index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
555
Network b. Configure the ISP2 BGP: config router bgp set as 300 set router-id 4.4.4.4 config neighbor edit "23.1.1.3" set remote-as 200 set route-map-out "MED_Route_MAP_2" next end end 7. Verify that ISP1 is selected as the best path to reach the 11.11.11.0/24 network: The neighbor that is considered the best, valid ro...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
556
Network reliability of BGP connections and contributes to the overall security of the internet. To set the algorithm to AES-128 CMAC: config router key-chain edit <name> config key edit <id> set algorithm cmac-aes128 next end next end To select the key-chain with the TCP-AO in a neighbor or neighbor group: config route...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
557
Network edit "2.2.2.2" set auth-options "11" next end end 3. Verify that the router BGP is using the algorithm.  The command output shows that BGP neighbor 2.2.2.2 is using the AES-128 CMAC algorithm. # diagnose sys tcp-auth-options VFID=0 send-id=1 recv-id=1 flags=0x784 keylen=6 alg=2(aes128) addr=2.2.2.2 send-begin: ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
558
Network To assign multiple remote AS to a single BGP neighbor group in the local hub: 1. Configure the AS path list: config router aspath-list edit "aslist1" config rule edit 1 set action permit set regexp "^6550[1-6]$" next end next end 2. Configure the BGP neighbor group of the hub to point to the AS path list: confi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
559
Network set allow-routing {enable | disable} next end config firewall addrgrp edit <group> set allow-routing {enable | disable} next end config router bgp config network edit <id> set prefix-name <address or group> next end end allow-routing {enable | disable} Enable/disable use of this address/group in routing configu...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
560
Network config router bgp ... config network edit 2 set prefix-name "333" next edit 20 set network-import-check disable set prefix-name "group1" next edit 66 set prefix-name "vlan55 address" next end ... end Troubleshooting BGP There are some features in BGP that are used to deal with problems that may arise. Typically...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
561
Network The first method of dealing with route flap is to check your hardware. If a cable is loose or bad, it can easily be replaced and eliminate the problem. If an interface on the router is bad, either avoid using that interface or swap in a functioning router. If the power source is bad on a router, either replace ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
562
Network end end Dampening Dampening is a method that's used to limit the amount of network problems due to flapping routes. With dampening, the flapping still occurs but the peer routers pay less and less attention to that route as it flaps more often. One flap doesn't start dampening, but the second flap starts a time...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
563
Network offline. This way, its neighboring routers don't remove it from their routing tables. However, if that router isn't back online when expected, the routers will mark it offline. This prevents routing flap and its associated problems. FortiGate devices support both graceful restart of their own BGP routing softwa...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
564
Network For more information about BFD, see BFD on page 565. BGP path selection process Sometimes the FortiGate may receive multiple BGP paths from neighbors and must decide which is the best path to take. The following criteria are used to determine the best path. Consider only routes with no AS loops and a valid next...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
565
Network To configure BFD for an interface: config system interface edit <interface-name> set bfd {global | enable | disable} set bfd-desired-min-tx <ms> set bfd-required-min-rx <ms> set bfd-detect-mult <multiplier> next end To configure BFD neighbors: config router {bfd | bfd6} config neighbor edit <IP-address> set int...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
566
Network Example The following example demonstrates the configuration of static routes between two FortiGates. There is a host behind FortiGate 2 with an IP address of 1.1.1.1. FortiGate 1 has multiple paths to reach the host. To configure static routes: 1. Configure FortiGate 1: config system interface edit "port1" set...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
567
Network set device "port1" set bfd enable next edit 3 set dst 1.1.1.1 255.255.255.255 set gateway 10.180.2.44 set distance 20 set device "port1" next end 4. Confirm that BFD neighborship is established: # get router info bfd neighbor OurAddress NeighAddress State Interface LDesc/RDesc 10.180.6.237 10.180.4.136 UP port1...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
568
Network To enable BFD on a specific OSPF interface: config router {ospf | ospf6} set bfd enable config {ospf-interface | ospf6-interface} edit <ID> set bfd {global | enable | disable} set area-id <IP address> next end end If BFD is configured when OSPF is not, no BFD packets will be sent. When both BFD and OSFP are con...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
569
Network set auth-mode {none | md5} set md5-key <password> next end end Troubleshooting BFD You can troubleshoot BFD using the following commands: # get router {info | info6} bfd neighbor # get router {info | info6} bfd requests # diagnose sniffer packet any <filter> <sniffer count> # diagnose debug application bfdd <de...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
570
Network Example This example includes IPv4 and IPv6 BFD neighbor configurations. The BFD neighbor is also a BGP neighbor that is in a different AS. To configure BFD with multihop BGP paths: 1. Enable BFD on all interfaces: config system settings set bfd enable end 2. Enable BFD on port1 and ignore the global configurat...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
571
Network end end 5. Configure the IPv6 BFD: config router bfd6 config multihop-template edit 1 set src 2000:172:16:200::/64 set dst 2000:172:16:201::/64 next end end Testing the connection 1. Verify the BFD status for IPv4 and IPv6: # get router info bfd requests BFD Peer Requests: client types(ct in 0x): 01=external 02...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
572
Network B 172.28.2.0/24 [20/0] via 172.16.201.2 (recursive via 172.16.200.4, port1), 00:54:32 B 172.28.5.0/24 [20/0] via 172.16.201.2 (recursive via 172.16.200.4, port1), 00:54:32 B 172.28.6.0/24 [20/0] via 172.16.201.2 (recursive via 172.16.200.4, port1), 00:54:32 # get router info6 bgp summary VRF 0 BGP router identi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
573
Network 2000:172:16:201::2 4 65050 165 167 9 0 0 00:00:12 3 Total number of neighbors 2 5. The BGP routes are learned again, and there are new timers in the route tables: # get router info routing-table bgp Routing table for VRF=0 B 172.28.1.0/24 [20/0] via 172.16.201.2 (recursive via 172.16.200.4, port1), 00:00:15 B 1...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
574
Network the configuration. Despite this placement, FortiOS will process the rules in the ascending order of Rule ID number: 10, 15, 20, 30, then 40. To enhance readability and maintain an organized configuration, it is recommended to arrange the rules sequentially by their IDs. This can be achieved by deleting and re-a...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
575
Network To use a route map with OSPF: config router ospf set default-information-route-map <string> set distribute-route-map-in <string> config redistribute <string> set routemap <string> end end default-information￾route-map <string> Enter the default information route map. distribute-route-map-in <string> Enter the r...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
576
Network route-map-out6 <string> Enter the IPv6 outbound route map filter. route-map-out6-preferable <string> Enter the IPv6 outbound route map filter if the peer is preferred. route-map-out-vpnv4 <string> Enter the VPNv4 outbound route map filter. route-map-out-vpnv4- preferable <string> Enter the VPNv4 outbound route ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
577
Network To configure an IPv6 access list: config router access-list6 edit <name> config rule edit <id> set action {permit | deny} set prefix <IPv6_address> set exact-match {enable | disable} next end next end In RIP, an access list can be used in the distribute-list setting to filter received or advertised routes, or i...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
578
Network distribute-list-in <string> Enter the filter for incoming routes. access-list <string> Enter the access list name. In BGP, an access list can be used to filter updates from a neighbor or to a neighbor. To use an access list in BGP: config router bgp config neighbor edit <ip> set distribute-list-in <string> set ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
579
Network match-ip-address <string> Match an IPv4 address permitted by access-list or prefix-list. match-ip6-address <string> Match an IPv6 address permitted by access-list6 or prefix-list6. match-ip-nexthop <string> Match a next hop IPv4 address passed by access-list or prefix-list. match-ip6-nexthop <string> Match a ne...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
580
Network next end end listname <string> Enter the distribute access or prefix list name. In OSPF, a prefix list can be used in the distribute-list-in setting to act as a filter to prevent a certain route from being inserted into the routing table. To use a prefix list in OSPF: config router ospf set distribute-list-in <...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
581
Network edit <id> set match-ip-address <string> set match-ip6-address <string> set match-ip-nexthop <string> set match-ip6-nexthop <string> next end next end match-ip-address <string> Match an IPv4 address permitted by access-list or prefix-list. match-ip6-address <string> Match an IPv6 address permitted by access-list...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
582
Network filter-list-in6 <string> Enter the BGP filter for IPv6 inbound routes. filter-list-out <string> Enter the BGP filter for IPv4 outbound routes. filter-list-out6 <string> Enter the BGP filter for IPv6 outbound routes. To use an AS path list in a route map: config router route-map edit <name> config rule edit <id>...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
583
Network In an SD-WAN deployment, a remote BGP router or spoke may communicate a preferred interface or path to route traffic using a community string. See Using BGP tags with SD-WAN rules on page 1046 and Controlling traffic with BGP route mapping and service rules on page 1051 for examples. Multicast The following top...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
584
Network When PIM is enabled, the FortiGate allocates memory to manage mapping information. The FortiGate communicates with neighboring PIM routers to acquire mapping information and, if required, processes the multicast traffic associated with specific multicast groups. Instead of sending multiple copies of generated I...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
585
Network NPU offloading of VRF multicast traffic on a dynamic IPsec tunnel is not supported. Example This example uses the following topology: In this example, the multicast server: l Sends out multicast traffic 225.1.1.1 from 22.1.1.22 in VRF1. l Sends out multicast traffic 225.1.1.2 from 22.1.1.55 in VRF2. To verify V...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
586
Network Configuring multicast forwarding There is sometimes confusion between the terms forwarding and routing. These two functions should not take place at the same time. Multicast forwarding should be enabled when the FortiGate is in NAT mode and you want to forward multicast packets between multicast routers and rec...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
587
Network avoid any issues during transmission, you can disable multicast-skip-policy and configure multicast security policies. To disable multicast traffic from passing through the FortiGate without a policy check in transparent mode: config system settings set multicast-skip-policy disable end Configuring multicast po...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
588
Network Name basic Incoming Interface any Outgoing Interface any Source Address all Destination Address all 3. Click OK. Sample policy with specific source and destination interfaces This multicast policy only applies to the source port wan1 and the destination port internal. To configure the multicast policy in the CL...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
589
Network Name SrcDst Incoming Interface wan1 Outgoing Interface internal Source Address all Destination Address all 3. Click OK. Sample policy with specific source address object In this policy, packets are allowed to flow from wan1 to internal, and sourced by the address 172.20.120.129, which is represented by the exam...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
590
Network Name SrcAdd Incoming Interface wan1 Outgoing Interface internal Source Address example_addr-1 Destination Address all 3. Click OK. Sample detailed policy This policy accepts multicast packets that are sent from a PC with IP address 192.168.5.18 to destination address range 239.168.4.0-255. The policy allows the...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
591
Network To configure multicast policies in the GUI, enable Multicast Policy in System > Feature Visibility. Using multi-VDOM mode When using multi-VDOM mode, it is important to avoid causing a multicast network loop by creating an all-to-all multicast policy. By default, on models that support NPU virtual links, changi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
592
Network next end IPv4 and IPv6 multicast policies can be configured in the GUI. Go to System > Feature Visibility, and enable Multicast Policy and IPv6. The multicast policy dialog page (Policy & Objects > Multicast Policy) includes a Security Profiles section where you can enable IPS and apply an IPS profile. Example ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
593
Network next end 2. Configure the IPS sensor: config ips sensor edit "test-meicar-1" config entries edit 1 set rule 9999 set status enable set action block next end next end 3. Configure the multicast policy: config firewall multicast-policy edit 1 set srcintf "port38" set dstintf "port37" set srcaddr "all" set dstaddr...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
594
Network a. Verify the IPS event log: # execute log filter category 4 # execute log display 1 logs found. 1 logs returned. 1: date=2023-11-01 time=17:01:43 eventtime=1698883303178500916 tz="-0700" logid="0419016384" type="utm" subtype="ips" eventtype="signature" level="alert" vd="vd1" severity="medium" srcip=10.1.100.11...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
595
Network Value Description disable Do not add denied multicast sessions to the session table (default). enable Include denied multicast sessions in the session table. Example In this example, denied multicast sessions are included in the session table of the VDOM. A deny multicast policy is created and a packet is then ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
596
Network FortiExtender Two configuration modes are available on FortiGate for FortiExtender integration: WAN extension mode and LAN extension mode. For information about configuring FortiExtender, see the FortiExtender Admin Guide (FGT￾Managed) and Admin Guide (Standalone). WAN extension mode In WAN extension mode, the ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
597
Network FortiGate Models WAN LAN FortiGate 40F series and its variants, FortiGate VM01 2 0 FortiGate 60F, 70F, 80F series and their variants, FortiGate VM02 2 16 FortiGate 100E to 200F series and their variants 2 16 FortiGate 400F to 900G series and their variants, FortiGate VM04 2 32 FortiGate 1000D to 2600F series an...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
598
Network 7. Click OK. 8. In the extenders list, right-click on the FortiExtender and select Diagnostics and Tools to review the modem and SIM status, and other details about the FortiExtender. To create a virtual FortiExtender interface in the CLI: config system interface edit "fext" set vdom "root" set mode dhcp set al...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
599
Network LTE modems The following topics include information about configuring and using LTE modems: l Automatic LTE connection establishment on page 600 l Direct IP support for LTE/4G on page 600 l Cellular interface support for IPv6 on page 603 l Active SIM card switching on page 606 l Airplane mode and LTE/BLE on pag...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
600
Network config system lte-modem set status enable end 2. Check that the LTE interface was created: config system interface edit "wwan" set vdom "root" set mode dhcp set status down set distance 1 set type physical set snmp-index 23 next end Shortly after the LTE modem joins its carrier network, wwan is enabled and gran...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
601
Network Sample LTE interface When an LTE modem is enabled, you can view the LTE interface in the GUI and check the acquired IP, DNS, and gateway. To view the LTE interface in the GUI: 1. Go to Network > Interfaces. 2. Double-click the LTE interface (wwan) to view the properties. 3. Look in the Address section to see th...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
602
Network Sample FortiGate 30E-3G4G default configuration: config system lte-modem set status enable set extra-init '' set manual-handover disable set force-wireless-profile 0 set authtype none set apn '' set modem-port 255 set network-type auto set auto-connect disable set gpsd-enabled disable set data-usage-tracking di...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
603
Network 2. List all profiles. In the following example, PDP_Type is set to 3 to indicate support for both IPv4 and IPv6. # execute lte-modem wireless-profile list  ID Type  Name  APN PDP_Type  Authen  Username  1 0  ota.bell.ca  3  0  2 0  Bell  ota.bell.ca  3  0  Profile Type: 0 ==> QMI_WDS_PROFILE_TYPE_3GPP Profile P...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
604
Network IPv6 GW prefix len:  64 IPv6 PRI DNS:  2605:b100:880:9::1 IPv6 SEC DNS:  2605:b100:680:9::1 MTU: 1500 Link protocol: QMI_WDA_LINK_LAYER_PROTOCOL_RAW_IP Auto connect:  QMI_WDS_AUTOCONNECT_DISABLED Network type:  Unknown WDS Bearer Tech Network type(last):  Unknown WDS Bearer Tech 5. Verify IPv4. In the following...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
605
Network  E1 - OSPF external type 1, E2 - OSPF external type 2  i - IS-IS, B - BGP, V - BGP VPNv6  > - selected route, * - FIB route, p - stale info Timers: Uptime Routing table for VRF=0 S  *> ::/0 [10/0] via 2605:b100:93b:cf64:60c8:e41d:be4b:eaf5, wwan, 00:09:20, [1024/0] C  *> ::1/128 via ::, root, 00:24:50 C  *> 260...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
606
Network saturday} set billing-hour <integer> set overage {enable | disable} set iccid <string> set delay-switch-time <time> next end end data-usage-tracking {enable | disable} Enable tracking of data usage for the LTE modem: l enable: track data usage. l disable: do not track data usage. Must be enabled to configure SI...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
607
Network data-limit-alert <integer> Specify at what percentage of used data-limit to trigger a log entry (1 - 99). billing-period {month | week | day} Specify the billing period. billing-date <integer> When billing-period is set to monthly, specify what day of the month the bill is issued (1 - 31). billing-weekday {sund...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
608
Network 7: date=2023-05-02 time=10:41:05 eventtime=1683049264795418820 tz="-0700" logid="0100046518" type="event" subtype="system" level="information" vd="root" logdesc="LTE modem active SIM card switch event" msg="LTE modem active SIM card slot changed to 2 by user." Example 2 In this example, automatic SIM card switc...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
609
Network With this configuration, the second SIM card becomes active when the modem cannot establish a connection with the carrier through the active SIM card. For example, a FortiGate is in a room with poor signal quality. With this configuration, the SIM card switch is triggered after the modem is detected as disconne...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
610
Network Service-detect: disable Diffservcode: 000000 Class-ID: 0 Peer: 8.8.8.8(8.8.8.8) Source IP(10.192.195.164) Route: 10.192.195.164->8.8.8.8/32, gwy(10.192.195.165) protocol: ping, state: dead Packet lost: 11.667% MOS: 4.353 Number of out-of-sequence packets: 0 Recovery times(5/8) Fail Times(1/3) Packet sent: 60, r...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
611
Network config system lte-modem config data-plan edit "1" set target-sim-slot SIM-slot-1 set data-limit 50 set billing-period monthly set overage disable set billing-date 10 next edit "2" set target-sim-slot SIM-slot-2 set data-limit 60 set billing-period monthly set overage disable set billing-date 1 next end end When...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
612
Network Country: Canada Network: Fido SIM PIN status: Verified Airplane mode and LTE/BLE Airplane mode is supported on FGR-70F-3G4G models to enable/disable radio frequency signals for the internal LTE modem and Bluetooth Low Energy (BLE) module: config system global set airplane-mode {disable | enable} end By default ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
613
Network diagnose sys lte-modem data-session-info Get session information about the LTE modem. diagnose bluetooth test_ bt_conn Check the status of the BLE mode. diagnose bluetooth status Check the bluetooth status of the BLE mode. To enable airplane mode: 1. Enable airplane mode: config system global ... set airplane-m...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
614
Network 9. Check Bluetooth status to confirm that the BLE module is disabled. # diagnose bluetooth status Bluetooth Status: RESET BOOTLOADER Connect State(0): BLE_MODE_DISABLED Upgrade LTE modem firmware directly from FortiGuard LTE modem firmware can be upgraded directly from the FortiGuard. This simplifies the proces...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
615
Network l Recurring: Schedule a recurring upgrade to the firmware from FortiGuard based on a set Interval, start date, and start time. 6. Click OK. To schedule a one time LTE modem firmware upgrade from FortiGuard in the CLI: config system central-management set type fortiguard set ltefw-upgrade-time <YYYY-MM-DD HH:MM:...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
616
Network LLDP reception Device detection can scan LLDP as a source for device identification, but the FortiGate does not read or store the full information. Enabling LLDP reception allows the FortiGate to receive and store LLDP messages, learn about active neighbors, and makes the LLDP information available via the CLI,...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
617
Network To view the received LLDP information in the CLI: # diagnose user device list hosts vd root/0 00:0c:29:1c:03:ca gen 4320 req 0 created 515971s gen 31 seen 28s port1 gen 12 hardware vendor 'Fortinet' src lldp id 4120 weight 255 type 'Router' src lldp id 4120 weight 255 family 'FortiGate' src lldp id 4120 weight ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
618
Network "port_desc":"port12", "system_name":"S124DN3W00000000", "system_desc":"FortiSwitch-124D v3.6.6,build0416,180515 (GA)", "ttl":120, "addresses":[ { "type":"ipv4", "address":"192.168.1.99" } ] } ], "vdom":"root", "path":"network", "name":"lldp", "action":"neighbors", "status":"success", "serial":"FG201E4Q00000000"...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
619
Network Up to 512 VRFs can be configured per VDOM for any device, but only ten VDOMs can be configured by default on a FortiGate (more VDOMs can be configured on larger devices with additional licenses). l Implementing VRF on page 620 l VRF routing support on page 621 l Route leaking between VRFs with BGP on page 630 l...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
620
Network 5. To add the VRF column in the interface table, click the gear icon, select VRF, and click Apply. To configure a VRF ID on an interface in the CLI: config system interface edit interface42 ... set vrf 14 next end VRF routing support VRF supports static routing, OSPF, and BGP. Other routing protocols require us...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
621
Network To configure the hub: config router bgp set as 65000 config neighbor edit "10.101.101.2" set soft-reconfiguration enable set interface "port2" set remote-as 65101 set update-source "port2" next edit "10.102.102.2" set soft-reconfiguration enable set interface "port3" set remote-as 65102 set update-source "port3...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
622
Network To verify the BGP neighbors and check the routing table on the hub: # get router info bgp summary BGP router identifier 192.168.0.1, local AS number 65000 BGP table version is 2 2 BGP AS-PATH entries 0 BGP community entries Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd 10.101.101.2 4 65101 ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
623
Network # get router info bgp summary VRF 10 BGP router identifier 10.101.101.1, local AS number 65000 BGP table version is 1 2 BGP AS-PATH entries 0 BGP community entries Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd 10.101.101.2 4 65101 4 4 2 0 0 00:02:05 3 Total number of neighbors 1 VRF 10 BGP ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
624
Network To configure the hub: 1. Allow configuration of subnet overlap: config system settings set allow-subnet-overlap enable end 2. Configure IP addresses on port4 and port5: config system interface edit "port4" set ip 192.168.103.1 255.255.255.0 next end config system interface edit "port5" set ip 192.168.103.1 255....
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
625
Network end end To verify the routing table before using route-map: 1. Verify that the routing table on Branch 101 displays only BGP routes: # get router info routing-table bgp Routing table for VRF=0 B 192.168.103.0/24 [20/0] via 10.102.102.1, port2, 00:17:04, [1/0] 2. Verify that the routing table on Branch 102 displ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
626
Network To verify the routing table after using route-map: 1. Verify the routing table on Branch 101: # get router info routing-table bgp Routing table for VRF=0 B 192.168.103.0/24 [20/0] via 10.102.102.1, port2, 00:17:04, [1/0] 2. Check the routing table on Branch 102. The routes are not advertised to BGP peer belongi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
627
Network next edit 0 set prefix 10.102.102.0 255.255.255.0 next edit 0 set prefix 192.168.1.0 255.255.255.0 next end end 2. Put the interfaces into VRF: config system interface edit port2 set vrf 10 next edit port3 set vrf 20 next end To configure branch 101: config router ospf set router-id 101.101.101.101 config area ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
628
Network To add a VRF ID in a static route in the GUI: 1. Configure the interface: a. Go to Network > Interfaces. b. Click Create New > Interface or Edit an existing interface. c. Enter a value in the VRF ID field. d. Configure the other settings as needed. e. Click OK. 2. Add a static route to VRF. For example, using b...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
629
Network set device "vpn1" set vrf 10 next end To check the routing table: # get router info routing-table static Route leaking between VRFs with BGP Route leaking allows you to configure communication between VRFs. If route leaking is not configured, then the VRFs are isolated. This example shows route leaking with BGP...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
630
Network config system interface edit link-10-20-0 set vdom "root" set vrf 10 set ip 10.1.1.1/30 next edit link-10-20-1 set vdom "root" set vrf 20 set ip 10.1.1.2/30 next end 4. Create the prefix lists: These objects define the subnet and mask that are leaked. config router prefix-list edit VRF10_Route config rule edit ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
631
Network edit "10" config leak-target edit "20" set route-map "Leak_from_VRF10_to_VRF20" set interface "link-10-20-0" next end next edit "20" config leak-target edit "10" set route-map "Leak_from_VRF20_to_VRF10" set interface "link-10-20-1" next end next end end 7. Create policies to allow traffic between the VRFs. With...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
632
Network Logical topology: In this example, a specific route is leaked from each of the VRFs to each of the other VRFs. VLAN subinterfaces are created based on VDOM links to connect each VRF to the core VRF router. NPU inter-VDOM links are used to accelerate traffic between VRFs. The setup could be configured by creatin...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
633
Network config system settings set allow-subnet-overlap enable end 3. Configure the inter-connecting VLAN subinterfaces between VRF based on VDOM-LINK: config system interface edit "vlink0_Vlan_10" set vdom "root" set vrf 10 set ip 10.1.1.1 255.255.255.252 set allowaccess ping https ssh http set alias "vlink0_Vlan_10" ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
634
Network edit "vlink1_Vlan_12" set vdom "root" set vrf 31 set ip 12.1.1.2 255.255.255.252 set allowaccess ping https ssh http set alias "vlink1_Vlan_12" set role lan set interface "npu0_vlink1" set vlanid 12 next end 4. Configure a zone to allow intrazone traffic between VLANs in the central VRF: config system zone edit...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
635
Network set interface "internal" set vlanid 10 next edit "Internal_VRF11" set vdom "root" set vrf 11 set ip 172.16.11.1 255.255.255.0 set allowaccess ping https ssh http set alias "Internal_VRF11" set role lan set interface "internal" set vlanid 11 next edit "Internal_VRF12" set vdom "root" set vrf 12 set ip 172.16.12....
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
636
Network config router static edit 1 set dst 172.16.10.0 255.255.255.0 set gateway 10.1.1.1 set device "vlink1_Vlan_10" set comment "VRF31_Core_Router" next edit 2 set dst 172.16.11.0 255.255.255.0 set gateway 11.1.1.1 set device "vlink1_Vlan_11" set comment "VRF31_Core_Router" next edit 3 set dst 172.16.12.0 255.255.25...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
637
Network edit 10 set gateway 202.100.10.254 set device "wan1_VRF10" set comment "VRF10_Default_Route" next edit 11 set gateway 202.100.11.254 set device "wan1_VRF11" set comment "VRF11_Default_Route" next edit 12 set gateway 202.100.12.254 set device "wan1_VRF12" set comment "VRF12_Default_Route" next end In the GUI, go...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
638
Network set logtraffic all next edit 8 set name "VRF_Leaking_Route_to_VRF10" set srcintf "vlink0_Vlan_10" set dstintf "Internal_VRF10" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ALL" set logtraffic all next edit 9 set name "VRF11_to_Internet_Policy" set srcintf "Internal_VR...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
639
Network set service "ALL" set logtraffic all set nat enable next edit 13 set name "VRF12_to_VRF_Leaking_Route" set uuid 92bccf8e-b27b-51eb-3c56-6d5259af6299 set srcintf "Internal_VRF12" set dstintf "vlink0_Vlan_12" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ALL" set logtraf...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
640
Network C 11.1.1.0/30 is directly connected, vlink0_Vlan_11 S 172.16.10.0/24 [10/0] via 11.1.1.2, vlink0_Vlan_11 C 172.16.11.0/24 is directly connected, Internal_VRF11 S 172.16.12.0/24 [10/0] via 11.1.1.2, vlink0_Vlan_11 C 202.100.11.0/24 is directly connected, wan1_VRF11 Routing table for VRF=12 S* 0.0.0.0/0 [10/0] vi...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
641
Network 64 bytes from 202.100.10.254: icmp_seq=2 ttl=254 time=0.225 ms 64 bytes from 202.100.10.254: icmp_seq=3 ttl=254 time=0.197 ms ^C --- 202.100.10.254 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2000ms rtt min/avg/max/mdev = 0.197/0.238/0.294/0.044 ms c. Ping the FW11-PC on VRF11 fr...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
642
Network VRF with IPv6 IPv6 routes support VRF. Static, connected, OSPF, and BGP routes can be isolated in different VRFs. BGP IPv6 routes can be leaked from one VRF to another. config router bgp config vrf6 edit <origin vrf-id> config leak-target edit <target vrf-id> set route-map <route-map> set interface <interface> ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
643
Network set remote-as 20 next end end 2. Configure the VLAN interfaces: config system interface edit "vlan55" set vdom "root" set vrf 10 set ip 55.1.1.1 255.255.255.0 set device-identification enable set role lan set snmp-index 51 config ipv6 set ip6-address 2000:55::1/64 end set interface "npu0_vlink0" set vlanid 55 n...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
644
Network next end 4. Configure the route maps: config router route-map edit "from106" config rule edit 1 set match-ip6-address "1" next end next edit "from206" config rule edit 1 set match-ip6-address "2" next end next end 5. Configure the IPv6 route leaking (leak route 2000:5:5:5::/64 learned from Router 1 to VRF 20, t...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
645
Network 2. Check the routing table after the leak: # get router info6 routing-table bgp Routing table for VRF=10 B 2000:5:5:5::/64 [20/0] via fe00::2000:0000:0000:0, R150, 00:25:45 B 2009:3:3:3::/64 [20/0] via fe80::10:0000:0000:4245, vlan55, 00:00:17 Routing table for VRF=20 B 2000:5:5:5::/64 [20/0] via fe80::10:0000:...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
646
Network To configure this example: config system interface edit port1 set vrf 10 next edit port2 set vrf 20 next end config router bgp config neighbor edit "192.168.1.1" set update-source port1 next edit "192.168.2.1" set interface port2 next end end Results Using the above topology: l Both Router1 and Router2 establis...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
647
Network i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default Routing table for VRF=0 S* 0.0.0.0/0 [5/0] via 10.0.1.254, port9 C 10.0.1.0/24 is directly connected, port9 Routing table for VRF=10 O 10.10.1.0/24 [110/10] via 192.168.1.1, port1, 00:18:31 B 10.10.2.0/24 [20/200] via...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
648
Network Example In this example, there is an NPU inter-VDOM link that is configured on the root VDOM. Two VLANs, vrf10 and vrf20, are created on either ends of the NPU inter-VDOM link, each belonging to a different VRF. When pinging from the vrf10 interface in VRF 10 to the destination server 172.16.202.2, since there ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
649
Network set snmp-index 14 config ipv6 set ip6-address 2003:172:16:202::1/64 set ip6-allowaccess ping end next end 2. Configure the firewall policy: config firewall policy edit 1 set srcintf "vrf20" set dstintf "port12" set action accept set srcaddr "all" set dstaddr "all" set srcaddr6 "all" set dstaddr6 "all" set sched...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
650
Network 3.393987 vrf20 out 172.16.202.2 -> 10.32.70.1: icmp: echo reply 3.393988 npu0_vlink1 out 172.16.202.2 -> 10.32.70.1: icmp: echo reply 3.393993 vrf10 in 172.16.202.2 -> 10.32.70.1: icmp: echo reply 4.393941 vrf10 out 10.32.70.1 -> 172.16.202.2: icmp: echo request 4.393942 npu0_vlink0 out 10.32.70.1 -> 172.16.202...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
651
Network source-ip <ip> Source IPv4 or IPv6 address, for communication with the NetFlow agent. source-ip-interface <name> Utilize the IP address of the specified interface as the source when sending out the NetFlow messages. Routing of the messages does not change based on this setting. The source-ip-interface is unavai...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
652
Network set ip 10.10.10.2 255.255.255.0 set allowaccess ping set type loopback next end 2. Configure the syslog device: config log syslogd setting set status enable set server "172.16.200.55" set facility local6 set source-ip-interface "loopback" end Verification and troubleshooting If data are not seen on the NetFlow ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
653
Network Name Template ID Description IPV4_NAT 262 Source/Destination NAT IPv4 traffic IPV4_AF_NAT 263 AF NAT IPv4 traffic (4->6) IPV6_NAT 264 Source/Destination NAT IPv6 traffic IPV6_AF_NAT 265 AF NAT IPv6 traffic (6->4) ICMP4_NAT 266 Source/Destination NAT ICMPv4 traffic ICMP4_AF_NAT 267 AF NAT ICMPv4 traffic (4->6) I...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
654
Network 257 - APP_ID_OPTIONS Description Application information Scope Field Count 1 Data Field Count 4 Option Scope Length 4 Option Length 16 Padding 0000 Scope fields Field # Field Type Length 1 System System (1) 2 Data fields Field # Field Type Length 1 APPLICATION_ID APPLICATION_ID (95) 9 2 APPLICATION_NAME APPLICA...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf