0% found this document useful (0 votes)
208 views

Console Output CLI Console

The document contains output from a FortiGate firewall device running diagnostic commands to check network connectivity and perform firmware updates. It pings various internal and external addresses and DNS servers with responses showing timing and connectivity. It also shows the firewall attempting to connect to update servers to perform firmware updates, but the attempts time out and fail. The status is checked before and after attempted updates and remains unchanged, showing the updates were not successfully completed.

Uploaded by

Alwis Syalman
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
208 views

Console Output CLI Console

The document contains output from a FortiGate firewall device running diagnostic commands to check network connectivity and perform firmware updates. It pings various internal and external addresses and DNS servers with responses showing timing and connectivity. It also shows the firewall attempting to connect to update servers to perform firmware updates, but the attempts time out and fail. The status is checked before and after attempted updates and remains unchanged, showing the updates were not successfully completed.

Uploaded by

Alwis Syalman
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 9

DSRB-S-FW-1 # execute ping service.fortiguard.

net
PING guard.fortinet.net (209.222.147.36): 56 data bytes
64 bytes from 209.222.147.36: icmp_seq=0 ttl=45 time=247.7 ms
64 bytes from 209.222.147.36: icmp_seq=1 ttl=45 time=247.2 ms
64 bytes from 209.222.147.36: icmp_seq=2 ttl=45 time=250.3 ms
64 bytes from 209.222.147.36: icmp_seq=3 ttl=45 time=249.3 ms
64 bytes from 209.222.147.36: icmp_seq=4 ttl=45 time=248.1 ms

--- guard.fortinet.net ping statistics ---


5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 247.2/248.5/250.3 ms

DSRB-S-FW-1 # execute ping update.fortiguard.net


PING fds1.fortinet.com (173.243.138.66): 56 data bytes
64 bytes from 173.243.138.66: icmp_seq=0 ttl=45 time=207.9 ms
64 bytes from 173.243.138.66: icmp_seq=1 ttl=45 time=207.3 ms
64 bytes from 173.243.138.66: icmp_seq=2 ttl=45 time=207.3 ms
64 bytes from 173.243.138.66: icmp_seq=3 ttl=45 time=207.7 ms
64 bytes from 173.243.138.66: icmp_seq=4 ttl=45 time=207.2 ms

--- fds1.fortinet.com ping statistics ---


5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 207.2/207.4/207.9 ms

DSRB-S-FW-1 # execute ping google.com


PING google.com (142.250.199.46): 56 data bytes
64 bytes from 142.250.199.46: icmp_seq=0 ttl=108 time=41.2 ms
64 bytes from 142.250.199.46: icmp_seq=1 ttl=108 time=72.9 ms
64 bytes from 142.250.199.46: icmp_seq=2 ttl=108 time=27.2 ms
64 bytes from 142.250.199.46: icmp_seq=3 ttl=108 time=27.5 ms
64 bytes from 142.250.199.46: icmp_seq=4 ttl=108 time=26.9 ms

--- google.com ping statistics ---


5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 26.9/39.1/72.9 ms

DSRB-S-FW-1 # execute ping 8.8.8.8


PING 8.8.8.8 (8.8.8.8): 56 data bytes
64 bytes from 8.8.8.8: icmp_seq=0 ttl=112 time=26.1 ms
64 bytes from 8.8.8.8: icmp_seq=1 ttl=112 time=25.4 ms
64 bytes from 8.8.8.8: icmp_seq=2 ttl=112 time=26.3 ms
64 bytes from 8.8.8.8: icmp_seq=3 ttl=112 time=25.5 ms
64 bytes from 8.8.8.8: icmp_seq=4 ttl=112 time=25.5 ms

--- 8.8.8.8 ping statistics ---


5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 25.4/25.7/26.3 ms

DSRB-S-FW-1 # execute ping 1.1.1.1


PING 1.1.1.1 (1.1.1.1): 56 data bytes
64 bytes from 1.1.1.1: icmp_seq=0 ttl=255 time=0.1 ms
64 bytes from 1.1.1.1: icmp_seq=1 ttl=255 time=0.1 ms
64 bytes from 1.1.1.1: icmp_seq=2 ttl=255 time=0.1 ms
64 bytes from 1.1.1.1: icmp_seq=3 ttl=255 time=0.1 ms
64 bytes from 1.1.1.1: icmp_seq=4 ttl=255 time=0.1 ms

--- 1.1.1.1 ping statistics ---


5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 0.1/0.1/0.1 ms
DSRB-S-FW-1 #
DSRB-S-FW-1 # get system status
Version: FortiGate-100E v7.0.3,build0237,211207 (GA)
Firmware Signature: certified
Virus-DB: 81.00908(2020-11-17 17:20)
Extended DB: 81.00908(2020-11-17 17:20)
AV AI/ML Model: 0.00000(2001-01-01 00:00)
IPS-DB: 6.00741(2015-12-01 02:30)
IPS-ETDB: 0.00000(2001-01-01 00:00)
APP-DB: 6.00741(2015-12-01 02:30)
INDUSTRIAL-DB: 6.00741(2015-12-01 02:30)
IPS Malicious URL Database: 2.00831(2020-11-17 04:54)
Serial-Number: FG100ETK18038839
BIOS version: 05000008
System Part-Number: P18827-04
Log hard disk: Not available
Hostname: DSRB-S-FW-1
Private Encryption: Disable
Operation Mode: NAT
Current virtual domain: root
Max number of virtual domains: 10
Virtual domains status: 1 in NAT mode, 0 in TP mode
Virtual domain configuration: disable
FIPS-CC mode: disable
Current HA mode: standalone
Branch point: 0237
Release Version Information: GA
System time: Mon Jan 31 12:08:03 2022
Last reboot reason: warm reboot

DSRB-S-FW-1 # get router info


routing-table show routing table information
protocols show routing protocols information
rip show rip information
ospf show ospf information
bgp show router info bgp information
multicast show routing multicast information
bfd show BFD information
isis show isis information
kernel show kernel routing table
vrrp show vrrp status

DSRB-S-FW-1 # get router info routing-table


details show routing table details information
all show all routing table entries
rip show rip routing table
ospf show ospf routing table
bgp show bgp routing table
isis show isis routing table
static show static routing table
connected show connected routing table
database show routing information base

DSRB-S-FW-1 # get router info routing-table all


Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default

Routing table for VRF=0


S* 0.0.0.0/0 [10/0] via 10.41.0.181, wan1
S 10.0.0.0/8 [10/0] via 10.41.0.181, wan1
S 10.41.0.0/16 [10/0] via 10.41.2.254, lan
C 10.41.0.0/24 is directly connected, wan1
C 10.41.1.0/24 is directly connected, VL301
C 10.41.2.0/24 is directly connected, lan
C 58.82.131.0/27 is directly connected, wan2
S 192.168.99.5/32 [10/0] via 10.41.0.181, wan1
S 192.168.99.6/32 [10/0] via 10.41.0.181, wan1
S 192.168.99.11/32 [10/0] via 10.41.0.181, wan1
S 203.151.138.134/32 [5/0] via 58.82.131.1, wan2

DSRB-S-FW-1 # diagnose debug enable

DSRB-S-FW-1 # diagnose debug application update -1


Debug messages will be on for 30 minutes.

DSRB-S-FW-1 # tcp_connect_fds[256]-select() timed out


upd_comm_connect_fds[469]-Failed TCP connect
do_setup[344]-Failed setup
do_virus_report[681]-Starting VIRUS REPORT
attach_botip_list[745]-Failed to scan botnet ip hits
do_virus_report[689]-No virus stats to report

DSRB-S-FW-1 # execute update-


update-av Update AV engine/definitions.
update-external-resource Download external resource.
update-geo-ip Update IP Geography DB.
update-ips Update IPS engine/definitions.
update-list Download update server list.
update-now Update now.
update-src-vis Update src-vis object.

DSRB-S-FW-1 # execute update-now

DSRB-S-FW-1 # upd_daemon[1603]-Found cached action=00000002


do_update[608]-Starting now UPDATE (final try)
__update_upd_comp_by_settings[465]-Disabling AVEN/FLEN/NIDSDB/FLDB/APPDB/ISDB
components.
upd_fds_load_default_server6[1038]-Resolve and add fds update.fortiguard.net ipv6
address failed.
upd_comm_connect_fds[455]-Trying FDS 208.184.237.66:443
tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
upd_comm_connect_fds[455]-Trying FDS 173.243.138.66:443
tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
upd_comm_connect_fds[455]-Trying FDS 173.243.138.67:443
tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
do_update[615]-UPDATE failed
do_check_wanip[766]-Starting getting wan ip
upd_fds_load_default_server6[1038]-Resolve and add fds update.fortiguard.net ipv6
address failed.
upd_comm_connect_fds[455]-Trying FDS 208.184.237.66:443
tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
upd_comm_connect_fds[455]-Trying FDS 173.243.138.66:443
Timeout

Connection lost. Press Enter to start a new session.

DSRB-S-FW-1 # execute update-now

DSRB-S-FW-1 # get system status


Version: FortiGate-100E v7.0.3,build0237,211207 (GA)
Firmware Signature: certified
Virus-DB: 81.00908(2020-11-17 17:20)
Extended DB: 81.00908(2020-11-17 17:20)
AV AI/ML Model: 0.00000(2001-01-01 00:00)
IPS-DB: 6.00741(2015-12-01 02:30)
IPS-ETDB: 0.00000(2001-01-01 00:00)
APP-DB: 6.00741(2015-12-01 02:30)
INDUSTRIAL-DB: 6.00741(2015-12-01 02:30)
IPS Malicious URL Database: 2.00831(2020-11-17 04:54)
Serial-Number: FG100ETK18038839
BIOS version: 05000008
System Part-Number: P18827-04
Log hard disk: Not available
Hostname: DSRB-S-FW-1
Private Encryption: Disable
Operation Mode: NAT
Current virtual domain: root
Max number of virtual domains: 10
Virtual domains status: 1 in NAT mode, 0 in TP mode
Virtual domain configuration: disable
FIPS-CC mode: disable
Current HA mode: standalone
Branch point: 0237
Release Version Information: GA
System time: Mon Jan 31 12:18:18 2022
Last reboot reason: warm reboot

DSRB-S-FW-1 # get router info routing-table all


Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default

Routing table for VRF=0


S* 0.0.0.0/0 [10/0] via 10.41.0.181, wan1
S 10.0.0.0/8 [10/0] via 10.41.0.181, wan1
S 10.41.0.0/16 [10/0] via 10.41.2.254, lan
C 10.41.0.0/24 is directly connected, wan1
C 10.41.1.0/24 is directly connected, VL301
C 10.41.2.0/24 is directly connected, lan
C 58.82.131.0/27 is directly connected, wan2
S 192.168.99.5/32 [10/0] via 10.41.0.181, wan1
S 192.168.99.6/32 [10/0] via 10.41.0.181, wan1
S 192.168.99.11/32 [10/0] via 10.41.0.181, wan1
S 203.151.138.134/32 [5/0] via 58.82.131.1, wan2
DSRB-S-FW-1 # diag debug enable

DSRB-S-FW-1 # diag debug application update -1


Debug messages will be on for 22 minutes.

DSRB-S-FW-1 # execute update-now

DSRB-S-FW-1 # tcp_connect_fds[256]-select() timed out


upd_comm_connect_fds[469]-Failed TCP connect
upd_comm_connect_fds[455]-Trying FDS 173.243.138.66:443
tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
upd_comm_connect_fds[455]-Trying FDS 173.243.138.67:443
tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
do_update[615]-UPDATE failed
do_check_wanip[766]-Starting getting wan ip
upd_fds_load_default_server6[1038]-Resolve and add fds update.fortiguard.net ipv6
address failed.
upd_comm_connect_fds[455]-Trying FDS 208.184.237.66:443
tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
upd_comm_connect_fds[455]-Trying FDS 173.243.138.66:443
tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
upd_comm_connect_fds[455]-Trying FDS 173.243.138.67:443
Timeout

Connection lost. Press Enter to start a new session.

DSRB-S-FW-1 # diag debug dis

DSRB-S-FW-1 # diag debug rating


Locale : english

Service : Web-filter
Status : Disable

Service : Antispam
Status : Disable

Service : Virus Outbreak Prevention


Status : Disable

DSRB-S-FW-1 # get system fortiguard-service status


NAME VERSION LAST UPDATE METHOD EXPIRE
AV Engine 6.266 2021-08-24 17:00:00 manual 2021-06-29 23:59:59
Virus Definitions 81.908 2020-11-18 08:50:56 scheduled 2021-06-29 23:59:59
Extended set 81.908 2020-11-18 08:50:56 scheduled 2021-06-29 23:59:59
AI/Machine Learning Malware Detection Model 0.000 2001-01-01 00:00:00 manual
n/a
Flow-based Virus Definitions 81.908 2020-11-18 08:50:56 scheduled 2021-06-29
23:59:59
Attack Definitions 6.741 2020-11-18 02:50:57 scheduled 2021-06-29 23:59:59
Attack Extended Definitions 0.000 2001-01-01 00:00:00 manual 2021-06-29
23:59:59
IPS Malicious URL Database 2.831 2020-11-17 20:51:28 scheduled 2021-06-29
23:59:59
IPS/FlowAV Engine 7.043 2021-10-05 01:33:00 manual 2021-06-29 23:59:59
IPS Config Script 1.009 2019-06-06 14:02:00 manual 2021-06-29 23:59:59
Application Definitions 6.741 2020-11-18 02:50:57 scheduled 2021-06-29 23:59:59
Industrial Attack Definitions 6.741 2015-12-01 02:30:00 manual n/a

DSRB-S-FW-1 # diagnose autoupdate versions

AV Engine
---------
Version: 6.00266
Contract Expiry Date: Tue Jun 29 2021
Last Updated using manual update on Tue Aug 24 17:00:00 2021
Last Update Attempt: Wed Nov 18 08:50:56 2020
Result: No Updates

Virus Definitions
---------
Version: 81.00908
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Wed Nov 18 08:50:56 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure

Extended set
---------
Version: 81.00908
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Wed Nov 18 08:50:56 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure

Mobile Malware Definitions


---------
Version: 81.00908
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Wed Nov 18 08:50:56 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure

IPS Attack Engine


---------
Version: 7.00043
Contract Expiry Date: Tue Jun 29 2021
Last Updated using manual update on Tue Oct 5 01:33:00 2021
Last Update Attempt: Wed Nov 18 08:50:56 2020
Result: No Updates

IPS Config Script


---------
Version: 1.00009
Contract Expiry Date: Tue Jun 29 2021
Last Updated using manual update on Thu Jun 6 14:02:00 2019
Last Update Attempt: Wed Nov 18 08:50:56 2020
Result: No Updates

Attack Definitions
---------
Version: 6.00741
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Wed Nov 18 02:50:57 2020
Last Update Attempt: Wed Nov 18 08:50:56 2020
Result: No Updates

Attack Extended Definitions


---------
Version: 0.00000
Contract Expiry Date: Tue Jun 29 2021
Last Updated using manual update on Mon Jan 1 00:00:00 2001
Last Update Attempt: Fri Aug 28 01:22:57 2020
Result: Connectivity failure

Application Definitions
---------
Version: 6.00741
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Wed Nov 18 02:50:57 2020
Last Update Attempt: Wed Nov 18 08:50:56 2020
Result: No Updates

Industrial Attack Definitions


---------
Version: 6.00741
Contract Expiry Date: n/a
Last Updated using manual update on Tue Dec 1 02:30:00 2015
Last Update Attempt: n/a
Result: Updates Installed

IPS Malicious URL Database


---------
Version: 2.00831
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Tue Nov 17 20:51:28 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure

Flow-based Virus Definitions


---------
Version: 81.00908
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Wed Nov 18 08:50:56 2020
Last Update Attempt: Wed Nov 18 08:50:56 2020
Result: Updates Installed

Botnet Domain Database


---------
Version: 2.00623
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Wed Nov 18 06:50:50 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure

Internet-service Database
---------
Version: 0.00000
Contract Expiry Date: n/a
Last Updated using manual update on Mon Jan 1 00:00:00 2001
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure

Device and OS Identification


---------
Version: 1.00123
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Thu Nov 5 08:51:49 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure

URL Allow list


---------
Version: 2.00960
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Wed Nov 18 02:50:57 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure

IP Geography DB
---------
Version: 3.00041
Contract Expiry Date: n/a
Last Updated using manual update on Thu Oct 17 12:05:00 2019
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure

Certificate Bundle
---------
Version: 1.00029
Contract Expiry Date: n/a
Last Updated using manual update on Wed Oct 6 17:00:00 2021
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure

Malicious Certificate DB
---------
Version: 1.00294
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Tue Nov 17 06:50:55 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure

Mac Address Database


---------
Version: 1.00033
Contract Expiry Date: n/a
Last Updated using manual update on Wed Oct 14 15:21:00 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure

AntiPhish Pattern DB
---------
Version: 0.00000
Contract Expiry Date: n/a
Last Updated using manual update on Tue Nov 30 00:00:00 1999
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure

AI/Machine Learning Malware Detection Model


---------
Version: 0.00000
Contract Expiry Date: n/a
Last Updated using manual update on Mon Jan 1 00:00:00 2001
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure

Modem List
---------
Version: 0.000

FDS Address
---------

DSRB-S-FW-1 # exe telnet 173.243.138.66 443


Trying 173.243.138.66...

Timeout!
Failed to connect to specified unit.

DSRB-S-FW-1 #
DSRB-S-FW-1 #

You might also like