config firewall vip
Configure virtual IP for IPv4.
config firewall vip Description: Configure virtual IP for IPv4. edit <name> set id {integer} set uuid {uuid} set comment {var-string} set type [static-nat|server-load-balance|...] set ldb-method [static|round-robin|...] set extip {user} set mappedip <range1>, <range2>, ... set extintf {string} set arp-reply [disable|enable] set server-type [http|https|...] set http-redirect [enable|disable] set persistence [none|http-cookie|...] set portforward [disable|enable] set status [disable|enable] set protocol [tcp|udp|...] set extport {user} set mappedport {user} set gratuitous-arp-interval {integer} config realservers Description: Select the real servers that this server load balancing VIP will distribute traffic to. edit <id> set type [ip|address] set address {string} set ip {user} set port {integer} set status [active|standby|...] set weight {integer} set holddown-interval {integer} set healthcheck [disable|enable] set health-check-proto [ping|http] set http-host {string} set max-connections {integer} set client-ip {user} next end set http-cookie-domain-from-host [disable|enable] set http-cookie-domain {string} set http-cookie-path {string} set http-cookie-generation {integer} set http-cookie-age {integer} set http-cookie-share [disable|same-ip] set https-cookie-secure [disable|enable] set http-multiplex [enable|disable] set http-ip-header [enable|disable] set http-ip-header-name {string} set outlook-web-access [disable|enable] set weblogic-server [disable|enable] set websphere-server [disable|enable] set ssl-mode [half|full] set ssl-certificate {string} set ssl-dh-bits [768|1024|...] set ssl-algorithm [high|medium|...] config ssl-cipher-suites Description: SSL/TLS cipher suites acceptable from a client, ordered by priority. edit <priority> set cipher [TLS-RSA-WITH-3DES-EDE-CBC-SHA|TLS-DHE-RSA-WITH-DES-CBC-SHA|...] set versions {option1}, {option2}, ... next end set ssl-server-algorithm [high|medium|...] config ssl-server-cipher-suites Description: SSL/TLS cipher suites to offer to a server, ordered by priority. edit <priority> set cipher [TLS-RSA-WITH-3DES-EDE-CBC-SHA|TLS-DHE-RSA-WITH-DES-CBC-SHA|...] set versions {option1}, {option2}, ... next end set ssl-pfs [require|deny|...] set ssl-min-version [ssl-3.0|tls-1.0|...] set ssl-max-version [ssl-3.0|tls-1.0|...] set ssl-server-min-version [ssl-3.0|tls-1.0|...] set ssl-server-max-version [ssl-3.0|tls-1.0|...] set ssl-accept-ffdhe-groups [enable|disable] set ssl-send-empty-frags [enable|disable] set ssl-client-fallback [disable|enable] set ssl-client-renegotiation [allow|deny|...] set ssl-client-session-state-type [disable|time|...] set ssl-client-session-state-timeout {integer} set ssl-client-session-state-max {integer} set ssl-client-rekey-count {integer} set ssl-server-session-state-type [disable|time|...] set ssl-server-session-state-timeout {integer} set ssl-server-session-state-max {integer} set ssl-http-location-conversion [enable|disable] set ssl-http-match-host [enable|disable] set ssl-hpkp [disable|enable|...] set ssl-hpkp-primary {string} set ssl-hpkp-backup {string} set ssl-hpkp-age {integer} set ssl-hpkp-report-uri {var-string} set ssl-hpkp-include-subdomains [disable|enable] set ssl-hsts [disable|enable] set ssl-hsts-age {integer} set ssl-hsts-include-subdomains [disable|enable] set max-embryonic-connections {integer} set color {integer} next end
config firewall vip
Parameter |
Description |
Type |
Size |
Default |
||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
id |
Custom defined ID. |
integer |
Minimum value: 0 Maximum value: 65535 |
0 |
||||||||||||||||||||
uuid |
Universally Unique Identifier (UUID; automatically assigned but can be manually reset). |
uuid |
Not Specified |
00000000-0000-0000-0000-000000000000 |
||||||||||||||||||||
comment |
Comment. |
var-string |
Maximum length: 255 |
|
||||||||||||||||||||
type |
Configure between a static NAT and access proxy VIP. |
option |
- |
static-nat |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ldb-method |
Method used to distribute sessions to real servers. |
option |
- |
static |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
extip |
IP address or address range on the external interface that you want to map to an address or address range on the destination network. |
user |
Not Specified |
|
||||||||||||||||||||
mappedip |
IP address or address range on the destination network to which the external IP address is mapped. Mapped IP range. |
string |
Maximum length: 79 |
|
||||||||||||||||||||
extintf |
Interface connected to the source network that receives the packets that will be forwarded to the destination network. |
string |
Maximum length: 35 |
|
||||||||||||||||||||
arp-reply |
Enable to respond to ARP requests for this virtual IP address. Enabled by default. |
option |
- |
enable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
server-type |
Protocol to be load balanced by the virtual server (also called the server load balance virtual IP). |
option |
- |
|
||||||||||||||||||||
|
|
|||||||||||||||||||||||
http-redirect |
Enable/disable redirection of HTTP to HTTPS. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
persistence |
Configure how to make sure that clients connect to the same server every time they make a request that is part of the same session. |
option |
- |
none |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
portforward |
Enable/disable port forwarding. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
status |
Enable/disable VIP. |
option |
- |
enable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
protocol |
Protocol to use when forwarding packets. |
option |
- |
tcp |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
extport |
Incoming port number range that you want to map to a port number range on the destination network. |
user |
Not Specified |
|
||||||||||||||||||||
mappedport |
Port number range on the destination network to which the external port number range is mapped. |
user |
Not Specified |
|
||||||||||||||||||||
gratuitous-arp-interval |
Enable to have the VIP send gratuitous ARPs. 0=disabled. Set from 5 up to 8640000 seconds to enable. |
integer |
Minimum value: 5 Maximum value: 8640000 |
0 |
||||||||||||||||||||
http-cookie-domain-from-host |
Enable/disable use of HTTP cookie domain from host field in HTTP. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
http-cookie-domain |
Domain that HTTP cookie persistence should apply to. |
string |
Maximum length: 35 |
|
||||||||||||||||||||
http-cookie-path |
Limit HTTP cookie persistence to the specified path. |
string |
Maximum length: 35 |
|
||||||||||||||||||||
http-cookie-generation |
Generation of HTTP cookie to be accepted. Changing invalidates all existing cookies. |
integer |
Minimum value: 0 Maximum value: 4294967295 |
0 |
||||||||||||||||||||
http-cookie-age |
Time in minutes that client web browsers should keep a cookie. Default is 60 minutes. 0 = no time limit. |
integer |
Minimum value: 0 Maximum value: 525600 |
60 |
||||||||||||||||||||
http-cookie-share |
Control sharing of cookies across virtual servers. Use of same-ip means a cookie from one virtual server can be used by another. Disable stops cookie sharing. |
option |
- |
same-ip |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
https-cookie-secure |
Enable/disable verification that inserted HTTPS cookies are secure. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
http-multiplex |
Enable/disable HTTP multiplexing. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
http-ip-header |
For HTTP multiplexing, enable to add the original client IP address in the XForwarded-For HTTP header. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
http-ip-header-name |
For HTTP multiplexing, enter a custom HTTPS header name. The original client IP address is added to this header. If empty, X-Forwarded-For is used. |
string |
Maximum length: 35 |
|
||||||||||||||||||||
outlook-web-access |
Enable to add the Front-End-Https header for Microsoft Outlook Web Access. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
weblogic-server |
Enable to add an HTTP header to indicate SSL offloading for a WebLogic server. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
websphere-server |
Enable to add an HTTP header to indicate SSL offloading for a WebSphere server. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-mode |
Apply SSL offloading between the client and the FortiProxy (half) or from the client to the FortiProxy and from the FortiProxy to the server (full). |
option |
- |
half |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-certificate |
The name of the certificate to use for SSL handshake. |
string |
Maximum length: 35 |
|
||||||||||||||||||||
ssl-dh-bits |
Number of bits to use in the Diffie-Hellman exchange for RSA encryption of SSL sessions. |
option |
- |
2048 |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-algorithm |
Permitted encryption algorithms for SSL sessions according to encryption strength. |
option |
- |
low |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-server-algorithm |
Permitted encryption algorithms for the server side of SSL full mode sessions according to encryption strength. |
option |
- |
client |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-pfs |
Select the cipher suites that can be used for SSL perfect forward secrecy (PFS). Applies to both client and server sessions. |
option |
- |
require |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-min-version |
Lowest SSL/TLS version acceptable from a client. |
option |
- |
ssl-3.0 |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-max-version |
Highest SSL/TLS version acceptable from a client. |
option |
- |
tls-1.2 |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-server-min-version |
Lowest SSL/TLS version acceptable from a server. Use the client setting by default. |
option |
- |
client |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-server-max-version |
Highest SSL/TLS version acceptable from a server. Use the client setting by default. |
option |
- |
client |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-accept-ffdhe-groups |
Enable/disable FFDHE cipher suite for SSL key exchange. |
option |
- |
enable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-send-empty-frags |
Enable/disable sending empty fragments to avoid CBC IV attacks (SSL 3.0 & TLS 1.0 only). May need to be disabled for compatibility with older systems. |
option |
- |
enable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-client-fallback |
Enable/disable support for preventing Downgrade Attacks on client connections (RFC 7507). |
option |
- |
enable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-client-renegotiation |
Allow, deny, or require secure renegotiation of client sessions to comply with RFC 5746. |
option |
- |
secure |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-client-session-state-type |
How to expire SSL sessions for the segment of the SSL connection between the client and the FortiProxy. |
option |
- |
both |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-client-session-state-timeout |
Number of minutes to keep client to FortiProxy SSL session state. |
integer |
Minimum value: 1 Maximum value: 14400 |
30 |
||||||||||||||||||||
ssl-client-session-state-max |
Maximum number of client to FortiProxy SSL session states to keep. |
integer |
Minimum value: 1 Maximum value: 10000 |
1000 |
||||||||||||||||||||
ssl-client-rekey-count |
Maximum length of data in MB before triggering a client rekey (0 = disable). |
integer |
Minimum value: 200 Maximum value: 1048576 |
0 |
||||||||||||||||||||
ssl-server-session-state-type |
How to expire SSL sessions for the segment of the SSL connection between the server and the FortiProxy. |
option |
- |
both |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-server-session-state-timeout |
Number of minutes to keep FortiProxy to Server SSL session state. |
integer |
Minimum value: 1 Maximum value: 14400 |
60 |
||||||||||||||||||||
ssl-server-session-state-max |
Maximum number of FortiProxy to Server SSL session states to keep. |
integer |
Minimum value: 1 Maximum value: 10000 |
100 |
||||||||||||||||||||
ssl-http-location-conversion |
Enable to replace HTTP with HTTPS in the reply's Location HTTP header field. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-http-match-host |
Enable/disable HTTP host matching for location conversion. |
option |
- |
enable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-hpkp |
Enable/disable including HPKP header in response. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-hpkp-primary |
Certificate to generate primary HPKP pin from. |
string |
Maximum length: 79 |
|
||||||||||||||||||||
ssl-hpkp-backup |
Certificate to generate backup HPKP pin from. |
string |
Maximum length: 79 |
|
||||||||||||||||||||
ssl-hpkp-age |
Number of seconds the client should honor the HPKP setting. |
integer |
Minimum value: 60 Maximum value: 157680000 |
5184000 |
||||||||||||||||||||
ssl-hpkp-report-uri |
URL to report HPKP violations to. |
var-string |
Maximum length: 255 |
|
||||||||||||||||||||
ssl-hpkp-include-subdomains |
Indicate that HPKP header applies to all subdomains. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-hsts |
Enable/disable including HSTS header in response. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
ssl-hsts-age |
Number of seconds the client should honor the HSTS setting. |
integer |
Minimum value: 60 Maximum value: 157680000 |
5184000 |
||||||||||||||||||||
ssl-hsts-include-subdomains |
Indicate that HSTS header applies to all subdomains. |
option |
- |
disable |
||||||||||||||||||||
|
|
|||||||||||||||||||||||
max-embryonic-connections |
Maximum number of incomplete connections. |
integer |
Minimum value: 0 Maximum value: 100000 |
1000 |
||||||||||||||||||||
color |
Color of icon on the GUI. |
integer |
Minimum value: 0 Maximum value: 32 |
0 |
config realservers
Parameter |
Description |
Type |
Size |
Default |
||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
type |
Type of address. |
option |
- |
ip |
||||||||
|
|
|||||||||||
address |
Dynamic address of the real server. |
string |
Maximum length: 79 |
|
||||||||
ip |
IP address of the real server. |
user |
Not Specified |
|
||||||||
port |
Port for communicating with the real server. Required if port forwarding is enabled. |
integer |
Minimum value: 1 Maximum value: 65535 |
0 |
||||||||
status |
Set the status of the real server to active so that it can accept traffic, or on standby or disabled so no traffic is sent. |
option |
- |
active |
||||||||
|
|
|||||||||||
weight |
Weight of the real server. If weighted load balancing is enabled, the server with the highest weight gets more connections. |
integer |
Minimum value: 1 Maximum value: 255 |
1 |
||||||||
holddown-interval |
Time in seconds that the health check monitor continues to monitor and unresponsive server that should be active. |
integer |
Minimum value: 30 Maximum value: 65535 |
300 |
||||||||
healthcheck |
Enable to check the responsiveness of the real server before forwarding traffic. |
option |
- |
|
||||||||
|
|
|||||||||||
health-check-proto |
Protocol of the health check monitor to use when polling to determine server's connectivity status. |
option |
- |
ping |
||||||||
|
|
|||||||||||
http-host |
HTTP server domain name in HTTP header. |
string |
Maximum length: 63 |
|
||||||||
max-connections |
Max number of active connections that can be directed to the real server. When reached, sessions are sent to other real servers. |
integer |
Minimum value: 0 Maximum value: 2147483647 |
0 |
||||||||
client-ip |
Only clients in this IP range can connect to this real server. |
user |
Not Specified |
|
config ssl-cipher-suites
Parameter |
Description |
Type |
Size |
Default |
||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cipher |
Cipher suite name. |
option |
- |
|
||||||||||
|
|
|||||||||||||
versions |
SSL/TLS versions that the cipher suite can be used with. |
option |
- |
ssl-3.0 tls-1.0 tls-1.1 tls-1.2 |
||||||||||
|
|
config ssl-server-cipher-suites
Parameter |
Description |
Type |
Size |
Default |
||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cipher |
Cipher suite name. |
option |
- |
|
||||||||||
|
|
|||||||||||||
versions |
SSL/TLS versions that the cipher suite can be used with. |
option |
- |
ssl-3.0 tls-1.0 tls-1.1 tls-1.2 |
||||||||||
|
|