Manual Fortinet
Manual Fortinet
Version 2.50
30 July 2003
© Copyright 2003 Fortinet Inc. All rights reserved.
No part of this publication including text, examples, diagrams or illustrations may be reproduced,
transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical or
otherwise, for any purpose, without prior written permission of Fortinet Inc.
Trademarks
Products mentioned in this document are trademarks or registered trademarks of their respective
holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS
Send information about errors or omissions in this document or any Fortinet technical documentation to
[email protected].
Contents
Table of Contents
Introduction ............................................................................................................ 9
About this document ........................................................................................................... 9
Conventions ...................................................................................................................... 10
Fortinet documentation ..................................................................................................... 11
Comments on Fortinet technical documentation........................................................... 11
Customer service and technical support........................................................................... 12
set commands...................................................................................................... 33
set alertemail configuration ........................................................................................... 34
set alertemail setting ..................................................................................................... 35
set antivirus filepattern .................................................................................................. 36
set antivirus quarantine................................................................................................. 37
set antivirus service ...................................................................................................... 39
set console.................................................................................................................... 41
set emailfilter bannedword ............................................................................................ 42
set emailfilter blocklist ................................................................................................... 43
set emailfilter config ...................................................................................................... 44
4 Fortinet Inc.
Contents
6 Fortinet Inc.
Contents
8 Fortinet Inc.
FortiGate CLI Reference Guide Version 2.50
Introduction
The FortiGate Antivirus Firewall supports network-based deployment of application-level services,
including virus protection and full-scan content filtering. FortiGate units improve network security,
reduce network misuse and abuse, and help you use communications resources more efficiently
without compromising the performance of your network.
The FortiGate unit is a dedicated easily managed security device that delivers a full suite of capabilities
that include:
• application-level services such as virus protection and content filtering,
• network-level services such as firewall, intrusion detection, VPN, and traffic shaping.
The FortiGate unit employs Fortinet’s Accelerated Behavior and Content Analysis System
(ABACAS™) technology, which leverages breakthroughs in chip design, networking, security, and
content analysis. The unique ASIC-based architecture analyzes content and behavior in real-time,
enabling key applications to be deployed right at the network edge where they are most effective at
protecting your networks. The FortiGate series complements existing solutions, such as host-based
antivirus protection, and enables new applications and services while greatly lowering costs for
equipment, administration, and maintenance.
• An appendix contains the FortiGate maximum values matrix that lists the limitations of each
FortiGate model, such as the maximum number of firewall policies that can be added.
Conventions
This guide uses the following conventions to describe command syntax.
• angle brackets < > to indicate variable keywords
For example:
execute restore config <filename_str>
You enter restore config myfile.bak
<xxx_str> indicates an ASCII string variable.
<xxx_integer> indicates an integer variable.
<xxx_ip> indicates an IP address variable.
<xxx_hex> indicates a hexadecimal variable.
• vertical bar and curly brackets {|} to separate alternative, mutually exclusive required keywords
For example:
set system opmode {nat | transparent}
You can enter set system opmode nat or set system opmode transparent
• square brackets [ ] to indicate that a keyword is optional
For example:
get firewall ipmacbinding [dhcpipmac]
You can enter get firewall ipmacbinding or
get firewall ipmacbinding dhcpipmac
• a space to separate options that can be entered in any combination and must be separated by
spaces
For example:
set system interface internal config allowaccess
{ping https ssh snmp http telnet}
You can enter any of the following:
set system interface internal config allowaccess ping
set system interface internal config allowaccess ping https ssh
set system interface internal config allowaccess https ping ssh
set system interface internal config allowaccess snmp
10 Fortinet Inc.
Introduction Comments on Fortinet technical documentation
Fortinet documentation
Information about FortiGate products is available from the following FortiGate User Manual volumes:
• Volume 1: FortiGate Installation and Configuration Guide
Describes installation and basic configuration for the FortiGate unit. Also describes how to use
FortiGate firewall policies to control traffic flow through the FortiGate unit and how to use firewall
policies to apply antivirus protection, web content filtering, and email filtering to HTTP, FTP and
email content passing through the FortiGate unit.
• Volume 2: FortiGate VPN Guide
Contains in-depth information about FortiGate IPSec VPN using certificates, pre-shared keys and
manual keys for encryption. Also contains basic configuration information for the Fortinet Remote
VPN Client, detailed configuration information for FortiGate PPTP and L2TP VPN, and VPN
configuration examples.
• Volume 3: FortiGate Content Protection Guide
Describes how to configure antivirus protection, web content filtering, and email filtering to protect
content as it passes through the FortiGate unit.
• Volume 4: FortiGate NIDS Guide
Describes how to configure the FortiGate NIDS to detect and protect the FortiGate unit from
network-based attacks.
• Volume 5: FortiGate Logging and Message Reference Guide
Describes how to configure FortiGate logging and alert email. Also contains the FortiGate log
message reference.
• Volume 6: FortiGate CLI Reference Guide
Describes the FortiGate CLI and contains a reference to all FortiGate CLI commands.
The FortiGate online help also contains procedures for using the FortiGate web-based manager to
configure and manage your FortiGate unit.
12 Fortinet Inc.
FortiGate CLI Reference Guide Version 2.50
Access levels
There are three administration account access levels:
admin Has all permissions. Can view, add, edit, and delete administrator accounts. Can view and
change the FortiGate configuration. The admin user is the only user who can use execute
commands and can manually update FortiGate firmware, update the antivirus definitions, update
the attack definitions, download or upload system settings, restore the FortiGate to factory
defaults, restart the FortiGate, and shutdown the FortiGate. There is only one admin level user.
Read & Write Can view and change the FortiGate configuration. Can view but cannot add, edit, or delete
administrator accounts. Can change their own administrator account password. Administrators
with read and write access can use diagnose, get, set, and unset commands.
Read Only Can view the FortiGate configuration. Administrators with read only access can use get
commands to view the FortiGate configuration.
Note: The following procedure describes how to connect to the FortiGate CLI using Windows HyperTerminal
software. You can use any terminal emulation program.
14 Fortinet Inc.
Using the CLI Connecting to the FortiGate CLI using SSH
Note: For a list of available interfaces enter set system interface a space and a ?.
3 To confirm that you have configured SSH access correctly, enter the following command to view the
access settings for the interface:
get system interface
The CLI displays the interface settings including the management access settings for all interfaces.
Note: The FortiGate supports the following encryption algorithms for SSH access: 3DES and Blowfish.
To connect to the CLI using SSH, you must install an SSH client. Then:
1 Start the SSH client and connect to a FortiGate interface that is configured for SSH connections.
For example, if you are running the SSH client on the internal network, connect to the IP address of the
FortiGate internal interface.
2 Type a valid administrator name and press Enter.
3 Type the password for this administrator and press Enter.
The following prompt appears:
Type ? for a list of commands.
You have connected to the FortiGate CLI, and you can enter CLI commands.
Note: For a list of available interfaces enter set system interface a space and a ?.
3 To confirm that you have configured telnet access correctly, enter the following command to view the
access settings for the interface:
get system interface
The CLI displays the interface settings including the management access settings for all interfaces.
16 Fortinet Inc.
Using the CLI CLI command structure
CLI basics
This section describes entering commands using the FortiGate CLI.
• CLI command structure
• Navigating command branches
• Recalling commands
• Editing commands
• Using command shortcuts
• Using command help
• Displaying the FortiGate configuration
• Changing the configuration by editing the configuration file
• Controlling the behavior of the command line console
Recalling commands
You can recall previously entered commands by using the Up and Down arrow keys to cycle through
commands you have entered. From lower level prompts within a branch of the command tree, the Up
and Down arrow keys will only recall commands from within that command branch.
Editing commands
Use the Left and Right arrow keys to move the cursor back and forth in a recalled command. You can
also use the Backspace and Delete keys and the control keys listed in Table 1 to edit the command.
18 Fortinet Inc.
Using the CLI Displaying the FortiGate configuration
Note: The set console baudrate command is available for FortiGate units with BIOS 3.03 and higher and
FortiOS version 2.50 and higher.
!
Caution: If downgrading from FortiOS version 2.50 to FortiOS version 2.36 or lower you must reset the baud rate
to the default baud rate for the FortiGate model. (115200 for the FortiGate-300 and 9600 for all other models.)
diagnose commands
Diagnose commands display information that can be used for debugging the operation of the FortiGate
unit. You can also use diagnose commands to set parameters for displaying different levels of
diagnostic information.
!
Caution: Diagnose commands are intended for advanced users only. Contact Fortinet technical support before
using these commands.
20 Fortinet Inc.
Using the CLI Upgrade to a new firmware version
Procedure Description
Upgrade to a new firmware version The most commonly-used CLI procedure for upgrading to a new
FortiOS firmware version or to a more recent build of the same
firmware version.
Revert to a previous firmware version Use this procedure from the CLI to revert to a previous firmware
using the CLI version. This procedure reverts the FortiGate unit to its factory
default configuration.
Install a firmware image from a system Use this procedure to install a new fimware version or revert to a
reboot previous firmware version. You must run this procedure by
connecting to the CLI using the FortiGate console port and a
null-modem cable. This procedure reverts your FortiGate unit to its
factory default configuration.
Test a new firmware image before Use this procedure to test a new firmware image before installing
installing it it. You must run this procedure by connecting to the CLI using the
FortiGate console port and a null-modem cable. This procedure
temporarily installs a new firmware image using your current
configuration. You can test the firmware image before installing it
permanently. If the firmware image works correctly you can use
one of the other procedures listed in this table to install it
permanently.
Installing and using a backup firmware If the FortiGate unit is running BIOS version v3.x, you can install a
image backup firmware image. Once the backup firmware image is
installed you can switch to this backup image when required.
Installing a backup firmware image is not available for the
FortiGate-50 and 60.
Note: Installing firmware replaces your current antivirus and attack definitions with the definitions included with the
firmware release that you are installing. When you have installed new firmware, use the command execute
updatecenter updatenow to update the antivirus and attack definitions.
4 Make sure the FortiGate unit can connect to the TFTP server.
You can use the following command to ping the computer running the TFTP server. For example, if the
TFTP server’s IP address is 192.168.1.168:
execute ping 192.168.1.168
5 Enter the following command to copy the firmware image from the TFTP server to the FortiGate:
execute restore image <name_str> <tftp_ip>
Where <name_str> is the name of the firmware image file on the TFTP server and <tftp_ip> is the
IP address of the TFTP server. For example, if the firmware image file name is
FGT_300-v250-build045-FORTINET.out and the IP address of the TFTP server is
192.168.1.23, enter:
execute restore image FGT_300-v250-build045-FORTINET.out 192.168.1.168
The FortiGate unit uploads the firmware image file, upgrades to the new firmware version, and
restarts. This process takes a few minutes.
6 Reconnect to the CLI.
7 To confirm that the new firmware image has been loaded, enter:
get system status
8 To update the antivirus and attack definitions to the most recent version, enter:
execute updatecenter updatenow
9 To confirm that the antivirus and attack definitions have been updated, enter the following command to
display the current firmware version as well as the current antivirus and attack definition versions.
get system status
22 Fortinet Inc.
Using the CLI Install a firmware image from a system reboot
5 Enter the following command to copy the firmware image from the TFTP server to the FortiGate unit:
execute restore image <name_str> <tftp_ip>
Where <name_str> is the name of the firmware image file on the TFTP server and <tftp_ip> is the
IP address of the TFTP server. For example, if the firmware image file name is
FGT_300-v250-build045-FORTINET.out and the IP address of the TFTP server is
192.168.1.168, enter:
execute restore image FGT_300-v250-build045-FORTINET.out 192.168.1.168
The FortiGate unit uploads the firmware image file. Once the file has been uploaded a message similar
to the following is displayed:
Get image from tftp server OK.
This operation will downgrade the current firmware version!
Do you want to continue? (y/n)
6 Type Y
7 The FortiGate unit reverts to the old firmware version, resets the configuration to factory defaults, and
restarts. This process takes a few minutes.
8 ‘Reconnect to the CLI.
See “Connecting to the CLI” on page 13.
9 To confirm that the older version of the firmware image has been loaded, enter:
get system status
10 Restore your previous configuration. Use the following command:
execute restore config
11 To update the antivirus engine and the virus and attack definitions to the most recent version, enter:
execute updatecenter updatenow
12 To confirm that the antivirus engine and the virus and attack definitions have been updated, enter the
following command to display the current firmware version as well as the current antivirus and attack
definition versions.
get system status
Note: There are a few variations on this procedure for different FortiGate BIOS versions. These variations are
explained in the procedure steps that are affected. The version of the BIOS running on your FortiGate unit is
displayed when you restart the FortiGate unit while accessing the CLI by connecting to the FortiGate console port
using a null-modem cable.
Table 3: The interface that must connect to the TFTP server for each Fortigate model
This procedure reverts your FortiGate unit to its factory default configuration and deletes NIDS
user-defined signatures, web content lists, email filtering lists, and changes to replacement messages.
Before running this procedure you can:
• Backup the FortiGate unit configuration using the command execute backup config.
• Backup the NIDS user defined signatures using the command execute backup nidsuserdefsig
• Backup web content and email filtering lists, see the FortiGate Content Protection Guide.
If you are reverting to a previous FortiOS version (for example, reverting from FortiOS v2.50 to FortiOS
v2.36) you may not be able to restore your previous configuration from the backup configuration file.
Note: Installing firmware replaces your current antivirus engine and virus and attack definitions with those
included with the firmware release that you are installing. When you have installed new firmware, use the
command execute updatecenter updatenow to update the antivirus engine and virus and attack definitions.
24 Fortinet Inc.
Using the CLI Install a firmware image from a system reboot
Note: You only have 3 seconds to press any key. If you do not press any key soon enough, the FortiGate unit
reboots and you must log in and repeat the execute reboot command.
When you successfully interrupt the startup process, one of the following messages appears:
• FortiGate unit running v2.x BIOS
Enter TFTP Server Address [192.168.1.168]:
Go to step 8.
• FortiGate unit running v3.x BIOS
[G]: Get firmware image from TFTP server.
[F]: Format boot device.
[Q]: Quit menu and continue to boot with default firmware.
[H]: Display this list of options.
Enter G,F,Q,or H:
7 Type G to get the new firmware image from the TFTP server.
8 Type the address of the TFTP server and press Enter.
The following message appears:
Enter Local Address [192.168.1.188]:
9 Type the current address of the interface of the FortiGate unit that must connect to the TFTP server
(see Table 3) and press Enter.
Note: The local IP address is only used to download the firmware image. After the firmware is installed the address
of this interface is changed back to the default IP address for this interface.
Note: To update the virus and attack definitions you must add DNS server IP addresses using set system dns.
4 To confirm that the antivirus engine and virus and attack definitions have been updated, enter:
get system status
26 Fortinet Inc.
Using the CLI Test a new firmware image before installing it
Note: You only have 3 seconds to press any key. If you do not press any key soon enough, the FortiGate unit
reboots and you must log in and repeat the execute reboot command.
When you successfully interrupt the startup process, one of the following messages appears:
• FortiGate unit running v2.x BIOS
Enter TFTP Server Address [192.168.1.168]:
Go to step 9.
• FortiGate unit running v3.x BIOS
[G]: Get firmware image from TFTP server.
[F]: Format boot device.
[Q]: Quit menu and continue to boot with default firmware.
[H]: Display this list of options.
Enter G,F,Q,or H:
8 Type G to get the new firmware image from the TFTP server.
9 Type the address of the TFTP server and press Enter.
The following message appears:
Enter Local Address [192.168.1.188]:
10 Type the current address of the interface of the FortiGate unit that must connect to the TFTP server
(see Table 3) and press Enter.
Note: The local IP address is only used to download the firmware image. After the firmware is installed the address
of this interface is changed back to the default IP address for this interface.
Note: Installing a backup firmware image is not available for the FortiGate-50 and 60.
28 Fortinet Inc.
Using the CLI Installing and using a backup firmware image
3 Copy the new firmware image file to the root directory of the TFTP server.
4 To confirm that the FortiGate unit can connect to the TFTP server, use the following command to ping
the computer running the TFTP server. For example, if the TFTP server’s IP address is 192.168.1.168:
execute ping 192.168.1.168
5 Enter the following command to restart the FortiGate unit:
execute reboot
As the FortiGate units starts, a series of system startup messages are displayed.
When the following message id displayed:
Press any key to enter configuration menu.....
......
6 Immediately press any key to interrupt the system startup.
I
Note: You only have 3 seconds to press any key. If you do not press any key soon enough, the FortiGate unit
reboots and you must log in and repeat the execute reboot command.
If you successfully interrupt the startup process, the following messages are displayed:
[G]: Get firmware image from TFTP server.
[F]: Format boot device.
[B]: Boot with backup firmware and set as default.
[Q]: Quit menu and continue to boot with default firmware.
[H]: Display this list of options.
Enter G,F,B,Q,or H:
7 Type G to get the new firmware image from the TFTP server.
8 Type the address of the TFTP server and press Enter.
The following message appears:
Enter Local Address [192.168.1.188]:
9 Type the address of the interface of the FortiGate unit that can connect to the TFTP server and press
Enter.
The following message appears:
Enter File Name [image.out]:
10 Enter the firmware image file name and press Enter.
The TFTP server uploads the firmware image file to the FortiGate unit and messages similar to the
following appear.
Save as Default firmware/Backup firmware/Run image without saving:[D/B/R]
11 Type B.
The FortiGate unit saves the backup firmware image and restarts. When the FortiGate unit restarts it is
running the previously installed firmware version.
If you install a new backup image from a reboot the configuration saved with this firmware image is the
factory default configuration. If you use the procedure “Switching back to the default firmware image”
on page 30 to switch to a backup firmware image that was previously running as the default firmware
image, the configuration saved with this firmware image is restored.
1 Connect to the CLI using the null modem cable and FortiGate console port.
2 Enter the following command to restart the FortiGate unit:
execute reboot
As the FortiGate units starts, a series of system startup messages are displayed.
When the following message is displayed:
Press any key to enter configuration menu.....
......
3 Immediately press any key to interrupt the system startup.
I
Note: You only have 3 seconds to press any key. If you do not press any key soon enough, the FortiGate unit
reboots and you must log in and repeat the execute reboot command.
If you successfully interrupt the startup process, the following messages are displayed:
[G]: Get firmware image from TFTP server.
[F]: Format boot device.
[B]: Boot with backup firmware and set as default.
[Q]: Quit menu and continue to boot with default firmware.
[H]: Display this list of options.
Enter G,F,B,Q,or H:
4 Type B to load the backup firmware image.
The FortiGate unit loads the backup firmware image and restarts. When the FortiGate unit restarts it is
running the backup firmware version and the configuration is set to factory default.
30 Fortinet Inc.
Using the CLI Installing and using a backup firmware image
Note: You only have 3 seconds to press any key. If you do not press any key soon enough, the FortiGate unit
reboots and you must log in and repeat the execute reboot command.
If you successfully interrupt the startup process, the following messages are displayed:
[G]: Get firmware image from TFTP server.
[F]: Format boot device.
[B]: Boot with backup firmware and set as default.
[Q]: Quit menu and continue to boot with default firmware.
[H]: Display this list of options.
Enter G,F,B,Q,or H:
4 Type B to load the backup firmware image.
The FortiGate unit loads the backup firmware image and restarts. When the FortiGate unit restarts it is
running the backup firmware version with a restored configuration.
32 Fortinet Inc.
FortiGate CLI Reference Guide Version 2.50
set commands
Use the commands in this chapter to configure the functionality of the FortiGate Antivirus Firewall.
set alertemail configuration set log policy set system route rip neighbor
set alertemail setting set log setting set system route rip timers
set antivirus filepattern set log trafficfilter rule set system session_ttl
set antivirus quarantine set log trafficfilter setting set system snmp
set antivirus service set nids detection set system time
set console set nids prevention set system vlan
set emailfilter bannedword set nids rule set system zone
Syntax description
Keyword Description Default Availability
auth {enable | disable} Enable SMTP authentication if the FortiGate unit is disable All models.
required to authenticate before using the SMTP
server.
mailto {<email1_str> Enter up to three destination email addresses or No All models.
[<email2_str> none to clear all the addresses. These are the actual default.
[<email3_str>]] | none} email addresses to which the FortiGate sends alert
email.
passwd <password_str> Enter the password that the FortiGate unit needs to No All models.
access the SMTP server. default.
server <smtp-server_str> Enter the name of the SMTP server, in the format No All models.
smtp.domain.com, to which the FortiGate unit default.
should send email. The SMTP server can be located
on any network connected to the FortiGate unit.
user <smtp-user_str> Enter a valid email address in the format No All models.
[email protected]. This address appears in the default.
From header of the alert email.
Examples
Use the following command to configure the FortiGate unit to send alert email with the following
settings:
• SMTP server: smtp.ourcompany.com
• SMTP user: [email protected]
• SMTP authentication: enable
• SMTP user password: secret
• First email: [email protected]
• Second email: [email protected]
set alertemail configuration server smtp.ourcompany.com user
[email protected] auth enable passwd secret mailto
[email protected] [email protected]
Use the following command to change the SMTP user password to bettersecret and to add the
administrator email address [email protected]:
set alertemail configuration passwd bettersecret mailto
[email protected] [email protected] [email protected]
Related commands
• get alertemail configuration
• set alertemail setting
• set system dns
• get system dns
34 Fortinet Inc.
set commands set alertemail setting
Syntax description
Keyword Description Default Availability
option {virusincidents | virusincidents: send alert email when antivirus No All models.
blockincidents | scanning detects a virus. default.
intrusions | critical | blockincidents: send alert email when the
diskfull | none} FortiGate unit blocks files, URLs, or emails.
intrusions: send alert email to notify the system
administrator of attacks detected by the NIDS.
critical: send alert email when a critical firewall or
VPN event occurs.
• Critical firewall events include failed authentication
attempts.
• Critical VPN events include when replay detection
detects a replay packet. Replay detection can be
configured for both manual key and AutoIKE Key
VPN tunnels.
diskfull: send an alert email when the hard disk is
almost full. Available only for models with a hard disk
and logging to local disk enabled.
none: clear all settings.
Examples
Use the following command to enable sending alert email for virus incidents and for attacks:
set alertemail setting virusincidents intrusions
Use the following command to disable sending alert email for all categories:
set alertemail setting none
Related commands
• get alertemail setting
• set alertemail configuration
Syntax description
Keyword Description Default Availability
add <fp_str> Add a file pattern to the list of file patterns to block. No All models.
{enableall | disableall} Enable or disable it for all services. You can use the default.
asterisk (*) to represent any characters.
delete <fp_integer> The number of a file pattern to delete from the file No All models.
pattern list. Use the command get antivirus default.
filepattern for a numbered list of file patterns.
Examples
Use the following command to add the file pattern *.flw to the list of file patterns to block, and to
enable this file pattern for all services.
set antivirus filepattern add *.flw enableall
Use the following command to delete file pattern 5.
set antivirus filepattern delete 5
Related commands
• get antivirus filepattern
• set antivirus service
• set firewall profile
36 Fortinet Inc.
set commands set antivirus quarantine
Syntax description
Keyword Description Default Availability
agelimit <hours_integer> Specify how long files are left in quarantine. 0 FortiGate
The maximum number of hours is 479. The FortiGate models
unit automatically deletes a file when the TTL (time to numbered
live) reaches 00:00. Enter 0 to keep files indefinitely. 200 and
higher.
deletefile Delete a quarantined file from the hard disk. The file No FortiGate
<all | checksum_hex> is identified by the checksum that was calculated for default. models
the file when it was put into quarantine. Use the numbered
command get antivirus quarantine list for 200 and
a list of quarantined files including the checksum for higher.
each file.
download <checksum_hex> Download a quarantined file from the FortiGate unit. No FortiGate
The file is identified by the checksum that was default. models
calculated for the file when it was put into quarantine. numbered
Use the command get antivirus quarantine 200 and
list for a list of quarantined files including the higher.
checksum for each file.
lowspace Select the method for handling additional files when ovwr_ FortiGate
<drop_new | ovwr_old> the FortiGate hard disk is running out of space. old models
Select ovwr_old to drop the oldest file (lowest TTL), numbered
or drop_new to drop new quarantine files. 200 and
higher.
maxfilesize Specify, in MB, the maximum file size to quarantine. 0 FortiGate
<filesize_integer> The FortiGate unit keeps any existing quarantined models
files over the limit.The FortiGate unit does not numbered
quarantine any new files larger than this value. The 200 and
file size range is 1-499 MB. Enter 0 for unlimited file higher.
size.
service {http | ftp | Select the service for which you want to quarantine No FortiGate
pop3 | imap | smtp} infected or blocked files. You can select http, ftp, default. models
pop3, imap or smtp to quarantine infected files. You numbered
can select pop3, imap, or smtp to quarantine 200 and
blocked files. You can enable or disable quarantining higher.
for one service at a time.
infected For a chosen service the file can be quarantined if it enable FortiGate
<enable | disable> is found to be infected. Quarantining infected files is models
available for http, ftp, pop3, imap or smtp. numbered
200 and
higher.
service
only.
blocked For a chosen service the file can be quarantined if it enable FortiGate
<enable | disable> is blocked by a filename pattern. Quarantining models
blocked files is available for pop3, imap, or smtp numbered
only. HTTP and FTP files are blocked during the 200 and
request; therefore, there is no data to quarantine. higher.
service
only.
Examples
Use the following commands to enable quarantining of infected HTTP files and blocked smtp files:
set antivirus quarantine service http infected enable
set antivirus quarantine service smtp blocked enable
Use the following commands to set the TTL of files in the quarantine to 60 and the maximum
quarantine file size to 50:
set antivirus quarantine agelimit 60
set antivirus quarantine maxfilesize 50
Related commands
• set antivirus filepattern
• set antivirus service
• get antivirus filepattern
• get antivirus quarantine list
• get antivirus service
• set firewall profile
38 Fortinet Inc.
set commands set antivirus service
Syntax description
Keyword Description Default Availability
{http | smtp | Select a service for which to configure antivirus protection No All models.
pop3 | ftp | imap} settings. default.
block {fp_integer Enable or disable blocking for the selected service. Blocking No All models.
| all} {enable | deletes files that match enabled file patterns. default. All services.
disable> Enter a file pattern number to enable or disable the specified
file pattern. Use the command get antivirus
filepattern for a numbered list of file patterns.
Enter all to enable or disable all file patterns.
filesizelimit Enter the oversized file and email limit in Mbytes. Varies. All models.
value Because available memory varies for different FortiGate All services.
<MB_integer> models, use the command set antivirus service
{http | smtp | pop3 | ftp | imap} filesizelimit
value followed by a space and a ? to find the acceptable
range in MB for your model.
You can configure the FortiGate unit to use 1% to 15% of
available memory to store oversized files and email. The
FortiGate unit then blocks a file or email that exceeds this limit
instead of bypassing antivirus scanning and sending the file or
email directly to the server or receiver.
port Configure antivirus scanning on a nonstandard port number or http 80 All models.
{add multiple port numbers for HTTP and email proxies. smtp 25 HTTP,
<port_integer> | You can use ports from the range 1-65535. You can add up to pop3 110 SMTP,
delete 20 ports. You must re-enter the complete command for each imap 143 POP3,
port you want to add or delete. IMAP
<port_integer>) services.
Use the command get antivirus service
<service_str> ports for a list of ports used for antivirus
scanning for the specified service.
Examples
Use the following command to enable a block pattern for http.
set antivirus service http block 5 enable
Use the following command to add a port for http traffic.
set antivirus service http port add 8080
Use the following command to disable smtp splicing.
set antivirus service smtp splice disable
Use the following command to set a maximum file size limit for ftp to 8MB.
set antivirus service ftp filesizelimit value 8
Related commands
• get antivirus filepattern
• get antivirus service
• set antivirus filepattern
• set firewall policy
40 Fortinet Inc.
set commands set console
set console
Set the console command mode, the number of lines displayed by the console, and the baud rate.
Note: The set console baudrate command is available for FortiGate units with BIOS 3.03 and higher and
FortiOS version 2.50 and higher.
!
Caution: If downgrading from FortiOS version 2.50 to FortiOS version 2.36 or lower you must reset the baud rate
to the default baud rate for the FortiGate model. (115200 for the FortiGate-300 and 9600 for all other models.)
Syntax description
Keyword Description Default Availability
baudrate {9600 | 19200 | Select a baud rate for the FortiGate unit. The change Varies. All models.
38400 | 57600 | 115200} is effective immediately; therefore, you must change Version 2.5
the baud rate of the connected terminal to match the and higher.
new FortiGate console baud rate. BIOS 3.03
and higher
mode {line | batch} Set the console mode to line or batch. Line All models.
In line mode commands are immediately executed
and written to EEPROM.
In batch mode commands are executed immediately
but are only written to EEPROM when you enter the
execute save config command. The execute
save config command is available only when the
console is set to batch mode.
page {<page_integer> | 0} Set the number of lines that appear on each page of 25 All models.
command line console output.
Set this value to 0 to allow output to flow without
paging.
Examples
Use the following command to limit console output to 24 lines per page:
set console page 24
Use the following command to change the baud rate to 38400:
set console mode baudrate 38400
Related commands
• get console
• execute reload
• execute save config
Examples
Use the following command to add the English phrase bad word to the email filter list and enable the
phrase:
set emailfilter bannedword add word bad+word language 0 state enable
Related commands
• get emailfilter
• set emailfilter blocklist
• set emailfilter config
• set emailfilter exemptlist
• set firewall profile
42 Fortinet Inc.
set commands set emailfilter blocklist
Syntax description
Keyword Description Default Availability
add <block-pattern_str> Add and enable or disable an email address block No All models.
state {enable | disable} pattern. default.
To tag email from a specific email address, type the
email address. For example,
[email protected].
To tag email from a specific domain, type the domain
name. For example, abccompany.com.
To tag email from a specific subdomain, type the
subdomain name. For example,
mail.abccompany.com.
To tag email from an entire organization category,
type the top-level domain name. For example, type
com to tag emails sent from all organizations that use
.com as the top-level domain.
delete Delete the specified email address block pattern or No All models.
{<block-pattern_str> | delete the entire list. Use the command get default.
all} emailfilter blocklist for a list of email
address block patterns.
edit Edit an email address block pattern. No All models.
<block-pattern_integer> Enter a number to edit the specified address block default.
address pattern. Use the command get emailfilter
<block-pattern_str> state blocklist for a numbered list of address block
patterns.
{enable | disable}
Examples
Use the following command to add the email address [email protected] to the email
address pattern block list and to enable blocking the address:
set emailfilter blocklist add [email protected] state enable
Related commands
• get emailfilter
• set emailfilter bannedword
• set emailfilter config
• set emailfilter exemptlist
• set firewall profile
Syntax description
Keyword Description Default Availability
subjecttag <tag_str> Type the subject tag that you want to display in the No All models.
subject line of email received from unwanted default.
addresses or containing banned words.
Examples
Use the following command to change the email filter subject tag to UNWANTED:
set emailfilter config subjecttag UNWANTED
Related commands
• get emailfilter
• set emailfilter bannedword
• set emailfilter blocklist
• set emailfilter exemptlist
• set firewall profile
44 Fortinet Inc.
set commands set emailfilter exemptlist
Syntax description
Keyword Description Default Availability
add <pattern_str> Add and enable or disable an email address exempt No All models.
state {enable | disable} pattern. default.
To exempt email sent from a specific email address,
type the email address. For example,
[email protected].
To exempt email sent from a specific domain, type
the domain name. For example, abccompany.com.
To exempt email sent from a specific subdomain,
type the subdomain name. For example,
mail.abccompany.com.
To exempt email sent from an entire organization
category, type the top-level domain name. For
example, type net to exempt email sent from all
organizations that use .net as the top-level domain.
delete {<pattern_str> | Delete the specified email address exempt pattern or No All models.
all} delete the entire list. Use the command get default.
emailfilter exemptlist for a list of email
address block patterns.
edit <pattern_integer> Edit an email address exempt pattern. No All models.
address <pattern_str> Enter a number to edit the specified address exempt default.
state {enable | disable} pattern. Use the command get emailfilter
exemptlist for a numbered list of address exempt
patterns.
Examples
Use the following command to add the email address [email protected] to the email
address pattern exempt list and to enable exempting the address:
set emailfilter exemptlist add [email protected] state enable
Related commands
• get emailfilter
• set emailfilter bannedword
• set emailfilter blocklist
• set emailfilter config
• set firewall profile
Syntax description
Keyword Description Default Availability
<interface_str> The name of the interface, VLAN subinterface, or No All models.
zone to which to add the address. default.
<name_str> Enter an address name to identify the address. No All models.
default.
subnet <address_ip> The IP Address can be the IP address of a single 0.0.0.0 All models.
<netmask_ip> computer (for example, 192.45.46.45) or the address 0.0.0.0
of a subnetwork (for example, 192.168.1.0).
The Netmask should correspond to the address that
you are adding. For example,
• The netmask for the IP address of a single
computer should be 255.255.255.255.
• The netmask for a class A subnet should be
255.0.0.0.
• The netmask for a class B subnet should be
255.255.0.0.
• The netmask for a class C subnet should be
255.255.255.0.
Examples
Use the following command to add the address of a network to the Internal address list. The address
name is User_Network, the IP address is 192.168.22.0, and the netmask is 255.255.255.0.
set firewall address internal User_Network subnet 192.168.1.0
255.255.255.0
Use the following command to edit this address to change its IP address to 192.168.2.0.
set firewall address internal User_Network subnet 192.168.2.0
255.255.255.0
Use the following command to add the address of a single computer on the 192.168.2.0 network.
set firewall address internal User_1 subnet 192.168.2.1 255.255.255.255
Use the following command to edit an address added to a VLAN subinterface named VLAN_1. The
name of the address is Web_Server. The command changes the IP address to 10.10.10.34 and
the netmask to 255.255.255.255.
set firewall address VLAN_1 Web_Server subnet 10.10.10.34 255.255.255.255
Related commands
• unset firewall address
• set firewall addrgrp
• set firewall policy
• get firewall address
• get firewall addrgrp
46 Fortinet Inc.
set commands set firewall addrgrp
Syntax description
Keyword Description Default Availability
<interface_str> The name of the interface, VLAN subinterface, or No All models.
zone to which to add or edit the address group. The default.
interface can be physical or a VLAN. Enter set
firewall addrgrp followed by a space and a ? for
a list of available interfaces.
<adress-group_str> The name of the address group to add or edit. No All models.
default.
member <name_str> The names of the addresses to add to the address No All models
[<name_str> <name_str> group. The member addresses must already have default.
...] been added to the interface, VLAN subinterface, or
zone to which you are adding the address group.
Enter set firewall addrgrp
<interface_str> <address-group_str>
member followed by a space and a ? for a list of
addresses added to that interface, VLAN
subinterface, or zone. Use spaces to separate the
address names. Leaving an address name out of the
list removes it from the address group.
Examples
Use the following command to add an address group to the Internal address list. The address group is
User_Network, and its members include Internal_1, Internal_2, and Internal_4.
set firewall addrgrp Internal User_Network member Internal_1 Internal_2
Internal_4
Use the following command to edit an address group named User_Network, so that it contains the
addresses Internal_1, Internal_2, Internal_3, and Internal_4.
set firewall addrgrp Internal User_Network member Internal_1 Internal_2
Internal_3 Internal_4
Use the following command to remove Internal_1 from the address group named User_Group.
set firewall addrgrp Internal User_Network member Internal_2 Internal_3
Internal_4
Related commands
• unset firewall addrgrp
• set firewall address
• set firewall policy
• get firewall address
• get firewall addrgrp
Examples
Use the following commands to enable DNS translation and translate DNS addresses for one server
that has an IP address on your internal network of 192.168.1.23 but from the external network the IP
address of the server should be 64.23.2.23 (as set using virtual IP mapping).
set firewall dnstranslation enable
set firewall dnstranslation add src 192.168.1.23 dst 64.23.2.23 netmask
255.255.255.255
Use the following command if you have configured symmetrical IP mapping between the external and
internal networks and the subnet on the internal network is 192.168.20.0 and the subnet on the
external network is 64.28.4.0.
set firewall dnstranslation add src 192.168.20.0 dst 64.28.4.0 netmask
255.255.255.0
Related commands
• set firewall vip
• get firewall dnstranslation
• get firewall vip
48 Fortinet Inc.
set commands set firewall ipmacbinding setting
Syntax description
Keyword Description Default Availability
bindthroughfw {enable | Enable or disable IP/MAC binding going through the disable All models.
disable} firewall.
bindtofw {enable | Enable or disable IP/MAC binding going to the disable All models.
disable} firewall.
undefinedhost {allow | Available when you enable either bindthroughfw block All models.
block} or bindtofw.
Configure how IP/MAC binding handles packets with
IP and MAC addresses that are not defined in the
IP/MAC list. Setting undefinedhost configures this
behavior for traffic going through the firewall and
traffic going to the firewall.
Enter allow to allow packets with IP and MAC
address pairs that are not added to the IP/MAC
binding list.
Enter block to block packets with IP and MAC
address pairs that are not added to the IP/MAC
binding list.
Example
Use the following command to enable IP/MAC binding for traffic through the firewall and to allow traffic
with IP and MAC addresses that are not defined in the IP/MAC list.
set firewall ipmacbinding setting bindthroughfw enable undefinedhost
allow
Use the following command to enable IP/MAC binding in traffic to the firewall and to block traffic with IP
and MAC addresses that are not defined in the IP/MAC list.
set firewall ipmacbinding setting bindtofw enable undefinedhost block
Related commands
• get firewall ipmacbinding
• unset firewall ipmacbinding
• set firewall ipmacbinding table
Syntax description
Keyword Description Default Availability
ip <address_ip> The IP address to add to the IP/MAC binding table. 0.0.0.0 All models.
You can bind multiple IP addresses to the same MAC
address. You cannot bind multiple MAC addresses to
the same IP address.
You can set the IP address to 0.0.0.0 for multiple
MAC address. This means that all packets with the
MAC address are allowed continue through the
firewall to be matched with a firewall policy.
mac <address_hex> The MAC address to add to the IP/MAC binding 00:00:00: All models.
table. You can set the MAC address to 00:00:00
00:00:00:00:00:00 for multiple IP addresses. This
means that all packets with these IP addresses are
allowed to continue through the firewall to be
matched with a firewall policy.
name <name_str> Optional name for this entry on the IP/MAC address No All models.
table. default.
status {enable | disable} Enable or disable IP/MAC binding for this address disable All models.
pair.
Examples
Use the following command to add an IP/MAC address pair with IP address 205.33.44.55 and MAC
address 00:10:F3:04:7A:4C. The name for the IP/MAC binding pair is remoteadmin.
set firewall ipmacbinding name remoteadmin ip 205.33.44.55 mac
00:10:F3:04:7A:4C
Use the following command to enable the IP/MAC address pair:
set firewall ipmacbinding name remoteadmin status enable
Related commands
• set firewall ipmacbinding setting
• get firewall ipmacbinding
• unset firewall ipmacbinding
50 Fortinet Inc.
set commands set firewall ippool
Syntax description
Keyword Description Default Availability
interface <intf_str> Add an IP pool with the specified start and end IP No All models.
<start_ip-end_ip> addresses to the named interface. Separate the start default. Not
[<start_ip-end_ip> and end IP addresses with a hyphen. On FortiGate available in
models 400 and up the interface can also be a VLAN Transparent
[<start_ip-end_ip> ...]] subinterface. mode.
The start IP and end IP of an IP pool must define the
start and end of an address range. The start IP must
be lower than the end IP. The start IP and end IP
must be on the same subnet as the IP address of the
interface for which you are adding the IP pool.
Examples
Use the following command to add an IP pool with these characteristics to the firewall configuration.
• interface name: internal
• start of IP address range: 192.168.1.100
• end of IP address range: 192.168.1.200
set firewall ippool interface internal 192.168.1.100-192.168.1.200
Use the following command to add two IP pools with these characteristics to the firewall configuration:
• interface name: external
• start of first IP pool address range: 32.34.67.100
• end of first IP pool address range: 32.34.67.110
• start of second IP pool address range: 32.34.67.130
• end of second IP pool address range: 32.34.67.140
set firewall ippool interface internal 32.34.67.100-32.34.67.110
32.34.67.130-32.34.67.140
Related commands
• get firewall ippool
• get firewall policy
• unset firewall ippool
Note: To edit a schedule, you must redefine the entire schedule, including your changes. This means entering all
of the schedule parameters, both those that are changing and those that are not.
Syntax description
Keyword Description Default Availability
<name_str> Add or edit a one-time schedule. <name_str> is No All models.
the name of the one-time schedule to add or edit. default.
end <yyyy/mm/dd> <hh:mm> The ending day and time of the schedule. No All models.
• mm - 01 to 12 default.
• dd - 01 to 31
• hh - 00 to 23
• mm - 00, 15, 30, or 45
start <yyyy/mm/dd> <hh:mm> The starting day and time of the schedule. No All models.
• mm - 01 to 12 default.
• dd - 01 to 31
• hh - 00 to 23
• mm - 00, 15, 30, or 45
Example
Use the following command to add a one-time schedule named Holiday that is valid from 5:00 pm on
30 August 2003 until 8:45 am on 3 September 2003.
set firewall onetimeschedule Holiday start 2003/08/30 17:00 end
2003/09/03 08:45
Related commands
• set firewall policy
• set firewall recurringschedule
• get firewall schedule
• unset firewall onetimeschedule
52 Fortinet Inc.
set commands set firewall policy
Syntax description
Keyword Description Default Availability
srcintf <intf_str> Enter the source interface for the policy. On all No All models.
FortiGate models srcintf can be the name of a default.
FortiGate interface to which a firewall address has
been added.
In NAT/Route mode on FortiGate models 400 and up
this name can also be a VLAN subinterface to which
firewall addresses have been added.
In NAT/Route mode on FortiGate models 400 and up
this name can also be a zone if you have added
firewall addresses to the zone and if you have added
at least one interface or VLAN subinterface to the
zone.
You cannot add an interface or VLAN subinterface
that has been added to a zone.
dstintf <intf_str> Enter the destination interface for the policy. On all No All models.
FortiGate models dstintf can be the name of a default.
FortiGate interface to which a firewall address has
been added.
In NAT/Route mode on FortiGate models 400 and up
this name can also be a VLAN subinterface to which
firewall addresses have been added.
In NAT/Route mode on FortiGate models 400 and up
this name can also be a zone if you have added
firewall addresses to the zone and if you have added
at least one interface or VLAN subinterface to the
zone.
You cannot add an interface or VLAN subinterface
that has been added to a zone.
move Change the order of policies in a policy list by No All models.
<sequence-number_integer> changing the number of a policy. Changing the default.
to number of the policy moves it from its current place in
a policy list to another location in the same policy list.
<sequence-number_integer> Enter get firewall policy to list all policies.
policyid Enter an ID number for the policy. No All models.
<policy-id_integer> Every firewall policy is identified by its srcintf, default.
dstintf, and policyid. Every srcintf,
dstintf, and policyid combination must be
unique. If you enter a new srcintf, dstintf, and
policyid, this command adds a new policy. If you
enter a srcintf, dstintf, and policyid that
already exists, this command edits that policy.
The web-based manager assigns policy IDs
automatically. When using the CLI, policy IDs must
be assigned manually. Enter get firewall
policy to list the policy ID numbers already in use.
54 Fortinet Inc.
set commands set firewall policy
Examples
On a FortiGate-100, 200, or 300, use the following command to add a policy that allows users on the
external network to access a web server on a DMZ network. The policy:
• Is for connections from the external interface (srcintf is external) to the DMZ interface
(dstintf is dmz)
• Has a policy ID of 100
• Is enabled
• Allows users from any IP address on the Internet to access the web server (srcaddr is
External_All)
• Allows access to an address on the DMZ network (dstaddr is an address previously added to the
DMZ interface and named DMZ_Web_Server)
• Sets the schedule to Always so that users can access the web server 24 hours a day, seven
days a week
• Sets the service to HTTP to limit access to the web server to HTTP connections
• Sets action to accept to allow connections
• Applies network address translation (nat is enabled)
• Applies traffic shaping to guarantee 100 KBytes/s of bandwidth is available, to limit the maximum
bandwidth to 500 KBytes/second, and to set the priority for the traffic accepted by this policy to
medium (trafficshaping enabled, gbandwidth set to 100, maxbandwidth set to 500,
priority set to medium)
• Applies virus scanning using the Web content profile (avwebfilter set to Web)
set firewall policy srcintf external dstintf dmz policyid 100 status
enable srcaddr External_All dstaddr DMZ_Web_Server schedule Always
action accept trafficshaping enable gbandwidth 100 maxbandwidth 500
priority medium avwebfilter Web
Related commands
• get firewall policy
• unset firewall policy
56 Fortinet Inc.
set commands set firewall profile
Syntax description
Keyword Description Default Availability
<profilename_str> The name of the profile to add or edit. Type in the No All models.
profile name and press return to access the profile default.
shell.
exit {Yes/No} Exit the profile shell without saving your changes. No All models.
Type Yes to exit the profile shell. Type No to return to default.
the profile setting shell prompt.
If you have just used set firewall profile to
add a new profile, typing exit in the profile shell
exits without saving the new profile. If you enter exit
while editing a profile that was previously added,
changes you have made to the profile are lost, but
the profile is not deleted.
Use the command unset firewall profile
<profilename_str> to delete a profile.
save Exit the profile shell and save your changes. No All models.
default.
show [<service_str>] In the content profile shell show the settings for all No All models.
services. Entering a <service_str> shows the default.
settings for that service. <service_str> can be
http, smtp, pop3, imap, or ftp.
For each profile, you can change settings for the HTTP, SMTP, POP3, IMAP, and FTP services.
ftp
Keyword Description Default Availability
block {enable | disable} For this content profile, enable or disable deleting disable All models.
files from FTP traffic with blocked file patterns.
oversize {pass | block} For this content profile, allow oversized files in FTP pass All models.
traffic to pass through the firewall or block oversized
files in FTP traffic from passing through the firewall.
quarantine {enable | For this content profile, enable or disable disable Models with
disable} quarantining blocked or infected files found in FTP a hard disk
traffic. only.
scan {enable | disable} For this content profile, enable or disable scanning disable All models.
FTP traffic for viruses and worms.
http
Keyword Description Default Availability
bannedword {enable | For this content profile, enable or disable web content disable All models
disable} filtering content blocking (also called the banned
word list).
block {enable | disable} For this content profile, enable or disable deleting disable All models.
files from HTTP traffic with blocked file patterns.
oversize {pass | block} For this content profile, allow oversized files in HTTP pass All models
traffic to pass through the firewall or block oversized
files in HTTP traffic from passing through the firewall.
quarantine {enable | For this content profile, enable or disable disable Models with
disable} quarantining blocked or infected files found in HTTP a hard disk
traffic. only.
scan {enable | disable} For this content profile, enable or disable scanning disable All models.
HTTP traffic for viruses and worms.
scriptfilter {enable | For this content profile, enable or disable the web disable All models
disable} content filtering script filter.
urlblock {enable | For this content profile, enable or disable web content disable All models
disable} filtering URL blocking.
urlexempt {enable | For this content profile, enable or disable the web disable All models
disable} content filtering exempt URL list.
imap
Keyword Description Default Availability
bannedword For this content profile, enable or disable tagging of disable All models.
{enable | disable} IMAP email containing words on the email filter
content blocking (also called the banned word) list.
block {enable | disable} For this content profile, enable or disable deleting disable All models.
files from IMAP traffic with blocked file patterns.
blocklist For this content profile, enable or disable tagging of disable All models.
{enable | disable} IMAP email from email addresses on the email filter
block list.
exemptlist For this content profile, enable or disable exempting disable All models.
{enable | disable} IMAP email from email addresses on the email filter
exempt list.
fragmail {pass | block} For this content profile, allow fragmented IMAP email block All models.
messages to pass through the firewall or block
fragmented IMAP email messages from passing
through the firewall.
oversize {pass | block} For this content profile, allow oversized files in IMAP pass All models.
traffic to pass through the firewall or block oversized
files in IMAP traffic from passing through the firewall.
quarantine {enable | For this content profile, enable or disable disable Models with
disable} quarantining blocked or infected files found in IMAP a hard disk
traffic. only.
scan {enable | disable} For this content profile, enable or disable scanning disable All models.
IMAP traffic for viruses and worms.
58 Fortinet Inc.
set commands set firewall profile
pop3
Keyword Description Default Availability
bannedword For this content profile, enable or disable tagging of disable All models.
{enable | disable} POP3 email containing words on the email filter
content blocking (also called the banned word) list.
block {enable | disable} For this content profile, enable or disable deleting disable All models.
files from POP3 traffic with blocked file patterns.
blocklist For this content profile, enable or disable tagging of disable All models.
{enable | disable} POP3 email from email addresses on the email filter
block list.
exemptlist For this content profile, enable or disable exempting disable All models.
{enable | disable} POP3 email from email addresses on the email filter
exempt list.
fragmail {pass | block} Allow fragmented POP3 email messages to pass block All models.
through the firewall or block fragmented POP3 email
messages from passing through the firewall in this
content profile.
oversize {pass | block} For this content profile, allow oversized files in POP3 pass All models.
traffic to pass through the firewall or block oversized
files in POP3 traffic from passing through the firewall.
quarantine Enable or disable storing blocked or infected files disable Models with
{enable | disable} found in POP3 traffic in the file quarantine on the a hard disk
FortiGate hard disk in this content profile. only.
scan {enable | disable} For this content profile, enable or disable scanning disable All models.
POP3 traffic for viruses and worms.
smtp
Keyword Description Default Availability
block {enable | disable} For this content profile, enable or disable deleting disable All models.
files from SMTP traffic with blocked file patterns.
fragmail {pass | block} For this content profile, allow fragmented SMTP block All models
email messages to pass through the firewall or block
fragmented SMTP email messages from passing
through the firewall.
oversize {pass | block} For this content profile, allow oversized files in SMTP pass All models
traffic to pass through the firewall or block oversized
files in SMTP traffic from passing through the firewall.
quarantine {enable | For this content profile, enable or disable disable Models with
disable} quarantining blocked or infected files found in SMTP a hard disk
traffic. only.
scan {enable | disable} For this content profile, enable or disable scanning disable All models.
SMTP traffic for viruses and worms.
Examples
Use the following commands to add a new content profile named ScanPOP3 that applies virus
scanning to POP3 traffic and quarantines all infected files. In addition the following commands turn off
virus scanning for HTTP, FTP, SMTP, and IMAP traffic.
set firewall profile ScanPOP3
Entering configure mode for firewall profile "ScanPOP3" . . .
Use "save" to commit changes and "exit" to cancel
Use the show command to view the default settings for the new content profile.
show
Enable quarantine for POP3.
pop3 quarantine enable
Disable scanning for HTTP, SMTP, IMAP, and FTP:
http scan disable
smtp scan disable
imap scan disable
ftp scan disable
Save your changes and exit from the profile shell.
save
View the configuration of the new content profile.
get firewall profile ScanPOP3
Related commands
• get firewall profile
• unset firewall profile
60 Fortinet Inc.
set commands set firewall recurringschedule
Note: If you create a recurring schedule with a stop time that occurs before the start time, the schedule will start at
the start time and finish at the stop time on the next day. You can use this technique to create recurring schedules
that run from one day to the next. You can also create a recurring schedule that runs for 24 hours by setting the
start and stop times to the same time.
Syntax description
Keyword Description Default Availability
<schedule-name_str> Add or edit a recurring schedule. No All models.
<schedule-name_str> is the name of the default.
recurring schedule to add or edit.
day {sunday monday Enter the names of one or more days of the week for No All models.
tuesday wednesday which the schedule is valid. Separate the names with default.
thursday friday saturday} a space.
end <hh:mm> The ending time of the schedule. 00:00 All models.
• hh can be 00 to 23
• mm can be 00, 15, 30, or 45 only
start <hh:mm> The starting time of the schedule. 00:00 All models.
• hh can be 00 to 23
• mm can be 00, 15, 30, or 45 only
Example
Use the following command to add a recurring schedule named access so that it is valid Monday to
Friday from 7:45 am to 5:30 pm.
set firewall recurringschedule access day monday tuesday wednesday
thursday friday start 07:45 end 17:30
Edit the recurring schedule named access so that it is no longer valid on Fridays.
set firewall recurringschedule access day monday tuesday wednesday
thursday start 07:45 end 17:30
Related commands
• set firewall policy
• set firewall onetimeschedule
• get firewall schedule
• unset firewall recurringschedule
Syntax description
Keyword Description Default Availability
<service-name_str> Add or edit a custom service. <service-name_str> No All models.
is the name of the custom service to add or edit. default.
{tcp | udp} The protocol used by the service (tcp or udp). No All models.
default.
<srcport-low_integer- The source port range for the service. No All models.
srcport-high_integer> If the source port range can be any port, enter default.
1-65535.
To specify a single port, enter the same port number for
srcport-low_integer and
srcport-high_integer. For example, if the single
port is 5003, enter 5003-5003.
<dstport-low_integer- The destination port range for the service. No All models.
dstport-high_integer> If the destination port range can be any port, enter default.
1-65535.
To specify a single port, enter the same port number for
dstport-low_integer and
dstport-high_integer. For example, if the single
port is 5003, enter 5003-5003.
Example
Use the following command to add a custom service called Custom_1. The service can use any
source port. The service destination port range is TCP 4501 to 4503.
set firewall service custom Custom_1 tcp 1-65535 4501-4503
Use the following command to edit Custom_1 to add a udp destination port of 5632.
set firewall service custom Custom_1 tcp 1-65535 4501-4503 udp 1-65535
5632-5632
Related commands
• unset firewall service
• set firewall policy
• set firewall service group
• get firewall service
62 Fortinet Inc.
set commands set firewall service group
Note: To edit a service group, you must enter all of the members of the service group, both those you are
changing and those that are staying the same.
Syntax description
Keyword Description Default Availability
<group-name_str> Add or edit a service group. <group-name_str> is No All models.
the name of the service group to add or edit. default.
member {<service_str> The names, separated by spaces, of the predefined No All models.
<service_str> and custom firewall services to add to the service default.
<service_str> ...} group. Use the command get firewall service
group <group-name_str> followed by a space
and a ? to list the predefined custom services.
<service_str> is case-sensitive.
Example
Use the following command to add a service group called Web_Services that includes the FTP,
HTTP, HTTPS, and Real Audio services.
set firewall service group Web_Services member FTP HTTP HTTPS RAUDIO
Use the following command to add the TELNET service to the Web_Services service group.
set firewall service group Web_Services member FTP HTTP HTTPS RAUDIO
TELNET
Related commands
• unset firewall service
• set firewall policy
• set firewall service custom
• get firewall service
Static NAT Used to translate an address on a source network to a hidden address on a destination
network. Static NAT translates the source address of return packets to the address on the
source network.
Port Forwarding Used to translate an address and a port number on a source network to a hidden address and,
optionally, a different port number on a destination network. Using port forwarding you can also
route packets with a specific port number and a destination address that matches the IP
address of the interface that receives the packets. This technique is called port forwarding or
port address translation (PAT). You can also use port forwarding to change the destination port
of the forwarded packets.
Syntax description
Keyword Description Default Availability
<vip-name_str> Enter the name for the VIP. If the name is new, this No All models.
command adds a new VIP. If the name already exists, default.
this command edits the VIP.
extintf <intf_str> The name of the interface connected to the source No All models.
network that receives the packets to be forwarded to default.
the destination network.
On the FortiGate-400 and up <intf_str> can be
the name of an interface or VLAN subinterface.
extip <external_ip> The external IP address to be mapped to an address No All models.
on the destination network. default.
For example, if the virtual IP provides access from
the Internet to a web server on a destination network,
the external IP address must be a static IP address
obtained from your ISP for your web server.
For a static NAT virtual IP, this address must be a
unique address that is not used by another host and
cannot be the same as the IP address of the
extintf <intf_str>. However, this address must
be routed to this interface.
For port forwarding virtual IP, this address can be any
IP address including the IP address of the extintf
<intf_str>.
For FortiGate models 50, 60, 100, 200, and 300 if the
IP address of extintf <intf_str> is set using
PPPoE or DHCP, <external_ip> can be
0.0.0.0. The FortiGate unit substitutes the IP
address set for this interface using PPPoE or DHCP.
64 Fortinet Inc.
set commands set firewall vip
Example
Use the following command to add a static NAT virtual IP named Web_Server that allows users on
the Internet to connect to a web server on your internal network. The internet address of the web
server is 64.32.21.34 and the real IP address of the web server on the internal network is
192.168.1.44.
set firewall vip Web_Server type staticnat extintf external extip
64.32.21.34 mappedip 192.168.1.44
Use the following command to edit the static NAT virtual IP named Web_Server to change the real IP
address of the web server on the internal network to 192.168.110.23.
set firewall vip Web_Server type staticnat mappedip 192.168.110.23
Use the following command to add a port forwarding virtual IP that uses port address translation to
allow external access to a web server on your internal network if you do not have a separate external
IP address for the web server. In this example, the IP address of the external interface is
192.168.100.99 and the real IP address of the web server on the internal network is 192.168.1.93.
set firewall vip Web_Server type portforward extintf external extip
192.168.100.99 extport 80 mappedip 192.168.1.93 mappedport 80
Related commands
• set firewall policy
• get firewall vip
• unset firewall vip
Syntax description
Keyword Description Default Availability
destination {syslog | Select the log locations: No All models.
webtrends | local | • syslog - record logs on a remote computer. default.
console} • webtrends - record logs on a NetIQ WebTrends
server.
• local - record logs on the FortiGate hard disk or if
no hard disk is available record logs to system
memory.
• console - record logs to the console.
Use the command set log setting to enable
logging to a destination and to set the log severity
level.
{emailfilter | event | Select a log type. You can select one log type at a No All models.
ids | traffic | update | time. The traffic log type is not available if set log default.
virus | webfilter} policy destination is set to local and the
FortiGate unit does not have a hard disk.
status {enable | disable} Enable or disable the specified log type. disable All models.
category <category_str> See the Category table for the list of categories for No All models.
[<category_str> each log type. default.
[<category_str> ... ]]
Category
Log type Category Description
emailfilter email Blocklist email detected.
bword Banned word email detected.
none Turn off emailfilter log categories.
event configuration Configuration change event.
ipsec IPSec negotiation event.
dhcp DHCP service event.
ppp L2TP, PPTP, PPPoE service event.
login Administrator login/logout event.
ipmac IP/MAC binding event.
system System activity event.
ha High Availability activity event.
auth Firewall authentication event.
routegateway Route gateway event.
none Turn off event log categories.
ids detection Attack detection activity.
prevention Attack prevention activity.
66 Fortinet Inc.
set commands set log policy
Examples
Use the following command to record High Availability activities authentication events to the event log
on the FortiGate local hard disk:
set log policy destination local event status enable category ha auth
Related commands
• get log elog
• get log logsetting
• get log policy
• set log setting
• set log trafficfilter rule
• set log trafficfilter setting
Note: The optional hard disk is not available for all FortiGate models and the FortiGate-50 does not have the
option to record logs to memory. Use the command get system status to confirm whether or not a hard disk
is available on the FortiGate unit.
You can select the same or different severity level for each log location. For example, you might want
to record only emergency and alert level messages to the FortiGate memory and record all levels of
messages on a remote computer.
Syntax description
Keyword Description Default Availability
{console | local | memory Select a log location. To log to more than one No All models.
| syslog | webtrends} location, configure each log location separately. If the default.
FortiGate unit contains a hard disk, local is
displayed as a choice. If the FortiGate unit does not
contain a hard disk, memory is displayed instead of
local.
Neither local nor memory are available for
FortiGate-50 units.
csv {enable | disable} Enable or disable saving logs in comma separated disable All models.
value (CSV) format. syslog only.
diskfull {overwrite | Set the options to use when the FortiGate hard disk over Not available
blocktraffic | nolog} runs out of space: write on the
• overwrite deletes the oldest log file when the FortiGate-50.
hard disk is full. local only.
• blocktraffic blocks all network traffic when the
hard disk is full.
• nolog stops logging messages when the hard disk
is full.
filesz Set a maximum log file size in Mbytes. 10 Not available
<file-size_integer> When the log file reaches this size, the current log file Mbytes on the
is closed and saved and a new active log file is FortiGate-50.
started. The default maximum log file size is 10 local only.
Mbytes and the maximum allowed is 2 Gbytes.
68 Fortinet Inc.
set commands set log setting
Examples
Use the following command to enable logging to a syslog server with the IP address 192.168.23.95
and a log level of 3:
set log setting syslog server 192.168.23.95 loglevel 3
Related commands
• get log logsetting
• set log policy
• set log trafficfilter rule
• set log trafficfilter setting
Syntax description
Keyword Description Default Availability
<name_str> Type a name to identify the traffic log filter. No All models.
default.
dst Type the destination IP address and netmask for No All models.
<destination _ip> which you want the FortiGate unit to log traffic default.
<netmask_ip> messages. The address can be an individual
computer, subnetwork, or network.
service <name_str> Select the service group or individual service for No All models.
which you want the FortiGate unit to log traffic default.
messages. Use the command set log
trafficfilter rule <name_str> service
followed by a space and a ? for a list of available
services.
src Type the source IP address and netmask for which No All models.
<souce_ip> <netmask_ip> you want the FortiGate unit to log traffic messages. default.
The address can be an individual computer,
subnetwork, or network.
Example
Use the following command to log the HTTP traffic coming from 192.168.0.0 and going to
192.168.23.10:
set log trafficfilter rule rule1 src 192.168.0.0 255.255.0.0
dst 192.168.23.10 service http
Related commands
• get log trafficfilter
• unset log filter
• set log trafficfilter setting
• set log policy
70 Fortinet Inc.
set commands set log trafficfilter setting
Syntax description
Keyword Description Default Availability
display {port | name} Select port if you want traffic log messages to list port All models.
the port number, for example, 80/tcp. Select name if
you want traffic log messages to list the name of the
service, for example, TCP.
resolve Select enable if you want traffic log messages to list disable All models.
{enable | disable} the IP address and the domain name stored on the
DNS. If the primary and secondary DNS addresses
provided to you by your ISP have not already been
added, see “set system dns” on page 84 for
information on how to add DNS addresses.
type {session | packet} If you select session, the FortiGate unit records the session All models.
number of packets sent and received for each
session. If you select packet, the FortiGate unit
records the average packet length, in bytes, for each
session.
Examples
Use the following command to set the trafficfilter setting to session and the display to name:
set log trafficfilter setting type session display name
Related commands
• get log trafficfilter
• set log trafficfilter rule
• set system dns
Syntax description
Keyword Description Default Availability
checksum Enter one or more protocols, separated by commas, none All models.
{none | ip,tcp,udp,icmp} to enable checksum verification for that type of traffic.
Enter none to turn off all checksum verification.
Configure the NIDS to run checksums to verify that
packets passing through the FortiGate have not been
altered. For maximum protection, you can turn on
checksum verification for all types of protocols.
However, if the FortiGate does not need to do
checksum verification, you can turn it off for some or
all types of traffic to improve performance. You may
not need to run checksum verifications if your
FortiGate is installed behind a router that also does
checksum verification.
interface <name_str> Enable or disable NIDS monitoring on the specified disable All models.
status {enable | disable} interface. Enter set nids detection
interface followed by a space and ? for a list of
available interfaces. For all models except the
FortiGate-50, you can enable NIDS monitoring for up
to four interfaces. For the FortiGate-50 you can
enable NIDS monitoring for one interface.
Examples
Use the following command to enable NIDS monitoring on the internal interface.
set nids detection interface internal status enable
Use the following command to run checksum verification for the IP and ICMP protocols.
set nids detection checksum ip,icmp
Related commands
• get nids detection
• set nids prevention
• set nids rule
72 Fortinet Inc.
set commands set nids prevention
Syntax description
Keyword Description Default Availability
icmp <attack_str> Enter the name of the Internet Control Message Protocol No All models.
(ICMP) NIDS prevention signature that you want to enable, or default.
disable or for which to change the threshold value. Use the
command set nids prevention icmp followed by a
space and a ? for list of ICMP NIDS prevention signatures.
ip <attack_str> Enter the name of the Internet Protocol (IP) NIDS prevention No All models.
signature that you want to enable, or disable or for which to default.
change the threshold value. Use the command set nids
prevention ip followed by a space and a ? for list of IP
NIDS prevention signatures.
reset Select Reset to restore the default status for all NIDS No All models.
Prevention signatures and to restore default threshold values. default.
status {enable | Enable or disable the NIDS Prevention module. disable All models.
disable} The NIDS Prevention module is disabled by default. You must
enable it when you configure a new FortiGate unit, or when
you reboot a FortiGate unit.
tcp <attack_str> Enter the name of the Transmission Control Protocol (TCP) No All models
NIDS prevention signature that you want to enable, or disable default.
or for which to change the threshold value. Use the command
set nids prevention tcp followed by a space and a ?
for list of TCP NIDS prevention signatures.
udp <attack_str> Enter the name of the User Datagram Protocol (UDP) NIDS No All models.
prevention signature that you want to enable, or disable or for default.
which to change the threshold value. Use the command set
nids prevention udp followed by a space and a ? for list
of UDP NIDS prevention signatures.
74 Fortinet Inc.
set commands set nids prevention
Examples
Use the following command to enable the NIDS Prevention module:
set nids prevention status enable
Use the following command to restore the NIDS Prevention to its default configuration:
set nids prevention reset
Use the following command to enable TCP Port Scan signature and set the threshold to 200 SYN per
second:
set nids prevention tcp portscan status enable threshold 130
Use the following command to change the TCP Port Scan attack threshold to 100 SYN per second:
set nids prevention tcp portscan threshold 100
Related commands
• get nids prevention
• set nids detection
• set nids rule
76 Fortinet Inc.
set commands set nids rule
Note: User-defined signatures are an advanced feature and should only be created and added to the FortiGate
unit by IT specialists who are familiar with programming concepts and with network intrusion detection systems.
Syntax description
Keyword Description Default Availability
<group-name_str> The name of the signature group to enable or disable. No All models.
Use the command set nids rule followed by a default.
space and ? or the command get nids rule for a
list of signature groups.
status {enable | disable} Enable or disable the specified signature group. enable All models.
Examples
Use the following command to disable the web-apache signature group:
set nids rule web-apache status disable
Related commands
• get nids rule
• execute backup
• execute restore
Syntax description
Keywords Description Default Availability
username <name_str> A name for this administrator account. If the No default. All models.
administrator account name already exists, this
command changes its account settings. If the
administrator account name does not exist, this
command adds a new administrator account
name.
password <passwd_str> Enter a password for the administrator account. No default. All models.
For improved security, the password should be
at least 6 characters long.
permission If you set the permission level for the readonly All models.
{readonly | readwrite} administrator to readwrite, the administrator You cannot
can: change the
• view and change the FortiGate configuration admin
from the web-based manager, or from the CLI administrator
using get and set commands, account
• change his or her administrator account permissions.
password using the web-based manager.
The administrator cannot use the set system
admin command from the CLI and can not add,
edit, or delete administrator accounts using the
web-based manager.
If you set the permission level for the
administrator to readonly, the administrator
can view the FortiGate configuration using the
web-based manager or using the CLI get
commands. See “Access levels” on page 13 for
more information.
trusthost <address_ip> The IP address or subnet address and netmask 0.0.0.0/0.0.0.0 All models.
<netmask_ip> from which the administrator can connect to the
FortiGate.
If you want the administrator to be able to
access the FortiGate from any address, set the
trusted host to 0.0.0.0 and the netmask to
0.0.0.0.
Examples
You can use the following commands to add a readonly administrator account with the name
new_adm.
set system admin username new_adm password a2b4c6 permission readonly
Then you can use the following command to edit this account.
set system admin username new_adm permission readwrite
Related commands
• get system admin
• unset system admin
78 Fortinet Inc.
set commands set system autoupdate
Note: You can also initiate an update at any time using the command execute updatecenter updatenow.
Syntax description
Keywords Description Default Availability
pushaddressoverride Enable or disable a push address override. disable All models.
{enable <server_ip> You must enable pushupdate before
<port> | disable} enabling pushaddressoverride.
If the FDN must connect to the FortiGate
unit through a NAT device, you must
configure port forwarding on the NAT device
and add the port forwarding information to
the push update configuration. See “set
firewall vip” on page 64.
Enter the External IP address that the FDN
connects to. This is the address of the
external interface of the FortiGate NAT
device.
Enter the External Service Port that the FDN
connects to. This can be port 9443 or an
override push port that you assign.
You cannot receive push updates through a
NAT device if the external IP address of the
NAT device is dynamic (for example, set
using PPPoE or DHCP).
pushupdate Enable or disable updates initiated by the disable All models.
{enable | disable} update center.
schedule {enable | Enable or disable scheduled updates, at disable All models.
disable} regular intervals throughout the day, once a
day, or once a week.
every <hh:mm> Schedule updates at regular intervals No default. All models.
throughout the day. schedule
<hh:mm> is the time interval to wait between must be
updates. enabled.
• hh can be 00 to 23
• mm can be 00, 15, 30, or 45
Examples
You can use the following command to schedule updates once a day at 07:30:
set system autoupdate schedule enable daily 07:30
Related commands
• get system autoupdate
• execute updatecenter updatenow
• set firewall vip
80 Fortinet Inc.
set commands set system brctl
Syntax description
Keyword Description Default Availability
add interface <intf_str> Enter an interface name. Use the command set No All models.
mac <address_hex> system brctl add interface followed by a default. Transparent
space and a ? for a list of available interfaces. Enter a mode only.
MAC address.
del mac [interface] Delete entries from the mac table. You can enter No All models.
[<mac-address_hex>] either an interface name or a MAC address. default. Transparent
mode only.
list Show the static MAC entries. No All models.
default. Transparent
mode only.
Example
Use the following command to add a static MAC entry for the internal interface:
set system brctl add interface internal mac 11:00:aa:ff:33:22
Syntax description
Keywords Description Default Availability
defaultroute The default route to be assigned to DHCP clients. FortiGate-50 All models.
<gateway_ip> The defaultroute, exclusionrange, and 60:
iprange, and reserve IP addresses must all be 192.168.1.99.
on the same subnet as the internal interface. Other models,
no default.
dns <dns_ip> The IP addresses of up to 3 DNS servers that the No default. All models.
[<dns_ip>] [<dns_ip>] DHCP clients can use for looking up domain
names. Use a space to separate the IP addresses.
To remove a DNS IP, set the IP to 0.0.0.0.
domain <domain_str> The domain name that the DHCP server assigns No default. All models.
to the DHCP clients.
exclusionrange Enter up to 4 exclusion ranges of IP addresses FortiGate-50 All models.
{<start1_ip-end1_ip> within the starting IP and ending IP addresses that and 60:
| none} cannot be assigned to DHCP clients. Separate the 192.168.1.99-
IP addresses in the range with a dash (-). Do not 192.168.1.99
[{<start2_ip-end2_ip> add spaces. Use a space to separate ranges. The Other models,
| none}] defaultroute, exclusionrange, iprange, no default.
[{<start3_ip-end3_ip> and reserve IP addresses must all be on the
| none}] same subnet as the internal interface.
[{<start4_ip-end4_ip> To change an exclusion range you must redefine
all of the exclusion ranges. To remove all exclusion
| none}] ranges, replace the first exclusion range with
none.
iprange The starting IP and the ending IP for the range of FortiGate-50 All models.
<start_ip-end_ip> IP addresses that the FortiGate unit can assign to and 60:
DHCP clients. The defaultroute, 192.168.1.1-
exclusionrange, iprange, and reserve IP 192.168.1.254.
addresses must all be on the same subnet as the Other models,
internal interface. no default.
leaseduration The interval in seconds after which a DHCP client FortiGate-50 All models.
<lease_int> must ask the DHCP server for a new address. The and 60: 604800
lease duration must be between 300 and 8000000 (7 days).
seconds. Other models,
no default.
netmask <netmask_ip> The Netmask that the FortiGate DHCP server FortiGate-50 All models.
assigns to the DHCP clients. and 60:
255.255.255.0.
Other models,
no default.
reserve <reserve_ip> Reserve an IP address so that the FortiGate No default. All models.
<reserve_mac> DHCP server always assigns this IP address to the
[<name_str> | none] device with the specified MAC address. Optionally
specify a name for the IP and MAC address pair.
The reserved IP cannot be assigned to any other
device. You can only add a given IP address or
MAC address once. The defaultroute,
exclusionrange, iprange, and reserve IP
addresses must all be on the same subnet as the
internal interface.
82 Fortinet Inc.
set commands set system dhcpserver
Examples
Use the following command to create a DHCP configuration that assigns IPs in the range
192.168.1.100 to 192.168.1.200 with a netmask of 255.255.255.0, configures DHCP clients to request
a new IP address once a day, and assigns DHCP clients a default route of 192.168.1.99.
set system dhcpserver iprange 192.168.1.100-192.168.1.200 netmask
255.255.255.0 leaseduration 1440 defaultroute 192.168.1.99
Use the following command to enable the FortiGate DHCP server.
set system dhcpserver status enable
Use the following command to assign the address 205.34.123.1 to the first DNS server assigned to
DHCP clients.
set system dhcpserver dns 205.34.123.1
Use the following command to set up the first exclusion range for DHCP clients and to exclude IP
addresses from 192.168.1.120 to 192.168.1.130 from that range.
set system dhcpserver exclusionrange 192.168.1.120-192.168.1.130
Related commands
• get system dhcpserver
• unset system dhcpserver
Syntax description
Keyword Description Default Availability
primary Enter the primary DNS server IP address. 207.194.200.1 All models.
{<server_ip> | none} Enter none to delete the primary DNS server
IP address.
secondary Enter the secondary DNS IP server address. 207.194.200.129 All models.
{<server_ip> | none} Enter none to delete the secondary DNS
server IP address.
Examples
Use the following command to set the primary DNS server to 207.194.200.2:
set system dns primary 207.194.200.2
Use the following command to delete the primary DNS server:
set system dns primary none
Related commands
• get system dns
84 Fortinet Inc.
set commands set system ha
set system ha
Use this command to configure FortiGate high availability (HA). HA is supported on FortiGate units
300 and up. On all FortiGate units that support HA, except the FortiGate-500, you must use the
command set system interface <int_str> config hamode enable to configure the HA
interface for HA operation before the set system ha command is available.
Except for priority, override, and monitor the HA configuration that you create using the set
system ha command must be identical for each FortiGate unit in the cluster.
Syntax description
Keyword Description Default Availability
groupid <id_integer> The HA group ID. The group ID range is from 0 to 63. 0 Models
All members of the HA cluster must have the same numbered
group ID. 300 and
higher.
mode {standalone | a-a The HA mode. standalone Models
| a-p} Enter standalone to remove the FortiGate unit from numbered
an HA cluster. 300 and
Enter a-a to create an active-active HA cluster. In an higher.
active-active cluster, all units process traffic and the
primary unit performs load balancing to share
connections among all units in the cluster.
Enter a-p to create an active-passive HA cluster,
where one FortiGate in the HA cluster is the primary
unit that processes all connections and the others are
in active standby, monitoring the status and remaining
synchronized with the primary FortiGate unit.
monitor <intf_str> Enter the names of the FortiGate interfaces that are none Models
<intf_str> <intf_str> to be monitored. Separate each name with a space. numbered
... none Configure monitor to monitor FortiGate interfaces to 300 and
make sure they are up and actively processing higher.
network traffic. If the interface fails or is disconnected
the FortiGate unit reverts to a standby state and is
removed from the cluster.
Enter none to remove all the interface names.
override {enable | Configure the FortiGate unit to override another disable Models
disable} primary unit in the cluster with the same priority and numbered
become the primary unit. 300 and
higher.
password <passwd_str> Enter a password for the HA cluster. The password No default. Models
must be the same for all FortiGate units in the HA numbered
cluster. The maximum password length is 8 300 and
characters. higher.
priority Set the clustering priority of the FortiGate unit. The 255 Models
{<priority_int> | unit with the lowest priority becomes the primary unit. numbered
default} The priority range is 0 to 255. If more than one unit in 300 and
the cluster has the same priority, the cluster higher.
negotiates between these units to select the primary
unit.
Examples
Use the following commands to configure a FortiGate-500 for active-active HA mode with a group ID of
23 and an HA password of hapass. Also configure the FortiGate-500 to monitor the internal, external,
and port1 interfaces:
set system ha mode a-a
set system ha groupid 23
set system ha password hapass
set system ha monitor internal external port1
86 Fortinet Inc.
set commands set system ha
Use the following command to set the HA priority of a FortiGate unit to 0 so that this unit always
becomes the primary unit in the cluster.
set system ha priority 0
Related commands
• get system ha
• execute ha manage
• execute ha synchronize
• set system interface
Syntax description
Keyword Description Default Availability
<hostname_str> Type a name for this FortiGate unit. The host name Model All models.
can be up to 31 characters long and can contain name.
numbers (0-9), uppercase and lowercase letters (A-
Z, a-z), and the special characters - and _. Spaces
and the \ < > [ ] ` $ % & characters are not allowed.
Examples
Use the following command to change the FortiGate unit host name to Main_Office:
set system hostname Main_Office
Related commands
• get system status
• unset system hostname
• set system snmp
88 Fortinet Inc.
set commands set system interface
Syntax description
Keywords Description Default Availability
<intf_str> The name of the interface to configure. Enter No default. All models.
set system interface followed by a space
and a ? to display the list of interfaces. For
FortiGate models 400 and up <intf_str> can
also be a VLAN subinterface.
mode {dhcp | pppoe | Configure the connection mode for the interface No default. All models.
static} and configure the primary IP address for the dhcp and pppoe
interface. are available for
static, configure a static IP address for the the FortiGate-50,
interface. 100, 200, and
dhcp, configure the interface to receive its IP 300 external
address from a DHCP server. interface and
pppoe, configure the interface to receive its IP FortiGate-60
address from a PPPoE server. wan1 interface.
Not available in
Transparent
mode.
config Set interface parameters. No default. All models.
Note: The first time you configure a FortiGate external interface for PPPoE you must enter both the username
and password keywords.
arpforward Enable or disable layer 2 ARP forwarding for an disable All models.
{enable | disable} interface.
denyaccess Deny management access to the interface. You No default. All models.
{ping https snmp ssh can enter one or more of the management
http telnet} access types separated by spaces.
detectserver <ping_ip> Add the IP address of a ping server. A ping No default. All models.
server is usually the next hop router on the Not available in
network connected to the interface. If Transparent
gwdetect is enabled, the FortiGate unit mode.
confirms connectivity with the server at this IP
address. Adding a ping server is required for
routing failover.
gwdetect Enable or disable confirming connectivity with disable All models.
{enable | disable} the server at the detectserv <ping_ip> IP Not available in
address. The frequency with which the Transparent
FortiGate unit confirms connectivity is set using mode.
the set system option interval
command.
90 Fortinet Inc.
set commands set system interface
Example:
Use the following commands to set the FortiGate-500 port1 interface IP address and netmask to
192.168.100.159 255.255.255.0, the management access to ping and https and to add the
interface to a zone named Zone1.
set system interface port1 mode static ip 192.168.100.159 255.255.255.0
set system interface port1 config allowaccess ping https zone Zone1
Use the following commands to set the IP address and netmask of a VLAN subinterface named
VLAN_1 to 192.168.200.20 255.255.255.0, the management access to ping and https and to
add the VLAN subinterface to a zone named Zone2.
set system interface VLAN_1 mode static ip 192.168.200.20 255.255.255.0
set system interface VLAN_1 config allowaccess ping https zone Zone2
Use the following command to add a secondary IP address to the internal interface. The secondary IP
address and netmask is 192.176.23.180 255.255.255.0. Also configure ping and https
management access to this secondary IP address.
set system interface internal config secip 192.176.23.180 255.255.255.0
set system interface internal config secallowaccess ping https
Related commands
• set system vlan
• set system zone
• get system interface
• unset system secondip
• unset system vlan
• unset system zone
92 Fortinet Inc.
set commands set system mainregpage
Syntax description
Keyword Description Default Availability
mainregpage {hide | show} Show or hide the registration window on the show All models.
web-based manager.
Example:
Use the following command to hide the registration window on the web-based manager:
set system mainregpage hide
Related commands
• get system mainregpage
Syntax description
Keyword Description Default Availability
ip <manage_ip> <netmask_ip> Set the IP address and netmask of the 10.10.10.1 All models.
Transparent mode management 255.255.255.0 Only
interface. available in
Transparent
mode.
Example
Use the following command to set the transparent mode management IP address to 192.168.1.80 and
the netmask to 255.255.255.0:
set system management ip 192.168.1.80 255.255.255.0
Related commands
• get system management
94 Fortinet Inc.
set commands set system opmode
Syntax description
Keyword Description Default Availability
opmode {nat | transparent} Change the FortiGate operation to nat All models.
NAT/Route or Transparent mode.
Example
Use the following command to set firewall operation mode to Transparent:
set system opmode transparent
Related commands
• get system status
Syntax description
Keyword Description Default Availability
admintimeout Set the administrator idle time out to control the 5 minutes All models.
<timeout_integer> amount of inactive time before the administrator
must log in again. The maximum
admintimeout is 480 minutes (8 hours).
authtimeout Set the firewall user authentication time out to 15 minutes All models.
<timeout_integer> control the amount of inactive time before the
user must authenticate again. The maximum
authtimeout is 480 minutes (8 hours).
failtime Set the Dead gateway detection failover number. 5 All models.
<failover_integer> Enter the number of times that ping fails before
the FortiGate unit assumes that the gateway is
no longer functioning.
interval Set the Dead gateway detection failover interval. 5 seconds All models.
<interval_integer> Enter a number in seconds to specify how often
the FortiGate unit pings the target.
language {english | Set the web-based manager display language. english All models.
simplifiedchinese | You can enter English, Simplified Chinese,
traditionalchinese | Japanese, Korean, or Traditional Chinese.
korean | japanese}
lcdpin <pin_integer> Set the 6 digit PIN administrators must enter to 123456 FortiGate
use the LCD panel. models
numbered 300
and higher.
lcdprotection (enable Enable or disable LCD panel PIN protection. disable FortiGate
| disable} models
numbered 300
and higher.
refresh Set the Automatic Refresh Interval, in seconds, none All models.
{<interval_integer> | for the web-based manager System > Status >
none} Monitor.
Examples
Use the following command to set the idle timeout to 50 minutes:
set system option admintimeout 50
Use the following command to require administrators to enter 654321 to access the LCD panel:
set system option lcdprotection enable lcdpin 654321
Related commands
• get system option
• set system interface
96 Fortinet Inc.
set commands set system route number
‘Syntax description
Keyword Description Default Availability
<route_integer> The number of the route to specify the location No All models.
of the route in the routing table. Entering a new default.
route number adds a new route. Entering an
existing route number edits that route.
Enter set system route number followed
by a space and ? to see a list of existing routes
and their numbers.
dev1 {<intf_str> | auto} The name of the FortiGate interface through auto All models.
which to route traffic. If dev1 is set to auto, NAT/Route
the FortiGate routes traffic to the interface that mode only.
is on the same subnet as gw1.
dev2 <intf_str> The name of the FortiGate interface through auto All models.
which to route traffic. If dev2 is set to auto, NAT/Route
the FortiGate routes traffic to the interface that mode only.
is on the same subnet as gw2.
dst <destination_ip> The destination IP address and netmask for 0.0.0.0 All models.
<netmask_ip> this route. 0.0.0.0
Enter 0.0.0.0 0.0.0.0 for the destination
IP and netmask to add a default route.
gw1 <gateway1_ip> The IP address of the first next hop router to No All models.
which this route directs traffic. default.
In NAT/Route mode, <gateway1_ip> must
be on the same subnet as one of the FortiGate
interfaces. If you specify dev1 the
<gateway1_ip> must be on the same subnet
as the dev1 interface.
In Transparent mode, <gateway1_ip> must
be on the same subnet as the Transparent
mode management IP.
gw2 <gateway2_ip> The IP address of the second next hop router No All models.
to which this route directs traffic. default. NAT/Route
In NAT/Route mode, <gateway2_ip> must mode only.
be on the same subnet as one of the FortiGate
interfaces. If you specify dev2 the
<gateway2_ip> must be on the same subnet
as the dev2 interface.
In Transparent mode, <gateway2_ip> must
be on the same subnet as the Transparent
mode management IP.
Example
Use the following command in NAT/Route mode to add a default gateway with the IP address
192.168.100.1:
set system route number 0 gw1 192.168.100.1
Use the following command in NAT/Route mode to add a route with the number 0, the destination IP
address and netmask 64.23.11.0 255.255.255.0 and using a gateway with the IP address
192.168.100.1:
set system route number 0 dst 64.23.11.0 255.255.255.0 gw1 192.168.100.1
Use the following command in NAT/Route mode for route 0 to change gateway 1 to a gateway with the
IP address 172.168.200.1 and to add a second gateway with the IP address 192.168.1.12:
set system route number 0 gw1 172.168.200.1 gw2 192.168.1.12
Use the following command in NAT/Route mode to add a route for primary and backup links to the
Internet. In this route, the external interface is the primary link to the Internet and the IP address of the
next hop router on the network connected to the external interface is 1.1.1.1. The DMZ interface is the
secondary link to the Internet and the IP address of the next hop router in the network connected to the
DMZ interface is 2.2.2.2:
set system route number 0 dst 0.0.0.0 0.0.0.0 gw1 1.1.1.1 dev1 external
gw2 2.2.2.1 dev2 dmz
Use the following command in transparent mode to add a default to a gateway with the IP address
192.168.100.1:
set system route number 0 gw1 192.168.100.1
Use the following command in Transparent mode to add a route with the number 1, the destination IP
address and netmask 64.23.11.0 255.255.255.0 and using a gateway with the IP address
192.168.100.1:
set system route number 1 dst 64.23.11.0 255.255.255.0 gw1 192.168.100.1
Related commands
• get system route table
• unset system route number
98 Fortinet Inc.
set commands set system route policy
Syntax description
Keyword Description Default Availability
<policy_integer> The number of the route to specify the location of the No All models.
route in the routing table. Entering a new route default. NAT/Route
number adds a new route. Entering an existing route mode only.
number edits that route.
Enter set system route number followed by a
space and ? to see a list of existing routes and their
numbers.
dst <destination_ip> The destination IP address and netmask for this 0.0.0.0 All models.
<netmask_ip> route. 0.0.0.0 NAT/Route
mode only.
gw <gateway_ip> The IP address of the first next hop router to which 0.0.0.0 All models.
this route directs traffic. NAT/Route
In NAT/Route mode, <gateway1_ip> must be on mode only.
the same subnet as one of the FortiGate interfaces. If
you specify dev1 the <gateway1_ip> must be on
the same subnet as the dev1 interface.
iifname <intf_str> The source interface for the route. <intf_str> is No All models.
the name of the FortiGate interface from which this default. NAT/Route
route directs traffic. mode only.
oifname <intf_str> The destination interface for the route. <intf_str> No All models.
is the name of the FortiGate interface through which default. NAT/Route
to route traffic. mode only.
port <low_integer> Add a port range to a policy route. If you add a port 00 All models.
<high_integer> range, the policy route will route packets with a NAT/Route
matching destination port range. mode only.
Examples
If a FortiGate unit provides internet access for multiple internal subnets, you can use policy routing to
control the route that traffic from each network takes to the Internet. For example, if the internal
network includes the subnets 192.168.10.0 and 192.168.20.0 you can enter the following policy
routes:
• Enter the following command to route traffic from the 192.168.10.0 subnet to the 100.100.100.0
external network:
set system route policy 1 src 192.168.10.0 255.255.255.0 dst
100.100.100.0 255.255.255.0 gw 1.1.1.1
• Enter the following command to route traffic from the 192.168.20.0 subnet to the 200.200.200.0
external network:
set system route policy 2 src 192.168.20.0 255.255.255.0 dst
200.200.200.0 255.255.255.0 gw 2.2.2.1
You can use the following policy routes to direct all HTTP traffic (using port 80) to one external network
and all other traffic to the other external network.
• Enter the following command to route all HTTP traffic using port 80 to the next hop gateway with IP
address 1.1.1.1.
set system route policy 1 src 0.0.0.0 0.0.0.0 dst 0.0.0.0 0.0.0.0
protocol 6 port 1 1000 gw 1.1.1.1
• Enter the following command to route all other traffic to the next hop gateway with IP address
2.2.2.1.
Set system route policy 2 src 0.0.0.0 0.0.0.0 dst 0.0.0.0 0.0.0.0 gw
2.2.2.1
Related commands
• unset system route policy
• get system route policy
Syntax description
Keyword Description Default Availability
{enable | disable} Enable or disable RIP server support. When you enable disable All models
RIP server support, the FortiGate acts like a RIP server, except
broadcasting RIP packets to other nearby routers. FortiGate-50.
NAT/Route
mode only.
advertise-default Enable or disable including the FortiGate default route in disable All models
{enable | disable} RIP routing table updates. except
FortiGate-50.
NAT/Route
mode only.
auto-summary Enable or disable automatically summarizing subnet disable All models
{enable | disable} routes into network-level routes. except
If auto-summary is not enabled, the FortiGate unit FortiGate-50.
transmits sub-prefix routing information across classfull NAT/Route
network boundaries. mode only.
default-metric Change the default metric that is applied to routes with 2 All models
<metric_integer> incompatible metrics. The default metric assists in except
resolving how routes with incompatible metrics are FortiGate-50.
redistributed. Whenever metrics do not convert, RIP uses NAT/Route
the default metric to provide a reasonable substitute and mode only.
allows the redistribution to proceed.
input-queue Change the depth of the RIP input queue. The larger the 50 All models
<queue-size_integer> numerical value, the larger the depth of the queue. except
Consider changing the input-queue depth if you have a FortiGate-50.
FortiGate unit sending at high speed to a low-speed NAT/Route
router that might not be able to receive at the high speed. mode only.
Configuring this command will help prevent the routing
table losing information. <queue-size_integer> can
be from 0 to 1024. A queue size of 0 means there is no
input queue.
output-delay Change the output delay to add a delay in milliseconds 0 All models
<delay_integer> between packets in a multiple-packet RIP update. A except
typical output delay is 8 to 50 milliseconds. Add an output FortiGate-50.
delay if you are configuring RIP on a FortiGate unit that NAT/Route
could be sending packets to a router that cannot receive mode only.
the packets at the rate the FortiGate unit is sending them.
The default output delay is 0 milliseconds.
Example:
Use the following command to enable RIP server support:
set system route rip enable
Use the following command to change the RIP default metric to 5:
set system route rip default-metric 5
Related commands
• get system route rip
• set system route rip filter
• set system route rip interface
• set system route rip neighbor
• set system route rip timers
Neighbors filter For filtering routes received from neighboring routers. When the FortiGate unit receives routes
from a neighboring router, the neighbors filter defines what routes received from the neighbor
will be stored in the FortiGate routing table and what routes will be discarded.
Routes filter For filtering routes before a routing table update is sent to neighboring routers. Before the
FortiGate unit sends routes to neighboring routers, the routes filter defines what routes can be
sent and what routes cannot be sent.
A RIP filter consists of the IP address and netmask of a route, the action the filter should perform for
this route (allow or deny), and the interface on which this filter entry should be applied. Routes that do
not match a route added to a RIP filter are allowed.
A single RIP filter contains instructions for allowing or denying a single route. You can add multiple RIP
filter entries under the same RIP filter name to create a RIP filter list. Using a RIP filter list you can filter
multiple routes.
After creating RIP filters and filter lists you can configure the neighbors filter or routes filter by selecting
a filter or filter list for each of these filter types. If you do not select a RIP filter for neighbors or routes,
no filtering is applied. You can add a total of four RIP filters or RIP filter lists, but you can only have one
active neighbors filter and one active routes filter.
Syntax description
Keyword Description Default Availability
add name Add and specify the name of a RIP filter list. Each No All models
<filter-name_str> RIP filter and RIP filter list must have a unique default. except
name. The name can be 15 characters long and can FortiGate-50.
contain upper and lower case letters, numbers, and NAT/Route
special characters. The name cannot contain mode only.
spaces.
del name Delete the named RIP filter or RIP filter list. No All models
<filter-name_str> default. except
FortiGate-50.
NAT/Route
mode only.
name [<filter-name_str> Add a route prefix to a filter list or delete a route No All models
{add | del} address prefix from a filter list. A route prefix consists of the default. except
<route_ip> <netmask_ip> IP address and netmask for the route, the action to FortiGate-50.
be performed by the filter (allow or deny), and the NAT/Route
action {allow | deny} name of the interface on which to apply the route mode only.
interface <intf_str>] filter.
To add or delete a route prefix you must enter all of
the parameters of the route prefix.
Set action to allow so that the filter permits this
route to be communicated. Set action to deny to
stop this route from being communicated.
Enter set system route rip filter name to
view the list of filter lists. You must add the route
prefix to one of these filter lists. Use the command
set system route rip filter add name to
add a filter list.
Example:
Use the following commands to add two filter lists named Filter_List1 and Filter_List2:
set system route rip filter add name Filter_List1
set system route rip filter add name Filter_List2
Use the following command to add route prefixes to each filter list:
set system route rip filter name Filter_List1 add address 1.2.3.4
255.255.255.0 action allow interface internal
set system route rip filter name Filter_List1 add address 4.5.6.7
255.255.255.0 action deny interface internal
set system route rip filter name Filter_List2 add address 11.22.33.44
255.255.255.0 action allow interface internal
set system route rip filter name Filter_List2 add address 44.55.66.77
255.255.255.0 action deny interface internal
Use the following commands to set the neighbors filter to Filter_List1 and enable the neighbors
filter:
set system route rip filter neighbors filter-list Filter_List1
set system route rip filter neighbors mode filtered
Use the following commands to set the routes filter to Filter_List2 and enable the routes filter:
set system route rip filter routes filter-list Filter_List2
set system route rip filter routes mode filtered
Use the following command to view RIP filter settings:
get system route rip filter
Related commands
• get system route rip
• set system route rip
• set system route rip interface
• set system route rip neighbor
• set system route rip timers
Examples
Use the following commands to configure the internal interface to send and receive RIP2 routes.
set system route rip interface internal send v2 metric 1 enable
set system route rip interface internal receive v2 enable
Use the following command to configure RIP2 authentication for the internal interface, set the
password to RIPpass and set the authentication mode to MD5:
set system route rip interface internal auth enable RIPpass mode md5
Related commands
• get system route rip
• set system route rip
• set system route rip filter
• set system route rip neighbor
• set system route rip timers
Syntax description
Keyword Description Default Availability
<neighbor_ip> The IP address of a neighbor router that you want the No All models
FortiGate unit to exchange routing information with. default. except
FortiGate-50.
NAT/Route
mode only.
send {v1 | v2 } {enable | Enable or disable sending RIP1 and RIP2 messages No All models
disable} to the <neighbor_ip>. default. except
v1 the interface sends RIP1 messages. FortiGate-50.
v2 the interface sends RIP2 messages. NAT/Route
mode only.
To send by RIP1 and RIP2 messages configure the
neighbor twice, once for RIP1 and once for RIP
Examples
Use the following commands to add a neighbor at IP address 192.168.110.94 and configure the
FortiGate unit to send RIP1 and RIP2 messages to this neighbor:
set system route rip neighbor 192.168.110.94 send v1 enable
set system route rip neighbor 192.168.110.94 send v2 enable
Use the following command to disable sending RIP2 messages to this neighbor:
set system route rip neighbor 192.168.110.94 send v2 disable
Related commands
• get system route rip
• set system route rip
• set system route rip filter
• set system route rip interface
• set system route rip timers
Syntax description
Keyword Description Default Availability
flush The amount of time in seconds that must pass 240 All models
<flush-timer_integer> before a route is removed from the routing except
table. The value for flush should be greater FortiGate-50.
than the value for invalid. If the value for NAT/Route
flush is less than this sum, the proper mode only.
holddown interval cannot elapse, which results
in a new route being accepted before the
holddown interval expires.
holddown The time interval in seconds during which 180 All models
<holddown-timer_integer> routing information regarding better paths is except
suppressed. holddown should be at least three FortiGate-50.
times the value of update. A route enters into a NAT/Route
holddown state when an update packet is mode only.
received that indicates the route is unreachable.
The route is marked inaccessible and
advertised as unreachable and is no longer
used for forwarding packets. When holddown
expires, the route can be flushed from the
routing table.
invalid The time interval in seconds after which a route 180 All models
<invalid-timer_integer> is declared invalid. invalid should be at least except
three times the value of update. A route FortiGate-50.
becomes invalid when there is an absence of NAT/Route
updates that refresh the route. The route then mode only.
enters holddown. The route is marked
inaccessible and advertised as unreachable.
However, the route is still used for forwarding
packets.
update The time interval in seconds between sending 30 All models
<update-timer_integer> routing table updates. except
FortiGate-50.
NAT/Route
mode only.
Example
Use the following command to change the RIP update timer:
set system route rip update 50
Related commands
• get system route rip
• set system route rip
• set system route rip filter
• set system route rip interface
• set system route rip neighbor
Syntax description
Keyword Description Default Availability
default <default_integer> Enter a number of seconds to change the default 300 All models.
session timeout.
port <port_integer> To increase the session timeout for a specific port, No All models.
timeout <timeout_integer> enter the port number and the number of seconds the default.
session can be idle.
Examples
Use the following command to change the default session timeout to 3600 seconds:
set system session_ttl default 3600
Use the following command to change the session timeout for SSH on port 22 to 3600 seconds:
set system session_ttl port 22 timeout 3600
Related commands
• get system sessionttl
• unset system sessionttl
Syntax description
Keyword Description Default Availability
{enable | disable | Enable or disable FortiGate SNMP support. Use disable All models.
value} the value keyword to configure SNMP support on
the FortiGate unit.
<location_str> The physical location of the FortiGate. The system No All models.
location description can be up to 31 characters default.
long and can contain spaces, numbers (0-9), upper
and lower case letters (A-Z, a-z), and the special
characters - and _. The \ < > [ ] ` $ % & characters
are not allowed. If you add spaces, enclose the
system-location in quotes.
<info_str> Contact information for the person responsible for No All models.
this FortiGate. The contact information can be up default.
to 31 characters long and can contain spaces,
numbers (0-9), upper and lower case letters (A-Z,
a-z), and the special characters - and _. The \ < > [
] ` $ % & characters are not allowed. If you add
spaces, enclose the contact-information in
quotes.
<get-community_str> A password to identify SNMP get requests sent to No All models.
the FortiGate. Also called read community. When default.
an SNMP manager sends a get request to the
FortiGate, it must include the correct get
community string.
The default get community string is “public”.
Change the default get community string to keep
intruders from using get requests to retrieve
information about your network configuration. The
get community string must be used in your SNMP
manager to enable it to access FortiGate SNMP
information.
The get community string can be up to 31
characters long and can contain numbers (0-9),
upper and lower case letters (A-Z, a-z), and the
special characters - and _. Spaces and the \ < > [ ]
` $ % & characters are not allowed.
<set-community>_str A string sent with SNMP traps that functions like a No All models.
password. default.
The default trap community string is “public”.
Change the trap community string to the one
accepted by your trap receivers.
The trap community string can be up to 31
characters long and can contain numbers (0-9),
upper and lower case letters (A-Z, a-z), and the
special characters - and _. Spaces and the \ < > [ ]
` $ % & characters are not allowed.
<first-receiver_ip> The IP addresses of up to three trap receivers on 0.0.0.0 All models.
[<second-receiver_ip> your network configured to receive traps from your
<third-receiver_ip>]] FortiGate. Traps are sent only to these addresses.
Example
Use the following command to create an SNMP configuration with the following parameters:
• The location of the system is Server room (entered on the command line as "Server room")
• The contact information for the system administrator is ext 3345 (entered on the command line
as "ext 3345")
• The get community string is our_get_com
• The trap community string is our_trap_com
• The IP address of the first trap receiver is 192.33.44.55
• The IP address of the second trap receiver is 143.44.52.7
• There is no third trap receiver
set system snmp enable
set system snmp value "Server room" "ext 3345" our_get_com our_trap_com
192.33.44.55 143.44.52.7
Related commands
• get system snmp
• set system hostname
Syntax description
Keyword Description Default Availability
manual Manually set the system date and time. No default. All models.
ntp Automatically update the system date and No default. All models.
time by connecting to an NTP server.
clock <hh:mm:ss> Set the system time. System time All models.
• hh is the hour and can be 00 to 23 manual only
• mm is the minutes and can be 00 to 59
• ss is the seconds and can be 00 to 59
date <mm/dd/yyyy> Set the system date: System date All models.
• mm is the month and can be 01 to 12 manual only
• dd is the day of the month and can be 01
to 31
• yyyy is the year and can be set from 2001
to 2100
dst {enable | disable} Enable or disable daylight saving time. disable All models.
ntpserver <server_ip> Enter the IP address of an NTP server. 132.246.168.148 All models.
ntp only
ntpsync Enable or disable synchronizing system disable All models.
{enable | disable} time with an NTP server time. ntp only
syncinterval Enter how often, in minutes, the FortiGate 60 All models.
<interval_integer> should synchronize its time with the NTP ntp only
server. The syncinterval number can be
1 to 1440.
zone <timezone_integer> The number corresponding to your time GMT-8 All models.
zone. Enter set system time manual
zone or set system time ntp zone
and a space followed by ? to list time zones
and their numbers. Choose your time zone
from the list and enter the correct number.
Example
Use the following command to set the system date and time manually, the time zone to 4, and daylight
saving time to disable:
set system time manual date 12/23/2002 clock 13:55:30 zone 4 dst disable
Use the following command to synchronize the time with an NTP server:
set system time ntp ntpsync enable ntpserver 1.1.1.1 syncinterval 60
Related commands
• get system time
Syntax description
Keyword Description Default Availability
<name_str> Enter a name to identify the VLAN No default. Models
subinterface. numbered 400
and higher.
NAT/Route
mode only.
id <id_integer> Enter a VLAN ID that matches the VLAN ID of No default. Models
the packets to be received by this VLAN numbered 400
subinterface. and higher.
The VLAN ID can be any number between 1 NAT/Route
and 4096 but must match the VLAN ID added mode only.
by the IEEE 802.1Q-compliant router. Two
VLAN subinterfaces added to the same
physical interface cannot have the same
VLAN ID. However, you can add two or more
VLAN subinterfaces with the same VLAN IDs
to difference physical interfaces.
interface <name_str> Enter the name of the interface that receives No default. Models
the VLAN packets intended for this VLAN numbered 400
subinterface. and higher.
NAT/Route
mode only.
Example:
Use the following command to add a VLAN subinterface with the following settings:
• name: newvlan
• id: 10
• interface: internal
set system vlan newvlan id 10 interface internal
Related commands
• get system vlan
• unset system vlan
Syntax description
Keyword Description Default Availability
<name_str> Enter the name for the zone. If the name is No default. Models
new, this command adds a new zone. If the numbered 400
name already exists, this command edits the and higher.
zone. Use the command set system NAT/Route
zone followed by a space and a ? for a list of mode only.
zones to edit.
intrazone {allow | deny} Allow or deny traffic routing between allow Models
different interfaces in the same zone. numbered 400
and higher.
NAT/Route
mode only.
Example
Use the following command to add a zone named Internal and to deny routing between different
interfaces in the zone.
set system zone Internal intrazone deny
Related commands
• get system zone
• unset system zone
Syntax description
Keyword Description Default Availability
<name_str> A name for the user group. If the user group name is No All models.
new, this command adds a new user group. If the default.
user group name already exists, this command edits
the user group.
The name can contain numbers (0-9), uppercase and
lowercase letters (A-Z, a-z), and the special
characters - and _. Other special characters and
spaces are not allowed.
member {<name_str> The name of a user RADIUS or LDAP server to add No All models.
[<name_str> [<name_str> to the user group. default.
[<name_str> ... ]]]| Enter set user group <name_str> member
none} then a space and a ? for a list of possible group
members.
Enter all the user names you want to include in the
user group. Use a space to separate the names.
Enter none to remove names from the user group.
Examples
Use the following command to add a group named User_Grp_1, and add User_2, User_3, Radius_2
and LDAP_1 as members of the group:
set user group User_Grp_1 member User_2 User_3 Radius_2 LDAP_1
Related commands
• get user
• set user local
• set user ldap
• set user radius
• unset user group
Syntax description
Keyword Description Default Availability
<name_str> Enter the name of the LDAP server. If the server No All models.
name is new, this command adds a new server. If the default.
server name already exists, this command edits the
server information.
The name can contain numbers (0-9), uppercase and
lowercase letters (A-Z, a-z), and the special
characters - and _. Other special characters and
spaces are not allowed.
cnid <identifier_str> Enter the common name identifier for the LDAP No All models.
server. default.
The common name identifier for most LDAP servers
is cn. However some servers use other common
name identifiers such as uid.
dn <name_str> Enter the distinguished name used to look up entries No All models.
on the LDAP server. default.
Enter the base distinguished name for the server
using the correct X.509 format. The FortiGate unit
passes this distinguished name unchanged to the
server.
port Enter the port used to communicate with the LDAP 389 All models.
<port-number_integer> server.
By default LDAP uses port 389.
server {<domain-name_str> Enter the domain name or IP address of the LDAP No All models.
| <address_ip>} server. default.
Examples
Use the following command to add an LDAP server using the IP address 23.64.67.44, the default
port, the common name cn and the distinguished name ou=marketing,dc=fortinet,dc=com:
set user ldap LDAP_1 server 23.64.67.44 cnid cn
dn ou=marketing,dc=fortinet,dc=com
Use the following command to change the distinguished name in the example above to
ou=accounts,ou=marketing,dc=fortinet,dc=com:
set user ldap LDAP_1 dn ou=accounts,ou=marketing,dc=fortinet,dc=com
Related commands
• get user
• set user group
• set user local
• set user radius
• unset user ldap
Syntax description
Keyword Description Default Availability
<name_str> A name for the user. If the user name is new, No default. All models.
this command adds a new user. If the user
name already exists, this command edits the
user information.
The name can contain numbers (0-9),
uppercase and lowercase letters (A-Z, a-z), and
the special characters - and _. Other special
characters and spaces are not allowed.
status Enable allows this user to authenticate. Disable enable All models.
{enable | disable} prevents the user from authenticating.
tryother If the connection to the RADIUS server disable All models.
{enable | disable} configured using set user local
<name_str> type radius fails, enable or
disable trying to connect to other RADIUS
servers added to the FortiGate RADIUS
configuration.
type Require the user to use a password a RADIUS No default. All models.
server or LDAP server for authentication.
password Enter the password that this user must use to No default. All models.
<password_str> authenticate using the internal database. The type only.
password should be at least six characters
long.
radius <server_str> Enter the name of the RADIUS server to which No default. All models.
the user must authenticate. You can only select type only.
a RADIUS server that has been added to the
FortiGate RADIUS configuration. Enter set
user local <name_str> type radius a
space and a ? for a list of available RADIUS
servers.
ldap <server_str> Enter the name of the LDAP server to which the No default. All models.
user must authenticate. You can only select an type only.
LDAP server that has been added to the
FortiGate LDAP configuration. Enter set user
local <name_str> type ldap a space
and a ? for a list of available LDAP servers.
Examples
Use the following command to add a new user named User_1, with authentication type set to
password and a password of 23E9jz6 to authenticate using the internal database. The user is
enabled by default.
set user local User_1 type password 23E9jz6
Related commands
• get user
• set user group
• set user ldap
• set user radius
• unset user local
Syntax description
Keyword Description Default Availability
<name_str> A name for the RADIUS server. If the server name is No All models.
new, this command adds a new server. If the server default.
name already exists, this command edits the server
information.
The name can contain numbers (0-9), uppercase and
lowercase letters (A-Z, a-z), and the special
characters - and _. Other special characters and
spaces are not allowed.
secret <password_str> Enter the RADIUS server secret. No All models.
default.
server Enter the domain name or IP address of the RADIUS No All models.
{<name_str | server_ip>} server. default.
Examples
Use the following command to add the information for a new RADIUS server named radserv_1, with
IP address 23.64.67.47 and a server secret of secret_1.
set user radius radserv_1 server 23.64.67.47 secret secret_1
Use the following command to change the server secret for radserv_1 to new_secret.
set user radius radserv_1 secret new_secret
Related commands
• get user
• set user group
• set user ldap
• set user local
• unset user radius
Note: VPN peers are required to have static IP addresses in order to join a hub-and-spoke network. VPN peers
with dynamic IP addresses (dialup peers) cannot join a hub-and-spoke network.
Note: Add the concentrator configuration to the central FortiGate unit (the hub) after adding the tunnels for all
spokes.
Syntax description
Keyword Description Default Availability
<name_str> If the concentrator name is new, this command adds No All models.
a VPN concentrator. If the concentrator name already default. NAT/Route
exists, this command edits the VPN concentrator. mode only.
member {none | The names of the VPN tunnels to add to the No All models.
<tunnel_str> <tunnel_str> concentrator. You can add AutoIKE key and manual default. NAT/Route
...} key tunnels to a concentrator. Separate the tunnel mode only.
names with spaces. Use none to create a
concentrator with no tunnels.
Example
Use the following command to add an IPSec VPN concentrator named Concentrator_1 containing
two AutoIKE tunnels named Auto_1, Auto_2, and one manual key tunnel named Manual_1.
set vpn ipsec concentrator Concentrator_1 member Auto_1 Auto_2 Manual_1
Related commands
• set vpn ipsec phase1
• set vpn ipsec phase2
• set vpn ipsec manualkey
• get vpn ipsec
Syntax description
Keyword Description Default Availability
<tunnel_str> Enter a name for the VPN tunnel. The name can contain No All models.
numbers (0-9), uppercase and lowercase letters (A-Z, a- default. NAT/Route
z), and the special characters - and _. Other special mode only.
characters and spaces are not allowed.
If the name is new, this command adds a new tunnel. If
the name already exists, this command edits the tunnel.
authalg Select an authentication algorithm from the list. Make null All models.
{null | md5 | sha1} sure you use the same algorithm at both ends of the NAT/Route
tunnel. mode only.
authkey <key_hex> MD5: Enter a 32 digit (16 byte) hexadecimal number. No All models.
Separate each 16 digit (8 byte) hexadecimal segment default. NAT/Route
with a hyphen. mode only.
SHA1: Enter a 40 digit (20 byte) hexadecimal number.
Use a hyphen to separate the first 16 digits (8 bytes) from
the remaining 24 digits (12 bytes).
Digits can be 0 to 9, and a to f.
Use the same authentication key at both ends of the
tunnel.
concentrator Enter the name of a VPN Concentrator if you want the none All models.
{<name_str> | none} tunnel to be a member of a group of VPN tunnels. Select NAT/Route
none to remove the manual key tunnel from a mode only.
concentrator.
encalg {null | des | Select an encryption algorithm from the list. Make sure null All models.
3des | aes128 | aes192 you use the same algorithm at both ends of the tunnel. NAT/Route
| aes256} mode only.
enckey <key_hex> DES: Enter a 16 digit (8 byte) hexadecimal number. No All models.
3DES: Enter a 48 digit (24 byte) hexadecimal number. default. NAT/Route
AES128: Enter a 32 digit (16 byte) hexadecimal number. mode only.
AES192: Enter a 48 digit (24 byte) hexadecimal number.
AES256: Enter a 64 digit (32 byte) hexadecimal number.
Digits can be 0 to 9, and a to f.
For all of the above, separate each 16 digit (8 byte)
hexadecimal segment with a hyphen.
Use the same encryption key at both ends of the tunnel.
gateway <gateway_ip> The external IP address of the FortiGate unit or other No All models.
IPSec gateway at the opposite end of the tunnel. default. NAT/Route
mode only.
Example
Use the following command to add an IPSec VPN manual key tunnel with the following characteristics:
• Tunnel name: Manual_Tunnel
• Local SPI: 1000ff
• Remote SPI: 2000ff
• Remote gateway IP: 206.37.33.45
• Encryption algorithm: 3DES
• Encryption keys: 003f2b01a9002f3b 004f4b0209003f01 3b00f23bff003eff
• Authentication algorithm: MD5
• Authentication keys: ff003f012ba900bb 00f402303f0100ff
• Concentrator: none
set vpn ipsec manualkey Manual_Tunnel localspi 1000ff remotespi 2000ff
gateway 206.37.33.45 encalg 3des enckey 003f2b01a9002f3b-
004f4b0209003f01-3b00f23bff003eff authalg md5 authkey
ff003f012ba900bb-00f402303f0100ff concentrator none
Use the following command to change the local SPI to bb8 and the authentication algorithm to null
for the tunnel created in the example above.
set vpn ipsec manualkey Manual_Tunnel localspi bb8 authalg null.
Related commands
• set vpn ipsec concentrator
• get vpn ipsec
• unset vpn ipsec
Syntax description
Keyword Description Default Availability
<name_str> If the phase 1 name is new, this command adds a No All models.
new configuration. If the phase 1 name already default. NAT/Route
exists, this command edits the phase 1 configuration. mode only.
authmethod Select psk to authenticate using a pre-shared key. No All models.
{psk <preshared-key_str | The key must be the same on the remote VPN default. NAT/Route
rsasig gateway or client and should only be known by mode only.
<certificate-name_str>} network administrators. The key must consist of at
least 6 printable characters. For optimum protection
against currently known attacks, the key should
consist of a minimum of 16 randomly chosen
alphanumeric characters.
Select rsasig to authenticate using a digital
certificate. You must enter the name of the digital
certificate.
You must configure certificates before selecting
rsasig here. For more information, see “execute
vpn certificates local” on page 239 and “execute vpn
certificates ca” on page 238.
dhgrp {[1] [2] [5]} Select one or more Diffie-Hellman groups to propose 5 All models.
for Phase 1. NAT/Route
• When the VPN peers have static IP addresses and mode only.
use aggressive mode, select a single matching DH
group.
• When the VPN peers have dynamic (dialup) IP
addresses, select up to three DH groups for a
server configuration and select one DH group for a
dynamic (dialup) client or gateway.
• When the VPN peers use main mode, you can
select multiple DH groups.
Examples
Use the following command to add an IPSec VPN phase 1 configuration with the following
characteristics:
• Tunnel name: Simple_GW
• Type: Dynamic
• Encryption and authentication proposal: DES-MD5
• Authentication method: psk
• Pre-shared key: Qf2p3O93jIj2bz7E
• Mode: aggressive
• Dead Peer Detection: disable
set vpn ipsec phase1 Simple_GW type dynamic proposal des-md5 authmethod
psk Qf2p3O93jIj2bz7E mode aggressive dpd disable
Use the following command to change the DH group of the example above to 2 and to add des-sha1
as a second encryption and authentication protocol.
set vpn ipsec phase1 Simple_GW dhgrp 2 proposal des-md5 des-sha1
Related commands
• set vpn ipsec phase2
• get vpn ipsec
• unset vpn ipsec
Syntax description
Keyword Description Default Availability
<name_str> If the phase 2 name is new, this command adds a No All models.
new configuration. If the phase 2 name already default. NAT/Route
exists, this command edits the phase 2 configuration. mode only.
concentrator {<name_str> Select a concentrator if you want the tunnel to be part none All models.
| none} of a hub and spoke VPN configuration. NAT/Route
mode only.
dhgrp {1 | 2 | 5} Select the Diffie-Hellman group to propose for Phase 5 All models.
2 of the IPSec VPN connection. Select one of DH 1, 2 NAT/Route
or 5. The VPN peers must use the same DH Group. mode only.
keepalive {enable | Enable keep alive to keep the VPN tunnel running disable All models.
disable} even if no data is being processed. NAT/Route
mode only.
keylifekbs Set the number of Kbytes of data transmitted before 4608000 All models.
<Kbytes_integer> the phase 2 key expires. NAT/Route
If you configure both keylifeseconds and mode only.
keylifekbs, the key expires when either condition
is met, whichever occurs first. When the key expires,
a new key is generated without interrupting service.
<kbyte_integer> can be 5120 to 99999 kbytes.
keylifeseconds Set the number of seconds that can elapse before the 1800 All models.
<seconds_integer> phase 2 key expires. NAT/Route
If you configure both keylifeseconds and mode only.
keylifekbs, the key expires when either condition
is met, whichever occurs first. When the key expires,
a new key is generated without interrupting service.
<seconds_integer> can be 120 to 172800
seconds.
pfs {enable | disable} Optionally, enable or disable perfect forward secrecy disable All models.
(PFS). PFS ensures that each key created during NAT/Route
Phase 2 is unrelated to keys created during Phase 1 mode only.
or to other keys created during Phase 2. PFS may
cause minor delays during key generation.
Examples
Use the following command to add a phase 2 configuration with the following characteristics:
• Name: New_Tunnel
• Phase 1 name: Simple_GW
• Encryption and authentication proposal: des-md5
• Keylife seconds: 18001
• Diffie-Hellman group: 2
• Replay detection: enable
• Perfect forward secrecy: enable
• Keepalive: enable
• Concentrator: none
set vpn ipsec phase2 New_Tunnel phase1name Simple_GW proposal des-md5
keylifeseconds 18001 dhgrp 2 replay enable pfs enable keepalive enable
concentrator none
Use the following command to change the DH group to 5 and to disable replay detection in the phase
2 example configuration above.
set vpn ipsec phase2 New_Tunnel dhgrp 5 replay disable
Related commands
• set vpn ipsec phase1
• get vpn ipsec
• unset vpn ipsec
Note: The first time you configure the L2TP address range you must enter a starting IP, an ending IP and a user
group.
Syntax description
Keyword Description Default Availability
eip <ending_ip> The ending IP address of the L2TP address range. 0.0.0.0 All models.
NAT/Route
mode only.
sip <starting_ip> The starting IP address of the L2TP address range. 0.0.0.0 All models.
NAT/Route
mode only.
status Enable or disable L2TP VPN. disable All models.
{enable | disable} NAT/Route
mode only.
usrgrp <name_str> Add a user group to support L2TP authentication. The user No All models.
group can contain users added to the FortiGate user default. NAT/Route
database, authentication servers (LDAP and RADIUS), or mode only.
both.
Example
Use the following command to enable L2TP and set the L2TP address range for the first time using a
starting IP of 192.168.1.150, an ending IP of 192.168.1.160 and a user group named L2TP_users:
set vpn l2tp status enable sip 192.168.1.150 eip 192.168.1.160 usrgrp
L2TP users
Use the following command to change the starting IP of the L2TP address range:
set vpn l2tp status enable sip 192.168.1.140
Related commands
• get vpn l2tp range
Note: The first time you configure the PPTP address range you must enter a starting IP, an ending IP and a user
group.
Syntax description
Keyword Description Default Availability
eip <ending_ip> The ending address of the PPTP address range. 0.0.0.0 All models.
NAT/Route
mode only.
sip <starting_ip> The starting address of the PPTP address range. 0.0.0.0 All models.
NAT/Route
mode only.
status Enable or disable PPTP VPN. disable All models.
{enable | disable} NAT/Route
mode only.
usrgrp <name_str> Add a user group to support L2TP authentication. No default. All models.
The user group can contain users added to the NAT/Route
FortiGate user database, authentication servers mode only.
(LDAP and RADIUS), or both.
Example
Use the following command to enable PPTP and set the PPTP address range for the first time using a
starting IP of 192.168.1.100, an ending IP of 192.168.1.130 and a user group named PPTP_users:
set vpn pptp status enable sip 192.168.1.100 eip 192.168.1.130 usrgrp
PPTP_users
Use the following command to change the starting IP of the PPTP address range:
set vpn pptp status enable sip 192.168.1.110
Related commands
• get vpn pptp range
Syntax description
Keyword Description Default Availability
add <address_ip> Add an IP address and netmask to identify the No All models
<netmask_ip> [alias FortiGate user. This can be the address of a single default.
<user-name_str>] computer or of a subnet. If IP addresses on your
internal network are set using DHCP, use a subnet
that includes the addresses controlled by the DHCP
server.
Optionally enter an alias for the user. The alias is the
user name you add to a user group on the Cerberian
server. If you do not enter an alias, the IP address is
added to the default user group on the Cerberian
server.
delete <address_ip> Delete the user information. No All models
<netmask_ip> default.
license <license_str> Enter the Cerberian license key. You must have a No All models
licence key to use Cerberian web filtering. default.
status {enable | disable} Enable or disable Cerberian web filtering. For disable All models.
Cerberian web filtering to work, you must enable URL
Block for HTTP in a content profile. For more
information on content profiles, see “set firewall
profile” on page 57.
Examples
Use the following commands to:
• add the cerberian licence key, testkey
• add the Cerberian user with the IP address 192.168.100.19, the netmask 255.255.255.255 and the
alias User_1, to the FortiGate unit
• enable your Cerberian web filtering settings for use in content profiles
set webfilter cerberian license testkey
set webfilter cerberian add 192.168.100.19 255.255.255.255 alias User_1
set webfilter cerberian status enable
Related commands
• get webfilter
• set firewall profile
Syntax description
Keyword Description Default Availability
add word <word_str> Add a word or phrase to the banned word list. No All models.
language {0 | 1 | 2 | 3 | If you enter a single word (for example, banned), the default.
4} state FortiGate blocks all web pages that contain that word.
{enable | disable} If you type a phrase, you must add + between the
words (for example, banned+phrase). The
FortiGate blocks web pages that contain both of the
words.
If you type a phrase in quotes, you must also include
the + (for example, "banned+word"). The FortiGate
blocks all web pages where the words are found
together as a phrase.
Content filtering is not case-sensitive. You cannot
include special characters in banned words.
The language or character set for the banned word or
phrase. You can choose 0 for Western,
• 1 for Simplified Chinese
• 2 for Traditional Chinese
• 3 for Japanese
• 4 for Korean
Enable or disable content filtering for this word or
phrase.
delete {<word_integer> | Enter a number to delete the specified word or No All models.
all} phrase from the content block list. Use the command default.
get webfilter content for a numbered list of
banned words. Enter all to delete all the words on
the content block list.
edit <word_integer> word Edit a word or phrase on the banned word list. No All models.
<word_str> language {0 | Enter a number to edit the specified word or phrase default.
1 | 2 | 3 | 4} state from the content block list. Use the command get
{enable | disable} webfilter content for a numbered list of banned
words.
You can make changes to any or all of the word or
phrase, language or character set, or state.
Example
Use the following command to add the exact phrase "banned phrase" in the Western character set
to the Web Filter content filtering list.
set webfilter content add word "banned+phrase" language 0 state enable
Related commands
• get webfilter
• set firewall profile
Note: Content downloaded from exempt web pages is not blocked or scanned by antivirus protection.
Syntax description
Keyword Description Default Availability
add <exempt-url_str> Enter a complete URL, including path and filename, No All models.
state {enable | disable} to exempt access to a page on a web site. For default.
example, www.goodsite.com/index.html
exempts access to the main page of this example
website. You can also add IP addresses; for example,
122.63.44.67/index.html exempts access to
the main web page at this address. Do not include
http:// in the URL to exempt.
Exempting a top level URL, such as
www.goodsite.com, exempts all requested
subpages (for example,
www.goodsite.com/badpage) from all content and
URL filtering rules.
Exempting a top level URL will not exempt pages
such as mail.goodsite.com from all content and
URL filtering rules unless goodsite.com (without
the www) is added to the Exempt List.
Enable or disable exempting this URL
delete Enter a number to delete the specified URL from the No All models.
{<url_integer> | all} exempt list. Use the command get webfilter default.
exempturl for a numbered list of exempt URLs.
Enter all to delete all the URLs on the exempt list.
edit <url_integer> Edit a URL on the exempt list. No All models.
newurl<exempt-url_str> Enter a number to edit the specified URL from the default.
state {enable | disable} exempt list. Use the command get webfilter
exempturl for a numbered list of exempt URLs.
You can make changes to the URL or state.
Example
Use the following command to add the URL www.oksite.com/index.html to the list of URLs that
are exempt from content and URL blocking.
set webfilter exempturl add www.oksite.com/index.html state enable
Related commands
• get webfilter
• set firewall profile
Syntax description
Keyword Description Default Availability
{activex | cookie | java} Select activex, cookie or java as required. No All models.
default.
status {enable | disable} For each keyword above, enable or disable blocking disable All models.
Java applets, cookies, or ActiveX controls.
Examples
Use the following command to configure script filtering to block cookies.
set webfilter script cookie status enable
Related commands
• get webfilter
• set firewall profile
Note: URL blocking does not block access to other services that users can access with a web browser. For
example, URL blocking does not block access to ftp://ftp.badsite.com. Instead, you can use firewall
policies to deny FTP connections.
Syntax description
Keyword Description Default Availability
add <url_str> state You can configure the FortiGate unit to block all No All models.
{enable | disable} pages on a website by adding the top-level URL or IP default.
address. You can also block individual pages on a
website by including the full path and filename of the
web page to block.
Type a top-level URL or IP address to block access to
all pages on a website. For example,
www.badsite.com or 122.133.144.155 blocks
access to all pages at this website.
Type a top-level URL followed by the path and
filename to block access to a single page on a
website. For example,
www.badsite.com/news.html or
122.133.144.155/news.html blocks the news
page on this website.
To block all pages with a URL that ends with
badsite.com, add badsite.com to the block list.
For example, adding badsite.com blocks access to
www.badsite.com, mail.badsite.com,
www.finance.badsite.com, and so on.
Enable or disable blocking this URL.
delete {<url_integer> | Enter a number to delete the specified URL from the No All models.
all} block list. Use the command get webfilter url default.
for a numbered list of blocked URLs. Enter all to
delete all the URLs on the block list.
edit <url_integer> newurl Edit a URL on the block list. No All models.
<block-url_str> state Enter a number to edit the specified URL from the default.
{enable | disable} block list. Use the command get webfilter url
for a numbered list of blocked URLs.
You can make changes to the URL or state.
Example
Use the following commands to add the example URL www.badsite.com/index.html to the URL
block list.
set webfilter url add www.badsite.com/index.html state enable
Related commands
• get webfilter
• set firewall profile
unset commands
Use unset commands to delete settings from your FortiGate configuration.
Syntax description
Keyword Description Availability
<name_str> The name of the address to delete. Use the command All models.
unset firewall address followed by a space and
? for a list of addresses. If you try to delete an address
that is in use by a policy the FortiGate CLI returns the
error message: Entry is used.
Examples
Use the following command to delete the address named User_1.
unset firewall address User_1
Related commands
• set firewall address
• get firewall address
Syntax description
Keyword Description Availability
<name_str> The name of the address group to delete. Use the All models.
command unset firewall addressgrp followed
by a space and ? for a list of address groups.
Examples
Use the following command to delete the address group named Internal_1.
unset firewall addrgrp Internal_1
Related commands
• set firewall addrgrp
• get firewall addrgrp
Syntax description
Keyword Description Availability
table <order_integer> The order number of the IP/MAC binding pair on the All models.
IP/MAC binding table. Use the command unset
firewall ipmacbinding table followed by a
space and ? to display the IP/MAC binding table.
Examples
Use the following command to delete the IP and MAC address pair numbered 2.
unset firewall ipmacbinding table 2
Related commands
• set firewall ipmacbinding setting
• get firewall ipmacbinding
Syntax description
Keyword Description Availability
ippool <id_integer> Delete an IP pool with the specified number. Enter the All models.
command unset firewall ippool followed by a Not available in
space and a ? for a list of IP pools and their Transparent mode.
corresponding numbers and interfaces.
Examples
Use the following command to remove an IP pool numbered 2.
unset firewall ippool 2
Related commands
• set firewall ippool
• get firewall ippool
Syntax description
Keyword Description Availability
<name_str> Enter the name of the one-time schedule to delete. All models.
Use the command unset firewall
onetimeschedule followed by a space and ? to get
a list of one-time schedules.
Examples
Use the following command to delete the schedule named Holiday.
unset firewall onetimeschedule Holiday
Related commands
• set firewall onetimeschedule
• get firewall schedule
Syntax description
Keyword Description Availability
srcintf <name_str> Enter the source interface for the policy. On all All models.
FortiGate models srcintf can be the name of a
FortiGate interface to which a firewall address has
been added.
In NAT/Route mode on FortiGate models 400 and up
this name can also be a VLAN subinterface to which
firewall addresses have been added.
In NAT/Route mode on FortiGate models 400 and up
this name can also be a zone if you have added
firewall addresses to the zone and if you have added
at least one interface or VLAN subinterface to the
zone.
Use the command unset firewall policy
srcintf followed by a space and ? for a list of
available interfaces.
dstintf <name_str> Enter the destination interface for the policy. On all All models.
FortiGate models dstintf can be the name of a
FortiGate interface to which a firewall address has
been added.
In NAT/Route mode on FortiGate models 400 and up
this name can also be a VLAN subinterface to which
firewall addresses have been added.
In NAT/Route mode on FortiGate models 400 and up
this name can also be a zone if you have added
firewall addresses to the zone and if you have added
at least one interface or VLAN subinterface to the
zone.
Use the command unset firewall policy
srcintf <intf_str> dstintf followed by a
space and ? for a list of available interfaces.
policyid <id_int> Enter an ID number for the policy. All models.
Every firewall policy is identified by its srcintf,
dstintf, and policyid. Every srcintf, dstintf,
and policyid combination is unique.
Use the command unset firewall policy
srcintf <intf_str> dstintf <intf_str>
policyid followed by a space and ? for a list of
available policies and their id numbers.
Examples
Use the following command to delete the policy in the Internal to External policy list with the policy id
number 3.
unset firewall policy srcintf internal dstintf external policyid 3
Related commands
• set firewall policy
• get firewall policy
Syntax description
Keyword Description Availability
<name_str> The name of the profile to delete. Use the command All models.
get firewall profile for a list of profiles. The
profile name is case sensitive.
Examples
Use the following command to unset the profile named Newtest.
unset firewall profile Newtest
Related commands
• set firewall profile
• get firewall profile
Syntax description
Keyword Description Availability
<name_str> Enter the name of the recurring schedule to delete. All models.
Use the command unset firewall
recurringschedule followed by a space and ? to
get a list of one-time schedules.
Examples
Use the following command to delete the recurring schedule named access.
unset firewall recurringschedule access
Related commands
• set firewall recurringschedule
• get firewall schedule
Syntax description
Keyword Description Availability
custom <name_str> The name of the custom service to delete. Use the All models.
command get firewall service custom for a
list of custom services.
group <name_str> The name of the service group to delete. Use the All models.
command get firewall service group for a list
of custom services.
Examples
Use the following command to delete a service group named marketing.
unset firewall service group marketing
Related commands
• set firewall service custom
• set firewall service group
• get firewall service
Syntax description
Keyword Description Availability
<name_str> The name of the virtual IP to delete. Enter unset All models.
firewall vip followed by a space and ? for a list of
virtual IPs.
Examples
Use the following command to delete a virtual IP named http_server.
unset firewall vip http_server
Related commands
• set firewall vip
• get firewall vip
Syntax description
Keyword Description Availability
traffic rule <name_str> Remove the named traffic log filtering rule. Use the All models.
command get log trafficfilter for a list of
traffic filter rules.
Examples
Use the following command to delete the traffic filter rule named test.
unset log filter traffic rule test
Related commands
• set log trafficfilter rule
• get log trafficfilter
Syntax description
Keyword Description Availability
username <name_str> The user name of the administrator account to delete. All models.
Enter unset system admin username followed
by a space and ? for a list of administrator account
names.
Examples
Use the following command to delete an administrator account with the user name newadmin.
unset system admin username newadmin
Related commands
• set system admin
• get system admin
Syntax description
Keyword Description Availability
reserve <reserve_ip> Enter unset system dhcpserver reserve a All models.
space and then ? for a list of reserved IP/MAC pairs.
Enter the IP address for the pair that you want to
remove.
Examples
Use the following command to remove the IP/MAC address pair with a reserved IP address of
192.168.20.45
unset system dhcpserver reserve 192.168.20.45
Related commands
• set system dhcpserver
• get system dhcpserver
Examples
Use the following command to remove the FortiGate unit host name.
unset system hostname
Related commands
• get system status
• set system hostname
• set system snmp
Syntax description
Keyword Description Availability
<route_integer> The number of the destination route to delete from the All models.
routing table. Enter unset system route number
followed by a space and ? for a list of routes.
Examples
Use the following command to delete destination route number 1.
unset system route number no 1
Related commands
• set system route number
• get system route table
Syntax description
Keyword Description Availability
<policy_integer> The number of the policy route to delete from the All models.
policy routing database. Enter unset system route
policy followed by a space and ? for a list of policy
routes.
Examples
Use the following command to delete route policy number 5.
unset system route policy 5
Related commands
• set system route policy
• get system route policy
Syntax description
Keyword Description Availability
<intf-name_str> The name of the interface for which to set the All models.
secondary IP address and netmask to 0.0.0.0 and Not available in
0.0.0.0. Transparent mode.
Examples
Use the following command to set the secondary IP and netmask of the external interface to 0.0.0.0
and 0.0.0.0.
unset system secondip external
Related commands
• set system interface
• get system interface
Syntax description
Keyword Description Availability
<port_integer> The number of the port for which to remove a session All models.
timeout configuration.
Examples
Use the following command to remove the session timeout configuration for SSH on port 22:
unset system sessionttl 22
Related commands
• set system session_ttl
• get system sessionttl
Syntax description
Keyword Description Availability
vlan <name_str> The name of the VLAN subinterface to delete. Use the Models numbered
command unset system vlan followed by a space 400 and higher.
and ? for a list of VLANs. NAT/Route mode
only.
Examples
Use the following command to delete a VLAN subinterface named Sub_1.
unset system vlan Sub_1
Related commands
• get system vlan
• set system vlan
Syntax description
Keyword Description Availability
zone <name_str> The name of a zone to delete. Enter unset system Models numbered
zone followed by a space and ? for a list of zones. 400 and higher.
NAT/Route mode
only.
Examples
Use the following command to delete a zone named Finance.
unset system zone Finance
Related commands
• get system zone
• set system zone
Syntax description
Keyword Description Availability
name <name_str> The name of the user group to delete. Enter unset All models.
user group name followed by a space and ? for a
list of user group names.
Examples
Use the following command to delete a user group named FTP_grp:
unset user group name FTP_grp
Related commands
• set user group
• get user
Syntax description
Keyword Description Availability
server <name_str> The name of the LDAP server to delete. Enter unset All models.
user ldap server followed by a space and ? for a
list of LDAP server names.
Examples
Use the following command to delete the LDAP server named LDAP_1.
unset user ldap server LDAP_1
Related commands
• set user group
• set user ldap
• get user
Syntax description
Keyword Description Availability
name <name_str> The user name to delete. Enter unset user All models.
local name followed by a space and ? for a list of
user names.
Examples
Use the following command to delete the user name User1:
unset user local name User1
Related commands
• set user group
• set user local
• get user
Syntax description
Keyword Description Availability
server <name_str> The name of the RADIUS server to delete. Enter All models.
unset user radius server followed by a space
and ? for a list of RADIUS server names.
Examples
Use the following command to delete the RADIUS server named MainRADIUS:
unset user radius server MainRADIUS
Related commands
• set user group
• set user radius
• get user
Note: The unset vpn certificates command is not available in Transparent mode.
Syntax description
Keyword Description Availability
ca <name_str> Delete the named CA certificate. Use the command All models.
unset vpn certificates ca followed by a space
and ? for a list of CA certificate names.
local <name_str> Delete the named local certificate. Use the command All models.
unset vpn certificates local followed by a
space and ? for a list of CA certificate names.
Examples
Use the following command to delete a local certificate:
unset vpn certificates local branch_office_ca
Use the following command to delete a CA certificate:
unset vpn certificates ca trust_ca
Related commands
• execute vpn certificates ca
• execute vpn certificates local
• get vpn certificates
Note: The unset vpn ipsec command is not available in Transparent mode.
Syntax description
Keyword Description Availability
concentrator <name_str> Delete an IPSec VPN concentrator. Use the command All models.
unset vpn ipsec concentrator followed by a
space and ? for a list of concentrator configurations.
manualkey <name_str> Delete an IPSec manual key tunnel. Use the command All models.
unset vpn ipsec manualkey followed by a space
and ? for a list of manual key configurations.
phase1 <name_str> Delete the named IPSec phase 1 configuration. Use All models.
the command unset vpn ipsec phase1 followed
by a space and ? for a list of phase 1 configurations.
phase2 <name_str> Delete the named IPSec phase 2 configuration. Use All models.
the command unset vpn ipsec phase2 followed
by a space and ? for a list of phase 2 configurations.
Examples
Use the following command to delete an IPSec VPN concentrator.
unset vpn ipsec concentrator Concentrator_1
Use the following command to delete an IPSec VPN manual key tunnel.
unset vpn ipsec manualkey Manual_1
Use the following command to delete an IPSec VPN phase 1 configuration.
unset vpn ipsec phase1 Remote_GW
Use the following command to delete an IPSec VPN phase 2 configuration.
unset vpn ipsec phase2 Auto_1
Related commands
• set vpn ipsec phase1
• set vpn ipsec phase2
• set vpn ipsec concentrator
• set vpn ipsec manualkey
• get vpn ipsec
get commands
Use get commands to list FortiGate configuration settings. You can also view these configuration
settings from the web-based manager. Configuration settings are static settings that can be configured
by an administrative user with write permission. All these settings can be uploaded and downloaded,
and they do not change while the FortiGate is in operation.
get alertemail configuration get log elog get system route policy
get alertemail setting get log logsetting get system route rip
get antivirus filepattern get log policy get system route table
get antivirus quarantine list get log trafficfilter get system serialno
get antivirus quarantine settings get nids detection get system sessionttl
get antivirus service get nids prevention get system snmp
get config get nids rule get system status
get console get system admin get system time
get emailfilter get system autoupdate get system vlan
get firewall address get system dhcpserver get system zone
get firewall addrgrp get system dns get user
get firewall dnstranslation get system ha get vpn certificates
get firewall ipmacbinding get system interface get vpn ipsec
get firewall ippool get system mainregpage get vpn l2tp range
get firewall profile get system management get vpn pptp range
get firewall policy get system objver get webfilter
get firewall schedule get system option
get firewall service get system performance
get firewall vip
Related commands
• set alertemail configuration
• get alertemail setting
• set alertemail setting
• get system dns
• set system dns
Related commands
• get alertemail configuration
• set alertemail configuration
• set alertemail setting
Syntax description
Keyword Description Default Availability
[<fp_integer>] Display the master list of file patterns that FortiGate No All models.
antivirus protection can block. Enter the number of a default.
file pattern to display only that file pattern.
Examples
Use the following command to display the master list of filename patterns:
get antivirus filepattern
Use the following command to display the tenth filename pattern in the list.
get antivirus filepattern 10
Related commands
• set antivirus filepattern
• set antivirus service
• get antivirus service
Syntax description
Keyword Description Default Availability
filter Filter the list of quarantined files using either the No FortiGate-
service or status keywords. default. 200 and
higher.
service value {http | ftp Filter the list of quarantined files according to the No FortiGate-
| smtp | imap | pop3} service from which the file was quarantined. default. 200 and
higher.
status value Filter the list of quarantined files based on whether No FortiGate-
{infected | blocked} the file was blocked or infected. default. 200 and
higher.
Examples
Use the following command to list all the files in quarantine:
get antivirus quarantine list
Use the following command to list all the blocked files in quarantine:
get antivirus quarantine list filter status value blocked
Use the following command to list all the files quarantined from SMTP traffic:
get antivirus quarantine list filter service value smtp
Related commands
• set antivirus quarantine
Related commands
• set antivirus quarantine
Syntax description
Keyword Description Default Availability
{http | smtp | pop3 | Select a service for which to display antivirus No All models.
imap | ftp} protection settings. default.
block Display the list of filename patterns and whether they enabled All models.
are enabled or disabled. All services.
filesizelimit Displays, in Mbytes, the file size limit for the specified Varies. All models.
service. All services.
ports List the port or ports used for HTTP, SMTP, POP3 http 80 All models.
and IMAP traffic. smtp 25 HTTP,
pop3 110 SMTP,
imap 143 POP3,
IMAP
services.
splice Show whether splice is enabled or disabled for smtp enabled All models.
or ftp. SMTP, FTP
services.
Examples
Use the following command to display the list of file name patterns for HTTP and the status of each file
name pattern.
get antivirus service http block
Use the following command to display the file size limit for POP3.
get antivirus service pop3 filesizelimit
Use the following command to list the ports used for HTTP traffic.
get antivirus service http ports
Use the following command to display the SMTP splice status.
get antivirus service smtp splice
Related commands
• set antivirus service
get config
Display the current FortiGate system configuration. For more information, see “Displaying the
FortiGate configuration” on page 19.
Syntax description
Keyword Description Availability
[<keyword_str>] Enter a keyword to display all the lines in the configuration file that All models.
contain that keyword.
Examples
Use the following command to display the current FortiGate system configuration:
get config
Use the following command to display the configuration for the keyword option:
get config option
Related commands
• execute backup
• execute reload
• execute restore
• set console
get console
Display the number of lines per page, the mode of operation and the baud rate of the command line
console.
Note: The baud rate information will display only for FortiGate units with BIOS 3.03 and higher and FortiOS
version 2.50 and higher. When default displays for baud rate, the baud rate has not been set and the FortiGate
unit uses the default setting (115200 for the FortiGate-300 and 9600 for all other models).
get console
Related commands
• set console
get emailfilter
Display the email filtering banned word, address block, and address exempt lists, and the subject tag
configuration.
Syntax description
Keyword Description Default Availability
bannedword Display the list of email filter banned words and No All models.
phrases. The list includes a number for each entry, default.
the word or phrase, the language of the entry and
whether the entry is enabled or disabled.
blocklist Display the list of email address block patterns. The No All models.
list includes a number for each entry, and whether the default.
patterns are enabled or disabled.
config Display the subject tag added to filtered email. All models.
exemptlist Display the list of email address exempt patterns. No All models.
The list includes a number for each entry, and default.
whether the patterns are enabled or disabled.
Examples
Use the following command to display the list of email address block patterns:
get emailfilter blocklist
Related commands
• set emailfilter bannedword
• set emailfilter blocklist
• set emailfilter config
• set emailfilter exemptlist
Related commands
• get firewall addrgrp
• set firewall address
• unset firewall address
• set firewall addrgrp
Related commands
• set firewall addrgrp
• unset firewall addrgrp
Example
get firewall dnstranslation
Related commands
• set firewall dnstranslation
Syntax description
Keyword Description Availability
[dhcpipmac] Display the dynamic IP/MAC binding list. This list is All Models.
available if you have configured the FortiGate to be a
DHCP server.
Examples
Use the following command to display the IP/MAC binding configuration for static IP/MAC binding:
get firewall ipmacbinding
Use the following command to display the dynamic IP/MAC binding list:
get firewall ipmacbinding dhcpipmac
Note: You can also display the dynamic IP/MAC binding list using the get system dhcpipmac command.
Related commands
• get system dhcpserver
• set firewall ipmacbinding setting
• set firewall ipmacbinding table
• unset firewall address
• set system dhcpserver
Related commands
• set firewall ippool
• unset firewall address
Syntax description
Keyword Description Default Availability
<name_str> Enter a profile name to list the settings for all services No All models.
for that profile. Enter get firewall profile for a default.
list of profiles. The profile name is case sensitive.
Enter a service name to list the settings for that
service only.
[<service_str>] Enter a service name to list the settings for that No All models.
service only. Enter get firewall profile default.
<name_str> followed by a space and ? for a list of
services. The service name is not case sensitive.
Examples
Use the following command to display the settings for the default profile named Strict:
get firewall profile Strict
Use the following command to display the HTTP settings for the default profile named Strict:
get firewall profile Strict http
Related commands
• set firewall profile
• unset firewall profile
Syntax description
Required Keyword Description Default Availability
srcintf <intf_str> Enter the source interface for the policy. On all FortiGate No All models.
models srcintf can be the name of a FortiGate interface default.
to which a firewall address has been added.
In NAT/Route mode on FortiGate models 400 and up this
name can also be a VLAN subinterface to which firewall
addresses have been added.
In NAT/Route mode on FortiGate models 400 and up this
name can also be a zone if you have added firewall
addresses to the zone and if you have added at least one
interface or VLAN subinterface to the zone.
Use the command get firewall policy srcintf
followed by a space and ? for a list of available interfaces.
dstintf <intf_str> Enter the destination interface for the policy. On all No All models.
FortiGate models dstintf can be the name of a FortiGate default.
interface to which a firewall address has been added.
In NAT/Route mode on FortiGate models 400 and up this
name can also be a VLAN subinterface to which firewall
addresses have been added.
In NAT/Route mode on FortiGate models 400 and up this
name can also be a zone if you have added firewall
addresses to the zone and if you have added at least one
interface or VLAN subinterface to the zone.
Use the command get firewall policy srcintf
<intf_str> dstintf followed by a space and ? for a list
of available interfaces.
policyid Enter an ID number for the policy. No All models.
<policy-id_integer> Every firewall policy is identified by its srcintf, dstintf, default.
and policyid. Every srcintf, dstintf, and policyid
combination is unique.
Use the command get firewall policy srcintf
<intf_str> dstintf <intf_str> policyid
followed by a space and ? for a list of available policies and
their id numbers.
Examples
Use the following command to display all the policy lists:
get firewall policy
Use the following command to display the Internal to External policy list:
get firewall policy srcintf internal dstintf external
Use the following command to display detailed information for the policy in the Internal to External
policy list with the policy id number 3:
get firewall policy srcintf internal dstintf external policyid 3
Related commands
• set firewall policy
• unset firewall policy
Syntax description
Keyword Description Default Availability
onetime Display the list of one-time schedules. The display No All models.
shows details about each schedule including the default.
name, begin day, begin time, end day, and end time.
recurring Display the list of recurring schedules. The display Always. All models.
shows details about each schedule including the
name, days of the week the schedule is active, and
the begin time and end time.
Examples
Use the following command to display the list of one-time schedules:
get firewall schedule onetime
Use the following command to display the list of recurring schedules:
get firewall schedule recurring
Related commands
• set firewall onetimeschedule
• set firewall recurringschedule
Syntax description
Keyword Description Default Availability
custom Display the list of custom services. The display No All models.
shows the service name and port information. default.
group Display the list of service groups. The display shows No All models.
the service group name, and the names of the default.
services added to the service group.
predefined The list of predefined services. The display shows the No All models.
service name and port information. default.
Example
Use the following command to display the list of custom services:
get firewall service custom
Use the following command to display the list of service groups:
get firewall service group
Use the following command to display the list of predefined services:
get firewall service predefined
Related commands
• set firewall service custom
• set firewall service group
• unset firewall service
Note: The get firewall vip command is not available in transparent mode.
Related commands
• set firewall vip
• unset firewall vip
Examples
get log elog
Related commands
• set log policy
• set log setting
Examples
get log logsetting
Related commands
• set log setting
• set log policy
Syntax description
Keyword Description Default Availability
destination {syslog | Specify a destination for which to display log type No All models.
webtrends | local | status and category settings. default.
console} If the FortiGate unit has a hard disk local will
display the local log settings. If the FortiGate unit
does not have a hard disk local will display the
memory log settings. Use the command get
system status to confirm whether or not a hard
disk is available on the FortiGate unit.
{event | ids | traffic | Specify a log type for which to display status and No All models.
update | virus | category settings. default.
webfilter}
Examples
Use the following command to display the status of all log types for all log locations.
get log policy
Use the following command to display the status, enabled or disabled, of the syslog traffic log:
get log policy destination syslog traffic
Related commands
• set log policy
• set log setting
Examples
get log trafficfilter
Related commands
• set log trafficfilter rule
• set log trafficfilter setting
• unset log filter
Syntax description
Keyword Description Default Availability
checksum Display whether or not the NIDS is set to run off All models.
checksums for IP, TCP, UPD, and ICMP traffic.
interface Display whether or not the NIDS is set to monitor off All models.
each interface for attacks.
Example
Use the following command to display the checksum settings:
get nids detection checksum
Use the following command to find out which interfaces the NIDS monitors for attacks:
get nids detection interface
Related commands
• set nids detection
Syntax description
Keyword Description Default Availability
icmp <attack_str> Specify an Internet Control Message Protocol (ICMP) No All models.
NIDS prevention signature. The display shows default.
whether the signature is enabled or disabled, and the
threshold value if the specified signature has a
threshold value.
Use the command get nids prevention icmp
followed by a space and a ? to display a list of ICMP
signatures.
ip <attack_str> Specify an Internet Protocol (IP) NIDS prevention No All models.
signature. The display shows whether the signature default.
is enabled or disabled, and the threshold value if the
specified signature has a threshold value.
Use the command get nids prevention ip
followed by a space and a ? to display a list of IP
signatures.
status Display whether the NIDS Prevention module is disabled All models.
enabled or disabled.
tcp <attack_str> Specify a Transmission Control Protocol (TCP) NIDS No All models.
prevention signature. The display shows whether the default.
signature is enabled or disabled, and the threshold
value if the specified signature has a threshold value.
Use the command get nids prevention tcp
followed by a space and a ? to display a list of TCP
signatures.
udp <attack_str> Specify a User Datagram Protocol (UDP) NIDS No All models.
prevention signature. The display shows whether the default.
signature is enabled or disabled, and the threshold
value if the specified signature has a threshold value.
Use the command get nids prevention udp
followed by a space and a ? to display a list of UDP
signatures.
Examples
Use the following command to display whether the NIDS Prevention module is enabled or disabled:
get nids prevention status
Use the following command to display the settings for the TCP SYN flood signature:
get nids prevention tcp synflood
Related commands
• set nids prevention
• get nids detection
• get nids rule
Syntax description
Keyword Description Default Availability
<group_str> Specify the signature group for which to display the No All models.
ID, rule name and revision number of the signatures default.
in the group. Use the command get nids rule
followed by a space and ? to display the list of
signature groups.
Examples
Use the following command to show the list of signature groups and whether each group is enabled or
disabled.
get nids rule
Use the following command to show the ID, rule name, and revision number for each signature in the
telnet signature group:
get nids rule telnet
Related commands
• set nids rule
• get nids detection
• execute backup
• execute restore
Related commands
• set system admin
• unset system admin
Related commands
• get system status
• set system autoupdate
• get system objver
Syntax description
Keyword Description Availability
reserve Display the list of reserved IP/MAC pairs. All models.
reserve Display the dynamic IP/MAC binding list. The dynamic IP/MAC binding list All models.
dhcpipmac is available if you have configured the FortiGate unit as a DHCP server.
Examples
Use the following command to display the DHCP server settings:
get system dhcpserver
Use the following command to display the list of reserved IP/MAC pairs:
get system dhcpserver reserve
Use the following command to display the dynamic IP/MAC binding list:
get system dhcpserver reserve dhcpipmac
You can also display this list using the get firewall ipmacbinding dhcpipmac command.
Related commands
• get firewall ipmacbinding
• set system dhcpserver
• unset system dhcpserver
Related commands
• set system dns
get system ha
Display the FortiGate HA configuration and display statistics for the HA cluster.
Syntax description
Keyword Description Availability
mode Display the HA mode, Group ID, HA unit priority, HA master override Models numbered
setting, and the list of monitored interfaces. In A-A mode, display the 300 and higher.
schedule. If schedule is set to weight-round robin, display the weights for
each priority ID.
statistic Display the statistics for the HA cluster. The statistics include health Models numbered
information for each FortiGate unit in the cluster (CPU usage, memory 300 and higher.
usage, and network usage) and HA statistics (number of sessions, packets,
and bytes processed by each unit in the cluster).
Example
Use the following command to display the HA mode:
get system ha mode
Use the following command to display the statistics for the HA group.
get system ha statistic
Related commands
• get system interface
• set system ha
• execute ha manage
• execute ha synchronize
• set system interface
Example
Use the following command to display the configuration of all the interfaces:
get system interface
Related commands
• get system management
• set system interface
• set system management
• unset system secondip
Related commands
• set system mainregpage
Note: The get system management command is only available in Transparent mode.
Related commands
• set system management
Related commands
• get system autoupdate
• set system autoupdate
• get system status
Note: Front panel and LCD pin settings are available only on FortiGate models numbered 300 and higher.
Related commands
• set system option
Related commands
• get system status
Examples
get system route policy
Related commands
• set system route policy
• unset system route policy
Syntax description
Keyword Description Availability
filter Display RIP filter settings. All models except
FortiGate-50.
NAT/Route mode
only.
Related commands
• set system route rip
• set system route rip filter
• set system route rip interface
• set system route rip neighbor
• set system route rip timers
Example
Use the following command to display the list of routes:
get system route table
Related commands
• set system route number
• unset system route number
Examples
get system serialno
Related commands
• get system status
Examples
get system sessionttl
Related commands
• set system session_ttl
• unset system sessionttl
Related commands
• set system snmp
Related commands
• get system performance
• get system autoupdate
• get system objver
Syntax description
Keyword Description Default Availability
ntp Display the NTP configuration, including whether Disabled. All models.
NTP is enabled or disabled, the NTP server IP 132.246.
address, and the NTP synchronization interval. 168.148.
Interval
60.
time Display the system date, time and time zone and System All models.
whether daylight saving time is enabled or disabled. time and
date.
GM-8.
DST
disabled.
Example
Use the following command to display the FortiGate time settings.
get system time time
Use the following command to display the FortiGate NTP settings.
get system time ntp
Related commands
• set system time
Syntax description
Keyword Description Availability
[interface Enter a physical interface name to display the VLAN Models
<name_str>] subinterfaces added to this physical interface. Use the numbered 400
command get system vlan interface followed by a and higher.
space and a ? for a list of physical interfaces. NAT/Route mode
only.
Example
Use the following command to display the configuration of the VLAN subinterfaces added to the
internal interface.
get system vlan interface internal
Related commands
• set system vlan
• unset system vlan
Note: Zones are available on FortiGate models numbered 400 and higher. Zones are not available in Transparent
mode.
Related commands
• set system zone
• unset system zone
get user
Display information about user names and passwords. Display information about user groups used to
authenticate with firewall policies, PPTP and L2TP VPNs, and IPSec VPN. Display information about
RADIUS and LDAP server settings.
Syntax description
Keyword Description Default Availability
group Display the list of user groups. The list includes the No All models.
number and name for the group, and the members of default.
the group.
ldap Display information about LDAP servers. The list No All models.
includes the LDAP server number, name, IP address, default.
port, common name and base distinguished name.
local Display the list of user names in the local FortiGate No All models.
user database that can be added to user groups. The default.
list includes user number and name, authentication
type, and password. If RADIUS authentication is set
for the user, the list includes the name of the RADIUS
server and indicates if other servers should be tried. If
LDAP authentication is set for the user, the list
includes the name of the LDAP server. The list also
indicates whether the user name is enabled or
disabled.
radius Display information about RADIUS servers. The list No All models.
includes the number, name and IP address of the default.
server. The server secret is masked by an *.
Example
Use the following command to display user group information:
get user group
Use the following command to display user names and information:
get user local
Related commands
• set user group
• set user local
• set user radius
• unset user group
• unset user local
• unset user radius
Note: The get vpn certificates command is not available in Transparent mode.
Syntax description
Keyword Description Default Availability
ca Display the list of CA certificates. The list includes the No All models.
certificate name, subject, issuer, validity from and to default.
dates, finger print, and whether or not this is a root
ca.
local Display the list of local certificates. The list includes No All models.
the certificate name, subject and type. default.
Examples
Use the following command to delete a local certificate:
get vpn certificates local
Use the following command to delete a CA certificate:
get vpn certificates ca
Related commands
• execute vpn certificates ca
• execute vpn certificates local
• unset vpn certificates
Note: The get vpn ipsec command is not available in Transparent mode.
Syntax description
Keyword Description Default Availability
concentrator Display the names of the IPSec VPN concentrators No All models.
and the names of the member tunnels in each one. default. NAT/Route
mode only.
manualkey Display the configuration of each IPSec VPN manual No All models.
key tunnel including the tunnel name, local SPI, default. NAT/Route
remote SPI, remote gateway IP address, encryption mode only.
algorithm, authentication algorithm and concentrator
name (if the tunnel has been added to a
concentrator). The encryption and authentication
keys are hidden.
phase1 Display the settings of each IPSec VPN Phase 1 No All models.
configuration. The information displayed includes the default. NAT/Route
gateway name, remote gateway type, Diffie-Hellman mode only.
group, P1 proposal, keylife, authentication method,
authentication key, Dead Peer Detection settings,
XAuth settings and other settings.
phase2 Display the settings of each IPSec VPN phase 2 No All models.
configuration. The information displayed includes the default. NAT/Route
tunnel name, remote gateway name, P2 proposal mode only.
configuration, keylife, autokey keepalive
configuration, and concentrator name (if the tunnel
has been added to a concentrator).
Example
Use the following command to display the configuration of the IPSec VPN manual key tunnels:
get vpn ipsec manualkey
Use the following command to display the configuration of the IPSec VPN concentrators:
get vpn ipsec concentrator
Related commands
• set vpn ipsec concentrator
• set vpn ipsec manualkey
• set vpn ipsec phase1
• set vpn ipsec phase2
• unset vpn ipsec
Note: The get vpn l2tp command is not available in Transparent mode.
Related commands
• set vpn l2tp
Note: The get vpn pptp command is not available in Transparent mode.
Related commands
• set vpn pptp
get webfilter
Display the current web content filtering configuration.
Syntax description
Keyword Description Default Availability
cerberian Display the Cerberian support configuration including disabled All models.
whether Cerberian support is enabled or disabled,
the Cerberian licence key and seat count, and the list
of IP addresses, netmasks, and aliases for Cerberian
users.
content Display a numbered list of banned words, the No All models.
language for each banned word, and whether each default.
banned word is enabled or disabled.
exempturl Display a numbered list of exempt URLs and whether No All models.
each one is enabled or disabled. default.
script Display whether Java applet, cookie, and ActiveX disabled All models.
filtering is enabled or disabled.
url Display a numbered list of blocked URLs, and No All models.
whether each URL is enabled or disabled. default
Example
Use the following command to display the list of blocked URLs.
get webfilter url
Related commands
• set webfilter cerberian
• set webfilter content
• set webfilter script
• set webfilter url
• set webfilter exempturl
execute commands
Use execute commands to perform system functions similar to those available using the System >
Status page of the web-based manager. Using execute commands, you can shut down or restart the
FortiGate unit, and restore factory defaults. You can also download firmware from a TFTP server, and
upload and download system settings.
Note: Before running execute commands in Transparent mode, make sure that the IP address of the
management interface is configured correctly. See “set system management” on page 94.
execute backup
Backup the FortiGate configuration file or NIDS user defined signatures file to a TFTP server.
Syntax description
Keyword Description Availability
config <name_str> <tftp_ip> The name to give the configuration file that is copied to All models.
the TFTP server. The TFTP server IP address.
nidsuserdefsig <name_str> The name to give the NIDS user defined signature file All models.
<tftp_ip> that is copied to the TFTP server. The TFTP server IP
address.
Example
Use the following command to backup a configuration file from the FortiGate unit to a TFTP server.
The name to give the configuration file on the TFTP sever is fgt.cfg. The IP address of the TFTP
server is 192.168.1.23.
execute backup config fgt.cfg 192.168.1.23
Related commands
• execute restore
• execute reload
• get config
• set nids rule
execute factoryreset
Reset the FortiGate configuration to factory default settings. This procedure does not change the
firmware version or the antivirus or attack definitions.
execute factoryreset
!
Caution: This procedure deletes all changes that you have made to the FortiGate configuration and reverts the
system to its original configuration, including resetting interface addresses.
Related commands
• execute reboot
• execute reload
• get config
execute formatlogdisk
Format the FortiGate hard disk to enhance performance for logging.
! Caution: This operation will erase all quarantine files and logging data on the hard disk.
execute formatlogdisk
execute ha manage
Use this command from the CLI of the primary unit in an HA cluster to connect to the CLI of a
secondary unit in the cluster.
Syntax description
Keyword Description Availability
<cluster-nember_int> The number of the secondary unit in the cluster to which Models
to connect. Enter execute ha manage followed by a numbered 300
space and a question mark to view the list of FortiGate and higher.
units in the cluster. The list includes the serial number Primary unit in
and host name of each secondary unit in the cluster as an HA cluster.
well as a number for the unit.
Example
Use the following command to connect to a secondary unit in a cluster of three FortiGate units.
execute ha manage ?
<1> Subsidary unit FPS3012803021709
<2> Subsidary unit FPS3082103021989
Type 2 and press enter to connect to the second unit in the list. The CLI prompt changes to the host
name of this unit.
Related commands
• execute ha synchronize
• set system ha
• get system ha
• get config
execute ha synchronize
Use this command from a subordinate HA unit in an HA cluster to manually synchronize its
configuration with the primary unit. Using this command you can synchronize the following:
• Configuration changes made to the primary unit (normal system configuration, firewall
configuration, VPN configuration and so on stored in the FortiGate configuration file),
• Antivirus engine and antivirus definition updates received by the primary unit from the
FortiResponse Distribution Network (FDN),
• NIDS attack definition updates received by the primary unit from the FDN,
• Web filter lists added to or changed on the primary unit,
• Email filter lists added to or changed on the primary unit,
• Replacement messages changed on the primary unit,
• Certification Authority (CA) certificates added to the primary unit,
• Local certificates added to the primary unit.
Syntax description
Keyword Description Availability
config Synchronize the FortiGate configuration. Models numbered 300 and higher.
avupd Synchronize the antivirus engine and antivirus definitions. Models numbered 300 and higher.
attackdef Synchronize attack definitions. Models numbered 300 and higher.
weblists Synchronize web filter lists. Models numbered 300 and higher.
emaillists Synchronize email filter lists. Models numbered 300 and higher.
resmsg Synchronize replacement messages. Models numbered 300 and higher.
ca Synchronize CA certificates. Models numbered 300 and higher.
localcert Synchronize local certificates. Models numbered 300 and higher.
all Synchronize all of the above. Models numbered 300 and higher.
Example
From the CLI on a subordinate unit, use the following commands to synchronize the antivirus and
attack definitions on the subordinate FortiGate unit with the primary unit after the FDN has pushed new
definitions to the primary unit.
execute ha synchronize avupd
execute ha synchronize attackdef
Related commands
• execute ha manage
• set system ha
• get system ha
• get config
execute ping
Send an ICMP echo request (ping) to test the network connection between the FortiGate unit and
another network device.
Note: You can change the default ping options using the command execute ping-option.
Note: To display ping option settings use the command execute ping-option view-settings.
Syntax description
Keyword Description Availability
{<host-name_str> The domain name or IP address of the network device that you want the All models.
| <host_ip>} FortiGate unit to ping.
Example
Use the following command to ping a host with the IP address 192.168.1.23
execute ping 192.168.1.23
Related commands
• execute ping-option
• execute traceroute
• set system interface
• get system interface
execute ping-option
Set ICMP echo request (ping) options to control the way ping tests the network connection between
the FortiGate unit and another network device.
Syntax description
Keyword Description Default Availability
data-size <byte_integer> Specify the datagram size in bytes. 56 All models.
df-bit {yes | no} Set df-bit to yes to prevent the ICMP packet from no All models.
being fragmented. Set df-bit to no to allow the
ICMP packet to be fragmented.
pattern {none | <2- Used to fill-in the optional data buffer at the end of the No All models.
byte_hex} ICMP packet. The size of the buffer is specified using default.
the data_size parameter. This allows you to send
out packets of different sizes for testing the effect of
packet size on the connection.
repeat-count Specify how many times to repeat ping. 5 All models.
<repeat_integer>
source {auto | <source- Specify the FortiGate interface from which to send auto All models.
intf_ip} the ping. If you specify auto, the FortiGate unit
selects the source address and interface based on
the route to the <host-name_str> or <host_ip>.
Specifying the IP address of a FortiGate interface
tests connections to different network segments from
the specified interface.
timeout <seconds_integer> Specify, in seconds, how long to wait until ping times 2 All models.
out.
tos {lowdelay | Set the ToS (Type of Service) field in the packet default/ All models.
throughput | reliability header to provide an indication of the quality of 0
| lowcost | default} service desired.
lowdelay = minimize delay
throughput = maximize throughput
reliability = maximize reliability
lowcost = minimize cost
default = 0
ttl <ttl_integer> Specify the time to live. Time to live is the number of 64 All models.
hops the ping packet should be allowed to make
before being discarded or returned.
validate-reply {yes | no} Select yes to validate reply data. no All models.
view-settings Display the current ping-option settings. No All models.
default
Example
Use the following command to increase the number of pings sent.
execute ping-option repeat-count 10
Use the following command to send all pings from the FortiGate interface with IP address
192.168.10.23.
execute ping-option source 192.168.10.23
Related commands
• execute ping
• execute traceroute
• get system interface
execute reboot
Restart the FortiGate unit.
execute reboot
Related commands
• execute reload
• execute factoryreset
• execute shutdown
execute reload
Flush the current configuration from system memory and reload the configuration from a saved
configuration file.
execute reload
Related commands
• execute reboot
• execute factoryreset
• execute shutdown
• execute backup
• get config
execute restore
Copy a configuration file, firmware image or NIDS user defined signature file from a TFTP server to the
FortiGate unit. Use this command to restore a backup configuration, to change the FortiGate firmware,
or to add a new or edited NIDS user defined signature file.
For more information on changing the FortiGate firmware, see “Changing the FortiGate firmware” on
page 21.
Syntax description
Keyword Description Availability
config <name_str> <tftp_ip> Copy a configuration file from a TFTP server to the All models.
FortiGate unit. The FortiGate unit reboots. The new
configuration replaces the existing configuration,
including administrator accounts and passwords.
image <name_str> <tftp_ip> Copy a firmware image from a TFTP server to the All models.
FortiGate unit. The FortiGate unit reboots, loading the
new firmware.
nidsuserdefsig <name_str> Copy a NIDS user defined signature file from a TFTP All models.
<tftp_ip> server to the FortiGate unit. If you have already
uploaded a NIDS user defined signature file, this
command replaces this file.
Example
Use the following command to copy a configuration file from a TFTP server to the FortiGate unit and
restart the FortiGate unit with this configuration. The name of the configuration file on the TFTP server
is backupconfig. The IP address of the TFTP server is 192.168.1.23.
execute restore config backupconfig 192.168.1.23
Related commands
• execute backup
• execute reload
• get config
• get system status
• set nids rule
• get nids rule
Note: This command is only available when you have set the CLI console mode to batch. See “set console” on
page 41.
Related commands
• set console
• get console
execute shutdown
Shutdown the FortiGate unit. You can use this command to remotely shutdown the FortiGate unit so
that it stops processing network traffic. To restart the FortiGate unit you must turn the power off and
then on.
execute shutdown
Related commands
• execute reboot
• execute reload
• execute factoryreset
execute traceroute
Test the connection between the FortiGate unit and another network device, and display information
about the network hops between the device and the FortiGate unit. Some gateways and routers do not
respond to traceroute. In those instances, three asterisks will be displayed.
Syntax description
Keyword Description Availability
traceroute <host_ip> The IP address of the network device to which to trace the route. All models.
Example
Use the following command to test the connection to a device with the IP address 192.168.1.23
execute traceroute 192.168.1.23
Related commands
• execute ping
• execute ping-option
Related commands
• set system autoupdate
• set system dns
• get system autoupdate
• get system status
Note: Digital certificates are not required for configuring FortiGate VPNs. Digital certificates are an advanced
feature provided for the convenience of system administrators. This manual assumes the user has prior
knowledge of how to configure digital certificates for their implementation.
Syntax description
Keyword Description Default Availability
download Copy the CA certificate from the FortiGate unit to a No All models.
<name_str> <tftp_ip> TFTP server. default. NAT/Route
mode only.
import Import the CA certificate from a TFTP server to the No All models.
<name_str> <tftp_ip> FortiGate unit. default. NAT/Route
mode only.
Examples
Use the following command to import the CA certificate named trust_ca to the FortiGate unit from a
TFTP server with the address 192.168.21.54.
execute vpn certificates ca import trust_ca 192.168.21.54
Related commands
• execute vpn certificates local
• get vpn certificates
• unset vpn certificates
Note: VPN peers must use digital certificates that adhere to the X.509 standard.
Note: Digital certificates are not required for configuring FortiGate VPNs. Digital certificates are an advanced
feature provided for the convenience of system administrators. This manual assumes the user has prior
knowledge of how to configure digital certificates for their implementation.
Syntax description
Keyword Description Default Availability
download Download the local certificate from the FortiGate unit No All models.
<certificate-name_str> to a TFTP server. default. NAT/Route
<file-name_str> <tftp_ip> mode only.
generate <name_str> Generate the local certificate. The name can contain No All models.
numbers (0-9), uppercase and lowercase letters default. NAT/Route
(A-Z, a-z), and the special characters - and _. Other mode only.
special characters and spaces are not allowed.
import Import the local certificate from a TFTP server to the No All models.
<name_str> <tftp_ip> FortiGate unit. default. NAT/Route
mode only.
Examples
Use the following command to generate a local certificate request with the name branch_cert, the
domain name www.example.com and a keysize of 1536.
set vpn certificates local generate branch_cert subject www.example.com
keysize 1536
Use the following command to download the local certificate request generated in the above example
from the FortiGate unit to a TFTP server. The example uses the filename testcert for the
downloaded file and the TFTP server address 192.168.21.54.
set vpn certificates local download branch_cert testcert 192.168.21.54
Use the following command to import the signed local certificate named branch_cert to the
FortiGate unit from a TFTP server with the address 192.168.21.54.
set vpn certificates local import branch_cert 192.168.21.54
Related commands
• execute vpn certificates ca
• get vpn certificates
• unset vpn certificates
FortiGate model
50 60 100 200 300 400 500 1000 2000 3000 3600
Policy 200 500 1000 2000 5000 5000 20000 50000 50000 50000 50000
Address 500 500 500 500 3000 3000 6000 10000 10000 10000 10000
Address group 500 500 500 500 500 500 500 500 500 500 500
Service 500 500 500 500 500 500 500 500 500 500 500
Service group 500 500 500 500 500 500 500 500 500 500 500
Recurring schedule 256 256 256 256 256 256 256 256 256 256 256
Onetime schedule 256 256 256 256 256 256 256 256 256 256 256
User 20 500 1000 1000 1000 1000 1000 1000 1000 1000 1000
User group 100 100 100 100 100 100 100 100 100 100 100
Group members 300 300 300 300 300 300 300 300 300 300 300
Virtual IPs 500 500 500 500 500 500 500 500 500 500 500
IP/MAC binding 50 100 1000 1000 2000 2000 2000 5000 5000 5000 5000
Route 500 500 500 500 500 500 500 500 500 500 500
Policy route gateway 500 500 500 500 500 500 500 500 500 500 500
Admin user 500 500 500 500 500 500 500 500 500 500 500
IPsec Phase 1 20 50 80 200 1500 1500 3000 5000 5000 5000 5000
VPN concentrator 500 500 500 500 500 500 500 500 500 500 500
VLAN subinterface N/A N/A N/A N/A N/A 1024* 1024* 2048* 2048* 8192* 8192*
Zone N/A N/A N/A N/A N/A 100 100 200 200 300 500
IP pool 50 50 50 50 50 50 50 50 50 50 50
RADIUS server 6 6 6 6 6 6 6 6 6 6 6
File pattern 56 56 56 56 56 56 56 56 56 56 56
PPTP user 500 500 500 500 500 500 500 500 500 500 500
L2TP user 500 500 500 500 500 500 500 500 500 500 500
URL block no limit no limit no limit no limit no limit no limit no limit no limit no limit no limit no limit
Content block no limit no limit no limit no limit no limit no limit no limit no limit no limit no limit no limit
Exempt URL no limit no limit no limit no limit no limit no limit no limit no limit no limit no limit no limit
Index
A customer service 12
access levels D
administrator 13
administrator diagnose commands 20
access levels 13 displaying the configuration 19
autoupdate DNS translation 48
tunnelling 80
E
B
editing commands 18
backup execute backup 224
config 224 execute commands 223
NIDS user defined signature 224 execute factoryreset 225
baudrate execute formatlogdisk 226
console 41 execute ha manage 227
execute ha synchronize 228
C execute ping 229
CLI execute ping-option 230
basics 17 execute reboot 231
command structure 17 execute reload 232
connecting to 13 execute restore 233
reverting the firmware 22 execute save config 234
command execute shutdown 235
conventions 10
execute traceroute 236
editing 18
help 18 execute updatecenter updatenow 237
recalling 18 execute vpn certificates ca 238
shortcuts 18 execute vpn certificates local 239
command branch
navigating 17 F
command line console 20 firmware
command structure 17 backup image 28
configuration changing 21
displaying 19 installing 23
configuration file re-installing current version 23
editing 19 reverting to an older version 23
connecting reverting using the CLI 22
to the CLI using SSH 15 switching to backup image 29
to the CLI using telnet 16 testing 26
to the console 14 upgrading 21
connecting to the CLI 13 upgrading to a new version 21
console 20 FortiGate product feature matrix 243
baudrate 41 Fortinet customer service 12
conventions 10 ftp splice 40
G H
get alertemail configuration 170 help
get alertemail setting 171 command 18
get antivirus filepattern 172
get antivirus quarantine list 173 N
get antivirus quarantine settings 174 navigating
get antivirus service 175 command branches 17
get commands 169 NIDS user defined signature
get config 176 backup 224
get console 177 restore 233
get emailfilter 178
get firewall address 179 P
get firewall addrgrp 180
phase2
get firewall dnstranslation 181
wildcardid 131
get firewall ipmacbinding 182
port forwarding
get firewall ippool 183 virtual IP 64
get firewall policy 185
proxy server
get firewall profile 184 autoupdate tunnelling 80
get firewall schedule 186
get firewall service 187 R
get firewall vip 188
get log elog 189 recalling commands 18
get log logsetting 190 restore
get log policy 191 image 233
get log trafficfilter 192 NIDS user defined signature 233
get nids detection 193 reverting
firmware to an older version 23
get nids prevention 194
firmware using the CLI 22
get nids rule 195
get system admin 196
S
get system autoupdate 197
get system dhcpserver 198 set alertemail configuration 34
get system dns 199 set alertemail setting 35
get system ha 200 set antivirus filepattern 36
get system interface 201 set antivirus quarantine 37
get system mainregpage 202 set antivirus service 39
get system management 203 set commands 33
get system objver 204 set console 20, 41
get system option 205 set emailfilter bannedword 42
get system performance 206 set emailfilter blocklist 43
get system route policy 207 set emailfilter config 44
get system route rip 208 set emailfilter exemptlist 45
get system route table 209 set firewall address 46
get system serialno 210 set firewall addrgrp 47
get system sessionttl 211 set firewall dnstranslation 48
get system snmp 212 set firewall ipmacbinding setting 49
get system status 213 set firewall ipmacbinding table 50
get system time 214 set firewall ippool 51
get system vlan 215 set firewall onetimeschedule 52
get system zone 216 set firewall policy 53
get user 217 set firewall profile 57
get vpn certificates 218 set firewall recurringschedule 61
get vpn ipsec 219 set firewall service custom 62
get vpn l2tp range 220 set firewall service group 63
get vpn pptp range 221 set firewall vip 64
get webfilter 222 set log policy 66