FortiBridge CLI Reference version 3.0.0

advertisement
FortiBridge CLI Reference
FortiBridge 3.0
FortiBridge: FortiBridge CLI Reference
9 November 2010
09-300-133020-20101109
for FortiBridge 3.0
© Copyright 2010 Fortinet, Inc. All rights reserved. No part of this publication including text, examples,
diagrams or illustrations may be reproduced, transmitted, or translated in any form or by any means,
electronic, mechanical, manual, optical or otherwise, for any purpose, without prior written permission of
Fortinet, Inc.
Trademarks
Dynamic Threat Prevention System (DTPS), APSecure, FortiASIC, FortiBIOS, FortiBridge, FortiClient,
FortiGate®, FortiGate Unified Threat Management System, FortiGuard®, FortiGuard-Antispam,
FortiGuard-Antivirus, FortiGuard-Intrusion, FortiGuard-Web, FortiLog, FortiAnalyzer, FortiManager,
Fortinet®, FortiBridge, FortiPartner, FortiProtect, FortiReporter, FortiResponse, FortiShield, FortiVoIP, and
FortiWiFi are trademarks of Fortinet, Inc. in the United States and/or other countries. The names of actual
companies and products mentioned herein may be the trademarks of their respective owners.
Contents
Introduction
7
Before you begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
How this chapter is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
IP addresses . . . . . . . . . . .
Example Network configuration .
Cautions, Notes and Tips . . . .
Typographical conventions . . . .
CLI command syntax conventions
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. . 8
. 10
. 11
. 12
. 12
Entering FortiBridge configuration data. . . . . . . . . . . . . . . . . . . . . . . . .
Entering text strings (names).
Entering numeric values . . .
Selecting options from a list .
Enabling or disabling options.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
14
.
.
.
.
14
15
15
15
Registering your Fortinet product. . . . . . . . . . . . . . . . . . . . . . . . . . . .
15
Fortinet products End User License Agreement . . . . . . . . . . . . . . . . . . . .
15
Training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16
Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16
Fortinet Tools and Documentation CD . . . . . . . . . . . . . . . . . . . . . . .
Fortinet Knowledge Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Comments on Fortinet technical documentation . . . . . . . . . . . . . . . . .
16
16
16
Customer service and technical support . . . . . . . . . . . . . . . . . . . . . . . .
16
config
17
alertemail setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
18
Command syntax pattern . . . . . . . . . . . . . . . . . . . . . . . . . . .
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Related Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
18
18
19
log syslogd setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
20
Command syntax pattern . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Related Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
20
20
21
probe probe_list {ping | http | ftp | pop3 | smtp | imap | mm1 | mm3 | mm4 | mm7} . .
22
Command syntax pattern . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
22
23
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
3
Contents
Related Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
probe setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
24
Command syntax pattern . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Related Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
24
24
24
system accprofile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
25
Command syntax pattern . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Related Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
25
26
26
system admin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
27
Command syntax pattern . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Related Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
27
28
28
system console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
29
Command syntax pattern . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
29
29
system dns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
30
Command syntax pattern . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
30
30
get system status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
31
Command syntax pattern . . . . . . . . . . . . . . . . . . . . . . . . . . .
31
system fail_close . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
32
Command syntax pattern . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
32
32
system global . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
33
Command syntax pattern . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
33
34
system interface {internal | external} . . . . . . . . . . . . . . . . . . . . . . . . . .
35
Command syntax pattern . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
35
35
system manageip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
36
Command syntax pattern . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Related Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
36
36
36
system route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
37
Command syntax pattern . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
37
37
system snmp community . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
38
Command syntax pattern
config hosts. . . . . . . . . .
Command syntax pattern
Example . . . . . . . . .
4
23
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
38
39
39
39
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
Contents
execute
41
backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
42
Command syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
42
42
date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
43
Command syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
43
43
factoryreset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
44
Command syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
44
ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
45
Command syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
45
45
reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
46
Command syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
46
restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
47
Command syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
47
47
switch-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
48
Command syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
48
time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
49
Command syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
49
49
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
5
Contents
6
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
Introduction
Welcome and thank you for selecting Fortinet products for your network protection.
The FortiOS Handbook: FortiBridge CLI Reference describes the FortiBridge CLI
commands.
For instructions on how to install your FortiBridge unit and use the web-based manager,
see the FortiGate Hardware Guide or the Hardware chapter of The FortiOS Handbook.
This section contains the following topics:
•
Before you begin
•
How this chapter is organized
•
Document conventions
•
Entering FortiBridge configuration data
•
Registering your Fortinet product
•
Fortinet products End User License Agreement
•
Training
•
Documentation
•
Customer service and technical support
Before you begin
Before you begin using this guide, take a moment to note the following:
•
Administrators are assumed to be super_admin administrators unless otherwise
specified. Some restrictions will apply to other administrators.
•
Firewall policies limit access, and, while this and other similar features are a vital part
of securing your network, they are not covered in this guide.
•
If your FortiGate unit supports SSL acceleration, it also supports SSL content scanning
and inspection for HTTPS, IMAPS, POP3S, and SMTPS traffic.
How this chapter is organized
This FortiOS Handbook chapter contains these sections:
config lists and describes all of the CLI commands in the FortiBridge config command
structure. These are generally commands used to configure the FortiBridge unit.
execute lists and describes all of the CLI commands in the FortiBridge execute command
structure. These commands perform actions, including backing up and restoring the
FortiBridge configuration, switching between normal and bypass modes, and using the
ping command to test connectivity.
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
7
Document conventions
Document conventions
Fortinet technical documentation uses the conventions described below.
IP addresses
To avoid publication of public IP addresses that belong to Fortinet or any other
organization, the IP addresses used in Fortinet technical documentation are fictional and
follow the documentation guidelines specific to Fortinet. The addresses used are from the
private IP address ranges defined in RFC 1918: Address Allocation for Private Internets,
available at http://ietf.org/rfc/rfc1918.txt?number-1918.
Most of the examples in this document use the following IP addressing:
•
IP addresses are made up of A.B.C.D
•
A - can be one of 192, 172, or 10 - the non-public addresses covered in RFC 1918.
•
B - 168, or the branch / device / virtual device number.
•
•
•
Branch number can be 0xx, 1xx, 2xx - 0 is Head office, 1 is remote, 2 is other.
•
Device or virtual device - allows multiple FortiGate units in this address space
(VDOMs).
•
Devices can be from x01 to x99.
C - interface - FortiGate units can have up to 40 interfaces, potentially more than one
on the same subnet
•
001 - 099- physical address ports, and non -virtual interfaces
•
100-255 - VLANs, tunnels, aggregate links, redundant links, vdom-links, etc.
D - usage based addresses, this part is determined by what device is doing
•
The following gives 16 reserved, 140 users, and 100 servers in the subnet.
•
001 - 009 - reserved for networking hardware, like routers, gateways, etc.
•
010 - 099 - DHCP range - users
•
100 - 109 - FortiGate devices - typically only use 100
•
110 - 199 - servers in general (see later for details)
•
200 - 249 - static range - users
•
250 - 255 - reserved (255 is broadcast, 000 not used)
•
The D segment servers can be farther broken down into:
•
8
110 - 119 - Email servers
•
120 - 129 - Web servers
•
130 - 139 - Syslog servers
•
140 - 149 - Authentication (RADIUS, LDAP, TACACS+, FSAE, etc)
•
150 - 159 - VoIP / SIP servers / managers
•
160 - 169 - FortiAnalyzers
•
170 - 179 - FortiManagers
•
180 - 189 - Other Fortinet products (FortiScan, FortiDB, etc.)
•
190 - 199 - Other non-Fortinet servers (NAS, SQL, DNS, DDNS, etc.)
•
Fortinet products, non-FortiGate, are found from 160 - 189.
FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
Document conventions
The following table shows some examples of how to choose an IP number for a device
based on the information given. For internal and dmz, it is assumed in this case there is
only one interface being used.
Table 1: Examples of the IP numbering
Location and device
Internal
Dmz
External
Head Office, one FortiGate
10.011.101.100
10.011.201.100
172.20.120.191
Head Office, second FortiGate
10.012.101.100
10.012.201.100
172.20.120.192
Branch Office, one FortiGate
10.021.101.100
10.021.201.100
172.20.120.193
Office 7, one FortiGate with 9
VDOMs
10.079.101.100
10.079.101.100
172.20.120.194
Office 3, one FortiGate, web
server
n/a
10.031.201.110
n/a
Bob in accounting on the
corporate user network (dhcp)
at Head Office, one FortiGate
10.0.11.101.200
n/a
n/a
Router outside the FortiGate
n/a
n/a
172.20.120.195
FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
9
Document conventions
Example Network configuration
The network configuration shown in Figure 1 or variations on it is used for many of the
examples in this document. In this example, the 172.20.120.0 network is equivalent to the
Internet. The network consists of a head office and two branch offices.
Figure 1: Example network configuration
WLAN: 10.12.101.100
SSID: example.com
Password: supermarine
DHCP range: 10.12.101.200-249
Linux PC
10.11.101.20
IN
10 T
.11
.10
FortiWiFi-80CM
Windows PC
10.11.101.10
1.1
01
Internal network
P
10 ort 2
.11
.10
1.1
FortiAnalyzer-100B
10
Switch
30
10
.11
10
.11
.11
.10 Po
1.1 rt 2
02
P
17 ort 1
2.2 (s
0 . 1 n i ff
20 er
FortiGate-82C
.14 mo
1
de
.10 Po
1.1 rt 2
00
.10 Por
1.1 t 1
10
P
17 ort 1
2.2
0.1
20
FortiGate-620B
HA cluster
.14
FortiMail-100C
1
f
rt 8 r o
Po mirro
(
Po
an rt 2
d3
Po
)
p
s
ort
2a
nd
3)
rt 1
Switch
He
P
10 ort 1
.21
.10
1.1
FortiGate-3810A
01
Linux PC
10.21.101.10
rt 1 10
Po 0.21.
1
1.1
Bra
17
nch
o ff
Bra
ice
nch
2.2
o ff
0.1
ice
ad
o ff
ice
20 WAN
.12 1
2
I
10 ntern
.31 al
.10
1.1
FortiGate-51B
0
0
60
Windows PC
10.31.101.10
FortiManager-3000B
10
rt 4
Po .100
1
.10
2
.2
Cluster
Port 1: 10.21.101.102
FortiGate-5005FA2
Port 1: 10.21.101.102
FortiGate-5005FA2
Port 1: 10.21.101.103
FortiSwitch-5003A
Port 1: 10.21.101.161
FortiGate-5050-SM
Port 1: 10.21.101.104
Engineering network
10.22.101.0
10
FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
Document conventions
Cautions, Notes and Tips
Fortinet technical documentation uses the following guidance and styles for cautions,
notes and tips.
Caution: Warns you about commands or procedures that could have unexpected or
undesirable results including loss of data or damage to equipment.
Note: Presents useful information, but usually focused on an alternative, optional method,
such as a shortcut, to perform a step.
Tip: Highlights useful additional information, often tailored to your workplace activity.
FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
11
Document conventions
Typographical conventions
Fortinet documentation uses the following typographical conventions:
Table 2: Typographical conventions in Fortinet technical documentation
Convention
Example
Button, menu, text box, From Minimum log level, select Notification.
field, or check box label
CLI input
config system dns
set primary <address_ipv4>
end
CLI output
FGT-602803030703 # get system settings
comments
: (null)
opmode
: nat
Emphasis
HTTP connections are not secure and can be intercepted by a third
party.
File content
<HTML><HEAD><TITLE>Firewall
Authentication</TITLE></HEAD>
<BODY><H4>You must authenticate to use this
service.</H4>
Hyperlink
Visit the Fortinet Technical Support web site,
https://support.fortinet.com.
Keyboard entry
Type a name for the remote VPN peer or client, such as
Central_Office_1.
Navigation
Go to VPN > IPSEC > Auto Key (IKE).
Publication
For details, see the FortiOS Handbook.
CLI command syntax conventions
This guide uses the following conventions to describe the syntax to use when entering
commands in the Command Line Interface (CLI).
Brackets, braces, and pipes are used to denote valid permutations of the syntax.
Constraint notations, such as <address_ipv4>, indicate which data types or string
patterns are acceptable value input.
Table 3: Command syntax notation
12
Convention
Description
Square brackets [ ]
A non-required word or series of words. For example:
[verbose {1 | 2 | 3}]
indicates that you may either omit or type both the verbose word and
its accompanying option, such as:
verbose 3
FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
Document conventions
Table 3: Command syntax notation (Continued)
Convention
Description
Angle brackets < >
A word constrained by data type.
To define acceptable input, the angled brackets contain a descriptive
name followed by an underscore ( _ ) and suffix that indicates the
valid data type. For example:
<retries_int>
indicates that you should enter a number of retries, such as 5.
Data types include:
• <xxx_name>: A name referring to another part of the
configuration, such as policy_A.
• <xxx_index>: An index number referring to another part of the
configuration, such as 0 for the first static route.
• <xxx_pattern>: A regular expression or word with wild cards
that matches possible variations, such as *@example.com to
match all email addresses ending in @example.com.
• <xxx_fqdn>: A fully qualified domain name (FQDN), such as
mail.example.com.
• <xxx_email>: An email address, such as
admin@mail.example.com.
• <xxx_url>: A uniform resource locator (URL) and its associated
protocol and host name prefix, which together form a uniform
resource identifier (URI), such as
http://www.fortinet./com/.
• <xxx_ipv4>: An IPv4 address, such as 192.168.1.99.
• <xxx_v4mask>: A dotted decimal IPv4 netmask, such as
255.255.255.0.
• <xxx_ipv4mask>: A dotted decimal IPv4 address and netmask
separated by a space, such as
192.168.1.99 255.255.255.0.
• <xxx_ipv4/mask>: A dotted decimal IPv4 address and
CIDR-notation netmask separated by a slash, such as such as
192.168.1.99/24.
• <xxx_ipv6>: A colon( : )-delimited hexadecimal IPv6 address,
such as 3f2e:6a8b:78a3:0d82:1725:6a2f:0370:6234.
• <xxx_v6mask>: An IPv6 netmask, such as /96.
• <xxx_ipv6mask>: An IPv6 address and netmask separated by a
space.
• <xxx_str>: A string of characters that is not another data type,
such as P@ssw0rd. Strings containing spaces or special
characters must be surrounded in quotes or use escape
sequences.
• <xxx_int>: An integer number that is not another data type,
such as 15 for the number of minutes.
FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
13
Entering FortiBridge configuration data
Table 3: Command syntax notation (Continued)
Convention
Description
Curly braces { }
A word or series of words that is constrained to a set of options
delimited by either vertical bars or spaces.
You must enter at least one of the options, unless the set of options is
surrounded by square brackets [ ].
Options
delimited by
vertical bars |
Mutually exclusive options. For example:
{enable | disable}
indicates that you must enter either enable or disable, but must
not enter both.
Options
delimited by
spaces
Non-mutually exclusive options. For example:
{http https ping snmp ssh telnet}
indicates that you may enter all or a subset of those options, in any
order, in a space-delimited list, such as:
ping https ssh
Note: To change the options, you must re-type the entire list. For
example, to add snmp to the previous example, you would type:
ping https snmp ssh
If the option adds to or subtracts from the existing list of options,
instead of replacing it, or if the list is comma-delimited, the exception
will be noted.
Entering FortiBridge configuration data
The configuration of a FortiGate unit is stored as a series of configuration settings in the
FortiBridge configuration database. To change the configuration you can use the
web-based manager or CLI to add, delete or change configuration settings. These
configuration changes are stored in the configuration database as they are made.
Individual settings in the configuration database can be text strings, numeric values,
selections from a list of allowed options, or on/off (enable/disable).
Entering text strings (names)
Text strings are used to name entities in the configuration. For example, the name of a
firewall address, administrative user, and so on. You can enter any character in a
FortiGate configuration text string except, to prevent Cross-Site Scripting (XSS)
vulnerabilities, text strings in FortiGate configuration names cannot include the following
characters:
" (double quote), & (ampersand), ' (single quote), < (less than) and < (greater than)
You can determine the limit to the number of characters that are allowed in a text string by
determining how many characters the web-based manager or CLI allows for a given name
field. From the CLI, you can also use the tree command to view the number of
characters that are allowed. For example, firewall address names can contain up to 64
characters. When you add a firewall address to the web-based manager you are limited to
entering 64 characters in the firewall address name field. From the CLI you can do the
following to confirm that the firewall address name field allows 64 characters.
config firewall address
tree
-- [address] --*name (64)
|- subnet
|- type
|- start-ip
|- end-ip
14
FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
Registering your Fortinet product
|||||+-
fqdn (256)
cache-ttl (0,86400)
wildcard
comment (64 xss)
associated-interface (16)
color (0,32)
Note that the tree command output also shows the number of characters allowed for other
firewall address name settings. For example, the fully-qualified domain name (fqdn) field
can contain up to 256 characters.
Entering numeric values
Numeric values are used to configure various sizes, rates, numeric addresses, or other
numeric values. For example, a static routing priority of 10, a port number of 8080, or an
IP address of 10.10.10.1. Numeric values can be entered as a series of digits without
spaces or commas (for example, 10 or 64400), in dotted decimal format (for example the
IP address 10.10.10.1) or as in the case of MAC or IPv6 addresses separated by colons
(for example, the MAC address 00:09:0F:B7:37:00). Most numeric values are standard
base-10 numbers, but some fields (again such as MAC addresses) require hexadecimal
numbers.
Most web-based manager numeric value configuration fields limit the number of numeric
digits that you can add or contain extra information to make it easier to add the acceptable
number of digits and to add numbers in the allowed range. CLI help includes information
about allowed numeric value ranges. Both the web-based manager and the CLI prevent
you from entering invalid numbers.
Selecting options from a list
If a configuration field can only contain one of a number of selected options, the
web-based manager and CLI present you a list of acceptable options and you can select
one from the list. No other input is allowed. From the CLI you must spell the selection
name correctly.
Enabling or disabling options
If a configuration field can only be on or off (enabled or disabled) the web-based manager
presents a check box or other control that can only be enabled or disabled. From the CLI
you can set the option to enable or disable.
Registering your Fortinet product
Before you begin configuring and customizing features, take a moment to register your
Fortinet product at the Fortinet Technical Support web site, https://support.fortinet.com.
Many Fortinet customer services, such as firmware updates, technical support, and
FortiGuard Antivirus and other FortiGuard services, require product registration.
For more information, see the Fortinet Knowledge Center article Registration Frequently
Asked Questions.
Fortinet products End User License Agreement
See the Fortinet products End User License Agreement.
FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
15
Training
Training
Fortinet Training Services provides courses that orient you quickly to your new equipment,
and certifications to verify your knowledge level. Fortinet provides a variety of training
programs to serve the needs of our customers and partners world-wide.
To learn about the training services that Fortinet provides, visit the Fortinet Training
Services web site at http://campus.training.fortinet.com, or email training@fortinet.com.
Documentation
The Fortinet Technical Documentation web site, http://docs.fortinet.com, provides the
most up-to-date versions of Fortinet publications, as well as additional technical
documentation such as technical notes.
In addition to the Fortinet Technical Documentation web site, you can find Fortinet
technical documentation on the Fortinet Tools and Documentation CD, and on the Fortinet
Knowledge Center.
Fortinet Tools and Documentation CD
Many Fortinet publications are available on the Fortinet Tools and Documentation CD
shipped with your Fortinet product. The documents on this CD are current at shipping
time. For current versions of Fortinet documentation, visit the Fortinet Technical
Documentation web site, http://docs.fortinet.com.
Fortinet Knowledge Base
The Fortinet Knowledge Base provides additional Fortinet technical documentation, such
as troubleshooting and how-to-articles, examples, FAQs, technical notes, a glossary, and
more. Visit the Fortinet Knowledge Base at http://kb.fortinet.com.
Comments on Fortinet technical documentation
Please send information about any errors or omissions in this or any Fortinet technical
document to techdoc@fortinet.com.
Customer service and technical support
Fortinet Technical Support provides services designed to make sure that your Fortinet
products install quickly, configure easily, and operate reliably in your network.
To learn about the technical support services that Fortinet provides, visit the Fortinet
Technical Support web site at https://support.fortinet.com.
You can dramatically improve the time that it takes to resolve your technical support ticket
by providing your configuration file, a network diagram, and other specific information. For
a list of required information, see the Fortinet Knowledge Base article FortiGate
Troubleshooting Guide - Technical Support Requirements.
16
FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
config
alertemail setting
system admin
system global
log syslogd setting
system console
system interface {internal |
external}
probe probe_list {ping | http | ftp | system dns
pop3 | smtp | imap | mm1 | mm3 | get system status
mm4 | mm7}
system fail_close
probe setting
system manageip
system route
system snmp community
system accprofile
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
17
alertemail setting
config
alertemail setting
Use this command to configure the FortiBridge unit to send alert email to up to three
recipients when action on failure is set to send a alert email message.
Command syntax pattern
config alertemail setting
set <keyword> <variable>
end
config alertemail setting
unset <keyword>
get alertemail setting
show alertemail setting
Keywords and variables
Description
Default
authenticate
{disable | enable}
Enable SMTP authentication if the FortiBridge unit is
required to authenticate to connect to the SMTP
server.
disable
mailto1
<email-address_str>
Enter an email address. This is one of the email
addresses to which the FortiBridge unit sends alert
email.
No
default.
mailto2
<email-address_str>
Enter an email address. This is one of the email
addresses to which the FortiBridge unit sends alert
email.
No
default.
mailto3
<email-address_str>
Enter an email address. This is one of the email
addresses to which the FortiBridge unit sends alert
email.
No
default.
password
<password_str>
Enter the password that the FortiBridge unit needs to
access the SMTP server.
No
default.
server
{<name_str> |
<address_ipv4>}
Enter the name of the SMTP server, in the format
smtp.domain.com, to which the FortiBridge unit
should send email. The SMTP server can be located
on any network connected to the FortiBridge unit.
No
default.
username
<user-name_str>
Enter a valid email address in the format
user@domain.com. This address appears in the
From header of the alert email.
No
default.
Examples
This example shows how to configure the SMTP server and user name and password,
enable authentication and add two email addresses.
config alertemail setting
set server mail.ourcompany.com
set username fortigate@ourcompany.com
set authenticate enable
set password pwd23
set mailto1 admin1@ourcompany.com
set mailto2 admin2@ourcompany.com
end
18
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
config
alertemail setting
This example shows how to display the alertemail settings.
get alertemail setting
This example shows how to display the configuration of the alertemail setting
command.
show alertemail setting
Related Commands
•
probe setting
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
19
log syslogd setting
config
log syslogd setting
Use this command to configure the FortiBridge unit to send a syslog message to a remote
syslog server when action on failure is set to send a syslog message.
Command syntax pattern
config log syslogd setting
set <keyword> <variable>
end
config log syslogd setting
unset <keyword>
get log syslogd setting
show log syslogd setting
Keywords and variables
Description
Default
csv {disable | enable}
Enable formatting log messages in Comma
Separated Value (CSV) format. If you do not
enable CSV format the FortiBridge unit produces
plain text log messages.
disable
facility {alert | audit |
auth | authpriv | clock |
cron | daemon | ftp |
kernel | local0 | local1
| local2 | local3 |
local4 | local5 | local6
| local7 | lpr | mail |
news | ntp | syslog |
user | uucp}
Enter the facility type, which identifies the source local7
of the log message to the syslog server. You might
want to change facility to distinguish log
messages from different FortiBridge units.
port <port_integer>
Enter the port number for communication with the 514
syslog server.
server <address_ipv4>
Enter the IP address of the syslog server that
stores the logs.
status {disable | enable} Enter enable to enable logging to a remote
syslog server.
No default.
disable
Example
This example shows how to enable logging to a remote syslog server, configure an IP
address and port for the server, and enable logging in CSV format.
config log syslogd setting
set status enable
set server 220.210.200.190
set port 601
set csv enable
end
This example shows how to display the log setting for logging to a remote syslog server.
get log syslogd setting
20
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
config
log syslogd setting
This example shows how to display the configuration for logging to a remote syslog
server.
show log syslogd setting
If the show command returns you to the prompt, the settings are at default.
Related Commands
•
probe setting
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
21
probe probe_list {ping | http | ftp | pop3 | smtp | imap | mm1 | mm3 | mm4 | mm7}
config
probe probe_list {ping | http | ftp | pop3 | smtp | imap | mm1 | mm3 |
mm4 | mm7}
Use this command to configure probes for ping, HTTP, FTP, POP3, SMTP, and IMAP
traffic. Probes monitor different types of traffic. For each protocol you configure the time
interval between probes (interval) and how many lost probes are required to register a
failure (threshold). You can also enable each probe and in all cases except ping you can
specify the port used by the probe.
Command syntax pattern
config probe probe_list {ping | http | ftp | pop3 | smtp | imap
| mm1 | mm3 | mm4 | mm7}
set <keyword>
end
config probe probe_list {ping | http | ftp | pop3 | smtp | imap
| mm1 | mm3 | mm4 | mm7}
unset <keyword>
end
get probe probe_list {ping | http | ftp | pop3 | smtp | imap |
mm1 | mm3 | mm4 | mm7}
show probe probe_list {ping | http | ftp | pop3 | smtp | imap |
mm1 | mm3 | mm4 | mm7}
Keywords and variables
Description
failure_threshold
<threshold_integer>
The number of probe packets that are lost
3
before the FortiBridge unit determines that the
FortiGate unit has failed.
Default
probe_interval
<probe_integer>
The number of seconds between probe
packets.
status {disable | enable} Enable or disable sending probe packets for
the current probe protocol
test_port
<port-number_integer>
22
The port number on which the probe sends
packets for a give protocol.
1
disable
ping (none)
http 80
ftp 21
pop3 110
smtp 25
imap 143
mm1 8191
mm3 8193
mm4 8194
mm7 8197
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
config
probe probe_list {ping | http | ftp | pop3 | smtp | imap | mm1 | mm3 | mm4 | mm7}
Example
Use the following command to enable HTTP probes and change the HTTP failure
threshold to 5 and the probe interval to 3.
config probe probe_list http
set status enable
set failure_threshold 5
set probe_interval 3
end
This example shows how to display the settings for the probe probe_list command.
get probe probe_list
This example shows how to display the settings for the http probe.
get probe probe_list http
This example shows how to display the configuration for the probe probe_list
command.
show probe probe_list
Related Commands
•
probe setting
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
23
probe setting
config
probe setting
Use this command to configure how the FortiBridge unit responds when a probe
determines that the FortiGate unit has failed. You can also configure the dynamic IP
pattern used by probes and add the FortiGate serial number, which is used in FortiBridge
alert messages.
Command syntax pattern
config probe setting
set <keyword>
end
config probe setting
unset <keyword>
end
get probe setting
show probe setting
Keywords and variables
Description
Default
action_on_failure
{alertmail failcutoff
failopen snmp syslog}
Set how the FortiBridge unit responds when a
probe detects that the FortiGate unit has failed.
You can enter one or more of the action types
separated by spaces. Enter all of the action
options required. If you want to remove an option
from the list or add an option to the list, you must
retype the list with the option removed or added.
failopen
dynamic_ip_pattern
<address_ipv4>.*
Configure the INT2 and EXT2 interfaces with
none
dynamic probe IP addresses. The dynamic probe
IP addresses should not conflict with IP addresses
on the network that the FortiGate unit is
connected to. These IP addresses are not visible
from the outside network, but they should not
conflict with IP addresses in packets passing
through the FortiBridge unit. You cannot change
the dynamic IP pattern if any probes are enabled.
fgt_serial <serial_str>
The serial number of the FortiGate unit that the
FortiBridge unit is connected to. This number is
used in FortiBridge alert messages to identify the
FortiGate unit.
none
Example
Use the following command to configure the FortiBridge unit to send alert email and fail
open when a probe detects a failure, set the IP pattern to 2.2.2.* and add the
FGT8002803923050 FortiGate serial number
config probe setting
set action_on_failure alertmail failopen
set dynamic_ip_pattern 2.2.2.*
set fgt_serial FGT8002803923050
end
Related Commands
•
24
probe probe_list {ping | http | ftp | pop3 | smtp | imap | mm1 | mm3 | mm4 | mm7}
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
config
system accprofile
system accprofile
Use this command to add access profiles that control administrator access to FortiBridge
features. Each administrator account must include an access profile. You can create
access profiles that deny access to or allow read only, write only, or both read and write
access to FortiBridge features.
Command syntax pattern
config system accprofile
edit <profile-name_str>
set <keyword> <variable>
end
config system accprofile
edit <profile-name_str>
unset <keyword>
end
config system accprofile
delete <profile-name_str>
end
get system accprofile [<profile-name_str>]
show system accprofile [<profile-name_str>]
Keywords and variables
Description
admingrp {none | r | rw | w} Control administrator access to FortiBridge
administrator accounts and access profiles.
none deny access.
r read only access.
rw read write access.
w write only access.
Default
none
loggrp {none | r | rw | w}
Control administrator access to log and alert
email settings.
none deny access.
r read only access.
rw read write access.
w write only access.
none
sysgrp {none | r | rw | w}
Control administrator access to system
configuration settings.
none deny access.
r read only access.
rw read write access.
w write only access.
none
sysshutdowngrp {none | r |
rw | w}
Control administrator access to system
none
shutdown, system, reboot, and firmware upgrade
functions.
none deny access.
r read only access.
rw read write access.
w write only access.
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
25
system accprofile
config
Example
Use the following commands to add a new access profile named policy_profile that
allows read and write access system shutdown. An administrator account with this access
profile can shutdown the system and upgrade firmware.
config system accprofile
edit policy_profile
set secgrp rw
end
This example shows how to display the settings for the system accprofile command.
get system accprofile
This example shows how to display the settings for the policy_profile access profile.
get system accprofile policy_profile
This example shows how to display the configuration for the system accprofile
command.
show system accprofile
This example shows how to display the configuration for the policy_profile access
profile.
get system accprofile policy_profile
Related Commands
•
26
system admin
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
config
system admin
system admin
Use this command to add, edit, and delete administrator accounts.
Use the admin account or an account with system configuration read and write privileges
to add new administrator accounts and control their permission levels. Each administrator
account must include an access profile. You cannot delete the admin administrator
account. You cannot change the admin administrator account permissions.
Command syntax pattern
config system admin
edit <name_str>
set <keyword> <variable>
end
config system admin
edit <name_str>
unset <keyword>
end
config system admin
delete <name_str>
end
get system admin [<name_str>]
show system admin [<name_str>]
Keywords and variables
Description
Default
accprofile
<profile-name_str>
Enter the name of the access profile to assign to this
administrator account. Access profiles control
administrator access to FortiBridge features.
No
default.
password <password_str> Enter a password for the administrator account. For
improved security, the password should be at least 6
characters long.
No
default.
trusthost1
<address_ipv4mask>
An IP address or subnet address and netmask from
0.0.0.0/
which the administrator can connect to the FortiBridge 0.0.0.0
unit.
If you want the administrator to be able to access the
FortiBridge unit from any address, set one of the trusted
hosts to 0.0.0.0 and the netmask to 0.0.0.0.
trusthost2
<address_ipv4mask>
An IP address or subnet address and netmask from
0.0.0.0/
which the administrator can connect to the FortiBridge 0.0.0.0
unit.
If you want the administrator to be able to access the
FortiBridge unit from any address, set one of the trusted
hosts to 0.0.0.0 and the netmask to 0.0.0.0.
trusthost3
<address_ipv4mask>
An IP address or subnet address and netmask from
0.0.0.0/
which the administrator can connect to the FortiBridge 0.0.0.0
unit.
If you want the administrator to be able to access the
FortiBridge unit from any address, set one of the trusted
hosts to 0.0.0.0 and the netmask to 0.0.0.0.
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
27
system admin
config
Example
Use the following commands to add a new administrator account named new_admin with
the password set to p8ssw0rd and that includes an access profile named
policy_profile. Administrators that log in to this account will have administrator
access to the FortiBridge unit from any IP address.
config system admin
edit new_admin
set password p8ssw0rd
set accprofile policy_profile
end
This example shows how to display the settings for the system admin command.
get system admin
This example shows how to display the settings for the new_admin administrator
account.
get system admin new_admin
This example shows how to display the configuration for the system admin command.
show system admin
Related Commands
•
28
system accprofile
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
config
system console
system console
Use this command to set the console command mode and output setting.
Command syntax pattern
config system console
set <keyword> <variable>
end
config system console
unset <keyword>
end
get system console
show system console
Keywords and variables
Description
Default
mode {batch | line}
Set the console mode to line or batch. Used for
auto testing only.
line
output {standard | more}
Set console output to standard (no pause) or more standard
(pause after each screen, resume on keypress).
Example
This example shows how to set the number of lines per page to 25.
config system console
set page 25
end
This example shows how to display the settings for the console command.
get system console
This example shows how to display the configuration for the console command.
show system console
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
29
system dns
config
system dns
Use this command to set the DNS server addresses. Several FortiBridge functions,
including sending email alerts and URL blocking, use DNS.
On models numbered 100 and lower, you can use this command to set up DNS
forwarding.
Command syntax pattern
config system dns
set primary <address_ipv4>
set secondary <address_ipv4>
end
config system dns
unset primary
unset secondary
end
get system dns
show system dns
Keywords and variables
Description
Default
primary <address_ipv4>
Enter the primary DNS server IP address.
65.39.139.53
secondary <address_ipv4> Enter the secondary DNS IP server
address.
65.39.139.63
Example
This example shows how to set the primary FortiBridge DNS server IP address to
45.37.121.76 and the secondary FortiBridge DNS server IP address to
45.37.121.77.
config system dns
set primary 45.37.121.76
set secondary 45.37.121.77
end
This example shows how to display the settings for the system dns command.
get system dns
This example shows how to display the configuration for the system dns command.
show system dns
30
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
config
get system status
get system status
Use this command to display system status information. This command displays:
•
FortiBridge unit firmware version and build number
•
FortiBridge unit host name
•
FortiBridge unit operation mode (normal or bypass)
•
FortiBridge unit serial number
Command syntax pattern
get system status
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
31
system fail_close
config
system fail_close
Use this command to configure the fail close feature.
Command syntax pattern
config system fail_close
set <keyword> <variable>
end
config system fail_close
unset <keyword>
end
get system fail_close
show system fail_close
Keywords and variables Description
status {disable |
fail_close}
threshold
<seconds_integer>
Default
When the FortiBridge detects an upstream or
disable
downstream network disconnection (whether due to a
cut/disconnected cable, failure of the connected device,
or failure of the FortiBridge unit’s own interface), it will
bring down its own network interface after waiting the
amount of time set for the threshold variable. If the fail
close status is set to fail_close and a switch
connected to EXT1 fails, the FortiBridge would bring
down its own INT1. This way, the device connected to
INT1 will be able to determine there is a problem
Similarly, if a device connected to INT1 fails, the
FortiBridge would bring down its own EXT1.
When the problem is corrected, the FortiBridge will
enable its own network interface after waiting the amount
of time set for the threshold variable.
Enter how long, in seconds, the FortiBridge will wait after 3
detecting a network problem before activating the fail
close feature. The FortiBridge will wait the specified time
before deactivating the fail close feature when the
problem is corrected.
Example
This example shows how to enable the FortiBridge fail_close feature, and set the
threshold time to five seconds.
config system fail_close
set status fail_close
set threshold 5
end
This example shows how to display the configuration for the system fail_close
command.
show system fail_close
32
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
config
system global
system global
Use this command to configure global settings that affect various FortiBridge systems and
configurations.
Command syntax pattern
config system global
set <keyword> <variable>
end
config system global
unset <keyword>
end
get system global
show system global
Keywords and variables
Description
admintimeout
<minutes_integer>
Set the administrator idle timeout to
5
control the amount of inactive time before
the administrator must log in again. The
maximum admintimeout is 480
minutes (8 hours). To improve security
keep the idle timeout at the default value.
dst {disable | enable}
Enable or disable daylight saving time.
If you enable daylight saving time, the
FortiBridge unit adjusts the system time
when the time zone changes to daylight
saving time and back to standard time.
disable
heartbeat {disable |
enable }
For future use.
disable
hostname <name_str>
Type a name for this FortiBridge unit.
FortiBridge model
name.
interface-speed {100full
| 100half | 10full |
10half | auto }
This command is only available for the
FBG-2002.
Set the network interface speed or allow
each interface to auto-sense the correct
speed. Set to auto, each FortiBridge
network interface will autosense the
correct speed and adjust accordingly. If
the interface-speed command is
used to specify a speed, all FortiBridge
interfaces are locked to the selected
speed.
Although the FortiBridge supports
10/100/1000mbps speeds when set to
auto, 1000half and 1000full are not
available for manual selection.
auto
ntpserver {<name_str> |
<address_ipv4>}
Enter the domain name or IP address of
a Network Time Protocol (NTP) server.
132.246.168.148
ntpsync {disable |
enable}
Enable or disable automatically updating disable
the system date and time by connecting
to a Network Time Protocol (NTP) server.
For more information about NTP and to
find the IP address of an NTP server that
you can use, see http://www.ntp.org.
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
Default
33
system global
config
Keywords and variables
Description
Default
syncinterval
<minutes_integer>
Enter how often, in minutes, the
60
FortiGate unit should synchronize its time
with the Network Time Protocol (NTP)
server. The syncinterval number can
be 1 to 1440; 0 disables time
synchronization.
timezone
<timezone_integer>
The number corresponding to your time 00
zone. Press ? to list time zones and their
numbers. Choose the time zone for the
FortiBridge unit from the list and enter the
correct number.
Example
This example shows how to set the FortiBridge system timezone, add the IP address of an
NTP server, and enable synchronization with the NTP server. The IP address of the NTP
server is 192.168.20.1.
config system global
set timezone 16
set ntpserver 192.168.20.1
set ntpsync enable
end
This example shows how to display the settings for the system global command.
get system global
This example shows how to display the configuration for the system global command.
show system global
34
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
config
system interface {internal | external}
system interface {internal | external}
Use this command to configure management access to the FortiBridge internal or external
interface. The internal interface in the INT1 interface. The external interface is the EXT1
interface.
Command syntax pattern
Entering a name string for the edit keyword that is not the name of a physical interface
adds a VLAN subinterface.
config system interface {internal | external}
set <keyword> <variable>
end
config system interface {internal | external}
unset <keyword>
end
get system interface <name_str>
show system interface <name_str>
Keywords and variables
Description
Default
allowaccess {ping
ssh telnet}
Allow management access to the interface. You can enter
one or more of the management access types separated
by spaces. Enter all the management access options for
the interface. Use a space to separate the options. If you
want to remove an option from the list or add an option to
the list, you must retype the list with the option removed or
added.
INT1
(internal)
ping,
ssh,
telnet
EXT1
(external)
none
Example
This example shows how to set management access for the INT1 interface to ping, and
ssh.
config system interface internal
set allowaccess ping ssh
end
This example shows how to display the settings for the INT1interface.
get system interface internal
This example shows how to display the configuration for the INT1interface.
show system interface internal
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
35
system manageip
config
system manageip
Configure the FortiBridge management IP address. Use the management IP address for
management access to the FortiBridge unit.
Command syntax pattern
config system manageip
set <keyword> <variable>
end
config system manageip
unset <keyword>
end
get system manageip
show system manageip
Keywords and variables
Description
Default
ip <address_ipv4mask>
Set the IP address and netmask of the
FortiBridge management interface.
192.168.1.99
255.255.255.0
Example
This example shows how to set the management IP address to 192.168.2.80 and the
netmask to 255.255.255.0.
config system manageip
set ip 192.168.2.80 255.255.255.0
end
This example shows how to display the settings for the manageip command.
get system manageip
This example shows how to display the configuration for the manageip command.
show system manageip
Related Commands
•
36
system interface {internal | external}
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
config
system route
system route
Use this command to add or edit FortiBridge static routes.
Command syntax pattern
config system route
edit <sequence_integer>
set <keyword> <variable>
end
config router static
unset <keyword>
get system route
show system route
Keywords and variables
Description
distance
<distance_integer>
The administrative distance for the route. Using
10
administrative distance you can specify the relative
priorities of different routes to the same destination. A
lower administrative distance indicates a more preferred
route. Distance can be an integer from 1-255.
Default
dst <destinationaddress_ipv4mask>
The destination IP address and netmask for this route.
0.0.0.0
Enter 0.0.0.0 0.0.0.0 for the destination IP address 0.0.0.0
and netmask to add a default route.
gateway <gatewayaddress_ipv4>
The IP address of the first next hop router to which this
route directs traffic.
No
default.
Example
This example shows how to edit a FortiBridge static route.
config system route
edit 2
set dst 192.168.22.0 255.255.255.0
set gateway 192.168.22.44
end
This example shows how to display the list of static route numbers.
get system route
This example shows how to display the settings for static route 2.
get system route 2
This example shows how to display the static route configuration.
show system route
This example shows how to display the configuration for static route 2.
show system route 2
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
37
system snmp community
config
system snmp community
Use this command to configure SNMP communities. Add SNMP communities so that the
FortiBridge unit can send SNMP v1 and v2c traps to SNMP managers when action on
failure is set to send SNMP traps. You can add up to three SNMP communities. Each
community can have a different configuration for SNMP traps. You can also the add IP
addresses of up to 8 SNMP managers to each community.
Command syntax pattern
config system snmp community
edit <id_integer>
set <keyword> <variable>
end
config system snmp community
edit <id_integer>
unset <keyword>
end
config system snmp community
delete <id_integer>
end
get system snmp community [<id_integer>]
show system snmp community [<id_integer>]
The config system snmp community command has one subcommand.
config hosts
Keywords and variables
Description
Default
name <name_str>
The name of the SNMP community.
No default.
status {disable | enable} Enable or disable the SNMP community.
38
enable
trap_v1_lport
<local-port_integer>
SNMP v1 local port number used for sending
162
traps to the SNMP managers added to this SNMP
community.
trap_v1_rport
<remote-port_integer>
SNMP v1 remote port number used for sending
162
traps to the SNMP managers added to this SNMP
community.
trap_v1_status
| enable}
Enable or disable SNMP v1 traps for this SNMP
community.
{disable
enable
trap_v2c_lport
<local-port_integer>
SNMP v2c local port number used for sending
162
traps to the SNMP managers added to this SNMP
community.
trap_v2c_rport
<remote-port_integer>
SNMP v2c remote port number used for sending 162
traps to the SNMP managers added to this SNMP
community.
trap_v2c_status {disable
| enable}
Enable or disable SNMP v2c traps for this SNMP enable
community.
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
config
system snmp community
config hosts
Access the hosts subcommand using the snmp community command. Use this
command to add SNMP manager IP addresses to an SNMP community.
Command syntax pattern
config hosts
edit <id_integer>
set <keyword> <variable>
end
config hosts
edit <id_integer>
unset <keyword>
end
config hosts
delete <id_integer>
end
get system snmp community [<id_integer>]
show system snmp community [<id_integer>]
Keywords and variables
Description
Default
ip <address_ipv4>
The IP address of the SNMP manager.
0.0.0.0
Example
This example shows how to add a new SNMP community named SNMP_Com1. The
default configuration can be used in most cases with only a few modifications. In the
example below the community is added, given a name, and then because this community
is for an SNMP manager that is SNMP v1 compatible, v2c functionality is disabled. After
the community is configured the SNMP manager is added. The SNMP manager IP
address is 192.168.20.34.
config system snmp community
edit 1
set name SNMP_Com1
set trap_v2c_status disable
config hosts
edit 1
set ip 192.168.10.34
end
end
This example shows how to display the settings for the system snmp community
command.
get system snmp community
This example shows how to display the settings for the SNMP community with ID 1.
get system snmp community 1
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
39
system snmp community
config
This example shows how to display the configuration for the snmp community
command.
show system snmp community
This example shows how to display the configuration for the SNMP community with ID 1.
show system snmp community 1
40
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
execute
backup
reboot
date
restore
factoryreset
switch-mode
ping
time
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
41
backup
execute
backup
Backup the FortiBridge configuration to a file on a TFTP server.
Command syntax
execute backup config <filename_str> <tftp-server_ipv4>
Keywords and variables
Description
config
Back up the FortiBridge configuration.
<filename_str>
The name to give the file that is copied to the TFTP
server.
<tftp-server_ipv4>
The TFTP server IP address.
Example
This example shows how to backup a system configuration file from the FortiBridge unit to
a TFTP server. The name to give the configuration file on the TFTP server is fbdg.cfg.
The IP address of the TFTP server is 192.168.1.23.
execute backup config fbdg.cfg 192.168.1.23
42
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
execute
date
date
Get or set the system date.
Command syntax
execute date [<date_str>]
date_str has the form mm/dd/yyyy, where
•
mm is the month and can be 01 to 12
•
dd is the day of the month and can be 01 to 31
•
yyyy is the year and can be 2001 to 2100
If you do not specify a date, the command returns the current system date.
Example
This example sets the date to 17 September 2004:
execute date 09/17/2004
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
43
factoryreset
execute
factoryreset
Reset the FortiBridge configuration to factory default settings.
Command syntax
execute factoryreset
Caution: This procedure deletes all changes that you have made to the FortiBridge
configuration and reverts the system to its original configuration, including resetting the
management IP address.
44
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
execute
ping
ping
Send five ICMP echo requests (pings) to test the network connection between the
FortiBridge unit and another network device.
Command syntax
execute ping {<address_ipv4> | <host-name_str>}
Example
This example shows how to ping a host with the IP address 192.168.1.23.
execute ping 192.168.1.23
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
45
reboot
execute
reboot
Restart the FortiBridge unit.
Command syntax
execute reboot
46
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
execute
restore
restore
Use this command to restore a backup configuration and to change the FortiBridge
firmware.
Command syntax
execute restore config <filename_str> <tftp-server_ipv4>
execute restore image <filename_str> <tftp-server_ipv4>
Keywords and variables
Description
config
Restore a system configuration. The new configuration
replaces the existing configuration, including administrator
accounts and passwords.
image
Upload a firmware image from a TFTP server to the
FortiBridge unit. The FortiBridge unit reboots, loading the new
firmware.
<filename_str>
The name of file that is uploaded from the TFTP server.
<tftp-server_ipv4>
The TFTP server IP address.
Example
This example shows how to upload a configuration file from a TFTP server to the
FortiBridge unit and restart the FortiBridge unit with this configuration. The name of the
configuration file on the TFTP server is backupconfig. The IP address of the TFTP
server is 192.168.1.23.
execute restore config backupconfig 192.168.1.23
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
47
switch-mode
execute
switch-mode
Use this command to switch between bypass and normal mode.
Command syntax
execute switch-mode
48
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
execute
time
time
Get or set the system time.
Command syntax
execute time [<time_str>]
time_str has the form hh:mm:ss, where
•
hh is the hour and can be 00 to 23
•
mm is the minutes and can be 00 to 59
•
ss is the seconds and can be 00 to 59
If you do not specify a time, the command returns the current system time.
Example
This example sets the system time to 15:31:03:
execute time 15:31:03
FortiBridge 3.0: FortiBridge CLI Reference
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
49
time
50
execute
FortiBridge CLI Reference for FortiBridge 3.0
09-300-133020-20101109
http://docs.fortinet.com/ • Feedback
Download