
tcp-window-type TCP window type to use for this protocol. option - auto-tuning
Option Description
system Use system default TCP window size for this protocol.
dynamic Vary TCP window size based on available memory and within limits of tcp-
window-minimum and tcp-window-maximum.
Option Description
Option Description
config http
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
Option Description
Option Description
enable Enable range header blocking (treat all partial file downloads as full file
download)
Option Description
Option Description
Option Description
Option Description
Option Description
unknown-http- How to handle HTTP sessions that do not comply option - reject
version with HTTP 0.9, 1.0, or 1.1.
Option Description
reject Reject or tear down HTTP sessions that do not use HTTP 0.9, 1.0, or 1.1.
tunnel Pass HTTP traffic that does not use HTTP 0.9, 1.0, or 1.1 without applying
HTTP protocol optimization, byte-caching, or web caching. TCP protocol
optimization is applied.
best-effort Assume all HTTP sessions comply with HTTP 0.9, 1.0, or 1.1. If a session
uses a different HTTP version, it may not parse correctly and the
connection may be lost.
Option Description
enable Pass non-HTTP sessions through the tunnel without applying protocol
optimization, byte-caching, or web caching. TCP protocol optimization is
applied.
Option Description
block-page- Code number returned for blocked HTTP pages. integer Minimum 403
status-code value: 100
Maximum
value: 599
tcp-window-type TCP window type to use for this protocol. option - auto-tuning
Option Description
system Use system default TCP window size for this protocol.
dynamic Vary TCP window size based on available memory and within limits of tcp-
window-minimum and tcp-window-maximum.
Option Description
Option Description
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned. integer Minimum 10
value: 1
Maximum
value: 1606
**
Option Description
Option Description
config mail-signature
Option Description
signature Email signature to be added to outgoing email (if the string Not
signature contains spaces, enclose with quotation Specified
marks).
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned. integer Minimum 10
value: 1
Maximum
value: 1606
**
Option Description
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned. integer Minimum 10
value: 1
Maximum
value: 1606
**
Option Description
config pop3
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned. integer Minimum 10
value: 1
Maximum
value: 1606
**
Option Description
Option Description
status Enable/disable the active status of scanning for this option - enable
protocol.
Option Description
inspect-all Enable/disable the inspection of all ports for the option - disable
protocol.
Option Description
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
oversize-limit Maximum in-memory file size that can be scanned. integer Minimum 10
value: 1
Maximum
value: 1606
**
Option Description
server-busy Enable/disable SMTP server busy when server not option - disable
available.
Option Description
Option Description
config ssh
Option Description
Option Description
Option Description
tcp-window-type TCP window type to use for this protocol. option - auto-tuning
Option Description
Option Description
system Use system default TCP window size for this protocol.
dynamic Vary TCP window size based on available memory and within limits of tcp-
window-minimum and tcp-window-maximum.
Option Description
Option Description
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
Option Description
Option Description
query Match the query part of the URL as a regular string Not Specified
expression.
Option Description
Option Description
Option Description
config header-group
Option Description
config tagging
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
Option Description
config tagging
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
profile- Name of an existing Protocol options profile. string Not Specified default
protocol-
options
Option Description
Option Description
redirect-url Redirect URL for further explicit web proxy var-string Not Specified
processing.
Option Description
Option Description
Option Description
Option Description
ssl-ssh-profile Name of an existing SSL SSH profile. string Not Specified no-inspection
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
end Schedule end date and time, format hh:mm user Not
yyyy/mm/dd. Specified
expiration- Write an event log message this many days before the integer Minimum 3
days schedule expires. value: 0
Maximum
value: 100
Option Description
start Schedule start date and time, format hh:mm user Not
yyyy/mm/dd. Specified
day One or more days of the week on which the schedule is option - none
valid. Separate the names of the days with a space.
Option Description
sunday Sunday.
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
Option Description
thursday Thursday.
friday Friday.
saturday Saturday.
none None.
end Time of day to end the schedule, format hh:mm. user Not
Specified
Option Description
start Time of day to start the schedule, format hh:mm. user Not
Specified
Option Description
Option Description
Option Description
groups Names of user groups that can authenticate with string Maximum
<name> this policy. length: 79
User group name.
Option Description
Option Description
Option Description
Option Description
learning- Enable to allow everything, but log all of the option - disable
mode meaningful data for security information
gathering. A learning report will be generated.
Option Description
Option Description
Option Description
Option Description
profile- Name of an existing Protocol options profile. string Not Specified default
protocol-
options
Option Description
Option Description
Option Description
srcaddr Source IPv4 address name and address group string Maximum
<name> names. length: 79
Address name.
Option Description
srcaddr6 Source IPv6 address name and address group string Maximum
<name> names. length: 79
Address name.
ssl-ssh-profile Name of an existing SSL SSH profile. string Not Specified no-inspection
Option Description
users <name> Names of individual users that can authenticate string Maximum
with this policy. length: 79
User name.
Option Description
Option Description
Option Description
Option Description
Option Description
ftp FTP.
tftp TFTP.
ras RAS.
h323 H323.
tns TNS.
mms MMS.
sip SIP.
pptp PPTP.
rtsp RTSP.
pmap PMAP.
rsh RSH.
dcerpc DCERPC.
mgcp MGCP.
iprange Start and end of the IP range associated with user Not Specified
service.
Option Description
ICMP ICMP.
ICMP6 ICMP6.
IP IP.
Option Description
tcp-halfclose- Wait time to close a TCP session waiting for an integer Minimum 0
timer unanswered FIN packet. value: 0
Maximum
value: 86400
tcp-halfopen- Wait time to close a TCP session waiting for an integer Minimum 0
timer unanswered open session packet. value: 0
Maximum
value: 86400
tcp-rst-timer Set the length of the TCP CLOSE state in integer Minimum 0
seconds. value: 5
Maximum
value: 300
tcp-timewait- Set the length of the TCP TIME-WAIT state in integer Minimum 0
timer seconds. value: 0
Maximum
value: 300
Option Description
Option Description
Option Description
bandwidth-unit Unit of measurement for maximum bandwidth for this option - kbps
shaper (Kbps, Mbps or Gbps).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
exceed-dscp DSCP mark for traffic in guaranteed-bandwidth and user Not Specified
exceed-bandwidth.
maximum- DSCP mark for traffic in exceed-bandwidth and user Not Specified
dscp maximum-bandwidth.
Option Description
Option Description
app-category IDs of one or more application categories that this integer Minimum
<id> shaper applies application control traffic shaping to. value: 0
Category IDs. Maximum
value:
4294967295
application IDs of one or more applications that this shaper integer Minimum
<id> applies application control traffic shaping to. value: 0
Application IDs. Maximum
value:
4294967295
Option Description
Option Description
diffservcode- Change packet's reverse (reply) DiffServ to this user Not Specified
rev value.
dstaddr IPv4 destination address and address group names. string Maximum
<name> Address name. length: 79
dstaddr6 IPv6 destination address and address group names. string Maximum
<name> Address name. length: 79
groups Apply this traffic shaping policy to user groups that string Maximum
<name> have authenticated with the FortiGate. length: 79
Group name.
Option Description
Option Description
ip-version Apply this traffic shaping policy to IPv4 or IPv6 traffic. option - 4
Option Description
per-ip-shaper Per-IP traffic shaper to apply with this policy. string Not Specified
srcaddr IPv4 source address and address group names. string Maximum
<name> Address name. length: 79
srcaddr6 IPv6 source address and address group names. string Maximum
<name> Address name. length: 79
Option Description
tos ToS (Type of Service) value used for comparison. user Not Specified
tos-mask Non-zero bit positions are used for comparison while user Not Specified
zero bit positions are ignored.
Option Description
traffic-shaper Traffic shaper to apply to traffic forwarded by the string Not Specified
firewall policy.
traffic-shaper- Traffic shaper to apply to response traffic received string Not Specified
reverse by the firewall policy.
users <name> Apply this traffic shaping policy to individual users string Maximum
that have authenticated with the FortiGate. length: 79
User name.
Option Description
config shaping-entries
Option Description
Option Description
limit Hard limit on the real queue size in packets. integer Minimum 1000
value: 5
Maximum
value: 10000
cburst-in- Number of bytes that can be burst as fast as the integer Minimum 0
msec interface can transmit. Formula: cburst = maximum- value: 0
bandwidth*cburst-in-msec. Maximum
value: 2000
min Average queue size in packets at which RED drop integer Minimum 83
becomes a possibility. value: 3
Maximum
value: 3000
max Average queue size in packets at which RED drop integer Minimum 250
probability is maximal. value: 3
Maximum
value: 3000
Configure sniffer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
interface Interface name that traffic sniffing will take place on. string Not
Specified
Option Description
Option Description
Option Description
Option Description
logtraffic Either log all sessions, only sessions that have a option - utm
security profile applied, or disable all logging for this
policy.
Option Description
Option Description
protocol Integer value for the protocol type as defined by IANA. string Not
Specified
Option Description
Option Description
config anomaly
Option Description
Option Description
Option Description
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
hostname Hostname of the SSH server to match SSH string Not Specified
certificate principals.
Option Description
status Set the trust status of the public key. option - trusted
Option Description
Option Description
Option Description
private-key SSH proxy private key, encrypted with a password. user Not
Specified
Option Description
private-key SSH proxy private key, encrypted with a password. user Not
Specified
Option Description
Option Description
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
ssl-cert Name of certificate for SSL connections to this server. string Not Fortinet_
Specified CA_SSL
Option Description
secure Reject any SSL connection that does not offer a RFC 5746 Secure
Renegotiation Indication.
Option Description
Option Description
Option Description
ssl-mode SSL/TLS mode for encryption and decryption of traffic. option - full
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
use-ssl-server Enable/disable the use of SSL server table for SSL option - disable
offloading.
Option Description
config dot
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
disable Disable.
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
config https
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
allow Bypass the session when unable to retrieve server's certificate for
inspection.
block Block the session when unable to retrieve server's certificate for inspection.
Option Description
config imaps
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
config pop3s
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has been option - disable
handshake established (not before).
Option Description
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
config ssh
Option Description
disable Disable.
Option Description
disable Disable.
proxy-after-tcp- Proxy traffic after the TCP 3-way handshake has option - disable
handshake been established (not before).
Option Description
Option Description
Option Description
Option Description
high-encryption Allow only AES-CTR, AES-GCM ciphers and high encryption algorithms.
config ssl
Option Description
disable Disable.
Option Description
unsupported- Action based on the SSL version used being option - block
ssl-version unsupported.
Option Description
unsupported- Action based on the SSL cipher used being option - allow
ssl-cipher unsupported.
Option Description
unsupported- Action based on the SSL negotiation used being option - allow
ssl-negotiation unsupported.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sni-server-cert- Check the SNI in the client hello message with the CN option - enable
check or SAN fields in the returned server certificate.
Option Description
enable Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, use the CN in the server certificate
to do URL filtering.
strict Check the SNI in the client hello message with the CN or SAN fields in the
returned server certificate. If mismatched, close the connection.
disable Do not check the SNI in the client hello message with the CN or SAN fields in
the returned server certificate.
Option Description
allow Bypass the session when unable to retrieve server's certificate for
inspection.
block Block the session when unable to retrieve server's certificate for inspection.
Option Description
config ssl-exempt
Option Description
config ssl-server
https-client- Action based on received client certificate during the option - bypass
certificate HTTPS handshake.
Option Description
smtps-client- Action based on received client certificate during the option - bypass
certificate SMTPS handshake.
Option Description
pop3s-client- Action based on received client certificate during the option - bypass
certificate POP3S handshake.
Option Description
imaps-client- Action based on received client certificate during the option - bypass
certificate IMAPS handshake.
Option Description
ftps-client- Action based on received client certificate during the option - bypass
certificate FTPS handshake.
Option Description
Option Description
Option Description
cert-cache- Maximum capacity of the host certificate cache. integer Minimum 200
capacity value: 0
Maximum
value: 500
kxp-queue- Maximum length of the CP KXP queue. When the integer Minimum 16
threshold * queue becomes full, the proxy switches cipher functions value: 0
to the main CPU. Maximum
value: 512
no-matching- Bypass or drop the connection when no matching cipher option - bypass
cipher-action is found.
Option Description
Option Description
ssl-queue- Maximum length of the CP SSL queue. When the queue integer Minimum 32
threshold * becomes full, the proxy switches cipher functions to the value: 0
main CPU. Maximum
value: 512
Option Description
Option Description
Service name.
srcintf Source interface name from available interfaces. string Not Specified
Option Description
ttl Value/range to match against the packet's Time to user Not Specified
Live value.
Option Description
Option Description
extport Incoming port number range that you want to user Not Specified
map to a port number range on the
destination network.
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-
cooke-domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
Option Description
same-ip Allow HTTP cookie to match any virtual server with same IP.
Option Description
Option Description
Option Description
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
ipv6-mappedport IPv6 port number range on the destination user Not Specified
network to which the external port number
range is mapped.
Option Description
Mapped IP range.
monitor <name> Name of the health check monitor to use string Maximum
when polling to determine a virtual server's length: 79
connectivity status.
Health monitor name.
Option Description
disable Force only the source NAT mapped IP to the external IP for traffic
egressing the external interface of the VIP.
enable Force the source NAT mapped IP to the external IP for all traffic.
Option Description
Option Description
Option Description
Option Description
none None.
Option Description
Option Description
Option Description
tcp TCP.
udp UDP.
sctp SCTP.
icmp ICMP.
Option Description
http HTTP.
https HTTPS.
imaps IMAPS.
Option Description
pop3s POP3S.
smtps SMTPS.
ssl SSL.
tcp TCP.
udp UDP.
ip IP.
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
custom Custom encryption. Use config ssl-cipher-suites to select the cipher suites
that are allowed.
ssl-certificate The name of the certificate to use for SSL string Not Specified
handshake.
Option Description
disable Disable.
enable Enable.
Option Description
secure Abort any client initiated SSL re-negotiation attempt that does not use RFC
5746 Secure Renegotiation.
ssl-client- How to expire SSL sessions for the segment option - both
session-state- of the SSL connection between the client and
type the FortiGate.
Option Description
both Expire session states based on time or count, whichever occurs first.
Option Description
Option Description
ssl-hpkp-age Number of seconds the client should honor integer Minimum 5184000
the HPKP setting. value: 60
Maximum
value:
157680000
Option Description
Option Description
ssl-hsts-age Number of seconds the client should honor integer Minimum 5184000
the HSTS setting. value: 60
Maximum
value:
157680000
Option Description
Option Description
Option Description
Option Description
Option Description
ssl-mode Apply SSL offloading between the client and option - half
the FortiGate (half) or from the client to the
FortiGate and from the FortiGate to the
server (full).
Option Description
ssl-pfs Select the cipher suites that can be used for option - require
SSL perfect forward secrecy (PFS). Applies
to both client and server sessions.
Option Description
allow Allow use of any cipher suite so PFS may or may not be used depending on
the cipher suite selected.
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
client Use the same encryption algorithms for both client and server sessions.
Option Description
Option Description
ssl-server- How to expire SSL sessions for the segment option - both
session-state- of the SSL connection between the server
type and the FortiGate.
Option Description
both Expire session states based on time or count, whichever occurs first.
Option Description
Option Description
Option Description
disable Do not add HTTP header indicating SSL offload for WebLogic server.
enable Add HTTP header indicating SSL offload for WebLogic server.
Option Description
disable Do not add HTTP header indicating SSL offload for WebSphere server.
enable Add HTTP header indicating SSL offload for WebSphere server.
config realservers
Option Description
port Port for communicating with the real server. Required integer Minimum 0
if port forwarding is enabled. value: 1
Maximum
value: 65535
status Set the status of the real server to active so that it can option - active
accept traffic, or on standby or disabled so no traffic
is sent.
Option Description
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
holddown- Time in seconds that the health check monitor integer Minimum 300
interval continues to monitor and unresponsive server that value: 30
should be active. Maximum
value: 65535
Option Description
http-host HTTP server domain name in HTTP header. string Not Specified
monitor Name of the health check monitor to use when string Maximum
<name> polling to determine a virtual server's connectivity length: 79
status.
Health monitor name.
client-ip Only clients in this IP range can connect to this real user Not Specified
server.
config ssl-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - ssl-3.0 tls-
with. 1.0 tls-1.1
tls-1.2 tls-
1.3
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - ssl-3.0 tls-
with. 1.0 tls-1.1
tls-1.2 tls-
1.3
Option Description
Option Description
Option Description
disable Disable use of the lower 32 bits of the external IPv6 address as mapped IPv4
address.
enable Enable use of the lower 32 bits of the external IPv6 address as mapped IPv4
address.
extip IPv6 address or address range on the external user Not Specified
interface that you want to map to an address or
address range on the destination network.
extport Incoming port number range that you want to user Not Specified
map to a port number range on the destination
network.
http-cookie- Domain that HTTP cookie persistence should string Not Specified
domain apply to.
Option Description
disable Disable use of HTTP cookie domain from host field in HTTP (use http-cooke-
domain setting).
enable Enable use of HTTP cookie domain from host field in HTTP.
http-cookie- Limit HTTP cookie persistence to the specified string Not Specified
path path.
Option Description
same-ip Allow HTTP cookie to match any virtual server with same IP.
Option Description
http-ip-header- For HTTP multiplexing, enter a custom HTTPS string Not Specified
name header name. The original client IP address is
added to this header. If empty, X-Forwarded-
For is used.
Option Description
Option Description
Option Description
disable Do not mark cookie as secure, allow sharing between an HTTP and HTTPS
connection.
enable Mark inserted cookie as secure, cookie can only be used for HTTPS a
connection.
ipv4- IPv4 port number range on the destination user Not Specified
mappedport network to which the external port number
range is mapped.
Option Description
least-session Sends new sessions to the server with the lowest session count.
mappedip Mapped IPv6 address range in the format user Not Specified
startIP-endIP.
mappedport Port number range on the destination network user Not Specified
to which the external port number range is
mapped.
monitor Name of the health check monitor to use when string Maximum
<name> polling to determine a virtual server's length: 79
connectivity status.
Health monitor name.
Option Description
enable Perform SNAT on traffic from mappedip to the extip for all egress interfaces.
Option Description
Option Description
Option Description
disable Disable this FortiGate unit's ability to respond to NDP requests for this virtual
IP address.
enable Enable this FortiGate unit's ability to respond to NDP requests for this virtual
IP address.
Option Description
Option Description
none None.
Option Description
Option Description
tcp TCP.
udp UDP.
sctp SCTP.
Option Description
http HTTP.
https HTTPS.
imaps IMAPS.
pop3s POP3S.
Option Description
smtps SMTPS.
ssl SSL.
tcp TCP.
udp UDP.
ip IP.
Option Description
Option Description
custom Use config ssl-cipher-suites to select the cipher suites that are allowed.
ssl-certificate The name of the certificate to use for SSL string Not Specified
handshake.
Option Description
disable Disable.
enable Enable.
Option Description
secure Reject any SSL connection that does not offer a RFC 5746 Secure
Renegotiation Indication.
ssl-client- How to expire SSL sessions for the segment of option - both
session-state- the SSL connection between the client and the
type FortiGate.
Option Description
both Expire session states based on time or count, whichever occurs first.
Option Description
Option Description
Option Description
ssl-hpkp-age Number of minutes the web browser should integer Minimum 5184000
keep HPKP. value: 60
Maximum
value:
157680000
ssl-hpkp- Certificate to generate backup HPKP pin from. string Not Specified
backup
Option Description
ssl-hpkp- Certificate to generate primary HPKP pin from. string Not Specified
primary
Option Description
ssl-hsts-age Number of seconds the client should honor the integer Minimum 5184000
HSTS setting. value: 60
Maximum
value:
157680000
Option Description
Option Description
Option Description
Option Description
Option Description
ssl-mode Apply SSL offloading between the client and option - half
the FortiGate (half) or from the client to the
FortiGate and from the FortiGate to the server
(full).
Option Description
ssl-pfs Select the cipher suites that can be used for option - require
SSL perfect forward secrecy (PFS). Applies to
both client and server sessions.
Option Description
allow Allow use of any cipher suite so PFS may or may not be used depending on
the cipher suite selected.
Option Description
Option Description
custom Use config ssl-server-cipher-suites to select the cipher suites that are
allowed.
client Use the same encryption algorithms for client and server sessions.
Option Description
Option Description
ssl-server- How to expire SSL sessions for the segment of option - both
session-state- the SSL connection between the server and
type the FortiGate.
Option Description
both Expire session states based on time or count, whichever occurs first.
Option Description
Option Description
disable Do not add HTTP header indicating SSL offload for WebLogic server.
enable Add HTTP header indicating SSL offload for WebLogic server.
Option Description
disable Do not add HTTP header indicating SSL offload for WebSphere server.
enable Add HTTP header indicating SSL offload for WebSphere server.
port Port for communicating with the real server. Required integer Minimum 0
if port forwarding is enabled. value: 1
Maximum
value: 65535
status Set the status of the real server to active so that it can option - active
accept traffic, or on standby or disabled so no traffic
is sent.
Option Description
weight Weight of the real server. If weighted load balancing integer Minimum 1
is enabled, the server with the highest weight gets value: 1
more connections. Maximum
value: 255
holddown- Time in seconds that the health check monitor integer Minimum 300
interval continues to monitor an unresponsive server that value: 30
should be active. Maximum
value: 65535
Option Description
http-host HTTP server domain name in HTTP header. string Not Specified
max- Max number of active connections that can directed integer Minimum 0
connections to the real server. When reached, sessions are sent value: 0
to other real servers. Maximum
value:
2147483647
monitor Name of the health check monitor to use when string Maximum
<name> polling to determine a virtual server's connectivity length: 79
status.
Health monitor name.
client-ip Only clients in this IP range can connect to this real user Not Specified
server.
config ssl-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - ssl-3.0 tls-
with. 1.0 tls-1.1
tls-1.2 tls-
1.3
Option Description
config ssl-server-cipher-suites
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
versions SSL/TLS versions that the cipher suite can be used option - ssl-3.0 tls-
with. 1.0 tls-1.1
tls-1.2 tls-
1.3
Option Description
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
color Integer value to determine the color of the icon in integer Minimum 0
the GUI. value: 0
Maximum
value: 32
incoming-ip Accept incoming FTP requests from this IP address. An ipv4- Not 0.0.0.0
interface must have this IP address. address- Specified
any
incoming-port Accept incoming FTP requests on one or more ports. user Not
Specified
outgoing-ip Outgoing FTP requests will leave from this IP address. ipv4- Not
An interface must have this IP address. address- Specified
any
sec-default- Accept or deny explicit FTP proxy sessions when no option - deny
action FTP proxy firewall policy exists.
Option Description
accept Accept requests. All explicit FTP proxy traffic is accepted whether there is an
explicit FTP proxy policy or not
deny Deny requests unless there is a matching explicit FTP proxy policy.
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
ssl-cert Name of certificate for SSL connections to this server. string Not Fortinet_
Specified CA_SSL
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E, FortiGate 2200E,
FortiGate 2201E, FortiGate 2500E, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3800D,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 601E, FortiGate 800D, FortiGate 900D.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E,
FortiGate 101F, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F,
FortiGate 200E, FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2600F, FortiGate
2601F, FortiGate 3500F, FortiGate 3501F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 60E DSLJ, FortiGate
60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F,
FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate
80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 90E,
FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
This command is available for model(s): FortiGate 1000D, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E, FortiGate 2200E,
FortiGate 2201E, FortiGate 2500E, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3800D,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 601E, FortiGate 800D, FortiGate 900D.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E,
FortiGate 101F, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F,
FortiGate 200E, FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2600F, FortiGate
2601F, FortiGate 3500F, FortiGate 3501F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 60E DSLJ, FortiGate
60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F,
FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate
80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 90E,
FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
This command is available for model(s): FortiGate 1000D, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E, FortiGate 2200E,
FortiGate 2201E, FortiGate 2500E, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3800D,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 601E, FortiGate 800D, FortiGate 900D.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E,
FortiGate 101F, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F,
FortiGate 200E, FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2600F, FortiGate
2601F, FortiGate 3500F, FortiGate 3501F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 60E DSLJ, FortiGate
60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F,
FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate
80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 90E,
FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
This command is available for model(s): FortiGate 1000D, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E, FortiGate 2200E,
FortiGate 2201E, FortiGate 2500E, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3800D,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 601E, FortiGate 800D, FortiGate 900D.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E,
FortiGate 101F, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F,
FortiGate 200E, FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2600F, FortiGate
2601F, FortiGate 3500F, FortiGate 3501F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 60E DSLJ, FortiGate
60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F,
FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate
80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 90E,
FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
This command is available for model(s): FortiGate 1000D, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E, FortiGate 2200E,
FortiGate 2201E, FortiGate 2500E, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3800D,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 601E, FortiGate 800D, FortiGate 900D.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E,
FortiGate 101F, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F,
FortiGate 200E, FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2600F, FortiGate
2601F, FortiGate 3500F, FortiGate 3501F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 60E DSLJ, FortiGate
60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F,
FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate
80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 90E,
FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
This command is available for model(s): FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3800D, FortiGate 3960E,
FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E, FortiGate 5001E1,
FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 601E.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F,
FortiGate 1801F, FortiGate 200E, FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate
2600F, FortiGate 2601F, FortiGate 3500F, FortiGate 3501F, FortiGate 40F 3G4G, FortiGate
40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 60E
DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E,
FortiGate 61F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass,
FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F,
FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F
2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
Hardware status.
config hardware status
Description: Hardware status.
end
Option Description
Option Description
Option Description
methods The allowed HTTP methods that will be sent to ICAP option - delete get
server for further processing. head
options
post put
trace other
Option Description
delete Forward HTTP request or response with DELETE method to ICAP server for
further processing.
get Forward HTTP request or response with GET method to ICAP server for
further processing.
Option Description
head Forward HTTP request or response with HEAD method to ICAP server for
further processing.
options Forward HTTP request or response with OPTIONS method to ICAP server for
further processing.
post Forward HTTP request or response with POST method to ICAP server for
further processing.
put Forward HTTP request or response with PUT method to ICAP server for
further processing.
trace Forward HTTP request or response with TRACE method to ICAP server for
further processing.
other Forward HTTP request or response with All other methods to ICAP server for
further processing.
Option Description
Option Description
request-failure Action to take if the ICAP server cannot be contacted option - error
when processing an HTTP request.
Option Description
error Error.
bypass Bypass.
request-path Path component of the ICAP URI that identifies the string Not
HTTP request processing service. Specified
Option Description
forward Forward response to icap server unless a rule specifies not to.
bypass Don't forward request to icap server unless a rule specifies to forward the
request.
Option Description
response- Action to take if the ICAP server cannot be contacted option - error
failure when processing an HTTP response.
Option Description
error Error.
bypass Bypass.
response-path Path component of the ICAP URI that identifies the string Not
HTTP response processing service. Specified
Option Description
Option Description
config icap-headers
Option Description
config respmod-forward-rules
Option Description
bypass Don't forward request to ICAP server when this rule is matched.
config header-group
Option Description
Option Description
Option Description
action Default action (pass or block) for this signature. option - pass
Option Description
Option Description
Option Description
Option Description
protocol Protocol(s) that the signature scans. Blank for all user Not Specified
protocols.
severity Relative severity of the signature, from info to critical. user Not Specified
Log messages generated by the signature include the
severity.
Option Description
config parameter
Option Description
periodical After an anomaly is detected, allow the number of packets per second
according to the anomaly configuration.
Option Description
advanced Offload more types of pattern matching resulting in higher throughput than
basic mode. Requires two CP8s or one CP9.
Option Description
engine-count Number of IPS engines running. If set to the default integer Minimum 0
value of 0, FortiOS sets the number to optimize value: 0
performance depending on the number of CPU Maximum
cores. value: 255
Option Description
fail-open Enable to allow traffic if the IPS buffer is full. Default option - disable
is disable and IPS traffic is blocked when the IPS
buffer is full.
Option Description
Option Description
disable Disable IPS daemon's use of CPUs other than CPU 0 (all daemons run on all
CPUs).
Option Description
packet-log- Packet/pcap log queue depth per IPS engine. integer Minimum 128
queue-depth value: 128
Maximum
value: 4096
Option Description
socket-size IPS socket buffer size. Max and default value integer Minimum 128 **
depend on available memory. Can be changed to value: 0
tune performance. Maximum
value: 256 **
sync-session- Enable/disable use of kernel session TTL for IPS option - enable
ttl sessions.
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
vdom Virtual domain name for TLS active probe. string Not
Specified
source-ip Source IP address used for TLS active probe. ipv4- Not 0.0.0.0
address Specified
source-ip6 Source IPv6 address used for TLS active probe. ipv6- Not ::
address Specified
Option Description
Option Description
Option Description
Option Description
config metadata
Option Description
Option Description
Option Description
rule <id> Identifies the predefined or custom IPS signatures integer Minimum
to add to the sensor. value: 0
Rule IPS. Maximum
value:
4294967295
severity Relative severity of the signature, from info to user Not Specified all
critical. Log messages generated by the signature
include the severity.
protocol Protocols to be examined. Use all for every protocol user Not Specified all
and other for unlisted protocols.
os Operating systems to be protected. Use all for every user Not Specified all
operating system and other for unlisted operating
systems.
application Operating systems to be protected. Use all for every user Not Specified all
application and other for unlisted application.
cve <cve- List of CVE IDs of the signatures to add to the string Maximum
entry> sensor. length: 19
CVE IDs or CVE wildcards.
status Status of the signatures included in filter. Only those option - default
filters with a status to enable are used.
Option Description
default Default.
Option Description
Option Description
Option Description
action Action taken with traffic in which signatures are option - default
detected.
Option Description
default Pass or drop matching traffic, depending on the default action of the signature.
Option Description
Option Description
none none
Option Description
attacker Block all traffic sent from attacker's IP address. The attacker's IP address is
also added to the banned user list. The target's address is not affected.
Option Description
config exempt-ip
src-ip Source IP address and netmask (applies to packet ipv4- Not Specified 0.0.0.0
matching the signature). classnet 0.0.0.0
dst-ip Destination IP address and netmask (applies to ipv4- Not Specified 0.0.0.0
packet matching the signature). classnet 0.0.0.0
Session status.
packet-log- Maximum memory can be used by packet log. integer Minimum 256
memory value: 64
Maximum
value: 8192
packet-log- Number of packets to log after the IPS signature is integer Minimum 0
post-attack detected. value: 0
Maximum
value: 255
Option Description
IPsec tunnel.
config ipsec tunnel
Description: IPsec tunnel.
end
Configure filters for local disk logging. Use these filters to determine the log messages to record according to severity
and type.
config log disk filter
Description: Configure filters for local disk logging. Use these filters to determine
the log messages to record according to severity and type.
set anomaly [enable|disable]
set dlp-archive [enable|disable]
set forward-traffic [enable|disable]
config free-style
Description: Free style filters.
edit <id>
set id {integer}
set category [traffic|event|...]
set filter {string}
set filter-type [include|exclude]
next
end
set gtp [enable|disable]
set local-traffic [enable|disable]
set multicast-traffic [enable|disable]
set severity [emergency|alert|...]
set sniffer-traffic [enable|disable]
set voip [enable|disable]
set ztna-traffic [enable|disable]
end
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
severity Log to disk every message above and including this option - information
severity level.
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
diskfull Action to take when disk is full. The system can option - overwrite
overwrite the oldest log messages or stop logging
when the disk is full.
Option Description
overwrite Overwrite the oldest logs when the log disk is full.
Option Description
Option Description
Option Description
sunday Sunday
Option Description
monday Monday
tuesday Tuesday
wednesday Wednesday
thursday Thursday
friday Friday
saturday Saturday
Option Description
roll-time Time of day to roll the log file (hh:mm). user Not Specified
source-ip Source IP address to use for uploading disk log ipv4- Not Specified 0.0.0.0
files. address
Option Description
upload Enable/disable uploading log files when they are option - disable
rolled.
Option Description
Option Description
upload- The type of server to upload log files to. Only FTP is option - ftp-server
destination currently supported.
Option Description
Option Description
uploaddir The remote directory on the FTP server to upload string Not Specified
log files to.
uploadip IP address of the FTP server to upload log files to. ipv4- Not Specified 0.0.0.0
address
uploadpass Password required to log into the FTP server to password Not Specified
upload disk log files.
uploadport TCP port to use for communicating with the FTP integer Minimum 21
server. value: 0
Maximum
value: 65535
uploadsched Set the schedule for uploading log files to the FTP option - disable
server.
Option Description
uploadtime Time of day at which log files are uploaded if user Not Specified
uploadsched is enabled (hh:mm or hh).
uploadtype Types of log files to upload. Separate multiple option - traffic event
entries with a space. virus
webfilter
IPS
emailfilter
dlp-archive
anomaly
voip dlp
app-ctrl waf
dns ssh ssl
**
Option Description
uploaduser Username required to log into the FTP server to string Not Specified
upload disk log files.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
source-ip Source IPv4 or IPv6 address used to communicate with string Not
FortiAnalyzer. Specified
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
upload-option Enable/disable logging to hard disk and then uploading option - 5-minute
to FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
severity Log every message above and including this severity option - information
level.
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
severity Log every message above and including this severity option - information
level.
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
Option Description
Option Description
enable Enable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
disable Disable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
source-ip Source IPv4 or IPv6 address used to communicate with string Not
FortiAnalyzer. Specified
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
upload-option Enable/disable logging to hard disk and then uploading option - 5-minute
to FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
disable Disable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
Option Description
source-ip Source IPv4 or IPv6 address used to communicate with string Not
FortiAnalyzer. Specified
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
upload-option Enable/disable logging to hard disk and then uploading option - 5-minute
to FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
Option Description
Option Description
enable Enable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
disable Disable use of management VDOM IP address as source IP for logs sent to
FortiAnalyzer.
Option Description
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiAnalyzer.
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
monitor- Time between OFTP keepalives in seconds (for status integer Minimum 5
keepalive- and log buffer). value: 1
period Maximum
value: 120
Option Description
Option Description
source-ip Source IPv4 or IPv6 address used to communicate with string Not
FortiAnalyzer. Specified
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
upload-option Enable/disable logging to hard disk and then uploading option - 5-minute
to FortiAnalyzer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
override Overriding FortiCloud settings for this VDOM or use option - disable
global settings.
Option Description
Option Description
Option Description
Option Description
upload-option Configure how log messages are sent to FortiCloud. option - 5-minute
Option Description
store-and-upload Log to the hard disk and then upload logs to FortiCloud.
Option Description
enc-algorithm Configure the level of SSL protection for secure option - high
communication with FortiCloud.
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
upload-option Configure how log messages are sent to FortiCloud. option - 5-minute
Option Description
store-and-upload Log to the hard disk and then upload logs to FortiCloud.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
severity Log every message above and including this severity option - information
level.
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
max-size Maximum amount of memory that can be used for integer Minimum 168441200 **
memory logging in bytes. value: 0
Maximum
value:
4294967295
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable statistics collection for when no external logging destination, such as
FortiAnalyzer, is present (data is not saved).
disable Disable statistics collection for when no external logging destination, such as
FortiAnalyzer, is present (data is not saved).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
legacy-reliable Enable legacy reliable syslogging by RFC3195 (Reliable Delivery for Syslog).
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
config custom-field-name
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
botnet- Threat weight score for detected botnet connections. option - critical
connection-
detected
Option Description
low Use the low level score for detected botnet connections.
medium Use the medium level score for detected botnet connections.
high Use the high level score for detected botnet connections.
critical Use the critical level score for detected botnet connections.
Option Description
Option Description
Option Description
config application
Option Description
Option Description
config ips
info-severity Threat weight score for IPS info severity events. option - disable
Option Description
disable Disable threat weight scoring for IPS info severity events.
low Use the low level score for IPS info severity events.
medium Use the medium level score for IPS info severity events.
high Use the high level score for IPS info severity events.
critical Use the critical level score for IPS info severity events.
low-severity Threat weight score for IPS low severity events. option - low
Option Description
disable Disable threat weight scoring for IPS low severity events.
low Use the low level score for IPS low severity events.
medium Use the medium level score for IPS low severity events.
high Use the high level score for IPS low severity events.
critical Use the critical level score for IPS low severity events.
medium- Threat weight score for IPS medium severity events. option - medium
severity
Option Description
disable Disable threat weight scoring for IPS medium severity events.
low Use the low level score for IPS medium severity events.
medium Use the medium level score for IPS medium severity events.
high Use the high level score for IPS medium severity events.
critical Use the critical level score for IPS medium severity events.
high-severity Threat weight score for IPS high severity events. option - high
Option Description
disable Disable threat weight scoring for IPS high severity events.
low Use the low level score for IPS high severity events.
medium Use the medium level score for IPS high severity events.
high Use the high level score for IPS high severity events.
critical Use the critical level score for IPS high severity events.
critical- Threat weight score for IPS critical severity events. option - critical
severity
Option Description
disable Disable threat weight scoring for IPS critical severity events.
low Use the low level score for IPS critical severity events.
medium Use the medium level score for IPS critical severity events.
high Use the high level score for IPS critical severity events.
critical Use the critical level score for IPS critical severity events.
config level
config malware
virus-infected Threat weight score for virus (infected) detected. option - critical
Option Description
low Use the low level score for virus (infected) detected.
medium Use the medium level score for virus (infected) detected.
high Use the high level score for virus (infected) detected.
critical Use the critical level score for virus (infected) detected.
Option Description
low Use the low level score for virus detected by FortiNDR.
medium Use the medium level score for virus detected by FortiNDR.
high Use the high level score for virus detected by FortiNDR.
critical Use the critical level score for virus detected by FortiNDR.
file-blocked Threat weight score for blocked file detected. option - low
Option Description
low Use the low level score for blocked file detected.
Option Description
medium Use the medium level score for blocked file detected.
high Use the high level score for blocked file detected.
critical Use the critical level score for blocked file detected.
command-blocked Threat weight score for blocked command detected. option - disable
Option Description
low Use the low level score for blocked command detected.
medium Use the medium level score for blocked command detected.
high Use the high level score for blocked command detected.
critical Use the critical level score for blocked command detected.
oversized Threat weight score for oversized file detected. option - disable
Option Description
low Use the low level score for oversized file detected.
medium Use the medium level score for oversized file detected.
high Use the high level score for oversized file detected.
critical Use the critical level score for oversized file detected.
virus-scan-error Threat weight score for virus (scan error) detected. option - high
Option Description
disable Disable threat weight scoring for virus (scan error) detected.
low Use the low level score for virus (scan error) detected.
medium Use the medium level score for virus (scan error) detected.
high Use the high level score for virus (scan error) detected.
critical Use the critical level score for virus (scan error) detected.
switch-proto Threat weight score for switch proto detected. option - disable
Option Description
Option Description
low Use the low level score for switch proto detected.
medium Use the medium level score for switch proto detected.
high Use the high level score for switch proto detected.
critical Use the critical level score for switch proto detected.
Option Description
virus-file-type- Threat weight score for virus (file type executable) option - medium
executable detected.
Option Description
disable Disable threat weight scoring for virus (filetype executable) detected.
low Use the low level score for virus (filetype executable) detected.
medium Use the medium level score for virus (filetype executable) detected.
high Use the high level score for virus (filetype executable) detected.
critical Use the critical level score for virus (filetype executable) detected.
virus-outbreak- Threat weight score for virus (outbreak prevention) option - critical
prevention event.
Option Description
disable Disable threat weight scoring for virus (outbreak prevention) event.
low Use the low level score for virus (outbreak prevention) event.
medium Use the medium level score for virus (outbreak prevention) event.
high Use the high level score for virus (outbreak prevention) event.
critical Use the critical level score for virus (outbreak prevention) event.
content-disarm Threat weight score for virus (content disarm) option - medium
detected.
Option Description
disable Disable threat weight scoring for virus (content disarm) detected.
low Use the low level score for virus (content disarm) detected.
medium Use the medium level score for virus (content disarm) detected.
high Use the high level score for virus (content disarm) detected.
critical Use the critical level score for virus (content disarm) detected.
malware-list Threat weight score for virus (malware list) detected. option - medium
Option Description
disable Disable threat weight scoring for virus (malware list) detected.
low Use the low level score for virus (malware list) detected.
medium Use the medium level score for virus (malware list) detected.
high Use the high level score for virus (malware list) detected.
critical Use the critical level score for virus (malware list) detected.
ems-threat-feed Threat weight score for virus (EMS threat feed) option - medium
detected.
Option Description
disable Disable threat weight scoring for virus (EMS threat feed) detected.
low Use the low level score for virus (EMS threat feed) detected.
medium Use the medium level score for virus (EMS threat feed) detected.
high Use the high level score for virus (EMS threat feed) detected.
critical Use the critical level score for virus (EMS threat feed) detected.
Option Description
low Use the low level score for FortiSandbox malicious malware detected.
medium Use the medium level score for FortiSandbox malicious malware
detected.
high Use the high level score for FortiSandbox malicious malware detected.
Option Description
critical Use the critical level score for FortiSandbox malicious malware detected.
fsa-high-risk Threat weight score for FortiSandbox high risk option - high
malware detected.
Option Description
disable Disable threat weight scoring for FortiSandbox high risk malware
detected.
low Use the low level score for FortiSandbox high risk malware detected.
medium Use the medium level score for FortiSandbox high risk malware detected.
high Use the high level score for FortiSandbox high risk malware detected.
critical Use the critical level score for FortiSandbox high risk malware detected.
fsa-medium-risk Threat weight score for FortiSandbox medium risk option - medium
malware detected.
Option Description
disable Disable threat weight scoring for FortiSandbox medium risk malware
detected.
low Use the low level score for FortiSandbox medium risk malware detected.
medium Use the medium level score for FortiSandbox medium risk malware
detected.
high Use the high level score for FortiSandbox medium risk malware detected.
critical Use the critical level score for FortiSandbox medium risk malware
detected.
config web
category Threat weight score for web category filtering matches. integer Minimum 0
value: 0
Maximum
value: 255
level Threat weight score for web category filtering matches. option - low
Option Description
disable Disable threat weight scoring for web category filtering matches.
low Use the low level score for web category filtering matches.
medium Use the medium level score for web category filtering matches.
high Use the high level score for web category filtering matches.
critical Use the critical level score for web category filtering matches.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config free-style
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E, FortiGate 2200E,
FortiGate 2201E, FortiGate 2500E, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3800D,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 601E, FortiGate 800D, FortiGate 900D.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E,
FortiGate 101F, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F,
FortiGate 200E, FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2600F, FortiGate
2601F, FortiGate 3500F, FortiGate 3501F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 60E DSLJ, FortiGate
60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F,
FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate
80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 90E,
FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
Option Description
threshold IPsec engine status check threshold. Example: Log is user Not
generated if IPsec engine 0 is busy each of every 15 Specified
consecutive interval checks.
This command is available for model(s): FortiGate 1000D, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F, FortiGate 1801F,
FortiGate 2000E, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
400E, FortiGate 401E, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 601E, FortiGate 800D, FortiGate 900D.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E,
FortiGate 101F, FortiGate 140E-POE, FortiGate 140E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 60E DSLJ,
FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E,
FortiGate 61F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
multipliers HPE type interval multipliers. An event log is generated user Not
after every (interval * multiplier)seconds as configured Specified
for any HPE type when drops occur for that HPE type.
An attack log is generated after every (4 * multiplier)
number of continuous event logs.
Option Description
config service-index
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 101E, FortiGate 101F,
FortiGate 1101E, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 401E, FortiGate 4201F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 501E, FortiGate 601E, FortiGate 61E, FortiGate 61F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 91E, FortiGate VM64, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-
POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 1100E,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F,
FortiGate 2200E, FortiGate 300E, FortiGate 3300E, FortiGate 3400E, FortiGate 3500F,
FortiGate 3600E, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 80F 2R.
Option Description
custom Custom.
Option Description
sunday Sunday.
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
thursday Thursday.
friday Friday.
saturday Saturday.
Option Description
Option Description
pdf PDF.
max-pdf- Maximum number of PDF reports to keep at one time integer Minimum 31
report (oldest report is overwritten). value: 1
Maximum
value: 365
Option Description
dummy-option Use this option if you need none of the above options.
Option Description
Option Description
config body-item
Option Description
text Text.
image Image.
chart Chart.
misc Miscellaneous.
Option Description
heading1 Heading 1.
heading2 Heading 2.
heading3 Heading 3.
Option Description
Option Description
config parameters
name Field name that match field of parameters defined in string Not Specified
dataset.
config page
Option Description
a4 A4 paper.
Option Description
Option Description
Option Description
config header-item
Option Description
text Text.
image Image.
config footer
config footer-item
Option Description
text Text.
image Image.
This command is available for model(s): FortiGate 1000D, FortiGate 101E, FortiGate 101F,
FortiGate 1101E, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 401E, FortiGate 4201F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 501E, FortiGate 601E, FortiGate 61E, FortiGate 61F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 91E, FortiGate VM64, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-
POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 1100E,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F,
FortiGate 2200E, FortiGate 300E, FortiGate 3300E, FortiGate 3400E, FortiGate 3500F,
FortiGate 3600E, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 80F 2R.
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 101E, FortiGate 101F,
FortiGate 1101E, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2601F, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3301E,
FortiGate 3401E, FortiGate 3501F, FortiGate 3601E, FortiGate 3700D, FortiGate 3800D,
FortiGate 401E, FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E,
FortiGate 601E, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate 81E, FortiGate 81F-
POE, FortiGate 81F, FortiGate 900D, FortiGate 91E, FortiGate VM64, FortiWiFi 61E,
FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 1100E,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F,
FortiGate 2200E, FortiGate 2600F, FortiGate 3000D, FortiGate 300E, FortiGate 3300E,
FortiGate 3400E, FortiGate 3500F, FortiGate 3600E, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4400F, FortiGate 5001E, FortiGate 500E, FortiGate 600E, FortiGate 60E
DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 80E-
POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate
81E-POE, FortiGate 90E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 40F
3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 80F 2R.
config rule
action Permit or deny this IP address and netmask prefix. option - permit
Option Description
prefix IPv4 prefix to define regular filter criteria, such as user Not Specified
"any" or subnets.
wildcard Wildcard to define Cisco-style wildcard filter criteria. user Not Specified
Option Description
config rule
action Permit or deny this IP address and netmask prefix. option - permit
Option Description
prefix6 IPv6 prefix to define regular filter criteria, such as user Not Specified
"any" or subnets.
Option Description
config rule
Option Description
Configure BFD.
config router bfd
Description: Configure BFD.
config multihop-template
Description: BFD multi-hop template table.
edit <id>
set id {integer}
set src {ipv4-classnet}
config multihop-template
bfd-desired- BFD desired minimal transmit interval (milliseconds). integer Minimum 250
min-tx value: 100
Maximum
value: 30000
bfd-required- BFD required minimal receive interval (milliseconds). integer Minimum 250
min-rx value: 100
Maximum
value: 30000
Option Description
none None.
config neighbor
config multihop-template
bfd-desired- BFD desired minimal transmit interval (milliseconds). integer Minimum 250
min-tx value: 100
Maximum
value: 30000
bfd-required- BFD required minimal receive interval (milliseconds). integer Minimum 250
min-rx value: 100
Maximum
value: 30000
Option Description
none None.
config neighbor
Configure BGP.
config router bgp
Description: Configure BGP.
set additional-path [enable|disable]
set additional-path-select {integer}
set additional-path-select6 {integer}
set additional-path6 [enable|disable]
config admin-distance
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
distance-internal Distance for routes internal to the AS. integer Minimum 200
value: 1
Maximum
value: 255
distance-local Distance for routes local to the AS. integer Minimum 200
value: 1
Maximum
value: 255
Option Description
Option Description
Option Description
Option Description
Option Description
graceful-restart- Time needed for neighbors to restart (sec). integer Minimum 120
time value: 1
Maximum
value: 3600
graceful- Time to hold stale paths of restarting neighbor integer Minimum 360
stalepath-time (sec). value: 1
Maximum
value: 3600
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
preferred Use tag-match if a BGP route resolution with another route containing the
same tag is successful.
merge Merge tag-match with best-match if they are using different routes. The
result will exclude the next hops of tag-match whose interfaces have
appeared in best-match.
config admin-distance
route-list Access list of routes to apply new distance to. string Not Specified
config aggregate-address
Option Description
Option Description
config aggregate-address6
Option Description
Option Description
config neighbor
Option Description
Option Description
Option Description
as-path AS path.
med MED.
Option Description
as-path AS path.
med MED.
Option Description
Option Description
Option Description
Option Description
Option Description
none None.
Option Description
none None.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
default-originate- Route map to specify criteria to originate IPv4 string Not Specified
routemap default.
default-originate- Route map to specify criteria to originate IPv6 string Not Specified
routemap6 default.
distribute-list-in Filter for IPv4 updates from this neighbor. string Not Specified
distribute-list-in6 Filter for IPv6 updates from this neighbor. string Not Specified
distribute-list-out Filter for IPv4 updates to this neighbor. string Not Specified
distribute-list-out6 Filter for IPv6 updates to this neighbor. string Not Specified
ebgp-multihop-ttl EBGP multihop TTL for this peer. integer Minimum 255
value: 1
Maximum
value: 255
filter-list-in BGP filter for IPv4 inbound routes. string Not Specified
filter-list-in6 BGP filter for IPv6 inbound routes. string Not Specified
filter-list-out BGP filter for IPv4 outbound routes. string Not Specified
filter-list-out6 BGP filter for IPv6 outbound routes. string Not Specified
Option Description
Option Description
prefix-list-in IPv4 Inbound filter for updates from this string Not Specified
neighbor.
prefix-list-in6 IPv6 Inbound filter for updates from this string Not Specified
neighbor.
prefix-list-out IPv4 Outbound filter for updates to this string Not Specified
neighbor.
prefix-list-out6 IPv6 Outbound filter for updates to this string Not Specified
neighbor.
Option Description
Option Description
route-map-out- IPv4 outbound route map filter if the peer is string Not Specified
preferable preferred.
route-map-out6- IPv6 outbound route map filter if the peer is string Not Specified
preferable preferred.
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
Option Description
extended Extended.
both Both.
disable Disable
holdtime-timer Interval (sec) before peer considered dead. integer Minimum 4294967295
value: 3
Maximum
value: 65535
Option Description
Option Description
Option Description
config conditional-advertise
Option Description
Option Description
config neighbor-group
Option Description
Option Description
Option Description
as-path AS path.
med MED.
Option Description
as-path AS path.
med MED.
Option Description
Option Description
Option Description
Option Description
Option Description
none None.
Option Description
none None.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
default-originate- Route map to specify criteria to originate IPv4 string Not Specified
routemap default.
default-originate- Route map to specify criteria to originate IPv6 string Not Specified
routemap6 default.
distribute-list-in Filter for IPv4 updates from this neighbor. string Not Specified
distribute-list-in6 Filter for IPv6 updates from this neighbor. string Not Specified
distribute-list-out Filter for IPv4 updates to this neighbor. string Not Specified
distribute-list-out6 Filter for IPv6 updates to this neighbor. string Not Specified
ebgp-multihop-ttl EBGP multihop TTL for this peer. integer Minimum 255
value: 1
Maximum
value: 255
filter-list-in BGP filter for IPv4 inbound routes. string Not Specified
filter-list-in6 BGP filter for IPv6 inbound routes. string Not Specified
filter-list-out BGP filter for IPv4 outbound routes. string Not Specified
filter-list-out6 BGP filter for IPv6 outbound routes. string Not Specified
interface Specify outgoing interface for peer connection. string Not Specified
For IPv6 peer, the interface should have link-
local address.
Option Description
Option Description
prefix-list-in IPv4 Inbound filter for updates from this string Not Specified
neighbor.
prefix-list-in6 IPv6 Inbound filter for updates from this string Not Specified
neighbor.
prefix-list-out IPv4 Outbound filter for updates to this string Not Specified
neighbor.
prefix-list-out6 IPv6 Outbound filter for updates to this string Not Specified
neighbor.
Option Description
Option Description
route-map-out- IPv4 outbound route map filter if the peer is string Not Specified
preferable preferred.
route-map-out6- IPv6 outbound route map filter if the peer is string Not Specified
preferable preferred.
Option Description
standard Standard.
extended Extended.
both Both.
disable Disable
Option Description
standard Standard.
Option Description
extended Extended.
both Both.
disable Disable
holdtime-timer Interval (sec) before peer considered dead. integer Minimum 4294967295
value: 3
Maximum
value: 65535
Option Description
Option Description
config neighbor-range
config network
Option Description
Option Description
Option Description
Option Description
config redistribute
Option Description
Option Description
config vrf-leak
config target
interface Interface which is used to leak routes to target VRF. string Not
Specified
config vrf-leak6
config target
interface Interface which is used to leak routes to target VRF. string Not
Specified
Option Description
Option Description
Configure IS-IS.
config router isis
Description: Configure IS-IS.
set adjacency-check [enable|disable]
set adjacency-check6 [enable|disable]
set adv-passive-only [enable|disable]
set adv-passive-only6 [enable|disable]
set auth-keychain-l1 {string}
Option Description
Option Description
Option Description
Option Description
Option Description
password Password.
md5 MD5.
Option Description
password Password.
md5 MD5.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
external External.
interlevel Inter-level.
Option Description
Option Description
Option Description
redistribute6-l1- Access-list for IPv6 route redistribution from l1 to l2. string Not
list Specified
Option Description
redistribute6-l2- Access-list for IPv6 route redistribution from l2 to l1. string Not
list Specified
Option Description
Option Description
Option Description
broadcast Broadcast.
point-to-point Point-to-point.
loopback Loopback.
Option Description
level-1 Level 1.
level-2 Level 2.
Option Description
Option Description
Option Description
Option Description
md5 MD5.
password Password.
Option Description
md5 MD5.
password Password.
Option Description
config isis-net
config redistribute
Option Description
enable Enable.
disable Disable.
Option Description
external External.
internal Internal.
Option Description
level-1 Level 1.
level-2 Level 2.
config redistribute6
Option Description
Option Description
Option Description
level-1 Level 1.
level-2 Level 2.
config summary-address
Option Description
level-1 Level 1.
level-2 Level 2.
config summary-address6
Option Description
level-1 Level 1.
level-2 Level 2.
Configure key-chain.
config router key-chain
Description: Configure key-chain.
edit <name>
config key
Description: Configuration method to edit key settings.
edit <id>
set id {string}
set accept-lifetime {user}
set send-lifetime {user}
set key-string {password}
set algorithm [md5|hmac-sha1|...]
next
end
set name {string}
next
end
config key
Option Description
md5 MD5.
hmac-sha1 HMAC-SHA1.
hmac-sha256 HMAC-SHA256.
hmac-sha384 HMAC-SHA384.
hmac-sha512 HMAC-SHA512.
Configure multicast-flow.
config router multicast-flow
Description: Configure multicast-flow.
edit <name>
set comments {string}
config flows
Description: Multicast-flow entries.
edit <id>
set id {integer}
set group-addr {ipv4-address-any}
set source-addr {ipv4-address-any}
next
end
set name {string}
next
end
Option Description
config interface
Option Description
sparse-mode sparse-mode
dense-mode dense-mode
Option Description
Option Description
cisco-exclude- Exclude GenID from hello packets (compatibility with option - disable
genid old Cisco IOS).
Option Description
Option Description
static-group Statically set multicast groups to forward out. string Not Specified
rpf-nbr-fail- Enable/disable fail back for RPF neighbor query. option - disable
back
Option Description
rpf-nbr-fail- Filter for fail back RPF neighbors. string Not Specified
back-filter
config join-group
config igmp
Option Description
1 Version 1.
last-member- Timeout between IGMPv2 leave and removing group. integer Minimum 1000
query-interval value: 1
Maximum
value:
65535
query-max- Maximum time to wait for a IGMP query response. integer Minimum 10
response- value: 1
time Maximum
value: 25
query-timeout Timeout between queries before becoming querying integer Minimum 255
unit for network. value: 60
Maximum
value: 900
Option Description
message- Period of time between sending periodic PIM join/prune integer Minimum 60
interval messages in seconds. value: 1
Maximum
value:
65535
Option Description
bsr-allow- Enable/disable accept BSR quick refresh packets from option - disable
quick-refresh neighbors.
Option Description
cisco-register- Checksum entire register packet(for old Cisco IOS option - disable
checksum compatibility).
Option Description
Option Description
cisco-ignore- Use only hash for RP selection (compatibility with old option - disable
rp-set-priority Cisco IOS).
Option Description
Option Description
Option Description
Option Description
Option Description
register-rate- Limit of packets/sec per source registered through this integer Minimum 0
limit RP. value: 0
Maximum
value:
65535
Option Description
Option Description
config interface
config pim-sm-global
register-rate- Limit of packets/sec per source registered through this integer Minimum 0
limit RP (0 means unlimited). value: 0
Maximum
value:
65535
Configure OSPF.
config router ospf
Description: Configure OSPF.
set abr-type [cisco|ibm|...]
config area
Description: OSPF area configuration.
edit <id>
set id {ipv4-address-any}
set shortcut [disable|enable|...]
set authentication [none|text|...]
set default-cost {integer}
set nssa-translator-role [candidate|never|...]
set stub-type [no-summary|summary]
set type [regular|nssa|...]
set nssa-default-information-originate [enable|always|...]
set nssa-default-information-originate-metric {integer}
set nssa-default-information-originate-metric-type [1|2]
set nssa-redistribution [enable|disable]
set comments {var-string}
config range
Description: OSPF area range configuration.
edit <id>
set id {integer}
set prefix {ipv4-classnet-any}
set advertise [disable|enable]
set substitute {ipv4-classnet-any}
set substitute-status [enable|disable]
next
end
config virtual-link
Description: OSPF virtual link configuration.
edit <name>
set name {string}
set authentication [none|text|...]
set authentication-key {password}
set keychain {string}
set dead-interval {integer}
set hello-interval {integer}
Option Description
cisco Cisco.
ibm IBM.
shortcut Shortcut.
standard Standard.
Option Description
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
Option Description
Option Description
Option Description
config area
Option Description
Option Description
none None.
text Text.
Option Description
candidate Candidate.
never Never.
always Always.
Option Description
no-summary No summary.
summary Summary.
Option Description
regular Regular.
nssa NSSA.
stub Stub.
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
config range
Option Description
Option Description
Option Description
none None.
text Text.
config md5-keys
config filter-list
Option Description
in In.
out Out.
Option Description
config neighbor
cost Cost of the interface, value range from 0 to 65535, 0 integer Minimum 0
means auto-cost. value: 0
Maximum
value: 65535
config ospf-interface
Option Description
none None.
text Text.
cost Cost of the interface, value range from 0 to 65535, 0 integer Minimum 0
means auto-cost. value: 0
Maximum
value:
65535
Option Description
Option Description
Option Description
broadcast Broadcast.
non-broadcast Non-broadcast.
point-to-point Point-to-point.
point-to- Point-to-multipoint.
multipoint
Option Description
Option Description
config md5-keys
config redistribute
Option Description
Option Description
1 Type 1.
2 Type 2.
config summary-address
Option Description
Option Description
cisco Cisco.
ibm IBM.
standard Standard.
auto-cost-ref- Reference bandwidth in terms of megabits per second. integer Minimum 1000
bandwidth value: 1
Maximum
value:
1000000
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
Option Description
config area
Option Description
candidate Candidate.
never Never.
always Always.
Option Description
no-summary No summary.
summary Summary.
Option Description
regular Regular.
nssa NSSA.
stub Stub.
Option Description
Option Description
1 Type 1.
2 Type 2.
Option Description
Option Description
ah Authentication Header.
Option Description
md5 MD5.
sha1 SHA1.
sha256 SHA256.
sha384 SHA384.
sha512 SHA512.
Option Description
null No encryption.
des DES.
3des 3DES.
aes128 AES128.
aes192 AES192.
aes256 AES256.
config ipsec-keys
config ipsec-keys
Option Description
disable disable
enable enable
config virtual-link
Option Description
ah Authentication Header.
Option Description
md5 MD5.
sha1 SHA1.
sha256 SHA256.
sha384 SHA384.
sha512 SHA512.
Option Description
null No encryption.
des DES.
3des 3DES.
aes128 AES128.
aes192 AES192.
aes256 AES256.
config ipsec-keys
config ospf6-interface
cost Cost of the interface, value range from 0 to 65535, 0 integer Minimum 0
means auto-cost. value: 0
Maximum
value:
65535
Option Description
Option Description
broadcast broadcast
point-to-point point-to-point
non-broadcast non-broadcast
point-to- point-to-multipoint
multipoint
Option Description
Option Description
Option Description
Option Description
ah Authentication Header.
Option Description
md5 MD5.
sha1 SHA1.
sha256 SHA256.
sha384 SHA384.
sha512 SHA512.
Option Description
null No encryption.
des DES.
3des 3DES.
aes128 AES128.
aes192 AES192.
aes256 AES256.
config ipsec-keys
config ipsec-keys
config neighbor
cost Cost of the interface, value range from 0 to 65535, 0 integer Minimum 0
means auto-cost. value: 0
Maximum
value:
65535
config redistribute
Option Description
Option Description
1 Type 1.
2 Type 2.
config summary-address
Option Description
disable disable
enable enable
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config rule
action Permit or deny this IP address and netmask prefix. option - permit
Option Description
prefix IPv4 prefix to define regular filter criteria, such as user Not Specified 0.0.0.0
"any" or subnets. 0.0.0.0
action Permit or deny packets that match this rule. option - permit
Option Description
prefix6 IPv6 prefix to define regular filter criteria, such as user Not Specified
"any" or subnets.
Configure RIP.
config router rip
Description: Configure RIP.
set default-information-originate [enable|disable]
set default-metric {integer}
config distance
Description: Distance.
edit <id>
set id {integer}
set prefix {ipv4-classnet-any}
set distance {integer}
set access-list {string}
next
end
Option Description
max-out- Maximum metric allowed to output(0 means 'not set'). integer Minimum 0
metric value: 0
Maximum
value: 15
Option Description
1 Version 1.
2 Version 2.
config distance
config distribute-list
Option Description
Option Description
config interface
Option Description
none None.
text Text.
md5 MD5.
Option Description
1 Version 1.
2 Version 2.
Option Description
1 Version 1.
2 Version 2.
Option Description
Option Description
Option Description
poisoned Poisoned.
regular Regular.
config neighbor
config offset-list
Option Description
Option Description
Option Description
Configure RIPng.
config router ripng
Description: Configure RIPng.
config aggregate-address
Description: Aggregate address.
edit <id>
set id {integer}
set prefix6 {ipv6-prefix}
next
end
set default-information-originate [enable|disable]
set default-metric {integer}
config distance
Description: Distance.
edit <id>
set id {integer}
set distance {integer}
set prefix6 {ipv6-prefix}
set access-list6 {string}
next
end
config distribute-list
Description: Distribute list.
edit <id>
set id {integer}
set status [enable|disable]
set direction [in|out]
set listname {string}
set interface {string}
Option Description
max-out- Maximum metric allowed to output(0 means 'not set'). integer Minimum 0
metric value: 0
Maximum
value: 15
config distance
config distribute-list
Option Description
Option Description
config interface
Option Description
Option Description
poisoned Poisoned.
regular Regular.
config neighbor
config offset-list
Option Description
Option Description
config redistribute
Option Description
config rule
Option Description
permit Permit.
deny Deny.
Option Description
Option Description
none None.
match-ip-nexthop Match next hop IP address passed by access-list string Not Specified
or prefix-list.
match-ip6- Match next hop IPv6 address passed by access- string Not Specified
nexthop list6 or prefix-list6.
Option Description
Option Description
prepend Prepend.
replace Replace.
Option Description
Option Description
Option Description
Option Description
none None.
Option Description
Option Description
dst Destination IP and mask for this route. ipv4- Not Specified 0.0.0.0
classnet 0.0.0.0
Option Description
internet- Application name in the Internet service custom string Not Specified
service- database.
custom
Option Description
enable Keep this static route when link monitor or health check is down.
disable Withdraw this static route when link monitor or health check is down. (default)
src Source prefix for this route. ipv4- Not Specified 0.0.0.0
classnet 0.0.0.0
Option Description
Option Description
Option Description
dynamic- Enable use of dynamic gateway retrieved from Router option - disable
gateway Advertisement (RA).
Option Description
Option Description
enable Keep this static route when link monitor or health check is down.
disable Withdraw this static route when link monitor or health check is down. (default)
Option Description
config ppid-filters
Option Description
Option Description
Option Description
sftp SFTP.
scp SCP.
Option Description
Option Description
sftp SFTP.
scp SCP.
config shell-commands
Option Description
action Action to take for SSH shell command matches. option - block
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Policies which can override the 'default' for specific ISL/ICL/FortiLink interface.
config switch-controller auto-config custom
Description: Policies which can override the 'default' for specific ISL/ICL/FortiLink
interface.
edit <name>
set name {string}
config switch-binding
Description: Switch binding list.
edit <switch-id>
set switch-id {string}
set policy {string}
next
end
next
end
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Policy definitions which can define the behavior on auto configured interfaces.
config switch-controller auto-config policy
Description: Policy definitions which can define the behavior on auto configured
interfaces.
edit <name>
set igmp-flood-report [enable|disable]
set igmp-flood-traffic [enable|disable]
set name {string}
set poe-status [enable|disable]
set qos-policy {string}
set storm-control-policy {string}
next
end
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Configure the FortiGate switch controller to send custom commands to managed FortiSwitch devices.
config switch-controller custom-command
Description: Configure the FortiGate switch controller to send custom commands to
managed FortiSwitch devices.
edit <command-name>
set command {var-string}
set command-name {string}
set description {string}
next
end
This command is available for model(s): FortiGate 40F 3G4G, FortiGate 60F, FortiGate 80F
Bypass, FortiGate 80F, FortiGate 81F, FortiGateRugged 60F 3G4G, FortiGateRugged 60F.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
400E, FortiGate 401E, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F-POE, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F,
FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
This command is available for model(s): FortiGate 40F 3G4G, FortiGate 60F, FortiGate 80F
Bypass, FortiGate 80F, FortiGate 81F, FortiGateRugged 60F 3G4G, FortiGateRugged 60F.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
400E, FortiGate 401E, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F-POE, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F,
FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
This command is available for model(s): FortiGate 40F 3G4G, FortiGate 60F, FortiGate 80F
Bypass, FortiGate 80F, FortiGate 81F, FortiGateRugged 60F 3G4G, FortiGateRugged 60F.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
400E, FortiGate 401E, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F-POE, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F,
FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
This command is available for model(s): FortiGate 40F 3G4G, FortiGate 60F, FortiGate 80F
Bypass, FortiGate 80F, FortiGate 81F, FortiGateRugged 60F 3G4G, FortiGateRugged 60F.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
400E, FortiGate 401E, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F-POE, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F,
FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
DSL policy.
config switch-controller dsl policy
Description: DSL policy.
edit <name>
set append_padding [disable|enable]
set cpe-aele [disable|enable]
set cpe-aele-mode [ELE_M0|ELE_DS|...]
set cs {option1}, {option2}, ...
set ds-bitswap [disable|enable]
set name {string}
set pause-frame [disable|enable]
set profile [auto-30a|auto-17a|...]
set type {option}
set us-bitswap [disable|enable]
next
end
Option Description
disable Disable.
enable Enable.
Option Description
disable Disable.
enable Enable.
Option Description
Option Description
Option Description
disable Disable.
enable Enable.
Option Description
disable Disable.
enable Enable.
Option Description
Option Description
Proscend Proscend.
Option Description
disable Disable.
enable Enable.
This command is available for model(s): FortiGate 40F 3G4G, FortiGate 60F, FortiGate 80F
Bypass, FortiGate 80F, FortiGate 81F, FortiGateRugged 60F 3G4G, FortiGateRugged 60F.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
400E, FortiGate 401E, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F-POE, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F,
FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
This command is available for model(s): FortiGate 40F 3G4G, FortiGate 60F, FortiGate 80F
Bypass, FortiGate 80F, FortiGate 81F, FortiGateRugged 60F 3G4G, FortiGateRugged 60F.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
400E, FortiGate 401E, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F-POE, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F,
FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
This command is available for model(s): FortiGate 40F 3G4G, FortiGate 60F, FortiGate 80F
Bypass, FortiGate 80F, FortiGate 81F, FortiGateRugged 60F 3G4G, FortiGateRugged 60F.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
400E, FortiGate 401E, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F-POE, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F,
FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
This command is available for model(s): FortiGate 40F 3G4G, FortiGate 60F, FortiGate 80F
Bypass, FortiGate 80F, FortiGate 81F, FortiGateRugged 60F 3G4G, FortiGateRugged 60F.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
400E, FortiGate 401E, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F-POE, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F,
FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Configure Dynamic port policy to be applied on the managed FortiSwitch ports through DPP device.
config switch-controller dynamic-port-policy
Description: Configure Dynamic port policy to be applied on the managed FortiSwitch
ports through DPP device.
edit <name>
set description {string}
set fortilink {string}
set name {string}
config policy
Description: Port policies with matching criteria and actions.
edit <name>
set name {string}
set description {string}
set status [enable|disable]
set category [device|interface-tag]
set interface-tags <tag-name1>, <tag-name2>, ...
set mac {string}
set hw-vendor {string}
set type {string}
set family {string}
set host {string}
set lldp-profile {string}
set qos-policy {string}
set 802-1x {string}
set vlan-policy {string}
set bounce-port-link [disable|enable]
next
end
fortilink FortiLink interface for which this Dynamic port policy string Not
belongs to. Specified
config policy
Option Description
Option Description
interface-tags Match policy based on the FortiSwitch interface object string Maximum
<tag-name> tags. length: 63
FortiSwitch port tag name.
lldp-profile LLDP profile to be applied when using this policy. string Not
Specified
qos-policy QoS policy to be applied when using this policy. string Not
Specified
802-1x 802.1x security policy to be applied when using this string Not
policy. Specified
vlan-policy VLAN policy to be applied when using this policy. string Not
Specified
Option Description
disable Disable bouncing (administratively bring the link down, up) of a switch port
where this policy is applied.
enable Enable bouncing (administratively bring the link down, up) of a switch port
where this policy is applied.
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
max-export- Configure flow max export packet size. integer Minimum value: 512
pkt-size 512 Maximum
value: 9216
sample-mode Configure sample mode for the flow tracking. option - perimeter
Option Description
local Set local mode which samples on the specific switch port.
perimeter Set perimeter mode which samples on all switch fabric ports and fortilink port
at the ingress.
device-ingress Set device -ingress mode which samples across all switch ports at the ingress.
sample-rate Configure sample rate for the perimeter and integer Minimum value: 512
device-ingress sampling. 0 Maximum
value: 99999
timeout- Configure flow session general timeout. integer Minimum value: 3600
general 60 Maximum
value: 604800
timeout-icmp Configure flow session ICMP timeout. integer Minimum value: 300
60 Maximum
value: 604800
timeout-max Configure flow session max timeout. integer Minimum value: 604800
60 Maximum
value: 604800
timeout-tcp Configure flow session TCP timeout. integer Minimum value: 3600
60 Maximum
value: 604800
timeout-tcp- Configure flow session TCP FIN timeout. integer Minimum value: 300
fin 60 Maximum
value: 604800
timeout-tcp- Configure flow session TCP RST timeout. integer Minimum value: 120
rst 60 Maximum
value: 604800
timeout-udp Configure flow session UDP timeout. integer Minimum value: 300
60 Maximum
value: 604800
Option Description
config aggregates
ip IP address to group all matching traffic sessions to a ipv4- Not Specified 0.0.0.0
flow. classnet 0.0.0.0
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
link-down- Clear NAC and dynamic devices on switch ports on link option - enable
flush down event.
Option Description
disable Disable clearing NAC and dynamic devices on a switch port when link down
event happens.
enable Enable clearing NAC and dynamic devices on a switch port when link down
event happens.
config nac-ports
onboarding- Default NAC Onboarding VLAN when NAC devices are string Not
vlan discovered. Specified
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
disable Disable bouncing (administratively bring the link down, up) of a switch port
where a quarantined device was seen last.
enable Enable bouncing (administratively bring the link down, up) of a switch port
where a quarantined device was seen last.
default-virtual- Default VLAN for ports when added to the virtual- string Not Specified
switch-vlan switch.
Option Description
Option Description
Option Description
Option Description
Option Description
mac-aging- Time after which an inactive MAC is aged out. integer Minimum 300
interval value: 10
Maximum
value:
1000000
Option Description
Option Description
by-redirect Quarantined device traffic is redirected only to the FortiGate on the received
VLAN.
Option Description
enable Enable DNS resolution of the FortiSwitch unit's IP address by use of its serial
number.
disable Disable DNS resolution of the FortiSwitch unit's IP address by use of its serial
number.
update-user- Control which sources update the device user list. option - mac-cache
device lldp dhcp-
snooping l2-
db l3-db
Option Description
dhcp-snooping Update from FortiSwitch DHCP snooping client and server databases.
Option Description
Option Description
config custom-command
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
query-interval Maximum time after which IGMP query will be sent. integer Minimum 125
value: 10
Maximum
value: 1200
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
default-vlan Default VLAN (native) assigned to all switch ports string Not _default
upon discovery. Specified
nac-segment VLAN for NAC segment primary interface. string Not nac_segment
Specified
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config custom-tlvs
config med-location-service
Option Description
Option Description
enable Transmit this TLV if a VLAN has been addded to the port.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
tx-hold Number of tx-intervals before local LLDP data expires. integer Minimum 4
Packet TTL is tx-hold * tx-interval. value: 1
Maximum
value: 16
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
config address-civic
country The two-letter ISO 3166 country code in capital ASCII string Not
letters eg. US, CA, DK, DE. Specified
config coordinates
altitude Plus or minus floating point number. For example, string Not
117.47. Specified
Option Description
Option Description
latitude Floating point starting with +/- or ending with (N or S). string Not
For example, +/-16.67 or 16.67N. Specified
longitude Floating point starting with +/- or ending with (N or S). string Not
For example, +/-26.789 or 26.789E. Specified
config elin-number
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Configure MAC policy to be applied on the managed FortiSwitch devices through NAC device.
config switch-controller mac-policy
Description: Configure MAC policy to be applied on the managed FortiSwitch devices
through NAC device.
edit <name>
set bounce-port-link [disable|enable]
set count [disable|enable]
set description {string}
set fortilink {string}
set name {string}
set traffic-policy {string}
set vlan {string}
next
end
Option Description
disable Disable bouncing (administratively bring the link down, up) of a switch port
where this mac-policy is applied.
enable Enable bouncing (administratively bring the link down, up) of a switch port
where this mac-policy is applied.
Option Description
fortilink FortiLink interface for which this MAC policy belongs to. string Not
Specified
traffic-policy Traffic policy to be applied when using this MAC policy. string Not
Specified
vlan Ingress traffic VLAN assignment for the MAC address string Not
matching this MAC policy. Specified
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
global Use global setting for DHCP snooping server access list.
enable Override global setting and enable DHCP server access list.
disable Override global setting and disable DHCP server access list.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config 802-1X-settings
Option Description
Option Description
config custom-command
config igmp-snooping
Option Description
aging-time Maximum time to retain a multicast snooping entry for integer Minimum 300
which no packets have been seen. value: 15
Maximum
value: 3600
Option Description
proxy IGMP snooping proxy for the VLAN interface. option - global
Option Description
global Use global setting for IGMP snooping proxy on VLAN interface.
querier Enable/disable IGMP snooping querier for the VLAN option - disable
interface.
Option Description
config ip-source-guard
config binding-entry
config mirror
Option Description
Option Description
config ports
Option Description
1000full 1G full-duplex
auto Auto-negotiation.
Option Description
Option Description
Option Description
Option Description
bandwidth Member selection based on largest total bandwidth of links of similar speed.
Option Description
Option Description
Option Description
Option Description
Option Description
matched-dpp- Matched child policy in the dynamic port string Not Specified
policy policy.
matched-dpp- Matched interface tags in the dynamic port string Not Specified
intf-tags policy.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
both Enable flow control for both transmission and receive pause control frames.
Option Description
75% Back pressure state won't be cleared until bucket count falls below 75% of
pause threshold.
50% Back pressure state won't be cleared until bucket count falls below 50% of
pause threshold.
25% Back pressure state won't be cleared until bucket count falls below 25% of
pause threshold.
Option Description
port-policy Switch controller dynamic port policy from string Not Specified
available options.
qos-policy Switch controller QoS policy from available string Not Specified default
options.
storm-control- Switch controller storm control policy from string Not Specified default
policy available options.
Option Description
Option Description
Option Description
Option Description
mode LACP mode: ignore and do not send control option - static
messages, or negotiate 802.3ad aggregation
passively or actively.
Option Description
static Static aggregation, do not send and ignore any control messages.
Option Description
Option Description
Option Description
Option Description
config remote-log
Option Description
Option Description
Option Description
Option Description
Option Description
config snmp-community
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config hosts
config snmp-sysinfo
Option Description
config snmp-trap-threshold
config snmp-user
Option Description
Option Description
Option Description
Option Description
Option Description
config storm-control
Option Description
rate Rate in packets per second at which storm traffic is integer Minimum 500
controlled. Storm control drops excess traffic data rates value: 1
beyond this threshold. Maximum
value:
10000000
Option Description
Option Description
Option Description
config stp-instance
Option Description
0 0.
4096 4096.
8192 8192.
12288 12288.
16384 16384.
20480 20480.
24576 24576.
28672 28672.
32768 32768.
36864 36864.
40960 40960.
45056 45056.
49152 49152.
53248 53248.
Option Description
57344 57344.
61440 61440.
config stp-settings
local-override Enable to configure local STP settings that override option - disable
global STP settings.
Option Description
hello-time Period of time between successive STP frame Bridge integer Minimum 2
Protocol Data Units. value: 1
Maximum
value: 10
forward-time Period of time a port is in listening and learning state. integer Minimum 15
value: 4
Maximum
value: 30
max-age Maximum time before a bridge port saves its integer Minimum 20
configuration BPDU information. value: 6
Maximum
value: 40
max-hops Maximum number of hops between the root bridge and integer Minimum 20
the furthest bridge. value: 1
Maximum
value: 40
local-override Enable to configure local logging settings that override option - disable
global logging settings.
Option Description
Option Description
severity Severity of FortiSwitch logs that are added to the option - notification
FortiGate event log.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
config map
Option Description
EF DSCP EF.
Option Description
Option Description
flash Flash.
immediate Immediate.
priority Priority.
routine Routine.
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
config cos-queue
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
auth-fail-vlan Enable to allow limited access to clients that cannot option - disable
authenticate.
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable the capability to apply the EAP/MAB frame VLAN to the port native
VLAN.
enable Enable the capability to apply the EAP/MAB frame VLAN to the port native
VLAN.
guest-vlan Enable the guest VLAN feature to allow limited access option - disable
to non-802.1X-compliant clients.
Option Description
Option Description
Option Description
Option Description
radius- Enable to override the global RADIUS session timeout. option - disable
timeout-
overwrite
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Configure allowaccess list for mgmt and internal interfaces on managed FortiSwitch units.
internal- Allowed access on the switch internal interface. option - https ping
allowaccess ssh
Option Description
mgmt- Allowed access on the switch management interface. option - https ping
allowaccess ssh
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
enable Enable storm control for broadcast traffic to drop packets which exceed
configured rate limits.
disable Disable storm control for broadcast traffic to allow all packets.
rate Threshold rate in packets per second at which storm integer Minimum 500
traffic is controlled in override mode. value: 0
Maximum
value:
10000000
Option Description
override Override global and switch level storm control to use port level configuration.
disabled Disable storm control on the port entirely overriding global and switch level
storm control.
Option Description
enable Enable storm control for unknown multicast traffic to drop packets which
exceed configured rate limits.
disable Disable storm control for unknown multicast traffic to allow all packets.
Option Description
enable Enable storm control for unknown unicast traffic to drop packets which exceed
configured rate limits.
disable Disable storm control for unknown unicast traffic to allow all packets.
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
rate Rate in packets per second at which storm traffic is integer Minimum 500
controlled. Storm control drops excess traffic data rates value: 1
beyond this threshold. Maximum
value:
10000000
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
forward-time Period of time a port is in listening and learning state. integer Minimum 15
value: 4
Maximum
value: 30
hello-time Period of time between successive STP frame Bridge integer Minimum 2
Protocol Data Units. value: 1
Maximum
value: 10
max-age Maximum time before a bridge port expires its integer Minimum 20
configuration BPDU information. value: 6
Maximum
value: 40
max-hops Maximum number of hops between the root bridge and integer Minimum 20
the furthest bridge. value: 1
Maximum
value: 40
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Configure FortiSwitch logging (logs are transferred to and inserted into FortiGate event log).
config switch-controller switch-log
Description: Configure FortiSwitch logging (logs are transferred to and inserted into
FortiGate event log).
set severity [emergency|alert|...]
set status [enable|disable]
end
severity Severity of FortiSwitch logs that are added to the option - notification
FortiGate event log.
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
dynamic- Periodic time interval to run Dynamic port policy integer Minimum 15
periodic- engine. value: 5
interval Maximum
value: 60
iot-holdoff MAC entry's creation time. Time must be greater than integer Minimum 5
this value for an entry to be created. value: 0
Maximum
value:
10080
iot-mac-idle MAC entry's idle time. MAC entry is removed after this integer Minimum 1440
value. value: 0
Maximum
value:
10080
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
guaranteed- Guaranteed burst size in bytes (max value = integer Minimum 45000
burst 4294967295). value: 0
Maximum
value:
4294967295
maximum- Maximum burst size in bytes (max value = integer Minimum 67500
burst 4294967295). value: 0
Maximum
value:
4294967295
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Option Description
config target-ip
config target-mac
config target-port
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 5001E1, FortiGate 5001E.
Configure VLAN policy to be applied on the managed FortiSwitch ports through dynamic-port-policy.
config switch-controller vlan-policy
Description: Configure VLAN policy to be applied on the managed FortiSwitch ports
through dynamic-port-policy.
edit <name>
set allowed-vlans <vlan-name1>, <vlan-name2>, ...
set allowed-vlans-all [enable|disable]
set description {string}
set discard-mode [none|all-untagged|...]
set fortilink {string}
set name {string}
set untagged-vlans <vlan-name1>, <vlan-name2>, ...
set vlan {string}
next
end
allowed-vlans Allowed VLANs to be applied when using this VLAN string Maximum
<vlan- policy. length: 79
name> VLAN name.
allowed- Enable/disable all defined VLANs when using this VLAN option - disable
vlans-all policy.
Option Description
discard-mode Discard mode to be applied when using this VLAN option - none
policy.
Option Description
fortilink FortiLink interface for which this VLAN policy belongs to. string Not
Specified
untagged- Untagged VLANs to be applied when using this VLAN string Maximum
vlans <vlan- policy. length: 79
name> VLAN name.
vlan Native VLAN to be applied when using this VLAN policy. string Not
Specified
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate
5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate 60E
DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E,
FortiGate 61F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass,
FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate VM64.
3G MODEM custom.
config system 3g-modem custom
Description: 3G MODEM custom.
edit <id>
set class-id {user}
set id {integer}
set init-string {string}
set model {string}
set modeswitch-string {string}
set product-id {user}
set vendor {string}
set vendor-id {user}
next
end
class-id USB interface class in hexadecimal format (00-ff). user Not Specified
init-string Init string in hexadecimal format (even length). string Not Specified
modeswitch- USB modeswitch arguments. e.g: '-v 1410 -p 9030 -V string Not Specified
string 1410 -P 9032 -u 3'
Option Description
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
Option Description
none No access.
Option Description
none No access.
Option Description
Option Description
none No access.
vpngrp Administrator access to IPsec, SSL, PPTP, and L2TP option - none
VPN.
Option Description
none No access.
Option Description
none No access.
wifi Administrator access to the WiFi controller and Switch option - none
controller.
Option Description
none No access.
config fwgrp-permission
Option Description
none No access.
Option Description
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
config loggrp-permission
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
config netgrp-permission
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
config sysgrp-permission
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
config utmgrp-permission
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
none No access.
Option Description
Option Description
none No access.
Option Description
none No access.
interface Interface(s) on which the ACME client will listen for string Maximum
<interface- challenges. length: 79
name> Interface name.
source-ip Source IPv4 address used to connect to the ACME ipv4- Not 0.0.0.0
server. address Specified
source-ip6 Source IPv6 address used to connect to the ACME ipv6- Not ::
server. address Specified
config accounts
accprofile Access profile for this administrator. Access profiles string Not
control administrator access to FortiGate features. Specified
Option Description
Option Description
Option Description
Option Description
ip6-trusthost1 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost10 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost2 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost3 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost4 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost5 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost6 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost7 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost8 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
ip6-trusthost9 Any IPv6 address from which the administrator can ipv6-prefix Not ::/0
connect to the FortiGate unit. Default allows access Specified
from any IPv6 address.
Option Description
peer-group Name of peer group defined under config user group string Not
which has PKI members. Used for peer certificate Specified
authentication (for HTTPS admin access).
radius-vdom- Enable to use the names of VDOMs provided by the option - disable
override remote authentication server to control the VDOMs
that this administrator can access.
Option Description
Option Description
remote-group User group name used for remote auth. string Not
Specified
sms-custom- Custom SMS server to send SMS messages to. string Not
server Specified
sms-server Send SMS messages using the FortiGuard SMS option - fortiguard
server or a custom server.
Option Description
ssh-certificate Select the certificate to be used by the FortiGate for string Not
authentication with an SSH client. Specified
trusthost1 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost10 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost2 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost3 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost4 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost5 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost6 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost7 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost8 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
trusthost9 Any IPv4 address or subnet address and netmask ipv4- Not 0.0.0.0
from which the administrator can connect to the classnet Specified 0.0.0.0
FortiGate unit. Default allows access from any IPv4
address.
Option Description
Option Description
Option Description
vdom <name> Virtual domain(s) that the administrator can access. string Maximum
Virtual domain name. length: 79
Option Description
affinity- Affinity setting for VM throughput (64-bit hexadecimal string Not Specified
cpumask value in the format of 0xxxxxxxxxxxxxxxxx).
interface Physical interface name on which to perform packet string Not Specified
redistribution.
rxqid ID of the receive queue (when the interface has integer Minimum 0
multiple queues) on which to perform packet value: 0
redistribution. Maximum
value: 255
affinity- Affinity setting for VM throughput (64-bit hexadecimal string Not Specified
cpumask value in the format of 0xxxxxxxxxxxxxxxxx).
Configure alarm.
config system alarm
Description: Configure alarm.
set audible [enable|disable]
config groups
Description: Alarm groups.
edit <id>
set id {integer}
set period {integer}
set admin-auth-failure-threshold {integer}
set admin-auth-lockout-threshold {integer}
set user-auth-failure-threshold {integer}
set user-auth-lockout-threshold {integer}
set replay-attempt-threshold {integer}
set self-test-failure-threshold {integer}
set log-full-warning-threshold {integer}
set encryption-failure-threshold {integer}
set decryption-failure-threshold {integer}
config fw-policy-violations
Description: Firewall policy violations.
edit <id>
set id {integer}
set threshold {integer}
set src-ip {ipv4-address}
set dst-ip {ipv4-address}
set src-port {integer}
set dst-port {integer}
next
end
set fw-policy-id {integer}
Option Description
Option Description
config groups
Option Description
config trusthost
Option Description
auto-install- Enable/disable auto install the config in USB disk. option - disable
config
Option Description
auto-install- Enable/disable auto install the image in USB disk. option - disable
image
Option Description
default- Default config file name in USB disk. string Not fgt_
config-file Specified system.conf
default- Default image file name in USB disk. string Not image.out
image-file Specified
Option Description
timeout Maximum running time for this script in seconds (0 = no integer Minimum 0
timeout). value: 0
Maximum
value: 300
accprofile Access profile for CLI script action to access string Not
FortiGate features. Specified
Option Description
Option Description
Option Description
Option Description
Option Description
enable CLI script executes on all FortiGate units in the Security Fabric.
disable CLI script executes only on the FortiGate unit that the stitch is triggered.
Option Description
text Plaintext.
Option Description
post POST.
Option Description
put PUT.
get GET.
patch PATCH.
delete DELETE.
minimum- Limit execution to no more than once in this interval integer Minimum 0
interval (in seconds). value: 0
Maximum
value:
2592000
Option Description
http HTTP.
https HTTPS.
Option Description
Option Description
config http-headers
Automation destinations.
config system automation-destination
Description: Automation destinations.
edit <name>
set destination <name1>, <name2>, ...
set ha-group-id {integer}
set name {string}
set type [fortigate|ha-cluster]
next
end
Option Description
Automation stitches.
config system automation-stitch
Description: Automation stitches.
edit <name>
config actions
Description: Configure stitch actions.
edit <id>
set id {integer}
set action {string}
set delay {integer}
set required [enable|disable]
next
end
set description {var-string}
set destination <name1>, <name2>, ...
set name {string}
set status [enable|disable]
set trigger {string}
next
end
Option Description
config actions
Option Description
Option Description
ha-failover HA failover.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sunday Sunday.
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
thursday Thursday.
friday Friday.
saturday Saturday.
config fields
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 2500E, FortiGate 400E Bypass, FortiGate
800D, FortiGate 80F Bypass, FortiGateRugged 60F 3G4G, FortiGateRugged 60F.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2600F, FortiGate 2601F,
FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D,
FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3500F,
FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3800D,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G,
FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E,
FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 80E-POE, FortiGate 80E, FortiGate
80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate
81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F,
FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
auto-recover * Automatically recover from bypass mode after system option - enable
reboot.
Option Description
enable Recover interfaces from bypass mode. The actual mode is determined by
poweron-bypass setting.
Option Description
2 2 second
4 4 second
6 6 second
8 8 second
10 10 second
12 12 second
14 14 second
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
default High strength algorithms and medium-strength 128-bit key length algorithms.
fmg-source-ip IPv4 source address that this FortiGate uses when ipv4- Not 0.0.0.0
communicating with FortiManager. address Specified
fmg-source-ip6 IPv6 source address that this FortiGate uses when ipv6- Not ::
communicating with FortiManager. address Specified
Option Description
Option Description
enable Enable inclusion of public FortiGuard servers in the override server list.
disable Disable inclusion of public FortiGuard servers in the override server list.
Option Description
Option Description
ltefw-upgrade- Schedule next LTE firmware upgrade time (Local string Not
time * Time). Format: YYYY-MM-DD HH:MM:SS Specified
Option Description
backup Manage and configure this FortiGate locally and back up its configuration to
FortiManager.
Option Description
Option Description
Option Description
fortimanager FortiManager.
use-elbc-vdom Enable/disable use of special ELBC config sync VDOM option - disable
* to connect to FortiManager.
Option Description
enable enable
disable disable
vdom Virtual domain (VDOM) name to use when string Not root
communicating with FortiManager. Specified
config server-list
Option Description
Option Description
fqdn FQDN.
System checksum.
config system checksum status
Description: System checksum.
end
Option Description
peerip IP address of the interface on the peer unit that is ipv4- Not Specified 0.0.0.0
used for the session synchronization link. address
peervd VDOM that contains the session synchronization link string Not Specified root
interface on the peer unit. Usually both peers would
have the same peervd.
Option Description
syncvd Sessions from these VDOMs are synchronized using string Maximum
<name> this session synchronization configuration. length: 79
VDOM name.
config session-sync-filter
srcintf Only sessions from this interface are synchronized. You string Not
can only enter one interface name. To synchronize Specified
sessions for multiple source interfaces, add multiple
filters.
dstintf Only sessions to this interface are synchronized. You string Not
can only enter one interface name. To synchronize Specified
sessions to multiple destination interfaces, add multiple
filters.
srcaddr Only sessions from this IPv4 address are synchronized. ipv4- Not 0.0.0.0
You can only enter one address. To synchronize classnet- Specified 0.0.0.0
sessions from multiple source addresses, add multiple any
filters.
dstaddr Only sessions to this IPv4 address are synchronized. ipv4- Not 0.0.0.0
You can only enter one address. To synchronize classnet- Specified 0.0.0.0
sessions for multiple destination addresses, add any
multiple filters.
srcaddr6 Only sessions from this IPv6 address are synchronized. ipv6- Not ::/0
You can only enter one address. To synchronize network Specified
sessions from multiple source addresses, add multiple
filters.
dstaddr6 Only sessions to this IPv6 address are synchronized. ipv6- Not ::/0
You can only enter one address. To synchronize network Specified
sessions for multiple destination addresses, add
multiple filters.
config custom-service
src-port-range Custom service source port range. user Not Specified 0-0
dst-port-range Custom service destination port range. user Not Specified 0-0
Configure console.
config system console
Description: Configure console.
set baudrate [9600|19200|...]
set fortiexplorer [enable|disable]
set login [enable|disable]
set mode [batch|line]
set output [standard|more]
end
Option Description
9600 9600
19200 19200
38400 38400
57600 57600
115200 115200
Option Description
Option Description
Option Description
Option Description
Add this FortiGate to a Security Fabric or set up a new Security Fabric on this FortiGate.
config system csf
Description: Add this FortiGate to a Security Fabric or set up a new Security Fabric on
this FortiGate.
set accept-auth-by-cert [disable|enable]
set authorization-request-type [serial|certificate]
set certificate {string}
set configuration-sync [default|local]
set downstream-access [enable|disable]
set downstream-accprofile {string}
config fabric-connector
Description: Fabric connector configuration.
edit <serial>
set serial {string}
set accprofile {string}
set configuration-write-access [enable|disable]
next
end
config fabric-device
Description: Fabric device configuration.
edit <name>
set name {string}
set device-ip {ipv4-address}
set https-port {integer}
set access-token {varlen_password}
next
end
set fabric-object-unification [default|local]
set fabric-workers {integer}
set forticloud-account-enforcement [enable|disable]
set group-name {string}
set group-password {password}
accept-auth-by- Accept connections with unknown certificates and ask option - enable
cert admin for approval.
Option Description
Option Description
Option Description
Option Description
enable Enable downstream device access to this device's configuration and data.
disable Disable downstream device access to this device's configuration and data.
downstream- Default access profile for requests from downstream string Not
accprofile devices. Specified
Option Description
local Global CMDB objects will not be synchronized to and from this device.
Option Description
Option Description
Option Description
Option Description
upstream-port The port number to use to communicate with the integer Minimum 8013
FortiGate upstream from this FortiGate in the Security value: 1
Fabric. Maximum
value:
65535
config fabric-connector
Option Description
config trusted-list
Option Description
Option Description
Option Description
Configure DDNS.
config system ddns
Description: Configure DDNS.
edit <ddnsid>
set addr-type [ipv4|ipv6]
set bound-ip {string}
set clear-text [disable|enable]
set ddns-auth [disable|tsig]
set ddns-domain {string}
set ddns-key {password_aes256}
set ddns-keyname {string}
set ddns-password {password}
set ddns-server [dyndns.org|dyns.net|...]
set ddns-server-addr <addr1>, <addr2>, ...
Option Description
Option Description
Option Description
ddns-domain Your fully qualified domain name. For string Not Specified
example, yourname.ddns.com.
Option Description
dyns.net www.dyns.net
tzo.com rh.tzo.com
dipdns.net dipdnsserver.dipdns.com
now.net.cn ip.todayisp.com
dhs.org members.dhs.org
easydns.com members.easydns.com
noip.com dynupdate.no-ip.com
ddns-zone Zone of your domain name (for example, string Not Specified
DDNS.com).
Option Description
ssl-certificate Name of local certificate for SSL connections. string Not Specified Fortinet_
Factory
Option Description
default- Default gateway for dedicated management interface. ipv4- Not 0.0.0.0
gateway address Specified
Option Description
Option Description
Option Description
dns-service Options for assigning DNS servers to DHCPv6 clients. option - specify
Option Description
Option Description
domain Domain name suffix for the IP addresses that the string Not Specified
DHCP server assigns to clients.
interface DHCP server can assign IP configurations to clients string Not Specified
connected to this interface.
Option Description
Option Description
Option Description
Option Description
subnet Subnet or subnet-id if the IP mode is delegated. ipv6-prefix Not Specified ::/0
upstream- Interface name from where delegated information is string Not Specified
interface provided.
config ip-range
config prefix-range
Option Description
Option Description
auto-managed- Enable/disable use of this DHCP server once this option - enable
status interface has been assigned an IP address from
FortiIPAM.
Option Description
disable Disable use of this DHCP server once this interface has been assigned an IP
address from FortiIPAM.
enable Enable use of this DHCP server once this interface has been assigned an IP
address from FortiIPAM.
Option Description
Option Description
Option Description
ddns-zone Zone of your domain name (ex. DDNS.com). string Not Specified
default- Default gateway IP address assigned by the DHCP ipv4-address Not Specified 0.0.0.0
gateway server.
Option Description
Option Description
local IP address of the interface the DHCP server is added to becomes the client's
DNS server IP address.
domain Domain name suffix for the IP addresses that the string Not Specified
DHCP server assigns to clients.
filename Name of the boot file on the TFTP server. string Not Specified
Option Description
Option Description
ipsec-lease- DHCP over IPsec leases expire this many seconds integer Minimum 60
hold after tunnel down (0 to disable forced-expiry). value: 0
Maximum
value:
8640000
mac-acl- MAC access control default action (allow or block option - assign
default-action assigning IP settings).
Option Description
assign Allow the DHCP server to assign IP settings to clients on the MAC access
control list.
block Block the DHCP server from assigning IP settings to clients on the MAC
access control list.
netmask Netmask assigned by the DHCP server. ipv4-netmask Not Specified 0.0.0.0
next-server IP address of a server (for example, a TFTP sever) ipv4-address Not Specified 0.0.0.0
that DHCP clients can download a boot file from.
Option Description
local IP address of the interface the DHCP server is added to becomes the client's
NTP server IP address.
Option Description
Option Description
Option Description
02 (GMT-10:00) Hawaii
03 (GMT-9:00) Alaska
05 (GMT-7:00) Arizona
Option Description
10 (GMT-6:00) Saskatchewan
74 (GMT-4:00) Caracas
77 (GMT-4:00) Georgetown
15 (GMT-4:00) La Paz
87 (GMT-4:00) Paraguay
16 (GMT-3:00) Santiago
17 (GMT-3:30) Newfoundland
18 (GMT-3:00) Brasilia
75 (GMT-3:00) Uruguay
21 (GMT-2:00) Mid-Atlantic
22 (GMT-1:00) Azores
24 (GMT) Monrovia
79 (GMT) Casablanca
78 (GMT+1:00) Namibia
Option Description
32 (GMT+2:00) Bucharest
33 (GMT+2:00) Cairo
36 (GMT+2:00) Jerusalem
37 (GMT+3:00) Baghdad
83 (GMT+3:00) Moscow
84 (GMT+3:00) Minsk
40 (GMT+3:00) Nairobi
85 (GMT+3:00) Istanbul
41 (GMT+3:30) Tehran
43 (GMT+4:00) Baku
44 (GMT+4:30) Kabul
48 (GMT+5:45) Kathmandu
45 (GMT+5:00) Ekaterinburg
52 (GMT+6:30) Rangoon
54 (GMT+7:00) Krasnoyarsk
Option Description
58 (GMT+8:00) Perth
59 (GMT+8:00) Taipei
62 (GMT+9:30) Adelaide
63 (GMT+9:30) Darwin
61 (GMT+9:00) Yakutsk
64 (GMT+10:00) Brisbane
67 (GMT+10:00) Hobart
68 (GMT+10:00) Vladivostok
69 (GMT+10:00) Magadan
73 (GMT+13:00) Nuku'alofa
86 (GMT+13:00) Samoa
76 (GMT+14:00) Kiritimati
timezone- Options for the DHCP server to set the client's time option - disable
option zone.
Option Description
Option Description
Option Description
local IP address of the interface the DHCP server is added to becomes the client's
WiFi Access Controller IP address.
wifi-ac1 WiFi Access Controller 1 IP address (DHCP option ipv4-address Not Specified 0.0.0.0
138, RFC 5417).
wifi-ac2 WiFi Access Controller 2 IP address (DHCP option ipv4-address Not Specified 0.0.0.0
138, RFC 5417).
wifi-ac3 WiFi Access Controller 3 IP address (DHCP option ipv4-address Not Specified 0.0.0.0
138, RFC 5417).
config exclude-range
config options
Option Description
Option Description
mac MAC address of the client that will get the mac- Not Specified 00:00:00:00:00:00
reserved IP address. address
Option Description
assign Configure the client with this MAC address like any other client.
block Block the DHCP server from assigning IP settings to the client with this MAC
address.
reserved Assign the reserved IP address to the client with this MAC address.
Option Description
circuit-id Option 82 circuit-ID of the client that will get string Not Specified
the reserved IP address.
Option Description
remote-id Option 82 remote-ID of the client that will get string Not Specified
the reserved IP address.
This command is available for model(s): FortiGateRugged 60F 3G4G, FortiGateRugged 60F.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate
4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate
500E, FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E
DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F,
FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
Option Description
Option Description
Option Description
Option Description
Option Description
contact Email address of the administrator for this zone. You string Not Specified host
can specify only the username, such as admin or the
full email address, such as [email protected] When
using only a username, the domain of the email will
be this zone.
ip-primary IP address of primary DNS server. Entries in this ipv4- Not Specified 0.0.0.0
primary DNS server and imported into the DNS address-
zone. any
primary-name Domain name of the default DNS server for this string Not Specified dns
zone.
source-ip Source IP for forwarding to DNS server. ipv4- Not Specified 0.0.0.0
address
Option Description
ttl Default time-to-live value for the entries of this DNS integer Minimum 86400
zone. value: 0
Maximum
value:
2147483647
Option Description
secondary Secondary DNS zone, to import entries from other DNS zones.
view Zone view (public to serve public clients, shadow to option - shadow
serve internal clients).
Option Description
config dns-entry
Option Description
Option Description
A Host type.
Option Description
Option Description
Configure DNS.
config system dns
Description: Configure DNS.
set alt-primary {ipv4-address}
set alt-secondary {ipv4-address}
set cache-notfound-responses [disable|enable]
set dns-cache-limit {integer}
set dns-cache-ttl {integer}
set domain <domain1>, <domain2>, ...
set interface {string}
set interface-select-method [auto|sdwan|...]
set ip6-primary {ipv6-address}
set ip6-secondary {ipv6-address}
set log [disable|error|...]
set primary {ipv4-address}
set protocol {option1}, {option2}, ...
set retry {integer}
set secondary {ipv4-address}
set server-hostname <hostname1>, <hostname2>, ...
set server-select-method [least-rtt|failover]
set source-ip {ipv4-address}
set ssl-certificate {string}
set timeout {integer}
end
alt-primary Alternate primary DNS server. This is not used as a ipv4- Not Specified 0.0.0.0
failover DNS server. address
alt-secondary Alternate secondary DNS server. This is not used ipv4- Not Specified 0.0.0.0
as a failover DNS server. address
cache- Enable/disable response from the DNS server when option - disable
notfound- a record is not in cache.
responses
Option Description
dns-cache-limit Maximum number of records in the DNS cache. integer Minimum 5000
value: 0
Maximum
value:
4294967295
dns-cache-ttl Duration in seconds that the DNS cache retains integer Minimum 1800
information. value: 60
Maximum
value: 86400
Option Description
Option Description
disable Disable.
Option Description
Option Description
source-ip IP address used by the DNS server as its source IP. ipv4- Not Specified 0.0.0.0
address
ssl-certificate Name of local certificate for SSL connections. string Not Specified Fortinet_
Factory
Configure DNS64.
config system dns64
Description: Configure DNS64.
set always-synthesize-aaaa-record [enable|disable]
set dns64-prefix {ipv6-prefix}
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 40F 3G4G, FortiGate 60E DSLJ, FortiGate
60E DSL, FortiGate 60F, FortiGate 80F Bypass, FortiGate 80F, FortiGate 81F,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 60E DSL.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
400E, FortiGate 401E, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F,
FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E-POE, FortiGate 60E, FortiGate 61E, FortiGate
61F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F-POE, FortiGate 81E-
POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 900D, FortiGate 90E, FortiGate 91E,
FortiGate VM64, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi
61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE,
FortiWiFi 81F 2R.
status of DSL
config system dsl status
Description: status of DSL
end
Option Description
Option Description
Option Description
forticontroller FortiController.
dual- Dual-FortiController.
forticontroller
Configure the email server used by the FortiGate various things. For example, for sending email messages to users to
support user authentication features.
config system email-server
Description: Configure the email server used by the FortiGate various things. For
example, for sending email messages to users to support user authentication features.
set authenticate [enable|disable]
set interface {string}
set interface-select-method [auto|sdwan|...]
set password {password}
set port {integer}
set reply-to {string}
set security [none|starttls|...]
set server {string}
set source-ip {ipv4-address}
set source-ip6 {ipv6-address}
set ssl-min-proto-version [default|SSLv3|...]
set type {option}
set username {string}
set validate-server [enable|disable]
end
Option Description
Option Description
Option Description
none None.
starttls STARTTLS.
smtps SSL/TLS.
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
Option Description
Option Description
full Check server certificate and verify the domain matches in the server
certificate.
source-ip Source IPv4 address used to communicate with ipv4- Not 0.0.0.0
server. address Specified
Option Description
Option Description
Option Description
none No failure.
version- An image matching the device and version could not be found.
unavailable
next-path- The index of the next image to upgrade to. integer Minimum 0
index value: 0
Maximum
value: 10
Option Description
Option Description
device- The image downloads are complete, but one or more devices have
disconnected disconnected.
cancelled The upgrade was cancelled due to the tree not being ready.
config node-list
Option Description
time Scheduled time for the upgrade. Format hh:mm user Not
yyyy/mm/dd UTC. Specified
setup-time When the upgrade was configured. Format hh:mm user Not
yyyy/mm/dd UTC. Specified
Option Description
coordinating- Serial number of the FortiGate unit that controls this string Not
fortigate device. Specified
Option Description
Option Description
Option Description
FortiAnalyzer Connectivity.
config system fortianalyzer-connectivity
Description: FortiAnalyzer Connectivity.
end
Option Description
Option Description
antispam- Interval of time between license checks for the integer Minimum 4294967295
license FortiGuard antispam contract. value: 0
Maximum
value:
4294967295
anycast-sdns- IP address of the FortiGuard anycast DNS rating ipv4- Not Specified 0.0.0.0
server-ip server. address
anycast-sdns- Port to connect to on the FortiGuard anycast DNS integer Minimum 853
server-port rating server. value: 1
Maximum
value: 65535
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
outbreak- Interval of time between license checks for integer Minimum 4294967295
prevention- FortiGuard Virus Outbreak Prevention contract. value: 0
license Maximum
value:
4294967295
Option Description
Option Description
Option Description
proxy-server- Port used to communicate with the proxy server. integer Minimum 0
port value: 0
Maximum
value: 65535
Option Description
include-question- Include DNS question section in the FortiGuard DNS setup message.
section
sdns-server- IP address of the FortiGuard DNS rating server. user Not Specified
ip
source-ip Source IPv4 address used to communicate with ipv4- Not Specified 0.0.0.0
FortiGuard. address
source-ip6 Source IPv6 address used to communicate with ipv6- Not Specified ::
FortiGuard. address
Option Description
Option Description
Option Description
Option Description
Option Description
videofilter- Interval of time between license checks for the integer Minimum 4294967295
license FortiGuard video filter contract. value: 0
Maximum
value:
4294967295
Option Description
webfilter- Time-to-live for web filter cache entries in integer Minimum 3600
cache-ttl seconds. value: 300
Maximum
value: 86400
Option Description
webfilter- Interval of time between license checks for the integer Minimum 4294967295
license FortiGuard web filter contract. value: 0
Maximum
value:
4294967295
Configure FortiNDR.
config system fortindr
Description: Configure FortiNDR.
set interface {string}
set interface-select-method [auto|sdwan|...]
set source-ip {string}
set status [disable|enable]
end
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Configure FortiSandbox.
config system fortisandbox
Description: Configure FortiSandbox.
set email {string}
set enc-algorithm [default|high|...]
set forticloud [enable|disable]
set interface {string}
set interface-select-method [auto|sdwan|...]
set server {string}
set source-ip {string}
set ssl-min-proto-version [default|SSLv3|...]
set status [enable|disable]
end
enc-algorithm Configure the level of SSL protection for secure option - default
communication with FortiSandbox.
Option Description
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
Option Description
server-cert Name of the server certificate to be used for SSL. string Not Fortinet_
Specified Factory
server-ip IPv4 address of FortiToken Mobile push services server ipv4- Not 0.0.0.0
(format: xxx.xxx.xxx.xxx). address Specified
server-port Port to communicate with FortiToken Mobile push integer Minimum 4433
services server. value: 1
Maximum
value:
65535
Option Description
ip-version IP version to use for the GENEVE interface and so for option - ipv4-unicast
communication over the GENEVE. IPv4 or IPv6
unicast.
Option Description
remote-ip IPv4 address of the GENEVE interface on the device at ipv4- Not 0.0.0.0
the remote end of the GENEVE. address Specified
remote-ip6 IPv6 IP address of the GENEVE interface on the device ipv6- Not ::
at the remote end of the GENEVE. address Specified
Option Description
Configure geographical location mapping for IP address(es) to override mappings from FortiGuard.
config system geoip-override
Description: Configure geographical location mapping for IP address(es) to override
mappings from FortiGuard.
edit <name>
set country-id {string}
set description {string}
config ip-range
Description: Table of IP ranges assigned to country.
edit <id>
set id {integer}
set start-ip {ipv4-address}
set end-ip {ipv4-address}
next
end
config ip6-range
Description: Table of IPv6 ranges assigned to country.
edit <id>
set id {integer}
set start-ip {ipv6-address}
set end-ip {ipv6-address}
next
end
set name {string}
next
end
config ip-range
start-ip Starting IP address, inclusive, of the address range ipv4- Not 0.0.0.0
(format: xxx.xxx.xxx.xxx). address Specified
end-ip Ending IP address, inclusive, of the address range ipv4- Not 0.0.0.0
(format: xxx.xxx.xxx.xxx). address Specified
config ip6-range
Option Description
Option Description
Option Description
enable Admin users must provide a valid certificate when PKI is enabled for
HTTPS admin access.
Option Description
Option Description
DHE Ban the use of cipher suites using authenticated ephemeral DH key
agreement.
ECDHE Ban the use of cipher suites using authenticated ephemeral ECDH key
agreement.
AES Ban the use of cipher suites using either 128 or 256 bit AES.
Option Description
AESGCM Ban the use of cipher suites using AES in Galois Counter Mode (GCM).
CAMELLIA Ban the use of cipher suites using either 128 or 256 bit CAMELLIA.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
pass Bypass the antivirus system when memory is low. Antivirus scanning
resumes when the low memory condition is resolved.
off Stop accepting new AV sessions when entering conserve mode, but
continue to process current active sessions.
Option Description
Option Description
Option Description
revert Manually save config and revert the config when timeout.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable early TCP NPU session in order to guarantee packet order of 3-
way handshake.
disable Disable early TCP NPU session in order to guarantee packet order of 3-
way handshake.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
yyyy/MM/dd Year/Month/Day.
dd/MM/yyyy Day/Month/Year.
MM/dd/yyyy Month/Day/Year.
Option Description
yyyy-MM-dd Year-Month-Day.
dd-MM-yyyy Day-Month-Year.
MM-dd-yyyy Month-Day-Year.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
auto auto
Option Description
mini Small sized Internet Service database with very limited IP addresses.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
english English.
french French.
spanish Spanish.
portuguese Portuguese.
japanese Japanese.
korean Korean.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable use of the admin-sport setting for the management port.
disable Disable use of the admin-sport setting for the management port.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
traffic Proxy re-authentication timeout begins after traffic has not been
received.
absolute Proxy re-authentication timeout begins when the user was first created.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable detection of those special format files when using Data Leak
Protection.
enable Enable detection of those special format files when using Data Leak
Protection.
Option Description
Option Description
Option Description
sunday Sunday
monday Monday
tuesday Tuesday
wednesday Wednesday
thursday Thursday
Option Description
friday Friday
saturday Saturday
Option Description
chacha20- [email protected]
[email protected]
aes128-ctr aes128-ctr
aes192-ctr aes192-ctr
aes256-ctr aes256-ctr
arcfour256 arcfour256
arcfour128 arcfour128
aes128-cbc aes128-cbc
3des-cbc 3des-cbc
blowfish-cbc blowfish-cbc
cast128-cbc cast128-cbc
aes192-cbc aes192-cbc
aes256-cbc aes256-cbc
arcfour arcfour
[email protected] [email protected]
aes128- [email protected]
[email protected]
aes256- [email protected]
[email protected]
Option Description
diffie-hellman- diffie-hellman-group1-sha1
group1-sha1
diffie-hellman- diffie-hellman-group14-sha1
group14-sha1
diffie-hellman-group- diffie-hellman-group-exchange-sha1
exchange-sha1
diffie-hellman-group- diffie-hellman-group-exchange-sha256
exchange-sha256
curve25519- [email protected]
[email protected]
ecdh-sha2-nistp256 ecdh-sha2-nistp256
ecdh-sha2-nistp384 ecdh-sha2-nistp384
ecdh-sha2-nistp521 ecdh-sha2-nistp521
Option Description
hmac-md5 hmac-md5
hmac-md5- [email protected]
[email protected]
hmac-md5-96 hmac-md5-96
hmac-md5-96- [email protected]
[email protected]
hmac-sha1 hmac-sha1
hmac-sha1- [email protected]
[email protected]
hmac-sha2-256 hmac-sha2-256
hmac-sha2-256- [email protected]
[email protected]
hmac-sha2-512 hmac-sha2-512
Option Description
hmac-sha2-512- [email protected]
[email protected]
hmac-ripemd160 hmac-ripemd160
hmac- [email protected]
[email protected]
hmac-ripemd160- [email protected]
[email protected]
[email protected] [email protected]
[email protected] [email protected]
umac-64- [email protected]
[email protected]
umac-128- [email protected]
[email protected]
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
TLSv1-3 TLSv1.3.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
02 (GMT-10:00) Hawaii
03 (GMT-9:00) Alaska
05 (GMT-7:00) Arizona
10 (GMT-6:00) Saskatchewan
74 (GMT-4:00) Caracas
77 (GMT-4:00) Georgetown
15 (GMT-4:00) La Paz
87 (GMT-4:00) Paraguay
16 (GMT-3:00) Santiago
17 (GMT-3:30) Newfoundland
18 (GMT-3:00) Brasilia
Option Description
75 (GMT-3:00) Uruguay
21 (GMT-2:00) Mid-Atlantic
22 (GMT-1:00) Azores
24 (GMT) Monrovia
79 (GMT) Casablanca
78 (GMT+1:00) Namibia
32 (GMT+2:00) Bucharest
33 (GMT+2:00) Cairo
36 (GMT+2:00) Jerusalem
37 (GMT+3:00) Baghdad
83 (GMT+3:00) Moscow
84 (GMT+3:00) Minsk
40 (GMT+3:00) Nairobi
85 (GMT+3:00) Istanbul
41 (GMT+3:30) Tehran
43 (GMT+4:00) Baku
Option Description
44 (GMT+4:30) Kabul
48 (GMT+5:45) Kathmandu
45 (GMT+5:00) Ekaterinburg
52 (GMT+6:30) Rangoon
54 (GMT+7:00) Krasnoyarsk
58 (GMT+8:00) Perth
59 (GMT+8:00) Taipei
62 (GMT+9:30) Adelaide
63 (GMT+9:30) Darwin
61 (GMT+9:00) Yakutsk
64 (GMT+10:00) Brisbane
67 (GMT+10:00) Hobart
68 (GMT+10:00) Vladivostok
69 (GMT+10:00) Magadan
Option Description
73 (GMT+13:00) Nuku'alofa
86 (GMT+13:00) Samoa
76 (GMT+14:00) Kiritimati
Option Description
tos IP TOS.
Option Description
Option Description
Option Description
restricted Send ARPs for the first 8192 addresses in VIP range.
Option Description
Option Description
Option Description
Option Description
wireless-controller- Port used for the control integer Minimum value: 5246
port channel in wireless 1024 Maximum
controller mode. value: 49150
Option Description
Option Description
Option Description
Option Description
Option Description
diffservcode DiffServ setting to be applied to GRE tunnel outer IP user Not Specified
header.
Option Description
Option Description
key-inbound * Require received GRE packets contain this key. integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
Option Description
Option Description
Configure HA monitor.
config system ha-monitor
Description: Configure HA monitor.
set monitor-vlan [enable|disable]
set vlan-hb-interval {integer}
set vlan-hb-lost-threshold {integer}
end
Option Description
config system ha
Configure HA.
config system ha
Description: Configure HA.
set arps {integer}
set arps-interval {integer}
set authentication [enable|disable]
set cpu-threshold {user}
config system ha
Option Description
cpu-threshold Dynamic weighted load balancing CPU usage user Not Specified
weight and high and low thresholds.
Option Description
ftp-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of FTP proxy sessions.
Option Description
group-name Cluster group name. Must be the same for all string Not Specified
members.
Option Description
enable Enable using ha-mgmt interface for syslog, SNMP, remote authentication
(RADIUS), FortiAnalyzer, FortiSandbox, sFlow, and Netflow.
disable Disable using ha-mgmt interface for syslog, SNMP, remote authentication
(RADIUS), FortiAnalyzer, FortiSandbox, sFlow, and Netflow.
ha-eth-type HA heartbeat packet Ethertype (4-digit hex). string Not Specified 8890
Option Description
ha-uptime-diff- Normally you would only reduce this value for integer Minimum 300
margin failover testing. value: 1
Maximum
value: 65535
Option Description
hbdev Heartbeat interfaces. Must be the same for all user Not Specified
members. Enter <interface> <priority> pairs to
specify the priority of each heartbeat interface.
Higher priority takes precedence.
hello-holddown Time to wait before changing from hello to work integer Minimum 20
state. value: 5
Maximum
value: 300
http-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of HTTP proxy sessions.
imap-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of IMAP proxy sessions.
l2ep-eth-type Telnet session HA heartbeat packet Ethertype string Not Specified 8893
(4-digit hex).
link-failed-signal Enable to shut down all interfaces for 1 sec after option - disable
a failover. Use if gratuitous ARPs do not update
network.
Option Description
Option Description
Option Description
Option Description
Option Description
mode HA mode. Must be the same for all members. option - standalone
FGSP requires standalone.
Option Description
monitor Interfaces to check for port monitoring (or link user Not Specified
failure).
nntp-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of NNTP proxy sessions.
override Enable and increase the priority of the unit that option - disable
should always be primary.
Option Description
password Cluster password. Must be the same for all password Not Specified
members.
Option Description
pop3-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of POP3 proxy sessions.
priority Increase the priority to select the primary unit. integer Minimum 128
value: 0
Maximum
value: 255
route-ttl TTL for primary unit routes. Increase to maintain integer Minimum 10
active routes during failover. value: 5
Maximum
value: 3600
route-wait Time to wait before sending new routes to the integer Minimum 0
cluster. value: 0
Maximum
value: 3600
schedule Type of A-A load balancing. Use none if you option - round-robin
have external load balancers.
Option Description
none None.
hub Hub.
random Random.
ip IP.
ipport IP port.
Option Description
Option Description
Option Description
Option Description
Option Description
smtp-proxy- Dynamic weighted load balancing weight and user Not Specified
threshold high and low number of SMTP proxy sessions.
Option Description
Option Description
Option Description
Option Description
Option Description
unicast-gateway Default route gateway for unicast interface. ipv4- Not Specified 0.0.0.0
* address
Option Description
Option Description
Option Description
Option Description
weight Weighted round robin weight for each cluster user Not Specified 0 40
unit. Syntax <priority> <weight>.
config ha-mgmt-interfaces
dst Default route destination for reserved HA ipv4- Not Specified 0.0.0.0
management interface. classnet 0.0.0.0
gateway Default route gateway for reserved HA management ipv4- Not Specified 0.0.0.0
interface. address
gateway6 Default IPv6 gateway for reserved HA management ipv6- Not Specified ::
interface. address
config secondary-vcluster
override Enable and increase the priority of the unit that should option - enable
always be primary.
Option Description
priority Increase the priority to select the primary unit. integer Minimum 128
value: 0
Maximum
value: 255
monitor Interfaces to check for port monitoring (or link failure). user Not
Specified
pingserver- Enable to force the cluster to negotiate after a remote IP option - enable
secondary- monitoring failover.
force-reset
Option Description
config unicast-peers
Option Description
dh-keypair- Number of key pairs to pre-generate for each Diffie- integer Minimum 100 **
count Hellman group (per-worker). value: 0
Maximum
value:
50000
Option Description
Option Description
Option Description
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-14
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-15
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-16
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-17
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-19
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-2
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-20
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-21
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-28
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-29
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-30
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-31
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
config dh-group-5
Option Description
keypair-cache Configure custom key pair cache size for this Diffie- option - global
Hellman group.
Option Description
keypair-count Number of key pairs to pre-generate for this Diffie- integer Minimum 0
Hellman group (per-worker). value: 0
Maximum
value:
50000
Configure interfaces.
config system interface
Description: Configure interfaces.
edit <name>
set ac-name {string}
set aggregate {string}
set algorithm [L2|L3|...]
set alias {string}
set allowaccess {option1}, {option2}, ...
set ap-discover [enable|disable]
set arpforward [enable|disable]
set atm-protocol [none|ipoa]
set auth-cert {string}
set auth-portal-addr {string}
set auth-type [auto|pap|...]
set auto-auth-extension-device [enable|disable]
set bandwidth-measure-time {integer}
set bfd [global|enable|...]
set bfd-desired-min-tx {integer}
set bfd-detect-mult {integer}
set bfd-required-min-rx {integer}
set broadcast-forward [enable|disable]
set cli-conn-status {integer}
config client-options
Option Description
Option Description
alias Alias will be displayed with the interface string Not Specified
name to make it easier to distinguish.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ping PING.
detectserver Gateway's ping server for this IP. user Not Specified
Option Description
Option Description
Option Description
enable Enable addition of classless static routes retrieved from DHCP server.
disable Disable addition of classless static routes retrieved from DHCP server.
Option Description
Option Description
Option Description
Option Description
disable None.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable.
cos0 CoS 0.
cos1 CoS 1.
cos2 CoS 2.
cos3 CoS 3.
cos4 CoS 4.
cos5 CoS 5.
cos6 CoS 6.
cos7 CoS 7.
Option Description
Option Description
Option Description
Option Description
soft-restart Soft-restart-on-extender.
hard-restart Hard-restart-on-extender.
reboot Reboot-on-extender.
Option Description
link-failed-signal Link-failed-signal.
link-down Link-down.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
none none
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable Disable.
cos0 CoS 0.
cos1 CoS 1.
cos2 CoS 2.
cos3 CoS 3.
cos4 CoS 4.
cos5 CoS 5.
Option Description
cos6 CoS 6.
cos7 CoS 7.
ip Interface IPv4 address and subnet mask, ipv4- Not Specified 0.0.0.0 0.0.0.0
syntax: X.X.X.X/24. classnet-
host
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
static Use static aggregation, do not send and ignore any LACP messages.
Option Description
Option Description
vdom Use VDOM Link Layer Discovery Protocol (LLDP) reception configuration
setting.
Option Description
macaddr Change the interface's MAC address. mac- Not Specified 00:00:00:00:00:00 **
address
Option Description
Option Description
management-ip High Availability in-band management IP ipv4- Not Specified 0.0.0.0 0.0.0.0
address of this interface. classnet-
host
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
vc-encaps VC encapsulation.
Option Description
Option Description
Option Description
Option Description
vdsl VDSL.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
priority-adjust Enable STP negotiation on HA secondary and make priority lower than HA
primary.
Option Description
Option Description
Option Description
substitute-dst- Destination MAC address that all mac- Not Specified 00:00:00:00:00:00
mac packets are sent to from this interface. address
Option Description
Option Description
enable Block FortiSwitch port-to-port traffic on the VLAN, only permitting traffic to
and from the FortiGate.
Option Description
Option Description
Option Description
Option Description
enable Enable DHCP snooping verify source MAC for FortiSwitch devices.
disable Disable DHCP snooping verify source MAC for FortiSwitch devices.
Option Description
default-vlan Default VLAN (native) assigned to all switch ports upon discovery.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
switch-controller- Switch controller traffic policy for the string Not Specified
traffic-policy * VLAN.
system-id Define a system ID for the aggregate mac- Not Specified 00:00:00:00:00:00
interface. address
Option Description
Option Description
Option Description
trust-ip-1 Trusted host for dedicated management ipv4- Not Specified 0.0.0.0 0.0.0.0
traffic (0.0.0.0/24 for all hosts). classnet-
any
trust-ip-2 Trusted host for dedicated management ipv4- Not Specified 0.0.0.0 0.0.0.0
traffic (0.0.0.0/24 for all hosts). classnet-
any
trust-ip-3 Trusted host for dedicated management ipv4- Not Specified 0.0.0.0 0.0.0.0
traffic (0.0.0.0/24 for all hosts). classnet-
any
trust-ip6-1 Trusted IPv6 host for dedicated ipv6-prefix Not Specified ::/0
management traffic (::/0 for all hosts).
trust-ip6-2 Trusted IPv6 host for dedicated ipv6-prefix Not Specified ::/0
management traffic (::/0 for all hosts).
trust-ip6-3 Trusted IPv6 host for dedicated ipv6-prefix Not Specified ::/0
management traffic (::/0 for all hosts).
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
weight Default weight for static routes (if route integer Minimum 0
has no weight configured). value: 0
Maximum
value: 255
Option Description
allow Allow.
deny Deny.
Option Description
Option Description
PSK PSK.
radius RADIUS.
Option Description
Option Description
Option Description
Option Description
TKIP TKIP.
AES AES.
Option Description
Option Description
open Open.
wep64 WEP64.
wep128 WEP128.
wifi-ssid * IEEE 802.11 Service Set Identifier. string Not Specified fortinet
config client-options
Option Description
config dhcp-snooping-server-list
config egress-queues
config ipv6
Option Description
Option Description
Option Description
ip6-address Primary IPv6 address prefix. Syntax: ipv6-prefix Not Specified ::/0
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx/xxx.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
dhcp6 Use delegated prefix from a DHCPv6 client to form a delegated IPv6 address.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config ip6-extra-addr
config ip6-prefix-list
Option Description
Option Description
config ip6-delegated-prefix-list
upstream- Name of the interface that provides delegated string Not Specified
interface information.
Option Description
Option Description
Option Description
config dhcp6-iapd-list
prefix-hint DHCPv6 prefix that will be used as a hint to the ipv6- Not Specified ::/0
upstream DHCPv6 server. network
prefix-hint-plt DHCPv6 prefix hint preferred life time (sec), 0 means integer Minimum 604800
unlimited lease time. value: 0
Maximum
value:
4294967295
prefix-hint-vlt DHCPv6 prefix hint valid life time (sec). integer Minimum 2592000
value: 0
Maximum
value:
4294967295
config vrrp6
Option Description
Option Description
Option Description
config l2tp-client-settings
Option Description
Option Description
Option Description
Option Description
detectserver Gateway's ping server for this IP. user Not Specified
Option Description
ping PING.
config tagging
config vrrp
Option Description
2 VRRP version 2.
3 VRRP version 3.
Option Description
Option Description
vrdst-priority Priority of the virtual router when the virtual router integer Minimum 0
destination becomes unreachable. value: 0
Maximum
value: 254
Option Description
Option Description
config proxy-arp
config wifi-mac-list
config wifi-networks
wifi-ssid IEEE 802.11 Service Set Identifier. string Not Specified fortinet
Option Description
open Open.
wep64 WEP64.
wep128 WEP128.
Option Description
TKIP TKIP.
AES AES.
pool-subnet Configure IPAM pool subnet, Class A - Class B ipv4- Not 172.31.0.0
subnet. classnet Specified 255.255.0.0
Option Description
fabric-root Use the IPAM server running on the Security Fabric root.
Option Description
Configure IP in IP Tunneling.
config system ipip-tunnel
Description: Configure IP in IP Tunneling.
edit <name>
set auto-asic-offload [enable|disable]
set interface {string}
set local-gw {ipv4-address-any}
set name {string}
set remote-gw {ipv4-address}
set use-sdwan [disable|enable]
next
end
Option Description
interface Interface name that is associated with the incoming string Not
traffic from available options. Specified
local-gw IPv4 address for the local gateway. ipv4- Not 0.0.0.0
address- Specified
any
remote-gw IPv4 address for the remote gateway. ipv4- Not 0.0.0.0
address Specified
Option Description
Option Description
status Enable/disable using this DNS server for IPS URL filter option - enable
DNS queries.
Option Description
enable Enable this DNS server for IPS URL filter DNS queries.
disable Disable this DNS server for IPS URL filter DNS queries.
status Enable/disable this server for IPv6 DNS queries. option - enable
Option Description
Option Description
enable Allow the signatures specified by IDs to be triggered even if they are on hold.
signature- Time to hold and monitor IPS signatures. Format user Not 0h
hold-time <#d##h>. Specified
Option Description
interface Select the associated interface name from string Not Specified
available options.
Option Description
Option Description
This command is available for model(s): FortiGate 1200D, FortiGate 1500DT, FortiGate
1500D, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate
3200D, FortiGate 3700D, FortiGate 400E, FortiGate 401E, FortiGate 800D.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E,
FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3300E, FortiGate 3301E,
FortiGate 3400E, FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E,
FortiGate 3601E, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate
4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate
501E, FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate
60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 80E-POE,
FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-
POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E,
FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
Option Description
Option Description
1k-bytes 1K bytes.
2k-bytes 2K bytes.
4k-bytes 4K bytes.
8k-bytes 8K bytes.
Option Description
half-packet One burst unit equals two time slots in which one packet is sent.
1-packet 1 packet.
2-packets 2 packets.
4-packets 4 packets.
16-packets 16 packets.
65-packets 65 packets.
Option Description
diffservcode Differentiated services code point (DSCP) in the IP user Not Specified
header of the probe packet.
gateway-ip Gateway IP address used to probe the server. ipv4- Not Specified 0.0.0.0
address-
any
gateway-ip6 Gateway IPv6 address used to probe the server. ipv6- Not Specified ::
address
http-agent String in the http-agent field in the HTTP header. string Not Specified Chrome/
Safari/
http-get If you are monitoring an HTML server you can send string Not Specified /
an HTTP-GET request with a custom string. Use this
option to define the string.
http-match String that you expect to see in the HTTP-GET string Not Specified
requests of the traffic to be monitored.
port Port number of the traffic to be used to monitor the integer Minimum 0
server. value: 1
Maximum
value: 65535
probe-count Number of most recent probes that should be used integer Minimum 30
to calculate latency and jitter. value: 5
Maximum
value: 30
probe-timeout Time to wait before a probe packet is considered integer Minimum 500
lost. value: 500
Maximum
value: 5000
Option Description
Option Description
Option Description
service- Only use monitor to read quality values. If enabled, option - disable
detection static routes and cascade interfaces will not be
updated.
Option Description
source-ip Source IP address used in packet to the server. ipv4- Not Specified 0.0.0.0
address-
any
source-ip6 Source IPv6 address used in packet to the server. ipv6- Not Specified ::
address
srcintf Interface that receives the traffic to be monitored. string Not Specified
Option Description
Option Description
Option Description
Option Description
config server-list
Option Description
port Port number of the traffic to be used to monitor the integer Minimum 0
server. value: 1
Maximum
value:
65535
config guest
Option Description
Option Description
config guest-voice-signaling
Option Description
Option Description
config softphone
Option Description
Option Description
Option Description
Option Description
config video-conferencing
Option Description
Option Description
config video-signaling
Option Description
Option Description
config voice
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate
5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate 60E
DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E,
FortiGate 61F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass,
FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate VM64.
allow-modify- Allow FortiGate to modify the wireless WAN interface option - enable
mtu-size * MTU size.
Option Description
allow-modify- Allow FortiGate to modify the wireless profile table if option - enable
wireless- the internal LTE modem is running the GENERIC
profile-table * modem firmware.
Option Description
apn Login APN string for PDP-IP packet data calls. string Not
Specified
authtype Authentication type for PDP-IP packet data calls. option - none
Option Description
Option Description
band- Bitmaps for the allowed 3G and LTE bands.Ex: string Not
restrictions * 0000000000000000-0000000000001008 (3G Mask- Specified
LTE Mask)
connection- Set connection-based SIM card hot swap time option - 5-minutes
hot-swap * interval.
Option Description
5-minutes Perform SIM card hot swap if current card is not able to connect for 5 minutes.
10-minutes Perform SIM card hot swap if current card is not able to connect for 10
minutes.
data-limit * LTE Modem data limit mega bytes, 0 for unlimited integer Minimum 0
data. value: 0
Maximum
value:
100000
Option Description
extra-init Extra initialization string for USB LTE/WIMAX devices. string Not
Specified
force- Force to use wireless profile index , 0 if don't force. integer Minimum 0
wireless- value: 0
profile * Maximum
value: 16
Option Description
Option Description
interface The interface that the modem is acting as a redundant string Not
interface for. Specified
Option Description
Option Description
redundant Redundant modem operation mode where the modem is used as a backup
interface.
Option Description
lte LTE
Option Description
passwd Authentication password for PDP-IP packet data calls. password Not
Specified
sim-hot-swap Enable/disable SIM card auto detection and hot swap. option - enable
*
Option Description
sim-slot * SIM card slot. 1: right slot. 2: left slot. integer Minimum 1
value: 1
Maximum
value: 2
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Configure Mobile tunnels, an implementation of Network Mobility (NEMO) extensions for Mobile IPv4 RFC5177.
config system mobile-tunnel
Description: Configure Mobile tunnels, an implementation of Network Mobility (NEMO)
extensions for Mobile IPv4 RFC5177.
edit <name>
set hash-algorithm {option}
set home-address {ipv4-address}
set home-agent {ipv4-address}
set lifetime {integer}
set n-mhae-key {password_aes256}
set n-mhae-key-type [ascii|base64]
set n-mhae-spi {integer}
set name {string}
config network
Description: NEMO network configuration.
edit <id>
set id {integer}
set interface {string}
set prefix {ipv4-classnet}
next
end
set reg-interval {integer}
set reg-retry {integer}
set renew-interval {integer}
set roaming-interface {string}
set status [disable|enable]
set tunnel-mode {option}
next
end
Option Description
home-agent IPv4 address of the NEMO HA (Format: ipv4-address Not Specified 0.0.0.0
xxx.xxx.xxx.xxx).
Option Description
roaming- Select the associated interface name from available string Not Specified
interface options.
Option Description
Option Description
config network
interface Select the associated interface name from available string Not Specified
options.
prefix Class IP and Netmask with correction ipv4- Not Specified 0.0.0.0
(Format:xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx or classnet 0.0.0.0
xxx.xxx.xxx.xxx/x).
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate
5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate 60E
DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E,
FortiGate 61F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass,
FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate VM64.
Configure MODEM.
config system modem
Description: Configure MODEM.
set action [dial|stop|...]
set altmode [enable|disable]
set authtype1 {option1}, {option2}, ...
set authtype2 {option1}, {option2}, ...
set authtype3 {option1}, {option2}, ...
set auto-dial [enable|disable]
set connect-timeout {integer}
set dial-cmd1 {string}
set dial-cmd2 {string}
set dial-cmd3 {string}
set dial-on-demand [enable|disable]
set distance {integer}
set dont-send-CR1 [enable|disable]
set dont-send-CR2 [enable|disable]
set dont-send-CR3 [enable|disable]
set extra-init1 {string}
set extra-init2 {string}
set extra-init3 {string}
set holddown-timer {integer}
set idle-timer {integer}
set interface {string}
set lockdown-lac {string}
set mode [standalone|redundant]
set network-init {string}
set passwd1 {password}
Option Description
none No action.
Option Description
Option Description
pap PAP
Option Description
chap CHAP
mschap MSCHAP
mschapv2 MSCHAPv2
Option Description
pap PAP
chap CHAP
mschap MSCHAP
mschapv2 MSCHAPv2
Option Description
pap PAP
chap CHAP
mschap MSCHAP
mschapv2 MSCHAPv2
Option Description
dial-cmd1 Dial command (this is often an ATD or ATDT string Not Specified
command).
dial-cmd2 Dial command (this is often an ATD or ATDT string Not Specified
command).
dial-cmd3 Dial command (this is often an ATD or ATDT string Not Specified
command).
dial-on- Enable/disable to dial the modem when packets are option - disable
demand routed to the modem interface.
Option Description
Option Description
Option Description
Option Description
lockdown-lac Allow connection only to the specified Location string Not Specified
Area Code (LAC).
Option Description
standalone Standalone.
passwd1 Password to access the specified dialup account. password Not Specified
passwd2 Password to access the specified dialup account. password Not Specified
passwd3 Password to access the specified dialup account. password Not Specified
Option Description
Option Description
Option Description
phone1 Phone number to connect to the dialup account string Not Specified
(must not contain spaces, and should include
standard special characters).
phone2 Phone number to connect to the dialup account string Not Specified
(must not contain spaces, and should include
standard special characters).
phone3 Phone number to connect to the dialup account string Not Specified
(must not contain spaces, and should include
standard special characters).
Option Description
Option Description
Option Description
Option Description
none Forever.
1 One attempt.
2 Two attempts.
3 Three attempts.
4 Four attempts.
5 Five attempts.
6 Six attempts.
7 Seven attempts.
8 Eight attempts.
9 Nine attempts.
10 Ten attempts.
Option Description
Option Description
username1 User name to access the specified dialup account. string Not Specified
username2 User name to access the specified dialup account. string Not Specified
username3 User name to access the specified dialup account. string Not Specified
wireless-port Enter wireless port number, 0 for default, 1 for first integer Minimum 0
port, ... value: 0
Maximum
value:
4294967295
Option Description
Configure NetFlow.
config system netflow
Description: Configure NetFlow.
set active-flow-timeout {integer}
set collector-ip {ipv4-address}
set collector-port {integer}
set inactive-flow-timeout {integer}
set interface {string}
set interface-select-method [auto|sdwan|...]
set source-ip {ipv4-address}
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
source-ip Source IP address for communication with the NetFlow ipv4- Not 0.0.0.0
agent. address Specified
template-tx- Timeout for periodic template flowset transmission. integer Minimum 1800
timeout value: 60
Maximum
value:
86400
Option Description
Option Description
Option Description
hostname- Limit of the number of hostname table entries. integer Minimum 5000
limit value: 0
Maximum
value:
50000
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E, FortiGate 2200E,
FortiGate 2201E, FortiGate 2500E, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3800D,
FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E,
FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E,
FortiGate 601E, FortiGate 800D, FortiGate 900D.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E,
FortiGate 101F, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F,
FortiGate 200E, FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2600F, FortiGate
2601F, FortiGate 3500F, FortiGate 3501F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 60E DSLJ, FortiGate
60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F,
FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate
80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 90E,
FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
fastpath Enable/disable NP4 or NP6 offloading (also called fast option - enable
path).
Option Description
Option Description
Option Description
global-hash- Hash outbound SA traffic among all NPs with more weights on NPs connected
weighted to switch 0. It's applicable to the case that ingress traffic is from switch 1.
ipsec- Enable/disable hash function for IPsec outbound traffic. option - disable
outbound-
hash *
Option Description
Option Description
Option Description
traffic-log-only Per-session accounting only for sessions with traffic logging enabled in firewall
policy.
session- {disable | enable} Toggle between using fixed or random option - disable
timeout-fixed timeouts for refreshing NP6 sessions.
Option Description
enable Enable Refresh NP6 sessions randomly where the time between refreshes is
within the random range.
session- Set the fixed timeout for refreshing NP6 sessions. integer Minimum 40
timeout- value: 0
interval Maximum
value: 1000
session- Set the random timeout range for refreshing NP6 integer Minimum 8
timeout- sessions. value: 0
random-range Maximum
value: 1000
config fp-anomaly
tcp-syn-fin TCP SYN flood SYN/FIN flag set anomalies. option - allow
Option Description
tcp-fin-noack TCP SYN flood with FIN flag set without ACK setting option - trap-to-host
anomalies.
Option Description
allow Allow TCP packets with FIN flag set without ack setting to pass.
drop Drop TCP packets with FIN flag set without ack setting.
trap-to-host Forward TCP packets with FIN flag set without ack setting to FortiOS.
tcp-fin-only TCP SYN flood with only FIN flag set anomalies. option - trap-to-host
Option Description
allow Allow TCP packets with FIN flag set only to pass.
trap-to-host Forward TCP packets with FIN flag set only to FortiOS.
tcp-no-flag TCP SYN flood with no flag set anomalies. option - allow
Option Description
Option Description
tcp-syn-data TCP SYN flood packets with data anomalies. option - allow
Option Description
Option Description
Option Description
Option Description
Option Description
icmp-frag Layer 3 fragmented packets that could be part of layer option - allow
4 ICMP anomalies.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow IPv4 with strict source record route option to pass.
trap-to-host Forward IPv4 with strict source record route option to FortiOS.
Option Description
allow Allow IPv4 with loose source record route option to pass.
trap-to-host Forward IPv4 with loose source record route option to FortiOS.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
trap-to-host Forward IPv4 invalid TCP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid UDP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid ICMP checksum to main CPU for processing.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow IPv6 with network service access point address option to pass.
drop Drop IPv6 with network service access point address option.
trap-to-host Forward IPv6 with network service access point address option to FortiOS.
Option Description
Option Description
tcpsyn-ack- Maximum TCP carries SYN and ACK flags packet integer Minimum 600000
max rate. value: 1000
Maximum
value:
1000000000
tcpfin-rst-max Maximum TCP carries FIN or RST flags packet rate. integer Minimum 600000
value: 1000
Maximum
value:
1000000000
ip-others-max Maximum IP packet rate for other packets. integer Minimum 200000
value: 1000
Maximum
value:
1000000000
l2-others-max Maximum L2 packet rate for L2 packets that are not integer Minimum 200000
ARP packets. value: 1000
Maximum
value:
1000000000
pri-type-max Maximum overflow rate of priority type traffic. integer Minimum 200000
Includes L2: HA, 802.3ad LACP, heartbeats. L3: value: 1000
OSPF. L4_TCP: BGP. L4_UDP: IKE, SLBC, BFD. Maximum
value:
1000000000
Option Description
This command is available for model(s): FortiGate 100F, FortiGate 101F, FortiGate 200F,
FortiGate 201F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 60F, FortiGate 61F, FortiGate
80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81F-POE, FortiGate 81F,
FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F,
FortiWiFi 60F, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 101E,
FortiGate 1100E, FortiGate 1101E, FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E,
FortiGate 200E, FortiGate 201E, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 4200F, FortiGate 4201F, FortiGate
4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate
501E, FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate
60E-POE, FortiGate 60E, FortiGate 61E, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E,
FortiGate 81E-POE, FortiGate 81E, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate
VM64, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 61E.
Option Description
Option Description
Option Description
Option Description
Option Description
ipsec- Set NP6XLite IPsec throughput msg frequency: 0-- option - disable
throughput- disable 1--32KB 3--64KB ... 0x3fff--256MB 0x7fff--
msg- 512MB 0xffff--1GB.
frequency
Option Description
Option Description
traffic-log-only Per-session accounting only for sessions with traffic logging enabled in firewall
policy.
Option Description
config fp-anomaly
tcp-syn-fin TCP SYN flood SYN/FIN flag set anomalies. option - allow
Option Description
tcp-fin-noack TCP SYN flood with FIN flag set without ACK setting option - trap-to-host
anomalies.
Option Description
allow Allow TCP packets with FIN flag set without ack setting to pass.
drop Drop TCP packets with FIN flag set without ack setting.
trap-to-host Forward TCP packets with FIN flag set without ack setting to FortiOS.
tcp-fin-only TCP SYN flood with only FIN flag set anomalies. option - trap-to-host
Option Description
allow Allow TCP packets with FIN flag set only to pass.
trap-to-host Forward TCP packets with FIN flag set only to FortiOS.
tcp-no-flag TCP SYN flood with no flag set anomalies. option - allow
Option Description
tcp-syn-data TCP SYN flood packets with data anomalies. option - allow
Option Description
Option Description
Option Description
Option Description
Option Description
icmp-frag Layer 3 fragmented packets that could be part of layer option - allow
4 ICMP anomalies.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow IPv4 with strict source record route option to pass.
trap-to-host Forward IPv4 with strict source record route option to FortiOS.
Option Description
allow Allow IPv4 with loose source record route option to pass.
trap-to-host Forward IPv4 with loose source record route option to FortiOS.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
trap-to-host Forward IPv4 invalid TCP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid UDP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid ICMP checksum to main CPU for processing.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow IPv6 with network service access point address option to pass.
drop Drop IPv6 with network service access point address option.
trap-to-host Forward IPv6 with network service access point address option to FortiOS.
Option Description
Option Description
ip-others-max Maximum IP packet rate for other packets. integer Minimum 1000000
value: 10000
Maximum
value:
4000000000
l2-others-max Maximum L2 packet rate for L2 packets that are not integer Minimum 1000000
ARP packets. value: 10000
Maximum
value:
4000000000
Option Description
This command is available for model(s): FortiGate 100F, FortiGate 101F, FortiGate 60F,
FortiGate 61F, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 60F, FortiWiFi
61F.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 101E,
FortiGate 1100E, FortiGate 1101E, FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F, FortiGate 1801F, FortiGate 2000E,
FortiGate 200E, FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate
2201E, FortiGate 2500E, FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate
300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E,
FortiGate 3400E, FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E,
FortiGate 3601E, FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E,
FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1,
FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate
60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 61E, FortiGate
800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE,
FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiWiFi 40F 3G4G,
FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 61E, FortiWiFi 80F 2R, FortiWiFi
81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
prp-port-in Ingress port configured to allow the PRP trailer not string Maximum
<interface- be stripped off when the PRP packets come in. All of length: 35
name> the traffic originating from these ports will always be
sent to the host.
Physical interface name.
prp-port-out Egress port configured to allow the PRP trailer not be string Maximum
<interface- stripped off when the PRP packets go out. length: 35
name> Physical interface name.
This command is available for model(s): FortiGate 1800F, FortiGate 1801F, FortiGate 2600F,
FortiGate 2601F, FortiGate 3500F, FortiGate 3501F, FortiGate 4200F, FortiGate 4201F,
FortiGate 4400F, FortiGate 4401F.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E,
FortiGate 200E, FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate
2201E, FortiGate 2500E, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3800D, FortiGate 3960E,
FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F
3G4G, FortiGate 40F, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E,
FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate
80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate
5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate 60E
DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E,
FortiGate 61F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass,
FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 81F, FortiGate 900D, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi
40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E,
FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE,
FortiWiFi 81F 2R.
It is not available for: FortiGate 90E, FortiGate 91E, FortiGate VM64.
Option Description
dedicated- Enable to dedicate one CPU for GUI and CLI option - disable
management- connections when NPs are busy.
cpu *
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
bi-directional Offload TCP and IP Tunnel sessions in both directions between 10G and
1G interfaces (normal operation).
host-shortcut Only offload TCP and IP Tunnel sessions received by 1G interfaces. Select
if packets are dropped for offloaded traffic between 10G to 1G interfaces.
htab-dedi-queue- Set the number of dedicate queue for hash table integer Minimum 1
nr * messages. value: 1
Maximum
value: 2
Option Description
Option Description
100Mbps 100Mbps.
200Mbps 200Mbps.
300Mbps 300Mbps.
400Mbps 400Mbps.
500Mbps 500Mbps.
600Mbps 600Mbps.
700Mbps 700Mbps.
800Mbps 800Mbps.
900Mbps 900Mbps.
1Gbps 1Gbps.
2Gbps 2Gbps.
4Gbps 4Gbps.
8Gbps 8Gbps.
10Gbps 10Gbps.
Option Description
Option Description
enable Enable NPU offload when doing interface-based traffic shaping according
to the egress-shaping-profile.
disable Disable NPU offload when doing interface-based traffic shaping according
to the egress-shaping-profile.
Option Description
Option Description
enable Enable IP checksum re-calculation for packets with iph.reserved bit set.
disable Disable IP checksum re-calculation for packets with iph.reserved bit set.
Option Description
Option Description
Option Description
rr Round Robin.
Hash Hash.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
traffic-log-only Per-session accounting only for sessions with traffic logging enabled in
firewall policy.
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable internal link failure check and recovery after boot up.
disable Disable internal link failure check and recovery after boot up.
Option Description
Option Description
Option Description
Option Description
Option Description
2G 2Gbps.
4G 4Gbps.
5G 5Gbps.
6G 6Gbps.
Option Description
Option Description
Option Description
Option Description
Option Description
config dsw-dts-profile
profile-id Set NPU DSW DTS profile profile id. integer Minimum 0
value: 1
Maximum
value: 32
Option Description
Option Description
config dsw-queue-dts-profile
Option Description
Option Description
Option Description
Option Description
config fp-anomaly
Option Description
Option Description
trap-to-host Forward IPv4 invalid header version to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid header length to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid packet length to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid TTL field zero to main CPU for processing.
Option Description
Option Description
trap-to-host Forward IPv4 invalid option parsing to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid TCP packet header length to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid TCP packet length to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid TCP packet checksum to main CPU for processing.
udp-plen-err * Invalid IPv4 UDP packet minimum length anomalies. option - drop
Option Description
trap-to-host Forward IPv4 invalid UDP packet minimum length to main CPU for
processing.
udp-hlen-err * Invalid IPv4 UDP packet header length anomalies. option - drop
Option Description
trap-to-host Forward IPv4 invalid UDP header length to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid UDP packet checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid UDP packet length to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid UDP-Lite packet coverage to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid UDP-Lite packet checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid ICMP short packet to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid ICMP checksum to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid ESP short packet to main CPU for processing.
Option Description
trap-to-host Forward IPv4 invalid L4 unknown protocol short packet to main CPU for
processing.
Option Description
Option Description
ipv6-plen- Invalid IPv6 packet payload length zero anomalies. option - drop
zero *
Option Description
trap-to-host Forward IPv6 with invalid packet payload length zero to FortiOS.
Option Description
trap-to-host Forward IPv6 with invalid packet extension header ordering to FortiOS.
ipv6-exthdr- Invalid IPv6 packet chain extension header total length option - drop
len-err * anomalies.
Option Description
drop Drop IPv6 with invalid packet chain extension header total length.
trap-to-host Forward IPv6 with invalid packet chain extension header total length to
FortiOS.
config hpe
all-protocol Maximum packet rate of each host queue except high integer Minimum 400000
priority traffic, set 0 to disable. value: 0
Maximum
value:
32000000
tcpsyn-ack- Maximum TCP carries SYN and ACK flags packet rate. integer Minimum 40000
max value: 1000
Maximum
value:
32000000
tcpfin-rst-max Maximum TCP carries FIN or RST flags packet rate. integer Minimum 40000
value: 1000
Maximum
value:
32000000
ip-others-max Maximum IP packet rate for other packets. integer Minimum 5000
value: 1000
Maximum
value:
32000000
l2-others-max Maximum L2 packet rate for L2 packets that are not integer Minimum 5000
ARP packets. value: 1000
Maximum
value:
32000000
high-priority Maximum packet rate for high priority traffic packets. integer Minimum 400000
value: 1000
Maximum
value:
32000000
enable- Enable/Disable NPU Host Protection Engine (HPE) for option - disable
shaper packet type shaper.
Option Description
config ip-reassembly
Option Description
config isf-np-queues
config profile
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config ip-protocol
config ip-service
config scheduler
Option Description
config port-cpu-map
config port-npu-map
interface Set NPU interface port for NPU group mapping. string Not Specified
config port-path-option
ports-using-npu Set ha/aux ports to handle traffic with NPU (otherise string Maximum
<interface- traffic goes to Intel-NIC and then CPU). length: 15
name> Available interfaces for NPU path.
config priority-protocol
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
source-ip Source IP address for communication to the NTP ipv4- Not Specified 0.0.0.0
server. address
source-ip6 Source IPv6 address for communication to the ipv6- Not Specified ::
NTP server. address
type Use the FortiGuard NTP server or any other option - fortiguard
available NTP Server.
Option Description
config ntpserver
Option Description
Option Description
Option Description
Option Description
disable Disable.
mandatory Mandatory.
optional Optional.
Option Description
disable Disable.
mandatory Mandatory.
optional Optional.
Option Description
disable Disable.
mandatory Mandatory.
optional Optional.
Option Description
Option Description
Option Description
Option Description
Option Description
Configure password policy for locally defined administrator passwords and IPsec VPN pre-shared keys.
config system password-policy
Description: Configure password policy for locally defined administrator passwords and
IPsec VPN pre-shared keys.
set apply-to {option1}, {option2}, ...
set expire-day {integer}
set expire-status [enable|disable]
set min-change-characters {integer}
set min-lower-case-letter {integer}
set min-non-alphanumeric {integer}
set min-number {integer}
set min-upper-case-letter {integer}
set minimum-length {integer}
set reuse-password [enable|disable]
Option Description
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 200F, FortiGate 201F,
FortiGate 2600F, FortiGate 2601F, FortiGate 300E, FortiGate 301E, FortiGate 3500F,
FortiGate 3501F, FortiGate 3800D, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G,
FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F,
FortiGate 61E, FortiGate 61F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass,
FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 81F, FortiGate 90E, FortiGate 91E, FortiGateRugged 60F 3G4G, FortiGateRugged
60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000D, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D,
FortiGate 2000E, FortiGate 200E, FortiGate 201E, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 3000D, FortiGate 3100D, FortiGate 3200D, FortiGate 3300E,
FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 601E,
FortiGate 800D, FortiGate 900D, FortiGate VM64.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
timeout An inactivity timer for a twamp test session. integer Minimum 300
value: 10
Maximum
value: 3600
Option Description
Configure proxy-ARP.
config system proxy-arp
Description: Configure proxy-ARP.
delay- End to end delay detection or peer to peer delay option - E2E
mechanism detection.
Option Description
interface PTP client will reply through this interface. string Not
Specified
Option Description
request- The delay request value is the logarithmic mean interval integer Minimum 1
interval in seconds between the delay request messages sent value: 1
by the slave to the master. Maximum
value: 6
Option Description
Option Description
delay- End to end delay detection or peer to peer delay option - E2E
mechanism detection.
Option Description
Option Description
config admin
Option Description
http HTTP
8bit 8 bit.
Option Description
config alertmail
Option Description
http HTTP
8bit 8 bit.
Option Description
config auth
Option Description
http HTTP
8bit 8 bit.
Option Description
config automation
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config fortiguard-wf
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
config ftp
Option Description
http HTTP
8bit 8 bit.
Option Description
config http
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config icap
Option Description
http HTTP
8bit 8 bit.
Option Description
config mail
Option Description
http HTTP
8bit 8 bit.
Option Description
config nac-quar
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config sslvpn
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
config traffic-quota
Option Description
http HTTP
8bit 8 bit.
Option Description
config utm
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
config webproxy
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
Replacement messages.
config system replacemsg admin
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
set msg-type {string}
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg alertmail
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
set msg-type {string}
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg auth
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
set msg-type {string}
next
end
Option Description
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg automation
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
set msg-type {string}
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg fortiguard-wf
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
set msg-type {string}
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg ftp
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg http
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
set msg-type {string}
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg icap
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
set msg-type {string}
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg mail
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
set msg-type {string}
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg nac-quar
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
set msg-type {string}
next
end
Option Description
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg spam
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
set msg-type {string}
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg sslvpn
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
set msg-type {string}
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg traffic-quota
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg utm
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
set msg-type {string}
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Replacement messages.
config system replacemsg webproxy
Description: Replacement messages.
edit <msg-type>
set buffer {var-string}
set format [none|text|...]
set header [none|http|...]
set msg-type {string}
next
end
Option Description
Option Description
http HTTP
8bit 8 bit.
Option Description
Option Description
default-profile Default profile for new SSO admin. string Not Specified
life Length of the range of time when the assertion is valid integer Minimum 30
(in minutes). value: 0
Maximum
value:
4294967295
Option Description
Option Description
tolerance Tolerance to the range of time when the assertion is integer Minimum 5
valid (in minutes). value: 0
Maximum
value:
4294967295
config service-providers
Option Description
config assertion-attributes
Option Description
api-key IBM cloud API key or service ID API key. password Not
Specified
Option Description
Option Description
Option Description
Option Description
Option Description
server-list <ip> Server address list of the remote SDN connector. string Maximum
IPv4 address. length: 15
Option Description
Option Description
openstack OpenStack.
kubernetes Kubernetes.
Option Description
Option Description
Option Description
config external-ip
config forwarding-rule
config gcp-project-list
config nic
config route
config route
config route-table
config route
Configure redundant Internet connections with multiple outbound links and health-check profiles.
config system sdwan
Description: Configure redundant Internet connections with multiple outbound links and
health-check profiles.
config duplication
Description: Create SD-WAN duplication rule.
edit <id>
set id {integer}
set service-id <id1>, <id2>, ...
set srcaddr <name1>, <name2>, ...
set dstaddr <name1>, <name2>, ...
set srcaddr6 <name1>, <name2>, ...
set dstaddr6 <name1>, <name2>, ...
set srcintf <name1>, <name2>, ...
set dstintf <name1>, <name2>, ...
set service <name1>, <name2>, ...
set packet-duplication [disable|force|...]
set packet-de-duplication [enable|disable]
next
end
set duplication-max-num {integer}
set fail-alert-interfaces <name1>, <name2>, ...
set fail-detect [enable|disable]
config health-check
Description: SD-WAN status checking or health checking. Identify a server on the
Internet and determine how SD-WAN verifies that the FortiGate can communicate with it.
edit <name>
set name {string}
set probe-packets [disable|enable]
set addr-mode [ipv4|ipv6]
set system-dns [disable|enable]
set server {string}
set detect-mode [active|passive|...]
set protocol [ping|tcp-echo|...]
set port {integer}
set quality-measured-method [half-open|half-close]
set security-mode [none|authentication]
set user {string}
set password {password}
set packet-size {integer}
set ha-priority {integer}
Option Description
load-balance- Algorithm or mode to use for load balancing Internet option - source-ip-
mode traffic to SD-WAN members. based
Option Description
source-ip-based Source IP load balancing. All traffic from a source IP is sent to the same
interface.
weight-based Weight-based load balancing. Interfaces with higher weights have higher
priority and get more traffic.
usage-based Usage-based load balancing. All traffic is sent to the first interface on the list.
When the bandwidth on that interface exceeds the spill-over limit new traffic is
sent to the next interface.
source-dest-ip- Source and destination IP load balancing. All traffic from a source IP to a
based destination IP is sent to the same interface.
measured- Volume-based load balancing. Traffic is load balanced based on traffic volume
volume-based (in bytes). More traffic is sent to interfaces with higher volume ratios.
neighbor- Waiting period in seconds when switching from the integer Minimum 0
hold-boot- primary neighbor to the secondary neighbor from the value: 0
time neighbor start.. Maximum
value:
10000000
Option Description
enable Enable hold switching from the secondary neighbor to the primary neighbor.
disable Disable hold switching from the secondary neighbor to the primary neighbor.
neighbor- Waiting period in seconds when switching from the integer Minimum 0
hold-down- secondary neighbor to the primary neighbor when hold- value: 0
time down is disabled.. Maximum
value:
10000000
Option Description
Option Description
config duplication
Option Description
force Duplicate packets across all interface members of the SD-WAN zone.
on-demand Duplicate packets across all interface members of the SD-WAN zone based
on the link quality.
Option Description
config health-check
Option Description
Option Description
Option Description
Option Description
Option Description
tcp-echo Use TCP echo to test the link with the server.
udp-echo Use UDP echo to test the link with the server.
dns Use DNS query to test the link with the server.
tcp-connect Use a full TCP connection to test the link with the server.
Option Description
Option Description
user The user name to access probe server. string Not Specified
Option Description
passive The FTP health-check initiates and establishes the data connection.
port The FTP server initiates and establishes the data connection.
ftp-file Full path and file name on the FTP server string Not Specified
to download for FTP health-check to
probe.
http-get URL used to communicate with the server string Not Specified /
if the protocol if the protocol is HTTP.
http-agent String in the http-agent field in the HTTP string Not Specified Chrome/ Safari/
header.
http-match Response string expected from the server string Not Specified
if the protocol is HTTP.
dns-request- Fully qualified domain name to resolve for string Not Specified www.example.com
domain the DNS probe.
dns-match-ip Response IP expected from DNS server if ipv4- Not Specified 0.0.0.0
the protocol is DNS. address
Option Description
Option Description
sla-fail-log- Time interval in seconds that SLA fail log integer Minimum 0
period messages will be generated. value: 0
Maximum
value: 3600
config sla
config members
gateway The default gateway for this interface. Usually the ipv4- Not Specified 0.0.0.0
default gateway of the Internet service provider that address
this interface is connected to.
source Source IP address used in the health-check packet to ipv4- Not Specified 0.0.0.0
the server. address
source6 Source IPv6 address used in the health-check packet ipv6- Not Specified ::
to the server. address
cost Cost of this interface for services in SLA mode. integer Minimum 0
value: 0
Maximum
value:
4294967295
weight Weight of this interface for weighted load balancing. integer Minimum 1
More traffic is directed to interfaces with higher value: 1
weights. Maximum
value: 255
priority Priority of the interface for IPv4. Used for SD-WAN integer Minimum 1
rules or priority rules. value: 1
Maximum
value: 65535
priority6 Priority of the interface for IPv6. Used for SD-WAN integer Minimum 1024
rules or priority rules. value: 1
Maximum
value: 65535
spillover- Egress spillover threshold for this interface. When integer Minimum 0
threshold this traffic volume threshold is reached, new sessions value: 0
spill over to other interfaces in the SD-WAN. Maximum
value:
16776000
ingress- Ingress spillover threshold for this interface. When integer Minimum 0
spillover- this traffic volume threshold is reached, new sessions value: 0
threshold spill over to other interfaces in the SD-WAN. Maximum
value:
16776000
Option Description
config neighbor
Option Description
Option Description
config service
Option Description
Option Description
mode Control how the SD-WAN rule sets the priority of option - manual
interfaces in the SD-WAN.
Option Description
load-balance Distribute traffic among all available links based on round robin. ADVPN
feature is not supported in the mode.
hash-mode Hash algorithm for selected priority members for option - round-robin
load balance mode.
Option Description
round-robin All traffic are distributed to selected interfaces in equal portions and circular
order.
source-dest-ip- All traffic from a source IP to a destination IP is sent to the same interface.
based
inbandwidth All traffic are distributed to a selected interface with most available
bandwidth for incoming traffic.
outbandwidth All traffic are distributed to a selected interface with most available
bandwidth for outgoing traffic.
bibandwidth All traffic are distributed to a selected interface with most available
bandwidth for both incoming and outgoing traffic.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sla-compare- Method to compare SLA value for SLA mode. option - order
method
Option Description
number Compare SLA value based on the number of satisfied health-check. Limits
health-checks to only configured member interfaces.
Option Description
zone Use the setting that is configured for the members' zone.
cfg-order Members that meet the SLA are selected in the order they are configured.
fib-best-match Members that meet the SLA are selected that match the longest prefix in the
routing table.
Option Description
Option Description
config zone
service-sla- Method of selecting member if more than one meets the option - cfg-order
tie-break SLA.
Option Description
cfg-order Members that meet the SLA are selected in the order they are configured.
fib-best-match Members that meet the SLA are selected that match the longest prefix in the
routing table.
Option Description
ftp FTP.
tftp TFTP.
ras RAS.
h323 H323.
tns TNS.
mms MMS.
sip SIP.
pptp PPTP.
rtsp RTSP.
pmap PMAP.
rsh RSH.
dcerpc DCERPC.
mgcp MGCP.
List session.
config system session-info list
Description: List session.
end
Session statistics.
config system session-info statistics
Description: Session statistics.
end
TTL session.
config system session-info ttl
Description: TTL session.
end
config port
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
bfd-dont- Enable to not enforce verifying the source port of option - disable
enforce-src- BFD Packets.
port
Option Description
Option Description
Option Description
default-voip- Configure how the FortiGate handles VoIP traffic option - proxy-
alg-mode when a policy that accepts the traffic doesn't include based
a VoIP profile.
Option Description
Option Description
device Interface to use for management access for NAT string Not Specified
mode.
Option Description
Option Description
Option Description
Option Description
check-all All sessions affected by a firewall policy change are flushed from the session
table. When new packets are recived they are re-evaluated by stateful
inspection and re-added to the session table.
check-new Estabished sessions for changed firewall policies continue without being
affected by the policy configuration change. New sessions are evaluated
according to the new firewall policy configuration.
check-policy- Sessions are managed individually depending on the firewall policy. Some
option sessions may restart. Some may continue.
Option Description
disable Perform a policy check only the first time the session is received.
gateway Transparent mode IPv4 default gateway IP ipv4- Not Specified 0.0.0.0
address. address
Option Description
Option Description
Option Description
Option Description
Option Description
gui-default- Default columns to display for policy lists on GUI. string Maximum
policy-columns Select column name. length: 79
<name>
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
fortiweb Offload HTTP traffic to FortiWeb for Web Application Firewall inspection.
forticache Offload HTTP traffic to FortiCache for external web caching and WAN
optimization.
Option Description
with-space Format IKE ASN.1 Distinguished Names with spaces between attribute
names and values.
no-space Format IKE ASN.1 Distinguished Names without spaces between attribute
names and values.
Option Description
Option Description
Option Description
ip6 IPv6 address prefix for NAT mode. ipv6-prefix Not Specified ::/0
Option Description
Option Description
global Use the global LLDP reception configuration for this VDOM.
Option Description
global Use the global LLDP transmission configuration for this VDOM.
location-id Local location ID in the form of an IPv4 address. ipv4- Not Specified 0.0.0.0
address
manageip6 Transparent mode IPv6 management IP address ipv6-prefix Not Specified ::/0
and netmask.
Option Description
Option Description
enable Allowing multicast traffic through the FortiGate without creating a multicast
firewall policy.
Option Description
disable Require a multicast policy to allow multicast traffic to pass through the
FortiGate.
Option Description
Option Description
Option Description
Option Description
Option Description
profile-based Application and web-filtering are configured using profiles applied to policy
entries.
Option Description
Option Description
Option Description
sccp-port TCP port the SCCP proxy monitors for SCCP traffic. integer Minimum 2000
value: 0
Maximum
value: 65535
Option Description
Option Description
Option Description
enable Allow SIP session helper to create an expectation for port 5060.
disable Prevent SIP session helper from creating an expectation for port 5060.
Option Description
enable Record the original SIP source IP address when NAT is used.
disable Do not record the original SIP source IP address when NAT is used.
sip-ssl-port * TCP port the SIP proxy monitors for SIP SSL/TLS integer Minimum 5061
traffic. value: 0
Maximum
value: 65535
sip-tcp-port TCP port the SIP proxy monitors for SIP traffic. integer Minimum 5060
value: 1
Maximum
value: 65535
sip-udp-port UDP port the SIP proxy monitors for SIP traffic. integer Minimum 5060
value: 1
Maximum
value: 65535
Option Description
Option Description
Option Description
Option Description
Option Description
v4-ecmp-mode IPv4 Equal-cost multi-path (ECMP) routing and load option - source-ip-
balancing mode. based
Option Description
source-dest-ip- Select next hop based on both source and destination IPs.
based
vpn-stats-log Enable/disable periodic VPN log statistics for one or option - ipsec pptp
more types of VPN. Separate names with a space. l2tp ssl
Option Description
ipsec IPsec.
Option Description
pptp PPTP.
l2tp L2TP.
ssl SSL.
Option Description
Configure sFlow.
config system sflow
Description: Configure sFlow.
set collector-ip {ipv4-address}
set collector-port {integer}
set interface {string}
set interface-select-method [auto|sdwan|...]
set source-ip {ipv4-address}
end
collector-ip IP address of the sFlow collector that sFlow agents ipv4- Not 0.0.0.0
added to interfaces in this VDOM send sFlow address Specified
datagrams to.
collector-port UDP port number used for sending sFlow datagrams. integer Minimum 6343
value: 0
Maximum
value:
65535
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
Option Description
Option Description
This command is available for model(s): FortiGate 1100E, FortiGate 1101E, FortiGate 1800F,
FortiGate 1801F, FortiGate 2600F, FortiGate 2601F, FortiGate 300E, FortiGate 301E,
FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3500F,
FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 4200F, FortiGate 4201F, FortiGate
4400F, FortiGate 4401F, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 601E.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E,
FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 3000D, FortiGate 3100D, FortiGate 3200D, FortiGate 3700D, FortiGate 3800D,
FortiGate 3960E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 5001E1, FortiGate 5001E,
FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F,
FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate
80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E,
FortiGate 81F-POE, FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate
VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi
40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi
80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
channel SMC NTP client will send NTP packets through this integer Minimum 5
channel. value: 1
Maximum
value:
65535
ntpsync Enable/disable setting the FortiGate SMC system time option - disable
by synchronizing with an NTP server.
Option Description
config ntpserver
Configure SMS server for sending SMS messages to support user authentication.
config system sms-server
Description: Configure SMS server for sending SMS messages to support user
authentication.
edit <name>
set mail-server {string}
set name {string}
next
end
Option Description
ha-switch Send a trap after an HA failover when the backup unit has taken over.
fm-if-change Send a trap when FortiManager interface changes. Send a FortiManager trap.
bgp-established Send a trap when a BGP FSM transitions to the established state.
bgp-backward- Send a trap when a BGP FSM goes from a high numbered state to a lower
transition numbered state.
Option Description
ips-pkg-update Send a trap when the IPS signature database or engine is updated.
temperature-high Send a trap when a temperature sensor registers a temperature that is too
high.
voltage-alert Send a trap when a voltage sensor registers a voltage that is outside of the
normal range.
load-balance- Send a trap when a server load balance real server goes down.
real-server-down
dhcp Send a trap when the DHCP server exhausts the IP pool, an IP address
already is in use, or a DHCP client interface received a DHCP-NAK.
ospf-nbr-state- Send a trap when there has been a change in the state of a non-virtual OSPF
change neighbor.
ospf-virtnbr- Send a trap when there has been a change in the state of an OSPF virtual
state-change neighbor.
Option Description
Option Description
Option Description
Option Description
Option Description
config hosts
source-ip Source IPv4 address for SNMP traps. ipv4- Not Specified 0.0.0.0
address
Option Description
host-type Control whether the SNMP manager sends SNMP option - any
queries, receives SNMP traps, or both. No traps will
be sent when IP type is subnet.
Option Description
any Accept queries from and send traps to this SNMP manager.
Option Description
query Accept queries from this SNMP manager but do not send traps.
trap Send traps to this SNMP manager but do not accept SNMP queries from this
SNMP manager.
config hosts6
source-ipv6 Source IPv6 address for SNMP traps. ipv6- Not Specified ::
address
ipv6 SNMP manager IPv6 address prefix. ipv6-prefix Not Specified ::/0
Option Description
host-type Control whether the SNMP manager sends SNMP option - any
queries, receives SNMP traps, or both.
Option Description
any Accept queries from and send traps to this SNMP manager.
query Accept queries from this SNMP manager but do not send traps.
trap Send traps to this SNMP manager but do not accept SNMP queries from this
SNMP manager.
Option Description
Option Description
Option Description
Option Description
Option Description
ha-switch Send a trap after an HA failover when the backup unit has taken over.
fm-if-change Send a trap when FortiManager interface changes. Send a FortiManager trap.
bgp-established Send a trap when a BGP FSM transitions to the established state.
bgp-backward- Send a trap when a BGP FSM goes from a high numbered state to a lower
transition numbered state.
Option Description
ips-pkg-update Send a trap when the IPS signature database or engine is updated.
temperature-high Send a trap when a temperature sensor registers a temperature that is too
high.
voltage-alert Send a trap when a voltage sensor registers a voltage that is outside of the
normal range.
load-balance- Send a trap when a server load balance real server goes down.
real-server-down
dhcp Send a trap when the DHCP server exhausts the IP pool, an IP address
already is in use, or a DHCP client interface received a DHCP-NAK.
ospf-nbr-state- Send a trap when there has been a change in the state of a non-virtual OSPF
change neighbor.
ospf-virtnbr- Send a trap when there has been a change in the state of an OSPF virtual
state-change neighbor.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable dynamic server.The speed test server will be found automatically.
Option Description
Option Description
Option Description
config host
port Server host port number to communicate with client. integer Minimum 5204
value: 1
Maximum
value: 65535
vdom <name> Virtual domain(s) that the administrator can access. string Maximum
Virtual domain name. length: 79
vdom <name> Virtual domain(s) that the administrator can access. string Maximum
Virtual domain name. length: 79
Option Description
Option Description
unavailable There does not exist layer 2 connection among FGSP members.
standalone- Cluster group ID. Must be the same for all members. integer Minimum 0
group-id value: 0
Maximum
value: 255
System status.
config system status
Description: System status.
end
Option Description
Option Description
usage Use hard disk for logging or WAN Optimization. option - log
Option Description
Option Description
This command is available for model(s): FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 200F, FortiGate 201F,
FortiGate 2600F, FortiGate 2601F, FortiGate 300E, FortiGate 301E, FortiGate 3500F,
FortiGate 3501F, FortiGate 3800D, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G,
FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F,
FortiGate 61E, FortiGate 61F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass,
FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 81F, FortiGate 90E, FortiGate 91E, FortiGateRugged 60F 3G4G, FortiGateRugged
60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000D, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D,
FortiGate 2000E, FortiGate 200E, FortiGate 201E, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 3000D, FortiGate 3100D, FortiGate 3200D, FortiGate 3300E,
FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 601E,
FortiGate 800D, FortiGate 900D, FortiGate VM64.
switch-priority STP switch priority; the lower the number the higher the option - 32768
priority (select from 0, 4096, 8192, 12288, 16384,
20480, 24576, 28672, 32768, 36864, 40960, 45056,
49152, 53248, and 57344).
Option Description
0 0
4096 4096
8192 8192
12288 12288
16384 16384
20480 20480
24576 24576
28672 28672
32768 32768
36864 36864
40960 40960
45056 45056
49152 49152
53248 53248
57344 57344
intra-switch- Allow any traffic between switch interfaces or require option - implicit
policy firewall policies to allow traffic between switch
interfaces.
Option Description
mac-ttl Duration for which MAC addresses are held in the integer Minimum 300
ARP table. value: 300
Maximum
value:
8640000
member Names of the interfaces that belong to the virtual string Maximum
<interface- switch. length: 79
name> Physical interface name.
name Interface name (name cannot be in use by any other string Not
interfaces, VLANs, or inter-VDOM links). Specified
Option Description
span-dest-port SPAN destination port name. All traffic on the SPAN string Not
source ports is echoed to the SPAN destination port. Specified
span-direction The direction in which the SPAN port operates, option - both
either: rx, tx, or both.
Option Description
rx Copies only received packets from source SPAN ports to the destination
SPAN port.
tx Copies only transmitted packets from source SPAN ports to the destination
SPAN port.
both Copies both received and transmitted packets from source SPAN ports to
the destination SPAN port.
span-source-port Physical interface name. Port spanning echoes all string Maximum
<interface- traffic on the SPAN source ports to the SPAN length: 79
name> destination port.
Physical interface name.
Option Description
switch Switch for normal switch functionality (available in NAT mode only).
vdom VDOM that the software switch belongs to. string Not
Specified
Configure Type of Service (ToS) based priority table to set network traffic priorities.
config system tos-based-priority
Description: Configure Type of Service (ToS) based priority table to set network traffic
priorities.
edit <id>
set id {integer}
set priority [low|medium|...]
set tos {integer}
next
end
priority ToS based priority level to low, medium or high. option - high
Option Description
tos Value of the ToS byte in the IP datagram header. integer Minimum 0
value: 0
Maximum
value: 15
alt-primary Alternate primary DNS server. This is not used as a ipv4- Not 0.0.0.0
failover DNS server. address Specified
alt-secondary Alternate secondary DNS server. This is not used as a ipv4- Not 0.0.0.0
failover DNS server. address Specified
Option Description
ip6-primary Primary IPv6 DNS server IP address for the VDOM. ipv6- Not ::
address Specified
ip6-secondary Secondary IPv6 DNS server IP address for the VDOM. ipv6- Not ::
address Specified
primary Primary DNS server IP address for the VDOM. ipv4- Not 0.0.0.0
address Specified
Option Description
secondary Secondary DNS server IP address for the VDOM. ipv4- Not 0.0.0.0
address Specified
Option Description
source-ip Source IP for communications with the DNS server. ipv4- Not 0.0.0.0
address Specified
ssl-certificate Name of local certificate for SSL connections. string Not Fortinet_
Specified Factory
vdom-dns Enable/disable configuring DNS servers for the current option - disable
VDOM.
Option Description
Global configuration objects that can be configured independently across different ha peers for all VDOMs or for the
defined VDOM scope.
config system vdom-exception
Description: Global configuration objects that can be configured independently across
different ha peers for all VDOMs or for the defined VDOM scope.
edit <id>
set id {integer}
set object [log.fortianalyzer.setting|log.fortianalyzer.override-setting|...]
set scope [all|inclusive|...]
set vdom <name1>, <name2>, ...
next
end
Option Description
log.fortianalyzer.setting log.fortianalyzer.setting
log.fortianalyzer.override- log.fortianalyzer.override-setting
setting
log.fortianalyzer2.setting log.fortianalyzer2.setting
log.fortianalyzer2.override- log.fortianalyzer2.override-setting
setting
log.fortianalyzer3.setting log.fortianalyzer3.setting
log.fortianalyzer3.override- log.fortianalyzer3.override-setting
setting
log.fortianalyzer- log.fortianalyzer-cloud.setting
cloud.setting
log.fortianalyzer- log.fortianalyzer-cloud.override-setting
cloud.override-setting
log.syslogd.setting log.syslogd.setting
log.syslogd.override-setting log.syslogd.override-setting
log.syslogd2.setting log.syslogd2.setting
log.syslogd2.override-setting log.syslogd2.override-setting
log.syslogd3.setting log.syslogd3.setting
log.syslogd3.override-setting log.syslogd3.override-setting
log.syslogd4.setting log.syslogd4.setting
log.syslogd4.override-setting log.syslogd4.override-setting
system.gre-tunnel system.gre-tunnel
system.central-management system.central-management
system.csf system.csf
user.radius user.radius
Option Description
Option Description
inclusive Object configuration independent for the listed VDOMs. Other VDOMs use the
global configuration.
exclusive Use the global object configuration for the listed VDOMs. Other VDOMs can
be configured independently.
Option Description
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
source-ip Source IP address for communication with the NetFlow ipv4- Not 0.0.0.0
agent. address Specified
Option Description
ipsec-phase1 Maximum guaranteed number of VPN IPsec phase 1 user Not Specified
tunnels.
ipsec-phase1- Maximum guaranteed number of VPN IPsec phase1 user Not Specified
interface interface tunnels.
ipsec-phase2 Maximum guaranteed number of VPN IPsec phase 2 user Not Specified
tunnels.
ipsec-phase2- Maximum guaranteed number of VPN IPsec phase2 user Not Specified
interface interface tunnels.
log-disk-quota Log disk quota in megabytes (MB). Range depends user Not Specified
on how much disk space is available.
Configure a RADIUS server to use as a RADIUS Single Sign On (RSSO) server for this VDOM.
config system vdom-radius-server
Description: Configure a RADIUS server to use as a RADIUS Single Sign On (RSSO) server
for this VDOM.
edit <name>
set name {string}
set radius-server-vdom {string}
set status [enable|disable]
next
end
name Name of the VDOM that you are adding the RADIUS string Not
server to. Specified
radius-server- Use this option to select another VDOM containing a string Not
vdom VDOM RSSO RADIUS server to use for the current Specified
VDOM.
status Enable/disable the RSSO RADIUS server for this option - disable
VDOM.
Option Description
Configure sFlow per VDOM to add or change the IP address and UDP port that FortiGate sFlow agents in this VDOM
use to send sFlow datagrams to an sFlow collector.
config system vdom-sflow
Description: Configure sFlow per VDOM to add or change the IP address and UDP port that
FortiGate sFlow agents in this VDOM use to send sFlow datagrams to an sFlow collector.
set collector-ip {ipv4-address}
set collector-port {integer}
set interface {string}
set interface-select-method [auto|sdwan|...]
set source-ip {ipv4-address}
set vdom-sflow [enable|disable]
end
collector-ip IP address of the sFlow collector that sFlow agents ipv4- Not 0.0.0.0
added to interfaces in this VDOM send sFlow address Specified
datagrams to.
collector-port UDP port number used for sending sFlow datagrams. integer Minimum 6343
value: 0
Maximum
value:
65535
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
vdom-sflow Enable/disable the sFlow configuration for the current option - disable
VDOM.
Option Description
This command is available for model(s): FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 140E-POE,
FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 200F, FortiGate 201F,
FortiGate 2600F, FortiGate 2601F, FortiGate 300E, FortiGate 301E, FortiGate 3500F,
FortiGate 3501F, FortiGate 3800D, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G,
FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F,
FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F,
FortiGate 61E, FortiGate 61F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass,
FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 81F, FortiGate 90E, FortiGate 91E, FortiGateRugged 60F 3G4G, FortiGateRugged
60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F,
FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F
2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 1000D, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D,
FortiGate 2000E, FortiGate 200E, FortiGate 201E, FortiGate 2200E, FortiGate 2201E,
FortiGate 2500E, FortiGate 3000D, FortiGate 3100D, FortiGate 3200D, FortiGate 3300E,
FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 601E,
FortiGate 800D, FortiGate 900D, FortiGate VM64.
Option Description
Option Description
config port
Option Description
Option Description
Option Description
Option Description
Option Description
ssl-certificate Name of local certificate for SSL connections. string Not Fortinet_
Specified Factory
Option Description
ip-version IP version to use for the VXLAN interface and so for option - ipv4-unicast
communication over the VXLAN. IPv4 or IPv6 unicast or
multicast.
Option Description
remote-ip IPv4 address of the VXLAN interface on the device at string Maximum
<ip> the remote end of the VXLAN. length: 15
IPv4 address.
remote-ip6 IPv6 IP address of the VXLAN interface on the device at string Maximum
<ip6> the remote end of the VXLAN. length: 45
IPv6 address.
Configure WCCP.
assignment- Assignment bucket format for the WCCP cache option - cisco-
bucket-format engine. implementation
Option Description
Option Description
Option Description
Option Description
Option Description
L2 L2 rewrite.
Option Description
L2 L2 rewrite.
group-address IP multicast address used by the cache routers. ipv4- Not 0.0.0.0
For the FortiGate to ignore multicast WCCP address- Specified
traffic, use the default 0.0.0.0. multicast
Option Description
Option Description
Option Description
L2 L2 rewrite.
router-id IP address known to all cache engines. If all ipv4- Not 0.0.0.0
cache engines connect to the same FortiGate address Specified
interface, use the default 0.0.0.0.
Option Description
service-type WCCP service type used by the cache server option - auto
for logical interception and redirection of traffic.
Option Description
auto auto
This command is available for model(s): FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate
4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate
500E, FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E
DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-
POE, FortiWiFi 81F 2R.
Option Description
rogue Rogue.
accepted Accepted.
suppressed Suppressed.
This command is available for model(s): FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate
4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate
500E, FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E
DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-
POE, FortiWiFi 81F 2R.
This command is available for model(s): FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E
DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F.
It is not available for: FortiGate 1000D, FortiGate 100EF, FortiGate 100E, FortiGate 100F,
FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E, FortiGate 1200D,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D, FortiGate 1800F,
FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F, FortiGate 201E,
FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 2600F,
FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E,
FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D,
FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate
400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate
4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate 5001E, FortiGate
500E, FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate 60E DSLJ, FortiGate 60E
DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F,
FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F,
FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-
POE, FortiWiFi 81F 2R.
Option Description
802.11a 802.11a.
802.11b 802.11b.
802.11g 802.11g.
Option Description
Option Description
disable 20 MHz.
Option Description
World World.
Americas Americas.
EMEA EMEA.
Israel Israel.
Japan Japan.
Option Description
CLIENT Client.
AP Access point.
SCAN Scan.
Option Description
Option Description
Configure zones to group two or more interfaces. When a zone is created you can configure policies for the zone instead
of individual interfaces in the zone.
config system zone
Description: Configure zones to group two or more interfaces. When a zone is created you
can configure policies for the zone instead of individual interfaces in the zone.
edit <name>
set description {string}
set interface <interface-name1>, <interface-name2>, ...
set intrazone [allow|deny]
set name {string}
config tagging
Description: Config object tagging.
edit <name>
set name {string}
set category {string}
set tags <name1>, <name2>, ...
next
end
next
end
interface Add interfaces to this zone. Interfaces must not be string Maximum
<interface- assigned to another zone or have firewall policies length: 79
name> defined.
Select interfaces to add to the zone.
Option Description
config tagging
Aggregate Controller.
config test acd
Description: Aggregate Controller.
set <Integer> {string}
end
Automation daemon.
config test autod
Description: Automation daemon.
set <Integer> {string}
end
BFD daemon.
config test bfd
Description: BFD daemon.
set <Integer> {string}
end
Configuration-sync daemon.
config test confsyncd
Description: Configuration-sync daemon.
set <Integer> {string}
end
This command is available for model(s): FortiGate 1000D, FortiGate 101E, FortiGate 101F,
FortiGate 1101E, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E, FortiGate 601E,
FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate 80F Bypass,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi
80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 1100E,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F,
FortiGate 2200E, FortiGate 300E, FortiGate 3300E, FortiGate 3400E, FortiGate 3500F,
FortiGate 3600E, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 4200F, FortiGate 4400F, FortiGate 5001E, FortiGate 500E, FortiGate 600E,
FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 80E-
POE, FortiGate 80E, FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiWiFi 60E DSL,
FortiWiFi 60E.
This command is available for model(s): FortiGate 1000D, FortiGate 101E, FortiGate 101F,
FortiGate 1101E, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F,
FortiGate 4201F, FortiGate 4401F, FortiGate 5001E1, FortiGate 501E, FortiGate 601E,
FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 800D, FortiGate 80F Bypass,
FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F,
FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi
80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 1100E,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F,
FortiGate 2200E, FortiGate 300E, FortiGate 3300E, FortiGate 3400E, FortiGate 3500F,
FortiGate 3600E, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 4200F, FortiGate 4400F, FortiGate 5001E, FortiGate 500E, FortiGate 600E,
FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 80E-
POE, FortiGate 80E, FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiWiFi 60E DSL,
FortiWiFi 60E.
DNS proxy.
config test dnsproxy
Description: DNS proxy.
set <Integer> {string}
end
FortiCloud daemon.
config test forticldd
Description: FortiCloud daemon.
set <Integer> {string}
end
Forticron daemon.
config test forticron
Description: Forticron daemon.
set <Integer> {string}
end
FortiExplorer daemon.
config test fsd
Description: FortiExplorer daemon.
set <Integer> {string}
end
FortiService daemon.
config test fsvrd
Description: FortiService daemon.
set <Integer> {string}
end
HA relay daemon.
config test harelay
Description: HA relay daemon.
set <Integer> {string}
end
HA sync daemon.
config test hasync
Description: HA sync daemon.
set <Integer> {string}
end
HA talk daemon.
config test hatalk
Description: HA talk daemon.
set <Integer> {string}
end
IMAP proxy.
config test imap
Description: IMAP proxy.
set <Integer> {string}
end
init process.
config test init
Description: init process.
set <Integer> {string}
end
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate
5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate 60F,
FortiGate 61F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80F Bypass, FortiGate 80F-
POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81F-POE, FortiGate 81F, FortiGate 900D,
FortiGate 90E, FortiGate 91E, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiWiFi
40F 3G4G, FortiWiFi 40F, FortiWiFi 60F, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R
3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate
60E, FortiGate 61E, FortiGate 80E, FortiGate 81E, FortiGate VM64, FortiWiFi 60E DSL,
FortiWiFi 60E, FortiWiFi 61E.
IPS sensor.
config test ipsengine
Description: IPS sensor.
set <Integer> {string}
end
IPS monitor.
config test ipsmonitor
Description: IPS monitor.
set <Integer> {string}
end
Kubernetes daemon.
config test kubed
Description: Kubernetes daemon.
set <Integer> {string}
end
This command is available for model(s): FortiGate 1000D, FortiGate 100EF, FortiGate 100E,
FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 1100E, FortiGate 1101E,
FortiGate 1200D, FortiGate 140E-POE, FortiGate 140E, FortiGate 1500DT, FortiGate 1500D,
FortiGate 1800F, FortiGate 1801F, FortiGate 2000E, FortiGate 200E, FortiGate 200F,
FortiGate 201E, FortiGate 201F, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 300E, FortiGate 301E,
FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E,
FortiGate 3401E, FortiGate 3500F, FortiGate 3501F, FortiGate 3600E, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E
Bypass, FortiGate 400E, FortiGate 401E, FortiGate 40F 3G4G, FortiGate 40F, FortiGate
4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 5001E1, FortiGate
5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate 60E
DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E,
FortiGate 61F, FortiGate 800D, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass,
FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE,
FortiGate 81F, FortiGate 900D, FortiGate 90E, FortiGate 91E, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE,
FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate VM64.
NNTP proxy.
config test nntp
Description: NNTP proxy.
set <Integer> {string}
end
Override daemon.
config test ovrd
Description: Override daemon.
set <Integer> {string}
end
POP3 proxy.
config test pop3
Description: POP3 proxy.
set <Integer> {string}
end
PPTP client.
config test pptpcd
Description: PPTP client.
set <Integer> {string}
end
Quarantine daemon.
config test quarantined
Description: Quarantine daemon.
set <Integer> {string}
end
Radius-das daemon.
config test radius-das
Description: Radius-das daemon.
set <Integer> {string}
end
RADIUS daemon.
config test radiusd
Description: RADIUS daemon.
set <Integer> {string}
end
radvd daemon.
config test radvd
Description: radvd daemon.
set <Integer> {string}
end
This command is available for model(s): FortiGate 1000D, FortiGate 101E, FortiGate 101F,
FortiGate 1101E, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 401E, FortiGate 4201F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 501E, FortiGate 601E, FortiGate 61E, FortiGate 61F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 91E, FortiGate VM64, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-
POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 1100E,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F,
FortiGate 2200E, FortiGate 300E, FortiGate 3300E, FortiGate 3400E, FortiGate 3500F,
FortiGate 3600E, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 80F 2R.
Report daemon.
config test reportd
Description: Report daemon.
set <Integer> {string}
end
sFlow daemon.
config test sflowd
Description: sFlow daemon.
set <Integer> {string}
end
SMTP proxy.
SNMP daemon.
config test snmpd
Description: SNMP daemon.
set <Integer> {string}
end
Syslog daemon.
config test syslogd
Description: Syslog daemon.
set <Integer> {string}
end
Update daemon.
Upload daemon.
config test uploadd
Description: Upload daemon.
set <Integer> {string}
end
WCCP daemon.
config test wccpd
Description: WCCP daemon.
set <Integer> {string}
end
WF monitor.
Wiredapd daemon.
config test wiredapd
Description: Wiredapd daemon.
set <Integer> {string}
end
issuer CA certificate used for client certificate verification. string Not Specified
Option Description
Option Description
Option Description
none The server is not configured as an Active Directory Domain Server (AD DS).
lds The server is an Active Directory Lightweight Domain Server (AD LDS).
Option Description
interface- Specify how to select outgoing interface to reach server. option - auto
select-method
Option Description
port Port to be used for communication with the domain integer Minimum 445
controller. value: 0
Maximum
value:
65535
replication- Port to be used for communication with the domain integer Minimum 0
port controller for replication service. Port number 0 value: 0
indicates automatic discovery. Maximum
value:
65535
source-ip- FortiGate IPv4 address to be used for communication ipv4- Not 0.0.0.0
address with the domain controller. address Specified
source-port Source port to be used for communication with the integer Minimum 0
domain controller. value: 0
Maximum
value:
65535
username User name to sign in with. Must have proper string Not
permissions for service. Specified
port Port to be used for communication with the domain integer Minimum 445
controller. value: 0
Maximum
value:
65535
source-ip- FortiGate IPv4 address to be used for communication ipv4- Not 0.0.0.0
address with the domain controller. address Specified
source-port Source port to be used for communication with the integer Minimum 0
domain controller. value: 0
Maximum
value:
65535
auth-level Authentication security level used for the RPC protocol option - privacy
layer.
Option Description
auth-type Authentication security type used for the RPC protocol option - kerberos
layer.
Option Description
Option Description
Option Description
rpc-over-tcp Connect using RPC-over-TCP. Use for MS Exchange 2010 and earlier
versions. Supported in MS Exchange 2013.
rpc-over-http Connect using RPC-over-HTTP. Use for MS Exchange 2016 and later
versions. Supported in MS Exchange 2013.
rpc-over-https Connect using RPC-over-HTTPS. Use for MS Exchange 2016 and later
versions. Supported in MS Exchange 2013.
http-auth-type Authentication security type used for the HTTP option - ntlm
transport.
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
username User name used to sign in to the server. Must have string Not
proper permissions for service. Specified
Configure FortiToken.
config user fortitoken
Description: Configure FortiToken.
edit <serial-number>
set activation-code {string}
set activation-expire {integer}
set comments {var-string}
set license {string}
Option Description
default- Default domain managed by this Active Directory string Not Specified
domain server.
ldap-server LDAP server name used in LDAP connection strings. string Not Specified
password Password required to log into this Active Directory password Not Specified
server.
port Port to communicate with this Active Directory server. integer Minimum 0
value: 0
Maximum
value: 65535
server Host name or IP address of the Active Directory string Not Specified
server.
Option Description
Option Description
Option Description
status Enable/disable polling for the status of this Active option - enable
Directory server.
Option Description
user User name required to log into this Active Directory string Not Specified
server.
config adgrp
Option Description
Option Description
port Port of the first FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
port2 Port of the second FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
port3 Port of the third FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
port4 Port of the fourth FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
port5 Port of the fifth FSSO collector agent. integer Minimum 8000
value: 1
Maximum
value:
65535
Option Description
Option Description
Option Description
Option Description
company Set the action for the company guest user field. option - optional
Option Description
optional Optional.
mandatory Mandatory.
disabled Disabled.
email Enable/disable the guest user email address field. option - enable
Option Description
expire Time in seconds before guest user accounts integer Minimum 14400
expire. value: 1
Maximum
value:
31536000
Option Description
immediately Immediately.
Option Description
firewall Firewall.
guest Guest.
Option Description
Option Description
Option Description
specify Specify.
disable Disable.
Option Description
sponsor Set the action for the sponsor guest user field. option - optional
Option Description
optional Optional.
mandatory Mandatory.
disabled Disabled.
sso-attribute- Name of the RADIUS user group that this local string Not Specified
value user group represents.
Option Description
specify Specify.
Option Description
config guest
sponsor Set the action for the sponsor guest user field. string Not Specified
company Set the action for the company guest user field. string Not Specified
keytab Base64 coded keytab file containing a pre-shared key. string Not
Specified
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
disable No SSL.
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
Option Description
Option Description
Option Description
ldap-server Name of LDAP server with which the user must string Not Specified
authenticate.
passwd-policy Password policy to apply to this user, as defined string Not Specified
in config user password-policy.
ppk-secret IKEv2 Postquantum Preshared Key (ASCII string password-3 Not Specified
or hexadecimal encoded with a leading 0x).
radius-server Name of RADIUS server with which the user must string Not Specified
authenticate.
Option Description
Option Description
tacacs+-server Name of TACACS+ server with which the user string Not Specified
must authenticate.
Option Description
disable disable
fortitoken FortiToken
Option Description
Option Description
Option Description
Option Description
disable Ignore case and accents. Username at prompt not required to match case or
accents.
enable Do not ignore case and accents. Username at prompt must be an exact
match.
workstation Name of the remote user workstation, if you want string Not Specified
to limit the user to authenticate only from a
particular workstation.
Option Description
description Description for the NAC policy matching pattern. string Not
Specified
ssid-policy SSID policy to be applied on the matched NAC policy. string Not
Specified
Option Description
switch-fortilink FortiLink interface for which this NAC policy belongs to. string Not
* Specified
switch-mac- Switch MAC policy action to be applied on the matched string Not
policy * NAC policy. Specified
expire-days Time in days before the user's password expires. integer Minimum 180
value: 0
Maximum
value: 999
Option Description
Option Description
Option Description
password Username/password.
ldap-server Name of an LDAP server defined under the user ldap string Not
command. Performs client access rights check. Specified
mandatory- Determine what happens to the peer if the CA certificate option - enable
ca-verify is not installed. Disable to automatically consider the
peer certificate as valid.
Option Description
ocsp- Online Certificate Status Protocol (OCSP) server for string Not
override- certificate retrieval. Specified
server
Option Description
Option Description
none None.
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
firewall- Firewall address group which includes all quarantine string Not
groups MAC address. Specified
Option Description
config targets
Option Description
Option Description
Option Description
Option Description
Option Description
filter-Id Filter-Id
class Class
Option Description
Option Description
Option Description
nas-ip IP address used to communicate with the ipv4- Not Specified 0.0.0.0
RADIUS server and used as NAS-IP-Address address
and Called-Station-ID attributes.
Option Description
Option Description
Option Description
Option Description
rsso-context- Time in seconds before the logged out user is integer Minimum 28800
timeout removed from the "user context list" of logged on value: 0
users. Maximum
value:
4294967295
rsso-endpoint- RADIUS attributes used to extract the user end option - Calling-
attribute point identifier from the RADIUS Start record. Station-Id
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable replacement of old IP address with new IP address for the same
endpoint on RADIUS accounting start.
disable Disable replacement of old IP address with new IP address for the same
endpoint on RADIUS accounting start.
Option Description
Option Description
Option Description
rsso-log-period Time interval in seconds that group event log integer Minimum 0
messages will be generated for dynamic profile value: 0
events. Maximum
value:
4294967295
Option Description
rsso-radius- UDP port to listen on for RADIUS Start and Stop integer Minimum 1813
server-port records. value: 0
Maximum
value: 65535
rsso-secret RADIUS secret used by the RADIUS accounting password Not Specified
server.
Option Description
secondary- Secret key to access the secondary server. password Not Specified
secret
secret Pre-shared secret key used to access the password Not Specified
primary RADIUS server.
sso-attribute RADIUS attribute that contains the profile group option - Class
name to be extracted from the RADIUS Start
record.
Option Description
Option Description
sso-attribute- Key prefix for SSO group value in the SSO string Not Specified
key attribute.
Option Description
enable Enable override old attribute value with new value for the same endpoint.
disable Disable override old attribute value with new value for the same endpoint.
Option Description
Option Description
callback-nas- User disconnected and called back, then provided a command prompt.
prompt
callback- User disconnected and called back, granted access to the admin unsigned
administrative interface.
tertiary-secret Secret key to access the tertiary server. password Not Specified
Option Description
Option Description
config accounting-server
Option Description
Option Description
Option Description
Option Description
Option Description
email-adfs-1x E-mail address of the user when interoperating with AD FS 1.1 or ADFS 1.0.
Option Description
Option Description
Option Description
email-adfs-1x E-mail address of the user when interoperating with AD FS 1.1 or ADFS 1.0.
Option Description
auth-cert HTTPS server certificate for policy authentication. string Not Specified
Option Description
auth-lockout- Lockout period in seconds after too many login integer Minimum 0
duration failures. value: 0
Maximum
value:
4294967295
Option Description
auth-portal- Time in minutes before captive portal user have to integer Minimum 3
timeout re-authenticate. value: 1
Maximum
value: 30
Option Description
Option Description
Option Description
Option Description
sslv3 SSLv3.
tlsv1 TLSv1.
tlsv1-1 TLSv1.1.
tlsv1-2 TLSv1.2.
tlsv1-3 TLSv1.3.
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
Option Description
Option Description
Option Description
Option Description
radius-ses- Set the RADIUS session timeout to a hard timeout or option - hard-
timeout-act to ignore RADIUS server session timeouts. timeout
Option Description
config auth-ports
Option Description
port Non-standard port for firewall user authentication. integer Minimum 1024
value: 1
Maximum
value: 65535
Option Description
mschap MSCHAP.
chap CHAP.
pap PAP.
ascii ASCII.
Option Description
Option Description
Option Description
Option Description
Option Description
config filters
Option Description
Option Description
Option Description
Option Description
Option Description
config entries
Option Description
Option Description
Option Description
config msrp
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
max-calls Maximum calls per minute per SCCP client (max integer Minimum 0
65535). value: 0
Maximum
value:
65535
Option Description
Option Description
Option Description
Option Description
Option Description
register-rate REGISTER request rate limit (per second, per integer Minimum 0
policy). value: 0
Maximum
value:
4294967295
Option Description
none None.
invite-rate INVITE request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
Option Description
Option Description
Option Description
call-keepalive Continue tracking calls with no RTP for this many integer Minimum 0
minutes. value: 0
Maximum
value: 10080
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
subscribe-rate SUBSCRIBE request rate limit (per second, per integer Minimum 0
policy). value: 0
Maximum
value:
4294967295
Option Description
none None.
message-rate MESSAGE request rate limit (per second, per integer Minimum 0
policy). value: 0
Maximum
value:
4294967295
Option Description
none None.
notify-rate NOTIFY request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
refer-rate REFER request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
update-rate UPDATE request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
options-rate OPTIONS request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
ack-rate ACK request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
prack-rate PRACK request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
info-rate INFO request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
publish-rate PUBLISH request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
bye-rate BYE request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
cancel-rate CANCEL request rate limit (per second, per policy). integer Minimum 0
value: 0
Maximum
value:
4294967295
Option Description
none None.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
malformed- Action for malformed SIP messages without Require option - pass
header-no- header.
require
Option Description
malformed- Action for malformed SIP messages without Proxy- option - pass
header-no- Require header.
proxy-require
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ssl-mode * SSL/TLS mode for encryption & decryption of traffic. option - off
Option Description
off No SSL.
Option Description
Option Description
secure Reject any SSL connection that does not offer a RFC 5746 Secure
Renegotiation Indication.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
Option Description
Option Description
Option Description
ssl-server- Name of Certificate return to the client in every SSL string Not Specified
certificate * connection.
ssl-auth-client * Require a client certificate and authenticate it with string Not Specified
the peer/peergrp.
ssl-auth-server Authenticate the server's certificate with the string Not Specified
* peer/peergrp.
CA certificate.
config vpn certificate ca
Description: CA certificate.
edit <name>
set auto-update-days {integer}
set auto-update-days-warning {integer}
set ca {user}
set ca-identifier {string}
set name {string}
set range [global|vdom]
set scep-url {string}
set source [factory|user|...]
set source-ip {ipv4-address}
set ssl-inspection-trusted [enable|disable]
next
end
range Either global or VDOM IP address range for the CA option - vdom
certificate.
Option Description
Option Description
source-ip Source IP address for communications to the SCEP ipv4- Not Specified 0.0.0.0
server. address
Option Description
http-url HTTP server URL for CRL auto-update. string Not Specified
ldap-server LDAP server name for CRL auto-update. string Not Specified
range Either global or VDOM IP address range for the option - vdom
certificate.
Option Description
scep-cert Local certificate for SCEP communication for CRL string Not Specified Fortinet_
auto-update. CA_SSL
scep-url SCEP server URL for CRL auto-update. string Not Specified
Option Description
source-ip Source IP address for communications to a HTTP or ipv4- Not Specified 0.0.0.0
SCEP CA server. address
update- Time in seconds before the FortiGate checks for an integer Minimum 0
interval updated CRL. Set to 0 to update only when it expires. value: 0
Maximum
value:
4294967295
acme-ca-url The URL for the ACME CA string Not Specified https://acme-
server. v02.api.letsencrypt.org/directory
Option Description
renewal Renewal.
Option Description
Option Description
Option Description
Option Description
Option Description
source-ip Source IP address for communications to the OCSP ipv4- Not 0.0.0.0
server. address Specified
unavail-action Action when server is unavailable (revoke the certificate option - revoke
or ignore the result of the check).
Option Description
range Either the global or VDOM IP address range for the option - vdom
remote certificate.
Option Description
Option Description
certname- 1024 bit DSA key certificate for re-signing server string Not Fortinet_
dsa1024 certificates for SSL inspection. Specified SSL_
DSA1024
certname- 2048 bit DSA key certificate for re-signing server string Not Fortinet_
dsa2048 certificates for SSL inspection. Specified SSL_
DSA2048
certname- 256 bit ECDSA key certificate for re-signing server string Not Fortinet_
ecdsa256 certificates for SSL inspection. Specified SSL_
ECDSA256
certname- 384 bit ECDSA key certificate for re-signing server string Not Fortinet_
ecdsa384 certificates for SSL inspection. Specified SSL_
ECDSA384
certname- 521 bit ECDSA key certificate for re-signing server string Not Fortinet_
ecdsa521 certificates for SSL inspection. Specified SSL_
ECDSA521
certname- 253 bit EdDSA key certificate for re-signing server string Not Fortinet_
ed25519 certificates for SSL inspection. Specified SSL_
ED25519
certname- 456 bit EdDSA key certificate for re-signing server string Not Fortinet_
ed448 certificates for SSL inspection. Specified SSL_ED448
certname- 1024 bit RSA key certificate for re-signing server string Not Fortinet_
rsa1024 certificates for SSL inspection. Specified SSL_
RSA1024
certname- 2048 bit RSA key certificate for re-signing server string Not Fortinet_
rsa2048 certificates for SSL inspection. Specified SSL_
RSA2048
certname- 4096 bit RSA key certificate for re-signing server string Not Fortinet_
rsa4096 certificates for SSL inspection. Specified SSL_
RSA4096
Option Description
Option Description
Option Description
Option Description
Option Description
cn-match When searching for a matching certificate, control how option - substring
to do CN value matching with certificate subject name.
Option Description
substring Find a match if the name being searched for is a part or the same as a
certificate CN.
value Find a match if the name being searched for is same as a certificate CN.
Option Description
ocsp-option Specify whether the OCSP URL is from certificate or option - server
configured OCSP server.
Option Description
Option Description
Option Description
SSLv3 SSLv3.
TLSv1 TLSv1.
TLSv1-1 TLSv1.1.
TLSv1-2 TLSv1.2.
ssl-ocsp- Source IP address to use to communicate with the ipv4- Not 0.0.0.0
source-ip OCSP server. address Specified
Option Description
subject-match When searching for a matching certificate, control how option - substring
to do RDN value matching with certificate subject
name.
Option Description
substring Find a match if the name being searched for is a part or the same as a
certificate subject RDN.
value Find a match if the name being searched for is same as a certificate subject
RDN.
subject-set When searching for a matching certificate, control how option - subset
to do RDN set matching with certificate subject name.
Option Description
subset Find a match if the name being searched for is a subset of a certificate subject.
superset Find a match if the name being searched for is a superset of a certificate
subject.
config crl-verification
Option Description
leaf-crl- CRL verification option when leaf CRL is absent. option - ignore
absence
Option Description
chain-crl- CRL verification option when CRL of any certificate in option - ignore
absence chain is absent.
Option Description
List gateways.
config vpn ike gateway
Description: List gateways.
set <name> {string}
end
Concentrator configuration.
config vpn ipsec concentrator
Description: Concentrator configuration.
edit <id>
set id {integer}
set member <name1>, <name2>, ...
set name {string}
set src-check [disable|enable]
next
end
Option Description
config mappings
packet-loss- Apply FEC parameters when packet loss is >= integer Minimum 0
threshold threshold. value: 0
Maximum
value: 100
latency- Apply FEC parameters when latency is <= threshold integer Minimum 0
threshold (0 means no threshold). value: 0
Maximum
value:
4294967295
phase2name Phase 2 tunnel name that you defined in the string Not
FortiClient dialup configuration. Specified
Option Description
Option Description
auth-alg Authentication algorithm. Must be the same for both option - null
ends of the tunnel.
Option Description
null null
md5 md5
sha1 sha1
sha256 sha256
sha384 sha384
sha512 sha512
enc-alg Encryption algorithm. Must be the same for both ends of option - null
the tunnel.
Option Description
null null
des des
3des 3des
aes128 aes128
aes192 aes192
aes256 aes256
aria128 aria128
aria192 aria192
aria256 aria256
seed seed
Option Description
local-gw IPv4 address of the local gateway's external interface. ipv4- Not 0.0.0.0
address- Specified
any
local-spi Local SPI, a hexadecimal 8-digit (4-byte) tag. Discerns user Not
between two traffic streams with different encryption Specified
rules.
Option Description
remote-gw IPv4 address of the remote gateway's external interface. ipv4- Not 0.0.0.0
address Specified
authentication Authentication algorithm. Must be the same for both option - null
ends of the tunnel.
Option Description
null Null.
md5 MD5.
sha1 SHA1.
sha256 SHA256.
sha384 SHA384.
sha512 SHA512.
encryption Encryption algorithm. Must be the same for both ends option - null
of the tunnel.
Option Description
null Null.
des DES.
3des 3DES.
aes128 AES128.
aes192 AES192.
aes256 AES256.
aria128 ARIA128.
aria192 ARIA192.
aria256 ARIA256.
seed Seed.
localspi Local SPI, a hexadecimal 8-digit (4-byte) tag. Discerns user Not
between two traffic streams with different encryption Specified
rules.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
dependent Short-cut tunnels are brought down if the parent tunnel goes down.
Option Description
banner Message that unity client should display var-string Not Specified
after connecting.
Option Description
enable Enable cross validation of peer ID and the identity in the peer's certificate as
specified in RFC 4945.
disable Disable cross validation of peer ID and the identity in the peer's certificate
as specified in RFC 4945.
Option Description
Option Description
disable Disable allowing the VPN client to bring up the tunnel when there is no
traffic.
enable Enable allowing the VPN client to bring up the tunnel when there is no
traffic.
Option Description
disable Disable allowing the VPN client to keep the tunnel up when there is no
traffic.
enable Enable allowing the VPN client to keep the tunnel up when there is no
traffic.
default-gw IPv4 address of default route gateway to ipv4-address Not Specified 0.0.0.0
use for traffic exiting the interface.
dhcp-ra-giaddr Relay agent gateway IP address to use in ipv4-address Not Specified 0.0.0.0
the giaddr field of DHCP requests.
dhcp6-ra- Relay agent IPv6 link address to use in ipv6-address Not Specified ::
linkaddr DHCP6 requests.
Option Description
1 DH Group 1.
2 DH Group 2.
5 DH Group 5.
14 DH Group 14.
15 DH Group 15.
16 DH Group 16.
17 DH Group 17.
18 DH Group 18.
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
27 DH Group 27.
28 DH Group 28.
29 DH Group 29.
30 DH Group 30.
31 DH Group 31.
32 DH Group 32.
Option Description
Option Description
domain Instruct unity clients about the single string Not Specified
default DNS domain.
Option Description
on-demand Trigger Dead Peer Detection when IPsec traffic is sent but no reply is
received from the peer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
exchange-ip- IPv4 address to exchange with peers. ipv4-address Not Specified 0.0.0.0
addr4
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable copy the dscp in the ESP header to the inner IP Header.
disable Disable copy the dscp in the ESP header to the inner IP Header.
Option Description
Option Description
Option Description
ipv4-split- IPv4 subnets that should not be sent over string Not Specified
exclude the IPsec tunnel.
ipv6-split- IPv6 subnets that should not be sent over string Not Specified
exclude the IPsec tunnel.
local-gw IPv4 address of the local gateway's ipv4-address Not Specified 0.0.0.0
external interface.
Option Description
Option Description
disable Ingress/egress IKE traffic must be routed over the same interface.
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
sunday Sunday.
monday Monday.
tuesday Tuesday.
wednesday Wednesday.
thursday Thursday.
friday Friday.
saturday Saturday.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow, but do not require, use of IKEv2 Postquantum Preshared Key (PPK).
Option Description
des-md5 des-md5
des-sha1 des-sha1
des-sha256 des-sha256
des-sha384 des-sha384
des-sha512 des-sha512
3des-md5 3des-md5
3des-sha1 3des-sha1
3des-sha256 3des-sha256
3des-sha384 3des-sha384
3des-sha512 3des-sha512
aes128-md5 aes128-md5
aes128-sha1 aes128-sha1
aes128-sha256 aes128-sha256
aes128-sha384 aes128-sha384
aes128-sha512 aes128-sha512
aes128gcm-prfsha1 aes128gcm-prfsha1
aes128gcm-prfsha256 aes128gcm-prfsha256
aes128gcm-prfsha384 aes128gcm-prfsha384
aes128gcm-prfsha512 aes128gcm-prfsha512
aes192-md5 aes192-md5
aes192-sha1 aes192-sha1
aes192-sha256 aes192-sha256
aes192-sha384 aes192-sha384
aes192-sha512 aes192-sha512
aes256-md5 aes256-md5
Option Description
aes256-sha1 aes256-sha1
aes256-sha256 aes256-sha256
aes256-sha384 aes256-sha384
aes256-sha512 aes256-sha512
aes256gcm-prfsha1 aes256gcm-prfsha1
aes256gcm-prfsha256 aes256gcm-prfsha256
aes256gcm-prfsha384 aes256gcm-prfsha384
aes256gcm-prfsha512 aes256gcm-prfsha512
chacha20poly1305-prfsha1 chacha20poly1305-prfsha1
chacha20poly1305-prfsha256 chacha20poly1305-prfsha256
chacha20poly1305-prfsha384 chacha20poly1305-prfsha384
chacha20poly1305-prfsha512 chacha20poly1305-prfsha512
aria128-md5 aria128-md5
aria128-sha1 aria128-sha1
aria128-sha256 aria128-sha256
aria128-sha384 aria128-sha384
aria128-sha512 aria128-sha512
aria192-md5 aria192-md5
aria192-sha1 aria192-sha1
aria192-sha256 aria192-sha256
aria192-sha384 aria192-sha384
aria192-sha512 aria192-sha512
aria256-md5 aria256-md5
aria256-sha1 aria256-sha1
aria256-sha256 aria256-sha256
aria256-sha384 aria256-sha384
aria256-sha512 aria256-sha512
seed-md5 seed-md5
seed-sha1 seed-sha1
Option Description
seed-sha256 seed-sha256
seed-sha384 seed-sha384
seed-sha512 seed-sha512
psksecret- Pre-shared secret for remote side PSK password-3 Not Specified
remote authentication (ASCII string or
hexadecimal encoded with a leading 0x).
Option Description
Option Description
remote-gw IPv4 address of the remote gateway's ipv4-address Not Specified 0.0.0.0
external interface.
Option Description
Option Description
Option Description
Option Description
sha1 SHA1.
sha2-256 SHA2-256.
sha2-384 SHA2-384.
sha2-512 SHA2-512.
Option Description
Option Description
ddns Remote VPN gateway has dynamic IP address and is a dynamic DNS
client.
Option Description
usrgrp User group name for dialup peers. string Not Specified
Option Description
Option Description
disable Disable.
Option Description
config ipv4-exclude-range
config ipv6-exclude-range
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable cross validation of peer ID and the identity in the peer's certificate as
specified in RFC 4945.
disable Disable cross validation of peer ID and the identity in the peer's certificate
as specified in RFC 4945.
Option Description
Option Description
disable Disable allowing the VPN client to bring up the tunnel when there is no
traffic.
enable Enable allowing the VPN client to bring up the tunnel when there is no
traffic.
Option Description
disable Disable allowing the VPN client to keep the tunnel up when there is no
traffic.
Option Description
enable Enable allowing the VPN client to keep the tunnel up when there is no
traffic.
Option Description
1 DH Group 1.
2 DH Group 2.
5 DH Group 5.
14 DH Group 14.
15 DH Group 15.
16 DH Group 16.
17 DH Group 17.
18 DH Group 18.
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
27 DH Group 27.
28 DH Group 28.
29 DH Group 29.
30 DH Group 30.
31 DH Group 31.
32 DH Group 32.
Option Description
Option Description
domain Instruct unity clients about the single default string Not
DNS domain. Specified
Option Description
on-demand Trigger Dead Peer Detection when IPsec traffic is sent but no reply is
received from the peer.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
enable Enable copy the dscp in the ESP header to the inner IP Header.
disable Disable copy the dscp in the ESP header to the inner IP Header.
Option Description
ipv4-split- IPv4 subnets that should not be sent over string Not
exclude the IPsec tunnel. Specified
ipv6-split- IPv6 subnets that should not be sent over string Not
exclude the IPsec tunnel. Specified
Option Description
Option Description
disable Disable.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
allow Allow, but do not require, use of IKEv2 Postquantum Preshared Key (PPK).
Option Description
des-md5 des-md5
des-sha1 des-sha1
des-sha256 des-sha256
des-sha384 des-sha384
des-sha512 des-sha512
3des-md5 3des-md5
3des-sha1 3des-sha1
3des-sha256 3des-sha256
3des-sha384 3des-sha384
3des-sha512 3des-sha512
aes128-md5 aes128-md5
aes128-sha1 aes128-sha1
aes128-sha256 aes128-sha256
aes128-sha384 aes128-sha384
aes128-sha512 aes128-sha512
aes128gcm-prfsha1 aes128gcm-prfsha1
aes128gcm-prfsha256 aes128gcm-prfsha256
aes128gcm-prfsha384 aes128gcm-prfsha384
aes128gcm-prfsha512 aes128gcm-prfsha512
aes192-md5 aes192-md5
aes192-sha1 aes192-sha1
aes192-sha256 aes192-sha256
aes192-sha384 aes192-sha384
aes192-sha512 aes192-sha512
aes256-md5 aes256-md5
Option Description
aes256-sha1 aes256-sha1
aes256-sha256 aes256-sha256
aes256-sha384 aes256-sha384
aes256-sha512 aes256-sha512
aes256gcm-prfsha1 aes256gcm-prfsha1
aes256gcm-prfsha256 aes256gcm-prfsha256
aes256gcm-prfsha384 aes256gcm-prfsha384
aes256gcm-prfsha512 aes256gcm-prfsha512
chacha20poly1305-prfsha1 chacha20poly1305-prfsha1
chacha20poly1305-prfsha256 chacha20poly1305-prfsha256
chacha20poly1305-prfsha384 chacha20poly1305-prfsha384
chacha20poly1305-prfsha512 chacha20poly1305-prfsha512
aria128-md5 aria128-md5
aria128-sha1 aria128-sha1
aria128-sha256 aria128-sha256
aria128-sha384 aria128-sha384
aria128-sha512 aria128-sha512
aria192-md5 aria192-md5
aria192-sha1 aria192-sha1
aria192-sha256 aria192-sha256
aria192-sha384 aria192-sha384
aria192-sha512 aria192-sha512
aria256-md5 aria256-md5
aria256-sha1 aria256-sha1
aria256-sha256 aria256-sha256
aria256-sha384 aria256-sha384
aria256-sha512 aria256-sha512
seed-md5 seed-md5
seed-sha1 seed-sha1
Option Description
seed-sha256 seed-sha256
seed-sha384 seed-sha384
seed-sha512 seed-sha512
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
sha1 SHA1.
sha2-256 SHA2-256.
sha2-384 SHA2-384.
sha2-512 SHA2-512.
Option Description
Option Description
ddns Remote VPN gateway has dynamic IP address and is a dynamic DNS
client.
Option Description
Option Description
Option Description
disable Disable.
config ipv6-exclude-range
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
1 DH Group 1.
2 DH Group 2.
5 DH Group 5.
14 DH Group 14.
15 DH Group 15.
16 DH Group 16.
Option Description
17 DH Group 17.
18 DH Group 18.
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
27 DH Group 27.
28 DH Group 28.
29 DH Group 29.
30 DH Group 30.
31 DH Group 31.
32 DH Group 32.
Option Description
diffservcode DSCP value to be applied to the IPsec tunnel user Not Specified
outer IP header.
Option Description
ip IPv4 IP.
Option Description
inbound-dscp- Enable/disable copy the dscp in the ESP header option - phase1
copy to the inner IP Header.
Option Description
phase1 copy the dscp in the ESP header to the inner IP Header according to the
phase1 inbound_dscp_copy setting.
enable Enable copy the dscp in the ESP header to the inner IP Header.
disable Disable copy the dscp in the ESP header to the inner IP Header.
Option Description
Option Description
Option Description
Option Description
keylifekbs Phase2 key life in number of kilobytes of traffic. integer Minimum 5120
value: 5120
Maximum
value:
4294967295
Option Description
Option Description
phase1name Phase 1 determines the options required for string Not Specified
phase 2.
Option Description
null-md5 null-md5
null-sha1 null-sha1
null-sha256 null-sha256
null-sha384 null-sha384
null-sha512 null-sha512
des-null des-null
des-md5 des-md5
des-sha1 des-sha1
des-sha256 des-sha256
des-sha384 des-sha384
des-sha512 des-sha512
3des-null 3des-null
3des-md5 3des-md5
3des-sha1 3des-sha1
3des-sha256 3des-sha256
3des-sha384 3des-sha384
3des-sha512 3des-sha512
aes128-null aes128-null
aes128-md5 aes128-md5
aes128-sha1 aes128-sha1
aes128-sha256 aes128-sha256
aes128-sha384 aes128-sha384
Option Description
aes128-sha512 aes128-sha512
aes128gcm aes128gcm
aes192-null aes192-null
aes192-md5 aes192-md5
aes192-sha1 aes192-sha1
aes192-sha256 aes192-sha256
aes192-sha384 aes192-sha384
aes192-sha512 aes192-sha512
aes256-null aes256-null
aes256-md5 aes256-md5
aes256-sha1 aes256-sha1
aes256-sha256 aes256-sha256
aes256-sha384 aes256-sha384
aes256-sha512 aes256-sha512
aes256gcm aes256gcm
chacha20poly1305 chacha20poly1305
aria128-null aria128-null
aria128-md5 aria128-md5
aria128-sha1 aria128-sha1
aria128-sha256 aria128-sha256
aria128-sha384 aria128-sha384
aria128-sha512 aria128-sha512
aria192-null aria192-null
aria192-md5 aria192-md5
aria192-sha1 aria192-sha1
aria192-sha256 aria192-sha256
aria192-sha384 aria192-sha384
aria192-sha512 aria192-sha512
aria256-null aria256-null
Option Description
aria256-md5 aria256-md5
aria256-sha1 aria256-sha1
aria256-sha256 aria256-sha256
aria256-sha384 aria256-sha384
aria256-sha512 aria256-sha512
seed-null seed-null
seed-md5 seed-md5
seed-sha1 seed-sha1
seed-sha256 seed-sha256
seed-sha384 seed-sha384
seed-sha512 seed-sha512
Option Description
Option Description
use-old Use the old route and do not add the new route.
use-new Delete the old route and add the new route.
Option Description
Option Description
ip IPv4 IP.
Option Description
Option Description
Option Description
Option Description
1 DH Group 1.
2 DH Group 2.
5 DH Group 5.
14 DH Group 14.
15 DH Group 15.
16 DH Group 16.
17 DH Group 17.
18 DH Group 18.
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
27 DH Group 27.
28 DH Group 28.
Option Description
29 DH Group 29.
30 DH Group 30.
31 DH Group 31.
32 DH Group 32.
Option Description
diffservcode DSCP value to be applied to the IPsec tunnel user Not Specified
outer IP header.
Option Description
ip IPv4 IP.
Option Description
inbound-dscp- Enable/disable copy the dscp in the ESP header option - phase1
copy to the inner IP Header.
Option Description
phase1 copy the dscp in the ESP header to the inner IP Header according to the
phase1 inbound_dscp_copy setting.
enable Enable copy the dscp in the ESP header to the inner IP Header.
disable Disable copy the dscp in the ESP header to the inner IP Header.
Option Description
Option Description
Option Description
Option Description
keylifekbs Phase2 key life in number of kilobytes of traffic. integer Minimum 5120
value: 5120
Maximum
value:
4294967295
Option Description
Option Description
phase1name Phase 1 determines the options required for string Not Specified
phase 2.
Option Description
null-md5 null-md5
null-sha1 null-sha1
null-sha256 null-sha256
null-sha384 null-sha384
null-sha512 null-sha512
Option Description
des-null des-null
des-md5 des-md5
des-sha1 des-sha1
des-sha256 des-sha256
des-sha384 des-sha384
des-sha512 des-sha512
3des-null 3des-null
3des-md5 3des-md5
3des-sha1 3des-sha1
3des-sha256 3des-sha256
3des-sha384 3des-sha384
3des-sha512 3des-sha512
aes128-null aes128-null
aes128-md5 aes128-md5
aes128-sha1 aes128-sha1
aes128-sha256 aes128-sha256
aes128-sha384 aes128-sha384
aes128-sha512 aes128-sha512
aes128gcm aes128gcm
aes192-null aes192-null
aes192-md5 aes192-md5
aes192-sha1 aes192-sha1
aes192-sha256 aes192-sha256
aes192-sha384 aes192-sha384
aes192-sha512 aes192-sha512
aes256-null aes256-null
aes256-md5 aes256-md5
aes256-sha1 aes256-sha1
aes256-sha256 aes256-sha256
Option Description
aes256-sha384 aes256-sha384
aes256-sha512 aes256-sha512
aes256gcm aes256gcm
chacha20poly1305 chacha20poly1305
aria128-null aria128-null
aria128-md5 aria128-md5
aria128-sha1 aria128-sha1
aria128-sha256 aria128-sha256
aria128-sha384 aria128-sha384
aria128-sha512 aria128-sha512
aria192-null aria192-null
aria192-md5 aria192-md5
aria192-sha1 aria192-sha1
aria192-sha256 aria192-sha256
aria192-sha384 aria192-sha384
aria192-sha512 aria192-sha512
aria256-null aria256-null
aria256-md5 aria256-md5
aria256-sha1 aria256-sha1
aria256-sha256 aria256-sha256
aria256-sha384 aria256-sha384
aria256-sha512 aria256-sha512
seed-null seed-null
seed-md5 seed-md5
seed-sha1 seed-sha1
seed-sha256 seed-sha256
seed-sha384 seed-sha384
seed-sha512 seed-sha512
Option Description
Option Description
use-old Use the old route and do not add the new route.
use-new Delete the old route and add the new route.
Option Description
Option Description
Option Description
ip IPv4 IP.
Option Description
enable Replace source selector with interface IP when using outbound NAT.
Configure L2TP.
config vpn l2tp
Description: Configure L2TP.
set compress [enable|disable]
set eip {ipv4-address}
set enforce-ipsec [enable|disable]
set hello-interval {integer}
set lcp-echo-interval {integer}
set lcp-max-echo-fails {integer}
set sip {ipv4-address}
set status [enable|disable]
set usrgrp {string}
end
Option Description
Option Description
lcp-echo- Time in seconds between PPPoE Link Control Protocol integer Minimum 5
interval (LCP) echo requests. value: 0
Maximum
value:
32767
Option Description
Option Description
auto- Control deletion of child short-cut tunnels when the option - independent
discovery- parent tunnel goes down.
shortcut-
mode
Option Description
dependent Short-cut tunnels are brought down if the parent tunnel goes down.
Option Description
ip-allocation- Class B subnet reserved for private IP address ipv4- Not 10.254.0.0
block assignment. classnet- Specified 255.255.0.0
any
Option Description
Option Description
Option Description
Option Description
Option Description
config forticlient-access
Option Description
config overlays
Option Description
config subnets
Option Description
subnet IPv4 address and subnet mask. ipv4- Not Specified 0.0.0.0
classnet- 0.0.0.0
any
Configure PPTP.
config vpn pptp
Description: Configure PPTP.
set eip {ipv4-address}
set ip-mode [range|usrgrp]
set local-ip {ipv4-address}
set sip {ipv4-address}
set status [enable|disable]
set usrgrp {string}
end
Option Description
range PPTP client IP from manual config (range from sip to eip).
local-ip Local IP to be used for peer's remote IP. ipv4- Not 0.0.0.0
address Specified
Option Description
Client.
config vpn ssl client
Description: Client.
edit <name>
set certificate {string}
server IPv4, IPv6 or DNS address of the SSL-VPN server. string Not
Specified
source-ip IPv4 or IPv6 address to use as a source for the SSL- string Not
VPN connection to the server. Specified
Option Description
user Username to offer to the peer to authenticate the client. string Not
Specified
SSL-VPN session.
config vpn ssl monitor
Description: SSL-VPN session.
end
Configure SSL-VPN.
config vpn ssl settings
Description: Configure SSL-VPN.
set algorithm [high|medium|...]
set auth-session-check-source-ip [enable|disable]
set auth-timeout {integer}
config authentication-rule
Description: Authentication rule for SSL-VPN.
edit <id>
set id {integer}
set source-interface <name1>, <name2>, ...
set source-address <name1>, <name2>, ...
set source-address-negate [enable|disable]
set source-address6 <name1>, <name2>, ...
set source-address6-negate [enable|disable]
set users <name1>, <name2>, ...
set groups <name1>, <name2>, ...
algorithm Force the SSL-VPN security level. High allows option - high
only high. Medium allows medium and high. Low
allows any.
Option Description
default default
Option Description
Option Description
Option Description
DHE Ban the use of cipher suites using authenticated ephemeral DH key
agreement.
ECDHE Ban the use of cipher suites using authenticated ephemeral ECDH key
agreement.
AES Ban the use of cipher suites using either 128 or 256 bit AES.
AESGCM Ban the use of cipher suites AES in Galois Counter Mode (GCM).
CAMELLIA Ban the use of cipher suites using either 128 or 256 bit CAMELLIA.
Option Description
Option Description
Option Description
dns-suffix DNS suffix used for SSL-VPN clients. var-string Not Specified
Option Description
Option Description
Option Description
dual-stack- Tunnel mode: enable parallel IPv4 and IPv6 option - disable
mode tunnel. Web mode: support IPv4 and IPv6
bookmarks in the portal.
Option Description
Option Description
encrypt-and- Encrypt and store user passwords for SSL-VPN option - disable
store-password web sessions.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
idle-timeout SSL-VPN disconnects if idle for specified time in integer Minimum 300
seconds. value: 0
Maximum
value: 259200
login-block-time Time for which a user is blocked from logging in integer Minimum 60
after too many failed login attempts. value: 0
Maximum
value:
4294967295
Option Description
Option Description
saml-redirect- SAML local redirect port in the machine running integer Minimum 8020
port FortiClient. 0 is to disable redirection on FGT value: 0
side. Maximum
value: 65535
servercert Name of the server certificate to be used for string Not Specified
SSL-VPNs.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
tunnel-addr- Method used for assigning address for tunnel. option - first-available
assigned-
method
Option Description
round-robin Assign the available address from the pool with a round robin fashion.
Option Description
tunnel-ip-pools Names of the IPv4 IP Pool firewall objects that string Maximum
<name> define the IP addresses reserved for remote length: 79
clients.
Address name.
tunnel-ipv6- Names of the IPv6 IP Pool firewall objects that string Maximum
pools <name> define the IP addresses reserved for remote length: 79
clients.
Address name.
tunnel-user- Time out value to clean up user session after integer Minimum 30
session-timeout tunnel connection is dropped. value: 1
Maximum
value: 255
Option Description
Option Description
Option Description
enable Enable use of IP pools defined in firewall policy while using web-mode.
disable Disable use of IP pools defined in firewall policy while using web-mode.
Option Description
config authentication-rule
Option Description
Option Description
Option Description
Option Description
Option Description
any Any
local Local
radius RADIUS
tacacs+ TACACS+
ldap LDAP
peer PEER
Option Description
Option Description
av AntiVirus.
fw Firewall.
config check-item-list
Option Description
require Require.
deny Deny.
Option Description
file File.
registry Registry.
process Process.
Portal.
config vpn ssl web portal
Description: Portal.
edit <name>
set allow-user-access {option1}, {option2}, ...
set auto-connect [enable|disable]
config bookmark-group
Description: Portal bookmark group.
edit <name>
set name {string}
config bookmarks
Description: Bookmark table.
edit <name>
set name {string}
set apptype [ftp|rdp|...]
set url {var-string}
set host {var-string}
set folder {var-string}
set domain {var-string}
set additional-params {var-string}
set description {var-string}
set keyboard-layout [ar-101|ar-102|...]
set security [any|rdp|...]
Option Description
Option Description
Option Description
custom-lang Change the web portal display language. Overrides string Not
config system global set language. You can use config Specified
system custom-language and execute system custom-
language to add custom language files.
Option Description
Option Description
use-new Assign DHCP lease to new client and remove old client lease.
display- Enable to display the web portal bookmark widget. option - enable
bookmark
Option Description
display- Enable to display the web portal connection tools option - enable
connection- widget.
tools
Option Description
display-history Enable to display the web portal user login history option - enable
widget.
Option Description
display-status Enable to display the web portal status widget. option - enable
Option Description
Option Description
Option Description
Option Description
hide-sso- Enable to prevent SSO credential being sent to client. option - enable
credential
Option Description
Option Description
av-fw AntiVirus and firewall software recognized by the Windows Security Center.
custom Custom.
host-check- One or more policies to require the endpoint to have string Maximum
policy <name> specific security software. length: 79
Host check software list name.
ip-mode Method by which users of this SSL-VPN tunnel obtain option - range
IP addresses.
Option Description
range Use the IP addresses available for all SSL-VPN users as defined by the SSL
settings command.
user-group Use the IP addresses associated with individual users or user groups
(usually from external auth servers).
ip-pools IPv4 firewall source address objects reserved for SSL- string Maximum
<name> VPN tunnel mode clients. length: 79
Address name.
ipv6-exclusive- Enable/disable all IPv6 traffic go through tunnel only. option - disable
routing
Option Description
ipv6-pools IPv6 firewall source address objects reserved for SSL- string Maximum
<name> VPN tunnel mode clients. length: 79
Address name.
Option Description
Option Description
ipv6-split- IPv6 SSL-VPN tunnel mode firewall address objects string Maximum
tunneling- that override firewall policy destination addresses to length: 79
routing-address control split-tunneling access.
<name> Address name.
ipv6-split- Enable to negate IPv6 split tunneling routing address. option - disable
tunneling-
routing-negate
Option Description
Option Description
Option Description
limit-user-logins Enable to limit each user to one SSL-VPN session at a option - disable
time.
Option Description
Option Description
Option Description
os-check Enable to let the FortiGate decide action based on option - disable
client OS.
Option Description
prefer-ipv6-dns Prefer to query IPv6 DNS server first if enabled. option - disable
Option Description
rewrite-ip-uri-ui Rewrite contents for URI contains IP and /ui/. option - disable
Option Description
Option Description
Option Description
skip-check-for- Enable to skip host check for browser support. option - enable
browser
Option Description
skip-check-for- Enable to skip host check if client OS does not support option - enable
unsupported-os it.
Option Description
Option Description
Option Description
Option Description
Option Description
enable enable
disable disable
Option Description
split-tunneling- IPv4 SSL-VPN tunnel mode firewall address objects string Maximum
routing-address that override firewall policy destination addresses to length: 79
<name> control split-tunneling access.
Address name.
Option Description
Option Description
Option Description
Option Description
user-bookmark Enable to allow web portal users to create their own option - enable
bookmarks.
Option Description
user-group- Enable to allow web portal users to create bookmarks option - enable
bookmark for all users in the same user group.
Option Description
Option Description
config bookmarks
Option Description
ftp FTP.
rdp RDP.
sftp SFTP.
smb SMB/CIFS.
ssh SSH.
telnet Telnet.
vnc VNC.
web HTTP/HTTPS.
Option Description
Option Description
cz Czech.
da Danish.
nl Dutch.
de German.
es Spanish.
fi Finish.
fr French.
hr Croatian.
hu Hungarian.
it Italian.
ja Japanese.
ko Korean.
lt Lithuanian.
Option Description
mk Macedonian (FYROM).
no Norwegian.
pt Portuguese.
ru Russian.
sl Slovenian.
sv Swedish.
tuk Turkmen.
tur-f Turkish F.
tur-q Turkish Q.
Option Description
Option Description
preconnection- An arbitrary string which identifies the RDP var-string Not Specified
blob source.
load-balancing- The load balancing information or cookie which var-string Not Specified
info should be provided to the connection broker.
Option Description
Option Description
Option Description
Option Description
Option Description
alternative Alternative.
sso-credential- Single sign-on credentials are only sent once to option - disable
sent-once remote server.
Option Description
enable Single sign-on credentials are only sent once to remote server.
disable Single sign-on credentials are sent to remote server for every HTTP
request.
config mac-addr-check-rule
config os-check-list
Option Description
domains Split DNS domains used for SSL-VPN clients var-string Not Specified
separated by comma.
Realm.
config vpn ssl web realm
Description: Realm.
edit <url-path>
set login-page {var-string}
set max-concurrent-user {integer}
set nas-ip {ipv4-address}
set radius-port {integer}
set radius-server {string}
set url-path {string}
set virtual-host {var-string}
set virtual-host-only [enable|disable]
set virtual-host-server-cert {string}
next
end
nas-ip IP address used as a NAS-IP to communicate with the ipv4- Not 0.0.0.0
RADIUS server. address Specified
Option Description
virtual-host- Name of the server certificate to used for this realm. string Not
server-cert Specified
config bookmarks
Option Description
ftp FTP.
rdp RDP.
sftp SFTP.
smb SMB/CIFS.
ssh SSH.
telnet Telnet.
vnc VNC.
web HTTP/HTTPS.
Option Description
cz Czech.
da Danish.
nl Dutch.
de German.
Option Description
es Spanish.
fi Finish.
fr French.
hr Croatian.
hu Hungarian.
it Italian.
ja Japanese.
ko Korean.
lt Lithuanian.
mk Macedonian (FYROM).
no Norwegian.
Option Description
pt Portuguese.
ru Russian.
sl Slovenian.
sv Swedish.
tuk Turkmen.
tur-f Turkish F.
tur-q Turkish Q.
Option Description
Option Description
preconnection- An arbitrary string which identifies the RDP var-string Not Specified
blob source.
load-balancing- The load balancing information or cookie which var-string Not Specified
info should be provided to the connection broker.
Option Description
Option Description
Option Description
Option Description
alternative Alternative.
sso-credential- Single sign-on credentials are only sent once to option - disable
sent-once remote server.
Option Description
enable Single sign-on credentials are only sent once to remote server.
disable Single sign-on credentials are sent to remote server for every HTTP
request.
config form-data
config bookmarks
Option Description
ftp FTP.
rdp RDP.
sftp SFTP.
smb SMB/CIFS.
ssh SSH.
telnet Telnet.
vnc VNC.
web HTTP/HTTPS.
Option Description
cz Czech.
da Danish.
nl Dutch.
de German.
Option Description
es Spanish.
fi Finish.
fr French.
hr Croatian.
hu Hungarian.
it Italian.
ja Japanese.
ko Korean.
lt Lithuanian.
mk Macedonian (FYROM).
Option Description
no Norwegian.
pt Portuguese.
ru Russian.
sl Slovenian.
sv Swedish.
tuk Turkmen.
tur-f Turkish F.
tur-q Turkish Q.
Option Description
Option Description
preconnection- An arbitrary string which identifies the RDP var-string Not Specified
blob source.
load-balancing- The load balancing information or cookie which var-string Not Specified
info should be provided to the connection broker.
Option Description
Option Description
Option Description
Option Description
alternative Alternative.
sso-credential- Single sign-on credentials are only sent once to option - disable
sent-once remote server.
Option Description
enable Single sign-on credentials are only sent once to remote server.
disable Single sign-on credentials are sent to remote server for every HTTP
request.
config form-data
Option Description
Option Description
config address-list
Option Description
Option Description
Option Description
config header-length
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config content-length
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config param-length
Option Description
length Maximum length of parameter in URL, HTTP POST integer Minimum 8192
request or HTTP body in bytes (0 to 2147483647). value: 0
Maximum
value:
2147483647
Option Description
allow Allow.
block Block.
Option Description
Option Description
config line-length
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config url-param-length
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config method
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config method
Option Description
Option Description
Option Description
Option Description
config hostname
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config malformed
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config max-cookie
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config max-header-line
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config max-url-param
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config max-range-segment
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config exception
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config method
config method-policy
Option Description
Option Description
Option Description
config signature
config main-class
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
config custom-signature
Option Description
Option Description
allow Allow.
block Block.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config url-access
Option Description
bypass Allow the HTTP request, also bypass further WAF scanning.
permit Allow the HTTP request, and continue further WAF scanning.
Option Description
Option Description
config access-pattern
Option Description
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 101E, FortiGate 101F,
FortiGate 1101E, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 401E, FortiGate 4201F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 501E, FortiGate 601E, FortiGate 61E, FortiGate 61F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 91E, FortiGate VM64, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-
POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 1100E,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F,
FortiGate 2200E, FortiGate 300E, FortiGate 3300E, FortiGate 3400E, FortiGate 3500F,
FortiGate 3600E, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 80F 2R.
Option Description
peer If peer-accept is set to one, select the name of one peer string Not
to add to this authentication group. The peer must have Specified
added with the wanopt peer command.
peer-accept Determine if this auth group accepts, any peer, a list of option - any
defined peers, or just one peer.
Option Description
any Accept any peer that can authenticate with this auth group.
defined Accept only the peers added with the wanopt peer command.
one Accept the peer added to this auth group using the peer option.
psk Pre-shared key used by the peers in this authentication password Not
group. Specified
This command is available for model(s): FortiGate 1000D, FortiGate 101E, FortiGate 101F,
FortiGate 1101E, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 401E, FortiGate 4201F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 501E, FortiGate 601E, FortiGate 61E, FortiGate 61F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 91E, FortiGate VM64, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-
POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 1100E,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F,
FortiGate 2200E, FortiGate 300E, FortiGate 3300E, FortiGate 3400E, FortiGate 3500F,
FortiGate 3600E, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 80F 2R.
Option Description
Option Description
device-id Set identifier for this cache device. string Not default_
Specified dev_id
prefer-scenario Set the preferred cache behavior towards the balance option - balance
between latency and hit-ratio.
Option Description
config dst-peer
config src-peer
This command is available for model(s): FortiGate 1000D, FortiGate 101E, FortiGate 101F,
FortiGate 1101E, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 401E, FortiGate 4201F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 501E, FortiGate 601E, FortiGate 61E, FortiGate 61F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 91E, FortiGate VM64, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-
POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 1100E,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F,
FortiGate 2200E, FortiGate 300E, FortiGate 3300E, FortiGate 3400E, FortiGate 3500F,
FortiGate 3600E, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 80F 2R.
Option Description
host-domain- Suffix portion of the fully qualified domain name. For string Maximum
name-suffix example, fortinet.com in "www.fortinet.com". length: 79
<name> Suffix portion of the fully qualified domain name.
Option Description
Option Description
Option Description
Option Description
Option Description
config rules
name WAN optimization content delivery network rule name. string Not
Specified
Option Description
Option Description
config match-entries
Option Description
pattern Pattern string for matching target (Referrer or URL string Maximum
<string> pattern). For example, a, a*c, *a*, a*c*e, and *. length: 79
Pattern strings.
config skip-entries
Option Description
pattern Pattern string for matching target (Referrer or URL string Maximum
<string> pattern). For example, a, a*c, *a*, a*c*e, and *. length: 79
Pattern strings.
config content-id
Option Description
start-skip Number of characters in URL to skip after start-str has integer Minimum 0
been matched. value: 0
Maximum
value:
4294967295
Option Description
end-skip Number of characters in URL to skip after end-str has integer Minimum 0
been matched. value: 0
Maximum
value:
4294967295
Option Description
range-str Name of content ID within the start string and end string Not Specified
string.
This command is available for model(s): FortiGate 1000D, FortiGate 101E, FortiGate 101F,
FortiGate 1101E, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 401E, FortiGate 4201F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 501E, FortiGate 601E, FortiGate 61E, FortiGate 61F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 91E, FortiGate VM64, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-
POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 1100E,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F,
FortiGate 2200E, FortiGate 300E, FortiGate 3300E, FortiGate 3400E, FortiGate 3500F,
FortiGate 3600E, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 80F 2R.
This command is available for model(s): FortiGate 1000D, FortiGate 101E, FortiGate 101F,
FortiGate 1101E, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 401E, FortiGate 4201F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 501E, FortiGate 601E, FortiGate 61E, FortiGate 61F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 91E, FortiGate VM64, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-
POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 1100E,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F,
FortiGate 2200E, FortiGate 300E, FortiGate 3300E, FortiGate 3400E, FortiGate 3500F,
FortiGate 3600E, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 80F 2R.
Option Description
disable Disable transparent mode. Client packets source addresses are changed to
the source address of the FortiGate internal interface. Similar to source NAT.
config cifs
Option Description
secure-tunnel Enable/disable securing the WAN Opt tunnel using option - disable
SSL. Secure and non-secure tunnels use the same TCP
port (7810).
Option Description
Option Description
prefer- Select dynamic or fixed-size data chunking for WAN option - fix
chunking Optimization.
Option Description
dynamic Select dynamic data chunking to help to detect persistent data chunks in a
changed file or in an embedded unknown protocol.
Option Description
Option Description
private For profiles that accept aggressive protocols such as HTTP and FTP so that
these aggressive protocols do not share tunnels with less-aggressive
protocols.
Option Description
Option Description
secure-tunnel Enable/disable securing the WAN Opt tunnel using option - disable
SSL. Secure and non-secure tunnels use the same TCP
port (7810).
Option Description
Option Description
Option Description
prefer- Select dynamic or fixed-size data chunking for WAN option - fix
chunking Optimization.
Option Description
dynamic Select dynamic data chunking to help to detect persistent data chunks in a
changed file or in an embedded unknown protocol.
Option Description
Option Description
private For profiles that accept aggressive protocols such as HTTP and FTP so that
these aggressive protocols do not share tunnels with less-aggressive
protocols.
Option Description
config http
Option Description
secure-tunnel Enable/disable securing the WAN Opt tunnel using option - disable
SSL. Secure and non-secure tunnels use the same TCP
port (7810).
Option Description
Option Description
Option Description
prefer- Select dynamic or fixed-size data chunking for WAN option - fix
chunking Optimization.
Option Description
dynamic Select dynamic data chunking to help to detect persistent data chunks in a
changed file or in an embedded unknown protocol.
Option Description
Option Description
private For profiles that accept aggressive protocols such as HTTP and FTP so that
these aggressive protocols do not share tunnels with less-aggressive
protocols.
Option Description
Option Description
secure-tunnel Enable/disable securing the WAN Opt tunnel using option - disable
SSL. Secure and non-secure tunnels use the same TCP
port (7810).
Option Description
Option Description
Option Description
private For profiles that accept aggressive protocols such as HTTP and FTP so that
these aggressive protocols do not share tunnels with less-aggressive
protocols.
Option Description
Option Description
secure-tunnel Enable/disable securing the WAN Opt tunnel using option - disable
SSL. Secure and non-secure tunnels use the same TCP
port (7810).
Option Description
Option Description
byte-caching- Select whether TCP byte-caching uses system memory option - mem-only
opt only or both memory and disk space.
Option Description
Option Description
private For profiles that accept aggressive protocols such as HTTP and FTP so that
these aggressive protocols do not share tunnels with less-aggressive
protocols.
Option Description
port Port numbers or port number ranges for TCP. Only user Not
packets with a destination port number that matches this Specified
port number or range are accepted by this profile.
Option Description
ssl-port Port numbers or port number ranges on which to expect user Not
HTTPS traffic for SSL/TLS offloading. Specified
This command is available for model(s): FortiGate 1000D, FortiGate 101E, FortiGate 101F,
FortiGate 1101E, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 401E, FortiGate 4201F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 501E, FortiGate 601E, FortiGate 61E, FortiGate 61F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 91E, FortiGate VM64, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-
POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 1100E,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F,
FortiGate 2200E, FortiGate 300E, FortiGate 3300E, FortiGate 3400E, FortiGate 3500F,
FortiGate 3600E, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 80F 2R.
local-cache-id ID that this device uses to connect to the remote device. string Not
Specified
remote- ID of the remote device to which the device connects. string Not
cache-id Specified
remote- IP address of the remote device to which the device ipv4- Not 0.0.0.0
cache-ip connects. address- Specified
any
Option Description
This command is available for model(s): FortiGate 1000D, FortiGate 101E, FortiGate 101F,
FortiGate 1101E, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 401E, FortiGate 4201F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 501E, FortiGate 601E, FortiGate 61E, FortiGate 61F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 91E, FortiGate VM64, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-
POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 1100E,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F,
FortiGate 2200E, FortiGate 300E, FortiGate 3300E, FortiGate 3400E, FortiGate 3500F,
FortiGate 3600E, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 80F 2R.
Option Description
simple Use the same TCP option value in SYN/SYNACK packets. Backward
compatible.
diff-req-resp Use different TCP option values in SYN/SYNACK packets to avoid false
positive detection.
host-id Local host ID (must also be entered in the remote string Not default-id
FortiGate's peer list). Specified
Option Description
balanced Optimize tunnel to balance between system memory usage and throughput.
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
This command is available for model(s): FortiGate 1000D, FortiGate 101E, FortiGate 101F,
FortiGate 1101E, FortiGate 1200D, FortiGate 1500DT, FortiGate 1500D, FortiGate 1801F,
FortiGate 2000E, FortiGate 201E, FortiGate 201F, FortiGate 2201E, FortiGate 2500E,
FortiGate 2600F, FortiGate 2601F, FortiGate 3000D, FortiGate 301E, FortiGate 3100D,
FortiGate 3200D, FortiGate 3301E, FortiGate 3401E, FortiGate 3501F, FortiGate 3601E,
FortiGate 3700D, FortiGate 3800D, FortiGate 401E, FortiGate 4201F, FortiGate 4401F,
FortiGate 5001E1, FortiGate 501E, FortiGate 601E, FortiGate 61E, FortiGate 61F, FortiGate
800D, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate
900D, FortiGate 91E, FortiGate VM64, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 81F 2R 3G4G-
POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.
It is not available for: FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 1100E,
FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 200E, FortiGate 200F,
FortiGate 2200E, FortiGate 300E, FortiGate 3300E, FortiGate 3400E, FortiGate 3500F,
FortiGate 3600E, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E,
FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4400F, FortiGate 5001E,
FortiGate 500E, FortiGate 600E, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-
POE, FortiGate 60E, FortiGate 60F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F
Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 90E, FortiGateRugged 60F 3G4G,
FortiGateRugged 60F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSL, FortiWiFi 60E,
FortiWiFi 60F, FortiWiFi 80F 2R.
Option Description
Option Description
Option Description
Option Description
default-ttl Default object expiry time. This only applies to those integer Minimum 1440
objects that do not have an expiry time set by the web value: 1
server. Maximum
value:
5256000
Option Description
fresh-factor Frequency that the server is checked to see if any integer Minimum 100
objects have expired. The higher the fresh factor, the value: 1
less often the checks occur. Maximum
value: 100
Option Description
Option Description
Option Description
Option Description
Option Description
max-object- Maximum cacheable object size in kB. All objects that integer Minimum 512000
size exceed this are delivered to the client but not stored in value: 1
the web cache. Maximum
value:
2147483
max-ttl Maximum time an object can stay in the web cache integer Minimum 7200
without checking to see if it has expired on the server. value: 1
Maximum
value:
5256000
min-ttl Minimum time an object can stay in the web cache integer Minimum 5
without checking to see if it has expired on the server. value: 1
Maximum
value:
5256000
Option Description
Option Description
Option Description
Option Description
http-incoming- Accept incoming HTTP requests on one or more ports. user Not
port Specified
Option Description
incoming-ip Restrict the explicit HTTP proxy to only accept ipv4- Not 0.0.0.0
sessions from this IP address. An interface must have address- Specified
this IP address. any
incoming-ip6 Restrict the explicit web proxy to only accept sessions ipv6- Not ::
from this IPv6 address. An interface must have this address Specified
IPv6 address.
Option Description
Option Description
outgoing-ip Outgoing HTTP requests will have this IP address as ipv4- Not
their source address. An interface must have this IP address- Specified
address. any
outgoing-ip6 Outgoing HTTP requests will leave this IPv6. Multiple ipv6- Not
interfaces can be specified. Interfaces must have address Specified
these IPv6 addresses.
pac-file-server- Port number that PAC traffic from client web browsers user Not
port uses to connect to the explicit web proxy. Specified
Option Description
pref-dns-result Prefer resolving addresses using the configured IPv4 option - ipv4
or IPv6 DNS server.
Option Description
realm Authentication realm used to identify the explicit web string Not default
proxy (maximum of 63 characters). Specified
sec-default- Accept or deny explicit web proxy sessions when no option - deny
action web proxy firewall policy exists.
Option Description
accept Accept requests. All explicit web proxy traffic is accepted whether there is an
explicit web proxy policy or not.
deny Deny requests unless there is a matching explicit web proxy policy.
Option Description
Option Description
low Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
status Enable/disable the explicit Web proxy for HTTP and option - disable
HTTPS session.
Option Description
Option Description
Option Description
unknown-http- How to handle HTTP sessions that do not comply with option - reject
version HTTP 0.9, 1.0, or 1.1.
Option Description
reject Reject or tear down HTTP sessions that do not use HTTP 0.9, 1.0, or 1.1.
best-effort Assume all HTTP sessions comply with HTTP 0.9, 1.0, or 1.1. If a session
uses a different HTTP version, it may not parse correctly and the connection
may be lost.
config pac-policy
Option Description
Configure a forward server group consisting or multiple forward servers. Supports failover and load balancing.
config web-proxy forward-server-group
Description: Configure a forward server group consisting or multiple forward servers.
Supports failover and load balancing.
edit <name>
set affinity [enable|disable]
set group-down-option [block|pass]
set ldb-method [weighted|least-session|...]
set name {string}
config server-list
Description: Add web forward servers to a list to form a server group.
Optionally assign weights to each server.
edit <name>
set name {string}
set weight {integer}
next
end
next
end
Option Description
group-down- Action to take when all of the servers in the forward option - block
option server group are down: block sessions until at least one
server is back up or pass sessions to their destination.
Option Description
block Block sessions until at least one server in the group is back up.
pass Pass sessions to their destination bypassing servers in the forward server
group.
Option Description
weighted Load balance traffic to forward servers based on assigned weights. Weights
are ratios of total number of sessions.
least-session Send new sessions to the server with lowest session count.
active-passive Send new sessions to the next active server in the list. Servers are selected
with highest weight first and then in order as they are configured. Traffic
switches back to the first server upon failure recovery.
config server-list
weight Optionally assign a weight of the forwarding server for integer Minimum 10
weighted load balancing. value: 1
Maximum
value: 100
Option Description
Option Description
monitor URL for forward server health check string Not http://www.google.com
monitoring. Specified
port Port number that the forwarding server integer Minimum 3128
expects to receive HTTP sessions on. value: 1
Maximum
value:
65535
Option Description
fast-policy- Enable/disable fast matching algorithm for explicit and option - enable
match transparent proxy policy.
Option Description
Option Description
forward- Period of time before the source IP's traffic is no integer Minimum 30
server- longer assigned to the forwarding server. value: 6
affinity- Maximum
timeout value: 60
ldap-user- Enable/disable LDAP user cache for explicit and option - disable
cache transparent proxy user.
Option Description
Option Description
Option Description
learn-client- IPv6 Source address name (srcaddr or srcaddr6 must string Maximum
ip-srcaddr6 be set). length: 79
<name> Address name.
proxy-fqdn Fully Qualified Domain Name to connect to the explicit string Not default.fqdn
web proxy. Specified
strict-web- Enable/disable strict web checking to block web sites option - disable
check that send incorrect headers that don't conform to
HTTP 1.1.
Option Description
webproxy- Name of the web proxy profile to apply when explicit string Not
profile proxy traffic is allowed by default and traffic is Specified
accepted that does not match an explicit proxy policy.
Option Description
Option Description
header-via- Action to take on the HTTP via header in forwarded option - pass
request requests: forwards (pass), adds, or removes the
HTTP header.
Option Description
header-via- Action to take on the HTTP via header in forwarded option - pass
response responses: forwards (pass), adds, or removes the
HTTP header.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config headers
dstaddr6 Destination address and address group names (IPv6). string Maximum
<name> Address name. length: 79
Option Description
Option Description
Option Description
append Append content to existing HTTP header or create new header if HTTP
header is not found.
new-on-not- Create new header only if existing HTTP header is not found.
found
new Create new header regardless if existing HTTP header is found or not.
Option Description
Option Description
status Enable/disable exempting the URLs matching the URL option - enable
pattern from web proxy forwarding and caching.
Option Description
url-pattern URL pattern to be exempted from web proxy forwarding string Not
and caching. Specified
timeout Period of time before WISP requests time out. integer Minimum 5
value: 1
Maximum
value: 15
config entries
Option Description
category Categories that this content type applies to. user Not all
Specified
config entries
pattern-type Banned word pattern type: wildcard pattern or Perl option - wildcard
regular expression.
Option Description
Option Description
Option Description
western Western.
Option Description
japanese Japanese.
korean Korean.
french French.
thai Thai.
spanish Spanish.
cyrillic Cyrillic.
score Score, to be applied every time the word appears on a integer Minimum 10
web page. value: 0
Maximum
value:
4294967295
Option Description
Option Description
Option Description
Option Description
Option Description
ovrd-auth- Port to use for FortiGuard Web Filter HTTP override integer Minimum 8008
port-http authentication. value: 0
Maximum
value:
65535
ovrd-auth- Port to use for FortiGuard Web Filter HTTPS override integer Minimum 8010
port-https authentication in proxy mode. value: 0
Maximum
value:
65535
ovrd-auth- Port to use for FortiGuard Web Filter HTTPS override integer Minimum 8015
port-https- authentication in flow mode. value: 0
flow Maximum
value:
65535
ovrd-auth- Port to use for FortiGuard Web Filter Warning override integer Minimum 8020
port-warning authentication. value: 0
Maximum
value:
65535
request- Limit size of URL request packets sent to FortiGuard integer Minimum 0
packet-size- server. value: 576
limit Maximum
value:
10000
Option Description
Option Description
Option Description
dns-retry- Retry interval. Refresh DNS faster than TTL to capture integer Minimum 0
interval multiple IPs for hosts. 0 means use DNS server's TTL value: 0
only. Maximum
value:
2147483
extended-ttl Extend time to live beyond reported by DNS. Use of 0 integer Minimum 0
means use DNS server's TTL. value: 0
Maximum
value:
2147483
geo-filter Filter based on geographical location. Route will NOT var-string Not
be installed if the resolved IP address belongs to the Specified
country in the filter.
geo-filter Filter based on geographical location. Route will NOT var-string Not
be installed if the resolved IPv6 address belongs to the Specified
country in the filter.
expires Override expiration date and time, from 5 minutes to user Not Specified 1969/12/31
365 from now (format: yyyy/mm/dd hh:mm:ss). 16:00:00 **
ip IPv4 address which the override applies. ipv4- Not Specified 0.0.0.0
address
ip6 IPv6 address which the override applies. ipv6- Not Specified ::
address
new-profile Name of the new web filter profile used by the string Not Specified
override.
old-profile Name of the web filter profile which the override string Not Specified
applies.
scope Override either the specific user, user group, IPv4 option - user
address, or IPv6 address.
Option Description
Option Description
user Name of the user which the override applies. string Not Specified
user-group Specify the user group for which the override string Not Specified
applies.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
js JS block.
Option Description
Option Description
Option Description
Option Description
web-extended- Enable/disable extended any filter action logging for option - disable
all-action-log web filtering.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
config antiphish
Option Description
Option Description
Option Description
enable Enable checking of GET URI for username and password fields.
disable Disable checking of GET URI for username and password fields.
Option Description
enable Enable checking of HTTP Basic Auth field for known credentials.
disable Disable checking of HTTP Basic Auth field for known credentials.
Option Description
max-body-len Maximum size of a POST body to check for integer Minimum 65536
credentials. value: 0
Maximum
value:
4294967295
Option Description
domain- Domain for which to verify received credentials string Not Specified
controller against.
ldap LDAP server for which to verify received string Not Specified
credentials against.
config inspection-entries
Option Description
config custom-patterns
Option Description
type Pattern will be treated either as a regex pattern or literal option - regex
string.
Option Description
config ftgd-wf
Option Description
max-quota- Maximum FortiGuard quota used by single page view in integer Minimum 300
timeout seconds (excludes streams). value: 1
Maximum
value:
86400
Option Description
Option Description
Option Description
config filters
Option Description
Option Description
Option Description
Option Description
config quota
Option Description
Option Description
B Quota in bytes.
KB Quota in kilobytes.
MB Quota in megabytes.
GB Quota in gigabytes.
config override
Option Description
Option Description
Option Description
Option Description
profile- Profile attribute to retrieve from the RADIUS server. option - Login-LAT-
attribute Service
Option Description
Option Description
ovrd-user- User groups with permission to use the override. string Maximum
group User group name. length: 79
<name>
profile Web filter profile with permission to create overrides. string Maximum
<name> Web profile. length: 79
config web
Option Description
Option Description
Option Description
Option Description
vimeo-restrict Set Vimeo-restrict ("7" = don't show mature content, string Not Specified
"134" = don't show unrated and mature content). A
value of cookie "content_rating".
Option Description
Option Description
Option Description
query Code used to prefix a query (must end with an equals string Not
character). Specified
safesearch Safe search method. You can disable safe search, add option - disable
the safe search string to URLs, or insert a safe search
header.
Option Description
Option Description
one-arm-ips- Enable/disable DNS resolver for one-arm IPS URL option - disable
urlfilter filter operation.
Option Description
enable Enable DNS resolver for one-arm IPS URL filter operation.
disable Disable DNS resolver for one-arm IPS URL filter operation.
Option Description
Option Description
Option Description
Option Description
exempt If action is set to exempt, select the security profile option - av web-
operations that exempt URLs skip. Separate multiple content
options with a space. activex-
java-cookie
dlp
fortiguard
range-block
antiphish all
Option Description
av AntiVirus scanning.
dns-address- Resolve IPv4 address, IPv6 address, or both from option - ipv4
family DNS server.
Option Description
both Resolve both IPv4 and IPv6 addresses from DNS server.
config layer3-ipv4-rules
Option Description
config layer3-ipv6-rules
srcaddr Source IPv6 address (any | local-LAN | IPv6 address user Not
[/prefix length]), default = any. Specified
Option Description
policy Allow or block the client with this MAC address. option - deny
Option Description
default-policy Allow or block the clients with MAC addresses that are option - allow
not in the group.
Option Description
allow Allow the clients with MAC addresses that are not in the group.
deny Block the clients with MAC addresses that are not in the group.
Option Description
ac-ip IP address of the validation controller that AP must be ipv4- Not 0.0.0.0
able to join after applying AP local configuration. address Specified
ac-port Port of the validation controller that AP must be able to integer Minimum 0
join after applying AP local configuration. value: 1024
Maximum
value:
49150
ac-timer Maximum waiting time for the AP to join the validation integer Minimum 10
controller after applying AP local configuration. value: 3
Maximum
value: 30
Option Description
default This controller is the one and only controller that the AP could join after
applying AP local configuration.
Option Description
specify Specified controller is the one and only controller that the AP could join after
applying AP local configuration.
Option Description
config command-list
Option Description
darrp- Time for running Dynamic Automatic Radio Resource integer Minimum 86400
optimize Provisioning. value: 0
Maximum
value:
86400
darrp- Firewall schedules for DARRP running time. DARRP string Maximum
optimize- will run periodically based on darrp-optimize within the length: 35
schedules schedules. Separate multiple schedule names with a
<name> space.
Schedule name.
Option Description
Option Description
monitor- Period in seconds to measure average transmit retries integer Minimum 300
period and receive errors. value: 0
Maximum
value:
65535
Option Description
selection- Period in seconds to measure average channel load, integer Minimum 3600
period noise floor, spectral RSSI. value: 0
Maximum
value:
65535
threshold- Threshold in dBm to reject channel in DARRP channel string Not -85
noise-floor selection phase 1 due to noise floor. Specified
threshold- Threshold in dBm to reject channel in DARRP channel string Not -65
spectral-rssi selection phase 1 due to spectral RSSI. Specified
threshold-tx- Threshold in percentage for transmit retries to trigger integer Minimum 300
retries channel reselection in DARRP monitor stage. value: 0
Maximum
value: 1000
weight- Weight in DARRP channel score calculation for channel integer Minimum 20
channel-load load. value: 0
Maximum
value: 2000
weight-dfs- Weight in DARRP channel score calculation for DFS integer Minimum 500
channel channel. value: 0
Maximum
value: 2000
weight-noise- Weight in DARRP channel score calculation for noise integer Minimum 40
floor floor. value: 0
Maximum
value: 2000
weight-rogue- Weight in DARRP channel score calculation for rogue integer Minimum 10
ap APs. value: 0
Maximum
value: 2000
weight- Weight in DARRP channel score calculation for spectral integer Minimum 40
spectral-rssi RSSI. value: 0
Maximum
value: 2000
weight- Weight in DARRP channel score calculation for weather integer Minimum 1000
weather- channel. value: 0
channel Maximum
value: 2000
Option Description
Option Description
Option Description
Configure Bonjour profiles. Bonjour is Apple's zero configuration networking protocol. Bonjour profiles allow APs and
FortiAPs to connnect to networks using Bonjour.
config wireless-controller bonjour-profile
Description: Configure Bonjour profiles. Bonjour is Apple's zero configuration
networking protocol. Bonjour profiles allow APs and FortiAPs to connnect to networks using
Bonjour.
edit <name>
set comment {string}
set name {string}
config policy-list
Description: Bonjour policy list.
edit <policy-id>
set policy-id {integer}
set description {string}
set from-vlan {string}
set to-vlan {string}
set services {option1}, {option2}, ...
next
end
next
end
config policy-list
from-vlan VLAN ID from which the Bonjour service is advertised. string Not 0
Specified
to-vlan VLAN ID to which the Bonjour service is made available. string Not all
Specified
services Bonjour services for the VLAN connecting to the option - all
Bonjour network.
Option Description
airplay AirPlay.
bit-torrent BitTorrent.
ftp FTP.
ichat iChat.
itunes iTunes.
printers Printers.
samba Samba.
scanners Scanners.
ssh SSH.
chromecast ChromeCast.
Option Description
ap-log-server- IP address that FortiGate or FortiAPs send log ipv4- Not Specified 0.0.0.0
ip messages to. address
ap-log-server- Port that FortiGate or FortiAPs send log messages integer Minimum 0
port to. value: 0
Maximum
value: 65535
Option Description
Option Description
disable Use 802.3 Ethernet frames with 802.3 data tunnel mode.
fiapp-eth-type Ethernet type for Fortinet Inter-Access Point integer Minimum 5252
Protocol. value: 0
Maximum
value: 65535
Option Description
ipsec-base-ip Base IP address for IPsec VPN tunnels between ipv4- Not Specified 169.254.0.1
the access points and the wireless controller. address
Option Description
local-radio- Assign local radio's virtual domain. string Not Specified root
vdom *
nac-interval Interval in seconds between two WiFi network integer Minimum 120
access control. value: 10
Maximum
value: 600
Option Description
Option Description
Option Description
Option Description
port-restricted- Port-restricted IPv4 address and single NATed IPv4 address available.
and-single-
NATed
port-restricted- Port-restricted IPv4 address and double NATed IPv4 address available.
and-double-
NATed
Option Description
config nai-list
Option Description
config eap-method
Option Description
eap-identity Identity.
eap-md5 MD5.
eap-tls TLS.
Option Description
eap-ttls TTLS.
eap-peap PEAP.
eap-sim SIM.
eap-aka AKA.
eap-aka-prime AKA'.
config auth-param
Option Description
Option Description
Option Description
Option Description
config oi-list
config value-list
Option Description
config plan-info
esp-port Set ESP port service (used by IPsec VPNs) status. option - unknown
Option Description
Option Description
Option Description
Option Description
ikev2-port Set IKEv2 port service for IPsec VPN status. option - unknown
Option Description
ikev2-xx-port Set UDP port 4500 (which may be used by IKEv2 for option - unknown
IPsec VPN) service status.
Option Description
pptp-vpn-port Set Point to Point Tunneling Protocol (PPTP) VPN port option - unknown
service status.
Option Description
Option Description
tls-port Set TLS VPN (HTTPS) port service status. option - unknown
Option Description
Option Description
Option Description
config nai-list
Option Description
reserved Reserved.
config service-description
Option Description
Option Description
up Link up.
Option Description
symmetric Symmetric WAN link (uplink and downlink speeds are the same).
asymmetric Asymmetric WAN link (uplink and downlink speeds are not the same).
Option Description
Option Description
Option Description
Option Description
wildcard Wildcard.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
unspecified Unspecified.
assembly Assembly.
business Business.
educational Educational.
institutional Institutional.
mercantile Mercantile.
residential Residential.
storage Storage.
vehicular Vehicular.
outdoor Outdoor.
Option Description
unspecified Unspecified.
arena Arena.
stadium Stadium.
Option Description
amphitheater Amphitheater.
library Library.
museum Museum.
restaurant Restaurant.
theater Theater.
bar Bar.
bank Bank.
Option Description
factory Factory.
hospital Hospital.
dormitory Dormitory.
airplane Airplane.
bus Bus.
ferry Ferry.
train Train.
Option Description
kiosk Kiosk.
Option Description
Option Description
config dscp-except
config dscp-range
Option Description
Option Description
config inter-controller-peer
peer-port Port used by the wireless controller's for inter- integer Minimum 5246
controller communications. value: 1024
Maximum
value: 49150
Option Description
addrgrp-log Lowest severity level to log address group message. option - notification
Option Description
ble-log Lowest severity level to log BLE detection message. option - notification
Option Description
clb-log Lowest severity level to log client load balancing option - notification
message.
Option Description
dhcp-starv- Lowest severity level to log DHCP starvation event option - notification
log message.
Option Description
Option Description
led-sched-log Lowest severity level to log LED schedule event option - notification
message.
Option Description
radio-event- Lowest severity level to log radio event message. option - notification
log
Option Description
rogue-event- Lowest severity level to log rogue AP event message. option - notification
log
Option Description
Option Description
sta-event-log Lowest severity level to log station event message. option - notification
Option Description
sta-locate-log Lowest severity level to log station locate message. option - notification
Option Description
Option Description
Option Description
wtp-event-log Lowest severity level to log WTP event message. option - notification
Option Description
config mpsk-group
Option Description
no-vlan No VLAN.
Option Description
unlimited Unlimited.
concurrent- Number of clients that can connect using this integer Minimum 256
clients pre-shared key. value: 1
Maximum
value:
65535
Option Description
Option Description
Option Description
downlink Maximum downlink bandwidth for Virtual Access Points. integer Minimum 0
value: 0
Maximum
value:
2097152
dscp-wmm-be DSCP mapping for best effort access (default = 0 24). integer Minimum
<id> DSCP WMM mapping numbers (0 - 63). value: 0
Maximum
value: 63
dscp-wmm-bk DSCP mapping for background access (default = 8 16). integer Minimum
<id> DSCP WMM mapping numbers (0 - 63). value: 0
Maximum
value: 63
Option Description
dscp-wmm-vi DSCP mapping for video access (default = 32 40). integer Minimum
<id> DSCP WMM mapping numbers (0 - 63). value: 0
Maximum
value: 63
dscp-wmm-vo DSCP mapping for voice access (default = 48 56). integer Minimum
<id> DSCP WMM mapping numbers (0 - 63). value: 0
Maximum
value: 63
uplink Maximum uplink bandwidth for Virtual Access Points. integer Minimum 0
value: 0
Maximum
value:
2097152
Option Description
Option Description
Option Description
enable Enable WMM Unscheduled Automatic Power Save Delivery (U-APSD) power
save mode.
disable Disable WMM Unscheduled Automatic Power Save Delivery (U-APSD) power
save mode.
Option Description
Option Description
-- NO_COUNTRY_SET
AF AFGHANISTAN
AL ALBANIA
Option Description
DZ ALGERIA
AS AMERICAN SAMOA
AO ANGOLA
AR ARGENTINA
AM ARMENIA
AU AUSTRALIA
AT AUSTRIA
AZ AZERBAIJAN
BS BAHAMAS
BH BAHRAIN
BD BANGLADESH
BB BARBADOS
BY BELARUS
BE BELGIUM
BZ BELIZE
BJ BENIN
BM BERMUDA
BT BHUTAN
BO BOLIVIA
BW BOTSWANA
BR BRAZIL
BN BRUNEI DARUSSALAM
BG BULGARIA
BF BURKINA-FASO
KH CAMBODIA
CM CAMEROON
KY CAYMAN ISLANDS
Option Description
TD CHAD
CL CHILE
CN CHINA
CX CHRISTMAS ISLAND
CO COLOMBIA
CG CONGO REPUBLIC
CR COSTA RICA
HR CROATIA
CY CYPRUS
CZ CZECH REPUBLIC
DK DENMARK
DM DOMINICA
DO DOMINICAN REPUBLIC
EC ECUADOR
EG EGYPT
SV EL SALVADOR
ET ETHIOPIA
EE ESTONIA
GF FRENCH GUIANA
PF FRENCH POLYNESIA
FO FAEROE ISLANDS
FJ FIJI
FI FINLAND
FR FRANCE
GE GEORGIA
DE GERMANY
GH GHANA
GI GIBRALTAR
Option Description
GR GREECE
GL GREENLAND
GD GRENADA
GP GUADELOUPE
GU GUAM
GT GUATEMALA
GY GUYANA
HT HAITI
HN HONDURAS
HK HONG KONG
HU HUNGARY
IS ICELAND
IN INDIA
ID INDONESIA
IQ IRAQ
IE IRELAND
IM ISLE OF MAN
IL ISRAEL
IT ITALY
CI COTE_D_IVOIRE
JM JAMAICA
JO JORDAN
KZ KAZAKHSTAN
KE KENYA
KR KOREA REPUBLIC
KW KUWAIT
LA LAOS
LV LATVIA
LB LEBANON
Option Description
LS LESOTHO
LY LIBYA
LI LIECHTENSTEIN
LT LITHUANIA
LU LUXEMBOURG
MO MACAU SAR
MK MACEDONIA, FYRO
MG MADAGASCAR
MW MALAWI
MY MALAYSIA
MV MALDIVES
ML MALI
MT MALTA
MH MARSHALL ISLANDS
MQ MARTINIQUE
MR MAURITANIA
MU MAURITIUS
YT MAYOTTE
MX MEXICO
FM MICRONESIA
MD REPUBLIC OF MOLDOVA
MC MONACO
MN MONGOLIA
MA MOROCCO
MZ MOZAMBIQUE
MM MYANMAR
NA NAMIBIA
NP NEPAL
NL NETHERLANDS
Option Description
AN NETHERLANDS ANTILLES
AW ARUBA
NZ NEW ZEALAND
NI NICARAGUA
NE NIGER
NO NORWAY
OM OMAN
PK PAKISTAN
PW PALAU
PA PANAMA
PY PARAGUAY
PE PERU
PH PHILIPPINES
PL POLAND
PT PORTUGAL
PR PUERTO RICO
QA QATAR
RE REUNION
RO ROMANIA
RU RUSSIA
RW RWANDA
BL SAINT BARTHELEMY
LC SAINT LUCIA
MF SAINT MARTIN
Option Description
SA SAUDI ARABIA
SN SENEGAL
RS REPUBLIC OF SERBIA
ME MONTENEGRO
SL SIERRA LEONE
SG SINGAPORE
SK SLOVAKIA
SI SLOVENIA
ZA SOUTH AFRICA
ES SPAIN
LK SRI LANKA
SE SWEDEN
SR SURINAME
CH SWITZERLAND
TW TAIWAN
TZ TANZANIA
TH THAILAND
TG TOGO
TN TUNISIA
TR TURKEY
TM TURKMENISTAN
UG UGANDA
UA UKRAINE
GB UNITED KINGDOM
US UNITED STATES2
Option Description
UY URUGUAY
UZ UZBEKISTAN
VU VANUATU
VE VENEZUELA
VN VIET NAM
VI VIRGIN ISLANDS
YE YEMEN
ZM ZAMBIA
ZW ZIMBABWE
JP JAPAN14
CA CANADA2
darrp-optimize Time for running Dynamic Automatic Radio Resource integer Minimum 86400
Provisioning. value: 0
Maximum
value:
86400
darrp-optimize- Firewall schedules for DARRP running time. DARRP string Maximum
schedules will run periodically based on darrp-optimize within the length: 35
<name> schedules. Separate multiple schedule names with a
space.
Schedule name.
device-holdoff Lower limit of creation time of device for identification integer Minimum 5
in minutes. value: 0
Maximum
value: 60
device-idle Upper limit of idle time of device for identification in integer Minimum 1440
minutes. value: 0
Maximum
value:
14400
Option Description
enable Allow VAPs to use the same SSID name in the same VDOM.
disable Do not allow VAPs to use the same SSID name in the same VDOM.
Option Description
Option Description
Option Description
Option Description
Option Description
ssid-pattern Define offending SSID pattern (case insensitive). For string Not
example, word, word*, *word, wo*rd. Specified
Option Description
Configure SNMP.
config wireless-controller snmp
Description: Configure SNMP.
config community
Description: SNMP Community Configuration.
edit <id>
set id {integer}
set name {string}
set status [enable|disable]
set query-v1-status [enable|disable]
set query-v2c-status [enable|disable]
set trap-v1-status [enable|disable]
set trap-v2c-status [enable|disable]
config hosts
Description: Configure IPv4 SNMP managers (hosts).
edit <id>
set id {integer}
set ip {user}
next
end
next
end
set contact-info {string}
set engine-id {string}
set trap-high-cpu-threshold {integer}
set trap-high-mem-threshold {integer}
config user
Description: SNMP User Configuration.
edit <name>
set name {string}
config community
Option Description
Option Description
Option Description
Option Description
Option Description
config hosts
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
log-level Lowest level of log messages that FortiAP units send option - information
to this server.
Option Description
emergency Level 0
alert Level 1
critical Level 2
error Level 3
warning Level 4
notification Level 5
information Level 6
debugging Level 7
Option Description
ip IPv4 address.
server-fqdn FQDN of syslog server that FortiAP units send log string Not
messages to. Specified
server-ip IP address of syslog server that FortiAP units send log ipv4- Not 0.0.0.0
messages to. address Specified
server-port Port number of syslog server that FortiAP units send integer Minimum 514
log messages to. value: 0
Maximum
value:
65535
Option Description
client-idle- Time after which a client is considered idle and times integer Minimum 300
timeout out. value: 20
Maximum
value: 3600
echo-interval Time between echo requests sent by the managed integer Minimum 30
WTP, AP, or FortiAP. value: 1
Maximum
value: 255
fake-ap-log Time between recording logs about fake APs if integer Minimum 1
periodic fake AP logging is configured. value: 1
Maximum
value: 1440
ipsec-intf- Time period to keep IPsec VPN interfaces up after integer Minimum 120
cleanup WTP sessions are disconnected. value: 30
Maximum
value: 3600
sta-locate- Time between running client presence flushes to integer Minimum 1800
timer remove clients that are listed but no longer present. value: 0
Maximum
value: 86400
Option Description
Option Description
vaps <name> List of SSIDs to be included in the VAP group. string Maximum
VAP name. length: 35
Option Description
Option Description
Option Description
name AP name.
Option Description
Option Description
Option Description
netbios-ns Suppress NetBIOS name services packets with UDP port 137.
netbios-ds Suppress NetBIOS datagram services packets with UDP port 138.
Option Description
Option Description
bstm-rssi- Time interval for client to voluntarily leave AP integer Minimum 200
disassoc-timer before forcing a disassociation due to low value: 1
RSSI. Maximum
value: 2000
captive-portal- Hard timeout - AP will always clear the session integer Minimum 0
auth-timeout after timeout regardless of traffic. value: 0
Maximum
value: 864000
Option Description
enable Enable DHCP enforcement, data from clients that have not completed the
DHCP process will be blocked.
disable Disable DHCP enforcement, clients can access the network without DHCP
process.
dhcp-lease-time DHCP lease time in seconds for NAT IP integer Minimum 2400
address. value: 300
Maximum
value:
8640000
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
ft-r0-key-lifetime Lifetime of the PMK-R0 key in FT, 1-65535 integer Minimum 480
minutes. value: 1
Maximum
value: 65535
Option Description
Option Description
Option Description
Option Description
Option Description
ip IP address and subnet mask for the local ipv4- Not Specified 0.0.0.0
standalone NAT subnet. classnet-host 0.0.0.0
Option Description
drop-icmp6ra Drop ICMP6 Router Advertisement (RA) packets that originate from
wireless clients.
drop-icmp6rs Drop ICMP6 Router Solicitation (RS) packets to be sent to wireless clients.
drop-dhcp6s Drop DHCP6 server generated packets that originate from wireless clients.
ndp-proxy Enable IPv6 ndp proxy - send back na on behalf of the client and drop the
ns.
drop-ns-dad Drop ICMP6 NS-DAD when target address is not found in ndp proxy cache.
drop-ns-nondad Drop ICMP6 NS-NonDAD when target address is not found in ndp proxy
cache.
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
local-standalone- IPv4 addresses for the local standalone DNS. ipv4-address Not Specified
dns-ip
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
mac-filter-policy- Allow or block clients with MAC addresses that option - allow
other are not in the filter list.
Option Description
allow Allow clients with MAC addresses that are not in the filter list.
deny Block clients with MAC addresses that are not in the filter list.
Option Description
Option Description
Option Description
Option Description
excluded Wi-Fi Agile Multiband AP does not want the Wi-Fi Agile Multiband STA to
use the cellular data connection.
prefer-not Wi-Fi Agile Multiband AP prefers the Wi-Fi Agile Multiband STA should not
use cellular data connection.
prefer-use Wi-Fi Agile Multiband AP prefers the Wi-Fi Agile Multiband STA should use
cellular data connection.
Option Description
Option Description
Option Description
Option Description
6000 6 Mbps.
12000 12 Mbps.
24000 24 Mbps.
Option Description
Option Description
Option Description
Option Description
Option Description
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
Option Description
Option Description
Option Description
port-macauth- LAN port MAC authentication idle timeout integer Minimum 600
timeout value. value: 60
Maximum
value: 65535
portal-message- Replacement message group for this VAP string Not Specified
override-group (only available when security is set to a captive
portal type).
Option Description
primary-wag- Primary wireless access gateway profile name. string Not Specified
profile
Option Description
Option Description
Option Description
Option Description
Option Description
radius-mac-auth- Selective user groups that are permitted for string Maximum
usergroups RADIUS mac authentication. length: 79
<name> User group name.
Option Description
radius-mac- RADIUS MAC MPSK cache timeout interval. integer Minimum 86400
mpsk-timeout value: 300
Maximum
value: 864000
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
19 DH Group 19.
20 DH Group 20.
21 DH Group 21.
Option Description
Option Description
sae-private-key Private key used for WPA3 SAE-PK string Not Specified
authentication.
Option Description
schedule Firewall schedules for enabling this VAP on the string Maximum
<name> FortiAP. This VAP will be enabled when at least length: 35
one of the schedules is valid. Separate multiple
schedule names with a space.
Schedule name.
Option Description
open Open.
Option Description
osen OSEN.
security-exempt- Optional security exempt list for captive portal string Not Specified
list authentication.
security-redirect- Optional URL for redirecting users after they var-string Not Specified
url pass captive portal authentication.
Option Description
ssid IEEE 802.11 service set identifier (SSID) for string Not Specified fortinet
the wireless interface. Users who wish to use
the wireless network must configure their
computers to access this SSID name.
Option Description
Option Description
Option Description
tunnel-echo- The time interval to send echo to both primary integer Minimum 300
interval and secondary tunnel peers. value: 1
Maximum
value: 65535
tunnel-fallback- The time interval for secondary tunnel to fall integer Minimum 7200
interval back to primary tunnel. value: 0
Maximum
value: 65535
Option Description
Option Description
Option Description
Option Description
Option Description
config mac-filter-list
mac-filter- Deny or allow the client with this MAC option - deny
policy address.
Option Description
config portal-message-overrides
config vlan-pool
Configure wireless access gateway (WAG) profiles used for tunnels on AP.
config wireless-controller wag-profile
Description: Configure wireless access gateway (WAG) profiles used for tunnels on AP.
edit <name>
set comment {var-string}
set dhcp-ip-addr {ipv4-address}
set name {string}
set ping-interval {integer}
set ping-number {integer}
set return-packet-timeout {integer}
set tunnel-type [l2tpv3|gre]
set wag-ip {ipv4-address}
set wag-port {integer}
next
end
dhcp-ip-addr IP address of the monitoring DHCP request packet sent ipv4- Not 0.0.0.0
through the tunnel. address Specified
ping-interval Interval between two tunnel monitoring echo packets. integer Minimum 1
value: 1
Maximum
value:
65535
return-packet- Window of time for the return packets from the tunnel's integer Minimum 160
timeout remote end. value: 1
Maximum
value:
65535
Option Description
wag-port UDP port of the wireless access gateway. integer Minimum 1701
value: 0
Maximum
value:
65535
Option Description
ap-bgscan- Firewall schedules for turning off FortiAP radio string Maximum
disable- background scan. Background scan will be disabled length: 35
schedules when at least one of the schedules is valid. Separate
<name> multiple schedule names with a space.
Schedule name.
ap-bgscan- Wait time for channel inactivity before scanning this integer Minimum 20
idle channel. value: 0
Maximum
value: 1000
Option Description
Option Description
ap-scan- Minimum signal level/threshold in dBm required for the string Not -90
threshold AP to report detected rogue AP. Specified
Option Description
assoc-flood- The threshold value for association frame flooding. integer Minimum 30
thresh value: 1
Maximum
value: 100
Option Description
auth-flood- The threshold value for authentication frame flooding. integer Minimum 30
thresh value: 1
Maximum
value: 100
Option Description
Option Description
deauth- Threshold value per second to deauth unknown src for integer Minimum 10
unknown-src- DoS attack (0: no limit). value: 0
thresh Maximum
value:
65535
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
Option Description
long-duration- Threshold value for long duration attack detection. integer Minimum 8200
thresh value: 1000
Maximum
value:
32767
Option Description
Option Description
foreign Enable the scan and monitor foreign channels. Foreign channels are all other
available channels than the current operating channel.
both Enable the scan and monitor both foreign and home channels. Select this
option to monitor all WiFi channels.
Option Description
Option Description
Option Description
platform-type FortiAP models to define the WTP group platform type. option -
Option Description
220B FAP220B/221B.
210B FAP210B.
222B FAP222B.