You are on page 1of 2

Network System

Network Troubleshooting Process information


get hardware nic [port] Interface information get system performance status General performance information
get system arp Process list
diag ip arp list ARP table diag sys top [sec] [number]
Sort with P (CPU) / M (Memory)
exec clear system arp table Clears ARP table Process list with grouped processes and
diag sys top-summary [sec]
exec ping x.x.x.x shared memory.

CHEATSHEET
exec ping-options [option] Ping utility
diag debug crashlog read Crash log
exec traceroute x.x.x.x
exec traceroute-options [option] Traceroute utility
exec telnet x.x.x.x [port] Telnet utility
Traffic Processing
General debugging
Interface information diag debug appl [appl-name]
[debug_level]
diag ip address list List of IP addresses on FortiGate interfaces Debugger for several applications
diag test appl [appl-name]

FORTIGATE FOR FORTIOS 6.0


© BOLL Engineering AG, FortiOS Cheat Sheet Version 1.5 / 13.09.2018
diag firewall iplist list

Transparent Mode
List of IP addresses on VIP and IP-Pools [test_level]
diag debug console timestamp
enable
diag debug enable
Enables timestamp in console

Enable/disable output for “diag debug” and


diag netlink brctl Bridge MAC table diag debug disable “diag ip” commands
diag debug reset Reset debug levels
Routing
General Routing troubleshooting Paket Sniffer
get router info routing-table diag sniffer packet [if] ‘[fil- Packet sniffer. Use filters!
Default device information all Routing table
ter]’ [verbose] [count] [ts] Verbose levels 1-6 for different output
admin / [no password] Default login get router info routing-table Shows Routing decision for specified
Default IP on port1, internal details x.x.x.x Destination-IP
192.168.1.99/24
or management port get router info routing-table Flow Trace
database Routing table with inactive routes
9600/8-N-1 diag debug flow filter [filter]
hardware flow control disabled Default serial console settings
get router info kernel Forwarding information base diag debug flow show iprope en
Debug command for traffic flow.
diag debug flow show fun ena
diag firewall proute list List of policy-based routes Use filters to narrow down search results
diag debug flow trace start
Fortinet Links diag ip rtcache list List of route cache [packet count]
docs.fortinet.com Documentation Overview of dynamic routing protocol
get router info protocols
kb.fortinet.com Knowledge base configuration
Firewall session troubleshooting
cookbook.fortinet.com Cookbook exec router restart Restart of routing process diag sys session filter Filter for session list
www.fortiguard.com FortiGuard Website diag sys link-monitor status/ Shows link monitor status / diag sys session list[expect] Lists all (or expected) sessions
interface/launch per interface / for WAN LLB
support.fortinet.com Support site (Login required) diag sys session clear Clear all / filtered sessions
forum.fortinet.com User forum (Login required) Session statistics, memory tension, ephem-
BGP diag sys session stat
wiki.diagnose.fortinet.com Diagnose-Wiki eral drops
get router info bgp summary BGP summary of BGP status diag firewall iprope clear
blog.boll.ch Boll-Blog Resets counter for all or specific firewall
get router info bgp neighbors Information on BGP neighbors 00100004 [<id>] policy id
diag ip router bgp all enable
General system commands diag ip router bgp level info Real-time debugging for BGP protocol

get system status


Internet Services Database
General system information exec router clear bgp Restart of BGP session
diag internet-service Lists summary/details for specific Internet
exec tac report Generates report for support id-summary/id <id> Service
tree Lists all commands OSPF Reverse ISDB lookup for specific IP,
diag internet-service info …
<command> ? / tab Use ? or tab in CLI for help get router info ospf status OSPF status protocol, port
get router info ospf interface Information on OSPF interfaces diag internet-service match
<command> | grep [filter] Grep command to filter outputs Reverse ISDB lookup for specific IP
<vdom> <ip> <netmask>
get router info ospf neighbors Information on OSPF neighbors
get router info ospf database
Factory Reset brief / router lsa Summary / Details of all LSDB entries UTM Services
exec factoryreset Reset whole configuration get router info ospf database Information on LSAs originating from Signature Update
self-originate FortiGate
exec factoryreset2 Reset with retaining admin, interfaces and diag debug rating Service information
static routing diag ip router ospf all enable
diag ip router ospf level info Real-time debugging of OSPF protocol diag autoupdate versions Detailed versions of packages
exec router clear ospf process Restart of OSPF session diag debug appl update -1
Firmware Update exec update-now Troubleshooting update process
diag debug config-error-log read Show config errors after firmware upgrades
IPS get vpn ipsec tunnel details Detailed tunnel information FortiExtender
diag ips anomaly list Lists statistics of DoS-Policies get vpn ipsec state tunnel Detailed tunnel statistics get extender sys-info [FXT SN] Check the FortiExtender status
diag ips packet status IPS packet statistics diag vpn ipsec status Shows IPSEC crypto status get extender modem-status [FXT Get the detailed modem status of the
SN] FortiExtender
diag test appl ipsmonitor 2 Enable / disable IPS engine
diag test appl ipsmonitor 5 Toggle bypass status Hardware diag debug application
Enable FortiExtender logging and
debugging, collect information for about
diag test appl ipsmonitor 99 extender -1
Restart all ipsengine and monitor Disk operations 5 minutes
diag hardware deviceinfo disk List disks with partitions exec extender reset-
Restart managed FortiExtender
fortiextender
Spamfilter exec disk list List the disks and partitions
exec extender restart-
diag spamfilter fortishield exec disk scan [ref_int] Restart for AC daemon
Run a disk check operation fortiextender-daemon
servers Displays FortiShield server list.
Format the specified partitions or disks
diag debug appl spamfilter 255 Debugger for spamfilter exec disk format [ref_int] and then reboots the system if a reboot is
Modem
required
diag sys modem detect Detect attached modem
exec formatlogdisk Formatting the log disk, reboot included
Webfilter diag debug appl modemd 3 Debugger for modem commands
diag webfilter fortiguard
Statistics of FortiGuard requests
statistics list
diag test appl urlfilter 1 Lists webfilter test commands
Hardware Acceleration Miscellaneous
Disable session offloading per firewall
set auto-asic-offload disable Traffic Shaper
policy
Authentication set npu-offload disable Disable VPN offloading per Phase 1
diag firewall shaper traffic-
shaper list / stats Traffic shaper list / statistics

Authentication diag firewall shaper per-ip-


shaper list / stats Per IP traffic shaper list / statistics
diag firewall auth filter Filter for authentication list Hardware information
diag firewall auth list List of authenticated user diag hardware sysinfo cpu CPU information
diag test authserver diag hardware sysinfo memory Memory size, utilization
High Availability
[auth-protocol] [server-object] Authentication test execute ha manage [index] Jump to cluster member
[user] [password] Conserve Mode details: “Mem”: Memory /
diag hardware sysinfo conserve
“FD”: File descriptor get sys ha status Information about current HA status
diag debug appl auth -1 Debugging of local authentication protocol
Hardware test (available only on newer diag sys ha dump-by vcluster Show cluster member uptime
diag hardware test suite all
diag debug appl fnbamd -1 Debugging of Remote authentication models) diag sys ha reset-uptime Reset cluster member uptime
protocol
get hardware nic [port] Physical interface information
Show config checksums of all cluster
diag sys ha checksum cluster
get system interface physical/ Signal information for Copper or SFP/SFP+ member
FSSO transceiver interfaces exec sys ha checksum recalculate Recalculation of config checksums
diag debug authd fsso filter Filter for FSSO user list. diag debug appl hatalk -1
Debugging of HA-Talk/-Sync protocols
diag debug authd fsso list List of FSSO authenticated user diag debug appl hasync -1
HQIP hardware check
diag debug authd fsso exec ha ignore-hardware-revision
List of FSSO collector agents Download Hardware Quick Inspection Set ignore status for different HW revisions
server-status https://support.fortinet.com status/enable/disable
Package (HQIP) Images to scan hardware
àDownload à HQIP
diag debug fsso-polling … Info for clientless polling FSSO for possible faults
diag debug appl fssod -1 Debugging of clientless polling FSSO VDOMs
Wireless, FortiExtender, Modem sudo {global|vdom-name}
{diagnose|execute|show|get}
Sudo-command to access global / VDOM
settings directly
Explicit Proxy Wireless Controller
diag wad user list/clear List / clear of explicit proxy user exec wireless-controller
restart-acd
Restart wireless controller daemon FortiToken
diag wad filter
diag wad session list Filtering / listing of web proxy sessions exec wireless-controller diag fortitoken info Current FortiToken status
Restart FortiAPs
reset-wtp exec fortitoken activate [Forti-
diag test appl wad 112 Enables output of subsequent commands Manual FortiToken activation
TokenSN]
diag test appl wad 2200 Maximum number of users diag deb appl forticldd 255 FortiToken activation debugging
diag test appl wad 110 Current proxy user Access Point
exec fortitoken-mobile import
cfg –a ADDR_MODE=DHCP|STATIC Change IP from DHCP to static on FortiAP 0000-0000-0000-0000 Recover Trial FortiToken
diag test appl wad 104 DNS statistics for explicit proxy
cfg –a AP_IPADDR=”xxx.xxx.xxx.
Set static IP on FortiAP
xx”
VPN cfg –a AP_NET-
Logging
Set subnet mask on FortiAP diag log test
IPSEC VPN MASK=”255.255.255.0” Generates dummy log messages

diag debug appl ike 63 cfg –a IPGW=”yyy.yyy.yyy.yyy” Set gateway on FortiAP


Debugging of IKE negotiation
cfg –a AC_IPADDR_1=”zzz.zzz. Specify IP of Wireless Controller
diag vpn ike log filter Filter for IKE negotiation output
zzz.zzz” on FortiAP
diag vpn ike gateway list Phase 1 state
cfg –c Save config on FortiAP
diag vpn tunnel list Phase 2 state
cfg –s List config on FortiAP
diag vpn ike gateway flush Delete Phase 1
cfg -x Reset to factory default
diag vpn tunnel flush Delete Phase 2
Report errors, suggestions or comments to info@boll.ch

You might also like