config firewall vip
Configure virtual IP for IPv4.
config firewall vip
Description: Configure virtual IP for IPv4.
edit <name>
set id {integer}
set uuid {uuid}
set comment {var-string}
set type [static-nat|load-balance|...]
set dns-mapping-ttl {integer}
set ldb-method [static|round-robin|...]
set src-filter <range1>, <range2>, ...
set service <name1>, <name2>, ...
set extip {user}
set extaddr <name1>, <name2>, ...
set nat44 [disable|enable]
set nat46 [disable|enable]
set add-nat46-route [disable|enable]
set mappedip <range1>, <range2>, ...
set mapped-addr {string}
set extintf {string}
set arp-reply [disable|enable]
set server-type [http|https|...]
set http-redirect [enable|disable]
set persistence [none|http-cookie|...]
set nat-source-vip [disable|enable]
set portforward [disable|enable]
set status [disable|enable]
set protocol [tcp|udp|...]
set extport {user}
set mappedport {user}
set gratuitous-arp-interval {integer}
set srcintf-filter <interface-name1>, <interface-name2>, ...
set portmapping-type [1-to-1|m-to-n]
config realservers
Description: Select the real servers that this server load balancing VIP will distribute traffic to.
edit <id>
set type [ip|address]
set address {string}
set ip {user}
set port {integer}
set status [active|standby|...]
set weight {integer}
set holddown-interval {integer}
set healthcheck [disable|enable|...]
set http-host {string}
set max-connections {integer}
set monitor <name1>, <name2>, ...
set client-ip {user}
next
end
set http-cookie-domain-from-host [disable|enable]
set http-cookie-domain {string}
set http-cookie-path {string}
set http-cookie-generation {integer}
set http-cookie-age {integer}
set http-cookie-share [disable|same-ip]
set https-cookie-secure [disable|enable]
set http-multiplex [enable|disable]
set http-ip-header [enable|disable]
set http-ip-header-name {string}
set outlook-web-access [disable|enable]
set weblogic-server [disable|enable]
set websphere-server [disable|enable]
set ssl-mode [half|full]
set ssl-certificate {string}
set ssl-dh-bits [768|1024|...]
set ssl-algorithm [high|medium|...]
config ssl-cipher-suites
Description: SSL/TLS cipher suites acceptable from a client, ordered by priority.
edit <priority>
set cipher [TLS-AES-128-GCM-SHA256|TLS-AES-256-GCM-SHA384|...]
set versions {option1}, {option2}, ...
next
end
set ssl-server-algorithm [high|medium|...]
config ssl-server-cipher-suites
Description: SSL/TLS cipher suites to offer to a server, ordered by priority.
edit <priority>
set cipher [TLS-AES-128-GCM-SHA256|TLS-AES-256-GCM-SHA384|...]
set versions {option1}, {option2}, ...
next
end
set ssl-pfs [require|deny|...]
set ssl-min-version [ssl-3.0|tls-1.0|...]
set ssl-max-version [ssl-3.0|tls-1.0|...]
set ssl-server-min-version [ssl-3.0|tls-1.0|...]
set ssl-server-max-version [ssl-3.0|tls-1.0|...]
set ssl-accept-ffdhe-groups [enable|disable]
set ssl-send-empty-frags [enable|disable]
set ssl-client-fallback [disable|enable]
set ssl-client-renegotiation [allow|deny|...]
set ssl-client-session-state-type [disable|time|...]
set ssl-client-session-state-timeout {integer}
set ssl-client-session-state-max {integer}
set ssl-client-rekey-count {integer}
set ssl-server-session-state-type [disable|time|...]
set ssl-server-session-state-timeout {integer}
set ssl-server-session-state-max {integer}
set ssl-http-location-conversion [enable|disable]
set ssl-http-match-host [enable|disable]
set ssl-hpkp [disable|enable|...]
set ssl-hpkp-primary {string}
set ssl-hpkp-backup {string}
set ssl-hpkp-age {integer}
set ssl-hpkp-report-uri {var-string}
set ssl-hpkp-include-subdomains [disable|enable]
set ssl-hsts [disable|enable]
set ssl-hsts-age {integer}
set ssl-hsts-include-subdomains [disable|enable]
set monitor <name1>, <name2>, ...
set max-embryonic-connections {integer}
set color {integer}
set ipv6-mappedip {user}
set ipv6-mappedport {user}
next
end
config firewall vip
Parameter |
Description |
Type |
Size |
Default |
||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
id |
Custom defined ID. |
integer |
Minimum value: 0 Maximum value: 65535 |
0 |
||||||||||||||||||||
uuid |
Universally Unique Identifier (UUID; automatically assigned but can be manually reset). |
uuid |
Not Specified |
00000000-0000-0000-0000-000000000000 |
||||||||||||||||||||
comment |
Comment. |
var-string |
Not Specified |
|
||||||||||||||||||||
type |
Configure a static NAT, load balance, server load balance, access proxy, DNS translation, or FQDN VIP. |
option |
- |
static-nat |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
dns-mapping-ttl |
DNS mapping TTL . |
integer |
Minimum value: 0 Maximum value: 604800 |
0 |
||||||||||||||||||||
ldb-method |
Method used to distribute sessions to real servers. |
option |
- |
static |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
src-filter |
Source address filter. Each address must be either an IP/subnet (x.x.x.x/n) or a range (x.x.x.x-y.y.y.y). Separate addresses with spaces. Source-filter range. |
string |
Maximum length: 79 |
|
||||||||||||||||||||
service |
Service name. Service name. |
string |
Maximum length: 79 |
|
||||||||||||||||||||
extip |
IP address or address range on the external interface that you want to map to an address or address range on the destination network. |
user |
Not Specified |
|
||||||||||||||||||||
extaddr |
External FQDN address name. Address name. |
string |
Maximum length: 79 |
|
||||||||||||||||||||
nat44 |
Enable/disable NAT44. |
option |
- |
enable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
nat46 |
Enable/disable NAT46. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
add-nat46-route |
Enable/disable adding NAT46 route. |
option |
- |
enable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
mappedip |
IP address or address range on the destination network to which the external IP address is mapped. Mapped IP range. |
string |
Maximum length: 79 |
|
||||||||||||||||||||
mapped-addr |
Mapped FQDN address name. |
string |
Not Specified |
|
||||||||||||||||||||
extintf |
Interface connected to the source network that receives the packets that will be forwarded to the destination network. |
string |
Not Specified |
|
||||||||||||||||||||
arp-reply |
Enable to respond to ARP requests for this virtual IP address. Enabled by default. |
option |
- |
enable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
server-type |
Protocol to be load balanced by the virtual server (also called the server load balance virtual IP). |
option |
- |
|
||||||||||||||||||||
|
|
|||||||||||||||||||||||
http-redirect |
Enable/disable redirection of HTTP to HTTPS. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
persistence |
Configure how to make sure that clients connect to the same server every time they make a request that is part of the same session. |
option |
- |
none |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
nat-source-vip |
Enable/disable forcing the source NAT mapped IP to the external IP for all traffic. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
portforward |
Enable/disable port forwarding. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
status |
Enable/disable VIP. |
option |
- |
enable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
protocol |
Protocol to use when forwarding packets. |
option |
- |
tcp |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
extport |
Incoming port number range that you want to map to a port number range on the destination network. |
user |
Not Specified |
|
||||||||||||||||||||
mappedport |
Port number range on the destination network to which the external port number range is mapped. |
user |
Not Specified |
|
||||||||||||||||||||
gratuitous-arp-interval |
Enable to have the VIP send gratuitous ARPs. 0=disabled. Set from 5 up to 8640000 seconds to enable. |
integer |
Minimum value: 5 Maximum value: 8640000 |
0 |
||||||||||||||||||||
srcintf-filter |
Interfaces to which the VIP applies. Separate the names with spaces. Interface name. |
string |
Maximum length: 79 |
|
||||||||||||||||||||
portmapping-type |
Port mapping type. |
option |
- |
1-to-1 |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
http-cookie-domain-from-host |
Enable/disable use of HTTP cookie domain from host field in HTTP. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
http-cookie-domain |
Domain that HTTP cookie persistence should apply to. |
string |
Not Specified |
|
||||||||||||||||||||
http-cookie-path |
Limit HTTP cookie persistence to the specified path. |
string |
Not Specified |
|
||||||||||||||||||||
http-cookie-generation |
Generation of HTTP cookie to be accepted. Changing invalidates all existing cookies. |
integer |
Minimum value: 0 Maximum value: 4294967295 |
0 |
||||||||||||||||||||
http-cookie-age |
Time in minutes that client web browsers should keep a cookie. Default is 60 minutes. 0 = no time limit. |
integer |
Minimum value: 0 Maximum value: 525600 |
60 |
||||||||||||||||||||
http-cookie-share |
Control sharing of cookies across virtual servers. Use of same-ip means a cookie from one virtual server can be used by another. Disable stops cookie sharing. |
option |
- |
same-ip |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
https-cookie-secure |
Enable/disable verification that inserted HTTPS cookies are secure. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
http-multiplex |
Enable/disable HTTP multiplexing. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
http-ip-header |
For HTTP multiplexing, enable to add the original client IP address in the XForwarded-For HTTP header. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
http-ip-header-name |
For HTTP multiplexing, enter a custom HTTPS header name. The original client IP address is added to this header. If empty, X-Forwarded-For is used. |
string |
Not Specified |
|
||||||||||||||||||||
outlook-web-access |
Enable to add the Front-End-Https header for Microsoft Outlook Web Access. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
weblogic-server |
Enable to add an HTTP header to indicate SSL offloading for a WebLogic server. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
websphere-server |
Enable to add an HTTP header to indicate SSL offloading for a WebSphere server. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-mode |
Apply SSL offloading between the client and the FortiGate (half) or from the client to the FortiGate and from the FortiGate to the server (full). |
option |
- |
half |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-certificate |
The name of the certificate to use for SSL handshake. |
string |
Not Specified |
|
||||||||||||||||||||
ssl-dh-bits |
Number of bits to use in the Diffie-Hellman exchange for RSA encryption of SSL sessions. |
option |
- |
2048 |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-algorithm |
Permitted encryption algorithms for SSL sessions according to encryption strength. |
option |
- |
high |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-server-algorithm |
Permitted encryption algorithms for the server side of SSL full mode sessions according to encryption strength. |
option |
- |
client |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-pfs |
Select the cipher suites that can be used for SSL perfect forward secrecy (PFS). Applies to both client and server sessions. |
option |
- |
require |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-min-version |
Lowest SSL/TLS version acceptable from a client. |
option |
- |
tls-1.1 |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-max-version |
Highest SSL/TLS version acceptable from a client. |
option |
- |
tls-1.3 |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-server-min-version |
Lowest SSL/TLS version acceptable from a server. Use the client setting by default. |
option |
- |
client |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-server-max-version |
Highest SSL/TLS version acceptable from a server. Use the client setting by default. |
option |
- |
client |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-accept-ffdhe-groups |
Enable/disable FFDHE cipher suite for SSL key exchange. |
option |
- |
enable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-send-empty-frags |
Enable/disable sending empty fragments to avoid CBC IV attacks (SSL 3.0 & TLS 1.0 only). May need to be disabled for compatibility with older systems. |
option |
- |
enable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-client-fallback |
Enable/disable support for preventing Downgrade Attacks on client connections (RFC 7507). |
option |
- |
enable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-client-renegotiation |
Allow, deny, or require secure renegotiation of client sessions to comply with RFC 5746. |
option |
- |
secure |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-client-session-state-type |
How to expire SSL sessions for the segment of the SSL connection between the client and the FortiGate. |
option |
- |
both |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-client-session-state-timeout |
Number of minutes to keep client to FortiGate SSL session state. |
integer |
Minimum value: 1 Maximum value: 14400 |
30 |
||||||||||||||||||||
ssl-client-session-state-max |
Maximum number of client to FortiGate SSL session states to keep. |
integer |
Minimum value: 1 Maximum value: 10000 |
1000 |
||||||||||||||||||||
ssl-client-rekey-count |
Maximum length of data in MB before triggering a client rekey (0 = disable). |
integer |
Minimum value: 200 Maximum value: 1048576 |
0 |
||||||||||||||||||||
ssl-server-session-state-type |
How to expire SSL sessions for the segment of the SSL connection between the server and the FortiGate. |
option |
- |
both |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-server-session-state-timeout |
Number of minutes to keep FortiGate to Server SSL session state. |
integer |
Minimum value: 1 Maximum value: 14400 |
60 |
||||||||||||||||||||
ssl-server-session-state-max |
Maximum number of FortiGate to Server SSL session states to keep. |
integer |
Minimum value: 1 Maximum value: 10000 |
100 |
||||||||||||||||||||
ssl-http-location-conversion |
Enable to replace HTTP with HTTPS in the reply's Location HTTP header field. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-http-match-host |
Enable/disable HTTP host matching for location conversion. |
option |
- |
enable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-hpkp |
Enable/disable including HPKP header in response. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-hpkp-primary |
Certificate to generate primary HPKP pin from. |
string |
Not Specified |
|
||||||||||||||||||||
ssl-hpkp-backup |
Certificate to generate backup HPKP pin from. |
string |
Not Specified |
|
||||||||||||||||||||
ssl-hpkp-age |
Number of seconds the client should honor the HPKP setting. |
integer |
Minimum value: 60 Maximum value: 157680000 |
5184000 |
||||||||||||||||||||
ssl-hpkp-report-uri |
URL to report HPKP violations to. |
var-string |
Not Specified |
|
||||||||||||||||||||
ssl-hpkp-include-subdomains |
Indicate that HPKP header applies to all subdomains. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-hsts |
Enable/disable including HSTS header in response. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-hsts-age |
Number of seconds the client should honor the HSTS setting. |
integer |
Minimum value: 60 Maximum value: 157680000 |
5184000 |
||||||||||||||||||||
ssl-hsts-include-subdomains |
Indicate that HSTS header applies to all subdomains. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
monitor |
Name of the health check monitor to use when polling to determine a virtual server's connectivity status. Health monitor name. |
string |
Maximum length: 79 |
|
||||||||||||||||||||
max-embryonic-connections |
Maximum number of incomplete connections. |
integer |
Minimum value: 0 Maximum value: 100000 |
1000 |
||||||||||||||||||||
color |
Color of icon on the GUI. |
integer |
Minimum value: 0 Maximum value: 32 |
0 |
||||||||||||||||||||
ipv6-mappedip |
Range of mapped IPv6 addresses. Specify the start IPv6 address followed by a space and the end IPv6 address. |
user |
Not Specified |
|
||||||||||||||||||||
ipv6-mappedport |
IPv6 port number range on the destination network to which the external port number range is mapped. |
user |
Not Specified |
|
config realservers
Parameter |
Description |
Type |
Size |
Default |
||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
type |
Type of address. |
option |
- |
ip |
||||||||
|
|
|||||||||||
address |
Dynamic address of the real server. |
string |
Not Specified |
|
||||||||
ip |
IP address of the real server. |
user |
Not Specified |
|
||||||||
port |
Port for communicating with the real server. Required if port forwarding is enabled. |
integer |
Minimum value: 1 Maximum value: 65535 |
0 |
||||||||
status |
Set the status of the real server to active so that it can accept traffic, or on standby or disabled so no traffic is sent. |
option |
- |
active |
||||||||
|
|
|||||||||||
weight |
Weight of the real server. If weighted load balancing is enabled, the server with the highest weight gets more connections. |
integer |
Minimum value: 1 Maximum value: 255 |
1 |
||||||||
holddown-interval |
Time in seconds that the health check monitor continues to monitor and unresponsive server that should be active. |
integer |
Minimum value: 30 Maximum value: 65535 |
300 |
||||||||
healthcheck |
Enable to check the responsiveness of the real server before forwarding traffic. |
option |
- |
vip |
||||||||
|
|
|||||||||||
http-host |
HTTP server domain name in HTTP header. |
string |
Not Specified |
|
||||||||
max-connections |
Max number of active connections that can be directed to the real server. When reached, sessions are sent to other real servers. |
integer |
Minimum value: 0 Maximum value: 2147483647 |
0 |
||||||||
monitor |
Name of the health check monitor to use when polling to determine a virtual server's connectivity status. Health monitor name. |
string |
Maximum length: 79 |
|
||||||||
client-ip |
Only clients in this IP range can connect to this real server. |
user |
Not Specified |
|
config ssl-cipher-suites
Parameter |
Description |
Type |
Size |
Default |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cipher |
Cipher suite name. |
option |
- |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
versions |
SSL/TLS versions that the cipher suite can be used with. |
option |
- |
ssl-3.0 tls-1.0 tls-1.1 tls-1.2 tls-1.3 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
config ssl-server-cipher-suites
Parameter |
Description |
Type |
Size |
Default |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cipher |
Cipher suite name. |
option |
- |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
versions |
SSL/TLS versions that the cipher suite can be used with. |
option |
- |
ssl-3.0 tls-1.0 tls-1.1 tls-1.2 tls-1.3 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|