Fortinet white logo
Fortinet white logo

CLI Reference

config system np6

config system np6

Note

This command is available for model(s): FortiGate 1000D, FortiGate 1100E, FortiGate 1101E, FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate 800D, FortiGate 900D.

It is not available for: FortiGate 1000F, FortiGate 1001F, FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 200E, FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2600F, FortiGate 2601F, FortiGate 3000F, FortiGate 3001F, FortiGate 3200F, FortiGate 3201F, FortiGate 3500F, FortiGate 3501F, FortiGate 3700F, FortiGate 3701F, FortiGate 400F, FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 600F, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.

Configure NP6 attributes.

config system np6
    Description: Configure NP6 attributes.
    edit <name>
        set fastpath [disable|enable]
        config fp-anomaly
            Description: NP6 IPv4 anomaly protection. trap-to-host forwards anomaly sessions to the CPU.
            set tcp-syn-fin [allow|drop|...]
            set tcp-fin-noack [allow|drop|...]
            set tcp-fin-only [allow|drop|...]
            set tcp-no-flag [allow|drop|...]
            set tcp-syn-data [allow|drop|...]
            set tcp-winnuke [allow|drop|...]
            set tcp-land [allow|drop|...]
            set udp-land [allow|drop|...]
            set icmp-land [allow|drop|...]
            set icmp-frag [allow|drop|...]
            set ipv4-land [allow|drop|...]
            set ipv4-proto-err [allow|drop|...]
            set ipv4-unknopt [allow|drop|...]
            set ipv4-optrr [allow|drop|...]
            set ipv4-optssrr [allow|drop|...]
            set ipv4-optlsrr [allow|drop|...]
            set ipv4-optstream [allow|drop|...]
            set ipv4-optsecurity [allow|drop|...]
            set ipv4-opttimestamp [allow|drop|...]
            set ipv4-csum-err [drop|trap-to-host]
            set tcp-csum-err [drop|trap-to-host]
            set udp-csum-err [drop|trap-to-host]
            set icmp-csum-err [drop|trap-to-host]
            set ipv6-land [allow|drop|...]
            set ipv6-proto-err [allow|drop|...]
            set ipv6-unknopt [allow|drop|...]
            set ipv6-saddr-err [allow|drop|...]
            set ipv6-daddr-err [allow|drop|...]
            set ipv6-optralert [allow|drop|...]
            set ipv6-optjumbo [allow|drop|...]
            set ipv6-opttunnel [allow|drop|...]
            set ipv6-opthomeaddr [allow|drop|...]
            set ipv6-optnsap [allow|drop|...]
            set ipv6-optendpid [allow|drop|...]
            set ipv6-optinvld [allow|drop|...]
        end
        set garbage-session-collector [disable|enable]
        config hpe
            Description: HPE configuration.
            set tcpsyn-max {integer}
            set tcpsyn-ack-max {integer}
            set tcpfin-rst-max {integer}
            set tcp-max {integer}
            set udp-max {integer}
            set icmp-max {integer}
            set sctp-max {integer}
            set esp-max {integer}
            set ip-frag-max {integer}
            set ip-others-max {integer}
            set arp-max {integer}
            set l2-others-max {integer}
            set pri-type-max {integer}
            set enable-shaper [disable|enable]
        end
        set ipsec-ob-hash-function [switch-group-hash|global-hash|...]
        set ipsec-outbound-hash [disable|enable]
        set low-latency-mode [disable|enable]
        set per-session-accounting [disable|traffic-log-only|...]
        set session-collector-interval {integer}
        set session-timeout-fixed [disable|enable]
        set session-timeout-interval {integer}
        set session-timeout-random-range {integer}
    next
end

config system np6

Parameter

Description

Type

Size

Default

fastpath

Enable/disable NP6 offloading (also called fast path).

option

-

enable

Option

Description

disable

Disable NP6 offloading (fast path).

enable

Enable NP6 offloading (fast path).

garbage-session-collector

Enable/disable garbage session collector.

option

-

disable

Option

Description

disable

Disable garbage session collector.

enable

Enable garbage session collector.

ipsec-ob-hash-function *

Set hash function for IPSec outbound.

option

-

switch-group-hash

Option

Description

switch-group-hash

Hash outbound SA traffic within NPs connected to same switch.

global-hash

Hash outbound SA traffic among all NPs.

global-hash-weighted

Hash outbound SA traffic among all NPs with more weights on NPs connected to switch 0. It's applicable to the case that ingress traffic is from switch 1.

round-robin-switch-group

Round-robin outbound SA traffic within NPs connected to same switch.

round-robin-global

Round-robin outbound SA traffic among all NPs.

ipsec-outbound-hash *

Enable/disable hash function for IPsec outbound traffic.

option

-

disable

Option

Description

disable

Disable hash function for IPsec outbound traffic.

enable

Enable hash function for IPsec outbound traffic.

low-latency-mode

Enable/disable low latency mode.

option

-

disable

Option

Description

disable

Disable low latency mode.

enable

Enable low latency mode.

name

Device Name.

string

Maximum length: 31

per-session-accounting

Enable/disable per-session accounting.

option

-

traffic-log-only

Option

Description

disable

Disable per-session accounting.

traffic-log-only

Per-session accounting only for sessions with traffic logging enabled in firewall policy.

enable

Per-session accounting for all sessions.

session-collector-interval

Set garbage session collection cleanup interval.

integer

Minimum value: 1 Maximum value: 100

64

session-timeout-fixed

{disable | enable} Toggle between using fixed or random timeouts for refreshing NP6 sessions.

option

-

disable

Option

Description

disable

Disable Refresh NP6 sessions at the configured fixed interval.

enable

Enable Refresh NP6 sessions randomly where the time between refreshes is within the random range.

session-timeout-interval

Set the fixed timeout for refreshing NP6 sessions.

integer

Minimum value: 0 Maximum value: 1000

40

session-timeout-random-range

Set the random timeout range for refreshing NP6 sessions.

integer

Minimum value: 0 Maximum value: 1000

8

* This parameter may not exist in some models.

config fp-anomaly

Parameter

Description

Type

Size

Default

tcp-syn-fin

TCP SYN flood SYN/FIN flag set anomalies.

option

-

allow

Option

Description

allow

Allow TCP packets with syn_fin flag set to pass.

drop

Drop TCP packets with syn_fin flag set.

trap-to-host

Forward TCP packets with syn_fin flag set to FortiOS.

tcp-fin-noack

TCP SYN flood with FIN flag set without ACK setting anomalies.

option

-

trap-to-host

Option

Description

allow

Allow TCP packets with FIN flag set without ack setting to pass.

drop

Drop TCP packets with FIN flag set without ack setting.

trap-to-host

Forward TCP packets with FIN flag set without ack setting to FortiOS.

tcp-fin-only

TCP SYN flood with only FIN flag set anomalies.

option

-

trap-to-host

Option

Description

allow

Allow TCP packets with FIN flag set only to pass.

drop

Drop TCP packets with FIN flag set only.

trap-to-host

Forward TCP packets with FIN flag set only to FortiOS.

tcp-no-flag

TCP SYN flood with no flag set anomalies.

option

-

allow

Option

Description

allow

Allow TCP packets without flag set to pass.

drop

Drop TCP packets without flag set.

trap-to-host

Forward TCP packets without flag set to FortiOS.

tcp-syn-data

TCP SYN flood packets with data anomalies.

option

-

allow

Option

Description

allow

Allow TCP syn packets with data to pass.

drop

Drop TCP syn packets with data.

trap-to-host

Forward TCP syn packets with data to FortiOS.

tcp-winnuke

TCP WinNuke anomalies.

option

-

trap-to-host

Option

Description

allow

Allow TCP packets winnuke attack to pass.

drop

Drop TCP packets winnuke attack.

trap-to-host

Forward TCP packets winnuke attack to FortiOS.

tcp-land

TCP land anomalies.

option

-

trap-to-host

Option

Description

allow

Allow TCP land attack to pass.

drop

Drop TCP land attack.

trap-to-host

Forward TCP land attack to FortiOS.

udp-land

UDP land anomalies.

option

-

trap-to-host

Option

Description

allow

Allow UDP land attack to pass.

drop

Drop UDP land attack.

trap-to-host

Forward UDP land attack to FortiOS.

icmp-land

ICMP land anomalies.

option

-

trap-to-host

Option

Description

allow

Allow ICMP land attack to pass.

drop

Drop ICMP land attack.

trap-to-host

Forward ICMP land attack to FortiOS.

icmp-frag

Layer 3 fragmented packets that could be part of layer 4 ICMP anomalies.

option

-

allow

Option

Description

allow

Allow L3 fragment packet with L4 protocol as ICMP attack to pass.

drop

Drop L3 fragment packet with L4 protocol as ICMP attack.

trap-to-host

Forward L3 fragment packet with L4 protocol as ICMP attack to FortiOS.

ipv4-land

Land anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 land attack to pass.

drop

Drop IPv4 land attack.

trap-to-host

Forward IPv4 land attack to FortiOS.

ipv4-proto-err

Invalid layer 4 protocol anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 invalid L4 protocol to pass.

drop

Drop IPv4 invalid L4 protocol.

trap-to-host

Forward IPv4 invalid L4 protocol to FortiOS.

ipv4-unknopt

Unknown option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 with unknown options to pass.

drop

Drop IPv4 with unknown options.

trap-to-host

Forward IPv4 with unknown options to FortiOS.

ipv4-optrr

Record route option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 with record route option to pass.

drop

Drop IPv4 with record route option.

trap-to-host

Forward IPv4 with record route option to FortiOS.

ipv4-optssrr

Strict source record route option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 with strict source record route option to pass.

drop

Drop IPv4 with strict source record route option.

trap-to-host

Forward IPv4 with strict source record route option to FortiOS.

ipv4-optlsrr

Loose source record route option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 with loose source record route option to pass.

drop

Drop IPv4 with loose source record route option.

trap-to-host

Forward IPv4 with loose source record route option to FortiOS.

ipv4-optstream

Stream option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 with stream option to pass.

drop

Drop IPv4 with stream option.

trap-to-host

Forward IPv4 with stream option to FortiOS.

ipv4-optsecurity

Security option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 with security option to pass.

drop

Drop IPv4 with security option.

trap-to-host

Forward IPv4 with security option to FortiOS.

ipv4-opttimestamp

Timestamp option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 with timestamp option to pass.

drop

Drop IPv4 with timestamp option.

trap-to-host

Forward IPv4 with timestamp option to FortiOS.

ipv4-csum-err

Invalid IPv4 IP checksum anomalies.

option

-

drop

Option

Description

drop

Drop IPv4 invalid IP checksum.

trap-to-host

Forward IPv4 invalid IP checksum to main CPU for processing.

tcp-csum-err

Invalid IPv4 TCP checksum anomalies.

option

-

drop

Option

Description

drop

Drop IPv4 invalid TCP checksum.

trap-to-host

Forward IPv4 invalid TCP checksum to main CPU for processing.

udp-csum-err

Invalid IPv4 UDP checksum anomalies.

option

-

drop

Option

Description

drop

Drop IPv4 invalid UDP checksum.

trap-to-host

Forward IPv4 invalid UDP checksum to main CPU for processing.

icmp-csum-err

Invalid IPv4 ICMP checksum anomalies.

option

-

drop

Option

Description

drop

Drop IPv4 invalid ICMP checksum.

trap-to-host

Forward IPv4 invalid ICMP checksum to main CPU for processing.

ipv6-land

Land anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 land attack to pass.

drop

Drop IPv6 land attack.

trap-to-host

Forward IPv6 land attack to FortiOS.

ipv6-proto-err

Layer 4 invalid protocol anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 L4 invalid protocol to pass.

drop

Drop IPv6 L4 invalid protocol.

trap-to-host

Forward IPv6 L4 invalid protocol to FortiOS.

ipv6-unknopt

Unknown option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with unknown options to pass.

drop

Drop IPv6 with unknown options.

trap-to-host

Forward IPv6 with unknown options to FortiOS.

ipv6-saddr-err

Source address as multicast anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with source address as multicast to pass.

drop

Drop IPv6 with source address as multicast.

trap-to-host

Forward IPv6 with source address as multicast to FortiOS.

ipv6-daddr-err

Destination address as unspecified or loopback address anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with destination address as unspecified or loopback address to pass.

drop

Drop IPv6 with destination address as unspecified or loopback address.

trap-to-host

Forward IPv6 with destination address as unspecified or loopback address to FortiOS.

ipv6-optralert

Router alert option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with router alert option to pass.

drop

Drop IPv6 with router alert option.

trap-to-host

Forward IPv6 with router alert option to FortiOS.

ipv6-optjumbo

Jumbo options anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with jumbo option to pass.

drop

Drop IPv6 with jumbo option.

trap-to-host

Forward IPv6 with jumbo option to FortiOS.

ipv6-opttunnel

Tunnel encapsulation limit option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with tunnel encapsulation limit to pass.

drop

Drop IPv6 with tunnel encapsulation limit.

trap-to-host

Forward IPv6 with tunnel encapsulation limit to FortiOS.

ipv6-opthomeaddr

Home address option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with home address option to pass.

drop

Drop IPv6 with home address option.

trap-to-host

Forward IPv6 with home address option to FortiOS.

ipv6-optnsap

Network service access point address option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with network service access point address option to pass.

drop

Drop IPv6 with network service access point address option.

trap-to-host

Forward IPv6 with network service access point address option to FortiOS.

ipv6-optendpid

End point identification anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with end point identification option to pass.

drop

Drop IPv6 with end point identification option.

trap-to-host

Forward IPv6 with end point identification option to FortiOS.

ipv6-optinvld

Invalid option anomalies.Invalid option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with invalid option to pass.

drop

Drop IPv6 with invalid option.

trap-to-host

Forward IPv6 with invalid option to FortiOS.

config hpe

Parameter

Description

Type

Size

Default

tcpsyn-max

Maximum TCP SYN packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

600000

tcpsyn-ack-max

Maximum TCP carries SYN and ACK flags packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

600000

tcpfin-rst-max

Maximum TCP carries FIN or RST flags packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

600000

tcp-max

Maximum TCP packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

600000

udp-max

Maximum UDP packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

600000

icmp-max

Maximum ICMP packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

200000

sctp-max

Maximum SCTP packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

200000

esp-max

Maximum ESP packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

200000

ip-frag-max

Maximum fragmented IP packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

200000

ip-others-max

Maximum IP packet rate for other packets.

integer

Minimum value: 1000 Maximum value: 1000000000

200000

arp-max

Maximum ARP packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

200000

l2-others-max

Maximum L2 packet rate for L2 packets that are not ARP packets.

integer

Minimum value: 1000 Maximum value: 1000000000

200000

pri-type-max

Maximum overflow rate of priority type traffic. Includes L2: HA, 802.3ad LACP, heartbeats. L3: OSPF. L4_TCP: BGP. L4_UDP: IKE, SLBC, BFD.

integer

Minimum value: 1000 Maximum value: 1000000000

200000

enable-shaper

Enable/Disable NPU Host Protection Engine(HPE) for packet type shaper.

option

-

disable

Option

Description

disable

Disable NPU HPE shaping based on packet type.

enable

Enable NPU HPE shaping based on packet type.

config system np6

config system np6

Note

This command is available for model(s): FortiGate 1000D, FortiGate 1100E, FortiGate 1101E, FortiGate 1500DT, FortiGate 1500D, FortiGate 2000E, FortiGate 2200E, FortiGate 2201E, FortiGate 2500E, FortiGate 3000D, FortiGate 300E, FortiGate 301E, FortiGate 3100D, FortiGate 3200D, FortiGate 3300E, FortiGate 3301E, FortiGate 3400E, FortiGate 3401E, FortiGate 3600E, FortiGate 3601E, FortiGate 3700D, FortiGate 3960E, FortiGate 3980E, FortiGate 400E Bypass, FortiGate 400E, FortiGate 401E, FortiGate 5001E1, FortiGate 5001E, FortiGate 500E, FortiGate 501E, FortiGate 600E, FortiGate 601E, FortiGate 800D, FortiGate 900D.

It is not available for: FortiGate 1000F, FortiGate 1001F, FortiGate 100EF, FortiGate 100E, FortiGate 100F, FortiGate 101E, FortiGate 101F, FortiGate 140E-POE, FortiGate 140E, FortiGate 1800F, FortiGate 1801F, FortiGate 200E, FortiGate 200F, FortiGate 201E, FortiGate 201F, FortiGate 2600F, FortiGate 2601F, FortiGate 3000F, FortiGate 3001F, FortiGate 3200F, FortiGate 3201F, FortiGate 3500F, FortiGate 3501F, FortiGate 3700F, FortiGate 3701F, FortiGate 400F, FortiGate 401F, FortiGate 40F 3G4G, FortiGate 40F, FortiGate 4200F, FortiGate 4201F, FortiGate 4400F, FortiGate 4401F, FortiGate 600F, FortiGate 601F, FortiGate 60E DSLJ, FortiGate 60E DSL, FortiGate 60E-POE, FortiGate 60E, FortiGate 60F, FortiGate 61E, FortiGate 61F, FortiGate 70F, FortiGate 71F, FortiGate 80E-POE, FortiGate 80E, FortiGate 80F Bypass, FortiGate 80F-POE, FortiGate 80F, FortiGate 81E-POE, FortiGate 81E, FortiGate 81F-POE, FortiGate 81F, FortiGate 900G, FortiGate 901G, FortiGate 90E, FortiGate 91E, FortiGate VM64, FortiGateRugged 60F 3G4G, FortiGateRugged 60F, FortiGateRugged 70F 3G4G, FortiGateRugged 70F, FortiWiFi 40F 3G4G, FortiWiFi 40F, FortiWiFi 60E DSLJ, FortiWiFi 60E DSL, FortiWiFi 60E, FortiWiFi 60F, FortiWiFi 61E, FortiWiFi 61F, FortiWiFi 80F 2R, FortiWiFi 81F 2R 3G4G-POE, FortiWiFi 81F 2R-POE, FortiWiFi 81F 2R.

Configure NP6 attributes.

config system np6
    Description: Configure NP6 attributes.
    edit <name>
        set fastpath [disable|enable]
        config fp-anomaly
            Description: NP6 IPv4 anomaly protection. trap-to-host forwards anomaly sessions to the CPU.
            set tcp-syn-fin [allow|drop|...]
            set tcp-fin-noack [allow|drop|...]
            set tcp-fin-only [allow|drop|...]
            set tcp-no-flag [allow|drop|...]
            set tcp-syn-data [allow|drop|...]
            set tcp-winnuke [allow|drop|...]
            set tcp-land [allow|drop|...]
            set udp-land [allow|drop|...]
            set icmp-land [allow|drop|...]
            set icmp-frag [allow|drop|...]
            set ipv4-land [allow|drop|...]
            set ipv4-proto-err [allow|drop|...]
            set ipv4-unknopt [allow|drop|...]
            set ipv4-optrr [allow|drop|...]
            set ipv4-optssrr [allow|drop|...]
            set ipv4-optlsrr [allow|drop|...]
            set ipv4-optstream [allow|drop|...]
            set ipv4-optsecurity [allow|drop|...]
            set ipv4-opttimestamp [allow|drop|...]
            set ipv4-csum-err [drop|trap-to-host]
            set tcp-csum-err [drop|trap-to-host]
            set udp-csum-err [drop|trap-to-host]
            set icmp-csum-err [drop|trap-to-host]
            set ipv6-land [allow|drop|...]
            set ipv6-proto-err [allow|drop|...]
            set ipv6-unknopt [allow|drop|...]
            set ipv6-saddr-err [allow|drop|...]
            set ipv6-daddr-err [allow|drop|...]
            set ipv6-optralert [allow|drop|...]
            set ipv6-optjumbo [allow|drop|...]
            set ipv6-opttunnel [allow|drop|...]
            set ipv6-opthomeaddr [allow|drop|...]
            set ipv6-optnsap [allow|drop|...]
            set ipv6-optendpid [allow|drop|...]
            set ipv6-optinvld [allow|drop|...]
        end
        set garbage-session-collector [disable|enable]
        config hpe
            Description: HPE configuration.
            set tcpsyn-max {integer}
            set tcpsyn-ack-max {integer}
            set tcpfin-rst-max {integer}
            set tcp-max {integer}
            set udp-max {integer}
            set icmp-max {integer}
            set sctp-max {integer}
            set esp-max {integer}
            set ip-frag-max {integer}
            set ip-others-max {integer}
            set arp-max {integer}
            set l2-others-max {integer}
            set pri-type-max {integer}
            set enable-shaper [disable|enable]
        end
        set ipsec-ob-hash-function [switch-group-hash|global-hash|...]
        set ipsec-outbound-hash [disable|enable]
        set low-latency-mode [disable|enable]
        set per-session-accounting [disable|traffic-log-only|...]
        set session-collector-interval {integer}
        set session-timeout-fixed [disable|enable]
        set session-timeout-interval {integer}
        set session-timeout-random-range {integer}
    next
end

config system np6

Parameter

Description

Type

Size

Default

fastpath

Enable/disable NP6 offloading (also called fast path).

option

-

enable

Option

Description

disable

Disable NP6 offloading (fast path).

enable

Enable NP6 offloading (fast path).

garbage-session-collector

Enable/disable garbage session collector.

option

-

disable

Option

Description

disable

Disable garbage session collector.

enable

Enable garbage session collector.

ipsec-ob-hash-function *

Set hash function for IPSec outbound.

option

-

switch-group-hash

Option

Description

switch-group-hash

Hash outbound SA traffic within NPs connected to same switch.

global-hash

Hash outbound SA traffic among all NPs.

global-hash-weighted

Hash outbound SA traffic among all NPs with more weights on NPs connected to switch 0. It's applicable to the case that ingress traffic is from switch 1.

round-robin-switch-group

Round-robin outbound SA traffic within NPs connected to same switch.

round-robin-global

Round-robin outbound SA traffic among all NPs.

ipsec-outbound-hash *

Enable/disable hash function for IPsec outbound traffic.

option

-

disable

Option

Description

disable

Disable hash function for IPsec outbound traffic.

enable

Enable hash function for IPsec outbound traffic.

low-latency-mode

Enable/disable low latency mode.

option

-

disable

Option

Description

disable

Disable low latency mode.

enable

Enable low latency mode.

name

Device Name.

string

Maximum length: 31

per-session-accounting

Enable/disable per-session accounting.

option

-

traffic-log-only

Option

Description

disable

Disable per-session accounting.

traffic-log-only

Per-session accounting only for sessions with traffic logging enabled in firewall policy.

enable

Per-session accounting for all sessions.

session-collector-interval

Set garbage session collection cleanup interval.

integer

Minimum value: 1 Maximum value: 100

64

session-timeout-fixed

{disable | enable} Toggle between using fixed or random timeouts for refreshing NP6 sessions.

option

-

disable

Option

Description

disable

Disable Refresh NP6 sessions at the configured fixed interval.

enable

Enable Refresh NP6 sessions randomly where the time between refreshes is within the random range.

session-timeout-interval

Set the fixed timeout for refreshing NP6 sessions.

integer

Minimum value: 0 Maximum value: 1000

40

session-timeout-random-range

Set the random timeout range for refreshing NP6 sessions.

integer

Minimum value: 0 Maximum value: 1000

8

* This parameter may not exist in some models.

config fp-anomaly

Parameter

Description

Type

Size

Default

tcp-syn-fin

TCP SYN flood SYN/FIN flag set anomalies.

option

-

allow

Option

Description

allow

Allow TCP packets with syn_fin flag set to pass.

drop

Drop TCP packets with syn_fin flag set.

trap-to-host

Forward TCP packets with syn_fin flag set to FortiOS.

tcp-fin-noack

TCP SYN flood with FIN flag set without ACK setting anomalies.

option

-

trap-to-host

Option

Description

allow

Allow TCP packets with FIN flag set without ack setting to pass.

drop

Drop TCP packets with FIN flag set without ack setting.

trap-to-host

Forward TCP packets with FIN flag set without ack setting to FortiOS.

tcp-fin-only

TCP SYN flood with only FIN flag set anomalies.

option

-

trap-to-host

Option

Description

allow

Allow TCP packets with FIN flag set only to pass.

drop

Drop TCP packets with FIN flag set only.

trap-to-host

Forward TCP packets with FIN flag set only to FortiOS.

tcp-no-flag

TCP SYN flood with no flag set anomalies.

option

-

allow

Option

Description

allow

Allow TCP packets without flag set to pass.

drop

Drop TCP packets without flag set.

trap-to-host

Forward TCP packets without flag set to FortiOS.

tcp-syn-data

TCP SYN flood packets with data anomalies.

option

-

allow

Option

Description

allow

Allow TCP syn packets with data to pass.

drop

Drop TCP syn packets with data.

trap-to-host

Forward TCP syn packets with data to FortiOS.

tcp-winnuke

TCP WinNuke anomalies.

option

-

trap-to-host

Option

Description

allow

Allow TCP packets winnuke attack to pass.

drop

Drop TCP packets winnuke attack.

trap-to-host

Forward TCP packets winnuke attack to FortiOS.

tcp-land

TCP land anomalies.

option

-

trap-to-host

Option

Description

allow

Allow TCP land attack to pass.

drop

Drop TCP land attack.

trap-to-host

Forward TCP land attack to FortiOS.

udp-land

UDP land anomalies.

option

-

trap-to-host

Option

Description

allow

Allow UDP land attack to pass.

drop

Drop UDP land attack.

trap-to-host

Forward UDP land attack to FortiOS.

icmp-land

ICMP land anomalies.

option

-

trap-to-host

Option

Description

allow

Allow ICMP land attack to pass.

drop

Drop ICMP land attack.

trap-to-host

Forward ICMP land attack to FortiOS.

icmp-frag

Layer 3 fragmented packets that could be part of layer 4 ICMP anomalies.

option

-

allow

Option

Description

allow

Allow L3 fragment packet with L4 protocol as ICMP attack to pass.

drop

Drop L3 fragment packet with L4 protocol as ICMP attack.

trap-to-host

Forward L3 fragment packet with L4 protocol as ICMP attack to FortiOS.

ipv4-land

Land anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 land attack to pass.

drop

Drop IPv4 land attack.

trap-to-host

Forward IPv4 land attack to FortiOS.

ipv4-proto-err

Invalid layer 4 protocol anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 invalid L4 protocol to pass.

drop

Drop IPv4 invalid L4 protocol.

trap-to-host

Forward IPv4 invalid L4 protocol to FortiOS.

ipv4-unknopt

Unknown option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 with unknown options to pass.

drop

Drop IPv4 with unknown options.

trap-to-host

Forward IPv4 with unknown options to FortiOS.

ipv4-optrr

Record route option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 with record route option to pass.

drop

Drop IPv4 with record route option.

trap-to-host

Forward IPv4 with record route option to FortiOS.

ipv4-optssrr

Strict source record route option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 with strict source record route option to pass.

drop

Drop IPv4 with strict source record route option.

trap-to-host

Forward IPv4 with strict source record route option to FortiOS.

ipv4-optlsrr

Loose source record route option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 with loose source record route option to pass.

drop

Drop IPv4 with loose source record route option.

trap-to-host

Forward IPv4 with loose source record route option to FortiOS.

ipv4-optstream

Stream option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 with stream option to pass.

drop

Drop IPv4 with stream option.

trap-to-host

Forward IPv4 with stream option to FortiOS.

ipv4-optsecurity

Security option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 with security option to pass.

drop

Drop IPv4 with security option.

trap-to-host

Forward IPv4 with security option to FortiOS.

ipv4-opttimestamp

Timestamp option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv4 with timestamp option to pass.

drop

Drop IPv4 with timestamp option.

trap-to-host

Forward IPv4 with timestamp option to FortiOS.

ipv4-csum-err

Invalid IPv4 IP checksum anomalies.

option

-

drop

Option

Description

drop

Drop IPv4 invalid IP checksum.

trap-to-host

Forward IPv4 invalid IP checksum to main CPU for processing.

tcp-csum-err

Invalid IPv4 TCP checksum anomalies.

option

-

drop

Option

Description

drop

Drop IPv4 invalid TCP checksum.

trap-to-host

Forward IPv4 invalid TCP checksum to main CPU for processing.

udp-csum-err

Invalid IPv4 UDP checksum anomalies.

option

-

drop

Option

Description

drop

Drop IPv4 invalid UDP checksum.

trap-to-host

Forward IPv4 invalid UDP checksum to main CPU for processing.

icmp-csum-err

Invalid IPv4 ICMP checksum anomalies.

option

-

drop

Option

Description

drop

Drop IPv4 invalid ICMP checksum.

trap-to-host

Forward IPv4 invalid ICMP checksum to main CPU for processing.

ipv6-land

Land anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 land attack to pass.

drop

Drop IPv6 land attack.

trap-to-host

Forward IPv6 land attack to FortiOS.

ipv6-proto-err

Layer 4 invalid protocol anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 L4 invalid protocol to pass.

drop

Drop IPv6 L4 invalid protocol.

trap-to-host

Forward IPv6 L4 invalid protocol to FortiOS.

ipv6-unknopt

Unknown option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with unknown options to pass.

drop

Drop IPv6 with unknown options.

trap-to-host

Forward IPv6 with unknown options to FortiOS.

ipv6-saddr-err

Source address as multicast anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with source address as multicast to pass.

drop

Drop IPv6 with source address as multicast.

trap-to-host

Forward IPv6 with source address as multicast to FortiOS.

ipv6-daddr-err

Destination address as unspecified or loopback address anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with destination address as unspecified or loopback address to pass.

drop

Drop IPv6 with destination address as unspecified or loopback address.

trap-to-host

Forward IPv6 with destination address as unspecified or loopback address to FortiOS.

ipv6-optralert

Router alert option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with router alert option to pass.

drop

Drop IPv6 with router alert option.

trap-to-host

Forward IPv6 with router alert option to FortiOS.

ipv6-optjumbo

Jumbo options anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with jumbo option to pass.

drop

Drop IPv6 with jumbo option.

trap-to-host

Forward IPv6 with jumbo option to FortiOS.

ipv6-opttunnel

Tunnel encapsulation limit option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with tunnel encapsulation limit to pass.

drop

Drop IPv6 with tunnel encapsulation limit.

trap-to-host

Forward IPv6 with tunnel encapsulation limit to FortiOS.

ipv6-opthomeaddr

Home address option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with home address option to pass.

drop

Drop IPv6 with home address option.

trap-to-host

Forward IPv6 with home address option to FortiOS.

ipv6-optnsap

Network service access point address option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with network service access point address option to pass.

drop

Drop IPv6 with network service access point address option.

trap-to-host

Forward IPv6 with network service access point address option to FortiOS.

ipv6-optendpid

End point identification anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with end point identification option to pass.

drop

Drop IPv6 with end point identification option.

trap-to-host

Forward IPv6 with end point identification option to FortiOS.

ipv6-optinvld

Invalid option anomalies.Invalid option anomalies.

option

-

trap-to-host

Option

Description

allow

Allow IPv6 with invalid option to pass.

drop

Drop IPv6 with invalid option.

trap-to-host

Forward IPv6 with invalid option to FortiOS.

config hpe

Parameter

Description

Type

Size

Default

tcpsyn-max

Maximum TCP SYN packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

600000

tcpsyn-ack-max

Maximum TCP carries SYN and ACK flags packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

600000

tcpfin-rst-max

Maximum TCP carries FIN or RST flags packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

600000

tcp-max

Maximum TCP packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

600000

udp-max

Maximum UDP packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

600000

icmp-max

Maximum ICMP packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

200000

sctp-max

Maximum SCTP packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

200000

esp-max

Maximum ESP packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

200000

ip-frag-max

Maximum fragmented IP packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

200000

ip-others-max

Maximum IP packet rate for other packets.

integer

Minimum value: 1000 Maximum value: 1000000000

200000

arp-max

Maximum ARP packet rate.

integer

Minimum value: 1000 Maximum value: 1000000000

200000

l2-others-max

Maximum L2 packet rate for L2 packets that are not ARP packets.

integer

Minimum value: 1000 Maximum value: 1000000000

200000

pri-type-max

Maximum overflow rate of priority type traffic. Includes L2: HA, 802.3ad LACP, heartbeats. L3: OSPF. L4_TCP: BGP. L4_UDP: IKE, SLBC, BFD.

integer

Minimum value: 1000 Maximum value: 1000000000

200000

enable-shaper

Enable/Disable NPU Host Protection Engine(HPE) for packet type shaper.

option

-

disable

Option

Description

disable

Disable NPU HPE shaping based on packet type.

enable

Enable NPU HPE shaping based on packet type.