config system global
Use this command to manage system settings.
Before you begin:
- You must have read-write permission for system settings.
Syntax
config system global
set admin-idle-timeout <integer>
set admin-lockout-duration <integer>
set admin-lockout-threshold <integer>
set advanced-bot-status {enable|disable}
set config-sync {enable|disable}
set default-certificate <certname>
set hardware-ssl {enable|disable}
set hostname <string>
set language {english|chinese-simplified}
set port-http <integer>
set port-https <integer>
set port-ssh <integer>
set port-telnet <integer>
set share-ip-address {enable|disable}
set snat-match-local-traffics {enable|disable}
set ipvs-fullnat-min-port <integer>
set ipvs-fullnat-max-port <integer>
set snat-min-port <integer>
set snat-max-port <integer>
set socket-min-port <integer>
set socket-max-port <integer>
set ssh-cbc-cipher {enable|disable}
set ssh-hmac-md5 {enable|disable}
set vdom-admin {enable|disable}
set vdom-mode {independent-network|share-network}
set admin-bypass-vdom-check {enable|disable}
set pre-login-banner {enable|disable}
set sync-slb-statistics {enable|disable}
set shell-access {enable|disable}
set shell-username <username>
set shell-password <password>
set shell-timeout <integer>
set threat-analytics {enable|disable}
set owasp-compliance {enable|disable}
set fds-statistics {enable|disable}
set fds-statistics-period <integer>
set lldp-reception {enable|disable}
set lldp-transmission {enable|disable}
set private-data-encryption {enable|disable}
set default-admin {enable|disable}
set sip-to-same-sock {enable|disable}
set waf-staging-signature {enable|disable}
end
|
admin-idle-timeout |
Log out an idle administrator session. The default is 30 minutes. |
|
admin-lockout-duration |
Amount of time in seconds that an administrator account is locked out after reaching the admin-lockout-threshold for repeated failed login attempts. The default is 60 seconds. The valid range is 1 to 2147483647 seconds. |
|
admin-lockout-threshold |
Number of failed login attempts before an administrator account is locked out for the admin-lockout-duration. The default is 3. The valid range is 1 to 10. It is recommended to keep the number of allowable attempts lower as increasing the number of retry attempts elevates the risk of unauthorized individuals successfully guessing the password. |
|
advanced-bot-status |
Enable/disable the Advanced Bot Protection Fabric Connector. Once enabled and successfully connected, the If you want to disable the Advanced Bot Protection connector, the following settings will be impacted:
For more information, see the Handbook topic about Advanced Bot Protection. |
|
config-sync |
Enable/disable the configuration synchronization feature. This feature is related to the execute config-sync command, not HA synchronization. Disabled by default. |
|
default-certificate |
The default is Factory. |
|
hardware-ssl |
Enable/disable hardware SSL acceleration. The setting has no effect on FortiADC-VM. |
|
hostname |
You can configure a hostname to facilitate system management. If you use SNMP, for example, the SNMP system name is derived from the configured hostname. The hostname can be up to 35 characters in length. It can include US-ASCII letters, numbers, hyphens, and underscores, but not spaces and special characters. The System Information widget and the |
|
language |
English or Simplified Chinese. |
|
port-http |
Specify the port for the HTTP service. Usually, HTTP uses port 80. |
|
port-https |
Specify the port for the HTTPS service. Usually, HTTPS uses port 443. |
|
port-ssh |
Specify the port for the SSH service. Usually, SSH uses port 22. |
|
port-telnet |
Specify the port for the Telnet service. Usually, Telnet uses port 25. |
|
share-ip-address |
Enable this option to share NAT IP pools/addresses between L4, L7 virtual servers, and SNAT policy. Once enabled, SNAT across the firewall, L4 VS and L7 VS can use the same IP address, but with different port ranges that can be customized. |
|
snat-match-local-traffics |
If share-ip-address is enabled, snat-match-local-traffics becomes configurable. Enable/disable the SNAT rule to match with the local traffic. |
|
ipvs-fullnat-min-port |
If share-ip-address is enabled, ipvs-fullnat-min-port becomes configurable. Specify the L4 VS FULLNAT port range minimum. |
|
ipvs-fullnat-max-port |
If share-ip-address is enabled, ipvs-fullnat-max-port becomes configurable. Specify the L4 VS FULLNAT port range maximum. |
|
snat-min-port |
If share-ip-address is enabled, snat-min-port becomes configurable. Specify the SNAT port range minimum. |
|
snat-max-port |
If share-ip-address is enabled, snat-max-port becomes configurable. Specify the SNAT port rang maximum. |
|
socket-min-port |
If share-ip-address is enabled, socket-min-port becomes configurable. Specify the L7 VS port range minimum. |
|
socket-max-port |
If share-ip-address is enabled, socket-max-port becomes configurable. Specify the L7 VS port range maximum. |
|
ssh-cbc-cipher |
Disabled by default. Enable if you want to use this cipher. |
|
ssh-hmac-md5 |
Disabled by default. Enable if you want to use this cipher. |
|
vdom-admin |
Enables the virtual domain feature. |
|
vdom-mode |
The vdom-mode option becomes available if vdom-admin is enabled. Select either of the following virtual domain modes:
|
|
admin-bypass-vdom-check |
The admin-bypass-vdom-check option is available if vdom-admin is enabled and the vdom-mode is independent-network. Once enabled, all non-root VDOM administrators can login through the root VDOM interface without needing root VDOM privileges. From the root VDOM interface, the non-root VDOM administrator can access and modify the settings relating to their designated non-root VDOM. This is disabled by default. Note: When the Admin Bypass VDOM Check is enabled, admin event logs are recorded solely under the root VDOM, regardless of the VDOM assigned to the user. This is due to the way the log API handles event logging, allowing event logging for only one VDOM at a time. |
|
pre-login-banner |
Enables the pre-login banner feature. |
|
sync-slb-statistics |
Enable/disable the statistic data between the SLB and GLB. |
|
shell-access |
Enable/disable the shell access. This is disabled by default. |
|
shell-username |
Specify the username to login to the shell. |
|
shell-password |
Specify the password to access the shell. |
|
shell-timeout |
The expire time, in minutes, after the shell access is enabled. (Range: 1-1200 minutes). |
|
threat-analytics |
Enable/disable the Threat Analytics connector. If you do not already have a license for the Fortinet AI Threat Analytic service, FortiADC offers a 14-day Evaluation license to evaluate the Fortinet AI Threat Analytics service. During this 14-day trial period, you can disable and re-enable AI Threat Analytics anytime. The 14-day trial period starts from the first time AI Threat Analytics is enabled. For more information about the AI Threat Analytics integration with FortiADC, see the FortiADC Handbook topic on AI Threat Analytics. |
|
owasp-compliance |
Enable OWASP Top10 Compliance to view the security compliance rate for each SLB virtual server in FortiView. This is disabled by default. |
|
fds-statistics |
Enable or disable FortiADC detection statistics upload to FortiGuard. This is enabled by default. |
|
fds-statistics-period |
Specify the FortiGuard statistics collection period in minutes. The default value is 60 minutes, and the valid range is 1-1440 minutes. |
|
lldp-reception |
Controls whether Link Layer Discovery Protocol (LLDP) packet reception is globally enabled or disabled across all VDOMs. Select from the following options:
Global LLDP packet reception is disabled by default. |
|
lldp-transmission |
Controls whether Link Layer Discovery Protocol (LLDP) packet transmission is globally enabled or disabled across all VDOMs. Select from the following options:
Global LLDP packet transmission is disabled by default. |
|
private-data-encryption |
Trusted Platform Module (TPM) secures passwords and cryptographic keys by storing and authenticating them using AES-128-CBC encryption. This feature ensures that private data is encrypted when displayed in the CLI and saved in configuration files, reducing the risk of data tampering or interception. This setting controls whether FortiADC uses TPM-backed encryption for private data.
A new encryption key is generated only when disabling and re-enabling the setting. Reboots and upgrades do not trigger key regeneration. In HA setups, configuration must be applied to the primary node in HA-AP and HA-AA setups; The configuration is then synchronized to the peer nodes. No restriction for HA-VRRP. TPM-based encrypted key storage is available on the following FortiADC hardware models: 220F, 320F, 420F, 1200F, 2200F, 4200F. To verify the private encryption key, use |
|
default-admin |
Enable or disable the built-in admin account.
By default, the admin account remains enabled. Disabling it requires another global administrator, ensuring that at least one administrator retains unrestricted control of the system. The admin account cannot disable itself, and enabling or disabling must be performed through the CLI. The GUI displays the current status of the account but does not provide configuration controls for this option. |
|
sip-to-same-sock |
Control how sessions with the same source IP, destination IP, and destination port (
|
|
waf-staging-signature |
Enable or disable WAF Signature Staging. Before you can start using signature staging to review new FortiGuard updates, the feature must first be enabled. By default, WAF Signature Staging is disabled, so new or updated FortiGuard signatures are applied automatically without entering a staging phase. Enabling the feature ensures that each new or modified signature is first added to the staging list for observation and manual review before activation. After you apply the change, FortiADC populates the WAF Signature Staging list with all signatures from the currently installed WAF signature database. |
Example
FortiADC-VM # get system global
default-certificate : Factory
hostname : FortiADC-VM
vdom-admin : disable
admin-idle-timeout : 480
admin-lockout-duration : 60
admin-lockout-threshold : 3
port-http : 80
port-https : 443
port-ssh : 22
port-telnet : 23
share-ip-address : enable
snat-match-local-traffics : enable
ipvs-fullnat-min-port : 5000
ipvs-fullnat-max-port : 21846
snat-min-port : 21847
snat-max-port : 43690
socket-min-port : 43691
socket-max-port : 65535
language : english
hardware-ssl : enable
gui-system : enable
gui-router : enable
gui-log : enable
ssh-cbc-cipher : disable
ssh-hmac-md5 : disable
config-sync-enable : disable
pre-login-banner : enable
sync-slb-statistics : enable
shell-access : enable
shell-username : user
shell-password : 123456
shell-expire-time : 10
threat-analytics : enable
owasp-compliance : enable
fds-statistics : enable
fds-statistics-period : 60
lldp-reception : disable
lldp-transmission : disable
private-data-encryption : enable
default-admin : enable
sip-to-same-sock : enable
waf-staging-signature : enable