By Manny Fernandez

December 12, 2017

Fortigate CLI Tips and Tricks

I am a CLI guy. Make no mistake, I like the GUI but at the end of the day, I am a CLI Jockey and love the “ugly black screen”. To that end, I wanted to throw some short cuts together and post them on this blog.

GREP
Grep is a Unix command introduced years ago by Ken Thompson, in Unix 4. It is extremely useful from a BASH perspective to search for keyword(s) in multiple files or standard output. FortiOS is not different. When looking for a particular output, rather than showing the entire config, you can use ‘grep’ to limit the output. Below are some examples. The best way to test is to play with your config.

In the above example, I am searching the entire config for any entry of ‘Albania’. I use the ‘-f’ which will show the configuration location as well as the output I requested. You can see that it shows the ‘config firewall address’ as well as the ‘config firewall addrgrp’. As you can see it also shows me the output which is great for when you want to edit some setting and do not know if it is ‘config system’ or ‘config firewall’ as an example.

Sometimes, you may be looking for a particular MAC address in an ARP table. In the Cisco world (see below), the command is ‘sh ip arp | i 10.1.1.1’ as an example. This will search the ARP table for an entry that matches 10.1.1.1.

In the Fortigate example above, we can see that we searched the ‘arp list’ by issuing the ‘diag ip arp likst | grep 1.1.16.34’ and ‘1.1.16.36’ respectively. We can limit the output to only those IP addresses instead of showing the hundreds of MAC addresses in my system.

COLOR IN THE GUI
I am an O’G Checkpoint Guy. I used to deploy on AIX and Windows. The one thing I have always like about Checkpoint is the color on the objects. I think it keeps things looking clean. However the Fortigate does NOT come with this feature enabled. To enable it, head over to the cli and type:

config system settings
set gui-object-colors enable
end

This will give you and additional option when creating an object:

 

PING with Benefits 🙂
When you ping from a Fortigate device, hell any device that has multuiple interfaces, by default the ping will source from the nearest interface to the destination. As an example, you have a router with the ‘inside’ interface with a 10.1.1.1 and the ‘outside’ interface with a ’12.34.22.122’ and there is a default gateway of ’12.34.22.121’. In the absence of any other static route, if you tried to ping 4.2.2.2 from the device, it would source the ping from the ’12.34.22.122’.

On the Fortigate, if you want to source it from another interface instead of the ‘default’ interface chosen by the OS as part of the stack, following these commands:

Here, we are looking to see what settings have been selected for a ‘policy based ping’. We can see that:
5 packets will be sent
The size will be 56bytes
Timeout value is 2

You can follow up these commands with:

execute ping-options source 1.1.20.225

Here we can see that we will now source the pings from the ‘1.1.20.225’ interface.

Then follow it with your standard ‘execute ping 4.2.2.2′

What is my MAC address?

Sometimes, you need to identify your MAC address for your firewall. For instance, your perimeter router does not seem to pass any traffic to the Fortigate’s WAN1 interface. You can do a ‘sh ip arp | i 12.1.1.1’ and validate that your MAC address is being learned correctly.

To do this on the Fortigate, you can issue the following command:

get hardware nic wan1

Auto Revision Control (Credit to Eric Hastings from Fortinet)

config system global 
set revision-backup-on-logout enable 
end

If you are not connected to a FortiManager, you can run the above command and every time you log out, the Fortigate will back a backup of the configuration. You can then rollback to an older version and you can perform a ‘diff’ to see the changes. In my example, I renamed a policy from ‘FortiMail’ to ‘FortiMail Outbound’

Above, you can see that I have two backups and they were based on ‘Automatic Backup (logout)’. Now we will go a step further. By selecting both files, and right clicking:

You will have an option to either delete, Diff, or Save (By selecting a single one, the grayed out ‘details’ and ‘revert’ will become available to you.

Here we can see that the (1) Green entry WAS FortiMail and now it is “FortiMail Outbound’ (2).

NOTE: If you are using FortiManager, you will NOT see them in FortiGate.

Discards and NIC Errors

By issuing the following command ‘ fnsysctl ifconfig’ command followed by an interface name, you will get information about the NIC on the Fortigate.

 

Leave a comment

Your email address will not be published. Required fields are marked *

Recent posts

  • There are many options when troubleshooting in FortiGate firewalls. ... Full Story

  • Have you ever had an IPS signature that continues... Full Story

  • Use case:  Customer has a Split Tunnel Enabled but... Full Story