Changes in CLI
Bug ID |
Description |
---|---|
497161 |
Add function for SMC NTP on supported platforms. config system smc-ntp <==added set ntpsync enable <==added set syncinterval 120 <==added config ntpserver <==added edit 1 set server 208.91.114.98 <==added next end end |
542570 |
Rename Remove |
555201 |
Add certificate attribute to the config endpoint-control fctems edit <name> ... set certificate <cert-name> <==added ... next ... end Add execute fctems verify <fctems name> |
564318 |
Move config wireless-controller wtp-profile edit "FAP423E-default" config platform set type 423E end set handoff-sta-thresh 55 set frequency-handoff enable <==changed set ap-handoff enable <==changed config radio-1 set band 802.11n,g-only end config radio-2 set band 802.11ac end next end |
571819 |
Collect EIP from cloud-VMS (Azure, AWS, GCP, AliCloud, and OCI). pcui-cloudinit-test # execute <?> update-eip Update external IP. <==added config sys interface edit [Name] set eip <==added next end |
572420 |
Add SD-WAN health check DNS monitoring related configuration. config system virtual-wan-link config health-check set protocol dns <==added dns option set system-dns <==added end end |
572779 |
Add config system sdn-connector edit "aci_direct1" set type aci-direct <==added next end |
573330 |
Add config wireless-controller vap edit guestwifi set ssid "GuestWiFi" set security captive-portal set external-web "http://170.00.00.000/portal/index.php" set selected-usergroups "Guest-group" set intra-vap-privacy enable set schedule "always" set external-web-format auto-detect <==added next end |
573410 |
Add config firewall policy edit 9 set name "policy_id_9" set srcintf "wan2" set dstintf "wan1" set srcaddr "all" set dstaddr "all" set vendor-mac 36 16 <==added set action accept set schedule "always" set service "ALL" set logtraffic all set auto-asic-offload disable set nat enable next end Add diagnose commands to show vendor information. diagnose vendor-mac id diagnose vendor-mac match |
573411 |
Add UTM scan for HTTP and HTTPS over SSH tunnel (AV, WF, WAF, ICAP, DLP). config firewall proxy-policy edit 4 set av-profile "av" <==added set webfilter-profile "webfilter" <==added set dlp-sensor "dlp" <==added set icap-profile "icap" <==added set waf-profile "waf" <==added next end |
574588 |
Add GRE and L2TP support in WiFi. config wireless-controller wag-profile <==added edit [Profile Name] <==added end config wireless-controller vap edit "80e_gre" set ssid "FOS-QA_Bruce_80e_gre" set local-bridging enable set vlanid 3135 set primary-wag-profile "tunnel" <==added set secondary-wag-profile "l2tp" <==added next end |
574882 |
FAP-U431F and FAP-U433F can support 802.11ax on 2.4 GHz config wireless-controller wtp-profile edit "FAPU431F-default" config platform set type U431F set mode single-5G end config radio-1 set band 802.11ax-5G end config radio-2 set band 802.11ax end config radio-3 set mode monitor end next end |
576424 |
Add NAT option under config firewall policy edit 88 set srcintf "port4" set dstintf "port1" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ALL" set logtraffic all set ippool enable set poolname "vwp-pool-1" <==required set nat enable <==added next end |
579703 |
Add hidden option config firewall policy edit 201 set srcintf "wan1" set dstintf "wan2" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "TCP_8080" set logtraffic disable set session-ttl never <==added set nat enable next end |
582880 |
Add config firewall internet-service-name edit "test-locaction-isdb-1" set type location set internet-service-id 65537 set country-id 840 set region-id 283 set city-id 23352 next end Rename config firewall policy edit 99 set internet-service enable set internet-service-name "test-locaction-isdb-1" <==changed set internet-service-src enable set internet-service-src-name "test-location-isdb-3" <==changed next end |
582979 |
Add DPDK related CLI commands. config dpdk global set status [enable | disable] set multiqueue [enable | disable] set sleep-on-idle [enable | disable] set elasticbuffer [enable | disable] set hugepage-percentage [Percentage of main memory allocated to hugepages] set mbufpool-percentage [Percentage of main memory allocated to DPDK packet buffer] end config dpdk cpus set rx-cpus [CPUs enabled to run DPDK RX engines] set vnp-cpus [CPUs enabled to run DPDK VNP engines] set ips-cpus [CPUs enabled to run DPDK IPS engines] set tx-cpus [CPUs enabled to run DPDK TX engines] end |
583929 |
Add config vpn ssl web portal edit tunnel-portal set split-tunneling-routing-negate [enable | disable] <==added set ipv6-split-tunneling-routing-negate [enable | disable] <==added next end |
584166 |
Add config firewall central-snat-map edit 2 set type ipv6 <==added set srcintf "wan2" set dstintf "wan1" set orig-addr6 "all" set dst-addr6 "all" set nat-ippool6 "test-ippool6-1" next end |
584836 |
Add config firewall policy edit 1 set name "policy_id_1" set srcintf "wan2" set dstintf "wan1" set srcaddr "all" set dstaddr "test-geoip-CA" set action accept set schedule "always" set service "ALL" set geoip-match registered-location <==added set logtraffic all set auto-asic-offload disable set nat enable next end |
586163 |
Remove Replace config wireless-controller vap edit "vap-cmcc" set ssid "vap-cmcc" set security captive-portal set external-web "http://172.30.144.11:8080/am/portal/ac/FG81EP4Q16000601/ssid/vap-cmcc" set radius-server "cmcc-radius" <==added set local-bridging enable set portal-type cmcc next end Replace config wireless-controller vap edit "Melody-CMCC" set ssid "vap-CMCC-macauth" set security captive-portal set external-web "http://172.30.144.11:8080/am/portal/ac/FG81EP4Q16000601/ssid/vap-CMCC-macauth" set radius-mac-auth enable set radius-mac-auth-server "cmcc_mac_auth_svr" <==added set radius-server "cmcc_auth_svr" <==added set local-bridging enable set portal-type cmcc-macauth next end Change the least value of config user radius edit radius set acct-interim-interval <60 - 86400> <==new range next end |
586175 |
Add the ability to create IPv6 geography-based address, which can be applied in config firewall address6 edit "test-ipv6-geoip" set type geography <==added set country "CA" next end |
586935 |
Add new command, |
587093 |
Add the UUID field under config firewall local-in-policy edit 1 set uuid 1aeb7d98-0016-51ea-7913-b6d62f4409cd <==added next end Add comments field under config firewall multicast-policy edit 1 set uuid d0f74f64-fc41-51e9-2dfc-729f027e9979 set comments "multicast-policy-1" next end |
587575 |
Add config system csf set fabric-object-unification [default | local] <==added end |
587646 |
Add config vpn ssl settings set encrypt-and-store-password [enable | disable] <==added set transform-backward-slashes [enable | disable] <==added end |
587860 |
The |
588180 |
Consolidate config system interface edit port4 set allowaccess ? ping PING access. https HTTPS access. ssh SSH access. snmp SNMP access. http HTTP access. telnet TELNET access. fgfm FortiManager access. radius-acct RADIUS accounting access. probe-response Probe access. fabric Security Fabric access. <==added ftm FTM access. next end |
589842 |
Rename config sys virtual-wan-link config service edit 2 set mode manual set priority-members 2 3 <==changed next end end |
591380 |
Add config switch-controller security-policy 802-1X edit "802-1X-policy-874535" set security-mode 802.1X-mac-based set user-group "SSO_Guest_Users" set mac-auth-bypass disable set open-auth disable set eap-passthru enable set eap-auto-untagged-vlans disable <==added set guest-vlan disable set auth-fail-vlan disable set framevid-apply enable set radius-timeout-overwrite disable next end |
592352 |
Add support for multiple parameters under config application list edit "app-list-1" config entries edit 1000008 config parameters edit 1 config members <==added edit 1 <==added set name command <==added next end next end next end next end |
592414 |
Add config system ipsec-aggregate edit testagg set algorithm ? L3 Use layer 3 address for distribution. L4 Use layer 4 information for distribution. round-robin Per-packet round-robin distribution. redundant Use first tunnel that is up for all traffic. weighted-round-robin Weighted round-robin distribution. <==added next end Add config vpn ipsec phase1-interface edit testp1 set net-device disable set aggregate member enable set aggregate-weight 1 <==added next end |
592507 |
Add config system auto-script edit 1 set timeout 0 <==added next end |
593968 |
To populate the interface bandwidth into the interface widget, config system interface edit "port1" set vdom "root" set ip 10.111.255.86 255.255.255.0 set allowaccess ping set type physical set monitor-bandwidth enable set snmp-index 1 next end |
597703 |
Add new command for Azure SDN connector for FortiGate-VM deployed on Azure. config system sdn-connector edit "azure1" set type azure set use-metadata-iam [enable|disable] <==added next end |
598286 |
Add new address group type, config firewall addrgrp edit "test-folder-addrgrp-1" set type folder <==added set member "172-16-200-156" set allow-routing enable next end |
599034 |
Remove |
600478 |
Remove |
600830 |
Add config system virtual-wan-link config health-check set probe-timeout 500 <==added end end |
601345 |
No warning is shown in GUI when FortiGuard filtering protocol/port setting is not saved. |
601405 |
Add config system automation-action edit "slack1" set action-type slack-notification <==added next end |
601575 |
Add config vpn ssl web realm edit <realm_name> set radius-server <radius_server> <==added set nas-ip <nas_ip> <==added next end |
603137 |
Add config switch-controller 802-1X-settings set tx-period 30 <==added end config switch-controller managed-switch edit S524DN4K16000116 config 802-1X-settings set local-override enable set tx-period 30 <==added end next end |
603590 |
Support filtering on AWS Auto Scaling group for dynamic address objects. config firewall address edit "aws-asg-addr1" set type dynamic set sdn "aws-sdn" set filter "AutoScaleGroup=10703c-4f731e90-fortigate-payg-auto-scaling-group" <==added filter next end |
604980 |
Support dynamic address objects in real servers under virtual server load balance. config firewall vip config realservers set type address <==added set address [firewall.address.dynamic_address] <==added end end |
605369 |
Remove config switch-controller managed-switch edit S248EPTF18001384 config ports edit port1 get | grep igmp-snooping <==removed next end next end |
605951 |
Remove config sys virtual-wan-link config service edit 1 set mode load-balance set sla-compare-method number <==removed next end end |
606544 |
Remove config antivirus profile edit "av" set scan-mode legacy <==removed next end |
607351 |
Remove config antivirus settings set default-db extended <==removed set grayware enable set override-timeout 0 end Add config antivirus settings set use-extreme-db [enable | disable] <==added only on mid- and high-end FortiGates set grayware enable set override-timeout 0 end |
607594 |
Add config antivirus profile edit "av" set feature-set [flow | proxy] <==added next end |
608185 |
Resource record limit is now a configurable value for secondary DNS can be edited per config system dns-database edit "secondary" set domain "fm.tvssa.net" set type slave set rr-max 0 set ip-master 172.16.78.171 next edit "secondary2" set status disable set domain "test.edu" set type slave set rr-max 40000 set ip-master 172.16.78.171 next end |
608525 |
Remove the config firewall addrgrp edit 1 set visibility {enable | disable} <==removed next end This attribute was removed from: |
608942 |
Add config application list edit "app-list-1" set force-inclusion-ssl-di-sigs disable <==added next end |
613860 |
Add config sys vdom-exception edit 1 set object log.syslogd.setting <==added next edit 2 set object log.syslogd.override-setting <==added set scope inclusive set vdom root next end |
613876 |
Add config vpn ipsec phase1-interface edit "1" set type dynamic set peertype any set net-device disable set mode-cfg enable set proposal aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1 set dpd on-idle set assign-ip-from dhcp set dhcp-ra-giaddr <==added next end |
614198 |
Remove all MMS-related configurations, which includes:
|
616860 |
Add config vpn ocvpn set multipath [enable | disable] <==added set wan-interface <interface name> <==added set ip-allocation-block x.x.x.x y.y.y.y <==added set sdwan [enable | disable] <==added config overlays <==added edit <overlay name> <==added set inter-overlay [allow | deny] <==added next end config forticlient-access <==added set status enable <==added set psksecret xxxxxx <==added config auth-groups <==added edit <name> <==added set auth-group <group name> <==added set overlays <overlay name> <==added next end end |