FortiOS 5.6 Getting Started
FortiOS 5.6 Getting Started
FortiOS 5.6 Getting Started
2
1
FORTINET VIDEO GUIDE
https://video.fortinet.com
FORTINET KNOWLEDGE BASE
http://kb.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
CUSTOMER SERVICE & SUPPORT
https://support.fortinet.com
FORTIGUARD CENTER
https://fortiguard.com
FORTICAST
http://forticast.fortinet.com
https://www.fortinet.com/corporate/about-us/privacy.html
FEEDBACK
Email: [email protected]
01-566-142188-20180913
TABLE OF CONTENTS
Change log 7
Getting started 8
Differences between Models 8
What's New in FortiOS 5.6 9
FortiOS 5.6.3 9
Administrator password changes (414927) 9
Support FortiOS to allow user to select domain when logging a FG into FortiCloud
(452350) 9
FortiOS 5.6.1 9
VM License visibility improvement (423347) 9
FortiView Dashboard Widget (434179) 10
Controls added to GUI CLI console (422623) 11
FortiExplorer icon enhancement (423838) 11
FortiOS 5.6 11
Licenses 14
FortiCloud 14
Fortinet Security Fabric 15
Administrators 15
CPU 16
Memory 16
Sessions 17
Bandwidth 17
Virtual Machine 18
Changing inspection modes (flow-based or proxy-based) 18
Transparent Web proxy mode 19
NGFW profile-based and NGFW policy-based modes 19
Change to CLI console (396225) 20
System Information Dashboard widget WAN IP Information enhancement (401464) 20
CLI and GUI changes to display FortiCare registration information (395254) 20
Improved GUI for Mobile Screen Size & Touch Interface (355558) 21
Setup Wizard removed 21
Installation 22
Quick installation using DHCP 23
Installing a FortiGate in NAT mode 24
NAT mode vs. Transparent mode 24
Standard installation in NAT mode 24
Redundant Internet installation 25
Using a Virtual Wire Pair 26
Using the GUI 28
Connecting to the GUI using a web browser 28
Menus 29
Dashboard 31
Feature Visibility 34
Enabling/disabling features 34
Security Features Presets 34
Tables 35
Navigation 35
Filters 35
Column settings 35
Copying objects 35
Editing objects 36
Text Strings 37
Entering text strings (names) 37
Entering numeric values 38
Using the CLI 39
Connecting to the CLI 39
Connecting to the CLI using a local console 39
Enabling access to the CLI through the network (SSH or Telnet) 40
Connecting to the CLI using SSH 41
Connecting to the CLI using Telnet 42
CLI-only features 43
Command syntax 44
Terminology 44
Indentation 45
Notation 45
Sub-commands 47
Example of table commands 49
Permissions 52
Increasing the security of administrator accounts 52
Tips 53
FortiExplorer for iOS 61
Getting started with FortiExplorer 61
Connecting FortiExplorer to a FortiGate via USB 61
Connecting FortiExplorer to a FortiGate via WiFi 65
Upgrading to FortiExplorer Pro 66
LED Specifications 67
Sample FortiGate faceplates 67
LED status codes 68
About alarm levels 69
LED status codes for ports 70
Inspection Mode 71
Changing inspection and policy modes 71
NGFW policy mode 71
Proxy mode and flow mode antivirus and web filter profile options 73
Basic Administration 75
Registration 75
System Settings 75
Default administrator password 75
Settings 76
Administrator password retries and lockout time 78
Passwords 79
Password policy 80
Firmware 81
Backing up the current configuration 81
Downloading firmware 81
Testing new firmware 82
Upgrading the firmware 83
Reverting to a previous firmware version 85
Installing firmware from a system reboot - CLI 86
Restoring firmware from a USB key - CLI 87
Configuration revision 88
Controlled upgrade 88
Configuration Backups 88
Backing up the configuration using the GUI 89
Backing up the configuration using the CLI 89
Backup and restore the local certificates 90
Restore a configuration 90
Configuration revision 91
Restore factory defaults 92
FortiGuard 92
Support Contract and FortiGuard Subscription Services 93
Verifying your connection to FortiGuard 93
Configuring AntiVirus and IPS Options 95
Manual updates 96
Automatic updates 96
Sending malware statistics to FortiGuard 98
Configuring Web Filtering and Email Filtering Options 98
Email filtering 98
Online Security Tools 99
FortiCloud 99
Registration and Activation 100
Enabling logging to FortiCloud 100
Logging into the FortiCloud portal 101
Cloud Sandboxing 101
Troubleshooting your FortiGate Installation 102
Resources 104
Best Practices 104
The Fortinet Video Library 104
The FortiOS Handbook 104
Change log
November 19, 2018 Removed details about using SCP and included links to the KB article How to
download/upload a FortiGate configuration file using secure file copy (SCP).
September 10, 2018 Correction to "Restoring firmware from a USB key - CLI" on page 87.
December 7, 2017 Made change to table in Inspection Mode section (Mantis 462280)
October 11, 2017 Added detail to Dashboard in Using the GUI section.
September 7, 2017 Edited Administrator password retries and lockout time in System Settings.
August 18, 2017 Added new information for features first appearing FortiOS 5.6.1 and added link
to Fortinet Cookbook Hardware page to the Getting Started Introduction.
July 27, 2017 FortiOS 5.6.1 document release. See "FortiOS 5.6.1" on page 9
April 26, 2017 Removed some extra text from page 15.
April 20, 2017 FortiOS 5.6 document release. See "FortiOS 5.6" on page 11
Getting Started 7
Fortinet Technologies Inc.
Getting started
This guide explains how to get started with a FortiGate, and examines basic configuration tasks and best
practices in these sections:
Before you get started, note that not all FortiGate models have the same features. This is especially true of the
desktop or entry-level models: FortiGate / FortiWiFi models 30 to 90. If you are using one of these FortiGate
models, you may have some difficulties accessing certain features.
The entry-level, or desktop, models can connect to the internet in two simple steps. They also have a number of
features that are only available using the CLI, rather than appearing in the GUI.
Consult your model's Quick Start Guide, hardware manual, or the Feature / Platform
Matrix for further information about features that vary by model.
FortiGate models differ principally by the names used and the features available:
l Naming conventions may vary between FortiGate models. For example, on some models the hardware switch
interface used for the local area network is called lan, while on other units it is called internal.
l Certain features are not available on all models. Additionally, a particular feature may be available only through the
CLI on some models, while that same feature may be viewed in the GUI on other models.
If you believe your FortiGate model supports a feature that does not appear in the GUI, go to System
> Feature Visibility and confirm that the feature is enabled. For more information, see Feature Visibility on
page 34.
8 Getting Started
Fortinet Technologies Inc.
What's New in FortiOS 5.6
This chapter describes new features added to FortiOS 5.6.0, 5.6.1, and 5.6.3.
FortiOS 5.6.3
l Added inline validation for checking password policy and password reuse
l Changed style to match new login prompt password change
l Fixed issue where fDialog would close slide out on submission failure
Support FortiOS to allow user to select domain when logging a FG into FortiCloud
(452350)
Support has been added to show a list of all possible FortiCloud domains that the FortiGate can be served by.
Syntax
execute fortiguard-log domain
This command is typically used for testing purposes, and so it will not appear when entering execute
fortiguard-log ?.
FortiOS 5.6.1
Getting Started 9
Fortinet Technologies Inc.
FortiOS 5.6.1 What's New in FortiOS 5.6
l If the VM is in evaluation mode, it is yellow (warning style) and the dashboard show evaluation days used.
l Widget is shown by default in the dashboard of a FortiOS VM device.
l Removed VM information from License widget at Global > Dashboard.
l License info and Upload License button provided on page Global > System > FortiGuard.
l Updated 'Upload VM License' page:
l Added license RAM usage and VMX instance usage.
l Replaced file input component.
CLI Syntax
config sys admin
edit <name>
config gui-dashboard
edit <1>
set name <name>
config widget
edit <2>
set type {vminfo | ...} <- new option
set x-pos <2>
set y-pos <1>
set width <1>
set height <1>
next
end
next
end
next
end
Supported FortiViews include Source, Destination, Application, Country, Interfaces, Policy, Wifi Client, Traffic
Shaper, Endpoint Vulnerability, Cloud User, Threats, VPN, Websites, and Admin and System Events.
Bubble, table, chord chart, and country visualizations are supported in the widget.
Syntax
config system admin
config gui-dashboard
config widget
set type fortiview
set report-by {source | destination | country | intfpair | srcintf | dstintf |
policy | wificlient | shaper | endpoint | application | cloud | web | threat
| system | unauth | admin | vpn}
set timeframe {realtime | 5min | hour | day | week}
set sort-by <string>
set visualization {table | bubble | country | chord}
config filters
set key <filter_key>
10 Getting Started
Fortinet Technologies Inc.
What's New in FortiOS 5.6 FortiOS 5.6
Where:
The following locations were affected: Policy List, Policy Dialogue, Address List, Address Dialogue, Virtual IP list,
Virtual IP Dialogue.
FortiOS 5.6
The FortiOS 5.6 Dashboard has a new layout with a Network Operations Center (NOC) view with a focus on
alerts. Widgets are interactive; by clicking or hovering over most widgets, the user can get additional information
or follow links to other pages.
Getting Started 11
Fortinet Technologies Inc.
FortiOS 5.6 What's New in FortiOS 5.6
Features that were only visible through old dashboard widgets have been placed elsewhere in the GUI:
l Restore configuration.
l Configuration revisions.
l Firmware management.
l Enabling / disabling VDOMs.
l Changing inspection mode.
l Changing operation mode.
l Shutdown / restart device.
l Changing hostname.
l Changing system time.
The following widgets are displayed by default:
l System Information
l Licenses
l FortiCloud
l Security Fabric
l Administrators
l CPU
l Memory
l Sessions
l Bandwidth
l Virtual Machine (on VMs and new to FortiOS 5.6.1)
The following optional widgets are available:
12 Getting Started
Fortinet Technologies Inc.
What's New in FortiOS 5.6 FortiOS 5.6
l Interface Bandwidth
l Disk Usage
l Security Fabric Risk
l Advanced Threat Protection Statistics
l Log Rate
l Session Rate
l Sensor Information
l HA Status
l Host Scan Summary
l Vulnerabilities Summary
l FortiView (new to FortiOS 5.6.1)
The following widgets have been removed:
l CLI Console
l Unit Operation
l Alert Message Console
System Information
Getting Started 13
Fortinet Technologies Inc.
FortiOS 5.6 What's New in FortiOS 5.6
Licenses
Hovering over the Licenses widget will cause status information (and, where applicable, database information)
on the licenses to be displayed for FortiCare Support, IPS & Application Control, AntiVirus, Web
Filtering, Mobile Malware, and FortiClient. The image below shows FortiCare Support information along
with the registrant's company name and industry.
Clicking in the Licenses widget will provide you with links to other pages, such as System > FortiGuard or
contract renewal pages.
FortiCloud
This widget displays FortiCloud status and provides a link to activate FortiCloud.
14 Getting Started
Fortinet Technologies Inc.
What's New in FortiOS 5.6 FortiOS 5.6
Administrators
This widget allows you to view which administrators are logged in and how many sessions are active. The link
directs you to a page displaying active administrator sessions.
Getting Started 15
Fortinet Technologies Inc.
FortiOS 5.6 What's New in FortiOS 5.6
CPU
The real-time CPU usage is displayed for different timeframes.
Memory
Real-time memory usage is displayed for different time frames. Hovering over any point on the graph displays
percentage of memory used along with a timestamp.
16 Getting Started
Fortinet Technologies Inc.
What's New in FortiOS 5.6 FortiOS 5.6
Sessions
Bandwidth
Getting Started 17
Fortinet Technologies Inc.
Changing inspection modes (flow-based or proxy-based) What's New in FortiOS 5.6
Virtual Machine
To change inspection modes, go to System > Settings and scroll down to Inspection Mode. You can select
Flow-based to operate in Flow mode or Proxy to operate in Proxy mode. Flow-based inspection is the default
inspection mode for FortiOS 5.6.
18 Getting Started
Fortinet Technologies Inc.
What's New in FortiOS 5.6 Transparent Web proxy mode
In proxy mode, FortiOS 5.6 functions just like FortiOS 5.4 with the addition of the new Transparent Web Proxy
mode. See New Operating mode for Transparent web proxy (386474) on page 1.
When you use Flow-based as the Inspection Mode, you have the option in FortiOS 5.6 to select an NGFW
Mode. Profile-based mode works the same as flow-based mode did in FortiOS 5.4
Flow-based inspection with profile-based NGFW mode is the default in FortiOS 5.6.
In the new NGFW Policy-based mode, you add applications and web filtering profiles directly to a policy without
having to first create and configure Application Control or Web Filtering profiles. When selecting NGFW policy-
based mode you can also select the SSL/SSH Inspection mode that is applied to all policies. See NGFW Policy
Mode (371602) on page 1.
When you use flow-based inspection, all proxy mode profiles are converted to flow mode, removing any proxy
settings. And proxy-mode only features (for example, Web Application Profile) are removed from the GUI.
If your FortiGate has multiple VDOMs, you can set the inspection mode independently for each VDOM. Go to
System > VDOM. Click Edit for the VDOM you wish to change and select the Inspection Mode.
CLI syntax
The following CLI commands can be used to configure inspection and policy modes:
config system settings
set inspection-mode {proxy | flow}
set policy-mode {standard | ngfw}
end
Getting Started 19
Fortinet Technologies Inc.
NGFW profile-based and NGFW policy-based modes What's New in FortiOS 5.6
GUI Changes
l Add industry and organization size to FortiCare registration page
l Add company and industry to license widget tooltip for FortiCare
When you hover over the Licenses widget in the FortiOS 5.6 dashboard, you can see the company and industry
data, provided it has been entered in the FortiCare profile.
20 Getting Started
Fortinet Technologies Inc.
What's New in FortiOS 5.6 NGFW profile-based and NGFW policy-based modes
CLI Changes
Commands are added to diagnose forticare
dia forticare direct-registration product-registration -h
Options: a:A:y:C:c:T:eF:f:hI:i:l:O:o:p:P:z:R:r:S:s:t:v:
--<long> -<short>
account_id a:
address A:
city y:
company C:
contract_number c:
country_code T:
existing_account e
fax F:
first_name f:
help h
industry I:
industry_id i:
last_name l:
orgsize O:
orgsize_id o:
password p:
phone P:
postal_code z:
reseller R:
reseller_id r:
state S:
state_code s:
title t:
version v:
Improved GUI for Mobile Screen Size & Touch Interface (355558)
The FortiOS web GUI on mobile screens and include functionality for touch interfaces like tap to hold are
improved.
Previously, the Setup Wizard could be launched from the web GUI by selecting the button, located in the top
right corner. This button and the wizard in question has been removed.
Getting Started 21
Fortinet Technologies Inc.
Installation
This section discusses how to install your FortiGate and use it in your network, after completion of the initial setup
outlined in the FortiGate model’s Quick Start Guide.
22 Getting Started
Fortinet Technologies Inc.
Installation Quick installation using DHCP
Most of the FortiGate desktop models have a default configuration that includes a DHCP server on the lan (or
internal) interface and a security policy that securely allows all sessions from the internal network to reach the
Internet. Because of this, you can connect your desktop FortiGate to the Internet in two simple steps:
Note that, in order to use this installation method, your ISP must provide connectivity
with DHCP and accept DHCP requests without authentication. You must also use IPv4
to connect your FortiGate to the Internet.
1. Connect the FortiGate's wan interface to your ISP-supplied equipment, and connect the internal network to the
FortiGate’s default lan interface. Turn on the ISP’s equipment, the FortiGate, and the computers on the internal
network.
2. For computers on the internal network:
a. Windows Vista/7/8/10 users:
i. Go to Network and Sharing Center and select Change adapter settings.
ii. Open the Local Area Connection (Ethernet or Wi-Fi, whichever applies) and select Properties.
iii. Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
iv. Select Obtain an IP address automatically and Obtain DNS server address automatically.
v. Click OK.
b. Mac OS X users:
i. Go to System Preferences > Network and select your Ethernet connection.
ii. Set Configure IPv4 to Using DHCP.
Results
From any computer on the internal network, open a web browser and browse to any website to confirm successful
Internet connectivity.
Getting Started 23
Fortinet Technologies Inc.
Installing a FortiGate in NAT mode Installation
There are two main ways to install a FortiGate using network address translation (NAT)/Route mode: Standard
installation in NAT mode, where Internet access is provided by a single Internet service provider (ISP), and
Redundant Internet installation, where two ISPs are used.
The most common of the two operating modes is NAT mode, where a FortiGate is installed as a gateway or
router between two networks. In most cases, it is used between a private network and the Internet. This allows
the FortiGate to hide the IP addresses of the private network using NAT. NAT mode is also used when two or
more ISPs provide the FortiGate with redundant Internet connections.
A FortiGate in Transparent mode is installed between the internal network and the router. In this mode, the
FortiGate does not make any changes to IP addresses and only applies security scanning to traffic. When a
FortiGate is added to a network in Transparent mode, no network changes are required, except to provide the
FortiGate with a management IP address. Transparent mode is used primarily when there is a need to increase
network protection but changing the configuration of the network itself is impractical.
For more information about Transparent Mode, see the Transparent Mode handbook.
24 Getting Started
Fortinet Technologies Inc.
Installation Installing a FortiGate in NAT mode
If you have previously configured your FortiGate using the standard installation, you
will have to delete all routes and policies referring to an interface that will be used to
provide redundant Internet. This includes the default Internet access policy that is
included on many FortiGate models.
1. Connect your ISP devices to your FortiGate’s Internet-facing interfaces (typically WAN1 and WAN2).
2. Go to Network > SD-WAN to create a WAN link interface, which is used to group multiple Internet connections
together so that the FortiGate can treat them as a single interface.
3. Set the interface's Status to Enable.
4. Under Interface, select Create New. Add WAN1 and enter the Gateway IP provided by your primary ISP. Do the
same for WAN2, but use the Gateway IP provided by your secondary ISP.
5. Select an appropriate method for the SD-WAN Usage from the following options, and Apply your changes when
finished:
l Bandwidth - A bandwidth cap is defined for active members of the SD WAN link.
l Volume - A volume ratio is set for each active member.
l Sessions - A sessions ratio is set for each active member.
6. Go to Network > Static Routes and create a new default route. Set Interface to the SD-WAN link.
7. Go to Policy & Objects > IPv4 Policy and select Create New to add a security policy that allows users on the
private network to access the Internet.
Getting Started 25
Fortinet Technologies Inc.
Using a Virtual Wire Pair Installation
A virtual wire pair consists of two interfaces that do not have IP addressing and are treated similar to a
transparent mode VDOM. All traffic received by one interface in the virtual wire pair can only be forwarded out the
other interface, provided that a virtual wire pair firewall policy allows this traffic. Traffic from other interfaces
cannot be routed to the interfaces in a virtual wire pair.
Virtual wire pairs are useful for atypical topologies where MAC addresses do not behave normally. For example,
port pairing can be used in a Direct Server Return (DSR) topology where the response MAC address pair may not
match the request’s MAC address pair.
Virtual wire pairing replaces the port pairing feature available in earlier firmware versions. Unlike port pairing,
virtual wire pairing can be used for FortiGates in both NAT and Transparent modes.
In the example configuration below, a virtual wire pair (consisting of port3 and port4) makes it easier to protect a
web server that is behind a FortiGate operating as an Internal Segmentation Firewall (ISFW). Users on the
internal network will access the web server through the ISFW over the virtual wire pair.
Interfaces used in a virtual wire pair cannot be used to access the ISFW FortiGate.
Before creating a virtual wire pair, make sure you have a different port configured to
allow admin access using your preferred protocol.
1. Go to Network > Interfaces and select Create New > Virtual Wire Pair.
2. Select the interfaces to add to the virtual wire pair. These interfaces cannot be part of a switch, such as the default
lan/internal interface.
3. (Optional) If desired, enable Wildcard VLAN .
4. Select OK.
5. Go to Policy & Objects > IPv4 Virtual Wire Pair Policy, select the virtual wire pair, and select Create New.
6. Select the direction that traffic is allowed to flow.
7. Configure the other firewall options as desired.
8. Select OK.
9. If necessary, create a second virtual wire pair policy to allow traffic to flow in the opposite direction.
26 Getting Started
Fortinet Technologies Inc.
Installation Using a Virtual Wire Pair
If you have a USB-wan interface, it will not be included in the interface list when
building a wired-pair.
Results
Traffic can now flow through the FortiGate using the virtual wire pair.
Getting Started 27
Fortinet Technologies Inc.
Using the GUI
This section presents an introduction to the FortiGate's graphical user interface (GUI), also called the web-based
manager.
The graphical user interface is best displayed using a 1280 x 1024 resolution. Check
the FortiOS Release Notes for information about browser compatibility.
In order to connect to the GUI using a web browser, an interface must be configured to allow administrative
access over HTTPS or over both HTTPS and HTTP. By default, an interface has already been set up that allows
HTTPS access, with the IP address 192.168.1.99.
Browse to https://192.168.1.99 and enter your username and password. If you have not changed the admin
account’s password, use the default user name, admin, and leave the password field blank.
If you wish to use a different interface to access the GUI, do the following:
1. Go to Network > Interfaces and edit the interface you wish to use for access. Take note of its assigned IP
address.
2. Beside Administrative Access, select HTTPS, and any other protocol you require. You can also select HTTP,
although this is not recommended as the connection will be less secure.
3. Select OK.
4. Browse to the IP address using your chosen protocol.
Results
28 Getting Started
Fortinet Technologies Inc.
Using the GUI Menus
Menus
If you believe your FortiGate model supports a menu that does not appear in the GUI
as expected, go to System > Feature Visibility and ensure the feature is enabled.
For more information, see "Feature Visibility" on page 34.
The GUI contains the following main menus, which provide access to configuration options for most FortiOS
features:
Dashboard The dashboard displays various widgets that display important system
information and allow you to configure some system options.
Security Fabric Access the physical topology, logical topology, audit, and settings features
of the Fortinet Security Fabric.
FortiView A collection of dashboards and logs that give insight into network traffic,
showing which users are creating the most traffic, what sort of traffic it is,
when the traffic occurs, and what kind of threat the traffic may pose to the
network.
Policy & Objects Configure firewall policies, protocol options, and supporting content for
policies, including schedules, firewall addresses, and traffic shapers.
Security Profiles Configure your FortiGate's security features, including AntiVirus, Web
Filtering, and Application Control.
Getting Started 29
Fortinet Technologies Inc.
Menus Using the GUI
VPN Configure options for IPsec and SSL virtual private networks (VPNs).
For more information, see the IPsec VPN and SSL VPN handbooks.
User & Device Configure user accounts, groups, and authentication methods, including
external authentication and single sign-on (SSO).
WiFi & Switch Controller Configure the unit to act as a wireless network controller, managing the
wireless Access Point (AP) functionality of FortiWiFi and FortiAP units.
For more information, see the FortiWiFi and FortiAP Configuration Guide
handbook.
Monitor View a variety of monitors, including the Routing Monitor, VPN monitors for
both IPsec and SSL, monitors relating to wireless networking, and more.
30 Getting Started
Fortinet Technologies Inc.
Using the GUI Dashboard
Dashboard
The FortiOS Dashboard consists of a network operations center (NOC) view with a focus on alerts. Widgets are
interactive; by clicking or hovering over most widgets, the user can get additional information or follow links to
other pages.
Widget Description
System Information The System Information widget lists information relevant to the FortiGate
system, including Hostname, Serial Number, and Firmware.
Security Fabric The Security Fabric widget is documented in the Fortinet Security Fabric guide.
CPU The real-time CPU usage is displayed for different time frames.
Getting Started 31
Fortinet Technologies Inc.
Dashboard Using the GUI
Widget Description
License Status Hovering over the Licenses widget will display status information (and, where
applicable, database information) on the licenses for FortiCare Support, IPS &
Application Control, AntiVirus, Web Filtering, Mobile Malware, and
FortiClient.
Clicking in the Licenses widget will provide you with links to other pages, such as
System > FortiGuard or contract renewal pages.
FortiCloud This widget displays FortiCloud status and provides a link to activate FortiCloud.
Administrators This widget allows you to view which administrators are logged in and how many
sessions are active. The link directs you to a page displaying active administrator
sessions.
Memory Real-time memory usage is displayed for different time frames. Hovering over any
point on the graph displays percentage of memory used along with a timestamp.
Sessions Hovering over the Sessions widget allows you to view memory usage data over
time. Click on the down-arrow to change the timeframe displayed.
Bandwidth Hover over the Bandwidth widget to display bandwidth usage data over time.
Click on the down-arrow to change the timeframe displayed.
Virtual Machine The VM widget (shown by default in the dashboard of a FortiOS VM device)
includes:
l FortiView
l Host Scan Summary
l Vulnerabilities Summary
l Botnet Activity
l HA Status
l Log Rate
32 Getting Started
Fortinet Technologies Inc.
Using the GUI Dashboard
l Session Rate
l Security Fabric Score
l Advanced Threat Protection Statistics
l Interface Bandwidth
Getting Started 33
Fortinet Technologies Inc.
Feature Visibility Using the GUI
Feature Visibility
Feature Visibility is used to control which features are visible in the GUI. This allows you to hide features that are
not being used. Some features are also disabled by default and must be enabled in order to configure them
through the GUI.
Feature Visibility only alters the visibility of these features, rather than their functionality. For example, disabling
web filtering on the Feature Visibility page does not remove web filtering from the FortiGate, but removes the
option of configuring web filtering from the GUI. Configuration options will still be available using the CLI.
Enabling/disabling features
Feature Visibility can be found at System > Feature Visibility. Ensure that all features you wish to configure in
the GUI are turned on, and that features you wish to hide are turned off. When you have finished, select Apply.
l NGFW should be chosen for networks that require application control and protection from external attacks.
l ATP should be chosen for networks that require protection from viruses and other external threats.
l WF should be chosen for networks that require web filtering.
l NGFW + ATP should be chosen for networks that require protection from external threats and attacks.
l UTM should be chosen for networks that require protection from external threats and wish to use security features
that control network usage. This is the default setting.
l Custom should be chosen for networks that require customization of available features (including the ability to
select all features).
34 Getting Started
Fortinet Technologies Inc.
Using the GUI Tables
Tables
Many of the GUI pages contain tables of information that you can filter to display specific information.
Administrators with read and write access can define the filters.
Navigation
Some tables contain information and lists that span multiple pages. Navigation controls appear at the bottom of
the page.
Filters
Filters are used to locate a specific set of information or content within multiple pages. These are especially
useful in locating specific log entries. The specific filtering options vary, depending on the type of information in
the log.
To create a filter, select Add Filter at the top of the page. A list of the available fields for filtering will be shown.
Column settings
Column settings are used to select the types of information displayed on a certain page. Some pages have large
amounts of information available and not all content can be displayed on a single screen. Some pages may even
contain content that is irrelevant to you. Using column settings, you can choose to display only relevant content.
To view configure column settings, right-click the header of a column and select the columns you wish to view and
de-select any you wish to hide. After you have finished making your selections, click Apply (you may need to
scroll down the list to do so).
Any changes that you make to the column settings are stored in the unit’s configuration. To return columns to the
default state for any given page, right-click any header and select Reset Table.
Copying objects
In tables containing configuration objects, such as the policy table found at Policy & Objects > IPv4 Policy,
you have the option to copy an object. This allows you to create a copy of that object, which you can then
configure as needed. You can also reverse copy a policy to change the direction of the traffic impacted by that
policy.
To copy an object:
1. Select that object, then right-click to make a menu appear and select the Copy option.
2. Right-click the row in the table that is either above or below where you want the copied object to be placed, select
the Paste option and indicate Above or Below.
Reverse cloning works much the same way. Instead of selecting Copy, you will select Clone Reverse.
Once the policy is copied, you must give it a name, configure as needed, and enable it.
Getting Started 35
Fortinet Technologies Inc.
Tables Using the GUI
Editing objects
Some tables allow you to edit parts of the configuration directly on the table itself. For example, security features
can be added to an existing firewall policy from the policy list by clicking on the plus sign in the Security Profiles
column and selecting the desired profiles.
If this option is not immediately available, check to see that the column is not hidden (see Column settings).
Otherwise, you must select the object and open the policy by selecting the Edit option found at the top of the
page.
36 Getting Started
Fortinet Technologies Inc.
Using the GUI Text Strings
Text Strings
The configuration of a FortiGate is stored in the FortiOS configuration database. To change the configuration,
you can use the GUI or CLI to add, delete, or change configuration settings. These changes are stored in the
database as you make them. Individual settings in the configuration database can be text strings, numeric
values, selections from a list of allowed options, or on/off (enable/disable) settings.
l “ (double quote)
l & (ampersand)
l ' (single quote)
l < (less than)
l > (greater than)
Most GUI text string fields make it easy to add an acceptable number of characters and prevent you from adding
the XSS vulnerability characters.
There is a different character limitation for VDOM names and hostnames. The only
valid characters are numbers (0-9), letters (a-z, A-Z), and special characters - (dash)
and _ (underscore).
From the CLI, you can also use the tree command to view the number of characters that are allowed in a name
field. For example, firewall address names can contain up to 64 characters. When you add a firewall address to
the GUI, you are limited to entering 64 characters in the firewall address name field. From the CLI you can enter
the following tree command to confirm that the firewall address name field allows 64 characters.
config firewall address
tree
-- [address] --*name (64)
|- uuid
|- subnet
|- type
|- start-ip
|- end-ip
|- fqdn (256)
|- country (3)
|- cache-ttl (0,86400)
|- wildcard
|- comment
|- visibility
|- associated-interface (36)
|- color (0,32)
|- [tags] --*name (65)
+- allow-routing
Getting Started 37
Fortinet Technologies Inc.
Text Strings Using the GUI
The tree command output also shows the number of characters allowed for other firewall address name
settings. For example, the fully qualified domain name (fqdn) field can contain up to 256 characters.
Most GUI numeric value fields make it easy to add the acceptable number of digits within the allowed range. CLI
help text includes information about allowed numeric value ranges. Both the GUI and the CLI prevent you from
entering invalid numbers.
38 Getting Started
Fortinet Technologies Inc.
Using the CLI
The command line interface (CLI) is an alternative configuration tool to the GUI or web-based manager. While
the configuration of the GUI uses a point-and-click method, the CLI requires typing commands or uploading
batches of commands from a text file, like a configuration script.
This section explains common CLI tasks that an administrator does on a regular basis and includes the topics:
l Locally with a console cable — Connect your computer directly to the FortiGate unit’s console port. Local access is
required in some cases:
l If you are installing your FortiGate unit for the first time and it is not yet configured to connect to your network,
you may only be able to connect to the CLI using a local serial console connection, unless you reconfigure your
computer’s network settings for a peer connection.
l Restoring the firmware utilizes a boot interrupt. Network access to the CLI is not available until after the boot
process has completed, making local CLI access the only viable option.
l Through the network — Connect your computer through any network attached to one of the FortiGate unit’s
network ports. The network interface must have enabled Telnet or SSH administrative access if you connect using
an SSH/Telnet client, or HTTP/HTTPS administrative access if you connect by accessing the CLI Console in the
GUI. The CLI console can be accessed from the upper-right hand corner of the screen and appears as a slide-out
window.
l Locally with FortiExplorer for iOS — Use the FortiExplorer app on your iOS device to configure, manage, and
monitor your FortiGate.
Getting Started 39
Fortinet Technologies Inc.
Connecting to the CLI Using the CLI
1. Using the null modem or RJ-45-to-DB-9 cable, connect the FortiGate unit’s console port to the serial
communications (COM) port on your management computer.
2. On your management computer, start HyperTerminal.
3. For the Connection Description, enter a Name for the connection, and select OK.
4. On the Connect using drop-down, select the communications (COM) port on your management computer you
are using to connect to the FortiGate unit.
5. Select OK.
6. Select the following Port settings and select OK.
Data bits 8
Parity None
Stop bits 1
If you do not want to use an SSH/Telnet client and you have access to the web-based
manager, you can alternatively access the CLI through the network using the CLI
Console widget in the web-based manager.
You must enable SSH and/or Telnet on the network interface associated with that physical network port. If your
computer is not connected directly or through a switch, you must also configure the FortiGate unit with a static
route to a router that can forward packets from the FortiGate unit to your computer. You can do this using either a
local console connection or the web-based manager.
Requirements
l A computer with an available serial communications (COM) port and RJ-45 port
l Terminal emulation software such as HyperTerminal for Microsoft Windows
40 Getting Started
Fortinet Technologies Inc.
Using the CLI Connecting to the CLI
To enable SSH or Telnet access to the CLI using a local console connection
1. Using the network cable, connect the FortiGate unit’s network port either directly to your computer’s network port,
or to a network through which your computer can reach the FortiGate unit.
2. Note the number of the physical network port.
3. Using a local console connection, connect and log into the CLI.
4. Enter the following command:
config system interface
edit <interface_str>
set allowaccess <protocols_list>
end
where:
l <interface_str> is the name of the network interface associated with the physical network port and
containing its number, such as port1.
l <protocols_list> is the complete, space-delimited list of permitted administrative access protocols, such
as https ssh telnet.
For example, to exclude HTTP, HTTPS, SNMP, and PING, and allow only SSH and Telnet administrative
access on port1, enter the following:
config system interface
edit port1
set allowaccess ssh telnet
end
5. To confirm the configuration, enter the command to display the network interface’s settings.
show system interface <interface_str>
The CLI displays the settings, including the allowed administrative access protocols, for the network
interfaces.
Secure Shell (SSH) provides both secure authentication and secure communications to the CLI. FortiGate units
support 3DES and Blowfish encryption algorithms for SSH.
Before you can connect to the CLI using SSH, you must first configure a network interface to accept SSH
connections. The following procedure uses PuTTY. Steps may vary with other SSH clients.
Getting Started 41
Fortinet Technologies Inc.
Connecting to the CLI Using the CLI
The SSH client may display a warning if this is the first time you are connecting to the FortiGate unit
and its SSH key is not yet recognized by your SSH client, or if you have previously connected to the
FortiGate unit but used a different IP address or SSH key. This is normal if your management
computer is directly connected to the FortiGate unit with no network hosts between them.
6. Click Yes to verify the fingerprint and accept the FortiGate unit’s SSH key. You will not be able to log in until you
have accepted the key.
7. The CLI displays a login prompt.
8. Type a valid administrator account name (such as admin) and press Enter.
9. Type the password for this administrator account and press Enter.
The FortiGate unit displays a command prompt (its hostname followed by a #). You can now enter
CLI commands.
If three incorrect login or password attempts occur in a row, you will be disconnected.
If this occurs, wait one minute, then reconnect to attempt the login again.
Telnet is not a secure access method. SSH should be used to access the CLI from the
Internet or any other untrusted network.
Before you can connect to the CLI using Telnet, you must first configure a network interface to accept Telnet
connections.
If three incorrect login or password attempts occur in a row, you will be disconnected.
If this occurs, wait one minute, then reconnect to attempt the login again.
42 Getting Started
Fortinet Technologies Inc.
CLI-only features
As you can see in the Feature / Platform Matrix, the entry level models have a number of features that are only
available using the CLI, rather than appearing in the GUI.
You can open the CLI console so that it automatically opens to the object you wish to configure. For example, to
edit a firewall policy, right-click on the policy in the policy list (Policy & Objects > IPv4 Policy) and select Edit
in CLI. The CLI console will appear, with the commands to access this part of the configuration added
automatically.
Once you have access to the CLI, you can enter instructions for specific tasks that can be found throughout the
FortiOS Handbook. Options are also available at the top of the CLI Console to Clear console, Download, and
Copy to clipboard.
Refer to the CLI Reference for a list of the available commands.
Getting Started 43
Fortinet Technologies Inc.
Command syntax Using the CLI
Command syntax
When entering a command, the CLI console requires that you use valid syntax and conform to expected input
constraints. It will reject invalid commands.
Fortinet documentation uses the conventions below to describe valid command syntax.
Terminology
Each command line consists of a command word that is usually followed by configuration data or other specific
item that the command uses or affects.
To describe the function of each word in the command line, especially if that nature has changed between
firmware versions, Fortinet uses terms with the following definitions.
l Command — A word that begins the command line and indicates an action that the FortiGate unit should perform
on a part of the configuration or host on the network, such as config or execute. Together with other words,
such as fields or values, that end when you press the Enter key, it forms a command line. Exceptions include multi-
line command lines, which can be entered using an escape sequence.
Valid command lines must be unambiguous if abbreviated. Optional words or other command line permutations are
indicated by syntax notation.
l Sub-command — A kind of command that is available only when nested within the scope of another command.
After entering a command, its applicable sub-commands are available to you until you exit the scope of the
command, or until you descend an additional level into another sub-command. Indentation is used to indicate levels
of nested commands.
Not all top-level commands have sub-commands. Available sub-commands vary by their containing scope.
l Object — A part of the configuration that contains tables and /or fields. Valid command lines must be specific
enough to indicate an individual object.
l Table — A set of fields that is one of possibly multiple similar sets which each have a name or number, such as an
administrator account, policy, or network interface. These named or numbered sets are sometimes referenced by
other parts of the configuration that use them.
44 Getting Started
Fortinet Technologies Inc.
Using the CLI Command syntax
l Field — The name of a setting, such as ip or hostname. Fields in some tables must be configured with values.
Failure to configure a required field will result in an invalid object configuration error message, and the FortiGate
unit will discard the invalid table.
l Value — A number, letter, IP address, or other type of input that is usually your configuration setting held by a field.
Some commands, however, require multiple input values which may not be named but are simply entered in
sequential order in the same command line. Valid input types are indicated by constraint notation.
l Option — A kind of value that must be one or more words from of a fixed set of options.
Indentation
Indentation indicates levels of nested commands, which indicate what other sub-commands are available from
within the scope. For example, the edit sub-command is available only within a command that affects tables,
and the next sub-command is available only from within the edit sub-command:
config system interface
edit port1
set status up
next
end
Notation
Brackets, braces, and pipes are used to denote valid permutations of the syntax. Constraint notations, such as
<address_ipv4>, indicate which data types or string patterns are acceptable value input.
Convention Description
[verbose {1 | 2 | 3}]
indicates that you may either omit or type both the verbose word and its
accompanying option, such as verbose 3.
Curly braces { } A word or series of words that is constrained to a set of options delimited by
either vertical bars or spaces. You must enter at least one of the options,
unless the set of options is surrounded by square brackets [ ].
indicates that you must enter either enable or disable, but must not
enter both.
Getting Started 45
Fortinet Technologies Inc.
Command syntax Using the CLI
Convention Description
Angle brackets < > A word constrained by data type. The angled brackets contain a
descriptive name followed by an underscore ( _ ) and suffix that indicates
the valid data type. For example, <retries_int>, indicates that you
should enter a number of retries as an integer.
indicates that you may enter all or a subset of those options, in any order,
in a space-delimited list, such as:
46 Getting Started
Fortinet Technologies Inc.
Using the CLI Sub-commands
Sub-commands
Each command line consists of a command word that is usually followed by configuration data or other specific
item that the command uses or affects:
get system admin
Sub-commands are available from within the scope of some commands. When you enter a sub-command level,
the command prompt changes to indicate the name of the current command scope. For example, after entering:
config system admin
Applicable sub-commands are available to you until you exit the scope of the command, or until you descend an
additional level into another sub-command.
For example, the edit sub-command is available only within a command that affects tables; the next sub-
command is available only from within the edit sub-command:
config system interface
edit port1
set status up
next
end
Available sub-commands vary by command. From a command prompt within config, two types of sub-
commands might become available:
Getting Started 47
Fortinet Technologies Inc.
Sub-commands Using the CLI
clone <table> Clone (or make a copy of) a table from the current object.
clone 27 to 30
• edit the settings for the default admin administrator account by typing
edit admin.
• add a new administrator account with the name newadmin and edit
newadmin‘s settings by typing edit newadmin.
edit changes the prompt to reflect the table you are currently editing.
Save the changes to the current object and exit the config command.
end
This returns you to the top-level command prompt.
48 Getting Started
Fortinet Technologies Inc.
Using the CLI Sub-commands
• In objects, get lists the table names (if present), or fields and their
values.
• In a table, get lists the fields and their values.
For example, in config user local, you could type get to see the list
of user names, then type purge and then y to confirm that you want to
delete all users.
The CLI acknowledges the new table, and changes the command prompt to show that you are now within the
admin_1 table:
new entry 'admin_1' added
(admin_1)#
abort Exit both the edit and/or config commands without saving the fields.
Getting Started 49
Fortinet Technologies Inc.
Sub-commands Using the CLI
end Save the changes made to the current table or object fields, and exit the config
command (to exit without saving, use abort instead).
move Move an object within a list, when list order is important. For example, rearranging
security policies within the policy list.
Save the changes you have made in the current table’s fields, and exit the edit
command to the object prompt (to save and exit completely to the root prompt, use
end instead).
next
next is useful when you want to create or edit several tables in the same object,
without leaving and re-entering the config command each time.
next is only available from a table prompt; it is not available from an object prompt.
For example, if a group contains members A, B, C, and D and you remove all users
except for B, use the command select member B.
For example, in config system admin, after typing edit admin, you could
type set password newpass to change the password of the admin administrator
set <field>
to newpass.
<value>
Note: When using set to change a field containing a space-delimited list, type the
whole new list. For example, set <field> <new-value> will replace the list with
the <new-value> rather than appending <new-value> to the list.
show Display changes to the default configuration. Changes are listed in the form of
configuration commands.
For example, in config system admin, after typing edit admin, typing unset
password resets the password of the admin administrator account to the default (in
this case, no password).
50 Getting Started
Fortinet Technologies Inc.
Using the CLI Sub-commands
to assign the value my1stExamplePassword to the password field. You might then enter the next
command to save the changes and edit the next administrator’s table.
Getting Started 51
Fortinet Technologies Inc.
Permissions Using the CLI
Permissions
Access profiles control which CLI commands an administrator account can access. Access profiles assign either
read, write, or no access to each area of FortiOS. To view configurations, you must have read access. To make
changes, you must have write access. So, depending on the account used to log in to the FortiGate, you may not
have complete access to all CLI commands. For complete access to all commands, you must log in with an
administrator account that has the super_admin access profile. By default the admin administrator account
has the super_admin access profile.
Administrator accounts, with the super_admin access profile are similar to a root administrator account that
always has full permission to view and change all FortiGate configuration options, including viewing and changing
all other administrator accounts and including changing other administrator account passwords.
For more information about increasing the security of administrator accounts, see:
52 Getting Started
Fortinet Technologies Inc.
Using the CLI Tips
Tips
Basic features and characteristics of the CLI environment provide support and ease of use for many CLI tasks.
Help
To display brief help during command entry, press the question mark (?) key.
l Press the question mark (?) key at the command prompt to display a list of the commands available and a
description of each command.
l Type a word or part of a word, then press the question mark (?) key to display a list of valid word completions or
subsequent words, and to display a description of each.
Keys Action
If multiple words could complete your entry, display all possible completions with
helpful descriptions of each.
Press the Tab key multiple times to cycle through available matches.
Left or Right Move the cursor left or right within the command line.
arrow
Getting Started 53
Fortinet Technologies Inc.
Tips Using the CLI
Keys Action
Ctrl + C Abort current interactive commands, such as when entering multiple lines.
If you are not currently within an interactive command such as config or edit, this
closes the CLI connection.
\ then Enter Continue typing a command on the next line for a multi-line command.
For each line that you want to continue, terminate it with a backslash ( \ ). To complete
the command line, terminate it by pressing the spacebar and then the Enter key,
without an immediately preceding backslash.
Command abbreviation
You can abbreviate words in the command line to their smallest number of non-ambiguous characters.
For example, the command get system status could be abbreviated to g sy stat.
However, there are additional commands which can be used instead of set for changing options in a list.
For example, append member would add user D to a user group while all previous
group members are retained
For example, if a group contains members A, B, C, and D and you remove all users
except for B, use the command select member B.
For example, unselect member A would remove member A from a group will all
previous group members are retained.
Environment variables
The CLI supports the following environment variables. Variable names are case-sensitive.
54 Getting Started
Fortinet Technologies Inc.
Using the CLI Tips
Environment variables
$USERFROM The management access type (ssh, telnet, jsconsole for the CLI Console
widget in the web-based manager, and so on) and the IP address of the administrator
that configured the item.
$USERNAME The account name of the administrator that configured the item.
For example, the FortiGate unit’s host name can be set to its serial number:
config system global
set hostname $SerialNum
end
Special characters
The following special characters, also known as reserved characters, are not permitted in most CLI fields:
You may be able to enter special characters as part of a string’s value by using a special command, enclosing it in
quotes, or preceding it with an escape sequence — in this case, a backslash ( \ ) character.
In other cases, different keystrokes are required to input a special character. If you need to enter ? as part of
config, you first need to input CTRL-V. If you enter ? without first using CTRL-V, the question mark has a
different meaning in the CLI; it will show available command options in that section.
Character Keys
? Ctrl + V then ?
Getting Started 55
Fortinet Technologies Inc.
Tips Using the CLI
Character Keys
' \'
" \"
\ \\
Use the following command to display the MAC address of the FortiGate unit internal interface:
get hardware nic internal | grep Current_HWaddr
Current_HWaddr 00:09:0f:cb:c2:75
Use the following command to display all TCP sessions in the session list and include the session list line number
in the output:
get system session list | grep -n tcp
Use the following command to display all lines in HTTP replacement message commands that contain URL
(upper or lower case):
show system replacemsg http | grep -i url
The option -f is also available to support contextual output, in order to show the complete configuration. The
following example shows the difference in output when -f option is used versus when it is not.
56 Getting Started
Fortinet Technologies Inc.
Using the CLI Tips
Using -f:
show | grep -f ldap-group1
config user group
edit "ldap-group1"
set member "pc40-LDAP"
next
end
config firewall policy
edit 2
set srcintf "port31"
set dstintf "port32"
set srcaddr "all"
set action accept
set identity-based enable
set nat enable
config identity-based-policy
edit 1
set schedule "always"
set groups "ldap-group1"
set dstaddr "all"
set service "ALL"
next
end
next
end
Input is stored using Unicode UTF-8 encoding but is not normalized from other encodings into UTF-8 before it is
stored. If your input method encodes some characters differently than in UTF-8, your configured items may not
display or operate as expected.
Regular expressions are especially impacted. Matching uses the UTF-8 character values. If you enter a regular
expression using another encoding, or if an HTTP client sends a request in an encoding other than UTF-8,
matches may not be what you expect.
For example, with Shift-JIS, backslashes ( \ ) could be inadvertently interpreted as the symbol for the Japanese
yen ( ¥ ) and vice versa. A regular expression intended to match HTTP requests containing money values with a
yen symbol therefore may not work it if the symbol is entered using the wrong encoding.
Getting Started 57
Fortinet Technologies Inc.
Tips Using the CLI
HTTP clients may send requests in encodings other than UTF-8. Encodings usually
vary by the client’s operating system or input language. If you cannot predict the
client’s encoding, you may only be able to match any parts of the request that are in
English, because regardless of the encoding, the values for English characters tend to
be encoded identically. For example, English words may be legible regardless of
interpreting a web page as either ISO 8859-1 or as GB2312, whereas simplified
Chinese characters might only be legible if the page is interpreted as GB2312.
If you configure your FortiGate unit using other encodings, you may need to switch language settings on your
management computer, including for your web browser or Telnet/SSH client. For instructions on how to configure
your management computer’s operating system language, locale, or input method, see its documentation.
If you choose to configure parts of the FortiGate unit using non-ASCII characters, verify that all systems
interacting with the FortiGate unit also support the same encodings. You should also use the same encoding
throughout the configuration if possible in order to avoid needing to switch the language settings of the web-
based manager and your web browser or Telnet/SSH client while you work.
Similarly to input, your web browser or CLI client should normally interpret display output as encoded using UTF-
8. If it does not, your configured items may not display correctly in the GUI or CLI. Exceptions include items such
as regular expressions that you may have configured using other encodings in order to match the encoding of
HTTP requests that the FortiGate unit receives.
1. On your management computer, start your web browser and go to the URL for the FortiGate unit’s GUI.
2. Configure your web browser to interpret the page as UTF-8 encoded.
3. Log in to the FortiGate unit.
4. Open the CLI Console from the upper right-hand corner.
5. In the title bar of the CLI Console widget, click Edit (the pencil icon).
6. Enable Use external command input box and select OK.
7. The Command field appears below the usual input and display area of the CLI Console .
8. Type a command in this field and press Enter.
In the display area, the CLI Console widget displays your previous command interpreted into its character
code equivalent, such as:
edit \743\601\613\743\601\652
and the command’s output.
58 Getting Started
Fortinet Technologies Inc.
Using the CLI Tips
Depending on your Telnet/SSH client’s support for your language’s input methods and for sending
international characters, you may need to interpret them into character codes before pressing Enter.
Screen paging
You can configure the CLI to pause after displaying each page’s worth of text when displaying multiple pages of
output. When the display pauses, the last line displays --More--. You can then either:
To configure the CLI Console to pause display when the screen is full:
config system console
set output more
end
Baud rate
You can change the default baud rate of the local console connection.
Editing the configuration on an external host can be timesaving if you have many changes to make, especially if
your plain text editor provides advanced features such as batch changes.
1. Use execute backup to download the configuration file to a TFTP server, such as your management
computer.
2. Edit the configuration file using a plain text editor that supports Unix-style line endings.
Getting Started 59
Fortinet Technologies Inc.
Tips Using the CLI
Do not edit the first line. The first line(s) of the configuration file (preceded by a #
character) contains information about the firmware version and FortiGate model. If
you change the model number, the FortiGate unit will reject the configuration file
when you attempt to restore it.
3. Use execute restore to upload the modified configuration file back to the FortiGate unit.
The FortiGate unit downloads the configuration file and checks that the model information is correct. If it is
correct, the FortiGate unit loads the configuration file and checks each command for errors. If a command is
invalid, the FortiGate unit ignores the command. If the configuration file is valid, the FortiGate unit restarts
and loads the new configuration.
60 Getting Started
Fortinet Technologies Inc.
FortiExplorer for iOS
FortiExplorer for iOS is a user-friendly application that helps you to quickly and easily configure, manage, and
monitor FortiGate appliances using an iOS device. FortiExplorer lets you rapidly provision, deploy, and monitor
Security Fabric components including FortiGate, FortiWiFi, and FortiAP devices.
FortiExplorer for iOS requires iOS 9.3 or later and is compatible with iPhone, iPad, and iPod Touch. It is
supported by FortiOS 5.6+ and is only available on the App Store for iOS devices.
Advanced features are available with the purchase of FortiExplorer Pro. Paid features include the ability to add
more than two devices and the ability to download firmware images from FortiCare.
Up to six members can use this app with 'Family Sharing' enabled in the App Store.
Firmware upload requires a valid firmware license. Users can download firmware for
models with a valid support contract.
If your FortiGate is accessible on the wireless network, you can connect to it using FortiExplorer provided that
your iOS device is on the same network (see Connecting FortiExplorer to a FortiGate via WiFi). Otherwise, you
will need to physically connect your iOS device to the FortiGate using a USB cable (see below).
Getting Started 61
Fortinet Technologies Inc.
Getting started with FortiExplorer FortiExplorer for iOS
2. Open the FortiExplorer app and select your FortiGate from the list under USB Attached Device.
3. On the Login screen, select USB .
4. Enter the default Username (admin) and leave the Password field blank.
5. You can opt to Remember Password. Tap Done when you are ready.
FortiExplorer opens the FortiGate management interface to the Device Status page:
62 Getting Started
Fortinet Technologies Inc.
FortiExplorer for iOS Getting started with FortiExplorer
Return to the internal interface using the < button at the top of the screen.
10. Go to Network > Static Routes and configure the static route to the gateway.
Getting Started 63
Fortinet Technologies Inc.
Getting started with FortiExplorer FortiExplorer for iOS
11. Go to Policy & Objects > Policy and edit the Internet access policy. As a best practice, provide a Name for the
policy, enable the desired Security Profiles, and configure Logging Options. Select OK to finalize.
64 Getting Started
Fortinet Technologies Inc.
FortiExplorer for iOS Getting started with FortiExplorer
Follow the steps of the Security Fabric Audit (under Security Fabric > Audit) to determine a Security Score
for the selected device(s). The results should identify issues ranging from Medium to Critical importance, and
may provide recommended actions where possible.
1. Open the FortiExplorer app and select Add from the Devices page.
2. Enter the Host information and appropriate Username and Password credentials. If necessary, change the
default Port number, and opt to Remember Password.
3. If the FortiGate device identity cannot be verified, click Connect at the prompt.
FortiExplorer opens the FortiGate management interface to the Device Status page.
Getting Started 65
Fortinet Technologies Inc.
Getting started with FortiExplorer FortiExplorer for iOS
l To upgrade to FortiExplorer Pro, open the FortiExplorer app, go to Settings and select Upgrade to FortiExplorer
Pro. Follow the on-screen prompts.
66 Getting Started
Fortinet Technologies Inc.
LED Specifications
The following section includes information regarding FortiGate LED status indicators.
The faceplates indicate where the LEDs are typically found on desktop and mid-range FortiGate models.
FortiGate 60C
FortiGate 100D
Getting Started 67
Fortinet Technologies Inc.
LED status codes LED Specifications
FortiGate 30E
Flashing Green Booting Up. If the FortiGate has a reset button, Flashing Green also
means that the reset button was used.
Red The FortiGate has a critical alarm (see About Alarm Levels).
68 Getting Started
Fortinet Technologies Inc.
LED Specifications About alarm levels
Red A failover has occurred. This usually means that one of the FotiGates
in an HA cluster has failed or that HA heartbeat communication
between the FortiGates in the HA cluster has failed or been
interrupted.
Minor, major, and critical alarms are defined based on IPMI, ATCA, and Telco standards for naming alarms.
l A minor alarm (also called an IPMI non-critical (NC) alarm) indicates a temperature or a power level outside of the
normal operating range that is not considered a problem. In the case of a minor temperature alarm, the system
could respond by increasing fan speed. A non-critical threshold can be an upper non-critical (UNC) threshold (for
example, a high temperature or a high power level) or a lower non-critical (LNC) threshold (for example, a low power
level). The LEDs do not indicate minor alarms since user intervention is not required.
l A major alarm (also called an IPMI critical or critical recoverable (CR) alarm) indicates that the system itself cannot
correct the cause for the alarm and that intervention is required. For example, the cooling system cannot provide
enough cooling to reduce the temperature. It could also mean that conditions (e.g. temperature) are approaching
the outside limit of the allowed operating range. A critical threshold can also be an upper critical (UC) threshold (e.g.
a high temperature or a high power level) or a lower critical (LC) threshold (e.g. a low power level).
l A critical alarm (also called an IPMI non-recoverable (NR) alarm) indicates detection of a temperature or power level
that is outside of the allowed operating range and could potentially cause physical damage.
Getting Started 69
Fortinet Technologies Inc.
LED status codes for ports LED Specifications
70 Getting Started
Fortinet Technologies Inc.
Inspection Mode
To control your FortiGate's security profile inspection mode in FortiOS 5.6, you can select Flow-based or Proxy
inspection modes from System > Settings. Having control over flow and proxy mode is helpful if you want to
ensure that only flow inspection mode is used.
In most cases proxy mode is preferred because more security profile features are available along with more
configuration options for these individual features. Some implementations, however, may require all security
profile scanning to only use flow mode. In this case, you can set your FortiGate to flow mode knowing that proxy
mode inspection will not be used.
Setting up the FortiGate to operate in these new modes (or to operate in the other available operating
modes) involves going to System > Settings and changing the Inspection Mode and NGFW Mode.
NGFW mode simplifies applying application control and web filtering to traffic by allowing you to add applications
and web filtering profiles directly to policies.
Transparent proxy allows you to apply web authentication to HTTP traffic without using the explicit proxy.
NGFW policy mode
When you select Flow-based as the Inspection Mode, you have the option to select an NGFW Mode. Profile-
based mode works the same as flow-based mode did in FortiOS 5.4.
In Policy-based mode, you add applications and web filtering profiles directly to a policy without having to first
create and configure Application Control or Web Filtering profiles.
When you change to Flow-based inspection, all proxy mode profiles are converted to flow mode, removing any
proxy settings. In addition, proxy-mode only features (for example, Web Application Profile) are removed from the
GUI.
If your FortiGate has multiple VDOMs, you can set the inspection mode independently for each VDOM. Go to
System > VDOM. Click Edit for the VDOM you wish to change and select the Inspection Mode.
CLI syntax
The following CLI command can be used to configure inspection and policy modes:
config system settings
set inspection-mode {proxy | flow}
set policy-mode {standard | ngfw}
end
Getting Started 71
Fortinet Technologies Inc.
Inspection Mode
AntiVirus x x
Web Filter x x
DNS Filter x x
Application Control x x
Intrusion Protection x x
Anti-Spam x
VoIP x
ICAP x
FortiClient Profiles x x
Proxy Options x x
SSL Inspection x x
SSH Inspection x
From the GUI, you can only configure antivirus and web filter security profiles in proxy mode. From the CLI, you
can configure flow-based antivirus profiles, web filter profiles, and DLP profiles and they will appear on the GUI
and include their inspection mode setting. Flow-based profiles created when in flow mode are still available when
you switch to proxy mode.
In flow mode, antivirus and web filter profiles only include flow-mode features. Web filtering and virus scanning is
still done with the same engines and to the same accuracy, but some inspection options are limited or not
available in flow mode. Application control, intrusion protection, and FortiClient profiles are not affected when
switching between flow and proxy mode.
Even though VoIP profiles are not available from the GUI in flow mode, the FortiGate can process VoIP traffic. In
this case the appropriate session helper is used (for example, the SIP session helper).
72 Getting Started
Fortinet Technologies Inc.
Inspection Mode
Setting flow or proxy mode doesn't change the settings available from the CLI. However, when in flow mode you
can't save security profiles that are set to proxy mode.
You can also add proxy-only security profiles to firewall policies from the CLI. So, for example, you can add a
VoIP profile to a security policy that accepts VoIP traffic. This practice isn't recommended because the setting will
not be visible from the GUI.
Proxy mode and flow mode antivirus and web filter profile options
The following tables list the antivirus and web filter profile options available in proxy and flow modes.
Inspection Options x x
(not available for quick scan mode)
Search Engines x
Getting Started 73
Fortinet Technologies Inc.
Inspection Mode
URL Filter x x
Rating Options x x
Proxy Options x
Remove ActiveX x
Remove Cookies x
74 Getting Started
Fortinet Technologies Inc.
Basic Administration
This section contains information about basic FortiGate administration that can be done after you have installed
the unit in your network.
While this section mainly focuses on accomplishing tasks with the GUI, some tasks include instructions to use the
CLI. You can access the CLI using the GUI or FortiExplorer, or via SSH or Telnet connection. For more
information about the CLI, see Using the CLI.
Registration
In order to have full access to Fortinet Support and FortiGuard Services, you must register your FortiGate.
System Settings
There are several system settings that should be configured once your FortiGate is installed:
Getting Started 75
Fortinet Technologies Inc.
System Settings Basic Administration
It is also recommended to change the user name of this account; however, since you cannot change the user
name of an account that is currently in use, a second administrator account will need to be created in order to do
this. For more information about creating and using administrator accounts, see the Administrators section of the
System Administration chapter.
Settings
Settings can be accessed by going to System > Settings. On this page, you can change the Host name,
designate the centralized security management for your FortiGate in Central Management, set the system time
and identify time zone in System Time, configure HTTP, HTTPS, SSH, and Telnet ports as well as idle timeout
in Administration Settings, designate the Password Policy, and manage display options and designate
inspection mode in View Settings.
Go to System > Settings and type in the new name in the Host name row. The only administrators that can
change a FortiGate’s host name are administrators whose admin profiles permit system configuration write
access. If the FortiGate is part of an HA cluster, you should use a unique host name to distinguish the FortiGate
from others in the cluster.
Central Management
You can manage any size Fortinet security infrastructure, from a few devices to thousands of appliances, by using
FortiManager or FortiCloud. You can configure your FortiGate for either of these centralized security
management services through Central Management. Be sure that you have registered your device with the
FortiManager appliance or FortiCloud host. For more information on configuring your FortiGate for Central
Management, see Adding a FortiGate to FortiManager or FortiCloud.
System Time
For effective scheduling and logging, the FortiGate system time and date should be accurate. You can either
manually set the system time and date or configure the FortiGate to automatically synchronize with a Network
Time Protocol (NTP) server.
76 Getting Started
Fortinet Technologies Inc.
Basic Administration System Settings
NTP enables you to keep the FortiGate time synchronized with other network systems. By enabling NTP on the
FortiGate, FortiOS will check with the NTP server you select at the configured intervals. This will also ensure that
logs and other time-sensitive settings on the FortiGate are correct.
The FortiGate maintains its internal clock using a built-in battery. At start up, the time reported by the FortiGate
will indicate the hardware clock time, which may not be accurate. When using NTP, the system time might
change after the FortiGate has successfully obtained the time from a configured NTP server.
By default, FortiOS has the daylight savings time configuration enabled. The system
time must be manually adjusted after daylight saving time ends. To disable DST,
enter the following commands in the CLI:
config system global
set dst disable
end
Administration Settings
In order to improve security, you can change the default port configurations for administrative connections to the
FortiGate. When connecting to the FortiGate when the port has changed, the port must be included, such as
https://<ip_address>:<port>. For example, if you are connecting to the FortiGate using port 99, the
URL would be https://192.168.1.99:99.
1. Go to System > Settings.
2. Under Administration Settings, change the port numbers for HTTP, HTTPS, SSH, and/or Telnet as needed.
You can also select Redirect to HTTPS in order to avoid HTTP being used for the administrators.
3. Select Apply.
When you change the default port number for HTTP, HTTPS, SSH, or Telnet, ensure that the port number is
unique. If a conflict exists with a particular port, a warning message will appear.
By default, the GUI disconnects administrative sessions if no activity occurs for five minutes. This prevents
someone from using the GUI if the management PC is left unattended.
1. Go to System > Settings.
2. In the Administration Settings section, enter the time in minutes in the Idle timeout field.
3. Select Apply.
Getting Started 77
Fortinet Technologies Inc.
System Settings Basic Administration
Password Policy
The FortiGate includes the ability to create a password policy for administrators and IPsec pre-shared keys. With
this policy, you can enforce regular changes and specific criteria for a password including:
1. Go to System > Settings.
2. Configure Password Policy settings as required.
3. Click Apply.
If you add a password policy or change the requirements on an existing policy, the next time that administrator
logs into the FortiGate, they are prompted to update their password to meet the new requirements before
proceeding to log in.
For information about recovering a lost password and enhancements to the process, see: Resetting a lost Admin
password.
View Settings
Three settings can change the presentation of information in the GUI: Language, Lines per page, and Theme.
To change the language, go to System > Settings. Select the language you want from the Language drop-
down list: English (the default), French, Spanish, Portuguese, Japanese, Traditional Chinese, Simplified
Chinese, or Korean. For best results, you should select the language that is used by the management computer.
To change the number of lines per page displayed in the GUI tables, set Lines per page to a value between 20
and 1,000. The default is 50 lines per page.
Five color themes are currently available: Green (the default), Red, Blue, Melongene, and Mariner. To change
your theme, select the color from the Theme drop-down list.
This is also where you select either Flow-based or Proxy Inspection Mode . If you select Flow-based mode,
then you need to specify if it is NGFW Profile-based or NGFW Policy-based inspection.
Both the number of attempts (admin-lockout-threshold) and the wait time before the administrator can
try to enter a password again (admin-lockout-duration) can be configured within the CLI.
78 Getting Started
Fortinet Technologies Inc.
Basic Administration Passwords
The default value of admin-lockout-threshold is 3 and the range of values is between 1 and 10. The
admin-lockout-duration is set to 60 seconds by default and the range of values is between 1 and
4294967295 seconds.
Keep in mind that the higher the lockout threshold, the higher the risk that someone may be able to break into the
FortiGate unit.
Example:
If the time span between the first failed login attempt and the admin-lockout-
threshold failed login attempt is less than admin-lockout-duration, the
lockout will be triggered.
Passwords
Using secure passwords are vital for preventing unauthorized access to your FortiGate. When changing the
password, consider the following to ensure better security:
l Do not make passwords that are obvious, such as the company name, administrator names, or other obvious words
or phrases.
l Use numbers in place of letters, for example, passw0rd.
l Administrator passwords can be up to 64 characters.
l Include a mixture of letters, numbers, and upper and lower case.
l Use multiple words together, or possibly even a sentence, for example keytothehighway.
l Use a password generator.
l Change the password regularly and always make the new password unique and not a variation of the existing
password, such as changing from password to password1.
l Make note of the password and store it in a safe place away from the management computer, in case you forget it
or ensure that at least two people know the password in the event that one person becomes ill, is away on vacation,
or leaves the company. Alternatively, have two different admin logins.
Downgrades will typically maintain the administrator password. If you need to downgrade to FortiOS 4.3, remove
the password before the downgrade, then log in after the downgrade and re-configure the password.
Getting Started 79
Fortinet Technologies Inc.
Passwords Basic Administration
Password policy
The FortiGate includes the ability to create a password policy for administrators and IPsec pre-shared keys. With
this policy, you can enforce regular changes and specific criteria for a password including:
1. Go to System > Settings.
2. Configure Password Policy settings as required.
3. Click Apply.
If you add a password policy or change the requirements on an existing policy, the next time that administrator
logs into the FortiGate, they are prompted to update their password to meet the new requirements before
proceeding to log in.
For information about recovering a lost password and enhancements to the process, see: Resetting a lost Admin
password.
80 Getting Started
Fortinet Technologies Inc.
Basic Administration Firmware
Firmware
Fortinet periodically updates the FortiGate firmware to include new features and resolve important issues. After
you have registered your FortiGate unit, you can download firmware updates from the support web site,
https://support.fortinet.com.
Before you install any new firmware, be sure to follow the steps below:
Only FortiGate admin users and administrators whose access profiles contain system
read and write privileges can change the FortiGate firmware.
1. Open to the administrator's dropdown menu in the top-right corner of the GUI and select Configuration
> Backup.
2. Choose either Local PC or USB Disk to save the configuration file. The USB option will not be available if there
is no USB drive in the USB port.
3. If desired, select Encryption.
4. Select OK.
For more information, see Configuration Backups.
Downloading firmware
Firmware images for all FortiGate units are available on the Fortinet Customer Support website,
https://support.fortinet.com.
To download firmware:
1. Log into the site using your user name and password.
2. Go to Download > Firmware Images.
3. A list of Release Notes is shown. If you have not already done so, download and review the Release Notes for the
firmware you wish to upgrade your FortiGate unit to.
4. Select Download.
Getting Started 81
Fortinet Technologies Inc.
Firmware Basic Administration
Firmware can also be downloaded using FTP; however, as FTP is not an encrypted file
transferring protocol, HTTPS downloading is recommended.
5. Navigate to the folder for the firmware version you wish to use.
6. Select your FortiGate model from the list. If your unit is a FortiWiFi, the firmware will have a filename starting with
'FWF'.
7. Save the firmware image to your computer.
Image integrity is also verified when the FortiGate is booting up. This integrity check is done through a cyclic
redundancy check (CRC). If the CRC fails, the FortiGate unit will encounter an error during the boot process.
Lastly, firmware images are signed and the signature is attached to the code as it is built. When upgrading an
image, the running OS will generate a signature and compare it with the signature attached to the image. If the
signatures do not match, the new OS will not load.
To use this procedure, you must connect to the CLI using the FortiGate console port and an RJ-45 to DB-9 or null
modem cable. This procedure temporarily installs a new firmware image using your current configuration.
For this procedure, you must install a TFTP server that you can connect to from the FortiGate internal interface.
The TFTP server should be on the same subnet as the internal interface.
82 Getting Started
Fortinet Technologies Inc.
Basic Administration Firmware
You have only three (3) seconds to press any key. If you do not press a key quickly
enough, the FortiGate unit reboots and you must log in and repeat the execute
reboot command.
If you successfully interrupt the startup process, the following messages appears:
[G]: Get firmware image from TFTP server.
[F]: Format boot device.
[B]: Boot with backup firmware and set as default
[C]: Configuration and information
[Q]: Quit menu and continue to boot with default firmware.
[H]: Display this list of options.
Enter G, F, Q, or H:
8. Type G to get the new firmware image from the TFTP server. The following message appears:
Enter TFTP server address [192.168.1.168]:
9. Type the address of the TFTP server and press Enter. The following message appears:
Enter Local Address [192.168.1.188]:
10. Type an IP address of the FortiGate unit to connect to the TFTP server. The IP address must be on the same
network as the TFTP server.
Make sure you do not enter the IP address of another device on this network.
11. Enter the firmware image file name and press Enter. The TFTP server uploads the firmware image file to the
FortiGate unit and the following appears.
Save as Default firmware/Backup firmware/Run image without saving: [D/B/R]
12. Type R. The FortiGate image is installed to system memory and the FortiGate unit starts running the new
firmware image, but with its current configuration.
You can test the new firmware image as required. When done testing, you can reboot the FortiGate unit, and the
FortiGate unit will resume using the firmware that was running before you installed the test firmware.
Always remember to back up your configuration before making any changes to the
firmware.
Be sure to read the topics on downloading and testing firmware before upgrading.
Getting Started 83
Fortinet Technologies Inc.
Firmware Basic Administration
You can also upgrade firmware using Secure File Copy (SCP). See How to
download/upload a FortiGate configuration file using secure file copy (SCP).
Before you begin, ensure you have a TFTP server running and accessible to the FortiGate unit.
Where <name_str> is the name of the firmware image file and <tftp_ipv4> is the IP address of
the TFTP server. For example, if the firmware image file name is image.out and the IP address of
the TFTP server is 192.168.1.168, enter:
execute restore image tftp image.out 192.168.1.168
84 Getting Started
Fortinet Technologies Inc.
Basic Administration Firmware
Always remember to back up your configuration before making any changes to the
firmware.
To use the following procedure, you must have a TFTP server the FortiGate unit can connect to.
Where <name_str> is the name of the firmware image file and <tftp_ipv4> is the IP address of
the TFTP server. For example, if the firmware image file name is imagev28.out and the IP
address of the TFTP server is 192.168.1.168, enter:
execute restore image tftp image28.out 192.168.1.168
Getting Started 85
Fortinet Technologies Inc.
Firmware Basic Administration
7. Type y. The FortiGate unit reverts to the old firmware version, resets the configuration to factory defaults, and
restarts. This process takes a few minutes.
8. Reconnect to the CLI.
9. To restore your previous configuration, if needed, use the command:
execute restore config <name_str> <tftp_ipv4>
10. Update antivirus and attack definitions using the command:
execute update-now
This procedure installs a firmware image and resets the FortiGate unit to default settings. You can use this
procedure to upgrade to a new firmware version, revert to an older firmware version, or re-install the current
firmware.
To use this procedure, you must connect to the CLI using the FortiGate console port and a RJ-45 to DB-9, or null
modem cable. This procedure reverts the FortiGate unit to its factory default configuration.
For this procedure you install a TFTP server that you can connect to from the FortiGate internal interface. The
TFTP server should be on the same subnet as the internal interface.
Before beginning this procedure, ensure you backup the FortiGate unit configuration.
If you are reverting to a previous FortiOS version, you might not be able to restore the previous configuration from
the backup configuration file.
Installing firmware replaces your current antivirus and attack definitions, along with the definitions included with
the firmware release you are installing. After you install new firmware, make sure that antivirus and attack
definitions are up to date.
1. Connect to the CLI using the RJ-45 to DB-9 or null modem cable.
2. Make sure the TFTP server is running.
3. Copy the new firmware image file to the root directory of the TFTP server.
4. Make sure the internal interface is connected to the same network as the TFTP server.
5. To confirm the FortiGate unit can connect to the TFTP server, use the following command to ping the computer
running the TFTP server. For example, if the IP address of the TFTP server is 192.168.1.168:
execute ping 192.168.1.168
6. Enter the following command to restart the FortiGate unit.
execute reboot
86 Getting Started
Fortinet Technologies Inc.
Basic Administration Firmware
7. Type y. As the FortiGate unit starts, a series of system startup messages appears. When the following messages
appears:
Press any key to display configuration menu..........
Immediately press any key to interrupt the system startup.
You have only three (3) seconds to press any key. If you do not press a key quickly
enough, the FortiGate unit reboots and you must log in and repeat the execute
reboot command.
If you successfully interrupt the startup process, the following messages appears:
[G]: Get firmware image from TFTP server.
[F]: Format boot device.
[B]: Boot with backup firmware and set as default
[C]: Configuration and information
[Q]: Quit menu and continue to boot with default firmware.
[H]: Display this list of options.
Enter G, F, Q, or H:
8. Type G to get to the new firmware image form the TFTP server. The following message appears:
Enter TFTP server address [192.168.1.168]:
9. Type the address of the TFTP server and press Enter. The following message appears:
Enter Local Address [192.168.1.188]:
10. Type an IP address the FortiGate unit can use to connect to the TFTP server. The IP address can be any IP
address that is valid for the network to which the interface is connected.
Make sure you do not enter the IP address of another device on this network.
Getting Started 87
Fortinet Technologies Inc.
Configuration Backups Basic Administration
Configuration revision
You can manage multiple versions of configuration files on models that have a 512MB flash memory and higher.
Revision control requires either a configured central management server or the local hard drive, if your FortiGate
has this feature. Typically, configuration backup to local drive is not available on lower-end models.
If central management is not configured on your FortiGate unit, a message appears instructing you to either:
Configuration revisions are viewed by clicking on admin in the upper right-hand corner of the screen and
selecting Configuration > Revisions.
Controlled upgrade
Using a controlled upgrade, you can upload a new version of the FortiOS firmware to a separate partition in the
FortiGate memory for later upgrade. The FortiGate unit can also be configured so that when it is rebooted, it will
automatically load the new firmware (CLI only). Using this option, you can stage a number of FortiGate units to
do an upgrade simultaneously to all devices using FortiManager or script.
Configuration Backups
Once you successfully configure the FortiGate, it is extremely important that you backup the configuration. In
some cases, you may need to reset the FortiGate to factory defaults or perform a TFTP upload of the firmware,
which will erase the existing configuration. In these instances, the configuration on the device will have to be
recreated, unless a backup can be used to restore it. You should also backup the local certificates, as the unique
SSL inspection CA and server certificates that are generated by your FortiGate by default are not saved in a
system backup.
It is also recommended that you backup the configuration after any future changes are made, to ensure you have
the most current configuration available. Also, backup the configuration before any upgrades of the FortiGate’s
firmware. Should anything happen to the configuration during the upgrade, you can easily restore the saved
configuration.
88 Getting Started
Fortinet Technologies Inc.
Basic Administration Configuration Backups
Always backup the configuration and store it on the management computer or off-site. You have the option to
save the configuration file to various locations including the local PC, USB key, FTP, and TFTP server. The last
two are configurable through the CLI only.
If you have VDOMs, you can back up the configuration of the entire FortiGate or only a specific VDOM. Note that
if you are using FortiManager or FortiCloud, full backups are performed and the option to backup individual
VDOMs will not appear.
You can also backup and restore your configuration using Secure File Copy (SCP).
See How to download/upload a FortiGate configuration file using secure file copy
(SCP).
3. If VDOMs are enabled, indicate whether the scope of the backup is for the entire FortiGate configuration (Global)
or only a specific VDOM configuration (VDOM).
4. If backing up a VDOM configuration, select the VDOM name from the list.
5. Select Encryption.
Encryption must be enabled on the backup file to back up VPN certificates.
6. Enter a password and enter it again to confirm it. You will need this password to restore the file.
7. Select OK.
8. The web browser will prompt you for a location to save the configuration file. The configuration file will have a
.conf extension.
or for FTP, note that port number, username are optional depending on the FTP site:
execute backup config ftp <backup_filename> <ftp_server> [<port>] [<user_name>]
[<password>]
or for TFTP:
execute backup config tftp <backup_filename> <tftp_servers> <password>
Getting Started 89
Fortinet Technologies Inc.
Configuration Backups Basic Administration
Use the same commands to backup a VDOM configuration by first entering the commands:
config vdom
edit <vdom_name>
1. Move the output file from the TFTP server location to the management computer.
2. Go to System > Certificates and select Import.
3. Select the appropriate type of certificate from the dropdown menu and fill in any required fields.
4. Select Upload. Browse to the location on the management computer where the exported file has been saved,
select the file and select Open.
5. If required, enter the Password needed to upload the exported file.
6. Select OK.
Restore a configuration
Should you need to restore a configuration file, use the following steps:
1. Click on admin in the upper right-hand corner of the screen and select Configuration > Restore.
2. Identify the source of the configuration file to be restored : your Local PC or a USB Disk.
The USB Disk option will be grayed out if no USB drive is inserted in the USB port. You can restore from the
FortiManager using the CLI.
3. Enter the path and file name of the configuration file, or select Browse to locate the file.
4. Enter a password if required.
90 Getting Started
Fortinet Technologies Inc.
Basic Administration Configuration Backups
5. Select Restore.
Troubleshooting
During the installation, some possible errors may occur, but the solutions are usually straightforward.
Configuration file error This error occurs when attempting to upload a configuration file that is
incompatible with the device. This may be due to the configuration file being for a
different model or being saved from a different version of firmware.
Solution: Upload a configuration file that is for the correct model of FortiGate
device and the correct version of the firmware.
Invalid password When the configuration file is saved, it can be protected by a password. The
password entered during the upload process is not matching the one associated
with the configuration file.
Configuration revision
You can manage multiple versions of configuration files on models that have a 512MB flash memory and higher.
Revision control requires either a configured central management server or the local hard drive, if your FortiGate
has this feature. Typically, configuration backup to local drive is not available on lower-end models.
If central management is not configured on your FortiGate unit, a message appears instructing you to either:
Getting Started 91
Fortinet Technologies Inc.
FortiGuard Basic Administration
Configuration revisions are viewed by clicking on admin in the upper right-hand corner of the screen and
selecting Configuration > Revisions.
Alternatively, in the CLI you can reset the factory defaults but retain the interface and VDOM configuration. Use
the following command:
execute factoryreset2
FortiGuard
The FortiGuard Distribution Network (FDN) of servers provides updates to antivirus, antispam, and IPS
definitions to your FortiGate. FortiGuard Subscription Services provides comprehensive Unified Threat
Management (UTM) security solutions to enable protection against content and network level threats.
The FortiGuard team can be found around the globe, monitoring virus, spyware and vulnerability activities. As
vulnerabilities are found, signatures are created and pushed to the subscribed FortiGates. The Global Threat
Research Team enables Fortinet to deliver a combination of multi-layered security intelligence and provide true
zero-day protection from new and emerging threats. The FortiGuard Network has data centers around the world
located in secure, high availability locations that automatically deliver updates to the Fortinet security platforms
to protect the network with the latest information.
FortiGuard provides a number of services to monitor world-wide activity and provide the best possible security,
including:
l Intrusion Prevention System (IPS) - IPS uses a customizable database of more than 4000 known threats to stop
attacks that evade conventional firewall defenses. It also provides behavior-based heuristics, enabling the system
to recognize threats when no signature has yet been developed. It also provides more than 1000 application identity
signatures for complete application control.
l Application Control - Application Control allows you to identify and control applications on networks and
endpoints regardless of port, protocol, and IP address used. It gives you unmatched visibility and control over
application traffic, even traffic from unknown applications and sources. Application Control is a free FortiGuard
service and the database for Application Control signatures is separate from the IPS database (Botnet Application
signatures are still part of the IPS signature database since these are more closely related with security issues and
less about application detection). Application Control signature database information is displayed under the
System > FortiGuard page in the FortiCare section.
Please note that while the Application Control profile can be used for free, signature
database updates require a valid FortiGuard subscription.
92 Getting Started
Fortinet Technologies Inc.
Basic Administration FortiGuard
l AntiVirus -The FortiGuard AntiVirus Service provides fully automated updates to ensure protection against the
latest content level threats. It employs advanced virus, spyware, and heuristic detection engines to prevent both
new and evolving threats from gaining access to your network and protects against vulnerabilities.
l Web Filtering - Web Filtering provides Web URL filtering to block access to harmful, inappropriate, and dangerous
web sites that may contain phishing/pharming attacks, malware such as spyware, or objectionable content that can
expose your organization to legal liability. Based on automatic research tools and targeted research analysis, real-
time updates enable you to apply highly-granular policies that filter web access based on six major categories and
nearly 80 micro-categories, over 45 million rated web sites, and more than two billion web pages - all continuously
updated.
l Vulnerability Scanning - FortiGuard Services provide comprehensive and continuous updates for vulnerabilities,
remediation, patch scan, and configuration benchmarks.
l Email Filtering - The FortiGuard Antispam Service uses both a sender IP reputation database and a spam
signature database, along with sophisticated spam filtering tools on Fortinet appliances and agents, to detect and
block a wide range of spam messages. Updates to the IP reputation and spam signature databases are provided
continuously via the FDN.
l Messaging Services - Messaging Services allow a secure email server to be automatically enabled on your
FortiGate to send alert email or send email authentication tokens. With the SMS gateway, you can enter phone
numbers where the FortiGate will send the SMS messages. Note that depending on your carrier, there may be a
slight time delay on receiving messages.
l DNS and DDNS - The FortiGuard DNS and DDNS services provide an efficient method of DNS lookups once
subscribed to the FortiGuard network. This is the default option. The FortiGate connects automatically to the
FortiGuard DNS server. If you do not register, you need to configure an alternate DNS server.
Configure the DDNS server settings using the CLI command:
config system fortiguard
set ddns-server-ip
set ddns-server-port
end
The License Information area displays the status of your FortiGate’s support contract.
You can also manually update the AntiVirus and IPS engines.
Verification - GUI:
The simplest method to check that the FortiGate is communicating with the FDN, is to check the License
Information dashboard widget. Any subscribed services should have a green check mark beside them indicating
that connections are successful. Any other icon indicates a problem with the connection, or you are not
subscribed to the FortiGuard services.
You can also view the FortiGuard connection status by going to System > FortiGuard.
Getting Started 93
Fortinet Technologies Inc.
FortiGuard Basic Administration
Verification - CLI:
You can also use the CLI to see what FortiGuard servers are available to your FortiGate. Use the following CLI
command to ping the FDN for a connection:
execute ping guard.fortinet.net
You can also use the following diagnose command to find out what FortiGuard servers are available:
diagnose debug rating
From this command, you will see output similar to the following:
Locale : english
License : Contract
Expiration : Sun Jul 24 20:00:00 2011
Hostname : service.fortiguard.net
-=- Server List (Tue Nov 2 11:12:28 2010) -=-
An extensive list of servers are available. Should you see a list of three to five available servers, the FortiGuard
servers are responding to DNS replies to service FortiGuard.net, but the INIT requests are not reaching FDS
services on the servers.
D Indicates the server was found via the DNS lookup of the hostname. If the hostname returns
more than one IP address, all of them will be flagged with 'D' and will be used first for INIT
requests before falling back to the other servers.
I Indicates the server to which the last INIT request was sent.
F The server has not responded to requests and is considered to have failed.
The server list is sorted first by weight and then the server with the smallest RTT is put at the top of the list,
regardless of weight. When a packet is lost, it will be resent to the next server in the list.
The weight for each server increases with failed packets and decreases with successful packets. To lower the
possibility of using a distant server, the weight is not allowed to dip below a base weight, which is calculated as
the difference in hours between the FortiGate and the server, multiplied by 10. The further away the server, the
higher its base weight and the lower in the list it will appear.
Port assignment
The FortiGate contacts FDN for the latest list of FDN servers by sending UDP packets with typical source ports of
1027 or 1031, and destination port 8888. The FDN reply packets have a destination port of 1027 or 1031.
94 Getting Started
Fortinet Technologies Inc.
Basic Administration FortiGuard
If your ISP blocks UDP packets in this port range, the FortiGate cannot receive the FDN reply packets. As a result,
the FortiGate will not receive the complete FDN server list.
If your ISP blocks the lower range of UDP ports (around 1024), you can configure your FortiGate to use higher-
numbered ports, using the CLI command:
config system global
set ip-src-port-range <start port>-<end port>
end
where the <start port> and <end port> are numbers ranging of 1024 to 25000.
For example, you could configure the FortiGate to not use ports lower than 2048 or ports higher than the
following range:
config system global
set ip-src-port-range 2048-20000
end
Trial and error may be required to select the best source port range. You can also contact your ISP to determine
the best range to use. Push updates might be unavailable if:
l there is a NAT device installed between the unit and the FDN, and/or
l your unit connects to the Internet using a proxy server.
Accept push Select to allow updates to be sent automatically to your FortiGate. New definitions will
updates be added as soon as they are released by FortiGuard.
l Enter the IP address and port of the NAT device in front of your FortiGate. FDS will
connect to this device when attempting to reach the FortiGate.
l The NAT device must be configured to forward the FDS traffic to the FortiGate on
UDP port 9443.
Scheduled Enable for updates to be sent to your FortiGate at a specific time. For example, to
Updates minimize traffic lag times, you can schedule the update to occur on weekends or after
work hours.
Note that a schedule of once a week means any urgent updates will not be pushed
until the scheduled time. However, if there is an urgent update required, select the
Update Now button.
Getting Started 95
Fortinet Technologies Inc.
FortiGuard Basic Administration
Improve IPS Enable to help Fortinet maintain and improve IPS signatures. The information sent to
quality the FortiGuard servers when an attack occurs can be used to keep the database
current as variants of attacks evolve.
Use extended IPS Regular IPS database protects against the latest common and in-the-wild attacks.
signature Extended IPS database includes protection from legacy attacks.
package
Manual updates
To manually update the signature definitions file, you need to first go to the Support web site at
https://support.fortinet.com. Once logged in, select Download > FortiGuard Service Updates. The browser
will present you the most current IPS and AntiVirus signature definitions which you can download.
Once downloaded to your computer, log into the FortiGate to load the definition file.
1. Go to System > FortiGuard.
2. In the License Information table, select the Upgrade Database link in either the Application Control
Signature, IPS, or AntiVirus row.
3. In the pop-up window, select Upload and locate the downloaded file and select Open.
The upload may take a few minutes to complete.
Automatic updates
The FortiGate can be configured to request updates from FDN on a scheduled basis, or via push notification.
Scheduling updates
Scheduling updates ensures that the virus and IPS definitions are downloaded to your FortiGate on a regular
basis, ensuring that you do not forget to check for the definition files yourself.
Updating definitions can cause a very short disruption in traffic currently being scanned while the FortiGate unit
applies the new signature database, Ideally, schedule updates during off-peak hours, such as evenings or
weekends, when network usage is minimal, to ensure that the network activity will not suffer from the added
traffic of downloading the definition files.
96 Getting Started
Fortinet Technologies Inc.
Basic Administration FortiGuard
Push updates
Push updates enable you to get immediate updates when new viruses or intrusions have been discovered and
new signatures created. This ensures that the latest signature will be sent to the FortiGate as soon as possible.
When a push notification occurs, the FortiGuard server sends a notice to the FortiGate that there is a new
signature definition file available. The FortiGate then initiates a download of the definition file, similar to the
scheduled update.
To ensure maximum security for your network, you should have a scheduled update as well as enable the push
update, in case an urgent signature is created, and your cycle of the updates only occurs weekly.
Push IP override
If the FortiGate is behind another NAT device (or another FortiGate), to ensure it receives the push update
notifications, you need to use an override IP address for the notifications. To do this, you create a virtual IP to
map to the external port of the NAT device.
Generally speaking, if there are two FortiGate devices, the following steps need to be completed on the
FortiGate NAT device to ensure the FortiGate on the internal network receives the updates:
l Add a port forwarding virtual IP to the FortiGate NAT device that connects to the Internet by going to Policy
& Objects > Virtual IPs.
l Add a security policy to the FortiGate NAT device that connects to the Internet that includes the port forwarding
virtual IP.
l Configure the FortiGate on the internal network with an override push IP and port.
On the FortiGate internal device, the virtual IP is entered as the Use push override IP address.
Getting Started 97
Fortinet Technologies Inc.
FortiGuard Basic Administration
The statistics include some non-personal information that identifies your FortiGate and its country. The
information is never shared with external parties. You can choose to disable the sharing of this information by
entering the following CLI command:
config system global
set fds-statistics disable
end
Web Filter Cache Set the Time To Live (TTL) value. This is the number of seconds the
FortiGate will store a blocked IP or URL locally, saving time and network
access traffic, checking the FortiGuard server. Once the TTL has expired,
the FortiGate will contact an FDN server to verify a web address. The TTL
must be between 300 and 86400 seconds.
FortiGuard Filtering Port Select the port assignments for contacting the FortiGuard servers.
Filtering Service Indicates the status of the filtering service. Select Check Again if the
Availability filtering service is not available.
Request re-evaluation of a Select to re-evaluate a URL’s category rating on the FortiGuard Web Filter
URL's category service.
Email filtering
The FortiGuard data centers monitor and update email databases of known spam sources. With FortiGuard Anti-
Spam filtering enabled, the FortiGate verifies incoming email sender addresses and IPs against the database,
and takes the necessary actions as defined within the antivirus profiles.
98 Getting Started
Fortinet Technologies Inc.
Basic Administration FortiCloud
Spam source IP addresses can also be cached locally on the FortiGate, providing a quicker response time, while
easing load on the FortiGuard servers, aiding in a quicker response time for less common email address
requests.
By default, the anti-spam cache is enabled. The cache includes a TTL value, which is the amount of time an
email address will stay in the cache before expiring. You can change this value to shorten or extend the time
between 5 and 1,440 minutes.
1. Go to System > FortiGuard.
2. Under Filtering, enable Anti-Spam Cache.
3. Enter the TTL value in minutes.
4. Select Apply.
Further antispam filtering options can be configured to block, allow, or quarantine specific email addresses.
These configurations are available through the Security Profiles > Anti-Spam menu.
l URL lookup — By entering a website address, you can see if it has been rated and what category and
classification it is filed as. If you find your website or a site you commonly go to has been wrongly categorized, you
can use this page to request that the site be re-evaluated.
https://fortiguard.com/webfilter
l Threat Encyclopedia — Browse the Fortiguard Labs extensive encyclopedia of threats. Search for viruses, botnet
C&C, IPS, endpoint vulnerabilities, and mobile malware.
https://www.fortiguard.com/encyclopedia
l Application Control — Browse the Fortiguard Labs extensive encyclopedia of applications.
https://fortiguard.com/appcontrol
FortiCloud
FortiCloud is a hosted security management and log retention service for FortiGate devices. It gives you
centralized reporting, traffic analysis, configuration management, and log retention without the need for
additional hardware or software.
l Simplified central management — FortiCloud provides a central web-based management console to manage
individual or aggregated FortiGate and FortiWiFi devices. Adding a device to the FortiCloud management
subscription is straightforward. FortiCloud has detailed traffic and application visibility across the whole network.
Getting Started 99
Fortinet Technologies Inc.
FortiCloud Basic Administration
l Hosted log retention with large default storage allocated — Log retention is an integral part of any security
and compliance program but administering a separate storage system is burdensome. FortiCloud takes care of this
automatically and stores the valuable log information in the cloud. Each device is allowed up to 200GB of log
retention storage. Different types of logs can be stored including Traffic, System Events, Web, Applications, and
Security Events.
l Monitoring and alerting in real time — Network availability is critical to a good end-user experience. FortiCloud
enables you to monitor your FortiGate network in real time with different alerting mechanisms to pinpoint potential
issues. Alerting mechanisms can be delivered via email.
l Customized or pre-configured reporting and analysis tools — Reporting and analysis are your eyes and
ears into your network’s health and security. Pre-configured reports are available, as well as custom reports that can
be tailored to your specific reporting and compliance requirements. For example, you may want to look closely at
application usage or website violations. The reports can be emailed as PDFs and can cover different time periods.
l Maintain important configuration information uniformly — The correct configuration of the devices within
your network is essential to maintaining an optimum performance and security posture. In addition, maintaining the
correct firmware (operating system) level allows you to take advantage of the latest features.
l Service security — All communication (including log information) between the devices and the clouds is
encrypted. Redundant data centers are always used to give the service high availability. Operational security
measures have been put in place to make sure your data is secure — only you can view or retrieve it.
Before you can activate a FortiCloud account, you must first register your device.
FortiCloud accounts can be registered manually through the FortiCloud website, https://www.forticloud.com, but
you can easily register and activate your account directly from your FortiGate.
1. On your device’s dashboard, in the FortiCloud widget, select the Activate button in the status field.
2. A dialogue asking you to register your FortiCloud account appears. Select Create Account, enter your
information, view and accept the terms and conditions, and select OK.
3. A second dialogue window appears, asking you to enter your information to confirm your account. This sends a
confirmation email to your registered email. The dashboard widget then updates to show that confirmation is
required.
4. Open your email, and follow the confirmation link it contains.
Results
A FortiCloud page will open, stating that your account has been confirmed. The Activation Pending message on
the dashboard will change to state the type of account you have (‘1GB Free’ or ‘200GB Subscription’), and will
provide a link to the FortiCloud portal.
3. Select Test Connectivity to ensure that your FortiGate can connect to the registered FortiCloud account.
4. Scroll down to GUI Preferences, set Display Logs/FortiView From, to see FortiCloud logs within the
FortiGate's GUI.
l If you have direct networked access to the FortiGate, you can simply open your Dashboard and check the License
Information widget. Next to the current FortiCloud connection status will be a link to reach the FortiCloud Portal.
l If you do not currently have access to the FortiGate’s interface, you can visit the FortiCloud website
(https://forticloud.com) and log in remotely, using your email and password. It will ask you to confirm the FortiCloud
account you are connecting to and then you will be granted access. Connected devices can be remotely configured
using the Scripts page in the Management Tab, useful if an administrator may be away from the unit for a long
period of time.
Cloud Sandboxing
FortiCloud can be used for automated sample tracking, or sandboxing, for files from a FortiGate. This allows
suspicious files to be sent to be inspected without risking network security. If the file exhibits risky behavior, or is
found to contain a virus, a new virus signature is created and added to the FortiGuard antivirus signature
database.
Cloud sandboxing is configured by going to Security Fabric > Settings. After enabling Sandbox Inspection,
select the FortiSandbox type.
Sandboxing results are shown in a new tab called AV Submissions in the FortiCloud portal. This tab only
appears after a file has been sent for sandboxing.
If your FortiGate does not function as desired after installation, try the following troubleshooting tips:
If the name cannot be resolved, the FortiGate or PC cannot connect to a DNS server and you should confirm that
the DNS server IP addresses are present and correct.
12. Confirm that the FortiGate can connect to the FortiGuard network
Once registered, the FortiGate obtains AntiVirus and Application Control and other updates from the FortiGuard
network. Once the FortiGate is on your network, you should confirm that it can reach the FortiGuard network.
First, check the License Information widget to make sure that the status of all FortiGuard services matches the
services that you have purchased.
Go to System > FortiGuard. Scroll down to Filtering Services Availability and select Check Again. After a
minute, the GUI should indicate a successful connection.
13. Consider changing the MAC address of your external interface
Some ISPs do not want the MAC address of the device connecting to their network cable to change. If you have
added a FortiGate to your network, you may have to change the MAC address of the Internet-facing interface
using the following CLI command:
config system interface
edit <interface>
set macaddr <xx:xx:xx:xx:xx:xx>
end
end
14. Either reset the FortiGate to factory defaults or contact Fortinet Support for assistance. See the note below before
contacting support.
To reset the FortiGate to factory defaults, use the CLI command execute factoryreset. When prompted,
type y to confirm the reset.
Here's a list of some resources you can check out next to help you get the most out of your newly installed and
configured FortiGate.
Best Practices
The Best Practices document is a collection of guidelines to ensure the most secure and reliable operation of
FortiGates in a customer environment. It is updated periodically as new issues are identified.
The Fortinet Video Library contains video tutorials showing how to configure various Fortinet products, including
FortiGates.
The Fortinet Video Library can be found at http://video.fortinet.com. You can also subscribe to Fortinet's
YouTube channel.
The FortiOS Handbook is the complete guide to FortiOS, covering a variety of FortiGate configurations. The
Handbook is available as a single complete document online. Handbook chapters are also available as
standalone documents.