Fortinet Document Library

Version:


Table of Contents

CLI Reference

6.0.0
Download PDF
Copy Link

wanopt settings

Use this command to enable traffic logging for WAN optimization and WAN optimization web-caching sessions.

config wanopt settings
    set host-id {string}   Local host ID (must also be entered in the remote FortiGate's peer list). size[35]
    set tunnel-ssl-algorithm {high | medium | low}   Relative strength of encryption algorithms accepted during tunnel negotiation.
            high    High encryption. Allow only AES and ChaCha.
            medium  Medium encryption. Allow AES, ChaCha, 3DES, and RC4.
            low     Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
    set auto-detect-algorithm {simple | diff-req-resp}   Auto detection algorithms used in tunnel negotiations.
            simple         Use the same TCP option value in SYN/SYNACK packets. Backward compatible.
            diff-req-resp  Use different TCP option values in SYN/SYNACK packets to avoid false positive detection.
end

Additional information

The following section is for those options that require additional explanation.

host-id <id>

Local host ID/name (set to default-id by default). Make sure that the local host ID is also entered in the other FortiGate's peer list.

tunnel-ssl-algorithm {high | medium | low}

Relative strength of encryption accepted for SSL tunnel negotiation:

  • high: Encryption allows AES and 3DES (set by default).
  • medium: Encryption allows AES, 3DES, and RC4.
  • low: Encryption allows AES, 3DES, RC4, and DES.

auto-detect-algorithm {simple | diff-req-resp}

Automatic detection algorithms used in tunnel negotiation:

  • simple: Use the same TCP option value from SYN/SYNACK packets. Backward compatible (set by default).
  • diff-req-resp: Use different TCP option value than in SYN/SYNACK packets to avoid false positive detection.

wanopt settings

Use this command to enable traffic logging for WAN optimization and WAN optimization web-caching sessions.

config wanopt settings
    set host-id {string}   Local host ID (must also be entered in the remote FortiGate's peer list). size[35]
    set tunnel-ssl-algorithm {high | medium | low}   Relative strength of encryption algorithms accepted during tunnel negotiation.
            high    High encryption. Allow only AES and ChaCha.
            medium  Medium encryption. Allow AES, ChaCha, 3DES, and RC4.
            low     Low encryption. Allow AES, ChaCha, 3DES, RC4, and DES.
    set auto-detect-algorithm {simple | diff-req-resp}   Auto detection algorithms used in tunnel negotiations.
            simple         Use the same TCP option value in SYN/SYNACK packets. Backward compatible.
            diff-req-resp  Use different TCP option values in SYN/SYNACK packets to avoid false positive detection.
end

Additional information

The following section is for those options that require additional explanation.

host-id <id>

Local host ID/name (set to default-id by default). Make sure that the local host ID is also entered in the other FortiGate's peer list.

tunnel-ssl-algorithm {high | medium | low}

Relative strength of encryption accepted for SSL tunnel negotiation:

  • high: Encryption allows AES and 3DES (set by default).
  • medium: Encryption allows AES, 3DES, and RC4.
  • low: Encryption allows AES, 3DES, RC4, and DES.

auto-detect-algorithm {simple | diff-req-resp}

Automatic detection algorithms used in tunnel negotiation:

  • simple: Use the same TCP option value from SYN/SYNACK packets. Backward compatible (set by default).
  • diff-req-resp: Use different TCP option value than in SYN/SYNACK packets to avoid false positive detection.