FortiAnalyzer 7.6.1 CLI Reference
FortiAnalyzer 7.6.1 CLI Reference
FortiAnalyzer 7.6.1
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTIGUARD LABS
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
Change Log 12
Introduction 13
FortiAnalyzer documentation 13
What’s New in FortiAnalyzer 7.6 14
FortiAnalyzer 7.6.1 14
FortiAnalyzer 7.6.0 14
Using the Command Line Interface 16
CLI command syntax 16
Connecting to the CLI 17
Connecting to the FortiAnalyzer console 17
Setting administrative access on an interface 18
Connecting to the FortiAnalyzer CLI using SSH 18
Connecting to the FortiAnalyzer CLI using the GUI 19
CLI objects 19
CLI command branches 19
config branch 19
get branch 21
show branch 23
execute branch 23
diagnose branch 24
Example command sequences 24
CLI basics 25
Command help 25
Command tree 25
Command completion 25
Recalling commands 25
Editing commands 26
Line continuation 26
Command abbreviation 26
Environment variables 26
Encrypted password support 27
Entering spaces in strings 27
Entering quotation marks in strings 27
Entering a question mark (?) in a string 28
International characters 28
Special characters 28
IPv4 address formats 28
Changing the baud rate 28
Debug log levels 28
Administrative Domains 30
About ADOMs 30
Configuring ADOMs 31
FortiAnalyzer offers centralized network security logging and reporting for the Fortinet Security Fabric. It provides a
consolidated view across Fortinet devices throughout your organization with real-time alerts that expedite the discovery,
investigation, and response to incidents even as they’re happening. With action-oriented views and deep drill-down
capabilities, FortiAnalyzer gives organizations critical insight into threats across the entire attack surface. It also provides
real-time threat intelligence and actionable analytics via global IOC feeds to check for emerging and recent threats
throughout the organization.
FortiAnalyzer includes:
l Centralized logging, reporting and event correlation
l Powerful NOC/SOC dashboard
l Automated indicators of compromise (IOC)
l Real-time and historical views into network activity
FortiAnalyzer documentation
The following tables list the commands and variables that have changed in the CLI.
FortiAnalyzer 7.6.1
The table below lists commands that have changed in version 7.6.1.
Command Change
diagnose fgfm session-list Command added.
FortiAnalyzer 7.6.0
The table below lists commands that have changed in version 7.6.0.
Command Change
config fmupdate fds-setting Variable added:
l system-support-fai
l shell-password
config system admin user Variable added:
l fortiai
l admin-ssh-grace-time
l fabric-storage-pool-quota
l fabric-storage-pool-size
l fcp-cfg-service
l jsonapi-log
config system ha Subcommand updated:
l config peer
Command Change
l password-history
diagnose debug application fazincid Command added.
diagnose dvm device object-reference Command updated.
diagnose dvm device reload Command added.
diagnose dvm remove Command added.
diagnose dvm remove unused-ips-packages Command removed.
diagnose siem merges list Command added.
diagnose siem mutations list Command added.
diagnose siem parts list Command added.
diagnose siem remove database Command removed.
diagnose sql hcache Command updated.
diagnose sql remove Command updated.
diagnose sql status Command updated.
diagnose system aiserver Command added.
diagnose system mapserver clearcache Command added.
diagnose test application fazincid Command added.
execute backup fds Command added.
execute backup fgd Command added.
execute backup fmg-logs Command added.
execute backup fwm Command added.
execute backup rtm Command added.
execute sql-local rebuild-adom Command removed.
execute sql-local rebuild-metadb Command added.
execute sql-local rebuild-siemdb Command removed.
This chapter explains how to connect to the CLI and describes the basics of using the CLI. You can use CLI commands
to view all system information and to change all system configuration settings.
This chapter describes:
l CLI command syntax
l Connecting to the CLI
l CLI objects
l CLI command branches
l CLI basics
l The single quotation mark ' and the double quotation mark “ are supported, but must be used in pairs.
l If there are spaces in a string, you must precede the spaces with the \ escape character or put the string in a
You can use a direct console connection, SSH, or the CLI console widget in the GUI to connect to the FortiAnalyzer CLI.
For more information, see the FortiAnalyzer Administration Guide and your device’s QuickStart Guide.
l Connecting to the FortiAnalyzer console
l Setting administrative access on an interface
l Connecting to the FortiAnalyzer CLI using SSH
l Connecting to the FortiAnalyzer CLI using the GUI
The following procedure describes how to connect to the FortiAnalyzer CLI using Windows
HyperTerminal software. You can use any terminal emulation program.
1. Connect the FortiAnalyzer console port to the available communications port on your computer.
2. Make sure that the FortiAnalyzer unit is powered on.
3. Start a terminal emulation program on the management computer, select the COM port, and use the following
settings:
Data bits 8
Parity None
Stop bits 1
To perform administrative functions through a FortiAnalyzer network interface, you must enable the required types of
administrative access on the interface to which your management computer connects. Access to the CLI requires
Secure Shell (SSH) access. If you want to use the GUI, you need HTTPS access.
To use the GUI to configure FortiAnalyzer interfaces for SSH access, see the FortiAnalyzer Administration Guide.
1. Connect and log into the CLI using the FortiAnalyzer console port and your terminal emulation software.
2. Use the following command to configure an interface to accept SSH connections:
config system interface
edit <interface_name>
set allowaccess <access_types>
end
Where <interface_name> is the name of the FortiAnalyzer interface to be configured to allow administrative
access, and <access_types> is a whitespace-separated list of access types to enable.
For example, to configure port1 to accept HTTPS and SSH connections, enter:
config system interface
edit port1
set allowaccess https ssh
end
Remember to press Enter at the end of each line in the command example. Also, type
end and press Enter to commit the changes to the FortiAnalyzer configuration.
3. To confirm that you have configured SSH access correctly, enter the following command to view the access settings
for the interface:
get system interface <interface_name>
The CLI displays the settings, including the management access settings, for the named interface.
SSH provides strong secure authentication and secure communications to the FortiAnalyzer CLI from your internal
network or the internet. Once the FortiAnalyzer unit is configured to accept SSH connections, you can run an SSH client
on your management computer and use this client to connect to the FortiAnalyzer CLI.
CLI objects
The FortiAnalyzer CLI is based on configurable objects. The top-level object are the basic components of FortiAnalyzer
functionality.
system Configuration options related to the overall operation of the FortiAnalyzer unit, such as
interfaces, virtual domains, and administrators.
fmupdate Configures settings related to FortiGuard service updates and the unit’s built-in FDS.
This object contains more specific lower level objects. For example, the system object contains objects for
administrators, DNS, interfaces and so on.
show branch
Examples showing how to enter command sequences within each branch are provided in the following sections.
config branch
The config commands configure objects of FortiAnalyzer functionality. Top-level objects are not configurable, they are
containers for more specific lower level objects. For example, the system object contains administrators, DNS
addresses, interfaces, routes, and so on. When these objects have multiple sub-objects, such as administrators or
routes, they are organized in the form of a table. You can add, delete, or edit the entries in the table. Table entries each
consist of variables that you can set to particular values. Simpler objects, such as system DNS, are a single set of
variables.
To configure an object, you use the config command to navigate to the object’s command “shell”. For example, to
configure administrators, you enter the command
config system admin user
The command prompt changes to show that you are in the admin shell.
(user)#
This is a table shell. You can use any of the following commands:
edit Add an entry to the FortiAnalyzer configuration or edit an existing entry. For example in the config
system admin shell:
l Type edit admin and press Enter to edit the settings for the default admin administrator
account.
l Type edit newadmin and press Enter to create a new administrator account with the name
newadmin and to edit the default settings for the new administrator account.
delete Remove an entry from the FortiAnalyzer configuration. For example in the config system
admin shell, type delete newadmin and press Enter to delete the administrator account named
newadmin.
purge Remove all entries configured in the current shell. For example in the config user local shell:
l Type get to see the list of user names added to the FortiAnalyzer configuration,
l Type purge and then y to confirm that you want to purge all the user names,
get List the configuration. In a table shell, get lists the table members. In an edit shell, get lists the
variables and their values.
end Save the changes you have made in the current shell and leave the shell. Every config command
must be paired with an end command. You will return to the root FortiAnalyzer CLI prompt.
The end command is also used to save set command changes and leave the shell.
If you enter the get command, you see a list of the entries in the table of administrators. To add a new administrator, you
enter the edit command with a new administrator name:
edit admin_1
The FortiAnalyzer unit acknowledges the new table entry and changes the command prompt to show that you are now
editing the new entry:
new entry 'admin_1' added
(admin_1)#
From this prompt, you can use any of the following commands:
config In a few cases, there are subcommands that you access using a second config command while
editing a table entry. An example of this is the command to add restrict the user to specific devices
or VDOMs.
set Assign values. For example from the edit admin command shell, typing set password
newpass changes the password of the admin administrator account to newpass.
When using a set command to make changes to lists that contain options separated by spaces, you
need to retype the whole list including all the options you want to apply and excluding all the options
you want to remove.
unset Reset values to defaults. For example from the edit admin command shell, typing unset
password resets the password of the admin administrator account to the default of no password.
get List the configuration. In a table shell, get lists the table members. In an edit shell, get lists the
variables and their values.
show Show changes to the default configuration in the form of configuration commands.
next Save the changes you have made in the current shell and continue working in the shell. For
example if you want to add several new admin user accounts enter the config system admin
user shell.
l Type edit User1 and press Enter.
l Use the set commands to configure the values for the new admin account.
l Type next to save the configuration for User1 without leaving the config system admin
user shell.
l Continue using the edit, set, and next commands to continue adding admin user accounts.
l Type end and press Enter to save the last configuration and leave the shell.
end Save the changes you have made in the current shell and leave the shell. Every config command
must be paired with an end command.
The end command is also used to save set command changes and leave the shell.
The config branch is organized into configuration shells. You can complete and save the configuration within each
shell for that shell, or you can leave the shell without saving the configuration. You can only use the configuration
commands for the shell that you are working in. To use the configuration commands for another shell you must leave the
shell you are working in and enter the other shell.
get branch
Use get to display settings. You can use get within a config shell to display the settings for that shell, or you can use
get with a full path to display the settings for the specified shell.
To use get from the root prompt, you must include a path to a shell.
The root prompt is the FortiAnalyzer host or model name followed by a number sign (#).
Example 1
When you type get in the config system admin user shell, the list of administrators is displayed.
At the (user)# prompt, type:
get
userid: admin2
== [ admin3 ]
userid: admin3
Example 2
When you type get in the admin user shell, the configuration values for the admin administrator account are displayed.
edit admin
Example 3
You want to confirm the IP address and netmask of the port1 interface from the root prompt.
At the (command) # prompt, type:
get system interface port1
speed : auto
description : (null)
alias : (null)
mtu : 1500
type : physical
ipv6:
ip6-address: ::/0 ip6-allowaccess: ip6-autoconf: enable
show branch
Use show to display the FortiAnalyzer unit configuration. Only changes to the default configuration are displayed. You
can use show within a config shell to display the configuration of that shell, or you can use show with a full path to
display the configuration of the specified shell.
To display the configuration of all config shells, you can use show from the root prompt. The root prompt is the
FortiAnalyzer host or model name followed by a number sign (#).
Example 1
When you type show and press Enter within the port1 interface shell, the changes to the default interface
configuration are displayed.
At the (port1)# prompt, type:
show
Example 2
You are working in the port1 interface shell and want to see the system dns configuration. At the (port1)# prompt,
type:
show system dns
execute branch
Use execute to run static commands, to reset the FortiAnalyzer unit to factory defaults, or to back up or restore the
FortiAnalyzer configuration. The execute commands are available only from the root prompt.
The root prompt is the FortiAnalyzer host or model name followed by a number sign (#).
Example
diagnose branch
Commands in the diagnose branch are used for debugging the operation of the FortiAnalyzer unit and to set
parameters for displaying different levels of diagnostic information.
Diagnose commands are intended for advanced users only. Contact Fortinet Technical
Support before using these commands.
6. To restore the primary DNS server address to the default address, type unset primary and press Enter.
7. If you want to leave the config system dns shell without saving your changes, type abort and press Enter.
8. To save your changes and exit the dns sub-shell, type end and press Enter.
9. To confirm your changes have taken effect after leaving the dns sub-shell, type get system dns and press
Enter.
CLI basics
Command help
You can press the question mark (?) key to display command help.
l Press the question mark (?) key at the command prompt to display a list of the commands available and a
description of each command.
l Enter a command followed by a space and press the question mark (?) key to display a list of the options available
for that command and a description of each option.
l Enter a command followed by an option and press the question mark (?) key to display a list of additional options
available for that command option combination and a description of each option.
Command tree
Enter tree to display the FortiAnalyzer CLI command tree. To capture the full output, connect to your device using a
terminal emulation program, such as PuTTY, and capture the output to a log file. For config commands, use the tree
command to view all available variables and sub-commands.
Command completion
You can use the tab key or the question mark (?) key to complete commands.
l You can press the tab key at any prompt to scroll through the options available for that prompt.
l You can type the first characters of any command and press the tab key or the question mark (?) key to complete
the command or to scroll through the options that are available at the current cursor position.
l After completing the first word of a command, you can press the space bar and then the tab key to scroll through the
options available at the current cursor position.
Recalling commands
You can recall previously entered commands by using the Up and Down arrow keys to scroll through commands you
have entered.
Editing commands
Use the left and right arrow keys to move the cursor back and forth in a recalled command. You can also use Backspace
and Delete keys, and the control keys listed in the following table to edit the command.
Line continuation
To break a long command over multiple lines, use a \ at the end of each line.
Command abbreviation
You can abbreviate commands and command options to the smallest number of non-ambiguous characters. For
example, the command get system status can be abbreviated to g sy st.
Environment variables
$USERFROM The management access type (SSH, Telnet and so on) and the IPv4 address of
the logged in administrator.
Variable names are case sensitive. In the following example, when entering the variable, you can type $ followed by a
tab to auto-complete the variable to ensure that you have the exact spelling and case. Continue pressing tab until the
variable you want to use is displayed.
config system global
set hostname $SerialNum
end
After you enter a clear text password using the CLI, the FortiAnalyzer unit encrypts the password and stores it in the
configuration file with the prefix ENC. For example:
show system admin user user1
config system admin user
edit "user1"
set password ENC
UAGUDZ1yEaG30620s6afD3Gac1FnOT0BC1rVJmMFc9ubLlW4wEvHcqGVq+ZnrgbudK7aryyf1scXcX
dnQxskRcU3E9XqOit82PgScwzGzGuJ5a9f
set profileid "Standard_User"
next
end
If you want to include a quotation mark, single quote, or apostrophe in a string, you must precede the character with a
backslash character. To include a backslash, enter two backslashes.
If you want to include a question mark (?) in a string, you must precede the question mark with CTRL-V. Entering a
question mark without first entering CTRL-V causes the CLI to display possible command completions, terminating the
string.
International characters
Special characters
The characters <, >, (, ), #, ’, and " are not permitted in most CLI fields, but you can use them in passwords. If you use the
apostrophe (‘) or quote (") character, you must precede it with a backslash (\) character when entering it in the CLI set
command.
You can enter an IPv4 address and subnet using either dotted decimal or slash-bit format. For example you can type
either:
set ip 192.168.1.1 255.255.255.0
or
set ip 192.168.1.1/24
The IPv4 address is displayed in the configuration file in dotted decimal format.
Using execute console baudrate, you can change the default console connection baud rate.
The following table lists available debug log levels on your FortiAnalyzer.
Administrative domains (ADOMs) enable the admin administrator to constrain other Fortinet unit administrators’ access
privileges to a subset of devices in the device list. For FortiGate devices with virtual domains (VDOMs), ADOMs can
further restrict access to only data from a specific FortiGate VDOM.
About ADOMs
Enabling ADOMs alters the structure and available functionality of the GUI and CLI according to whether you are logging
in as the admin administrator, and, if you are not logging in as the admin administrator, the administrator account’s
assigned access profile.
The admin administrator can further restrict other administrators’ access to specific
configuration areas within their ADOM by using access profiles .
l If ADOMs are enabled and you log in as admin, a superset of the typical CLI commands appear, allowing
unrestricted access and ADOM configuration.
config system global contains settings used by the FortiAnalyzer unit itself and settings shared by ADOMs,
such as the device list, RAID, and administrator accounts. It does not include ADOM-specific settings or data, such
as logs and reports. When configuring other administrator accounts, an additional option appears allowing you to
restrict other administrators to an ADOM.
l If ADOMs are enabled and you log in as any other administrator, you enter the ADOM assigned to your account. A
subset of the typical menus or CLI commands appear, allowing access only to only logs, reports, quarantine files,
content archives, IP aliases, and LDAP queries specific to your ADOM. You cannot access Global Configuration, or
enter other ADOMs.
By default, administrator accounts other than the admin account are assigned to the root ADOM, which includes
all devices in the device list. By creating ADOMs that contain a subset of devices in the device list, and assigning
them to administrator accounts, you can restrict other administrator accounts to a subset of the FortiAnalyzer unit’s
total devices or VDOMs.
The admin administrator account cannot be restricted to an ADOM. Other administrators are restricted to their ADOM,
and cannot configure ADOMs or Global Configuration.
The maximum number of ADOMs varies by FortiAnalyzer model.
Configuring ADOMs
To use administrative domains, the admin administrator must first enable the feature, create ADOMs, and assign
existing FortiAnalyzer administrators to ADOMs.
Enabling ADOMs moves non-global configuration items to the root ADOM. Back up the
FortiAnalyzer unit configuration before enabling ADOMs.
Within the CLI, you can enable ADOMs and set the administrator ADOM. To configure the ADOMs, you must use the
GUI.
An administrative domain has two modes: normal and advanced. Normal mode is the default device mode. In normal
mode, a FortiGate unit can only be added to a single administrative domain. In advanced mode, you can assign different
VDOMs from the same FortiGate to multiple administrative domains.
Enabling the advanced mode option will result in more complicated management scenarios. It
is recommended only for advanced users.
where <name> is the administrator user name and <adom_name> is the ADOM name.
Use system commands to configure options related to the overall operation of the FortiAnalyzer unit.
TCP port numbers cannot be used by multiple services at the same time with the same IP
address. If a port is already in use, it cannot be assigned to another service. For example,
HTTPS and HTTP cannot have the same port number.
admin
admin group
Use this command to add, edit, and delete admin user groups.
Syntax
Variable Description
<name> Enter the name of the group you are editing or enter a new name to create an
entry (character limit = 63).
admin ldap
Use this command to add, edit, and delete Lightweight Directory Access Protocol (LDAP) users.
Syntax
Variable Description
adom-access {all | specify} Set all or specify the ADOM access type (default = all).
<server> Enter the name of the LDAP server or enter a new name to create an entry
(character limit = 63).
adom <adom-name> Set the ADOM name to link to the LDAP configuration.
attributes <filter> Attributes used for group searching (for multi-attributes, a use comma as a
separator). For example:
l member
l uniquemember
l member,uniquemember
Variable Description
ca-cert <string> CA certificate name. This variable appears only when secure is set to ldaps or
starttls.
cnid <string> Enter the common name identifier (character limit = 20, default = cn).
group <string> Enter an authorization group. The authentication user must be a member of this
group (full DN) on the server.
password <passwd> Enter a password for the username above. This variable appears only when type
is set to regular.
port <integer> Enter the port number for LDAP server communication (1 - 65535, default = 389).
secondary-server <string> Enter the secondary LDAP server domain name or IPv4 address. Enter a new
name to create a new entry.
server <string> Enter the LDAP server domain name or IPv4 address. Enter a new name to
create a new entry.
tertiary-server <string> Enter the tertiary LDAP server domain name or IPv4 address. Enter a new name
to create a new entry.
username <string> Enter a username. This variable appears only when type is set to regular.
Example
This example shows how to add the LDAP user user1 at the IPv4 address 206.205.204.203.
config system admin ldap
edit user1
set server 206.205.204.203
set dn techdoc
set type regular
admin profile
Use this command to configure access profiles. In a newly-created access profile, no access is enabled. Setting an
option to none hides it from administrators with that profile assigned.
Syntax
When creating a new admin profile, the default for all permissions is none.
Variable Description
<profile> Edit the access profile. Enter a new name to create a new profile (character limit =
35). The pre-defined access profiles are No_Permission_User, Password_
Change_User, Super_User, Standard_User, and Restricted_User.
adom-lock {none | read | read- Configure ADOM locking permissions for profile:
write} l none: No permission (default).
adom-switch {none | read | read- Configure administrative domain (ADOM) permissions for this profile.
write} Controlled functions: ADOM settings in DVM, ADOM settings in All ADOMs page
(under System Settings tab)
Dependencies: If system-setting is none, the All ADOMs page is not
accessible.
allow-to-install {enable | disable} Enable/disable allowing restricting users to install objects to the devices (default =
enable).
change-password {enable | Enable/disable allowing restricted users to change their password (default =
disable} disable).
Variable Description
l email: Email
l message: Message
l srcip: Source IP
datamask-unmasked-time Enter the time without data masking, in days (default = 0).
<integer>
description <string> Enter a description for this access profile (character limit = 1023). Enclose the
description in quotes if it contains spaces.
device-manager {none | read | Enter the level of access to Device Manager settings for this profile.
read-write} This command corresponds to the Device Manager option in the GUI
administrator profile.
Controlled functions: Device Manager
device-op {none | read | read- Add the capability to add, delete, and edit devices to this profile.
write} This command corresponds to the Add/Delete Devices/Groups option in the GUI
administrator profile. This is a sub-setting of device-manager.
Controlled functions: Add or delete devices or groups
device-policy-package-lock Configure device policy package locking permissions for this profile.
{none | read | read-write} Controlled functions: Policy package locking.
Variable Description
fgt-gui-proxy {enable | disable} Enable/disable the FortiGate GUI proxy (default = disable).
ipv6_trusthost1 <IPv6 prefix> The admin user trusted host IPv6 address.
ipv6_trusthost2 <IPv6 prefix> Defaults =
ipv6_trusthost3 <IPv6 prefix> ipv6_trusthost1: ::/0 for all
... others: ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none
ipv6_trusthost10 <IPv6 prefix>
run-report {none | read | read- Configure run reports permission for this profile.
write}
system-setting {none | read | Configure System Settings permissions for this profile.
read-write} This command corresponds to the System Settings option in the GUI
administrator profile.
Controlled functions: System Settings tab, all the settings under System setting,
and CLI access
Variable Description
triage-events {none | read | read- Set the triage events permissions for this profile.
write}
write-passwd-profiles <profile Enter the profile list. Use a space between each entry in the list; for example,
list> profile1 profile2 profile3.
Only available for the Password_Change_User when write-passwd-
access is specify-by-profile.
write-passwd-user-list <user list> Enter the user list. Use a space between each entry in the list; for example, user1
user2 user3.
Only available for the Password_Change_User when write-passwd-
access is specify-by-profile.
field-category {alert | all | fortiview Enter the field category (default = all).
| log | euba}
field-type {email | ip | mac | string} Enter the field type (default = string).
admin radius
Use this command to add, edit, and delete administration RADIUS servers.
Syntax
Variable Description
<server> Enter the name of the RADIUS server or enter a new name to create an entry
(character limit = 63).
auth-type {any | chap | mschap2 | The authentication protocol the RADIUS server will use.
pap} l any: Use any supported authentication protocol (default).
(MS-CHAPv2).
l chap: Challenge Handshake Authentication Protocol (CHAP).
nas-ip <ipv4_address> The network access server (NAS) IPv4 address and called station ID.
port <integer> The RADIUS server port number (1 - 65535, default = 1812).
secondary-secret <passwd> The password to access the RADIUS secondary-server (character limit = 64).
secondary-server <string> The RADIUS secondary-server DNS resolvable domain name or IPv4 address.
secret <passwd> The password to access the RADIUS server (character limit = 64).
server <string> The RADIUS server DNS resolvable domain name or IPv4 address.
Example
This example shows how to add the RADIUS server RAID1 at the IPv4 address 206.205.204.203 and set the shared
secret as R1a2D3i4U5s.
config system admin radius
edit RAID1
set server 206.205.204.203
set secret R1a2D3i4U5s
end
admin setting
Use this command to configure system administration settings, including web administration ports, timeout, and
language.
Syntax
Variable Description
admin-https-redirect {enable | Enable/disable redirection of HTTP admin traffic to HTTPS (default = enable).
disable}
admin-login-max <integer> Set the maximum number of admin users that be logged in at one time (1 - 256,
default = 256).
admin_server_cert <admin_ Enter the name of an https server certificate to use for secure connections (default
server_certificate> = server.crt). FortiAnalyzer has server.crt and Fortinet_Local certificates pre-
loaded.
auth-port <integer> Set the port which is used by FortiGate to authorize FortiAnalyzer (default = 443).
fgt-gui-proxy-port <integer> Enter the FortiGate GUI proxy port (default = 8082).
Variable Description
http_port <integer> Enter the HTTP port number for web administration (1 - 65535, default = 80).
https_port <integer> Enter the HTTPS port number for web administration (1 - 65535, default = 443).
idle_timeout <integer> Enter the idle timeout value, in seconds (60 - 28800, default = 900).
The idle_timeout_api, idle_timeout_gui, and idle_timeout_sso
settings control the idle timeout for API, GUI, and SSO. The idle_timeout
setting controls all other idle timeout, including idle timeout for SSH and console.
idle_timeout_api <integer> Enter the idle timeout for the API sessions, in seconds (1 - 28800, default = 900).
idle_timeout_gui <integer> Enter the idle timeout for the GUI sessions, in seconds (60 - 28800, default =
900).
idle_timeout_sso <integer> Enter the idle timeout for the SSO sessions, in seconds (60 - 28800, default =
900).
show-add-multiple {enable | Enable/disable show the add multiple button in the GUI (default = disable).
disable}
show-checkbox-in-table {enable | Enable/disable show checkboxes in tables in the GUI (default = disable).
disable}
show-device-import-export Enable/disable import/export of ADOM, device, and group lists (default = disable).
{enable | disable}
show_hostname {enable | Enable/disable showing the hostname on the GUI login page (default = disable).
disable}
show-log-forwarding {enable | Enable/disable show log forwarding tab in analyzer mode (default= enable).
disable}
unreg_dev_opt {add_allow_ Select action to take when an unregistered device connects to FortiAnalyzer:
service | add_no_service} l add_allow_service: Add unregistered devices and allow service
requests (default).
l add_no_service: Add unregistered devices and deny service requests.
Variable Description
webadmin_language {auto_ Enter the language to be used for web administration. The following options are
detect | english | french | available:
japanese | korean | simplified_ l auto_detect: Automatically detect language (default)
l japanese: Japanese
l korean: Korean
l spanish: Spanish
Use the show command to display the current configuration if it has been changed from its default value:
show system admin setting
admin tacacs
Use this command to add, edit, and delete administration TACACS+ servers.
Syntax
Variable Description
<server> Enter the name of the TACACS+ server or enter a new name to create an entry
(character limit = 63).
l auto: Uses PAP, MSCHAP, and CHAP (in that order) (default).
CHAP)
l pap: Password Authentication Protocol (PAP).
Variable Description
port <integer> Port number of the TACACS+ server (1 - 65535, default = 49).
secondary-key <passwd> Key to access the secondary server (character limit = 128).
tertiary-key <passwd> Key to access the tertiary server (character limit = 128).
Example
This example shows how to add the TACACS+ server TAC1 at the IPv4 address 206.205.204.203 and set the key as
R1a2D3i4U5s.
config system admin tacacs
edit TAC1
set server 206.205.204.203
set key R1a2D3i4U5s
end
admin user
You can create meta-data fields for administrator accounts. These objects must be created
using the FortiAnalyzer GUI. The only information you can add to the object is the value of the
field (pre-determined text/numbers). For more information, see System Settings in the
FortiAnalyzer Administration Guide.
Syntax
config dashboard
edit moduleid
set name <string>
set column <column_pos>
set diskio-content-type
set diskio-period {1hour | 24hour | 8hour}
set refresh-inverval <integer>
set status {close | open}
set tabid <integer>
set widget-type <string>
set log-rate-type {device | log}
set log-rate-topn {1 | 2 | 3 | 4 | 5}
set log-rate-period {1hour | 2min | 6hours}
set res-view-type {history | real-time}
set res-period {10min | day | hour}
set res-cpu-display {average | each}
set num-entries <integer>
set time-period {1hour | 24hour | 8hour}
end
end
Variable Description
<name_string> Enter the name of the admin user or enter a new name to create a new user
(character limit = 35).
login-max <integer> Set the maximum number of login sessions for this user (default = 32).
password <passwd> Enter a password for the administrator account (character limit = 128). For
improved security, the password should be at least 6 characters long.
This variable is available only if user_type is local.
change-password {enable | Enable/disable allowing restricted users to change their password (default =
disable} disable).
th-from-profile <integer>
th6-from-profile <integer>
trusthost1 <ipv4_mask> Optionally, type the trusted host IPv4 address and network mask from which the
trusthost2 <ipv4_mask> administrator can log in to the FortiAnalyzer system. You can specify up to ten
... trusted hosts. Setting trusted hosts for all of your administrators can enhance the
security of your system.
trusthost10 <ipv4_mask>
Defaults:
trusthost1: 0.0.0.0 0.0.0.0 for all
others: 255.255.255.255 255.255.255.255 for none
ipv6_trusthost1 <ipv6_mask> Optionally, type the trusted host IPv6 address from which the administrator can
ipv6_trusthost2 <ipv6_mask> log in to the FortiAnalyzer system. You can specify up to ten trusted hosts. Setting
... trusted hosts for all of your administrators can enhance the security of your
system.
ipv6_trusthost10 <ipv6_mask>
Defaults:
ipv6_trusthost1: ::/0 for all
others: ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none
Variable Description
profileid <profile-name> Enter the name of the access profile to assign to this administrator account
(character limit = 35, default = Restricted_User). Access profiles control
administrator access to FortiAnalyzer features.
adom <adom_name(s)> Enter the name(s) of the ADOM(s) the administrator belongs to. Any configuration
of ADOMs takes place via the FortiAnalyzer GUI.
adom-access {all | exclude | Set all/specify/exclude ADOM access mode (default = specify).
specify}
dev-group <group-name> Enter the device group that the admin use can access. This option can only be
used for administrators with access to only one ADOM.
description <string> Enter a description for this administrator account (character limit = 127). Enclose
the description in quotes if it contains spaces.
(default).
l pki-auth: The administrator uses PKI.
ldap-server <string> Enter the LDAP server name if the user type is set to LDAP.
radius_server <string> Enter the RADIUS server name if the user type is set t o RADIUS.
tacacs-plus-server <string> Enter the TACACS+ server name if the user type is set to TACACS+.
ssh-public-key1 <key-type> You can specify the public keys of up to three SSH clients. These clients are
<key-value> authenticated without being asked for the administrator password. You must
ssh-public-key2 <key-type> create the public-private key pair in the SSH client application.
<key-value> <key type> is ssh-dss for a DSA key, ssh-rsa for an RSA key.
ssh-public-key3 <key-type> <key-value> is the public key string of the SSH client.
<key-value>
avatar <string> Image file for the administrator's avatar (maximum 4K base64 encode).
ext-auth-accprofile-override Enable/disable allowing the use of the access profile provided by the remote
<enable | disable> authentication server (default = disable).
ext-auth-adom-override Enable/disable allowing the use of the ADOM provided by the remote
<enable | disable> authentication server (default = disable).
Variable Description
ext-auth-group-match <string> Only admin users that belong to this group are allowed to log in.
password-expire <yyyy-mm-dd> When enforcing the password policy, enter the date that the current password will
expire.
fingerprint <string> PKI user certificate fingerprint based on MD5, SHA-1, or SHA-256 hash function.
Format the fingerprint by removing spaces or replacing them with ':'. For
example, 0123abcd... or 01:23:ab:cd....
This command is available when an API or PKI administrator account is
configured.
two-factor-auth {disable | ftc- Enable/disable two-factor authentication (default = disable). You can enable for
email | ftc-ftm | ftc-sms} FortiToken Cloud email, mobile, or SMS.
This command is available when a PKI administrator account is configured.
rpc-permit {none | read-only | Set the permission level for log in via Remote Procedure Call (RPC) (default =
read-write} none).
use-global-theme {enable | Enable/disble global theme for administration GUI (default = enable).
disable}
user-theme {astronomy | autumn Set the color scheme to use for the admin user GUI (default = jade):
| binary-tunnel | blue-sea | calla- l astronomy: Astronomy
Variable Description
l contrast-dark: High Contrast Dark
l dark-matter: Dark Matter
l fish: Fish
l forest: Forest
l graphite: Graphite
l jade: Jade
l mariner: Mariner
l mars: Mars
l mountain: Mountain
l neutrino: Neutrino
l northern-light: Northern Light
l panda: Panda
l penguin: Penguin
l spring: Spring
l summer: Summer
l technology: Technology
l twilight: Twilight
l winter: Winter
l zebra: Zebra
This command is available when use-global-theme is disabled.
fieldname The label/name of the field (read-only, default = 50). Enclose the name in quotes if
it contains spaces.
fieldlength The maximum number of characters allowed for this field (read-only, default =
50).
Variable Description
fieldvalue <string> Enter a pre-determined value for the field. This is the only value that can be
changed with the config meta-data subcommand (character limit = 255).
diskio-content-type {blks | iops | Set the Disk I/O Monitor widget's chart type.
util} l blks: the amount of data of I/O requests.
diskio-period {1hour | 24hour | Set the Disk I/O Monitor widget's data period (default = 1hour).
8hour}
tabid <integer> ID of the tab where the widget is displayed (default = 0).
Variable Description
log-rate-type {device | log} Log receive monitor widget’s statistics breakdown options (default = device).
log-rate-topn {1 | 2 | 3 | 4 | 5} Log receive monitor widgets’s number of top items to display (default = 5).
log-rate-period {1hour | 2min | Log receive monitor widget’s data period (default = 2min).
6hours}
time-period {1hour | 24hour | Set the Log Database Monitor widget's data period (default = 1hour).
8hour}
Setting trusted hosts for all of your administrators increases the security of your network by further restricting
administrative access. In addition to knowing the password, an administrator must connect only through the subnet or
subnets you specify. You can even restrict an administrator to a single IPv4 address if you define only one trusted host
IPv4 address with a netmask of 255.255.255.255.
When you set trusted hosts for all administrators, the FortiAnalyzer system does not respond to administrative access
attempts from any other hosts. This provides the highest security. If you leave even one administrator unrestricted, the
unit accepts administrative access attempts on any interface that has administrative access enabled, potentially
exposing the unit to attempts to gain unauthorized access.
The trusted hosts you define apply both to the GUI and to the CLI when accessed through SSH. CLI access through the
console connector is not affected.
Example
Use the following commands to add a new administrator account named admin_2 with the password set to p8ssw0rd
and the Super_User access profile. Administrators that log in to this account will have administrator access to the
FortiAnalyzer system from any IPv4 address.
config system admin user
edit admin_2
set description "Backup administrator"
set password p8ssw0rd
set profileid Super_User
end
alert-console
Use this command to configure the alert console options. The alert console appears on the dashboard in the GUI.
Syntax
Variable Description
period {1 | 2 | 3 | 4 | 5 | 6 | 7} Enter the number of days to keep the alert console alerts (default = 7).
severity-level {information | notify Enter the minimum severity level to display on the alert console on the dashboard:
| warning | error | critical | alert | l emergency: The unit is unusable (default).
Example
This example sets the alert console message display to warning for a duration of three days.
config system alert-console
set period 3
set severity-level warning
end
alertemail
Use this command to configure alert email settings for your FortiAnalyzer unit.
All variables are required when authentication is enabled.
Syntax
Variable Description
fromaddress <email-address_ The email address the alert message is from. This is a required variable.
string>
fromname <string> The SMTP name associated with the email address. Enclose the name in quotes
if it contains spaces.
smtppassword <passwd> Set the SMTP server password (character limit = 39).
smtpserver {<ipv4_ The SMTP server address, either a DNS resolvable host name or an IPv4
address>|<fqdn_string>} address.
smtpuser <username> Set the SMTP server username (character limit= 63).
Example
Here is an example of configuring alertemail. Enable authentication, the alert is set in Mr. Customer’s name and from
his email address, the SMTP server port is the default port(25), and the SMTP server is at IPv4 address of
192.168.10.10.
config system alertemail
set authentication enable
set fromaddress [email protected]
set fromname “Ms. Customer”
set smtpport 25
set smtpserver 192.168.10.10
end
alert-event
Use alert-event commands to configure the FortiAnalyzer unit to monitor logs for log messages with certain severity
levels, or information within the logs. If the message appears in the logs, the FortiAnalyzer unit sends an email or SNMP
trap to a predefined recipient(s) of the log message encountered. Alert event messages provide immediate notification of
issues occurring on the FortiAnalyzer unit.
When configuring an alert email, you must configure at least one DNS server. The FortiGate unit uses the SMTP server
name to connect to the mail server and must look up this name on your DNS server.
alert-event was removed from the GUI in FortiAnalyzer version 5.0.3. This command has
been kept in the CLI for customers who previously configured this function.
Syntax
Variable Description
<name_string> Enter a name for the alert event (character limit = 63).
event-time-period {0.5 | 1 | 3 | 6 | The period of time in hours during which if the threshold number is exceeded, the
12 | 24 | 72 | 168} event will be reported:
l 0.5: 30 minutes (default)
l 1: 1 hour
l 3: 3 hours
l 6: 6 hours
l 12: 12 hours
l 24: 1 day
l 72: 3 days
l 168: 1 week
generic-text <string> Text that must be contained in a log to trigger alert (character limit = 255).
num-events {1 | 5 | 10 | 50 | 100} Set the minimum number of events that must occur in the given interval before it is
reported (default = 1).
severity-filter {high | low | Set the required log severity to trigger an alert (default = high).
medium | medium-high | medium-
low}
Variable Description
severity-level-comp {>= | = | <=} Set the log severity threshold comparison criterion (default = =). Log messages
are monitored based on the log level. For example, alerts may be monitored if the
messages are greater than or equal to (>=) the Warning log level.
severity-level-logs {no-check | Set the log severity threshold level. That is, the log level the FortiManager looks
information | notify | for when monitoring for alert messages.
warning |error | critical | alert | l no-check: Do not check severity level for this log type (default).
type {mail | snmp | syslog} Select the alert event message method of delivery:
l mail: Send email alert (default).
from <email_address> Enter the sender email address to use in alert emails. This is available when type
is set to mail.
to <email_address> Enter the recipient email address to use in alert emails. This is available when
type is set to mail.
smtp-name <server_name> Enter the name of the mail server. This is available when type is set to mail.
snmp-name <server_name> Enter the snmp server name. This is available when type is set to snmp.
syslog-name <server_name> Enter the syslog server name or IPv4 address. This is available when type is set
to syslog.
Example
In the following example, the alert message is set to send an email to the administrator when 5 warning log messages
appear over the span of three hours.
config system alert-event
edit warning
config alert-destination
edit 1
set type mail
set from [email protected]
set to [email protected]
set smtp-name mail.example.com
end
set enable-severity-filter enable
set event-time-period 3
auto-delete
Use this command to automatically delete policies for logs, reports, and archived and quarantined files.
Syntax
Variable Description
retention {days | weeks | months} Automatic deletion in days, weeks, or months (default = days).
Variable Description
backup all-settings
Use this command to set or check the settings for scheduled backups.
An MD5 checksum is automatically generated in the event log when backing up the configuration. You can verify a
backup by comparing the checksum in the log entry with that of the backup file.
It is mandatory to set a password for the backup file. See set crptpasswd <passwd>
below.
Syntax
Variable Description
server {<ipv4_address>|<fqdn_ Enter the IPv4 address or DNS resolvable host name of the backup server.
str>}
user <username> Enter the user account name for the backup server (character limit = 63).
directory <string> Enter the name of the directory on the backup server in which to save the backup
file.
week_days {monday tuesday Enter the days of the week on which to perform backups. You may enter multiple
wednesday thursday friday days.
saturday sunday}
time <hh:mm:ss> Enter the time of day to perform the backup. Time is required in the form
<hh:mm:ss>.
Variable Description
protocol {ftp | scp | sftp} Enter the transfer protocol (default = sftp).
passwd <passwd> Enter the password for the backup server (character limit = 127).
cert <certificate_name> SSH certificate for authentication. Only available if the protocol is set to scp.
The SSH certificate object must already be configured. See certificate ssh on
page 62.
crptpasswd <passwd> Enter a password to protect backup content (character limit = 63).
central-management
Use this command to set or check the settings for central management.
Syntax
Variable Description
acctid <string>
allow-monitor {enable | disable} Enable/disable remote monitoring of the device (default = enable).
elite-service {enable | disable} Enable/disable FortiCare Elite Service. This option is only available when type =
cloud-management.
(default)
l high: SSL communication with high encryption algorithms
fmg <string> Set the IP address or FQDN of the FortiManager (character limit = 31).
mgmtid <integer>
Variable Description
serial-number <serial_number_ Set the device serial number. You can enter up to 5 serial numbers.
string>
Use the show command to display the current configuration if it has been changed from its default value:
show system central-management
certificate
certificate ca
Syntax
Variable Description
certificate crl
Syntax
Variable Description
comment <string> Optionally, enter a descriptive comment for this CRL (character limit = 127).
http-url <string> Set the HTTP server URL for CRL auto-update.
update-interval <integer> Set the CRL auto-update interval, in minutes (minimum = 3, default = 1440).
certificate local
Use this command to install local certificates. When a CA processes your CSR, it sends you the CA certificate, the
signed local certificate and the CRL.
Syntax
Variable Description
password <passwd> Enter the local certificate password (character limit = 67).
comment <string> Enter any relevant information about the certificate (character limit = 127).
You should not modify the following variables if you generated the CSR on this unit.
certificate oftp
Syntax
Variable Description
local {Fortinet_Local | Fortinet_ Choose from the two available local certificates.
Local2}
mode {custom | default | local} Mode of certificates used by OFTPD (default = default):
l custom: Use a custom certificate.
certificate remote
Syntax
Variable Description
certificate ssh
Syntax
Variable Description
comment <comment_text> Enter any relevant information about the certificate (character limit = 127).
You should not modify the following variables if you generated the CSR on this unit.
connector
Syntax
Variable Description
cloud-orchest-refresh-interval Set the Cloud Orchestration refresh interval, in seconds (300 - 1800, default =
<integer> 300).
conn-refresh-interval <integer> Set the connector refresh interval, in seconds (60 - 1800, default = 300).
faznotify-msg-queue-max Set the faznotify max queued message per connector (10 - 10000, default =
<integer> 1000).
faznotify-msg-timeout <integer> Set the faznotify message timeout (1 - 720 hours, default = 72).
fsso-refresh-interval <integer> Set the FSSO refresh interval, in seconds (60 - 1800, default = 180).
fsso-sess-timeout <integer> Set the FSSO session timeout, in seconds (30 - 600, default = 300).
px-svr-timeout <integer> Set the pxGrid session timeout, in seconds (30 - 600, default = 300).
csf
Use this command to add this device to a Security Fabric or set up a new Security Fabric on this device.
This syntax is used as part of the fabric connection to FortiManager. For more information
about establishing this connection, see the FortiManager Administration Guide.
Syntax
Variable Description
accept-auth-by-cert {enable | Accept connections with unknown certificates and ask admin for approval (default
disable} = enable).
authorization-request-type Authorization request type (default = certificate).
{certificate | serial}
certificate <string> Certificate (default = Fortinet_Local).
downstream-access {enable | Enable/disable downstream device access to this device's configuration and data
disable} (default = disable).
downstream-accprofile <string> Default access profile for requests from downstream devices. This option is only
available when downstream-access is set to enable.
fabric-workers <integer> Number of worker processes for Security Fabric daemon (default = 2).
status {enable | disable} Enable/disable Security Fabric (default = disable).
upstream <string> IP/FQDN of the FortiManager upstream from this FortiAnalyzer in the Security
Fabric.
upstream-port <integer> The port number to use to communicate with the FortiManager upstream from this
FortiAnalyzer in the Security Fabric (default = 8013).
Variables for config trusted-list subcommand:
<name> Name.
action {accept | deny} Security fabric authorization action (default = accept).
authorization-type {certificate | Authorization type (default = serial).
serial}
certificate <string> Certificate.
ha-members <ha members> HA members.
index <integer> Index of the downstream in tree (default = 0).
serial <string> Serial.
dns
Use these commands to set the DNS server addresses. Several FortiAnalyzer functions, including sending alert email,
use DNS. You can configure both IPv4 and IPv6 DNS server addresses.
Syntax
Variable Description
Example
This example shows how to set the primary FortiAnalyzer DNS server IPv4 address to 172.20.120.99 and the
secondary FortiAnalyzer DNS server IPv4 address to 192.168.1.199.
config system dns
set primary 172.20.120.99
set secondary 192.168.1.199
end
docker
Syntax
end
Variable Description
cpu <integer> Set the maximum % of CPU usage (10 - 50, default = 50).
default-address-pool_base Set the default-address-pool CIDR. Enter the IP address and the netmask (default
<ip&netmask> = 172.17.0.0 255.255.0.0).
docker-user-login-max <integer> Set the maximum login sessions for the docker users (default = 32).
mem <integer> Set the maximum % of RAM usage (10 - 50, default = 50).
status {enable | disable | qa | dev} Enable/disable Docker and set registry (default = disable):
l enable: Enable production registry.
fips
Use this command to set the Federal Information Processing Standards (FIPS) status. FIPS mode is an enhanced
security option for some FortiAnalyzer models. Installation of FIPS firmware is required only if the unit was not ordered
with this firmware pre-installed.
Syntax
Variable Description
Variable Description
entropy-token {enable | disable | Configure support for the FortiTRNG entropy token when switching to FIPS mode:
dynamic} l enable: The token must be present during boot up and reseeding. If the
token is not present, the boot up or reseeding is interrupted until the token is
inserted.
l disable: The current entropy implementation is used to seed the Random
token is not present, the boot process is not blocked and the old entropy
implementation is used.
re-seed-interval <integer> The amount of time between RNG reseeding, in minutes (0 - 1440, default =
1440).
fortiview
fortiview setting
Syntax
Variable Description
data-source {auto | cache-only | Data soure of the FortiView query (default = auto):
log-and-cache} l auto: Data from hcache and from logs in a flexible way.
not-scanned apps {exclude | Include/exclude unscanned applications in FortiView (default = include). Set to
include} exclude to filter out never scanned applications.
resolve-ip {enable | disable} Enable/disable resolving the IP address to the hostname in FortiView (default =
disable).
fortiview auto-cache
Syntax
Variable Description
interval <integer> The time interval for FortiView auto-cache, in hours (default = 168).
global
Use this command to configure global settings that affect miscellaneous FortiAnalyzer features.
Syntax
Variable Description
admin-host <string> Administrative host for HTTP and HTTPs. When set, will be used instead of the
client's Host header for any redirection (default = null).
admin-lockout-duration <integer> Set the lockout duration for FortiAnalyzer administration, in seconds (default =
60).
admin-lockout-method {ip | user} Set the lockout method for FortiAnalyzer administration (default = ip).
admin-lockout-threshold Set the lockout threshold for FortiAnalyzer administration (1 - 10, default = 3).
<integer>
admin-ssh-grace-time <integer> Maximum time in seconds permitted between making an SSH connection to the
FortiManager unit and authenticating (10 - 3600 seconds (one hour), default =
120).
adom-select {enable | disable} Enable/disable a pop-up window that allows administrators to select an ADOM
after logging in (default = enable).
apache-mode {event | prefork} Set Apache mode to Apache event mode or Apache prefork mode (default =
event).
api-ip-binding {enable | disable} Enable/disable source IP check for JSON API request (default = enable).
backup-compression {high | low | Set the backup compression level: high (slowest), low (fastest), none, or
none | normal} normal (default).
Variable Description
backup-to-subfolders Enable/disable the creation of subfolders on server for backup storage (default =
{enable | disable} disable).
clt-cert-req {enable | disable} Enable/disable requiring a client certificate for GUI login (default = disable).
When both clt-cert-req and admin-https-pki-required are enabled,
only PKI administrators can connect to the GUI.
console-output {more | standard} Select how the output is displayed on the console (default = standard).
Select more to pause the output at each full screen until keypress. Select
standard for continuous output without pauses.
contentpack-fgt-install Enable/disable auto outbreak auto install for FortiGate ADOMs (default =
{enable | disable} disable).
country-flag {enable | disable} Enable/disable a country flag icon beside an IP address (default = enable).
default-search-mode {advanced | Set the default search mode of log view (default = filter-based).
filter-based}
device-view-mode {regular | tree} Set the devices/groups view mode (default = regular).
fabric-storage-pool-quota Set the disk quota reserved for Fabric Log (MB) (maximum = 50286, default =
<integer> 50286).
Variable Description
fabric-storage-pool-size Set the maximum storage pool size (maximum = 50, minimum = 1, default = 20).
<integer>
fcp-cfg-service {enable | disable} Enable/disable FCP service processing configuration requests from web (default
= disable).
fgfm-ca-cert <certificate> Set the extra FGFM CA certificates ("" = default certificate will be used).
fgfm-cert-exclusive Enable if the local or CA certificates should be used exclusively (default = disable;
{enable | disable} certificate is used best-effort).
fgfm-local-cert <certificate> Set the FGFM local certificate ("" = default certificate will be used).
fgfm-ssl-protocol {sslv3 | tlsv1.0 | Set the lowest SSL protocols for fgfmsd (default = tlsv1.2).
tlsv1.1 | tlsv1.2 | tlsv1.3}
fortiservice-port <integer> Set the FortiService port (1 - 65535, default = 8013). Used by FortiClient endpoint
compliance. Older versions of FortiClient used a different port.
gui-curl-timeout <integer> Set the GUI cURL timeout in seconds (5-300 default = 30).
gui-polling-interval <integer> Set the GUI polling interval in seconds (1-288000, default = 5).
l japanese: Japanese
l spanish: Spanish
lock-preempt {enable | disable} Enable/disable the ADOM lock override (default = disable).
Variable Description
log-checksum {md5 | md5-auth | Record log file hash value, timestamp, and authentication code at transmission or
none} rolling:
l md5: Record log file’s MD5 hash value only.
l md5-auth: Record log file’s MD5 hash value and authentication code.
log-checksum-upload {enable | Enable/disable upload log checksum with log files (default = disable).
disable}
log-forward-cache-size <integer> Set the log forwarding disk cache size, in gigabytes (default = 15).
log-forward-plugin-workers Set the maximum workers for running log forward output plugins. The valid range
<integer> is 2 to 20 (default = 10).
log-mode {analyzer | collector} Set the log system operation mode (default = analyzer).
management-ip <address> Set the management IP address of this FortiGate (default = null). Used to log into
this FortiGate from another FortiGate in the Security Fabric.
Please input the management IP address in IPv4 or FQDN format.
management-port <integer> Set the overriding port for management connection (overrides admin port) (default
= 443).
max-aggregation-tasks <integer> Set the maximum number of concurrent tasks of a log aggregation session (1 - 10,
default = 0).
max-log-forward <integer> Set the maximum log forwarding and aggregation number (5 - 20).
no-copy-permission-check Do not perform permission check to block object changes in different adom during
{enable | disable} copy and install (default = disable).
no-vip-value-check {enable | Enable/disable skipping policy instead of throwing error when VIP has no default
disable} or dynamic mapping during policy copy (default = disable).
object-revision-db-max <integer> Maximum revisions for a single database (10000 - 1000000, default = 100000).
object-revision-object-max Set the maximum revisions for a single object (10 - 1000, default = 100).
<integer>
object-revision-status {enable | Enable/disable creating revisions when modifying objects (default = enable).
disable}
Variable Description
oftp-ssl-protocol {sslv3 | tlsv1.0 | Set the lowest SSL protocols for oftpd (default = tlsv1.2).
tlsv1.1 | tlsv1.2 | tlsv1.3}
policy-object-in-dual-pane Enable/disable show policies and objects in dual pane (default= disable).
{enable | disable}
private-data-encryption Enable/disable private data encryption using an AES 128 bit key (default =
{enable | disable} disable).
search-all-adoms {enable | Enable/disable search all ADOMs for where-used queries (default= disable).
disable}
Variable Description
l ssh-rsa (only available when ssh-strong-crypto is set to disable)
Default = ecdsa-sha2-nistp521 rsa-sha2-256 rsa-sha2-512 ssh-
ed25519
Variable Description
set ssh-strong-crypto {enable Only allow strong ciphers for SSH when enabled (default = enable).
| disable}
ssl-protocol {tlsv1.3 | tlsv1.2 | Set the SSL protocols (default = tlsv1.3 tlsv1.2).
tlsv1.1 | tlsv1.0 | sslv3}
table-entry-blink {enable Enable/disable table entry blink in the GUI (default = enable).
| disable}
task-list-size <integer> Set the maximum number of completed tasks to keep (default = 2000).
tftp
timezone <integer> The time zone for the FortiManager unit (default = Pacific Time). See Time zones
on page 77.
tunnel-mtu <integer> Set the maximum transportation unit (68 - 9000, default = 1500).
usg {enable | disable} Enable/disable contacting only FortiGuard servers in the USA (default = enable).
ssl-cipher-suites Configure the ssl-cipher-suites table to enforce the user specified preferred cipher
order in the incoming SSL connections.
Note: This command is only available if enc-algorithm is set to custom.
cipher <string> Enter the SSL cipher name from the list.
version {tls1.2-or-below | tls1.3} Set the SSL/TLS version the cipher suite can be used with (default = tls1.2-or-
below).
Example
The following command turns on daylight saving time, sets the FortiAnalyzer unit name to FMG3k, and chooses the
Eastern time zone for US & Canada.
config system global
set daylightsavetime enable
set hostname FMG3k
set timezone 12
end
Time zones
ha
Use this command to enable and configure FortiAnalyzer high availability (HA).
FortiAnalyzer HA clusters provide real-time redundancy in case a unit fails. Logs, data, and relevant system settings are
securely synchronized across multiple FortiAnalyzer devices, and processing tasks can be shared to alleviate the load
on the primary unit.
A FortiAnalyzer HA cluster can have a maximum of four units, all of which are visible on the network. All of the units must
be from the same product series and in the same operating mode (analyzer or collector). HA is not supported when
FortiManager features are enabled.
For more information, see the FortiAnalyzer Administration Guide.
Syntax
config system ha
set cfg-sync-hb-interval <integer>
set group-id <integer>
set group-name <name>
set hb-interface <string>
set hb-interval <integer>
set healthcheck {DB | fault-test}
Variable Description
cfg-sync-hb-interval <integer> Configure the sync heartbeat interval (1 - 255, default = 3).
hb-interval <integer> The time, in seconds, that a cluster unit waits between sending heartbeat packets.
The heartbeat interval is also the amount of time that a cluster unit waits before
expecting to receive a heartbeat packet from the other cluster unit (1 - 20, default
= 1).
initial-sync {true | false} Synchronize data from the primary device before joining the HA cluster (default =
true).
initial-sync-threads <integer> Number of threads used for initial synchronization (1 - 15, default = 4).
load-balance {disable | round- Configure load balancing to secondary units (default = round-robin).
robin}
local-cert <certificate> Set the local certificate. Note that "" means that the default certificate will be
used.
log-sync {enable | disable} Synchronize logs to backup FortiAnalyzer devices (default = enable).
Variable Description
mode {a-a | a-p | standalone} Set the HA operating mode: active-active (a-a) active-passive mode (a-p) or
standalone mode (standalone) (default = standalone).
priority <integer> Set the runtime priority (80 - 120, default = 100).
preferrred-role {primary | The preferred role of this unit (default = secondary). The runtime role may be
secondary} different.
<peer_id_int> Add a peer and add the peer’s IPv4 or IPv6 address and serial number.
addr <string> Enter the address of peer for management and data.
addr-hb <string> Enter the IP address of the peer's VIP interface for heartbeat.
This only needs to be set if the value is different than the peer's IP address, and is
only needed when using unicast.
serial-number <string> Enter the serial number of the peer FortiAnalyzer unit.
status {enable | disable} Enter the status of the peer FortiAnalyzer unit (default = enable).
vip-interface <string> Interface for configuring virtual IP address. Enter port1, port2, port3....port10.
interface
Syntax
set allowaccess {fgfm http https https-logging ping snmp soc-fabric ssh webservice}
set lldp {enable | disable}
set speed {1000full | 100full | 100half | 10full | 10half | auto}
set description <string>
set alias <string>
set mtu <integer>
set type {aggregate | physical | vlan}
config ipv6
set ip6-address <ipv6 prefix>
set ip6-allowaccess {fgfm http https https-logging ping snmp ssh webservice}
set ip6-autoconf {enable | disable}
end
end
Variable Description
<interface name> The interface name.
The port can be set to a port number such as port1, port2, port3, or port4.
Different FortiAnalyzer models have different numbers of ports.
status {enable | disable} Enable/disable the interface (default = enable). If the interface is disabled it does
not accept or send packets. If you disable a physical interface, VLAN interfaces
associated with it are also disabled.
mode {dhcp | static} Set the addressing mode (static setting, or DHCP client mode).
ip <ipv4_mask> Enter the interface IPv4 address and netmask. The IPv4 address cannot be on the
same subnet as any other interface.
dhcp-client-identifier <integer> Enter the DHCP client identifier (default = (null)).
This variable is only available when the mode is dhcp.
defaultgw {enable | disable} Enable/disable default gateway (default = enable).
This variable is only available when the mode is dhcp.
dns-server-override {enable | Enable/disable use DNS acquired by DHCP or PPPoE (default = enable).
disable} This variable is only available when the mode is dhcp.
mtu-override {enable | disable} Enable/disable use MTU acquired by DHCP or PPPoE (default = enable).
This variable is only available when the mode is dhcp.
allowaccess {fgfm http https Enter the types of management access permitted on this interface. Separate
https-logging ping snmp soc- multiple selected types with spaces.
fabric ssh webservice} If you want to add or remove an option from the list, retype the list as required.
lldp {enable | disable} Enable or disable the link layer discovery protocol (LLDP) (default = disable).
This variable is only available when the type is physical.
speed {1000full | 100full | 100half Enter the speed and duplexing the network port uses:
| 10full | 10half | auto} l 100full: 100M full-duplex
Variable Description
description <string> Enter a description of the interface (character limit = 63).
alias <string> Enter an alias for the interface.
mtu <integer> Set the maximum transportation unit (68 - 9000, default = 1500).
type {aggregate | physical | vlan} Set the type of interface (default = aggregate).
lacp-speed {fast | slow} Set how often the interface sends LACP messages:
l fast: Send LACP message every second.
Example
This example shows how to set the FortiAnalyzer port1 interface IPv4 address and network mask to 192.168.100.159
and 255.255.255.0, and the management access to ping, https, and ssh.
config system interface
edit port1
set allowaccess ping https ssh
set ip 192.168.110.26 255.255.255.0
set status enable
end
local-in-policy
Syntax
Variable Description
action {accept | drop | reject} Select the action to be performed on the traffic matching this policy:
l accept: Allow traffic matching this policy.
dport <integer> Enter the destination port number (0 for all, default = 0).
dst <ip&netmask> Enter the destination IPv4 address and mask (default = 0.0.0.0 0.0.0.0).
intf <string> Enter a name for the incoming interface. Enter port1, port2, port3....port10.
src <ip&netmask> Enter the source IPv6 address and mask (default = 0.0.0.0 0.0.0.0).
local-in-policy6
Syntax
Variable Description
action {accept | drop | reject} Select the action to be performed on the traffic matching this policy:
l accept: Allow traffic matching this policy.
dport <integer> Enter the destination port number (0 for all, default = 0).
dst <IPv6 prefix> Enter the destination IPv6 address and prefix (default = ::/0).
intf <string> Enter a name for the incoming interface. Enter port1, port2, port3....port10.
src <IPv6 prefix> Enter the source IPv6 address and prefix (default = ::/0).
locallog
locallog setting
Syntax
Variable Description
log-daemon-crash {enable | Send a log message when a daemon crashes (default = disable).
disable}
log-interval-adom-perf-stats Interval for logging the event of adom perf stats, in minutes (default = 5). The
<integer> range should be 5-2880. Enter 0 to disable the logs.
log-interval-dev-no-logging Interval for logging the event of no logs received from a device, in minutes (default
<integer> = 1440).
log-interval-disk-full <integer> Interval for logging the event of disk full, in minutes (default = 5).
log-interval-gbday-exceeded Interval for logging the event of the GB/Day license exceeded, in minutes (default
<integer> = 1440).
no-log-detection-threshold Interval to trigger a local event message if no log data is received, in minutes
<integer> (default = 15).
Use this command to configure the disk settings for uploading log files, including configuring the severity of log levels.
l status must be enabled to view diskfull, max-log-file-size and upload variables.
l upload must be enabled to view/set other upload* variables.
Syntax
Variable Description
status {enable | disable} Enable/disable logging to the local disk (default = enable)
max-log-file-size <integer> Enter the size at which the log is rolled, in megabytes (1 - 1024, default = 100).
max-log-file-num <integer> Enter the number of log files at which the logs are rolled (10 - 10000, default =
10000).
roll-schedule {none | daily | Enter the period for the scheduled rolling of a log file:
weekly} l none: Not scheduled; the log rolls when max-log-file-size is reached
(default).
l daily: Every day.
roll-day {sunday | monday | Enter the day for the scheduled rolling of a log file (default = sunday).
tuesday | wednesday | thursday |
friday | saturday}
roll-time <hh:mm> Enter the time for the scheduled rolling of a log file.
diskfull {nolog | overwrite} Enter action to take when the disk is full:
l nolog: stop logging
log-disk-full-percentage Enter the percentage at which the log disk will be considered full (50 - 90, default
<integer> = 80).
log-disk-quota <integer> Enter the quota for controlling local log size, in GB (0 - 25, default = 5).
Note: 0 means no control of local log size.
upload {enable | disable} Enable/disable uploading of logs when rolling log files (default = disable).
server-type {FTP | SCP | SFTP} Enter the server type to use to store the logs:
l FTP: upload via FTP (default)
Variable Description
uploadport <integer> Enter the port to use when communicating with the destination server (1 - 65535,
default = 0).
uploadpass <passwd> Enter the password of the user account on the destination server (character limit =
127).
uploadtype <event> Enter to upload the event log files (default = event).
uploadzip {enable | disable} Enable to compress uploaded log files (default = disable).
upload-delete-files {enable | Enable/disable deleting log files after uploading (default = enable).
disable}
Example
In this example, the logs are uploaded to an upload server and are not deleted after they are uploaded.
config system locallog disk setting
set status enable
set severity information
set max-log-file-size 1000MB
set roll-schedule daily
set upload enable
set uploadip 10.10.10.1
set uploadport port 443
set uploaduser myname2
set uploadpass 12345
set uploadtype event
set uploadzip enable
set uploadsched enable
set upload-time 06:45
set upload-delete-file disable
end
locallog filter
Use this command to configure filters for local logs. All keywords are visible only when event is enabled.
Syntax
Variable Description
controller {enable | disable} Enable/disable controller application generic messages (default = enable).
devcfg {enable | disable} Enable/disable logging device configuration messages (default = enable).
devops {enable | disable} Enable/disable managed device's operations messages (default = enable).
diskquota {enable | disable} Enable/disable logging FortiAnalyzer disk quota messages (default = enable).
docker {enable | disable} Enable/disable docker application generic messages (default = enable).
dvm {enable | disable} Enable/disable logging device manager messages (default = enable).
Variable Description
ediscovery {enable | disable} Enable/disable logging device manager messages (default = enable).
epmgr {enable | disable} Enable/disable logging endpoint manager messages (default = enable).
event {enable | disable} Enable/disable configuring log filter messages (default = enable).
eventmgmt {enable | disable} Enable/disable logging FortiAnalyzer event handler messages (default = enable).
fazsys {enable | disable} Enable/disable logging FortiAnalyzer system messages (default = enable).
fgd {enable | disable} Enable/disable logging FortiGuard service messages (default = enable).
fmgws {enable | disable} Enable/disable logging web service messages (default = enable).
fmlmgr {enable | disable} Enable/disable logging FortiMail manager messages (default = enable).
fmwmgr {enable | disable} Enable/disable logging firmware manager messages (default = enable).
fortiview {enable | disable} Enable/disable logging FortiAnalyzer FortiView messages (default = enable).
glbcfg {enable | disable} Enable/disable logging global database messages (default = enable).
ha {enable | disable} Enable/disable logging high availability activity messages (default = enable).
incident {enable | disable} Enable/disable logging FortiAnalyzer incident messages (default = enable).
iolog {enable | disable} Enable/disable input/output log activity messages (default = enable).
logdb {enable | disable} Enable/disable logging FortiAnalyzer log DB messages (default = enable).
logdev {enable | disable} Enable/disable logging FortiAnalyzer log device messages (default = enable).
logfile {enable | disable} Enable/disable logging FortiAnalyzer log file messages (default = enable).
logging {enable | disable} Enable/disable logging FortiAnalyzer logging messages (default = enable).
lrmgr {enable | disable} Enable/disable logging log and report manager messages (default = enable).
report {enable | disable} Enable/disable logging FortiAnalyzer report messages (default = enable).
rev {enable | disable} Enable/disable logging revision history messages (default = enable).
rtmon {enable | disable} Enable/disable logging real-time monitor messages (default = enable).
scfw {enable | disable} Enable/disable logging firewall objects messages (default = enable).
Variable Description
scply {enable | disable} Enable/disable logging policy console messages (default = enable).
scrmgr {enable | disable} Enable/disable logging script manager messages (default = enable).
scvpn {enable | disable} Enable/disable logging VPN console messages (default = enable).
system {enable | disable} Enable/disable logging system manager messages (default = enable).
webport {enable | disable} Enable/disable logging web portal messages (default = enable).
Example
In this example, the local log filters are log and report manager, and system settings. Events in these areas of the
FortiAnalyzer unit will be logged.
config system locallog filter
set event enable
set lrmgr enable
set system enable
end
Use this command to enable or disable, and select the severity threshold of, remote logging to the FortiAnalyzer units.
You can configure up to three FortiAnalyzer devices.
The severity threshold required to forward a log message to the FortiAnalyzer unit is separate from event, syslog, and
local logging severity thresholds.
Syntax
Variable Description
peer-cert-cn <string> Certificate common name for the remote FortiAnalyzer. This variable is available
only when the status is upload.
Note: Null or '-' means no certificate CN for the remote FortiAnalyzer. Multiple
CNs are separated by commas. If there is comma in CN, it must follow an escape
character.
Variable Description
severity {emergency | alert | Select the logging severity level (default = notification).
critical | error | warning | The FortiAnalyzer unit logs all messages at and above the logging severity level
notification | information | debug } you select.
upload-time <hh:mm> Set the time to upload local log files (default = 00:00).
Example
You might enable remote logging to the FortiAnalyzer unit configured. Events at the information level and higher, which
is everything except debug level events, would be sent to the FortiAnalyzer unit.
config system locallog fortianalyzer setting
set status enable
set severity information
end
Use this command to configure memory settings for local logging purposes.
Syntax
Variable Description
diskfull {nolog | overwrite} Enter the action to take when the disk is full:
l nolog: Stop logging when disk full
Variable Description
severity {emergency | alert | Select the logging severity level (default = notification).
critical | error | warning | The FortiAnalyzer unit logs all messages at and above the logging severity level
notification | information | debug} you select.
status <enable | disable> Enable/disable logging to the memory buffer (default = disable).
Example
This example shows how to enable logging to memory for all events at the notification level and above. At this level of
logging, only information and debug events will not be logged.
config system locallog memory
set severity notification
set status enable
end
Use this command to configure the settings for logging to a syslog server. You can configure up to three syslog servers:
syslogd, syslogd2 and syslogd3.
Syntax
Variable Description
csv {enable | disable} Enable/disable producing the log in comma separated value (CSV) format
(default = disable).
If you do not enable CSV format the FortiAnalyzer unit produces space separated
log files.
facility {alert | audit | auth | Enter the facility type (default = local7).
authpriv | clock | cron | daemon | The facility identifies the source of the log message to syslog. Change facility
ftp | kernel | local0 | local1 | local2 to distinguish log messages from different FortiAnalyzer units so you can
| local3 | local4 | local5 | local6 | determine the source of the log messages. local0 to local7 are reserved for
local7 | lpr | mail | news | ntp | local use.
syslog | user | uucp}
Variable Description
severity {emergency | alert | Select the logging severity level (default = notification).
critical | error | warning | The FortiAnalyzer unit logs all messages at and above the logging severity level
notification | information | debug} you select.
status {enable | disable} Enable/disable logging to the remote syslog server (default = disable).
Use the show command to display the current configuration if it has been changed from its default value:
show system locallog syslogd setting
Example
In this example, the logs are uploaded to a previously configured syslog server named logstorage. The FortiAnalyzer
unit is identified as facility local0.
config system locallog syslogd setting
set facility local0
set syslog-name logstorage
set status enable
set severity information
end
log
log alert
Syntax
Variable Description
max-alert-count <integer> Maximum number of alerts supported (100 - 50000, default = 10000).
log device-disable
Syntax
Variable Description
TTL <string> Set the duration for Time to Live (TTL). For instance, enter 1d5h for 1 day and 5
hours.
Supported units:
l d- day.
l h- hour.
l m- minute.
l s- second.
Leave the field unset for no expiration.
Note: Do not input auto generated part from [expire:.
log fos-policy-stats
Syntax
Variable Description
retention-days <integer> The number of days that FortiOS policy stats are stored (60 - 1825, default = 365).
sampling-interval <integer> The interval in which policy stats data are received from FortiOS devices, in
minutes (5 - 1440, default = 60).
status {enable | disable} Enable/disable FortiOS policy statistics feature (default = enable).
log interface-stats
Syntax
Variable Description
retention-days <integer> The number of days that interface data are stored (0 - 2000, default = 100).
sampling-interval <integer> The interval in which interface data are received from FortiGate devices, in
seconds (300 - 86400, default = 1200).
log ioc
Use this command to configure log based IoC (Indicators of Compromise) settings.
Syntax
Variable Description
notification-throttle <integer> Set the minute value for throttling the rate of IoC notifications (1 - 10080, default =
1440).
rescan-max-runner <integer> Set the maximum number of concurrent IoC rescans (1 to CPU count, default =
8).
Variable Description
rescan-run-at <integer> Set the hour of the day when IoC rescan runs (1 - 24, 0 = run immediately, default
= 24).
log mail-domain
Syntax
Variable Description
devices <string> The device IDs for domain to VDOM mapping, separated by commas (default =
All_FortiMails).
For example: FEVM020000000000,FEVM020000000001
vdom <string> The VDOM name that is mapping to the FortiMail domain.
log pcap-file
Syntax
Variable Description
download-mode {plain | zip | zip- Set the download mode for pcap files:
with-password} l plain: Download original file.
log ratelimit
Syntax
Variable Description
device-ratelimit-default <integer> The default maximum device log rate limit (default = 0).
Note: This command is only available when the mode is set to manual.
mode {disable | manual} The logging rate limit mode (default = disable).
In the manual mode, the system rate limit and the device rate limit both are
configurable, no limit if not configured.
system-ratelimit <integer> The maximum system log rate limit (default = 0).
Note: This command is only available when the mode is set to manual.
filter <string> The device(s) or ADOM filter according to the filter-type setting.
Note: Wildcard expression is supported.
ratelimit <integer> The maximum device log rate limit (default = 0).
log settings
Syntax
Variable Description
browse-max-logfiles <integer> Maximum number of log files for each log browse attempt, per ADOM (default =
10000).
device-auto-detect {enable | Enable/disable looking up device ID in syslog received with no encryption (default
disable} = enable).
download-max-logs <integer> Maximum number of logs for each log download attempt (default = 100000).
FAC-custom-field1 <string> Enter a name of the custom log field to index (character limit = 31).
FCH-custom-field1 <string> Enter a name of the custom log field to index (character limit = 31).
FCT-custom-field1 <string> Enter a name of the custom log field to index (character limit = 31).
FDD-custom-field1 <string> Enter a name of the custom log field to index (character limit = 31).
FGT-custom-field1 <string> Enter a name of the custom log field to index (character limit = 31).
FML-custom-field1 <string> Enter a name of the custom log field to index (character limit = 31).
FPX-custom-field1 <string> Enter a name of the custom log field to index (character limit = 31).
FSA-custom-field1 <string> Enter a name of the custom log field to index (character limit = 31).
FWB-custom-field1 <string> Enter a name of the custom log field to index (character limit = 31).
import-max-logfiles <integer> Maximum number of log files for each log import attempt (default = 10000).
keep-dev-logs {enable | disable} Enable/disable keeping the device logs after the device has been deleted (default
= disable).
FGT20C0000000001.tlog.1417797247.log.
l extended: Extended format for log archive file name, for example:
FGT20C0000000001.2014-12-05-
08:34:58.tlog.1417797247.log.
log-interval-dev-no-logging Interval in minutes of no log received from a device when considering the device
<interger> down (default = 15).
log-upload-interval-dev-no- Interval in minutes of no log uploaded from a device when considering the device
logging <interger> down (default = 360).
sync-search-timeout <integer> The maximum amount of time that a log search session can run in synchronous
mode, in seconds (1 - 86400, default = 60).
Variable Description
days {fri | mon| sat | sun | thu | tue Log files rolling schedule (days of the week). When when is set to weekly, you
| wed} can configure days, hour, and min values.
del-files {enable | disable} Enable/disable log file deletion after uploading (default = disable).
file-size <integer> Roll log files when they reach this size, in megabytes (10 - 1000, default = 200).
gzip-format {enable | disable} Enable/disable compression of uploaded log files (default = disable).
hour <integer> The hour of the day that log files are rolled (0 - 23, default = 0).
min <integer> The minute of the hour that log files are rolled (0 - 59, default = 0).
server <string> Upload server FQDN, IPv4, or IPv6 addresses. Configure up to three servers.
server2 <string>
server3 <string>
upload-hour <integer> The hour of the day that log files are uploaded (0 - 23, default = 0).
upload-mode {backup | mirror} Configure upload mode with multiple servers. Servers are tried then used one
after the other upon failure to connect.
l backup: Servers are attempted and used one after the other upon failure to
connect (default).
l mirror: All configured servers are attempted and used.
Variable Description
username3 <string>
log topology
Syntax
Variable Description
max-depth <integer> Maximum levels to descend from this device to get the logging topology
information (0 - 32, default = 5).
max-depth-share <integer> Maximum levels to descend from this device to share logging topology
information with upstream (0 - 32, default = 5).
log ueba
Syntax
Variable Description
ip-unique-scope {adom | vdom} Set the IP unique scope to ADOM or VDOM (default = vdom). This command is
only effective when ip-only-ep is enabled.
log-fetch
log-fetch client-profile
Syntax
Variable Description
data-range {custom} The data range settings for the fetched logs, which is always custom.
Variable Description
end-time <hh:mm> Set the end date and time of the data-range.
<yyyy/mm/dd>
index-fetch-logs {enable | Enable/disable indexing logs automatically after fetching logs (default = enabled).
disable}
log-filter-logic {and | or} Set the logic for the log filters (default = or).
secure-connection {enable | Enable/disable protecting log-fetch connection with TLS/SSL (default = enabled).
disable}
start-time <hh:mm> Set the start date and time of the data-range. The start date should be earlier than
<yyyy/mm/dd> the end date.
value <string> Enter the field filter operand or free-text matching expression.
log-fetch server-setting
Syntax
Variable Description
max-conn-per-session <integer> The maximum number of concurrent file download connections per session
(default = 3).
max-sessions <integer> The maximum number of concurrent fetch sessions (default = 1).
session-timeout <integer> Set the fetch session timeout period, in minutes (default = 10). This option is only
available in server mode.
log-forward
Syntax
set
fwd-max-delay {1min | 5min | realtime}
set
fwd-output-plugin-id <name>
set
fwd-reliable {enable | disable}
set
fwd-secure {enable | disable}
set
fwd-server-type {cef | elite-service | fortianalyzer | fwd-via-output-plugin |
syslog | syslog-pack}
set fwd-syslog-format {fgt | rfc-5424}
set fwd-syslog-transparent {enable | disable | faz-enrich}
set log-field-exclusion-status {enable | disable}
set log-filter-logic {and | or}
set log-filter-status {enable | disable}
set log-masking-custom-priority disable
set log-masking-fields {domain dstip dstname email message srcip srcmac srcname
user}
set log-masking-key <passwd>
set log-masking-status {enable | disable}
set pcapurl-enrich
set pcapurl-domain-ip
set peer-cert-cn <string>
set proxy-service {enable | disable}
set proxy-service-priority <integer>
set server-addr <string>
set server-device <string>
set server-name <string>
set server-port <integer>
set signature <integer>
set sync-metadata [sf-topology | interface-role | device | endusr-avatar]
config device-filter
edit <id>
set action {include}
set adom <string>
set device <string>
end
config log-field-exclusion
edit <id>
set dev-type {FortiGate | FortiMail | FortiManager | FortiAnalyzer | FortiWeb
| FortiCache | FortiSandbox | FortiDDoS | Syslog}
set field-list <string>
set log-type {app-ctrl | attack | content | dlp | emailfilter | event |
generic | history | traffic | virus | voip | webfilter | netscan | waf |
gtp | dns | ssh | ANY-TYPE}
end
config log-filter
edit <id>
set field {type | logid | level | devid | vd | srcip | srcintf | srcport |
dstip | dstintf | dstport | user | group | free-text }
set oper {= | != | < | > | <= | >= | contain | not-contain | match}
set value {traffic | event | utm}
end
config log-masking-custom
edit <id>
set field-name <string>
set field-type {email | ip | mac | string | unknown}
end
end
Variable Description
agg-archive-types {Web_Archive Archive type (default = all options). This command is only available when the
Secure_Web_Archive Email_ mode is set to aggregation.
Archive File_Transfer_Archive
IM_Archive MMS_Archive AV_
Quarantine IPS_Packets}
agg-data-end-time <hh:mm Enter the end date and time of the data-range <hh:mm yyyy/mm/dd>. This
yyyy/mm/dd> command is only available when the mode is set to aggregation.
Note: Use colon to connect hour and minute values. Use slash to connect year,
month, and day values.
agg-data-start-time <hh:mm> Enter the start date and time of the data-range <hh:mm yyyy/mm/dd>. This
<yyyy/mm/dd> command is only available when the mode is set to aggregation.
Note: Use colon to connect hour and minute values. Use slash to connect year,
month, and day values.
agg-logtypes {none app-ctrl Log type (default = all options). This command is only available when the mode is
attack content dlp emailfilter set to aggregation.
event generic history traffic virus
webfilter netscan fct-event fct-
traffic fct-netscan waf gtp dns
ssh}
agg-password <passwd> Log aggregation access password for server. This command is only available
when the mode is set to aggregation.
agg-time <integer> Daily at the selected time (0 - 23, default = 0). This command is only available
when the mode is set to aggregation.
agg-user <string> Log aggregation access user name for server. This command is only available
when the mode is set to aggregation.
fwd-archives {enable | disable} Enable/disable forwarding archives (default = enable). This command is only
available when the mode is set to forwarding.
Variable Description
fwd-archive-types {Web_Archive Set the forwarding archive types (default = all options). This command is only
Email_Archive IM_Archive File_ available when the mode is set to forwarding.
Transfer_Archive MMS_Archive
AV_Quarantine IPS_Packets
EDISC_Archive}
fwd-compression {enable | Enable/disable compression for better bandwidth efficiency (default = disable).
disable} This command is only available when the mode is set to forwarding.
fwd-facility {alert | audit | auth | Facility for remote syslog (default = local7).
authpriv | clock | cron | daemon | l alert: Log alert
The facility will only be included in the forwarded logs when the
fwd-server-type = syslog.
fwd-ha-bind-vip {enable | disable} Always use VIP as the forwarding port when HA is enabled (default = enable).
This command is only available when the mode is set to forwarding.
fwd-log-source-ip {local_ip | The logs source IP address (default = local_ip). This command is only available
original_ip} when the mode is set to forwarding.
fwd-max-delay {1min | 5min | The maximum delay for near realtime log forwarding.
realtime} l 1min: Near realtime forwarding with up to one minute delay.
fwd-output-plugin-id <name> Enter the name of the output plugin profile (default = null).
Variable Description
This command is only available when the mode is set to forwarding and fwd-
server-type is fwd-via-output-plugin.
fwd-reliable {enable | disable} Enable/disable reliable logging (default = disable). This command is only
available when the mode is set to forwarding.
fwd-secure {enable | disable} Enable/disable TLS/SSL secured reliable logging (default = disable). This
command is only available when the mode is set to forwarding, fwd-
reliable is enabled, and fwd-server-type is set to cef or syslog.
fwd-server-type {cef | elite- Forwarding all logs to one of the following server types:
service | fortianalyzer | fwd-via- l cef: CEF (Common Event Format) server
This command is only available when the mode is set to forwarding and fwd-
server-type is syslog.
log-field-exclusion-status {enable Enable/disable log field exclusion list (default = disable). This command is only
| disable} available when the mode is set to forwarding and fwd-server-type is set to
cef or syslog.
log-filter-logic {and | or} Logic operator used to connect filters (default = or). This command is only
available when log-filter-status is enabled.
log-filter-status {enable | disable} Enable/disable log filtering (default = disable). This command is only available
when the mode is set to forwarding.
Variable Description
This command is only available when the mode is set to forwarding and log-
masking-status is enabled.
log-masking-status {enable | Enable/disable log field masking (default = disable). This command is only
disable} available when the mode is set to forwarding.
pcapurl-enrich
pcapurl-domain-ip
peer-cert-cn <string>
proxy-service {enable | disable} Enable/disable proxy service under collector mode (default = enable). This
command is only available when the mode is set to forwarding.
proxy-service-priority <integer> Proxy service priority from 1 (lowest) to 20 (highest) (default = 10). This command
is only available when the mode is set to forwarding.
server-port <integer> Enter the server listen port (1 - 65535, default = 514). This command is only
available when the mode is set to forwarding.
<id> Enter the device filter ID or enter a number to create a new entry.
l FortiAuthenticator
l FortiCache
l FortiCarrier
l FortiClient
l FortiDDoS
l FortiDeceptor
l FortiFirewall
l FortiFirewallCarrier
Variable Description
l FortiMail
l FortiManager
l FortiProxy
l FortiSandbox
l FortiWeb
l Syslog
l Unmanaged_Devices
l root
Alternatively, enter (null) for all ADOM(s) or a wildcard expression matching
ADOM(s).
device <string> Device ID of log client device, or a wildcard expression matching log client device
(s).
field-list <string> The field type. Enter a comma separated list from the available fields.
<id> Enter the log filter ID or enter a number to create a new entry.
oper {= | != | < | > | <= | >= | Field filter operator (default = =).
contain | not-contain | match}
value {traffic | event | utm} Field filter operand or free-text matching expression.
Variable Description
This variable uses the glibc regex library for values with operators (~,!~), using the
POSIX standard. Filter string syntax is parsed by FortiAnalyzer, escape
characters must be use when needed, and both upper and lower case characters
are supported.
For example, the following value can be set as a matching expression for the
destination IP range from 17.2.16.0.0/16 - 172.19.0.0/16.
set value "dstip~ 172\\.1[6-9]\\.[\\d]+\\.[\\d]+"
<id> Enter the log field masking ID or enter a number to create a new entry.
log-forward-service
This command is only available on FortiAnalyzer models 1000E and above. It is also available
on all supported FortiAnalyzer-VM.
For a list of supported models in v7.6.1, see the FortiAnalyzer 7.6.1 Release Notes.
Syntax
Variable Description
aggregation-disk-quota Aggregated device disk quota on the server, in megabytes (default = 2000).
<integer>
Syntax
Variable Description
<id> Enter the mail service ID of the entry you would like to edit or type a new name to
create an entry (character limit = 63).
auth-type {certificate | psk} Select the SMTP authentication type (default = psk):
l certificate: Use local certificate to authenticate.
passwd <passwd> Enter the SMTP account password value (character limit = 127).
This variable is available only when the auth-type is psk.
port <integer> Enter the SMTP server port (1 - 65535, default = 25).
(default).
l none: Communication will be in plain text format.
metadata
Use this command to add additional information fields to the administrator accounts of your FortiAnalyzer unit.
This command creates the metadata fields. Use config system admin user to add data
to the metadata fields.
Syntax
Variable Description
fieldlength {20 | 255 | 50} Select the maximum number of characters allowed in this field (default = 50).
importance {optional | required} Select if this field is required or optional when entering standard information
(default = required).
ntp
Use this command to configure automatic time setting using a network time protocol (NTP) server.
Syntax
Variable Description
Variable Description
server <string> Enter the IPv4 or IPv6 address, or fully qualified domain name of the NTP server
(default = ntpl.fortinet.com).
minpoll <integer> Minimum poll interval in seconds as power of 2 (e.g. 6 means 64 seconds, default
= 6).
maxpoll <integer> Maximum poll interval in seconds as power of 2 (e.g. 6 means 64 seconds, default
= 10).
password-policy
Syntax
Variable Description
minimum-length <integer> Set the password’s minimum length (8 - 256, default = 8).
upper-case-letter} letter.
l non-alphanumeric: the password must contain at least one non-
alphanumeric character.
l number: the password must contain at least one number.
letter.
Variable Description
change-4-characters {enable | Enable/disable changing at least 4 characters for a new password (default =
disable} disable).
expire <integer> Set the number of days after which admin users' passwords will expire (0 - 3650,
0 = never, default = 0).
password-history <integer> Set the number of unique new passwords that must be used before old password
can be reused (0 - 20, default = 0).
report
report auto-cache
Syntax
Variable Description
order {latest-first | oldest-first} The order of which SQL log table is processed first:
l latest-first: The newest SQL log table is processed first.
sche-rpt-only {enable | disable} Enable/disable auto-cache on scheduled reports only (default = disable).
status {enable | disable} Enable/disable the SQL report auto-cache (default = enable).
report est-browse-time
Syntax
Variable Description
max-read-time <integer> Set the read time threshold for each page view (1 - 3600, default = 180).
report group
Syntax
Variable Description
Variable Description
report setting
Syntax
Variable Description
aggregate-report {enable | Enable/disable including a group report along with the per-device reports (default
disable} = disable).
ldap-cache-timeout <integer> Set the LDAP cache timeout in minutes (0 = do not use cache, default = 60).
max-rpt-pdf-rows <integer> Set the maximum number of rows that can be generated in a single PDF ( 10000 -
1000000, default = 100000).
max-table-rows <integer> Set the maximum number of rows that can be generated in a single table (10000 -
10000000, default = 1000000).
report-priority {auto | high | low} Set the Priority of the SQL report (default = auto).
Variable Description
template-auto-install {default} Set the language used for new ADOMs (default = default).
week-start {mon | sun} Set the day that the week starts on, either sun (Sunday) or mon (Monday) (default
= sun).
route
Use this command to view or configure static routing table entries on your FortiAnalyzer unit.
Syntax
Variable Description
<seq_int> Enter an unused routing sequence number to create a new route. Enter an
existing route number to edit that route.
device <port> Enter the port (interface) used for this route.
dst <dst_ipv4mask> Enter the IPv4 address and mask for the destination network.
gateway <gateway_ipv4_ Enter the default gateway IPv4 address for this network.
address>
route6
Use this command to view or configure static IPv6 routing table entries on your FortiAnalyzer unit.
Syntax
Variable Description
<seq_int> Enter an unused routing sequence number to create a new route. Enter an
existing route number to edit that route.
device <string> Enter the port (interface) used for this route.
dst <ipv6_prefix> Enter the IPv4 address and mask for the destination network.
gateway <ipv6_address> Enter the default gateway IPv6 address for this network.
saml
Syntax
next
end
end
Variable Description
acs-url The Assertion Consumer Service (acs) URL is set automatically once the
server-address is configured. You can view the URL using the get command.
This variable is only available when the role is FAB-SP or SP.
entity-id The entity ID is set automatically once the server-address is configured. You
can view the entity ID using the get command.
This variable is only available when the role is FAB-SP or SP.
login-auto-redirect {enable | Enable/disable automatic redirect to the IDP login page (default = disable).
disable} This variable is only available when the status = enable and the role = SP.
sls-url The Single Logout Service (sls) URL is set automatically once the server-
address is configured. You can view the URL using the get command.
This variable is only available when the role is FAB-SP or SP.
Variable Description
prefix <string> The prefix. Can contain only letters and numbers.
To view the service provider IdP information, use the following commands:
config system saml
config service-providers
edit <name>
get
Output:
name : name
prefix : y9jr06vq0k
sp-cert : (null)
sp-entity-id : http://https://172.27.2.225//metadata/
sp-single-sign-on-url: https://https://172.27.2.225//saml/?acs
sp-single-logout-url: https://https://172.27.2.225//saml/?sls
sp-adom: (null)
sp-profile: (null)
idp-entity-id : http://172.27.2.225/saml-idp/y9jr06vq0k/metadata/
idp-single-sign-on-url: https://172.27.2.225/saml-idp/y9jr06vq0k/login/
idp-single-logout-url: https://172.27.2.225/saml-idp/y9jr06vq0k/logout/
sniffer
Syntax
Variable Description
host <string> IP addresses of the hosts to filter for in sniffer traffic. Multiple individual
IP addresses and ranges of addresses can be entered.
port <string> The ports to sniff. Individual ports or port ranges can be entered.
protocol <string> Integer value for the protocol type as defined by IANA (0 - 255).
snmp
snmp community
Syntax
Variable Description
<index_number> Enter the index number of the community in the SNMP communities table. Enter
an unused index number to create a new SNMP community.
Variable Description
events <events_list> Enable the events for which the FortiManager unit should send traps to the SNMP
managers in this community (default = All events enabled). The raid_changed
event is only available for devices that support RAID.
l cpu-high-exclude-nice: CPU usage exclude NICE threshold.
l ha_switch: HA switch.
name <community_name> Enter the name of the SNMP community. Names can be used to distinguish
between the roles of the hosts in the groups.
For example the Logging and Reporting group would be interested in the disk_
low events, but likely not the other events.
The name is included in SNMPv2c trap packets to the SNMP manager, and is
also present in query packets from, the SNMP manager.
query-v1-port <integer> Enter the SNMPv1 query port number used when SNMP managers query the
FortiManager unit (1 - 65535, default = 161).
query-v1-status {enable | Enable/disable SNMPv1 queries for this SNMP community (default = enable).
disable}
query-v2c-port <integer> Enter the SNMP v2c query port number used when SNMP managers query the
FortiManager unit. SNMP v2c queries will include the name of the community (1 -
65535, default = 161).
query-v2c-status {enable | Enable/disable SNMPv2c queries for this SNMP community (default = enable).
disable}
trap-v1-rport <integer> Enter the SNMPv1 remote port number used for sending traps to the SNMP
managers (1 - 65535, default = 162).
trap-v1-status {enable | disable} Enable/disable SNMPv1 traps for this SNMP community (default = enable).
trap-v2c-rport <integer> Enter the SNMPv2c remote port number used for sending traps to the SNMP
managers (1 - 65535, default = 162).
trap-v2c-status {enable | disable} Enable/disable SNMPv2c traps for this SNMP community. SNMP v2c traps sent
out to SNMP managers include the community name (default = enable).
Variable Description
<host_number> Enter the index number of the host in the table. Enter an unused index number to
create a new host.
interface <interface_name> Enter the name of the FortiAnalyzer unit that connects to the SNMP manager
(default = any).
<host_number> Enter the index number of the host in the table. Enter an unused index number to
create a new host.
interface <interface_name> Enter the name of the FortiAnalyzer unit that connects to the SNMP manager
(default = any).
Example
This example shows how to add a new SNMP community named SNMP_Com1. The default configuration can be used
in most cases with only a few modifications. In the example below the community is added, given a name, and then
because this community is for an SNMP manager that is SNMP v1 compatible, all v2c functionality is disabled. After the
community is configured the SNMP manager, or host, is added. The SNMP manager IPv4 address is 192.168.20.34 and
it connects to the FortiAnalyzer unit internal interface.
config system snmp community
edit 1
set name SNMP_Com1
set query-v2c-status disable
set trap-v2c-status disable
config hosts
edit 1
set interface internal
set ip 192.168.10.34
end
end
snmp sysinfo
Use this command to enable the FortiAnalyzer SNMP agent and to enter basic system information used by the SNMP
agent. Enter information about the FortiAnalyzer unit to identify it. When your SNMP manager receives traps from the
FortiAnalyzer unit, you will know which unit sent the information. Some SNMP traps indicate high CPU usage, log full, or
low memory.
For more information on SNMP traps and variables, see the Fortinet Document Library.
Syntax
Variable Description
contact-info <string> Add the contact information for the person responsible for this FortiAnalyzer unit
(character limit = 255).
description <description> Add a name or description of the FortiManager unit (character limit = 255).
location <location> Describe the physical location of the FortiAnalyzer unit (character limit = 255).
status {enable | disable} Enable/disable the FortiAnalyzer SNMP agent (default = disable).
trap-cpu-high-exclude-nice- SNMP trap for CPU usage threshold (excluding NICE processes), in percent
threshold <percentage> (default = 80).
trap-high-cpu-threshold SNMP trap for CPU usage threshold, in percent (default = 80).
<percentage>
trap-low-memory-threshold SNMP trap for memory usage threshold, in percent (default = 80).
<percentage>
Example
This example shows how to enable the FortiAnalyzer SNMP agent and add basic SNMP information.
config system snmp sysinfo
set status enable
set contact-info 'System Admin ext 245'
set description 'Internal network unit'
set location 'Server Room A121'
end
snmp user
Use this command to configure SNMPv3 users on your FortiAnalyzer unit. To use SNMPv3, you will first need to enable
the FortiAnalyzer SNMP agent. For more information, see snmp sysinfo. There should be a corresponding configuration
on the SNMP server in order to query to or receive traps from FortiAnalyzer.
For more information on SNMP traps and variables, see the Fortinet Document Library.
Syntax
Variable Description
auth-proto {md5 | sha | sha224 | Authentication protocol. The security level must be set to auth-no-priv or
sha256 | sha384 | sha512} auth-priv to use this variable:
l md5: HMAC-MD5-96 authentication protocol.
auth-pwd <passwd> Password for the authentication protocol. The security level must be set to auth-
no-priv or auth-priv to use this variable.
events <events_list> Enable the events for which the FortiAnalyzer unit should send traps to the
SNMPv3 managers in this community (default = All events enabled). The raid_
changed event is only available for devices which support RAID.
l cpu-high-exclude-nice: CPU usage exclude nice threshold.
Variable Description
priv-proto {aes | aes256 | Privacy (encryption) protocol. The security level must be set to auth-priv to use
aes256cisco | des} this variable:
l aes: CFB128-AES-128 symmetric encryption protocol (default).
priv-pwd <passwd> Password for the privacy (encryption) protocol. The security level must be set to
auth-priv to use this variable.
queries {enable | disable} Enable/disable queries for this user (default = enable)
(encryption) (default).
soc-fabric
Syntax
Variable Description
Variable Description
role {member | supervisor} Set the SOC Fabric role (default = member).
serial <string> Enter a serial number to add to the trusted-list. Wildcard (*) is supported.
sql
Syntax
Variable Description
background- Disable/enable rebuilding the SQL database in the background (default = enable).
rebuild {enable |
disable}
compress-table- Minimum age in days for SQL tables to be compressed (0 - 10000, default = 7).
min-age <integer> Note: 0-day allows you to compress SQL tables with less than one-day of age.
event-table- Maximum SQL database table partitioning time range for event logs, in minutes (3 - 1440, 0 =
partition-time unlimited, default = 0).
<integer>
fct-table-partition- Maximum SQL database table partitioning time range for FortiClient logs, in minutes (6 - 1440, 0
time <integer> = unlimited, default = 360).
prompt-sql- Prompt to convert log database into SQL database at start time on GUI (default = enable).
upgrade {enable |
disable}
start-time The date and time that logs will start to be inserted.
<hh>:<mm>
<yyyy>/<mm>/<d
d>
traffic-table- Maximum SQL database table partitioning time range for traffic logs (1 - 1440, 0 = unlimited,
partition-time default = 0).
<integer>
Variable Description
utm-table-partition- Maximum SQL database table partitioning time range in minutes for UTM logs (1 - 1440, 0 =
time <integer> unlimited, default = 0).
index-field <string> Enter a valid field name. Select one of the available field names. The available options for
index-field is dependent on the device-type entry.
log-type <log type> Enter the log type. The available options for log-type is dependent on the device-type
entry.
index-field <string> Enter a valid field name. Select one of the available field names. The available options depend
on the device-type.
log-type <log type> Enter the log type. The available options depend on the device-type.
<category> Category of the text search index fields. The following is the list of categories and their default
fields.
Category Value
FGT-app- user,group,srcip,dstip,dstport,service,app,action,hostname
ctrl
FGT- severity,srcip,dstip,action,user,attack
attack
FGT- from,to,subject,action,srcip,dstip,hostname,status
content
FGT-dlp user,srcip,service,action,filename
FGT- user,srcip,from,to,subject
emailfilter
FGT-event subtype,ui,action,msg
FGT-traffic user,srcip,dstip,service,app,utmaction
FGT-virus service,srcip,dstip,action,filename,virus,user
FGT-voip action,user,src,dst,from,to
FGT- user,srcip,dstip,service,action,catdesc,hostname
Variable Description
Category Value
webfilter
FGT- user,dstip,vuln,severity,os
netscan
FGT-fct- (null)
event
FGT-fct- (null)
traffic
FGT-fct- (null)
netscan
FGT-waf user,srcip,dstip,service,action
FGT-gtp msisdn,from,to,status
FGT-dns (null)
FGT-ssh login,srcip,dstip,direction,action
FGT-ssl srcip,dstip,eventtype,service,action,reason
FGT-file- srcip,dstip,service,proto,group,eventtype,filtertype,direction,filetype,matchfilety
filter pe,action
FGT- srcip,dstip,service,proto,action
protocol
FGT- srcip,dstip,service,proto
security
FML- client_name,dst_ip,from,to,subject
emailfilter
FML-event subtype,msg
FML- classifier,disposition,from,to,client_name,direction,domain,virus
history
FML-virus src,msg,from,to
FWB- http_host,http_url,src,dst,msg,action
attack
FWB- ui,action,msg
event
FWB- src,dst,service,http_method,msg
traffic
value <string> Fields of the text search filter. Enter one or more field names separated with a comma.
syslog
Syntax
Variable Description
local-cert {Fortinet_Local | Select from the two available local certificates used for secure connection.
Fortinet_Local2} This variable is only available when secure-connection is enabled.
peer-cert-cn <string> Certificate common name of syslog server. This variable is only available when
secure-connection is enabled.
Note: Null or '-' means no certificate CN for the syslog server.
port <integer> Enter the syslog server port (1 - 65535, default = 514).
reliable {enable | disable} Enable/disable reliable connection with syslog server (default = disable).
web-proxy
Syntax
end
Variable Description
mode {proxy | tunnel} Enter the web proxy mode (default = tunnel).
l tunnel mode uses port TCP/443.
password <passwd> Enter the password for the user name used for authentication (default = *).
port <integer> Enter the port number of the web proxy (1 - 65535, default = 1080).
workflow approval-matrix
Use fmupdate to configure settings related to FortiGuard service updates and the FortiAnalyzer unit’s built-in
FortiGuard Distribution Server (FDS).
disk-quota publicnetwork
fct-services server-access-priorities
TCP port numbers cannot be used by multiple services at the same time with the same IP
address. If a port is already in use, it cannot be assigned to another service. For example,
HTTPS and HTTP cannot have the same port number.
analyzer virusreport
Syntax
Variables Description
status {enable | disable} Enable/disable sending virus detection notification to FortiGuard (default =
enable).
Example
end
av-ips advanced-log
Use this command to enable logging of FortiGuard Antivirus and IPS update packages received by the FortiAnalyzer
unit’s built-in FDS from the FortiGuard Distribution Network (FDN).
Syntax
Variables Description
log-fortigate {enable | disable} Enable/disable logging of FortiGuard antivirus and IPS service updates of
FortiGate devices (default = disable).
log-server {enable | disable} Enable/disable logging of update packages received by the built-in FDS server
(default = enable).
Example
Enable logging of FortiGuard Antivirus updates to FortiClient installations and update packages downloaded by the built-
in FDS from the FDN.
config fmupdate av-ips advanced-log
set log-forticlient enable
set log-server enable
end
custom-url-list
Use this command to configure the URL database for rating and filtering. You can select to use the FortiGuard URL
database, a custom URL database, or both. When selecting to use a custom URL database, use the fmupdate {ftp
| scp | tftp} import command to import the custom URL list. When FortiAnalyzer performs the URL rating, it will
check the custom URL first. If a match is found, the custom rating is returned. If there is no match, then FortiAnalyzer will
check the FortiGuard database.
Syntax
Variable Description
(default)
l custom-url: Customer imported URL list.
disk-quota
Use this command to configure the disk space available for use by the Upgrade Manager.
If the Upgrade Manager disk space is full or if there is insufficient space to save an update package to disk, the package
will not download and an alert will be sent to notify you.
Syntax
Variable Description
value <size_int> Configure the size of the Upgrade Manager disk quota, in megabytes (default =
51200). If you set the disk-quota smaller than the size of an update package, the
update package will not download and you will get a disk full alert.
fct-services
Use this command to configure the built-in FDS to provide FortiGuard services to FortiClient installations.
Syntax
Variables Description
status {enable | disable} Enable/disable built-in FDS service to FortiClient installations (default = enable).
port <port_int> Enter the port number on which the built-in FDS should provide updates to
FortiClient installations (1 - 65535, default = 80).
Example
You could configure the built-in FDS to accommodate older versions of FortiClient installations by providing service on
their required port.
config fmupdate fct-services
set status enable
set port 80
end
fds-setting
Syntax
Variables Description
fds-clt-ssl-protocol {sslv3 | tlsv1.0 Set the SSL protocols version for connecting FDS server (default = tlsv1.2).
| tlsv1.1 | tlsv1.2}
Variables Description
fds-ssl-protocol {sslv3 | tlsv1.0 | Set the SSL protocols version for FDS service (default = tlsv1.0).
tlsv1.1 | tlsv1.2}
fmtr-log {alert | critical | debug | The fmtr log level. Set to disable to disable the log (default = info).
disable | emergency | error | info |
notice | warn}
fortiguard-anycast-source {aws | Configure which servers provide FortiGuard services in FortiGuard's anycast
fortinet} network (default = fortinet).
linkd-log {alert | critical | debug | The linkd log level (default = info).
disable | emergency | error | info |
notice | warn}
max-av-ips-version <integer> The maximum number of AV/IPS full version downloadable packages (default =
20).
max-work <integer> The maximum number of worker processing downlink requests (default = 1).
send_report {enable | disable} Enable/disable sending reports to the FDS server (default = disable).
send_setup {enable | disable} Enable/disable sending setup to the FDS server (default = disable).
umsvc-log {alert | critical | debug | The um_service log level (default = info).
disable | emergency | error | info |
notice | warn}
(default).
l ignore: Ignore all unregistered devices.
Variables Description
l svc-only: Allow update request without add unregistered device.
fds-setting push-override
Use this command to enable or disable push updates, and to override the default IP address and port to which the FDS
sends FortiGuard antivirus and IPS push messages.
This is useful if push notifications must be sent to an IP address and/or port other than the FortiAnalyzer unit, such as the
external or virtual IP address of a NAT device that forwards traffic to the FortiAnalyzer unit.
Syntax
Variable Description
ip <ipv_address> Enter the external or virtual IP address of the NAT device that will forward push
messages to the FortiAnalyzer unit.
port <integer> Enter the receiving port number on the NAT device (1 - 65535, default = 9443).
Example
You could enable the FortiAnalyzer unit’s built-in FDS to receive push messages.
If there is a NAT device or firewall between the FortiAnalyzer unit and the FDS, you could also notify the FDS to send
push messages to the external IP address of the NAT device, instead of the FortiAnalyzer unit’s private network IP
address.
config fmupdate fds-setting
config push-override
set status enable
set ip 172.16.124.135
set port 9000
end
end
You would then configure port forwarding on the NAT device, forwarding push messages received on User Datagram
Protocol (UDP) port 9000 to the FortiAnalyzer unit on UDP port 9443.
fds-setting push-override-to-client
Use this command to define which FortiAnalyzer IP addresses/ports are announced to devices for which the
FortiAnalyzer provides FDS services. By default, FortiAnalyzer will announce all its interfaces using the port 8890.
Syntax
Variable Description
fds-setting server-override
Use this command to override the default IP address and port that the built-in FDS contacts when requesting FortiGuard
spam updates.
Syntax
Variable Description
status {enable | disable} Enable/disable the override (default = disable).
Variable for config servlist subcommand:
<id> Enter the override server ID (1 - 10).
ip <ipv4_address> Enter the IPv4 address of the override server address.
ip6 <ipv6_address> Enter the IPv6 address of the override server address.
port <integer> Enter the port number to use when contacting the FDS (1 - 65535, default = 443).
server-type {fct| fds} Set the override server type (default = fds).
fds-setting update-schedule
Use this command to schedule when the built-in FortiGuard retrieves antivirus and IPS updates.
Syntax
Variable Description
day {Sunday | Monday | Tuesday The day that the update will occur (Sunday - Saturday, default = Monday).
| Wednesday | Thursday | Friday | This option is only available if the update frequency is weekly.
Saturday}
frequency {every | daily | weekly} The update frequency: every given time interval, once a day, or once a week
(default = every).
time <hh:mm> The time interval between updates, or the hour and minute when the update
occurs (hh: 0 - 23, mm: 0 - 59 or 60 = random, default = 00:10).
fwm-setting
Syntax
Variable Description
auto-scan-fgt-disk {enable | Enable/disable automatic scanning of a FortiGate disk when required (default =
disable} enable).
check-fgt-disk {enable | disable} Enable/disable checking a FortiGate disk prior to upgrading the image (default =
enable).
fds-failover-fmg {enable | Enable/disable using the a local image file on the FortiManager when the FDS
disable} download fails (default = enable).
fds-image-timeout <integer> Set the timer for FortiGate image downloads from FortiGuard, in seconds (300 -
3600, default = 1800).
immx-source {cloud | fgt | fmg} Configure which of the IMMX file to be used for choosing the upgrade patch:
l cloud: Use the IMMX file for FortiCloud.
log {fwm | fwm_dm | fwm_dm_ Configure log setting for the firmware manager daemon (default = fwm_dm):
json} fwm: Firmware Manager daemon log.
fwm_dm: Firmware Manager and deployment service log.
fwm_dm_json: Firmware Manager and Deployment service log with JSON data
between FortiManager-FortiGate.
Variable Description
multiple-steps-interval <integer> Set the waiting time between multiple step upgrades, in seconds (30 - 180, default
= 60).
retry-interval <integer> Waiting time for resending request to device (1 - 360, default = 60).
retry-max <integer> Maximum number of retries for sending request to device (0 - 100, default = 10).
check-status-timeout <integer> Set the timeout for checking status after tunnnel is up, in seconds. (1 - 6000,
default = 600)
ctrl-put-image-by-fds-timeout Set the timeout for waiting device get FortiAP/FortiSwitch/FortiExtender image
<integer> from FortiGuard, in seconds. (1 - 9000, default = 900)
ha-sync-timeout <integer> Set the timeout for waiting HA sync, in seconds. (1 - 18000, default = 1800)
license-check-timeout <integer> Set the timeout for waiting FortiGate check license, in seconds. (1 - 6000, default
= 600)
prepare-image-timeout <integer> Set the timeout for preparing image, in seconds. (1 - 6000, default = 600)
put-image-by-fds-timeout Set the timeout for waiting device get image from FortiGuard, in seconds. (1 -
<integer> 18000, default = 1800)
put-image-timeout <integer> Set the timeout for waiting send image over tunnel, in seconds. (1 - 18000, default
= 1800)
reboot-of-fsck-timeout <integer> Set the timeout for waiting FortiGate reboot, in seconds. (1 - 18000, default =
1800)
reboot-of-upgrade-timeout Set the timeout for waiting FortiGate reboot after image upgrade, in seconds. (1 -
<integer> 12000, default = 1200)
retrieve-timeout <integer> Set the timeout for waiting retrieve, in seconds. (1 - 18000, default = 1800)
rpc-timeout <integer> Set the timeout for waiting FortiGate rpc response, in seconds. (1 - 1800, default =
180)
total-timeout <integer> Set the timeout for the whole FortiGate upgrade, in seconds. (1 - 86400, default =
3600)
multilayer
Syntax
end
Variables Description
publicnetwork
Use this command to enable access to the public FDS. If this function is disabled, the service packages, updates, and
license upgrades must be imported manually.
Syntax
Variables Description
server-access-priorities
Use this command to configure how a FortiGate unit may download antivirus updates and request web filtering services
from multiple FortiAnalyzer units and private FDS servers.
Use the private-server subcommand to configure multiple FortiAnalyzer units and private servers.
By default, the FortiGate unit receives updates from the FortiAnalyzer unit if the FortiGate unit
is managed by the FortiAnalyzer unit and the FortiGate unit was configured to receive updates
from the FortiAnalyzerunit.
Syntax
Variables Description
access-public {enable | disable} Enable/disable allowing FortiGates to access public FortiGuard servers when
private servers are unavailable (default = disable).
av-ips {enable | disable} Enable/disable receiving antivirus and IPS update service for private servers
(default = disable).
web-spam {enable | disable} Enable/disable Web Filter and Email Filter update service for private servers
(default = enable).
<id> Enter a number to identify the FortiManager unit or private server (1 - 10).
ip <ipv4_address> Enter the IPv4 address of the FortiManager unit or private server.
ip6 <ipv6_address> Enter the IPv6 address of the FortiManager unit or private server.
time_zone <integer> Enter the correct time zone of the private server (-24 = local time zone, default = -
24).
Example
The following example configures access to public FDS servers and allows FortiGate units to receive antivirus updates
from other FortiAnalyzer units and private FDS servers. This example also configures two private servers.
config fmupdate server-access-priorities
set access-public enable
set av-ips enable
config private-server
edit 1
set ip 172.16.130.252
next
edit 2
set ip 172.31.145.201
end
end
server-override-status
Syntax
Variables Description
service
Use this command to enable or disable the services provided by the built-in FDS.
Syntax
Variables Description
avips {enable | disable} Enable/disable the built-in FortiGuard to provide FortiGuard antivirus and IPS
updates (default = enable).
Example
web-spam fgd-setting
Syntax
setfq-cache <integer>
setfq-log {all | disable | nofilequery}
setfq-preload {enable | disable}
setiot-cache <integer>
setiot-log {all | disable | nofilequery}
setiot-preload {enable | disable}
setiotv-preload {enable | disable}
setlinkd-log {enable | disable}
setmax-client-worker <integer>
setmax-log-quota <integer>
setmax-unrated-size <integer>
setrestrict-as1-dbver <string>
setrestrict-as2-dbver <string>
setrestrict-as4-dbver <string>
setrestrict-av-dbver <string>
setrestrict-av2-dbver <string>
setrestrict-fq-dbver <string>
setrestrict-iots-dbver <string>
setrestrict-wf-dbver <string>
setstat-log {alert | critical | debug| disable | emergency | error | info | notice |
warn}
set stat-log-interval <integer>
set stat-sync-interval <integer>
set update-interval <integer>
set update-log {enable | disable}
set wf-cache <integer>
set wf-dn-cache-expire-time <integer>
set wf-dn-cache-max-number <integer>
set wf-log {all | disable | nourl}
set wf-preload {enable | disable}
config server-override
set status {enable | disable}
config servlist
edit <id>
set ip <ipv4_address>
set ip6 <ipv6_address>
set port <integer>
set service-type {fgc | fgd | fsa}
end
end
end
Variable Description
as-cache <integer> Antispam service maximum memory usage in megabytes (Maximum = Physical
memory-1024, 0 = no limit, default = 300).
as-preload {enable | disable} Enable/disable preloading the antispam database into memory (default =
disable).
Variable Description
av-cache <integer> Antivirus service maximum memory usage, in megabytes (100 - 500, default =
300).
av-preload {enable | disable} Enable/disable preloading antivirus database to memory (default = disable).
av2-cache <integer> Antispam service maximum memory usage, in megabytes ( physical memory to
1024, 0 = no limit, default = 800).
av2-preload {enable | disable} Enable/disable preloading outbreak prevention database to memory (default =
disable).
eventlog-query {enable | disable} Enable/disable record query to event-log besides fgd-log (default = disable).
fgd-pull-interval <integer> FortiGuard pull interval setting, in minutes (1 - 1440, default = 10).
fq-cache <integer> File query service maximum memory usage, in megabytes (100 - 500, default =
300).
fq-preload {enable | disable} Enable/disable preloading the filequery database to memory (default = disable).
iot-cache <integer> IoT service maximum memory usage, in megabytes (100 - 500, default = 300).
iot-preload {enable | disable} Enable/disable preloading IoT database to memory (default = disable).
Variable Description
l warn: Functionality might be affected.
max-client-worker <integer> Maximum workers to use for TCP client connections (0 - 16, 0 = use CPU count,
default = 0).
max-log-quota <integer> Maximum log quota setting, in megabytes (100 - 20480, default = 6144).
max-unrated-size <integer> Maximum number of unrated site in memory, in kilobytes(10 - 5120, default =
500).
restrict-as1-dbver <string> Restrict system update to indicated antispam(1) database version (character limit
= 127).
restrict-as2-dbver <string> Restrict system update to indicated antispam(2) database version (character limit
= 127).
restrict-as4-dbver <string> Restrict system update to indicated antispam(4) database version (character limit
= 127).
restrict-av-dbver <string> Restrict system update to indicated antivirus database version (character limit =
127).
restrict-av2-dbver <string> Restrict system update to indicated outbreak prevention database version
(character limit = 127).
restrict-fq-dbver <string> Restrict system update to indicated file query database version (character limit =
127).
restrict-iots-dbver <string> Restrict system update to indicated file query database version (character limit =
127).
restrict-wf-dbver <string> Restrict system update to indicated web filter database version (character limit =
127).
stat-log-interval <integer> Statistic log interval setting, in minutes (1 - 1440, default = 60).
stat-sync-interval <integer> Synchronization interval for statistic of unrated site in minutes (1 - 60, default =
60).
update-interval <integer> FortiGuard database update wait time if not enough delta files, in hours (2 - 24,
default = 6).
Variable Description
wf-cache <integer> Web filter service maximum memory usage, in megabytes (maximum = Physical
memory-1024, 0 = no limit, default = 600).
wf-dn-cache-expire-time Web filter DN cache expire time, in minutes (1 - 1440, 0 = never, default = 30).
wf-preload {enable | disable} Enable/disable preloading the web filter database into memory (default = disable).
port <integer> Port number to use when contacting FortiGuard (1 - 65535, default = 443).
The execute commands perform immediate operations on the FortiAnalyzer unit. You can:
l Back up and restore the system settings, or reset the unit to factory settings.
l Set the unit date and time.
l Use ping to diagnose network problems.
l View the processes running on the FortiAnalyzer unit.
l Start and stop the FortiAnalyzer unit.
l Reset or shut down the FortiAnalyzer unit.
add-mgmt-license
Syntax
Variable Description
<mgmt license string> The license string.
Copy and paste the string from the license file. The license string must be
enclosed with double quotes. Do not removed line breaks from the string.
Example
The contents of the license file needs to be in quotes in order for it to work.
execute add-mgmt-license "-----BEGIN FAZ MGMT LICENSE-----
QAAAAJ09s+LTe...ISJTTYPcKoDmMa6
-----END FAZ MGMT LICENSE-----"
add-on-license
Use this command to load add-on licenses to support more devices or ADOMs with a license key.
Syntax
Variable Description
<license> The add-on license string.
Copy and paste the string from the license file. The license string must be
enclosed with double quotes. Do not removed line breaks from the string.
add-vm-license
Syntax
Variable Description
<vm license string> The VM license string.
Copy and paste the string from the license file. The license string must be
enclosed with double quotes. Do not removed line breaks from the string.
Example
The contents of the license file needs to be in quotes in order for it to work.
execute add-vm-license "-----BEGIN FAZ VM LICENSE-----
QAAAAJ09s+LTe...ISJTTYPcKoDmMa6
-----END FAZ VM LICENSE-----"
api-user
Syntax
Variable Description
<name> Enter the API user name.
Optionally, leave blank and press enter to list all API users.
backup
Use the following commands to backup all settings or logs on your FortiAnalyzer.
When you back up the unit settings from the vdom_admin account, the backup file contains global settings and the
settings for each VDOM. When you back up the unit settings from a regular administrator account, the backup file
contains the global settings and only the settings for the VDOM to which the administrator belongs.
An MD5 checksum is automatically generated in the event log when backing up the configuration. You can verify a
backup by comparing the checksum in the log entry with that of the backup file.
Syntax
execute backup all-settings {ftp | scp | sftp} <ip:port> <string> <username> <passwd>
<ssh-cert> <crptpasswd> [force-docker]
execute backup fds {ftp | scp | sftp} <ip:port> <string> <username> <passwd> <ssh-cert>
execute backup fgd {ftp | scp | sftp} <ip:port> <string> <username> <passwd> <ssh-cert>
execute backup fmg-logs {ftp | scp | sftp} <ip:port> <string> <username> <passwd> <ssh-
cert>
execute backup fwm {ftp | scp | sftp} <ip:port> <string> <username> <passwd> <ssh-cert>
execute backup logs <device name(s)> {ftp | scp | sftp} <ip/fqdn> <username> <passwd>
<directory> [vdlist]
execute backup logs-only <device name(s)> {ftp | scp | sftp} <ip/fqdn> <username>
<passwd> <directory> [vdlist]
execute backup logs-rescue <device serial number(s)> {ftp | scp | sftp} <ip> <username>
<passwd> <directory> [vdlist]
execute backup reports <report schedule name(s)> {ftp | scp | sftp} <ip/fqdn> <username>
<passwd> <directory> [vdlist]
execute backup reports-config <adom name(s)> {ftp | scp | sftp} <ip/fqdn> <username>
<passwd> <directory> [vdlist]
execute backup rtm {ftp | scp | sftp} <device name> <ip:port> <string> <username>
<passwd> <ssh-cert>
Variable Description
all-settings Backup all FortiAnalyzer settings to a file on a server.
fds Backup FortiGuard Distribution Server data.
fgd Backup FortiGuard data.
fmg-logs Backup log files.
fwm Backup firmware management data.
logs Backup the device logs and the content archives to a specified
server.
logs-only Backup device logs excluding content archives to a specified server.
logs-rescue Use this hidden command to backup logs regardless of DVM
database for emergency reasons. This command will scan folders
under /Storage/Logs/ for possible device logs to backup.
reports Backup the reports to a specified server.
reports-config Backup reports configuration to a specified server.
rtm Backup real time monitor data.
<device name> Enter the device name for which you want to backup.
<device name(s)> Enter the device name(s) separated by a comma, or enter all for all
devices.
<device serial number(s)> Enter the device serial number(s) separated by a comma, or enter
all for all devices.
<report schedule name(s)> Enter the report schedule name(s) separated by a comma, or enter
all for all reports schedules.
<adom name(s)> Enter the ADOM name(s) separated by a comma, or enter all for all
ADOMs.
{ftp | scp | sftp} Enter the server type: ftp, scp, or sftp.
<ip:port> Enter the server IP address and optionally , for FTP servers, the port
number.
<ip> Enter the server IP address.
<ip/fqdn> Enter the server IP address or fully-qualified domain name (FQDN).
Variable Description
<string> Enter the path and file name for the backup.
<username> Enter username to use to log on the backup server.
<passwd> Enter the password for the username on the backup server.
Note: You cannot use \\ in passwords.
<ssh-cert> Enter the SSH certification for the server. This option is only available
for backup operations to SCP servers.
<crptpasswd> Enter a password to protect backup content.
<directory> Enter the path to where the file will be backed up to on the backup
server.
[vdlist] VD name(s), separated by commas.
[force-docker] Optional flag to stop when the docker backup fails.
Example
This example shows how to backup the FortiAnalyzer unit system settings to a file named fmg.cfg on a server at IP
address 192.168.1.23 using the admin username, and password 123456.
execute backup all-settings ftp 192.168.1.23 fmd.cfg admin 123456
Starting backup all settings in background, please wait.
# Starting transfer the backup file to FTP server...
Transferred 139.237M of 139.237M in 0:00:00s (178.065M/s)
Backup all settings...Ok.
MD5: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
benchmark
benchmark io-perf
Syntax
Variable Description
custom <parameters> Test IO performance with custom parameters.
Enter the following paramaters (format example: rw=randrw
numjobs=8 bs=4 size=4 runtime=60).
l rw = Type of I/O pattern. Accepted values are read, write, rw
bootimage
Set the image from which the FortiAnalyzer unit will boot the next time it is restarted.
Syntax
Variable Description
{primary | secondary} Select to boot from either the primary or secondary partition.
If you do not specify primary or secondary, the command will report whether it last booted from the primary or secondary
boot image.
If your FortiAnalyzer unit does not have a secondary image, the bootimage command will inform you that option is not
available.
To reboot your FortiAnalyzer unit, use:
execute reboot
certificate
certificate ca
Syntax
Variable Description
certificate crl
Syntax
certificate local
Use these commands to list, import, or export local certificates, and to generate a certificate request
Syntax
Variable Description
import-pkcs12 {ftp | scp | sftp} Import a certificate and private key from a PKCS#12 file.
<ip:port> <filename> l ftp, scp, sftp - The type of server the file will be imported from.
<username> <password> l ip:port - The server IP address and, optional, the port number.
<password> <name> l filename - The path and file name on the server.
information>] can contain numbers (0-9), uppercase and lowercase letters (A-Z, a-z), and
the special characters - and _. Other special characters and spaces are not
allowed.
l number - The size, in bits, of the encryption key, 512, 1024, 1536, or 2048.
Variable Description
l The fully qualified domain name of the FortiAnalyzer unit
l An email address that identifies the FortiAnalyzer unit
l An IP address or domain name is preferable to an email address.
l optional_information - Enter optional_information as required
to further identify the unit. See Optional information variables on page 161 for
more information.
list Generate a list of CA certificates and requests that are on the FortiAnalyzer
system.
You must enter the optional variables in the order that they are listed in the table. To enter any optional variable you must
enter all of the variables that come before it in the list.
For example, to enter the organization_name_str, you must first enter the country_code_str, state_name_
str, and city_name_str.
While entering optional variables, you can type ? for help on the next required variable.
Variable Description
<state_name_str> Enter the name of the state or province where the FortiAnalyzer unit is located.
<city_name_str> Enter the name of the city, or town, where the person or organization certifying the
FortiAnalyzer unit resides.
<organization-name_str> Enter the name of the organization that is requesting the certificate for the
FortiAnalyzer unit.
<organization-unit_name_str> Enter a name that identifies the department or unit within the organization that is
requesting the certificate for the FortiAnalyzer unit.
certificate remote
Syntax
Variable Description
cloud-remote-access
Syntax
Variable Description
<password> Password.
To enable remote access to the GUI from FortiCloud, enter the following command after
logging in to FortiCloud:
config system central-management
set type fortigatecloud
If the central-management type is set to fortimanager (default) or none, remote access
from FortiCloud will be disabled.
console
console baudrate
Syntax
If you do not specify a baudrate, the command returns the current baudrate.
Setting the baudrate will disconnect your console session.
Example
date
Syntax
where
date_str has the form mm/dd/yyyy
l mm is the month and can be 1 to 12
l dd is the day of the month and can be 1 to 31
l yyyy is the year and can be 2001 to 2037
If you do not specify a date, the command returns the current system date.
Dates entered will be validated - mm and dd require one or two digits, and yyyy requires four digits. Entering fewer digits
will result in an error.
Example
device
Use this command to change a device password, serial number, or user when changing devices due to a hardware
issue.
Syntax
Variable Description
<serial_number> The new serial number for the new device, for example: FWF40C391XXX0062.
Example
erase-disk
Overwrite the flash (boot device) with random data a specified number of times. When you run this command, you will be
prompted to confirm the request.
Executing this command will overwrite all information on the FortiAnalyzer system’s flash
drive. The FortiAnalyzer system will no longer be able to boot up.
Syntax
Variable Description
<erase-times> Number of times to overwrite the flash with random data (1 - 35, default = 1).
factory-license
Use this command to enter a factory license key. This command is hidden.
Syntax
Variable Description
fmupdate
Syntax
execute fmupdate {fgd-db-merge | ftp | scp | tftp} import <type> <filename> <server>
<port> <directory> <username> <password>
execute fmupdate {fgd-db-merge | ftp | scp | tftp} export <type> <filename> <server>
<port> <directory> <username> <password> [base64 | delta]
execute fmupdate {fgd-db-merge | ftp | scp | tftp} fds-export <objid> <filename> <server>
<directory> <username> <password> [base64 | delta]
execute fmupdate fgd-db-merge {as | av | av2 | fq | iot | wf}
Variables Description
{fgd-db-merge | ftp | scp | tftp} Select the file transfer protocol to use: ftp, scp, or tftp. Select fgd-db-merge to
merge the FortiGuard database immediately.
fgd-db-merge {as | av | av2 | fq | Merge FortiGuard database immediately. Select the database type.
iot | wf}
Variables Description
l som = som.dat default download list
l export:
l license = license package
l license-xml = license info. in xml
l custom-url = customized URL database
l som = som.dat default download list
<directory> Enter the name of the directory of the file to download from the FTP server or SCP
host. If the directory name has spaces, use quotes instead.
<username> Enter the username to log into the FTP server or SCP host
<password> Enter the password to log into the FTP server or SCP host
format
Format the hard disk on the FortiAnalyzer system. You can select to perform a secure (deep-erase) format which
overwrites the hard disk with random data. You can also specify the number of time to erase the disks.
Syntax
When you run this command, you will be prompted to confirm the request.
Executing this command will erase all device settings/images, databases, and log data on the
FortiAnalyzer system’s hard drive. The FortiAnalyzer device’s IP address, and routing
information will be preserved.
Variable Description
<disk | disk-ext3 | disk-ext4> Select to format the hard disk or format the hard disk with ext3 or ext4 file system.
deep-erase Overwrite the hard disk with random data. Selecting this option will take longer
than a standard format.
Variable Description
<erase-times> Number of times to overwrite the hard disk with random data (1 - 35, default = 1).
<RAID level> Enter the RAID level to be set on the device. This option is only available on
FortiAnalyzer models that support RAID.
Enter * to show available RAID levels.
iotop
Syntax
Parameter Description
-o, --only Only show processes or threads that are actually doing I/O.
iotps
Use this command to list system processes sorted by their read/write system call rate.
Syntax
Variable Description
<parameter> Parameters:
l -r
l -w
l -e
l -t [intv]
log
Syntax
Variable Description
<adom_name> Enter the ADOM name, or enter All for all ADOMs.
Syntax
Variable Description
<device_id> Enter the log device ID, or enter All for all devices.
Syntax
Variable Description
Syntax
Variable Description
<device_id> Enter the log device ID, or enter All for all devices. Example:
FWF40C3911000061
Syntax
Variable Description
add <Device Name> <ADOM> Add a new VDOM to a device with the device name, the ADOM that contains the
<VDOM> device, and the name of the new VDOM.
delete-by-id <Device Name> Delete a VDOM from a device by its index number.
<index>
Use this command to clear DLP log files on a specific log device.
Syntax
Variable Description
<archive type> Enter the device archive type: all, email, im, ftp, http, or mms.
log import
Use this command to import log files from another device and replace the device ID on imported logs.
Syntax
Variable Description
<service> Enter the transfer protocol one of: ftp, sftp, scp,or tftp.
Variable Description
<device-id> Replace the device ID on imported logs. Enter a device serial number of one of
your log devices.
Use this command to clear IPS packet logs on a specific log device.
Syntax
Variable Description
Use this command to clear quarantine log files on a specific log device.
Syntax
Variable Description
log storage-warning
Syntax
log-aggregation
Syntax
Variable Description
log-fetch
log-fetch client
Syntax
Variable Description
log-fetch server
Syntax
Variable Description
cancel <session id> Pause and clear one session or all sessions.
log-integrity
Syntax
Variable Description
lvm
With Logical Volume Manager (LVM), a FortiAnalyzer VM device can have up to fifteen total log disks added to an
instance. More space can be added by adding another disk and running the LVM extend command.
Adding an extra disk or adding space to the current LVM disk will not impact current saved archive logs and analytics
logs. However, it is recommended to save logs using the following commands before doing so:
execute backup logs <device name(s) | all> {ftp | scp | sftp} <ip/fqdn> <username>
<passwd> <directory> [vdlist]
and
execute backup reports <report schedule name(s) | all> {ftp | scp | sftp} <ip/fqdn>
<username> <passwd> <directory> [vdlist]
For more details about these commands, see backup on page 155.
You can use the execute format disk command to start the LVM. See format on page
166.
Syntax
Variable Description
migrate
Use this command to migrate all backup settings from the FTP, SCP, or SFTP server to the new FortiAnalyzer serial
number or FortiAnalyzer HA cluster serial numbers.
This command also allows migrating to the fabric ADOM from a non-fabric ADOM.
Syntax
execute migrate all-settings {ftp | scp | sftp} <ip:port> <string> <username> <password>
<ssh-cert> [<crptpasswd>]
execute migrate fabric <adom name>
execute migrate serial-number-list <serial-number-list>
Variable Description
{ftp | scp | sftp} Enter the server type: ftp, scp, or sftp.
<ip:port> Enter the server IP address and optionally, for FTP servers, the port number.
<string> Enter the path and file name for the backup.
<password> Enter the password for the username on the backup server.
<ssh-cert> Enter the SSH certification for the server. This option is only available for backup
operations to SCP servers.
[<crptpasswd>] Optional password to protect backup content. Use any for no password.
<serial-number-list> Enter the serial number. The serial number list is separated by commas, e.g.,
sno_1,sno_2.
ping
Send an ICMP echo request (ping) to test the network connection between the FortiAnalyzer system and another
network device.
Syntax
Variable Description
<ip | hostname> IPv4 address or DNS resolvable hostname of network device to contact.
Example
This example shows how to ping a host with the IPv4 address 192.168.1.23:
execute ping 192.168.1.23
ping6
Send an ICMP echo request (ping) to test the network connection between the FortiAnalyzer system and another
network device.
Syntax
Variable Description
<ip | hostname> Enter the IPv6 address or DNS resolvable hostname of network device to contact.
Example
This example shows how to ping a host with the IPv6 address 8001:0DB8:AC10:FE01:0:0:0:0:
execute ping6 8001:0DB8:AC10:FE01:0:0:0:0:
raid
This command is only available on hardware-based FortiAnalyzer models that support RAID.
Syntax
Variable Description
reboot
Restart the FortiAnalyzer system. This command will disconnect all sessions on the FortiAnalyzer system.
Syntax
execute reboot
remove
Use this command to remove all GUI data cache, all custom settings in Logview, all reports for a specific device, resync
files, security fabric from a specific ADOM, and all endpoints and end user related information from files, tables, and
memory.
Syntax
Variable Description
<device-id> The device identifier for the device that all reports are being removed from.
<adom-name> The ADOM that contains the security fabric that is being removed.
Example
reset
Use these commands to reset the FortiAnalyzer unit. These commands will disconnect all sessions and restart the
FortiAnalyzerunit.
Syntax
Variable Description
all-except-ip Reset all settings except the current IP address and route information.
restore
Syntax
Variable Description
all-settings Restore all FortiAnalyzersettings from a file on a FTP, SFTP, or SCP server. The
new settings replace the existing settings, including administrator accounts and
passwords.
logs Restore device logs and DLP archives from a specified server.
Variable Description
<ip:port> Enter the IP address of the server to get the file from and optionally , for FTP
servers, the port number.
<device names> Device name or names, separated by commas, or all for all devices. Example:
FWF40C3911000061
<report name(s)> Restore specific reports (separated by commas), all for all reports, or reports
with names containing given pattern.
A '?' matches any single character.
A '*' matches any string, including the empty string, e.g.:
l foo: for exact match
<filename> Enter the file to get from the server. You can enter a path with the filename, if
required.
<username> The username to log on to the server. This option is not available for restore
operations from TFTP servers.
<ssh-cert> Enter the SSH certificate used for user authentication on the SCP server.
<crptpasswd> Enter the password that was used to protect backup content.
If no password was used for the backup file, use two single quotation marks ('')
to indicate no password.
[option1+option2+...] Enter keepbasic to retain IP and routing information on the original unit.
Example
This example shows how to upload a configuration file from a FTP server to the FortiAnalyzer unit. The name of the
configuration file on the FTP server is backupconfig. No crptpasswd was used when backing up the content. The IP
address of the FTP server is 192.168.1.23. The user is admin with a password of mypassword. The configuration file is
located in the /usr/local/backups/ directory on the TFTP server.
execute restore all-settings 192.168.1.23 /usr/local/backups/backupconfig admin
mypassword ''
sensor
Syntax
Variable Description
shutdown
Shut down the FortiAnalyzer system. This command will disconnect all sessions.
Syntax
execute shutdown
sql-local
Use this command to remove the SQL database and logs from the FortiAnalyzer system and to rebuild the database and
devices.
When rebuilding the SQL database, new logs will not be available until the rebuild is complete.
The time required to rebuild the database is dependent on the size of the database. Please
plan a maintenance window to complete the database rebuild. You can use the diagnose
sql status rebuild-db command to display the SQL log database rebuild status.
The following features will not be available until after the SQL database rebuild has completed:
FortiView, Log View, Event Management, and Reports.
Syntax
Variable Description
rebuild-db Rebuild entire log SQL database from log data. This operation will remove the
SQL database and rebuild from log data. It will also reboot the device.
<adom> The ADOM name. Multiple ADOM names can be entered when rebuilding
ADOMs.
<log type> Enter the log type from available log types, for example: emailfilter
sql-query-dataset
Syntax
Variable Description
Variable Description
sql-query-generic
Use this command to execute a SQL statement against the FortiAnalyzer system.
Syntax
Variable Description
sql-report
Use these commands to import and display language translation and font files, and run a SQL report schedule once
against the FortiAnalyzer system.
Syntax
Variable Description
Variable Description
<language-name> Enter the language name to import, export, or delete a language translation file, or
select one of the following options:
l English l Portuguese
l French l Simplified_Chinese
l Japanese l Spanish
l Korean l Traditional_Chinese
<argument 1> For FTP, SFTP, or SCP, type a user name. For TFTP, enter a file name.
<argument 2> For FTP, SFTP, or SCP, type a password or ‘-’. For TFTP, press <enter>.
<filter> Set filter for the data. Enter "" to set no filter.
<start-time> The start date and time of the report schedule, in the format: "HH:MM
yyyy/mm/dd"
<end-time> The enddate and time of the report schedule, in the format: "HH:MM
yyyy/mm/dd"
l en - English l ko - Korean
l de - German l pt - Portuguese
Variable Description
l es - Spanish l ru - Russian
l fr - French l zh - Simplified Chinese
l it - Italian l zh_Hant - Traditional Chinese
l ja - Japanese
ssh
Syntax
Variable Description
<destination> Enter the IP or FQ DNS resolvable hostname of the system you are connecting to.
<username> Enter the user name to use to log on to the remote system.
To leave the SSH session type exit. To confirm that you are connected or disconnected from the SSH session, verify
that the command prompt has changed.
ssh-known-hosts
Syntax
Variable Description
ssh-regen-keys
Syntax
execute ssh-regen-keys
tac
Use this command to upload, debug, or remove dangling debug reports older than an hour.
Syntax
Variable Description
<ip> Enter the server IP address. For ftp, the port can be specified by adding :port.
time
Syntax
Variable Description
Variable Description
All parts of the time are required. Single digits are allowed for each of hh, mm, and
ss.
If you do not specify a time, the command returns the current system time.
Example
top
Use this command to view the processes running on the FortiAnalyzer system.
Syntax
Variable Description
Use the following commands when viewing the running processes. Press h or ? for help.
Command Description
Z,B,E,e Global: 'Z' colors; 'B' bold; 'E'/'e' summary/task memory scale
l,t,m Toggle Summary: 'l' load avg; 't' task/cpu stats; 'm' memory info
0,1,2,3,I Toggle: '0' zeros; '1/2/3' cpus or numa node views; 'I' Irix mode
R,H,V,J . Toggle: 'R' Sort; 'H' Threads; 'V' Forest view; 'J' Num justify
c,i,S,j . Toggle: 'c' Cmd name/line; 'i' Idle; 'S' Time; 'j' Str justify
Command Description
n,#,^O. Set: 'n'/'#' max tasks displayed; Show: Ctrl+'O' other filter(s)
q or <Esc> Quit
traceroute
Test the connection between the FortiAnalyzer system and another network device, and display information about the
network hops between the device and the FortiAnalyzer system.
Syntax
Variable Description
traceroute6
Test the connection between the FortiAnalyzer system and another network device, and display information about the
network hops between the device and the FortiAnalyzer system.
Syntax
Variable Description
vm-license
Syntax
Variable Description
<token> The VM license token.
The diagnose commands display diagnostic information that help you to troubleshoot problems.
dvm ha sniffer
auto-delete
Syntax
Variable Description
deletion policy.
l list: List DLP files according to system automatic deletion policy.
Variable Description
deletion policy.
l list: List log files according to system automatic deletion policy.
deletion policy.
l list: List report files according to system automatic deletion policy.
cdb
cdb check
Syntax
Variable Description
adom-revision [adom] [preview] Check or remove invalid ADOM revision database. Optionally, preview the check
before running it.
internet-service-name [adom] Check mis-matched internet service name. Optinally, specify the ADOM.
update-devinfo sslvpn-flag Upgrade the device SSL-VPN flag on the specified device.
<devname>
cdb manual-fix
Syntax
Variable Description
adom <adom> <repair action> Manually repair adom configuration database. Enter the ADOM name.
cdb upgrade
Syntax
Variable Description
force-retry <action> Re-run an upgrade that was already performed in previous release.
pending-list Display the list of upgrades scheduled for the next reboot.
debug
debug application
Use these commands to view or set the debug levels for the FortiAnalyzer applications. All of the debug levels are 0 by
default.
Syntax
Variable Description
alertmail <integer> Set the debug level of the alert email daemon.
apiproxyd <integer> Set the debug level of the API proxy daemon.
archd <integer> Set the debug level of the archd daemon (0 - 8).
auth <integer> Set the debug level of the Fortinet authentication module.
csfd <integer> Set the debug level of the Security Fabric daemon.
discoverd <integer> Set the debug level of the camera discovery daemon.
fabricsyncd <integer> Set the debug level of the fabricsyncd daemon (0 - 8).
fazalertd <integer> Set the debug level of the fazalertd daemon (0 - 8).
Variable Description
fazsvcd <integer> <reg exp filter> Set the debug level of the FAZ server daemon.
Set a filter; use "" to reset. Debug logs can be filtered using simple string, regular
expression, or not operator. For example, use filter=~!request|response
to remove all requests and responses from the debug logs.
fdssvrd <integer> Set the debug level of the FDS server daemon.
fgdlinkd <integer> Set the debug level of the FGD server daemon (0 - 8).
fgdsvr <integer> Set the debug level of the FortiGuard query daemon.
fgdupd <integer> Set the debug level of the FortiGuard update daemon.
fgfmsd <integer> <deviceName> Set the debug level of FGFM daemon. Enter a device name to only show
messages related to that device.
Note: Enter "" to reset. Multiple device names should be separated by commas.
For example, Host1, Host2.
fortimanagerws <integer> Set the debug level of the FortiAnalyzer Web Service.
fwdplugind <integer> Set the debug level of the fwdplugind daemon (0 - 8).
lldp <integer> Set the debug level of the link layer discovery protocol (LLDP) daemon.
log-aggregate <integer> Set the debug level of the log aggregate daemon.
log-fetchd <integer> Set the debug level of the log fetcher daemon.
Variable Description
lrm <integer> Set the debug level of the Log and Report Manager.
oftpd <integer> Set the debug level of the oftpd daemon. Enter an IPv4 address, device serial
<IP/deviceSerial/deviceName> number, or device name to only show messages related to that device or IPv4
address.
Note: Enter "" to reset.
run-sql-rpt <integer> Set the debug level of the SQL report daemon.
scansched <integer> Set the debug level of the scan schedule daemon.
scheduled <integer> Set the debug level of the schedule task daemon.
sqlplugind <integer> <filter> Set the debug level of the SQL plugin daemon. Set filter for sqlplugind.
Note: Enter "" to reset the filter.
sqlreportd <integer> <filter> Set the debug level (0-8) of the SQL report daemon. Set the filter for sqlreportd.
Note: Enter "" to reset the filter. Without <integer> and <filter>, it shows
the current debug level and filter of sqlreportd.
sqlrptcached <integer> Set the debug level of the SQL report caching daemon.
storaged <integer> Set the debug level of communication with java clients.
Example
This example shows how to set the debug level to 7 for the upload daemon:
diagnose debug application uploadd 7
debug backup-oldformat-script-logs
Use this command to backup script log files that failed to be upgraded to the FTP server.
Syntax
Variable Description
<string> Enter the path/filename to save the log to the FTP server.
debug cdbchk
Use these commands to enable or disable CLI CDB check debug output.
Syntax
debug cli
Syntax
Variable Description
debug console
Syntax
Variable Description
debug coredump
Syntax
Variable Description
enable-once <daemon> Enable core dump the next time a daemon starts (one time only).
upload <daemon> <service> Upload core dumps for a daemon to the specified server.
<ip> <username> <password>
<directory>
debug crashlog
Syntax
Variable Description
debug disable
Syntax
debug enable
Syntax
debug gui
Syntax
debug info
Syntax
debug klog
Syntax
debug raw-elog
Syntax
debug reset
Use this command reset the debug level settings. All debug settings will be reset.
Syntax
debug service
Use this command to view or set the debug level of various service daemons, and to dump the services.
Syntax
Variable Description
The anonymous, dbcache, dump, fazcmd, and rpc-auth commands are only available on hardware devices.
debug sysinfo
Syntax
debug sysinfo-log
Use this command to generate one system info log file every two minutes.
Syntax
debug sysinfo-log-backup
Use this command to backup all sysinfo log files to an FTP server.
Syntax
Variable Description
Variable Description
<filepath> Enter the path/filename to save the log to the FTP server.
debug sysinfo-log-list
Syntax
Variable Description
debug timestamp
Syntax
debug vmd
Use this command to show all the VMD (Virtual Machine Daemon) logs.
Syntax
debug vminfo
Syntax
dlp-archives
Syntax
Variable Description
quar-cache list-all-process List all processes that are using the quarantine cache.
quar-cache kill-process <pid> Kill a process that is using the quarantine cache.
statistics {show | flush} Display or flush the quarantined and DLP archived file statistics.
verify-quar-db Verify the quarantine cache database. This command is only available on
hardware devices.
docker
Use this command to view Docker status, clean up Docker data, and upgrade Docker management extensions.
Syntax
Variable Description
reset { fortisoar | fsmcollector } Reset a docker. Select to remove a docker volume and restart.
Example
dvm
dvm adom
Syntax
Variable Description
list [adom] List ADOMs, state, product, OS version (OSVER), major release (MR), name,
mode, VPN management, and IPS. Optionally, specify an ADOM name or OID.
dvm capability
Syntax
Variable Description
dvm chassis
Syntax
Variable Description
dvm check-integrity
Syntax
dvm csf
Syntax
Variable Description
Variable Description
l all: Dump all CSF categories
l group: Dump CSF group
l intf-role: Dump interface role
l user-device: Dump user device
dvm dbstatus
Syntax
dvm debug
Use this command to enable or disable debug channels, and show debug message related to DVM.
Syntax
diagnose dvm debug {enable | disable} <channel> <channel> <channel> ... <channel>
diagnose dvm debug trace [filter]
Variable Description
<channel> The following channels are available: all, dvm_db, dvm_dev, shelfmgr, ipmi,
lib, dvmcmd, dvmcore, gui, and monitor.
[filter] The following filters are available: all, dvm_db, dvm_dev, shelfmgr, ipmi,
lib, dvmcmd, dvmcore, gui, and monitor.
dvm device
Syntax
Variable Description
auto-management-list <device> List devices with auto management flags information. Optionally, enter a device
name or OID.
list <device> <vdom> List devices. Optionally, enter a device or VDOM name.
monitor <device> <api> JSON API for device monitor. Specify the device name and the monitor API
name.
reload <device> <vdom> Reload device config. Specify the device name, VDOM, category (or all for all
<category> <object> categories), and object.
dvm device-tree-update
Syntax
Variable Description
dvm extender
Use these commands to list FortiExtender devices, synchronize FortiExtender data via JSON, and perform other
actions.
Syntax
Variable Description
copy-data-to-device <device> Copy extender data (data plan and SIM profile) to the device. Enter the device
name.
import-profile <device> <vdom> Import extender profile to the ADOM. Enter the device name or ID, VDOM, and
<name> profile name.
import-template <device> Import dataplan and SIM profile to the ADOM template. Enter the device name or
<extender id> ID, and the extender ID.
set-template <device> <extender Set template to the extender modem. Enter the device name or ID, extender ID,
id> <template> and template.
sync-extender-data <devname> Synchronize FortiExtender data by JSON. Optionally: save the data to the
[savedb] [syncadom] [task] database, synchronize the ADOM, and/or create a task.
dvm fap
Syntax
Variable Description
dvm fsw
Syntax
Variable Description
dvm group
Syntax
Variable Description
dvm lock
Syntax
dvm proc
Syntax
dvm remove
Syntax
dvm supported-platforms
Syntax
Variable Description
fortiswitch [adom] List supported platforms in FortiSwitch manager. Optionally, enter the ADOM
name.
list <detail> List supported platforms by device type. Enter detail to show details with syntax
support.
dvm task
Syntax
Variable Description
repair Repair the task database while preserving existing data where possible. The
FortiAnalyzer will reboot after the repairs.
reset Reset the task database to its factory default state. All existing tasks and the task
history will be erased. The FortiAnalyzer will reboot after the reset.
dvm taskline
Syntax
Variable Description
repair Repair the task lines while preserving data wherever possible. The FortiAnalyzer
will reboot after the repairs.
dvm template
Syntax
Variable Description
update <category> <adom> Enter the template category {wtp | vap | wifi-setting | extender}
[country] and ADOM. Optionally, enter a country ID or country ISO code.
dvm transaction-flag
Syntax
Variable Description
dvm workflow
faz-cdb
faz-cdb fix
Syntax
Variable Description
check-report-folder Check FortiAnalyzer configuration database report folders from the last upgrade
backup.
fix-report-folder Fix FortiAnalyzer configuration database report folders from the last upgrade.
<adom name> Enter the ADOM name or enter all for all ADOMs.
faz-cdb reset
Syntax
faz-cdb upgrade
Syntax
Variable Description
Variable Description
<adom name> Enter the ADOM name or enter all for all ADOMs.
<service> Enter the transfer protocol one of: ftp, sftp, or scp.
<ip> Enter the server IP address. For FTP, the port can be specified by adding :port
to the server IP address.
fdsm
Syntax
Variable Description
fgfm
Syntax
fmnetwork
fmnetwork arp
Syntax
Variable Description
fmnetwork interface
Syntax
Variable Description
fmnetwork netstat
Syntax
Variable Description
list [-r] List all connections, or use -r to list only resolved IP addresses.
tcp [-r] List all TCP connections, or use -r to list only resolved IP addresses.
udp [-r] List all UDP connections, or use -r to list only resolved IP addresses.
fmupdate
Syntax
Variables Description
check-disk-quota {export-import | Check the related directory size. Clean the export/import directory, if necessary.
fds | fgd | all} <clean>
crdb {generate | view} Generate or view certificate files from the database.
dbcontract [<serial>] Dump the subscriber contract. Optionally, enter the serial number of the device.
Variables Description
del-device <serial> Delete a device. Optionally, enter a serial number for the device.
del-log Delete all the logs for FDS and FortiGuard update events.
del-object {fds | fgd | fqfq | geoip} Remove all objects from the specified service. Optionally, enter the object type
[<object_type>] [<object_ and version or time.
version>]
del-serverlist {fct | fds | fgd} Delete the server list file (fdni.dat) from the specified service.
dump-um-db {um2.db | fds.db} Dump um databases or dump either um2 or fds database. Optionally, you can
[<table>] dump a specified table in um2 or fds databases.
immx | oblt | srul | subs} l fds-log: Dump the FDS svrd log. Optionally, enter a rolling number from 0
to 10.
l fect: Dump the FortiClient image file. Choose from the two available options
l immx: Dump the image upgrade matrix file. You can dump the IMMX files for
FortiManager, FortiGate, or FortiCloud.
l oblt: Dump the object list file. You can dump the object list files for FGT,
FCT, FGD, FQFQ, or geoip services. You can also dump the downstream
object file for one of these services.
l srul: Dump the FDS select filtering rules.
l subs: Dump Contract file.
fds-getobject <filter type> <filter> Get the versions of all FortiGate objects for antivirus-IPS.
<other options> l <filter type>: Enter product or objid as the filter type.
l <filter>: Enter an available filter. These filters are available only when you
select product as your filter type. Enter all for all product filters.
l <other options>: Enter used to show used-only objects or raw to show
fgd-dbver [{as1 | as2 | as4 | av | Get the version of the database. Optionally, enter the database type:
av2 | cat1 | fq | geoip | iotm | iotr | l as1: Antispam (IP).
Variables Description
l cat1: Query Category.
l fq: File Query.
l geoip: GeoIP.
l iotm: IoT (mapping).
l iotr: IoT (range).
l iots: IoT (single).
l wf: Webfilter.
fgd-del-db [{as1 | as2 | as4 | av | Delete FortiGuard database. Optionally, enter the database type:
av2 | cat1 | fq | geoip | iotm | iotr | l as1: Antispam (IP).
fgd-dump [{as1 | as2 | as4 | av | Dump the FortiGuard information. Optionally, select a database category type:
av2 | cat1 | fq | geoip | iotm | iotr | l as1: Antispam (IP).
fgd-wfas-log [{name | ip} View the FortiGuard service log file. Optionally, enter the device filter type, and
{<name> | <ip addr>}] device name or IPv4 address.
fgd-wfas-rate [{as_hash | as_ip | Get the web filter / antispam rating speed. Optionally, enter the server type:
as_url | av | av2 | fq | wf}] l as_hash: Antispam (HASH).
Variables Description
l as_url: Antispam (URL).
l av: AntiVirus Query.
l av2: Outbreak Prevention.
l fq: File Query.
l wf: Webfilter.
fgd-wfdevice-stat {10m | 30m | Display web filter device statistics. Enter all or a specific device’s serial number.
1h | 6h | 12h | 24h | 7d} <serial> Optionally, enter the number of time periods to display (default = 1).
[<integer>]
fgd-wfserver-stat {top10sites | Display web filter server statistics for the top 10 sites or devices. Optionally, enter
top10devices} [{10m | 30m | 1h | the time frame to cover.
6h | 12h | 24h | 7d}]
fgt-del-statistics Remove all statistics (antivirus / IPS and web filter / antispam). This command
requires a reboot.
fgt-del-um-db [{um.db | um2.db | Remove UM, UM2, fds, and um_stat databases. This command requires a
fds.db | um_stat.db | som.dat}] reboot.
Note: um.db is a sqlite3 database that update manager uses internally. It will
store AV/IPS package information of downloaded packages. This command
removes the database file information. The package is not removed. After the
reboot, the database will be recreated. Use this command if you suspect the
database file is corrupted.
list-object {fds | fgd | fqfq | geo-ip} List downloaded objects of linkd service. Optionally, enter the object type and
[<object_type>] [<object_ version or time.
version>]
show-bandwidth {fct | fgt | fml | Display the download bandwidth for a device type over a specified time period.
faz} {1h | 6h | 12h | 24h | 7d | 30d}
show-dev-obj [<serial>] Display an objects version of a device. Optionally, enter a serial number.
Variables Description
l ping-server: Check connection of FortiGuard servers.
l fmg-statistic-info: Display statistic information for FortiManager and
Java Client.
update-status {fds | fct | fgd} Display the update status for a service.
updatenow {fds | fgd} {fgd | fgfq | Update immediately. Select a service, service type, and task type.
geoip} {SelectivePoll | Poll | Note: Selecting a service and task type is only available when the service is fgd.
Consolidation | Command}
fortilogd
Syntax
Variable Description
Variable Description
fortitoken-cloud
Use these commands to show the FortiToken Cloud (FTC) status or activate a FTC free trial.
Syntax
Variable Description
fwmanager
Syntax
Variable Description
fwm-log <dump> [rolling number] View the firmware manager log file. Optionally, dump whole log. Optionally, enter
a rolling number from 0 to 10.
image-clear Clear all local images and its FCP object files.
image-download <platform> Download the official image. Enter the platform name and version.
<version>
image-list <product> [raw] Get the local firmware image list for the product:
l FGT: FortiGate
l FMG: FortiManager
l FAZ: FortiAnalyzer
l FAP: FortiAP
l FSW: FortiSwitch
l FXT: FortiExtender
Optionally, enter raw get the raw JSON response.
profile <action> [adom] <device | Clear, list, or synchronize the firmware profile setting.
group | profile> <id | name> <raw Enter one of the following actions:
| name> <raw> l cancel
l clear
l list
l list-by-device
l sync
If using list-by-device, enter the name or id of the device or group.
If using cancel, enter the profile name, device name or id, and, optionally, enter
raw to show the raw data.
show-grp-disk-check-status Show whether the devices in the group need disk checks.
<group>
Variable Description
ha
Syntax
Variable Description
check-data {start | stop | status} Start/stop or check status of database hash and revision files.
data-check-report {read | delete} Read or delete the data check validation report.
restart-init-sync Restart HA initial sync. This command can only be run on the primary unit.
Variable Description
request-init-sync Request to redo HA initial sync. This command can only be run on the secondary
unit.
hardware
Use this command to view hardware information. This command provides comprehensive system information including:
CPU, memory, disk, and RAID information.
Syntax
incident
Syntax
Variable Description
<attachment type> The attachment type: report, alertevent, note, file, or all for all types.
license
Syntax
Variable Description
log
log device
Syntax
Variable Description
log restore
Use this command to view the last log restore result or to cancel the last log restore request.
Syntax
Variable Description
pm2
Syntax
diagnose pm2 check-integrity {all adom device global ips task ncmdb}
diagnose pm2 db-recover <db-category>
diagnose pm2 print <log-type>
Variable Description
check-integrity {all adom device Check the integrity of the database. Multiple database categories can be
global ips task ncmdb} selected.
db-recover <db-category> Recover data from a corrupted database. Enter the database category.
report
Syntax
Variable Description
clean {ldap-cache | report-queue} Cleanup the SQL report queue or LDAP cache.
status [pending | running] Check status information on pending and running reports.
rtm
Use this command to display or update real time monitor profile database.
Syntax
siem
Syntax
Variable Description
parts list <table> <level> List the SIEM parts. Enter the table name and part level.
process list full List the query processes and its details.
process kill <query_id> Kill a running query. Enter the query ID.
module-ctrl {enable | disable} Enable/disable the SIEM module. This command is only available on hardware
based devices.
service {start | stop} Start/stop the SIEM service. This command is only available on VM based
devices.
sniffer
Use this command to perform a packet trace on one or more network interfaces.
Packet capture, also known as sniffing, records some or all of the packets seen by a network interface. By recording
packets, you can trace connection states to the exact point at which they fail, which may help you to diagnose some
types of problems that are otherwise difficult to detect.
FortiAnalyzer units have a built-in sniffer. Packet capture on FortiAnalyzer units is similar to that of FortiGate units.
Packet capture is displayed on the CLI, which you may be able to save to a file for later analysis, depending on your CLI
client.
Packet capture output is printed to your CLI display until you stop it by pressing CTRL + C, or until it reaches the number
of packets that you have specified to capture.
Packet capture can be very resource intensive. To minimize the performance impact on your
FortiAnalyzer unit, use packet capture only during periods of minimal traffic, with a serial
console CLI connection rather than a Telnet or SSH CLI connection, and be sure to stop the
command when you are finished.
Syntax
Variable Description
<interface> Type the name of a network interface whose packets you want to capture, such as
port1, or type any to capture packets on all network interfaces.
<filter> Type either none to capture all packets, or type a filter that specifies which
protocols and port numbers that you do or do not want to capture, such as 'tcp
port 25'. Surround the filter string in quotes.
The filter uses the following syntax:
'[[src|dst] host {<host1_fqdn> | <host1_ipv4>}] [and|or]
[[src|dst] host {<host2_fqdn> | <host2_ipv4>}]
[and|or] [[arp|ip|gre|esp|udp|tcp] port <port1_int>]
[and|or] [[arp|ip|gre|esp|udp|tcp] port <port2_int>]'
To display only the traffic between two hosts, specify the IP addresses of both
hosts. To display only forward or only reply packets, indicate which host is the
source and which is the destination.
For example, to display UDP port 1812 traffic between 1.example.com and either
2.example.com or 3.example.com, you would enter:
'udp and port 1812 and src host 1.example.com and dst \
( 2.example.com or 2.example.com \)'
<verbose> Type one of the following numbers indicating the depth of packet headers and
payloads to capture:
l 1: print header of packets (default)
For troubleshooting purposes, Fortinet Technical Support may request the most
verbose level (3).
Example 1
The following example captures the first three packets’ worth of traffic, of any port number or protocol and between any
source and destination (a filter of none), that passes through the network interface named port1. The capture uses a low
level of verbosity (indicated by 1).
Commands that you would type are highlighted in bold; responses from the Fortinet unit are not in bold.
FortiAnalyzer# diag sniffer packet port1 none 1 3
interfaces=[port1]
filters=[none]
If you are familiar with the TCP protocol, you may notice that the packets are from the middle of a TCP connection.
Because port 22 is used (highlighted above in bold), which is the standard port number for SSH, the packets might be
from an SSH session.
Example 2
The following example captures packets traffic on TCP port 80 (typically HTTP) between two hosts, 192.168.0.1 and
192.168.0.2. The capture uses a low level of verbosity (indicated by 1). Because the filter does not specify either host as
the source or destination in the IP header (src or dst), the sniffer captures both forward and reply traffic.
A specific number of packets to capture is not specified. As a result, the packet capture continues until the administrator
presses CTRL + C. The sniffer then confirms that five packets were seen by that network interface.
Commands that you would type are highlighted in bold; responses from the Fortinet unit are not in bold.
FortiAnalyzer# diag sniffer packet port1 'host 192.168.0.2 or host 192.168.0.1 and tcp
port 80' 1
192.168.0.2.3625 -> 192.168.0.1.80: syn 2057246590
192.168.0.1.80 -> 192.168.0.2.3625: syn 3291168205 ack 2057246591
192.168.0.2.3625 -> 192.168.0.1.80: ack 3291168206
192.168.0.2.3625 -> 192.168.0.1.80: psh 2057246591 ack 3291168206
192.168.0.1.80 -> 192.168.0.2.3625: ack 2057247265
5 packets received by filter
0 packets dropped by kernel
Example 3
The following example captures all TCP port 443 (typically HTTPS) traffic occurring through port1, regardless of its
source or destination IP address. The capture uses a high level of verbosity (indicated by 3).
A specific number of packets to capture is not specified. As a result, the packet capture continues until the administrator
presses CTRL + C. The sniffer then confirms that five packets were seen by that network interface.
Verbose output can be very long. As a result, output shown below is truncated after only one packet.
Commands that you would type are highlighted in bold; responses from the Fortinet unit are not in bold.
FortiAnalyzer # diag sniffer port1 'tcp port 443' 3
interfaces=[port1]
filters=[tcp port 443]
10.651905 192.168.0.1.50242 -> 192.168.0.2.443: syn 761714898
0x0000 0009 0f09 0001 0009 0f89 2914 0800 4500 ..........)...E.
0x0010 003c 73d1 4000 4006 3bc6 d157 fede ac16 .<s.@.@.;..W....
0x0020 0ed8 c442 01bb 2d66 d8d2 0000 0000 a002 ...B..-f........
0x0030 16d0 4f72 0000 0204 05b4 0402 080a 03ab ..Or............
0x0040 86bb 0000 0000 0103 0303 ..........
Instead of reading packet capture output directly in your CLI display, you usually should save the output to a plain text file
using your CLI client. Saving the output provides several advantages. Packets can arrive more rapidly than you may be
able to read them in the buffer of your CLI display, and many protocols transfer data using encodings other than US-
ASCII. It is usually preferable to analyze the output by loading it into in a network protocol analyzer application such as
Wireshark (http://www.wireshark.org/).
For example, you could use PuTTY or Microsoft HyperTerminal to save the sniffer output. Methods may vary. See the
documentation for your CLI client.
Requirements
The fgt2eth.pl script is provided as-is, without any implied warranty or technical support,
and requires that you first install a Perl module compatible with your operating system.
To use fgt2eth.pl, open a command prompt, then enter a command such as the following:
fgt2eth.pl -in packet_capture.txt -out packet_capture.pcap
where:
lfgt2eth.pl is the name of the conversion script; include the path relative to the current directory, which is
indicated by the command prompt
l packet_capture.txt is the name of the packet capture’s output file; include the directory path relative to
your current directory where you want the converted output to be saved
15. Open the converted file in your network protocol analyzer application. For further instructions, see the
documentation for that application.
For additional information on packet capture, see the Fortinet Knowledge Base article Using the FortiOS built-in
packet sniffer.
sql
sql config
Use this command to show, set, or reset the SQL database configuration.
Syntax
Variable Description
auto-cache-delay [set Show, set, or reset the auto-cache delay, in seconds (default = 300).
<seconds>| reset]
debug-filter {set | test} <daemon> Show sqlplugind and sqlreportd debug filter. Enter sqlplugind, sqlreportd or
<string> both as the <daemon>. Enter the filter string.
deferred-index-timespan [set View or set the time span for the deferred index (default = 10000).
<value>]
Variable Description
hcache-agg-step [reset | set Show, set, or reset the hcache aggregation step (default = 10).
<integer>]
hcache-auto-rebuild-status [reset Show, set, or reset the status of hcache auto rebuild task (0 - 1, default = 1).
| set <integer>] l 0 = disable
l 1 = enable
hcache-auto-rebuild-task-priority Show, set, or reset the priority of hcache auto rebuild task (0 - 2, default = 1).
[reset | set <integer>] l 0 = low
l 1 = medium
l 2 = high
hcache-base-trim-interval [reset | Show, set, or reset the hcache base trim interval (3600 - 2147483647, default =
set <integer>] 172800).
hcache-max-base-row [reset | Show, set, or reset max row number for base hcache (1000 - 1500000, default =
set <integer>] 1000000).
hcache-max-fv-row [reset | set Show, set, or reset max row number for fortiview hcache (1000 - 400000, default
<integer>] = 50000).
hcache-max-fv-row-per- Show, set, or reset max row number per timescale for FortiView hcache (0 -
timescale [reset | set <integer>] 40000, default = 0).
hcache-max-high-accu-row Show, set, or reset max row number for high-accuracy hcache (1000 - 1000000,
[reset | set <integer>] default = 400000).
hcache-max-rpt-row [reset | set Show, set, or reset max row number for report hcache (1000 - 400000, default =
<integer>] 18000).
sampling-max-row [reset | set Show, set, or reset max row number for sampling (1000 - 10000000, default =
<integer>] 1000000).
sampling-status [reset | set Show, set, or reset the sampling status. Enter 0 for disabling and 1 for enabling
<integer>] the sample status (0 - 1, default = 1).
sampling-type [reset | set Show, set, or reset the type of sampling (0 - 1, default = 0).
<integer>]
sql debug
Syntax
Variable Description
hcache-agg show [<filter>] Show the last 10 lines of the hcache-agg debug file. Set filter for the debug file,
[<NUM>] and show the last NUM lines of the debug file. The filter and NUM variables are
optional.
hcache-agg upload {ftp | sftp} Upload hcache-agg debug file to FTP or SFTP server. Enter host IP address,
<host> <dir> <user name> directory, user name, and password.
<password>
imexport show [<filter>] [<NUM>] Show the last 10 lines of the Report import/export debug file. Set filter for debug
file, and show last NUM lines of the debug file. The filter and NUM variables are
optional.
imexport upload {ftp | sftp} Upload Report import/export debug file to FTP or SFTP server. Enter host IP
<host> <dir> <user name> address, directory, user name, and password.
<password>
logview dbgon <level value> Enable log view debug output. Set log view debug level (1-5). Default level is 1.
logview show [<filter>] [<NUM>] Show the last 10 lines of the Log view debug file. Set filter for debug file, and show
last NUM lines of the debug file. The filter and NUM variables are optional.
Variable Description
logview upload {ftp | sftp} <host> Upload log view debug file to FTP or SFTP server. Enter host IP address,
<dir> <user name> <password> directory, user name, and password.
pglog show [<filter>] [<NUM>] Show the last 10 lines of the Postgres log debug file. Set filter for debug file, and
show last NUM lines of the debug file. The filter and NUM variables are optional.
pglog upload {ftp | sftp} <host> Upload Postgres log debug file to FTP or SFTP server. Enter host IP address,
<dir> <user name> <password> directory, user name, and password.
sqlqry auto-explain enable Enable SQL query auto explain. Enter the duration in seconds and the local work_
<duration> <work-mem> mem in MB.
sqlqry dbgon <level value> Enable SQL query debug output. Set SQL query debug level (1-5). The default
level is 1.
Note: When the debug level is 5, the final SQL running in sqlreportd will show in
the debug output as well.
sqlqry show [<filter>] [<NUM>] Show the last 10 lines of the SQL query debug file. Set filter for the debug file, and
show the last NUM lines of the debug file. The filter and NUM variables are
optional.
sqlqry upload {ftp | sftp} <host> Upload SQL query debug file to FTP or SFTP server. Enter host IP address,
<dir> <user name> <password> directory, user name, and password.
sql fluentd
Syntax
Variable Description
log-tail Tail fluentd log from end. Will follow the log file changes.
log-view View fluentd log from start. Will follow the log file changes.
sql hcache
Syntax
diagnose sql hcache add-task agg <spname> <norm-query-hash> <agg-level> <timestamp> <num-
of-days>
diagnose sql hcache add-task agg-update <spname> <hid>
diagnose sql hcache dump-task <filter>
diagnose sql hcache list <spname> <query-hash/tag> <filter> <detail>
diagnose sql hcache plan <spname> <start-time> <end-time> <query-tag/norm-qry-hash/sql>
<is-fortiview> <max-time-scale>
diagnose sql hcache rebuild-report <spname> <start-time> <end-time> <reset>
diagnose sql hcache rebuild-status
diagnose sql hcache show hcache <spname> <id>
diagnose sql hcache show hcache-query <spname> <norm-qry-hash>
diagnose sql hcache show hcache-res-tbl <spname> <res-tbl-id>
diagnose sql hcache show time <time> <time> <time> <time>
diagnose sql hcache status {all | <spname> | all-summary}
Variable Description
add-task agg <spname> <norm- Add an hcache agg task. The following input is required:
query-hash> <agg-level> l spname: SP name.
add-task agg-update <spname> Add an hcache agg update task. The following input is required:
<hid> l spname: SP name.
l query-hash/tag: The hash or tag filter query, or all for all queries.
l filter: Narrow down the hcache list search result by using a filter. The filter
keywords include:
l status: The hcache status. 0(Ready), 1(Ready-Loss), 2(In-Building), 3
(Error), 4(Invalid-SQL ), 5(No-Data), 6(Not-Ready).
l fv_flag: List FortiView/report only. 1(fortiview), 0(report).
l sql: The SQL query match. '*' for wildcard, e.g. *select*.
l time_start: Start of the log time. format: yyyy-mm-dd hh:MM:ss.
l time_end: End of the log time. format: yyyy-mm-dd hh:MM:ss.
The following shows an example of the variable <filter>:
"status=0,1,5 sql=\"*srcip, dstip*\" time_
start>=\"2020-11-01 00:00:00\" time_end<=\"2020-11-30
23:59:59\"".
Enter "" for no filter.
l detail: Show detailed information.
Variable Description
show hcache <spname> <id> Show hcache information. Enter the SP name and hcache ID.
show hcache-query <spname> Show hcache query information. Enter the SP name and the normalized query
<norm-qry-hash> hash.
show hcache-res-tbl <spname> Show hcache result table information. Enter the SP name and the result table ID.
<res-tbl-id>
show time <time> <time> <time> Show hcache time. Enter up to four timestamps.
<time>
status {all | <spname> | all- Show detailed hcache information per SP name, for all SPs, or display the
summary} summary.
sql process
Use this command to kill or list query processes in the the SQL database.
Syntax
Variable Description
sql remove
Syntax
Variable Description
sql show
Syntax
Variable Description
{db-size | hcache-size | log- Show the database, hcache size, log filters, or log status file:
filters | log-stfile <device-id> l db-size: Show database size.
l log-stfile: Show logstatus file for the specified device (for HA cluster,
sql status
Syntax
Variable Description
sql upload
Use this command toupload sqlplugind messages / pgsvr logs via FTP or SFTP.
Syntax
Variable Description
{ftp | sftp} <host> <directory> Upload sqlplugind messages / pgsvr logs with FTP or SFTP.
<user_name> <password>
svctools
Syntax
Variable Description
Variable Description
export remote <ip> <string> Export the configuration to a remote FTP server.
<username> <password>
import local name <adom> Import a local configuration from the specified ADOM. Enable or disable upgrade
<integer> mode.
import remote <ip> <string> Import a remote configuration from an FTP server to the specified ADOM. Enable
<username> <password> or disable upgrade mode.
<adom> <integer>
run remote <ip> <string> Run a remote file from an FTP server.
<username> <password>
Example
system
system admin-session
Syntax
Variable Description
system aiserver
Syntax
Variable Description
system csf
Syntax
Variable Description
Variable Description
downstream-devices <device- Show downstream fabric device. For example, fortianalyzer or any.
type>
system disk
Only usage is available on FortiAnalyzer-VM. Other disk related commands are only
available on the hardware-based FortiAnalyzer.
Syntax
Variable Description
sed <sed-key> SED encryption key. The key requires 8-32 characters, and it must include upper
case, lower case, number, and special character (excluding '\).
This command is only available on hardware models that support self-encrypting
drives. For more information, see the FortiAnalyzer Administration Guide.
Variable Description
Parameter Description
-m Sizes in megabytes.
system export
Syntax
diagnose system export crashlog <ftp server> <username> <password> <directory> <filename>
diagnose system export fmwslog {ftp | sftp} <type> <(s)ftp server> <username> <password>
<directory> <filename>
diagnose system export raidlog <ftp server> <username> <password> [remote path]
[filename]
diagnose system export umlog {ftp | sftp} <type> <(s)ftp server> <username> <password>
<directory> <filename>
diagnose system export upgradelog <ftp server> <username> <password> <directory>
<filename>
diagnose system export vartmp <ftp server> <username> <password> <directory> <filename>
Variable Description
Variable Description
fmwslog {ftp | sftp} <type> <(s)ftp Export the web service log files.
server> <username> The type is the log file prefix and can be: SENT, RECV, or TEST.
<password> <directory>
<filename>
umlog {ftp | sftp} <type> <(s)ftp Export the update manager and firmware manager log files.
server> <username> The type options are: fdslinkd, fctlinkd, fgdlinkd, fgdsvr, update,
<password> <directory> service, misc, umad, and fwmlinkd
<filename>
vartmp {fpt |sftp} <(s)ftp server> Export the system log files in /var/tmp.
<username> <password>
<directory> <filename>
system flash
Syntax
Variable Description
system fsck
Use this command to check and repair the file system, and to reset the disk mount count.
Syntax
Variable Description
harddisk Check and repair the file system, then reboot the system.
system geoip
Syntax
Variable Description
Example
system geoip-city
Syntax
Variable Description
system interface
Syntax
Variable Description
system mapserver
Syntax
Variable Description
system ntp
Syntax
Variable Description
system print
Syntax
Variable Description
connector [adom] <server_type> Print connector information. Enter the ADOM name, or Global, the server type
<server> <tag> (pxGrid, clearpass, or nsx), and then the server name.
df [arg0] [arg1] [arg2] .... [arg9] Print the file system disk space usage. Optionally, enter arguments.
netstat Print the network statistics for active Internet connections (servers and
established).
system process
Syntax
Variable Description
fdlist <pid> [list] List all file descriptors that the process is using.
l <pid>: Process ID
l <pid>: Process ID
list List all processes running on the FortiAnalyzer. The information displayed
includes the PID, user, VSZ, stat, and command.
system raid
This command is only available on hardware-based FortiAnalyzer models that support RAID.
Syntax
Variable Description
cc <rate> <delay> Show/Set RAID consistency check rate (1-100%, 0 = no change) and delay (1-
8760 hours, 0 = no change).
system route
Use this command to help diagnose routes. The listed information includes the destination IP, gateway IP, netmask,
flags, metric, reference, use, and interface for each IPv4 route.
The following flags can appear in the route list table:
l U: the route is up
l G: the route is to a gateway
l H: the route is to a host rather than a network
l D: the route was dynamically created by a redirect
l M: the route was modified by a redirect
Syntax
system route6
Use this command to help diagnose routes. The listed information includes the destination IP, gateway IP, netmask,
flags, metric, reference, use, and interface for each IPv6 route.
For a list of flags that can appear in the route6 list table, see information for the diagnose system route list
command above.
Syntax
system server
Syntax
test
test application
Use this command to test application daemons. Enter an unassigned integer value to see the available options for each
command.
Syntax
Variable Description
Variable Description
Variable Description
l 43: Show auth mode
l 44: Show upstream mgmt info
l 50: Show key info
l 63: Show config versions
l 80: Send test message to upstream
l 81: Send test message to first downstream
l 82: List unconfirmed outgoing messages
l 83: List partial incoming messages
l 84: List unconfirmed confirmations with extra data
l 85: Dump timeout information
l 86: Flush all outgoing messages
l 90: Dump Table Counts
l 91: Print Known Processes
l 92: Send test message to root's cli-test-listener process
l 100: Show cached downstream list
l 110: Dump file meory usage info
l 999: Restart
Variable Description
l 2: show statistics
l 3: show merged ca info
l 4: show runtime logs. 'help' to show usage
l 5: device offline event logs info and debug options
l 6: system general check
l 7: timezone diag info
l 40: DVM cache diag info
l 41: CSF diag info
l 42: ncmdb diag info
l 43: reload csf info in devtable
l 44: show log device group stats
l 45: check log device group
l 46: metadata table diag info [sub-module]
l 48: test update link prefixes file
l 49: test update webfilter categories description file
l 50: test get app icon
l 51: test update app logo files
l 52: dvm call stats
l 53: dvm call stats clear
l 54: check ips/app meta-data update
l 55: log disk readahead get
l 56: log disk readahead toggle
l 57: maintain redis storage <check|fix> [redis-port] [filepath]
l 59: test update faz license
l 60: test fortigate restful api
l 65: log aggregation server stats
l 66: log aggregation server state toggle (debug only)
l 67: test redis security connect [port] [key] [value]
l 69: show device SN change events
l 70: show installed meta-data status
l 82: list avatar meta-data
l 83: rebuild avatar meta-data table
l 84: rebuild ips meta-data table
l 85: rebuild app meta-data table
l 86: rebuild FortiClient Vulneribility meta-data table
l 88: update ffdb meta-data
l 90: use built-in TIDB package and disable updating it
l 91: enable updating TIDB package
Variable Description
l 92: disable updating TIDB package
l 93: switch on/off adom default report schedule
l 94: switch on/off report schedule by name
l 97: set 'force_restore_data' flag for clickhouse start
l 99: restart daemon
[clear]
l 10: send a faznotify <adom> <id> <send-data>
l 99: restart
Variable Description
l 61: logbrowse cache stats
l 62: FortiView Session Stats
l 70: show stats for device vdom cache
l 71: show stats for remote fortiview and reports
l 72: show filterable and sortable fields for fortiview. <v3.0 view name>
l 73: show stats for the address object uuid2name cache
l 74: clear the address object uuid2name cache
l 75: data masking test. <passwd> <plaint test> <1|0 (high secure)> [do_
unmasking]
l 76: fazsvcd fabric service diagnostics
l 77: Fabric of FAZ fabric remote request stats
l 78: Fabric of FAZ session table list
l 82: rebuild or dump [filter] logstat cache info
l 90: SQL Rewriter pool stats
l 91: faz fabric dvm diagnostics
l 99: restart daemon
l 100: log FAZ debugs
l 101: Close FAZ debug log
l 200: gui api test
l 201: diag for jsonrpc ..
l 202: faz fabric toggle trace debug
l 203: faz fabric worker number config
l 204: playbook session manager debug
l 310: diag for incident attachment limits cache
Variable Description
l 99: restart daemon
l 6: Recover fgfm
l 3: logstat status
Variable Description
l 95: show runtime logs. option format: pid=0:current,-1:all,PID
duration=DURA filter=STR
l 98: memory check
l 99: restart fortilogd
l 2: show stats
l 3: show fwd-plugin status
l 4: show Fluentd stats
l 5: show Fluentd config
l 88: restart Fluentd with new config
l 99: restart daemon
l 200: dia for configuration:
l reload: reload configuration
l logfwd-remote: show fluentd configuration by logfwd remote name
l temp-config: show temporary fluentd configuration file when creating
configuraion file fail.
l auth-limit: show plugins detail about google auth-limit control.
l conflict-limit: show plugins detail about conflict control.
l suspend-limit: show plugins detail about suspended.
l 201: dia for debug:
l log: enable/disable Fluentd from generating logs in files.
l monitor: enable/disable Fluentd monitoring.
l restart: restart Fluentd immediately.
l clean_restart: remove all Fluentd related files and restart fwdplugind.
l worker_memory: display memory usage for Fluentd workers.
l worker_restart: restart Fluentd worker via pid.
Variable Description
l 12: force to check the oldest log litime when trim log files.
l 13: force to delete log files older than <days> to enforce deletion policy for
uploaded log files (<days>).
l 90: reset statistics and state
l 91: force to preen content files info
l 99: restart daemon
l 2: show states
Variable Description
l 9: show unreg dev cache [filter]
l 10: log cluster bridge stats
l 11: show helper threads stats
l 12: show HA group cache
l 13: show file fwd stats
l 14: show fct software inventory cache
l 15: show fgt interface stats
l 16: show fos-auto device dump. [dev] to dump device list
l 17: show device logging rate & rate-limit. [enable] to force tracking log-rate or
[disable] to track only rate-limited devices. [config] to show config
l 18: show fgt policy info, [dev] to dump device list
l 19: show syslog receiving stats, [oversize] to print last received oversize
syslogs
l 20: show fgt epeu stats
l 21: dump oftp-restapi-sched stats
l 22: dump oftp-restapi-sched status
l 23: dump oftp csf member status
l 24: dump blacklisted devices
l 25: show connection close logs. 'help' to show usage
l 30: dump csf groups data in all adoms in json string
l 31: show csf groups update stats
l 32: reschedule all restapi task for designated devid
l 40: show connections by last-request type
l 43: manage fct-log-upload track [show all/fct-sn|del fct-sn]
l 50: display logtypes for all devid
l 60: display login requests stats
l 61: Fortiview feature list cache dump
l 72: config high priority device
l 80: set region
l 81: show FAZ HA info
l 90: reload un-reg device tree
l 91: delete designated csf group
l 92: reload reg dev cache
l 93: filter incoming connections by source IP
l 96: oftp packet sniffer
l 95: debug output
l 99: restart daemon
l 101: schedule restart the daemon. [enable <interval>|disable]
l 102: oftpd monitor. [enable [timeout]|enable-with-core [timeout]|disable]
Variable Description
l 1: show PID
l 2: show statistics and state
l 3: reset statistics and state
l 4: list adoms
l 6: list schedules
l 7: show statistics of sched-rpt dispatcher
l 8: show track info of reports
l 9: enable/disable report run-queue debug
l 55: re-check an adom
l 99: restart daemon
l 910: enable rptchkd
l 911: disable rptchkd
Variable Description
l 2: show statistics and state
l 3: show running processes
l 4: show writers info
l 5: show splitter info
l 6: show Adom database info
l 7: show trimmer info
l 8: show the shared Materialized View disk usage info
l 9: set/reset max memory usage ratio
l 10: add or drop skip indices on SIEM table
l 11: cleanup CH tmp_merge dir
l 20: show fabric stats
l 41: show writer 1 info
l 42: show writer 2 info
l 43: show writer 3 info
l 44: show writer 4 info
l 45: show writer 5 info
l 46: show writer 6 info
l 97: clear redis stream
l 99: restart daemon
Variable Description
l 41: show worker 1 info
l 51: show worker 1 registered log devices
l 61: show worker 1 open log file cache
l 70: show sql database building progress
l 80: show daemon status flags
l 81: show debug zone devices status
l 82: show all adoms with member devices or filer by <adom-name>
l 83: show all registered logdevs
l 84: show all unreg logdevs
l 85: show fazid map stats
l 91: diag worker devvd loadbalance
l 94: clear all redis queues for batch file commit
l 95: request to rebuild SQL database for local event logs
l 96: resend all pending batch files to commit queues
l 97: rebuilding warm restart
l 98: set worker assignment to policy 'round-robin' or 'adom-affinity', daemon
will restart on policy change.
l 99: restart daemon
l 200: diag for log based alert (event mgmt) ..
l 201: diag for UTM correlation cache ..
l 203: diag for logstat ..
l 204: diag for IoC ..
l 205: diag for endpoint and enduser ..
l 206: diag for ueba ..
l 207: diag for FSA scan session ..
l 208: diag for audit report event process ..
l 209: diag for shadow it info ..
l 210: diag for fgt epeu info ..
l 211: diag for dns info ..
l 221: estimated browsing time stats
l 222: fsa devmap cache info
l 224: fgt lograte cache info
l 225: dump enum field error cache
l 226: reset enum field error cache
l 227: dump tz field error cache
l 228: reset tz field error cache
l 229: diag archivers compression algorithm
l 230: diag for ems enrich ..
l 231: diag for geo-location lookup ..
Variable Description
l 1: Daemon info (PID, meminfo, backtrace ...)
l 2: show daemon stats
l 3: show SIEM table stats
l 6: show table slow upgrade info
l 7: show faz fabric meta table stats
l 8: show postgres table migrate stats
l 91: scan hcache query templates and clean up unused
l 92: scan metadata and update sql
l 98: scan and clean zombie cstore files
l 99: restart daemon
Variable Description
test connection
Syntax
Variable Description
mailserver <server-name> <mail- Test the connection to the mail server. Enter the email account which this test
from> <mail-to> [adom] email will be sent from and to. Optionally, enter the ADOM name.
syslogserver <server-name> Test the connection to the syslog server. Enter the syslog server name.
[adom] Optionally, enter the ADOM name.
test policy-check
Syntax
Variable Description
test search
Syntax
Variable Description
test sftp
Use this command to test the secure file transfer protocol (SFTP) scheduled backup.
Syntax
Variable Description
<directory> The directory on the SFTP server where you want to put the file (default = /).
upload
upload clear
Syntax
diagnose upload clear log {all | backup | mirror 1 | mirror 2 | mirror 3 | original}
diagnose upload clear report
Variable Description
l mirror 1: Clear log uploading requests in the mirror queue for server 1.
l mirror 2: Clear log uploading requests in the mirror queue for server 2.
l mirror 3: Clear log uploading requests in the mirror queue for server 3.
upload status
Use this command to get the running status on files in the upload queue.
Syntax
vpn
Use this command to flush SAD entries and list tunnel information.
Syntax
Variable Description
The get commands display a part of your FortiAnalyzer unit’s configuration in the form of a list of settings and their
values.
Although not explicitly shown in this section, for all config commands there are related get
and show commands that display that part of the configuration. get and show commands use
the same syntax as their related config command, unless otherwise specified.
The get command displays all settings, including settings that are in their default state.
Unlike the show command, get requires that the object or table whose settings you want to display are specified, unless
the command is being used from within an object or table.
For example, at the root prompt, this command would be valid:
get system status
fmupdate analyzer
Syntax
fmupdate av-ips
Syntax
fmupdate custom-url-list
Syntax
fmupdate disk-quota
Use this command to view the disk quota for the update manager.
Syntax
Example
fmupdate fct-services
Syntax
Example
fmupdate fds-setting
Syntax
Example
server-override:
system-support-fai :
system-support-faz :
system-support-fct :
system-support-fdc :
system-support-fgt :
system-support-fml :
system-support-fsa :
system-support-fts :
umsvc-log : info
unreg-dev-option : add-service
update-schedule:
time: 00:10 wanip-query-mode : disable
fmupdate fwm-setting
Syntax
Example
fmupdate multilayer
Syntax
fmupdate publicnetwork
Syntax
fmupdate server-access-priorities
Syntax
Example
fmupdate server-override-status
Syntax
fmupdate service
Syntax
Example
fmupdate web-spam
Syntax
system admin
Syntax
Example
This example shows the output for get system admin setting:
access-banner : disable
admin-https-redirect: enable
admin-login-max : 256
admin_server_cert : server.crt
auth-addr : (null)
auth-port : 443
banner-message : (null)
fgt-gui-proxy : enable
fgt-gui-proxy-port : 8082
firmware-upgrade-check: enable
fsw-ignore-platform-check: disable
gui-theme : jade
http_port : 80
https_port : 443
idle_timeout : 900
idle_timeout_api : 900
idle_timeout_gui : 900
idle_timeout_sso : 900
objects-force-deletion: enable
preferred-fgfm-intf : (null)
show-add-multiple : disable
show-checkbox-in-table: disable
show-device-import-export: disable
show-hostname : disable
show-log-forwarding : enable
unreg_dev_opt : add_allow_service
webadmin_language : auto_detect
system alert-console
Syntax
Example
system alertemail
Syntax
Example
system alert-event
Syntax
Example
This example shows the output for an alert event named Test that has default values:
name : Test
alert-destination:
enable-generic-text : disable
enable-severity-filter: disable
event-time-period : 0.5
generic-text : (null)
num-events : 1
severity-filter : high
severity-level-comp : =
severity-level-logs : no-check
system auto-delete
Use this command to view automatic deletion policies for logs, reports, DLP files, and quarantined files.
Syntax
system backup
Syntax
Example
This example shows the output for get system backup status:
All-Settings Backup
Last Backup: Tue Sep 29 08:03:35 2020
Next Backup: N/A
system central-management
Syntax
Example
system certificate
Syntax
Example
This example shows the output for get system certificate local Fortinet_Local:
name : Fortinet_Local
password : *
comment : Default local certificate
private-key :
certificate :
Subject: C = US, ST = California, L = Sunnyvale, O = Fortinet, OU = FortiAnalyzer, CN
= FAZ-VM0000000001, emailAddress = [email protected]
system connector
Syntax
Example
system csf
Syntax
system dns
Syntax
Example
system docker
Syntax
Example
system fips
Syntax
Example
system fortiview
Syntax
Example
This example shows the output for get system fortiview auto-cache:
aggressive-fortiview: disable
incr-fortiview: disable
interval : 168
status : enable
system global
Syntax
Example
multiple-steps-upgrade-in-autolink: disable
no-copy-permission-check: disable
no-vip-value-check : disable
normalized-intf-zone-only: disable
object-revision-db-max : 100000
object-revision-mandatory-note : enable
object-revision-object-max : 100
object-revision-status : enable
oftp-ssl-protocol : tlsv1.2
policy-object-icon : disable
policy-object-in-dual-pane: disable
pre-login-banner : disable
private-data-encryption : disable
remoteauthtimeout : 10
search-all-adoms : disable
ssh-enc-algo : [email protected] aes256-ctr [email protected]
ssh-hostkey-algo : ecdsa-sha2-nistp521 rsa-sha2-256 rsa-sha2-512 ssh-ed25519
ssh-kex-algo : diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-
hellman-group18-sha512 diffie-hellman-group-exchange-sha256 curve25519-
[email protected] ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521
ssh-mac-algo : hmac-sha2-256 [email protected] hmac-sha2-512 hmac-sha2-512-
[email protected]
ssh-strong-crypto : enable
ssl-low-encryption : enable
ssl-protocol : tlsv1.3 tlsv1.2
ssl-static-key-ciphers: enable
table-entry-blink: enable
task-list-size : 2000
timezone : (GMT-8:00) Pacific Time (US & Canada).
tunnel-mtu : 1500
usg : disable
webservice-proto : tlsv1.3 tlsv1.2
system ha
Syntax
get system ha
system interface
Syntax
Examples
This example shows the output for get system interface port1:
name : port1
status : enable
mode: static
ip : 111.11.11.11 255.255.255.0
allowaccess : ping https ssh snmp soc-fabric http webservice fgfm
speed : auto
description : (null)
alias : (null)
mtu : 1500
type : physical
ipv6:
ip6-address: ::/0 ip6-allowaccess: ip6-autoconf: enable
system local-in-policy
Syntax
system local-in-policy6
Syntax
system locallog
Syntax
Examples
This example shows the output for get system locallog disk setting:
status : enable
severity : information
upload : disable
server-type : FTP
max-log-file-size : 100
max-log-file-num : 10000
roll-schedule : none
diskfull : overwrite
log-disk-full-percentage: 80
log-disk-quota : 5
This example shows the output for get system locallog syslogd3 filter:
controller : enable
event : enable
devcfg : enable
devops : enable
diskquota : enable
docker : enable
dvm : enable
ediscovery : enable
eventmgmt : enable
faz : enable
fazsys : enable
fgd : enable
fmgws : enable
fortiview : enable
glbcfg : enable
ha : enable
hcache : enable
incident : enable
iolog : enable
logd : enable
logdb : enable
logdev : enable
logfile : enable
logging : enable
report : enable
system : enable
system log
Syntax
Example
This example shows the output for get system log settings:
FAC-custom-field1 : (null)
FCH-custom-field1 : (null)
FCT-custom-field1 : (null)
FDD-custom-field1 : (null)
FGT-custom-field1 : (null)
FML-custom-field1 : (null)
FPX-custom-field1 : (null)
FSA-custom-field1 : (null)
FWB-custom-field1 : (null)
browse-max-logfiles : 10000
device-auto-detect : enable
dns-resolve-dstip : disable
download-max-logs : 100000
ha-auto-migrate : disable
import-max-logfiles : 10000
keep-dev-logs : disable
log-file-archive-name: basic
log-interval-dev-no-logging: 15
log-upload-interval-dev-no-logging: 360
rolling-regular:
sync-search-timeout : 60
unencrypted-logging : disable
system log-fetch
Syntax
Example
This example shows the output for get system log-fetch server-settings:
max-conn-per-session: 3
max-sessions : 1
session-timeout : 10
system log-forward
Syntax
system log-forward-service
Syntax
Example
system loglimits
Syntax
Example
Where:
system mail
Syntax
Example
This example shows the output for an alert email named Test:
id : Test
auth : disable
auth-type : psk
passwd : *
port : 25
secure-option : default
server : mailServer
user : [email protected]
system metadata
Syntax
Example
This example shows the output for get system metadata admins 'Contact Email':
fieldname : Contact Email
fieldlength : 50
importance : optional
status : enabled
system ntp
Syntax
Example
system password-policy
Syntax
Example
system performance
Syntax
Example
system report
Syntax
Example
This example shows the output for get system report setting:
week-start : sun
max-table-rows : 1000000
max-rpt-pdf-rows : 100000
report-priority : auto
aggregate-report : disable
ldap-cache-timeout : 60
template-auto-install: default
exclude-capwap : by-port
capwap-port : 5246
system route
Syntax
Example
This example shows the output for get system route 66:
seq_num : 66
device : port5
dst : 0.0.0.0 0.0.0.0
gateway : 10.111.1.16
system route6
Syntax
system saml
Syntax
Example
system sniffer
Syntax
system snmp
Syntax
Example
This example shows the output for get system snmp sysinfo:
contact_info : (null)
description : Test FAZ
engine-id : (null)
fortianalyzer-legacy-sysoid: disable
location : (null)
status : enable
trap-cpu-high-exclude-nice-threshold: 80
trap-high-cpu-threshold: 80
trap-low-memory-threshold: 80
system-soc-fabric
Syntax
Example
system sql
Syntax
Example
ts-index-field:
== [ FGT-app-ctrl ]
category: FGT-app-ctrl value:
user,group,srcip,dstip,dstport,service,app,action,hostname
== [ FGT-attack ]
category: FGT-attack value: severity,srcip,dstip,action,user,attack
== [ FGT-content ]
category: FGT-content value: from,to,subject,action,srcip,dstip,hostname,status
== [ FGT-dlp ]
category: FGT-dlp value: user,srcip,service,action,filename
== [ FGT-emailfilter ]
category: FGT-emailfilter value: user,srcip,from,to,subject
== [ FGT-event ]
category: FGT-event value: subtype,ui,action,msg
== [ FGT-traffic ]
category: FGT-traffic value: user,srcip,dstip,service,app,utmaction
== [ FGT-virus ]
category: FGT-virus value: service,srcip,dstip,action,filename,virus,user
== [ FGT-voip ]
category: FGT-voip value: action,user,src,dst,from,to
== [ FGT-webfilter ]
category: FGT-webfilter value: user,srcip,dstip,service,action,catdesc,hostname
== [ FGT-netscan ]
category: FGT-netscan value: user,dstip,vuln,severity,os
== [ FGT-fct-event ]
category: FGT-fct-event value: (null)
== [ FGT-fct-traffic ]
category: FGT-fct-traffic value: (null)
== [ FGT-fct-netscan ]
category: FGT-fct-netscan value: (null)
== [ FGT-waf ]
category: FGT-waf value: user,srcip,dstip,service,action
== [ FGT-gtp ]
category: FGT-gtp value: msisdn,from,to,status
== [ FGT-dns ]
category: FGT-dns value: (null)
== [ FGT-ssh ]
category: FGT-ssh value: (null)
== [ FML-emailfilter ]
category: FML-emailfilter value: client_name,dst_ip,from,to,subject
== [ FML-event ]
category: FML-event value: subtype,msg
== [ FML-history ]
category: FML-history value: classifier,disposition,from,to,client_
name,direction,domain,virus
== [ FML-virus ]
category: FML-virus value: src,msg,from,to
== [ FWB-attack ]
category: FWB-attack value: http_host,http_url,src,dst,msg,action
== [ FWB-event ]
category: FWB-event value: ui,action,msg
== [ FWB-traffic ]
category: FWB-traffic value: src,dst,service,http_method,msg
background-rebuild : enable
compress-table-min-age : 7
database-type : postgres
device-count-high : disable
event-table-partition-time: 0
fct-table-partition-time: 360
start-time : 00:00 2000/01/01
traffic-table-partition-time: 0
utm-table-partition-time: 0
system status
Syntax
Example
system syslog
Syntax
Example
This example shows the output for an syslog server named Test:
name : Test
ip : 10.10.10.1
port : 514
reliable : disable
system web-proxy
Syntax
Example
The show commands display a part of your unit’s configuration in the form of the commands that are required to achieve
that configuration from the firmware’s default state.
Although not explicitly shown in this section, for all config commands, there are related show
commands that display that part of the configuration. The show commands use the same
syntax as their related config command.
Unlike the get command, show does not display settings that are in their default state.
Example
148 "user peer" 152 "user group" 167 "firewall service custom"
254 "firewall service predefined" 168 "firewall service group" 170 "firewall schedule onetime"
171 "firewall schedule recurring" 172 "firewall ippool" 173 "firewall vip"
1043 "wanopt peer" 1044 "wanopt auth-group" 1054 "vpn ssl web portal"
1337 "endpoint-control profile" 1338 "firewall schedule group" 1364 "firewall shaper traffic-shaper"
1365 "firewall shaper per-ip-shaper" 1367 "vpn ssl web virtual-desktop- 1370 "vpn ssl web host-check-
app-list" software"
384 "firewall service category" 474 "application custom" 475 "user device-category"
1494 "dynamic vip" 1495 "dynamic ippool" 1504 "dynamic certificate local"
131 "system gre-tunnel" 132 "system arp-table" 135 "system dhcp server"
137 "system dhcp reserved-address" 138 "system zone" 140 "firewall address"
152 "user group" 155 "vpn ipsec phase1" 156 "vpn ipsec phase2"
157 "vpn ipsec manualkey" 158 "vpn ipsec concentrator" 165 "vpn ipsec forticlient"
167 "firewall service custom" 254 "firewall service predefined" 168 "firewall service group"
170 "firewall schedule onetime" 171 "firewall schedule recurring" 172 "firewall ippool"
173 "firewall vip" 178 "firewall ipmacbinding table" 181 "firewall policy"
317 "system wccp" 318 "firewall interface-policy" 1020 "system replacemsg ec"
1021 "system replacemsg nac-quar" 1022 "system snmp user" 1027 "application name"
1047 "wanopt storage" 1054 "vpn ssl web portal" 1061 "system wireless ap-status"
1075 "system replacemsg-image" 1076 "system replacemsg-group" 1092 "system replacemsg mms"
1093 "system replacemsg mm1" 1094 "system replacemsg mm3" 1095 "system replacemsg mm4"
1096 "system replacemsg mm7" 1097 "firewall mms-profile" 1203 "firewall gtp"
1213 "firewall carrier-endpoint-bwl" 1216 "antivirus notification" 1326 "system replacemsg traffic-
quota"
1327 "webfilter content" 1337 "endpoint-control profile" 1338 "firewall schedule group"
1364 "firewall shaper traffic-shaper" 1365 "firewall shaper per-ip-shaper" 1367 "vpn ssl web virtual-desktop-
app-list"
1370 "vpn ssl web host-check- 1373 "report dataset" 1375 "report chart"
software"
1399 "wireless-controller wtp" 1402 "wireless-controller ap-status" 1412 "system replacemsg webproxy"
1490 "report theme" 150 "system object-tag" 169 "system dhcp6 server"
180 "system port-pair" 182 "system 3g-modem custom" 183 "application rule-settings"
273 "web-proxy forward-server" 330 "system ddns" 331 "system replacemsg captive-
portal-dflt"
390 "system sms-server" 394 "system replacemsg utm" 397 "spamfilter bwl"
406 "vpn certificate ocsp-server" 408 "user password-policy" 412 "webfilter search-engine"
384 "firewall service category" 466 "system ips-urlfilter-dns" 467 "system geoip-override"
483 "system server-probe" 473 "system replacemsg device- 492 "firewall deep-inspection-options"
detection-portal"
Some FortiAnalyzer CLI commands issue numerical error codes. The following table lists the error codes and
descriptions.
0 Success
2 Unknown protocol
4 Memory failure
5 Session failure
6 Authentication failure
Copyright© 2024 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s Chief Legal Officer, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.