Fortinet white logo
Fortinet white logo

CLI Reference

server-access-priorities

server-access-priorities

Use this command to configure how a FortiGate unit may download antivirus updates and request web filtering services from multiple FortiAnalyzer units and private FDS servers.

Use the private-server subcommand to configure multiple FortiAnalyzer units and private servers.

By default, the FortiGate unit receives updates from the FortiAnalyzer unit if the FortiGate unit is managed by the FortiAnalyzer unit and the FortiGate unit was configured to receive updates from the FortiAnalyzer unit.

Syntax

config fmupdate server-access-priorities

set access-public {disable | enable}

set av-ips {disable | enable}

set web-spam {disable | enable}

config private-server

edit <id>

set ip <ipv4_address>

set ip6 <ipv6_address>

set time_zone <integer>

end

end

Variables

Description

access-public {disable | enable}

Disable to prevent FortiAnalyzer default connectivity to public FDS and FortiGuard servers. Default: enable

av-ips {disable | enable}

Enable to allow the FortiGate unit to get antivirus updates from other FortiAnalyzer units or private FDS servers. Default: disable

web-spam {disable | enable}

Enable/disable private server in web-spam.

Variables forconfig private-serversubcommand:

<id>

Enter a number to identify the FortiManager unit or private server. Range: 1 to 10

ip <ipv4_address>

Enter the IPv4 address of the FortiManager unit or private server.

ip6 <ipv6_address>

Enter the IPv6 address of the FortiManager unit or private server.

time_zone <integer>

Enter the correct time zone of the private server. Using -24 indicates that the server is using the local time zone.

Example

The following example configures access to public FDS servers and allows FortiGate units to receive antivirus updates from other FortiAnalyzer units and private FDS servers. This example also configures two private servers.

config fmupdate server-access-priorities

set access-public enable

set av-ips enable

config private-server

edit 1

set ip 172.16.130.252

next

edit 2

set ip 172.31.145.201

end

end

server-access-priorities

server-access-priorities

Use this command to configure how a FortiGate unit may download antivirus updates and request web filtering services from multiple FortiAnalyzer units and private FDS servers.

Use the private-server subcommand to configure multiple FortiAnalyzer units and private servers.

By default, the FortiGate unit receives updates from the FortiAnalyzer unit if the FortiGate unit is managed by the FortiAnalyzer unit and the FortiGate unit was configured to receive updates from the FortiAnalyzer unit.

Syntax

config fmupdate server-access-priorities

set access-public {disable | enable}

set av-ips {disable | enable}

set web-spam {disable | enable}

config private-server

edit <id>

set ip <ipv4_address>

set ip6 <ipv6_address>

set time_zone <integer>

end

end

Variables

Description

access-public {disable | enable}

Disable to prevent FortiAnalyzer default connectivity to public FDS and FortiGuard servers. Default: enable

av-ips {disable | enable}

Enable to allow the FortiGate unit to get antivirus updates from other FortiAnalyzer units or private FDS servers. Default: disable

web-spam {disable | enable}

Enable/disable private server in web-spam.

Variables forconfig private-serversubcommand:

<id>

Enter a number to identify the FortiManager unit or private server. Range: 1 to 10

ip <ipv4_address>

Enter the IPv4 address of the FortiManager unit or private server.

ip6 <ipv6_address>

Enter the IPv6 address of the FortiManager unit or private server.

time_zone <integer>

Enter the correct time zone of the private server. Using -24 indicates that the server is using the local time zone.

Example

The following example configures access to public FDS servers and allows FortiGate units to receive antivirus updates from other FortiAnalyzer units and private FDS servers. This example also configures two private servers.

config fmupdate server-access-priorities

set access-public enable

set av-ips enable

config private-server

edit 1

set ip 172.16.130.252

next

edit 2

set ip 172.31.145.201

end

end