fortinet.fortios.fortios_system_global – Configure global attributes in Fortinet’s FortiOS and FortiGate.
Note
This plugin is part of the fortinet.fortios collection (version 2.1.3).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install fortinet.fortios
.
To use it in a playbook, specify: fortinet.fortios.fortios_system_global
.
New in version 2.10: of fortinet.fortios
Synopsis
This module is able to configure a FortiGate or FortiOS (FOS) device by allowing the user to set and modify system feature and global category. Examples include all parameters and values need to be adjusted to datasources before usage. Tested with FOS v6.0.0
Requirements
The below requirements are needed on the host that executes this module.
ansible>=2.9.0
Parameters
Parameter |
Comments |
---|---|
Token-based authentication. Generated from GUI of Fortigate. |
|
Enable/Disable logging for task. Choices:
|
|
Member attribute path to operate on. Delimited by a slash character if there are more than one attribute. Parameter marked with member_path is legitimate for doing member operation. |
|
Add or delete a member under specified attribute path. When member_state is specified, the state option is ignored. Choices:
|
|
Configure global attributes. |
|
Enable/disable concurrent administrator logins. (Use policy-auth-concurrent for firewall authenticated users.) Choices:
|
|
Console login timeout that overrides the admintimeout value. (15 - 300 seconds) (15 seconds to 5 minutes). 0 the default, disables this timeout. |
|
Enable/disable FortiCloud admin login via SSO. Choices:
|
|
HTTPS Strict-Transport-Security header max-age in seconds. A value of 0 will reset any HSTS records in the browser.When admin-https-redirect is disabled the header max-age will be 0. |
|
Enable/disable admin login method. Enable to force administrators to provide a valid certificate to log in if PKI is enabled. Disable to allow administrators to log in with a certificate or password. Choices:
|
|
Enable/disable redirection of HTTP administration access to HTTPS. Choices:
|
|
Allowed TLS versions for web administration. Choices:
|
|
Amount of time in seconds that an administrator account is locked out after reaching the admin-lockout-threshold for repeated failed login attempts. |
|
Number of failed login attempts before an administrator account is locked out for the admin-lockout-duration. |
|
Maximum number of administrators who can be logged in at the same time (1 - 100) |
|
Enable/disable maintainer administrator login. When enabled, the maintainer account can be used to log in from the console after a hard reboot. The password is “bcpb” followed by the FortiGate unit serial number. You have limited time to complete this login. Choices:
|
|
Administrative access port for HTTP. (1 - 65535). |
|
Enable/disable local admin authentication restriction when remote authenticator is up and running. Choices:
|
|
Enable/disable using SCP to download the system configuration. You can use SCP as an alternative method for backing up the configuration. Choices:
|
|
Server certificate that the FortiGate uses for HTTPS administrative connections. Source certificate.local.name. |
|
Administrative access port for HTTPS. (1 - 65535). |
|
Maximum time in seconds permitted between making an SSH connection to the FortiGate unit and authenticating (10 - 3600 sec (1 hour)). |
|
Enable/disable password authentication for SSH admin access. Choices:
|
|
Administrative access port for SSH. (1 - 65535). |
|
Enable/disable SSH v1 compatibility. Choices:
|
|
Enable/disable TELNET service. Choices:
|
|
Administrative access port for TELNET. (1 - 65535). |
|
Number of minutes before an idle administrator session times out (5 - 480 minutes (8 hours)). A shorter idle timeout is more secure. |
|
Alias for your FortiGate unit. |
|
Disable to allow traffic to be routed back on a different interface. Choices:
|
|
Level of checking for packet replay and TCP sequence checking. Choices:
|
|
Maximum number of dynamically learned MAC addresses that can be added to the ARP table (131072 - 2147483647). |
|
Enable/disable asymmetric route. Choices:
|
|
Server certificate that the FortiGate uses for HTTPS firewall authentication connections. Source certificate.local.name. |
|
User authentication HTTP port. (1 - 65535). |
|
User authentication HTTPS port. (1 - 65535). |
|
Enable to prevent user authentication sessions from timing out when idle. Choices:
|
|
Action to take when the number of allowed user authenticated sessions is reached. Choices:
|
|
Enable/disable automatic authorization of dedicated Fortinet extension devices. Choices:
|
|
Enable/disable automatic log partition check after ungraceful shutdown. Choices:
|
|
Affinity setting for AV scanning (hexadecimal value up to 256 bits in the format of xxxxxxxxxxxxxxxx). |
|
Set the action to take if the FortiGate is running low on memory or the proxy connection limit has been reached. Choices:
|
|
When enabled and a proxy for a protocol runs out of room in its session table, that protocol goes into failopen mode and enacts the action specified by av-failopen. Choices:
|
|
Enable/disable batch mode, allowing you to enter a series of CLI commands that will execute as a group once they are loaded. Choices:
|
|
Duration in seconds for blocked sessions (1 - 300 sec (5 minutes)). |
|
Maximum number of bridge forwarding database (FDB) entries. |
|
Maximum number of certificates that can be traversed in a certificate chain. |
|
Time-out for reverting to the last saved configuration. |
|
Configuration file save mode for CLI changes. Choices:
|
|
Level of checking performed on protocol headers. Strict checking is more thorough but may affect performance. Loose checking is ok in most cases. Choices:
|
|
Configure ICMP error message verification. You can either apply strict RST range checking or disable it. Choices:
|
|
Enable/disable CLI audit log. Choices:
|
|
Enable/disable all cloud communication. Choices:
|
|
Enable/disable requiring administrators to have a client certificate to log into the GUI using HTTPS. Choices:
|
|
Affinity setting for cmdbsvr (hexadecimal value up to 256 bits in the format of xxxxxxxxxxxxxxxx). |
|
Enable/disable global PCI DSS compliance check. Choices:
|
|
Time of day to run scheduled PCI DSS compliance checks. |
|
Threshold at which CPU usage is reported. (% of total CPU). |
|
Enable/disable the CA attribute in certificates. Some CA servers reject CSRs that have the CA attribute. Choices:
|
|
Enable/disable daily restart of FortiGate unit. Use the restart-time option to set the time of day for the restart. Choices:
|
|
Default service source port range. |
|
Number of seconds to passively scan a device before performing an active scan. (20 - 3600 sec, (20 sec to 1 hour)). |
|
Time in seconds that a device must be idle to automatically log the device user out. (30 - 31536000 sec (30 sec to 1 year)). |
|
Number of bits to use in the Diffie-Hellman exchange for HTTPS/SSH protocols. Choices:
|
|
DNS proxy worker count. |
|
Enable/disable daylight saving time. Choices:
|
|
Enable/disable edit new VDOM prompt. Choices:
|
|
Enable/disable access to the FortiGuard network for non-compliant endpoints. Choices:
|
|
Endpoint control portal port (1 - 65535). |
|
Fail-time for server lost. |
|
Maximum disk buffer size to temporarily store logs destined for FortiAnalyzer. To be used in the event that FortiAnalyzer is unavailalble. |
|
Enable/disable sending IPS, Application Control, and AntiVirus data to FortiGuard. This data is used to improve FortiGuard services and is not shared with external parties and is protected by Fortinet”s privacy policy. Choices:
|
|
FortiGuard statistics collection period in minutes. (1 - 1440 min (1 min to 24 hours)). |
|
Local UDP port for Forward Error Correction (49152 - 65535). |
|
Type of alert to retrieve from FortiGuard. Choices:
|
|
Enable/disable FortiExtender. Choices:
|
|
FortiExtender data port (1024 - 49150). |
|
Enable/disable FortiExtender VLAN mode. Choices:
|
|
Enable/disable integration with the FortiIPAM cloud service. Choices:
|
|
FortiService port (1 - 65535). Used by FortiClient endpoint compliance. Older versions of FortiClient used a different port. |
|
Enable/disable FortiToken Cloud service. Choices:
|
|
Enable/disable the GUI warning about using a default hostname Choices:
|
|
Enable/disable the System > Certificate GUI page, allowing you to add and configure certificates from the GUI. Choices:
|
|
Enable/disable custom languages in GUI. Choices:
|
|
Default date format used throughout GUI. Choices:
|
|
Source from which the FortiGate GUI uses to display date and time entries. Choices:
|
|
Add the latitude of the location of this FortiGate to position it on the Threat Map. |
|
Add the longitude of the location of this FortiGate to position it on the Threat Map. |
|
Enable/disable displaying the FortiGate”s hostname on the GUI login page. Choices:
|
|
Enable/disable the firmware upgrade warning on the GUI. Choices:
|
|
Enable/disable the FortiCare registration setup warning on the GUI. Choices:
|
|
Enable/disable displaying FortiGate Cloud Sandbox on the GUI. Choices:
|
|
Enable/disable displaying FortiSandbox Cloud on the GUI. Choices:
|
|
Enable/disable IPv6 settings on the GUI. Choices:
|
|
Number of lines to display per page for web administration. |
|
Enable/disable Local-out traffic on the GUI. Choices:
|
|
Enable/disable replacement message groups on the GUI. Choices:
|
|
Enable/disable REST API result caching on FortiGate. Choices:
|
|
Color scheme for the administration GUI. Choices:
|
|
Enable/disable wireless open security option on the GUI. Choices:
|
|
Affinity setting for HA daemons (hexadecimal value up to 256 bits in the format of xxxxxxxxxxxxxxxx). |
|
Enable/disable honoring of Don”t-Fragment (DF) flag. Choices:
|
|
FortiGate unit”s hostname. Most models will truncate names longer than 24 characters. Some models support hostnames up to 35 characters. |
|
Maximum number of IGMP memberships (96 - 64000). |
|
Dead gateway detection interval. |
|
IP source port range used for traffic originating from the FortiGate unit. |
|
Affinity setting for IPS (hexadecimal value up to 256 bits in the format of xxxxxxxxxxxxxxxx; allowed CPUs must be less than total number of IPS engine daemons). |
|
Enable/disable ASIC offloading (hardware acceleration) for IPsec VPN traffic. Hardware acceleration can offload IPsec VPN sessions and accelerate encryption and decryption. Choices:
|
|
ESP jump ahead rate (1G - 10G pps equivalent). |
|
Enable/disable offloading (hardware acceleration) of HMAC processing for IPsec VPN. Choices:
|
|
Enable/disable software decryption asynchronization (using multiple CPUs to do decryption) for IPsec VPN traffic. Choices:
|
|
Enable/disable acceptance of IPv6 Duplicate Address Detection (DAD). |
|
Enable/disable IPv6 address probe through Anycast. Choices:
|
|
Disable to prevent IPv6 traffic with same local ingress and egress interface from being forwarded without policy check. Choices:
|
|
Configure CPU IRQ time accounting mode. Choices:
|
|
GUI display language. Choices:
|
|
Global timeout for connections with remote LDAP servers in milliseconds (1 - 300000). |
|
Enable/disable Link Layer Discovery Protocol (LLDP) reception. Choices:
|
|
Enable/disable Link Layer Discovery Protocol (LLDP) transmission. Choices:
|
|
Enable/disable logging of SSL connection events. Choices:
|
|
Whether UUIDs are added to traffic logs. You can disable UUIDs, add firewall policy UUIDs to traffic logs, or add all UUIDs to traffic logs. Choices:
|
|
Enable/disable insertion of address UUIDs to traffic logs. Choices:
|
|
Enable/disable insertion of policy UUIDs to traffic logs. Choices:
|
|
Enable/disable login time recording. Choices:
|
|
Enable/disable long VDOM name support. Choices:
|
|
Management IP address of this FortiGate. Used to log into this FortiGate from another FortiGate in the Security Fabric. |
|
Overriding port for management connection (Overrides admin port). |
|
Enable/disable use of the admin-sport setting for the management port. If disabled, FortiGate will allow user to specify management-port. Choices:
|
|
Management virtual domain name. Source system.vdom.name. |
|
Maximum DLP stat memory (0 - 4294967295). |
|
Maximum number of IP route cache entries (0 - 2147483647). |
|
Enable/disable no modification of multicast TTL. Choices:
|
|
Threshold at which memory usage is considered extreme (new sessions are dropped) (% of total RAM). |
|
Threshold at which memory usage forces the FortiGate to exit conserve mode (% of total RAM). |
|
Threshold at which memory usage forces the FortiGate to enter conserve mode (% of total RAM). |
|
Affinity setting for logging (64-bit hexadecimal value in the format of xxxxxxxxxxxxxxxx). |
|
Number of logging (miglogd) processes to be allowed to run. Higher number can reduce performance; lower number can slow log processing time. No logs will be dropped or lost if the number is changed. |
|
Enforce all login methods to require an additional authentication factor . Choices:
|
|
Enable/disable multicast forwarding. Choices:
|
|
Maximum number of NDP table entries (set to 65,536 or higher; if set to 0, kernel holds 65,536 entries). |
|
Enable/disable per-user block/allow list filter. Choices:
|
|
Enable/disable per-user black/white list filter. Choices:
|
|
Enable/disable path MTU discovery. Choices:
|
|
Number of concurrent firewall use logins from the same user (1 - 100). |
|
Enable/disable displaying the administrator access disclaimer message after an administrator successfully logs in. Choices:
|
|
Enable/disable displaying the administrator access disclaimer message on the login page before an administrator logs in. Choices:
|
|
Enable/disable private data encryption using an AES 128-bit key. Choices:
|
|
Enable/disable authenticated users lifetime control. This is a cap on the total time a proxy user can be authenticated for after which re-authentication will take place. Choices:
|
|
Lifetime timeout in minutes for authenticated users (5 - 65535 min). |
|
Authentication timeout in minutes for authenticated users (1 - 300 min). |
|
Enable/disable using content processor (CP8 or CP9) hardware acceleration to encrypt and decrypt IPsec and SSL traffic. Choices:
|
|
Enable/disable email proxy hardware acceleration. Choices:
|
|
Enable/disable using the content processor to accelerate KXP traffic. Choices:
|
|
Control if users must re-authenticate after a session is closed, traffic has been idle, or from the point at which the user was first created. Choices:
|
|
Enable/disable use of the maximum memory usage on the FortiGate unit”s proxy processing of resources, such as block lists, allow lists, and external resources. Choices:
|
|
Proxy worker count. |
|
RADIUS service port number. |
|
Enable/disable reboot of system upon restoring configuration. Choices:
|
|
Statistics refresh interval in GUI. |
|
Number of seconds that the FortiGate waits for responses from remote RADIUS, LDAP, or TACACS+ authentication servers. (0-300 sec). |
|
Action to perform if the FortiGate receives a TCP packet but cannot find a corresponding session in its session table. NAT/Route mode only. Choices:
|
|
Daily restart time (hh:mm). |
|
Enable/disable back-up of the latest configuration revision when an administrator logs out of the CLI or GUI. Choices:
|
|
Enable/disable back-up of the latest configuration revision after the firmware is upgraded. Choices:
|
|
Number of scanunits. The range and the default depend on the number of CPUs. Only available on FortiGate units with multiple CPUs. |
|
Enable/disable the submission of Security Rating results to FortiGuard. Choices:
|
|
Enable/disable scheduled runs of Security Rating. Choices:
|
|
Enable/disable sending of path maximum transmission unit (PMTU) - ICMP destination unreachable packet and to support PMTUD protocol on your network to reduce fragmentation of packets. Choices:
|
|
Enable/disable the ability to change the static NAT route. Choices:
|
|
Enable/disable IPS detection of HIBUN format files when using Data Leak Protection. Choices:
|
|
Enable/disable speed test server. Choices:
|
|
Split port(s) to multiple 10Gbps ports. |
|
Date within a month to run ssd trim. |
|
How often to run SSD Trim . SSD Trim prevents SSD drive data loss by finding and isolating errors. Choices:
|
|
Hour of the day on which to run SSD Trim (0 - 23). |
|
Minute of the hour on which to run SSD Trim (0 - 59, 60 for random). |
|
Day of week to run SSD Trim. Choices:
|
|
Enable/disable CBC cipher for SSH access. Choices:
|
|
Enable/disable HMAC-MD5 for SSH access. Choices:
|
|
Enable/disable SHA1 key exchange for SSH access. Choices:
|
|
Enable/disable HMAC-SHA1 and UMAC-64-ETM for SSH access. Choices:
|
|
Minimum supported protocol version for SSL/TLS connections . Choices:
|
|
Enable/disable static key ciphers in SSL/TLS connections (e.g. AES128-SHA, AES256-SHA, AES128-SHA256, AES256-SHA256). Choices:
|
|
Enable/disable SSL VPN hardware acceleration. Choices:
|
|
Enable/disable verification of EMS serial number in SSL-VPN connection. Choices:
|
|
Enable/disable SSL VPN KXP hardware acceleration. Choices:
|
|
Maximum number of SSL VPN processes. Upper limit for this value is the number of CPUs and depends on the model. |
|
Enable/disable checking browser”s plugin version by SSL VPN. Choices:
|
|
Enable to check the session against the original policy when revalidating. This can prevent dropping of redirected sessions when web-filtering and authentication are enabled together. If this option is enabled, the FortiGate unit deletes a session if a routing or policy change causes the session to no longer match the policy that originally allowed the session. Choices:
|
|
Enable to use strong encryption and only allow strong ciphers (AES, 3DES) and digest (SHA1) for HTTPS/SSH/TLS/SSL functions. Choices:
|
|
Enable/disable switch controller feature. Switch controller allows you to manage FortiSwitch from the FortiGate itself. Choices:
|
|
Enable reserved network subnet for controlled switches. This is available when the switch controller is enabled. |
|
Time in minutes between updates of performance statistics logging. (1 - 15 min). |
|
Number of seconds the FortiGate unit should wait to close a session after one peer has sent a FIN packet but the other has not responded (1 - 86400 sec (1 day)). |
|
Number of seconds the FortiGate unit should wait to close a session after one peer has sent an open session packet but the other has not responded (1 - 86400 sec (1 day)). |
|
Enable SACK, timestamp and MSS TCP options. Choices:
|
|
Length of the TCP CLOSE state in seconds (5 - 300 sec). |
|
Length of the TCP TIME-WAIT state in seconds. |
|
Enable/disable TFTP. Choices:
|
|
Number corresponding to your time zone from 00 to 86. Enter set timezone ? to view the list of time zones and the numbers that represent them. Choices:
|
|
Enable/disable skip policy check and allow multicast through. Choices:
|
|
Choose Type of Service (ToS) or Differentiated Services Code Point (DSCP) for traffic prioritization in traffic shaping. Choices:
|
|
Default system-wide level of priority for traffic prioritization. Choices:
|
|
Email-based two-factor authentication session timeout (30 - 300 seconds (5 minutes)). |
|
FortiAuthenticator token authentication session timeout (10 - 3600 seconds (1 hour)). |
|
FortiToken authentication session timeout (60 - 600 sec (10 minutes)). |
|
FortiToken Mobile session timeout (1 - 168 hours (7 days)). |
|
SMS-based two-factor authentication session timeout (30 - 300 sec). |
|
UDP connection session timeout. This command can be useful in managing CPU and memory resources (1 - 86400 seconds (1 day)). |
|
URL filter CPU affinity. |
|
URL filter daemon count. |
|
Maximum number of devices allowed in user device store. |
|
Maximum number of users allowed in user device store. |
|
Certificate to use for https user authentication. Source certificate.local.name. |
|
Enable/disable support for multiple virtual domains (VDOMs). Choices:
|
|
Enable/disable support for split/multiple virtual domains (VDOMs). Choices:
|
|
Controls the number of ARPs that the FortiGate sends for a Virtual IP (VIP) address range. Choices:
|
|
Maximum number of virtual server processes to create. The maximum is the number of CPU cores. This is not available on single-core CPUs. |
|
Enable/disable virtual server hardware acceleration. Choices:
|
|
Affinity setting for wad (hexadecimal value up to 256 bits in the format of xxxxxxxxxxxxxxxx). |
|
Number of concurrent WAD-cache-service object-cache processes. |
|
Number of concurrent WAD-cache-service byte-cache processes. |
|
Minimum percentage change in system memory usage detected by the wad daemon prior to adjusting TCP window size for any active connection. |
|
Enable/disable dispatching traffic to WAD workers based on source affinity. Choices:
|
|
Number of explicit proxy WAN optimization daemon (WAD) processes. By default WAN optimization, explicit proxy, and web caching is handled by all of the CPU cores in a FortiGate unit. |
|
CA certificate that verifies the WiFi certificate. Source certificate.ca.name. |
|
Certificate to use for WiFi authentication. Source certificate.local.name. |
|
Enable/disable comparability with WiMAX 4G USB devices. Choices:
|
|
Enable/disable the wireless controller feature to use the FortiGate unit to manage FortiAPs. Choices:
|
|
Port used for the control channel in wireless controller mode (wireless-mode is ac). The data channel port is the control channel port number plus one (1024 - 49150). |
|
Virtual domain, among those defined previously. A vdom is a virtual instance of the FortiGate that can be configured and used as a different unit. Default: “root” |
Examples
- collections:
- fortinet.fortios
connection: httpapi
hosts: fortigate01
vars:
ansible_httpapi_port: 443
ansible_httpapi_use_ssl: true
ansible_httpapi_validate_certs: false
vdom: root
tasks:
- name: fortios_system_global
fortios_system_global:
vdom: root
system_global:
admin_concurrent: enable
admin_console_timeout: 300
admin_hsts_max_age: 15552000
admin_https_pki_required: disable
admin_https_redirect: enable
admin_https_ssl_versions: tlsv1-1 tlsv1-2 tlsv1-3
admin_lockout_duration: 60
admin_lockout_threshold: 3
admin_login_max: 100
admin_maintainer: enable
admin_port: 80
admin_restrict_local: disable
admin_scp: disable
admin_server_cert: self-sign
admin_sport: 443
admin_ssh_grace_time: 120
admin_ssh_password: enable
admin_ssh_port: 22
admin_ssh_v1: disable
admin_telnet: enable
admin_telnet_port: 23
admintimeout: 120
alias: FortiGate-500E
allow_traffic_redirect: enable
anti_replay: strict
arp_max_entry: 131072
auth_cert: Fortinet_Factory
auth_http_port: 1000
auth_https_port: 1003
auth_keepalive: disable
auth_session_limit: block-new
auto_auth_extension_device: enable
autorun_log_fsck: disable
av_affinity: '0'
av_failopen: pass
av_failopen_session: disable
batch_cmdb: enable
block_session_timer: 30
br_fdb_max_entry: 8192
cert_chain_max: 8
cfg_revert_timeout: 600
cfg_save: automatic
check_protocol_header: loose
check_reset_range: disable
cli_audit_log: disable
cloud_communication: enable
clt_cert_req: disable
cpu_use_threshold: 90
csr_ca_attribute: enable
daily_restart: disable
default_service_source_port: 1-65535
device_identification_active_scan_delay: 20
device_idle_timeout: 300
dh_params: '2048'
dnsproxy_worker_count: 1
dst: enable
endpoint_control_portal_port: 0
failtime: 5
faz_disk_buffer_size: 0
fds_statistics: enable
fds_statistics_period: 60
fec_port: 50000
fortiextender: enable
fortiextender_data_port: 25246
fortiextender_vlan_mode: disable
fortiipam_integration: enable
fortiservice_port: 8013
fortitoken_cloud: enable
gui_allow_default_hostname: disable
gui_certificates: enable
gui_custom_language: disable
gui_date_format: yyyy/MM/dd
gui_date_time_source: system
gui_display_hostname: disable
gui_firmware_upgrade_warning: enable
gui_forticare_registration_setup_warning: enable
gui_fortigate_cloud_sandbox: disable
gui_ipv6: enable
gui_lines_per_page: 20
gui_theme: green
gui_wireless_opensecurity: disable
honor_df: enable
hostname: terraform-test
igmp_state_limit: 3200
ike_embryonic_limit: 1000
interval: 5
ip_src_port_range: 1024-25000
ips_affinity: '0'
ipsec_asic_offload: enable
ipsec_hmac_offload: enable
ipsec_soft_dec_async: disable
ipv6_accept_dad: 1
ipv6_allow_anycast_probe: disable
ipv6_allow_traffic_redirect: enable
irq_time_accounting: auto
language: english
ldapconntimeout: 500
lldp_reception: disable
lldp_transmission: disable
log_ssl_connection: disable
log_uuid_address: disable
login_timestamp: disable
long_vdom_name: disable
management_vdom: root
max_dlpstat_memory: 0
max_route_cache_size: 0
memory_use_threshold_extreme: 95
memory_use_threshold_green: 82
memory_use_threshold_red: 88
miglog_affinity: '0'
miglogd_children: 0
multi_factor_authentication: optional
ndp_max_entry: 0
policy_auth_concurrent: 0
post_login_banner: disable
pre_login_banner: disable
private_data_encryption: disable
proxy_auth_lifetime: disable
proxy_auth_lifetime_timeout: 480
proxy_auth_timeout: 10
proxy_re_authentication_mode: session
proxy_worker_count: 0
radius_port: 1812
reboot_upon_config_restore: enable
refresh: 0
remoteauthtimeout: 5
reset_sessionless_tcp: disable
restart_time: 00:00
revision_backup_on_logout: disable
revision_image_auto_backup: disable
scanunit_count: 0
security_rating_result_submission: enable
security_rating_run_on_schedule: enable
send_pmtu_icmp: enable
snat_route_change: disable
special_file_23_support: disable
ssd_trim_date: 1
ssd_trim_hour: 0
ssd_trim_min: 0
ssh_cbc_cipher: enable
ssh_hmac_md5: enable
ssh_kex_sha1: enable
ssh_mac_weak: enable
ssl_min_proto_version: TLSv1-2
ssl_static_key_ciphers: enable
sslvpn_cipher_hardware_acceleration: enable
sslvpn_ems_sn_check: disable
sslvpn_kxp_hardware_acceleration: enable
sslvpn_max_worker_count: 0
sslvpn_plugin_version_check: enable
strict_dirty_session_check: enable
strong_crypto: enable
switch_controller: enable
switch_controller_reserved_network: 169.254.0.0 255.255.0.0
sys_perf_log_interval: 5
tcp_halfclose_timer: 120
tcp_halfopen_timer: 10
tcp_option: enable
tcp_timewait_timer: 1
tftp: enable
timezone: '04'
traffic_priority: tos
traffic_priority_level: medium
two_factor_email_expiry: 60
two_factor_fac_expiry: 60
two_factor_ftk_expiry: 60
two_factor_ftm_expiry: 72
two_factor_sms_expiry: 60
udp_idle_timer: 180
url_filter_affinity: '0'
url_filter_count: 1
user_device_store_max_devices: 168273
user_device_store_max_users: 168273
user_server_cert: Fortinet_Factory
vip_arp_range: restricted
virtual_server_count: 0
wad_affinity: '0'
wad_csvc_cs_count: 1
wad_csvc_db_count: 0
wad_memory_change_granularity: 10
wad_source_affinity: enable
wad_worker_count: 0
wifi_ca_certificate: Fortinet_Wifi_CA
wifi_certificate: Fortinet_Wifi
wimax_4g_usb: disable
wireless_controller: enable
wireless_controller_port: 5246
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
Build number of the fortigate image Returned: always Sample: “1547” |
|
Last method used to provision the content into FortiGate Returned: always Sample: “PUT” |
|
Last result given by FortiGate on last operation applied Returned: always Sample: “200” |
|
Master key (id) used in the last call to FortiGate Returned: success Sample: “id” |
|
Name of the table used to fulfill the request Returned: always Sample: “urlfilter” |
|
Path of the table used to fulfill the request Returned: always Sample: “webfilter” |
|
Internal revision number Returned: always Sample: “17.0.2.10658” |
|
Serial number of the unit Returned: always Sample: “FGVMEVYYQT3AB5352” |
|
Indication of the operation’s result Returned: always Sample: “success” |
|
Virtual domain used Returned: always Sample: “root” |
|
Version of the FortiGate Returned: always Sample: “v5.6.3” |
Authors
Link Zheng (@chillancezen)
Jie Xue (@JieX19)
Hongbin Lu (@fgtdev-hblu)
Frank Shen (@frankshen01)
Miguel Angel Munoz (@mamunozgonzalez)
Nicolas Thomas (@thomnico)