FortiGate:Diagnose-Command-Guide

Aus Fortinet Wiki
Zur Navigation springen Zur Suche springen

FortiGate:Diagnose-Command-Guide

Vorwort

Dieser Artikel zeigt den vollständingen "diagnose tree" für FortiOS 5.0 sowie 5.2. In den verschiedenen Abschnitten sind einge Beispiele aufgeführt für die gezeigten Kommandos sofern dies möglich war. Als Device stand eine FG-60D zur Verfügung. Die Angaben über die FortiOS Version bezieht sich nicht darauf ob das Kommando für die jeweilige FortiOS Version zur Verfügung steht, sondern indiziert wann dieses Kommando zur FortiOS Version hinzugefügt wurde.


Datenschutz

        *********************************************************************
        *                                                                   *
        *  THIS FILE MAY CONTAIN CONFIDENTIAL, PRIVILEGED OR OTHER LEGALLY  *
        *      PROTECTED INFORMATION. YOU ARE PROHIBITED FROM COPYING,      *
        *    DISTRIBUTING OR OTHERWISE USING IT WITHOUT PERMISSION FROM     *
        *                  ALSO SCHWEIZ AG SWITZERLAND.                     *
        *                                                                   *
        *********************************************************************

"Die in diesen Artikeln enthaltenen Informationen sind vertraulich und dürfen ohne
schriftliche Zustimmung von der ALSO Schweiz AG gegenüber Dritt-Unternehmen nicht 
                         bekannt gemacht werden"

diagnose

antivirus

antivirus avquery

FortiGuard - AV Query statistics and reporting

       # diagnose antivirus avquery statistics flush                          Flush daemon and cache statistics.                                             [5.0][5.2]
       # diagnose antivirus avquery statistics list                           Display cache and daemon statistics.
       
       DNS failures                     :          0
       DNS lookups                      :          0
       Data send failures               :          0
       Data read failures               :          0
       Incorrect CRCs in responses      :          0
       Proxy request failures           :          0
       Requests timed out               :          0
       Total Requests                   :          0
       Requests to rating servers       :          0
       Server error responses           :          0
       Relayed requests                 :          0
       Jobs passed on daemon shutdown   :          0
       Server error, files passed       :          0
       Bad license, files passed        :          0
       Request queue full, files passed :          0
       Daemon not started; files passed :          0
       No server, files passed          :          0
       No resources, files passed       :          0
       Bad query format, files passed   :          0
       Cache mem allowed                :          0
       Cache mem used                   :          0
       Number of cache entries          :          0
       Cache queries                    :          0
       Cache hits                       :          0
                                          [5.0][5.2]
       # diagnose antivirus avquery status                                    FortiGuard - AV Query service status                                           [5.0][5.2]
       
       FortiGuard - AV Query service is disabled.
       Server status unknown

antivirus bypass

       # diagnose antivirus bypass on|off                                     On/Off for bypassing AV checking.                                              [5.0][5.2]

antivirus heuristic

       # diagnose antivirus heuristic showrules                               Display heuristic rule overrides.                                              [5.0][5.2]
       # diagnose antivirus heuristic showthreshold                           Display heuristic threshold.                                                   [5.0][5.2]
       Threshold: 0

antivirus quarantine

       # diagnose antivirus quarantine delete [Checksum für File]             Delete a file in quarantine.                                                   [5.0][5.2]
       # diagnose antivirus quarantine list                                   List the files in quarantine.                                                  [5.0][5.2]
       
       Quarantine List (Count = 0)
       -----------------------------
       CHECKSUM SIZE     FIRST-TIMESTAMP  LAST-TIMESTAMP   SERVICE STATUS     DC    TTL   FILENAME DESCRIPTION
       
       # diagnose antivirus quarantine list service {http|https|ftp|smtp|smtps|pop3|pop3s|imap|imaps|im|nntp} 
       
       # diagnose antivirus quarantine list status {infected|heuristic|blocked} 
       # diagnose antivirus quarantine purge                                  Delete all quarantined files.                                                  [5.0][5.2]

antivirus virus

       # diagnose antivirus virus list                                        List detected virus                                                            [5.0][5.2]
       
       Virus List
       ==========
         ACM/Bursted.AN
         ACM/Medre.A@mm
         ACM/Pasdoc.A
         Akuku.889.A
         ALS/Medre.A!tr
         Android/Agent.BY!tr
         Android/Agent.FS!tr
         Android/Basebridge.B!tr
         Android/DrdDream.A!exploit.CVE2010EASY
         Android/DroidRooter.A
         Android/DroidRooter.C
         Android/DroidRt.B
         Android/DrSheep.A
         Android/FakeInst.C!tr
         Android/Fakelash.A!tr.spy
         Android/FkToken.A

autoupdate

autoupdate downgrade

       # diagnose autoupdate downgrade enable | disable                       Update object downgrade status.                                                [5.0][5.2]
       # diagnose autoupdate downgrade enable
       Update downgrade enabled
       # diagnose autoupdate downgrade disable
       Update downgrade disabled

autoupdate status

       # diagnose autoupdate status                                           Status of automatic updates.                                                   [5.0][5.2]
       
       FDN availability:  unavailable at Mon Nov 16 19:29:33 2015
       
       Push update: disable
       Scheduled update: enable
               Update every:   6 hours at 0 minutes after the hour
       Virus definitions update: enable
       IPS definitions update: enable
       Push address override: disable
       Web proxy tunneling: disable
       Description:
       
       FDN availability:                Specify availability status and last access time (access time corresponds to the scheduled update settings).
                                        Possible values are: available/unavailable.  
       Push update:                     Specify whether push update method is enabled or disabled. Possible values are: enable/disable.  
       Scheduled update:                Specify whether scheduled update is enabled or disabled. Possible values are: enable/disable.  
       Update every:                    If scheduled update is enabled, specify the time defined to launch the update.  
       Virus definitions update:        Specify whether the virus definitions update is enabled or disabled. Possible values are: enable/disable.  
       IPS definitions updates:         Specify whether the IPS definitions update is enabled or disabled. Possible values are:  enable/disable.  
       Server override:                 Specify whether the use of another FDS server is enabled or disabled. Possible values are: enable/disable.
                                        If  enabled  a new line is displayed showing the FDS IP address defined in the configuration.  
       Push address override:           If push update is enabled, specify whether the FortiGate override address feature is enabled or disabled. 
                                        Possible values are: enable/disable. If enabled, a new line is displayed showing the FDS IP address and the 
                                        TCP port (a.b.c.d:port) defined in the configuration.  
       Web proxy tunneling:             Specify whether FortiGate device is using a proxy to retrieve AV and IPS definitions updates. Possible values 
                                        are: enable/disable. If enabled, additional lines are displayed showing the proxy settings.  

autoupdate versions

       # diagnose autoupdate versions                                         Update object versions.                                                        [5.0][5.2]
       
       AV Engine
       ---------
       Version: 5.00171
       Contract Expiry Date: n/a
       Last Updated using manual update on Fri Jun 26 15:14:00 2015
       Last Update Attempt: Mon Nov 16 18:31:29 2015
       Result: Connectivity failure
       
       Virus Definitions
       ---------
       Version: 16.00560
       Contract Expiry Date: n/a
       Last Updated using manual update on Fri Oct 19 08:31:00 2012
       Last Update Attempt: Mon Nov 16 18:31:29 2015
       Result: Connectivity failure
       ............................
       ............................

central-mgmt

central-mgmt script-history

       # diagnose central-mgmt script-history clear                           Clear script execution history.                                                [5.0][5.2]
       Script execution history has been cleared.
       # diagnose central-mgmt script-history del [id Record ID]              Delete one script execution record.                                            [5.0][5.2]
       # diagnose central-mgmt script-history list                            List script execution history.                                                 [5.0][5.2]
       There is 0 script execution log:
        ID          Time        Type   Status  Name
       ----------------------------------------------------
       ----------------------------------------------------
       # diagnose central-mgmt script-history test                            Generate sample script execution records.                                      [5.0][5.2]
       One new script execution record has been created.
       One new script execution record has been created.
       One new script execution record has been created.

client-reputation

NOTE Not Available on Model(s) "FortiGate 60C"

client-reputation convert-timestamp

       # diagnose client-reputation convert-timestamp                        Convert a client reputation database timestamp to date and time.                [5.0][5.2]

client-reputation test-all

       # diagnose client-reputation test-all                                 Adds log messages from multiple sources to the client reputation db for testing.[5.0][5.2]

client-reputation test-app

       # diagnose client-reputation test-app                                 Adds application control log messages to the client reputation db for testing.  [5.0][5.2]

client-reputation test-ips

       # diagnose client-reputation test-ips                                 Adds ips log messages to the client reputation db for testing.                  [5.0][5.2]

client-reputation test-webfilter

       # diagnose client-reputation test-webfilter                           Adds webfilter log messages to the client reputation db for testing.            [5.0][5.2]

cp

NOTE Not Available on Model(s) "FortiGate 60C"

cp cp8

       # diagnose cp cp8                                                     Co-processor version 8.                                                         [5.2]

debug

       # diagnose debug [disable | enable]                                                 Disable/enable debug output.                                      [5.0][5.2]
       
       NOTE Use this command to enable/disable debugging messages to the CLI display. 

debug admin

       # debug admin error-log                                                         Last failed admin user login details.                                 [5.2]

debug application

       # diagnose debug application [application option] [Debug Level/Integer          application  
       
       NOTE Use for all commands the following "Integer" to indicate the "Debug Level":
            
            Integer:
            
            -1  Display all messages.  
             0  Do not display messages 
       # diagnose debug application alarmd                                             Alarmd daemon                                                         [5.0][5.2] 
       # diagnose debug application alertmail                                          Alert mail daemon                                                     [5.0][5.2] 
       # diagnose debug application authd                                              Auth daemon.                                                          [5.0][5.2] 
       # diagnose debug application chassis                                            Chassis daemon.                                                       [5.0][5.2] 
       # diagnose debug application crl-update                                         CRL update daemon.                                                    [5.0][5.2] 
       # diagnose debug application cw_acd                                             Capwap AC daemon.                                                     [5.0][5.2] 
       # diagnose debug application ddnscd                                             DDNS client daemon.                                                   [5.0][5.2] 
       # diagnose debug application dhcp6c                                             DHCPv6 client.                                                        [5.0][5.2] 
       # diagnose debug application dhcp6r                                             DHCPv6 relay.                                                         [5.0][5.2] 
       # diagnose debug application dhcp6s                                             DHCPv6 server.                                                        [5.0][5.2] 
       # diagnose debug application dhcpc                                              DHCP client module.                                                   [5.0][5.2] 
       # diagnose debug application dhcprelay                                          DHCP relay daemon.                                                    [5.0][5.2] 
       # diagnose debug application dhcps                                              DHCP server.                                                          [5.0][5.2] 
       # diagnose debug application dialinsvr                                          Dial-in-server daemon.                                                [5.0][5.2] 
       # diagnose debug application dlp                                                DLP                                                                   [5.0][5.2] 
       # diagnose debug application dlpfingerprint                                     DLP fingerprint daemon.                                               [5.0][5.2] 
       # diagnose debug application dnsproxy                                           DNS proxy module.                                                     [5.0][5.2] 
       # diagnose debug application dsd                                                DLP Stat Daemon                                                       [5.0][5.2] 
       # diagnose debug application extenderd                                          Extender Wan daemon.                                                  [5.2] 
       # diagnose debug application fcnacd                                             FortiClient NAC daemon.                                               [5.0][5.2] 
       # diagnose debug application fgd_alert                                          FortiGuard alert message.                                             [5.0][5.2] 
       # diagnose debug application fgfmd                                              FortiGate/FortiManager communication daemon.                          [5.0][5.2] 
       # diagnose debug application fnbamb                                             Fortigate non-blocking auth daemon.                                   [5.0][5.2] 
       # diagnose debug application forticldd                                          FortiCloud daemon.                                                    [5.0][5.2] 
       # diagnose debug application forticron                                          Forticron daemon.                                                     [5.0][5.2] 
       # diagnose debug application fsd                                                Forti-start daemon.                                                   [5.0][5.2] 
       # diagnose debug application fssod                                              FSSO daemon.                                                          [5.0][5.2] 
       # diagnose debug application ftpd                                               FTP proxy.                                                            [5.0][5.2] 
       # diagnose debug application garpd                                              VIP gratuitous ARP daemon.                                            [5.0][5.2] 
       # diagnose debug application harelay                                            HA relay module.                                                      [5.0][5.2] 
       # diagnose debug application hasync                                             HA synchronization module.                                            [5.0][5.2] 
       # diagnose debug application hatalk                                             HA protocol module.                                                   [5.0][5.2] 
       # diagnose debug application http                                               HTTP proxy.                                                           [5.0][5.2] 
       # diagnose debug application httpsd                                             HTTPSd daemon.                                                        [5.0][5.2] 
       # diagnose debug application ike                                                IKE daemon.                                                           [5.0][5.2] 
       # diagnose debug application im                                                 IM proxy.                                                             [5.0][5.2] 
       # diagnose debug application imap                                               IMAP proxy.                                                           [5.0][5.2] 
       # diagnose debug application info-sslvpn                                        SSL-VPN info daemon for Fortinet top bar.                             [5.0][5.2] 
       # diagnose debug application init                                               System init process.                                                  [5.2] 
       # diagnose debug application ipldbd                                             Ipldbd daemon.                                                        [5.0][5.2] 
       # diagnose debug application ipsengine                                          ips sensor                                                            [5.0][5.2] 
       # diagnose debug application ipsmonitor                                         ips monitor                                                           [5.0][5.2] 
       # diagnose debug application ipsufd                                             IPS URL filter resolver daemon.                                       [5.0][5.2] 
       # diagnose debug application l2tp                                               L2TP daemon.                                                          [5.0][5.2] 
       # diagnose debug application l2tpcd                                             L2tpcd daemon.                                                        [5.0][5.2] 
       # diagnose debug application link-monitor                                       Link monitor daemon.                                                  [5.2] 
       # diagnose debug application lldptx                                             Link Layer Discovery Protocol (LLDP) Transmitter                      [5.2] 
       # diagnose debug application lted                                               USB LTE daemon.                                                       [5.0][5.2] 
       # diagnose debug application miglogd                                            Log daemon.                                                           [5.0][5.2] 
       # diagnose debug application modemd                                             MODEM daemon.                                                         [5.0][5.2] 
       # diagnose debug application netscan                                            Netscan                                                               [5.0][5.2] 
       # diagnose debug application nntp                                               NNTP proxy.                                                           [5.0][5.2] 
       # diagnose debug application nq                                                 NAC quarantine daemon.                                                [5.0] 
       # diagnose debug application ntpd                                               NTPd daemon.                                                          [5.0][5.2] 
       # diagnose debug application ovrd                                               Override daemon.                                                      [5.2] 
       # diagnose debug application pop3                                               POP3 proxy.                                                           [5.0][5.2] 
       # diagnose debug application ppp                                                PPP daemon.                                                           [5.0][5.2] 
       # diagnose debug application pppoed                                             PPPoE client Daemon.                                                  [5.0][5.2] 
       # diagnose debug application pptp                                               PPTP daemon.                                                          [5.0][5.2] 
       # diagnose debug application pptpc                                              PPTP client.                                                          [5.0][5.2] 
       # diagnose debug application proxy                                              Proxy acceptor.                                                       [5.0] 
       # diagnose debug application proxyacceptor                                      Proxy acceptor.                                                       [5.2] 
       # diagnose debug application proxydaemon                                        Proxy daemon.                                                         [5.0][5.2] 
       # diagnose debug application proxyworker                                        Proxy worker.                                                         [5.0][5.2] 
       # diagnose debug application quarantine                                         Quarantine daemon.                                                    [5.0][5.2] 
       # diagnose debug application radiusd                                            RADIUS daemon.                                                        [5.0][5.2] 
       # diagnose debug application radvd                                              Router adv daemon.                                                    [5.0][5.2] 
       # diagnose debug application rsyslogd                                           Rsyslogd daemon.                                                      [5.0][5.2] 
       # diagnose debug application rtmon                                              PING server.                                                          [5.0] 
       # diagnose debug application scanunit                                           Scanunit daemon.                                                      [5.0][5.2] 
       # diagnose debug application  sccp                                              SCCP ALG.                                                             [5.0][5.2] 
       # diagnose debug application scep                                               SCEP                                                                  [5.0][5.2] 
       # diagnose debug application server-probe                                       Server probe daemon.                                                  [5.0][5.2] 
       # diagnose debug application sessionsync                                        Session sync daemon.                                                  [5.0][5.2] 
       # diagnose debug application sflowd                                             sFlow protocol module.                                                [5.0][5.2] 
       # diagnose debug application sip                                                SIP ALG.                                                              [5.0][5.2] 
       # diagnose debug application smbcd                                              SMB client daemon.                                                    [5.0][5.2] 
       # diagnose debug application smtp                                               SMTP proxy.                                                           [5.0][5.2] 
       # diagnose debug application snmpd                                              SNMP daemon.                                                          [5.0][5.2] 
       # diagnose debug application spamfilter                                         Spam filter module.                                                   [5.0][5.2] 
       # diagnose debug application spareblock                                         Set debug spare block count.                                          [5.0][5.2] 
       # diagnose debug application src-vis                                            Source Visibility daemon.                                             [5.0][5.2] 
       # diagnose debug application sshd                                               Sshd daemon.                                                          [5.0][5.2] 
       # diagnose debug application ssl                                                SSL daemon.                                                           [5.0][5.2] 
       # diagnose debug application sslvpn                                             sslvpn                                                                [5.0][5.2] 
       # diagnose debug application stp                                                Spanning Tree Protocol daemon.                                        [5.0][5.2] 
       # diagnose debug application update                                             Update daemon.                                                        [5.0][5.2] 
       # diagnose debug application uploadd                                            Upload daemon.                                                        [5.0][5.2] 
       # diagnose debug application urlfilter                                          Urlfilter daemon.                                                     [5.0][5.2] 
       # diagnose debug application vpd                                                VPN policy daemon.                                                    [5.0][5.2] 
       # diagnose debug application vrrpd                                              VRRP daemon.                                                          [5.0][5.2] 
       # diagnose debug application vs                                                 virtual-server                                                        [5.0][5.2] 
       # diagnose debug application wa_cs                                              WAN acceleration cs server.                                           [5.0] 
       # diagnose debug application wa_dbd                                             WAN acceleration db server.                                           [5.0] 
       # diagnose debug application wabcs                                              WAN acceleration byte cache storage.                                  [5.2] 
       # diagnose debug application wad                                                WAN acceleration proxy.                                               [5.0][5.2] 
       # diagnose debug application waocs                                              WAN acceleration object cache storage.                                [5.2] 
       # diagnose debug application wccpd                                              WCCP daemon.                                                          [5.0][5.2] 
       # diagnose debug application wifi                                               WiFi setting.                                                         [5.0][5.2] 
       # diagnose debug application wiredap                                            Wired AP (802.1X port-based auth) daemon.                             [5.0][5.2] 
       # diagnose debug application wpad                                               Port access entity daemon.                                            [5.0][5.2] 
       # diagnose debug application wpad_dump                                          Dump wpad packet in binary format.                                    [5.0][5.2] 
       # diagnose debug application zebos                                              ZebOS                                                                 [5.0][5.2] 
       # diagnose debug application zebos-launcher                                     ZebOS launcher daemon.                                                [5.0][5.2] 

debug authd

       # diagnose debug authd clear                                                    Clear internal data structures and keep alive sessions.               [5.0]
       # diagnose debug authd fsso                                                     FFSO                                                                  [5.0]
       # diagnose debug authd fsso clear-logons                                        Clear logon information.                                              [5.0] 
       # diagnose debug authd fsso filter clear                                        Clear all filters.                                                    [5.0] 
       # diagnose debug authd fsso filter group <name>                                 Group name.                                                           [5.0] 
       # diagnose debug authd fsso filter server <name>                                FSSO agent name.                                                      [5.0] 
       # diagnose debug authd fsso filter source [from srcip] [to srcip]               Source IP address.                                                    [5.0] 
       # diagnose debug authd fsso filter user <name>                                  User name.                                                            [5.0] 
       # diagnose debug authd fsso list                                                List current logons.                                                  [5.0] 
       # diagnose debug authd fsso refresh-groups                                      Refresh group mappings.                                               [5.0] 
       # diagnose debug authd fsso refresh-logons                                      Resync logon database.                                                [5.0] 
       # diagnose debug authd fsso server-status                                       Show FSSO agent connection status.                                    [5.0] 
       # diagnose debug authd fsso summary                                             Summary of current logons.                                            [5.0] 
       # diagnose debug authd memory                                                   Show authd memory usage information.                                  [5.0]  

debug cli

       # diagnose debug cli [Integer]                                                  Debug CLI.                                                            [5.0][5.2]
       
       Integer level = 0 - 8

debug cmdb-trace

       # diagnose debug cmdb-trace [Integer 0 - 1]                                     Trace CLI.                                                            [5.0][5.2]

debug config-error-log

       # diagnose debug config-error-log                                               Configure error log info.                                             [5.0][5.2]
       # diagnose debug config-error-log clear                                         Clear config error log.                                               [5.0][5.2]
       # diagnose debug config-error-log read                                          Display config error on console.                                      [5.0][5.2]

debug console

       # diagnose debug console no-user-log-msg                                        Console does not show user log messages.                              [5.0]
       # diagnose debug console no-user-log-msg disable                                Disable console no user log message.                                  [5.0] 
       # diagnose debug console no-user-log-msg enable                                 Enable console no user log message.                                   [5.0] 
       # diagnose debug console send [AT command] [character] [integer]                Send out MODEM HA  AT command.                                        [5.0]
       # diagnose debug console timestamp                                              timestamp                                                             [5.0]
       # diagnose debug console timestamp disable                                      Disable timestamp.                                                    [5.0] 
       # diagnose debug console timestamp enable                                       Enable timestamp.                                                     [5.0] 
       
       NOTE Use this command to enable or disable the timestamp in debug logs.

debug crashlog

       # diagnose debug crashlog                                                       Crash log info.                                                       [5.0][5.2]
       # diagnose debug crashlog clear                                                 Clear crash log.                                                      [5.0] 
       # diagnose debug crashlog get                                                   Get crashlog.                                                         [5.0] 
       # diagnose debug crashlog read                                                  Read crashlog.                                                        [5.0] 
       NOTE Use this command to show crash logs from application proxies that have call back traces, segmentation 
            faults, or memory register dumps, or to delete the crash log. 

debug flow

       # diagnose debug flow filter                                                    Trace packet with filter.                                             [5.0]
       # diagnose debug flow filter6                                                   Trace packet with IPv6 filter.                                        [5.0]
       # diagnose debug flow show                                                      Enable/disable display of trace on console.                           [5.0]
       # diagnose debug flow trace                                                     Start/stop trace.                                                     [5.0]
       Was ist das spezielle am Kommando "diagnose debug flow"
       
       Dieser Befehl zeigt wie ein Packet abgehandelt wird im Kernel dh. über welches Interface es reinkommt, wie es geroutet
       wird, ob die Policy angesprochen wird etc. Es ist ein "Monitor"für Flow Packages:
       
       # diagnose debug flow filter clear
       
       # diagnose debug flow show console enable
       # diagnose debug flow show function enable
       # diagnose debug flow filter proto [Angabe der Protokoll Nummer zB "6" für TCP]  
       # diagnose debug flow filter [Definition des Filters]
               vf: any
               proto: any
               Host addr: any
               Host saddr: any
               Host daddr: any
               port: any
               sport: any
               dport: any
       
       NOTE Als Filter können folgende Angaben definiert werden:
        
               addr      IP address.
               clear     Clear filter.
               daddr     Destination IP address.
               dport     Destination port.
               negate    Inverse filter.
               port      port
               proto     Protocol number.
               saddr     Source IP address.
               sport     Source port.
               vd        Index of virtual domain.
       Grundanwendung des "diagnose debug flow" Kommandos:
       
       NOTE Die nachfolgende Befehle zeigen wie für "flow" alle Funktionen zur Vorbereitung zurückgesetzt werden. Danach werden
            die verschiedenen Funktionen wie zB "timestamp" usw. aktiviert. Dies bedeutet: Nicht im jeden Fall ist dieser Vorgang
            auszuführen nur dann wenn zu Beginn alle Filter und Funktionen auf Ihre Standard Werte zurückgesetzt werden sollen um
            sicherzustellen das keine vorhergenden Filter mehr bestehen!
       
       Deaktivere Debug "flow":
       
       # diagnose debug disable
       
       Stoppe Trace für "flow":
       
       # diagnose debug flow trace stop
       
       Lösche Filter für "flow":
       
       # diagnose debug flow filter clear
       
       Setze Debug zurück für "flow":
       
       # diagnose debug reset
       
       Setze eine neuen Filter für "flow":
       
       # diagnose debug flow filter addr [x.x.x.x] [To filter only address x.x.x.x]
       
       Aktiviere "output" auf Console für "flow":
       
       # diagnose debug flow show console enable
       Aktiviere function-name für "flow":
       
       # diagnose debug flow show function-name enable
       
       Aktiviere timestamp (Zeit) für "flow":
       
       # diagnose debug console timestamp enable
       
       Setze die Anzahl Packet die für "flow" resp. für den Filter angzeigt werden sollen:
       
       # diagnose debug flow trace start [Anzahl der Packet zB 10]
       
       Aktiviere die Funktion "flow":
       
       # diagnose debug enable [To enable the debug command.]

Nachfolgend einige Beispiele die zeigen wie ein Filter für "flow" aussehen kann:

       Explizit nach ping traffic filtern: 
       
       # diagnose debug flow filter proto 1
       
       NOTE Weitere Informationen betreffend den Protokoll Nummern siehe nachfolgender Artikel:
            
            Allgemein:Assigned-Internet-Protocol-Numbers-RFC                                                                
       Explizit nur ICMP auf eine bestimmte IP-Adresse filtern: 
       
       # diagnose debug flow filter addr [Definiere die IPv4 Adresse von bis zB 192.168.1.1 192.168.1.10]
       # diagnose debug flow filter proto [Definiere die Protokoll Nummer zB für ICMP 1]
       Explizit nach einer bestimmten Portnummer filtern:
              
       # diagnose debug flow filter port [Definiere Portnummer zB 80]
       Auf eine bestimmte IP Adresse und Portnummer filtern:
                 
       # diagnose debug flow filter addr [Definiere die IPv4 Adresse zB 192.168.1.10]
       # diagnose debug flow filter port [Definiere Portnummer zB 25]
       Explizit auf einen bestimmten Source Port filtern:
       
       # diagnose debug flow filter sport [Definiere Sourceport zB 10823]
       Explizit auf einen bestimmten Destinations Port filtern:
       
       # diagnose debug flow filter dport [Definiere Destinations Port zB110]
       Explizit auf eine bestimmte Source IP Adresse filtern:
       
       # diagnose debug flow filter saddr [Definiere IPv4 Adresse zB 192.168.5.44]
       Explizit auf eine Source IP Adresse filtern:
       
       # diagnose debug flow filter daddr [Definiere IPv4 Adresse zB 192.168.3.24]
       Explizit auf eine virtuelle Domaine (vdom) filtern:
       
       # diagnose debug flow filter vd [Definiere Index zB 2 ; -1 für alle]

Wenn mit "diagnose debug flow" gearbeitet wird, werden betreffend "block" verschiedenen Nachrichten ausgegeben. Diese haben folgende Bedeutung:

       Denied by forward policy check          - Es existiert keine entsprechende Firewall Policy Rule für diesen Traffic.
                                               - Eine Firewall Policy Rule existiert zwar jedoch ist ein "disclaimer" aktiviert der zuerst akzeptiert werden muss.
       
       Denied by end point ip filter check     - Die Source IP Adresse des Traffic ist in der Quarantine von DLP.
       
       exceeded shaper limit, drop             - Packet wurde verworfen durch den Traffic Shaper.
       
       Reverse path check fail, drop           - Packet wurde verworfen durch die Funktion "reverse path forwarding". Weitere Informationen zu "reverse path forwarding"
                                                 siehe auch nachfolgenden Artikel:
       
                                                 FortiGate-5.0-5.2:FAQ#Wie_schalte_ich_das_.22Reverse_Path_Forwarding.22_von_.22loose.22_auf_.22strict.22_.28per_Standard_gilt_.22loose.22.29.3F
       
       Iprope_in_check() check failed, drop    - Das Packet benützt als Destination eine FortiGate IP Adresse dh. Mgmt. Traffic jedoch:
                                                 
                                                 --> Der Service auf der FortiGate zB Admin HTTPS Zugriff ist nicht aktiviert.
                                                 --> Der Service ist zwar aktiviert benützt jedoch einen anderen Port.
                                                 --> Für den Service wurde ein "trusted host" konfiguriert und die Source IP ist nicht enthalten in "trusted host".
                                               
                                               - Das Packet benützt als Destination keine FortiGate IP Adresse dh. für Mgmt. Traffic jedoch wird die IP benutzt 
                                                 für ein VIP oder IP Pool Objekt.

debug fsso-polling

       # diagnose debug fsso-polling                                                   FSSO active directory poll module.                                    [5.0][5.2]
       # diagnose debug fsso-polling client                                            Show FSSO AD Server Clients.                                          [5.0] 
       # diagnose debug fsso-polling detail <id-AD Server Entry ID>                    Show FSSO AD Server Detail.                                           [5.0] 
       # diagnose debug fsso-polling ha                                                Show FSSO HA Summary.                                                 [5.0] 
       # diagnose debug fsso-polling refresh-user <id-AD Server Entry ID>              Refresh FSSO AD Server users.                                         [5.0] 
       # diagnose debug fsso-polling set-log-source [ID AD] [0: security, 1:appl.]     Source of event log.                                                  [5.0] 
       # diagnose debug fsso-polling summary                                           Show FSSO AD Server Summary.                                          [5.0] 
       # diagnose debug fsso-polling user [ID AD]                                      Show FSSO AD Server users.                                            [5.0] 

debug info

       # diagnose debug info                                                           Show active debug level settings.                                     [5.0][5.2]

debug kernel

       # diagnose debug kernel ha [Integer - disable, 1-7 = higher level]              Debug kernel HA level.                                                [5.0]
       # diagnose debug kernel level [Integer - Kernel level]                          Debug kernel level.                                                   [5.0]

debug rating

       # diagnose debug rating [refresh-rate (sec)]                                    Display rating info.                                                  [5.0][5.2]
       
       NOTE Use this command to display the available FortiGuard Distribution Network servers for antispam queries
            and to set the frequency for refreshing the server list.
       Server Status)
       D  Indicates the server was found via the DNS lookup of the hostname. If the hostname returns more 
          than one IP address, all of them will be flagged with 'D' and will be used first for INIT requests
          before falling back to other servers.  
       
       I  Indicates the server to which the last INIT request was sent.  
       
       F  The server has not responded to requests and is considered to have failed.  
       
       T  The server is currently being timed.  

debug report

       # diagnose debug report                                                         Report for tech support.                                              [5.0][5.2]
       # diagnose debug report reset                                                   Reset debug report.                                                   [5.0] 

debug reset

       # diagnose debug reset                                                          Reset all debug level to default.                                     [5.0][5.2]

debug rtmon

       # diagnose debug rtmon                                                          Dump rtmon data by name.                                              [5.0]
       # diagnose debug rtmon dump pingsvr                                             Dump ping server.                                                     [5.0] 
       # diagnose debug rtmon dump fail-detect                                         Dump fail-detect.                                                     [5.0] 

debug urlfilter

       # diagnose debug urlfilter src-addr [IP address]                                Enable debug messages for selected source IP address.                 [5.0] 
       # diagnose debug urlfilter test-url [url]                                       Find the result returned from the URL filter for a URL.   

disktest

disktest block

       # diagnose disktest block                                             Block size of each read/write operation.                                        [5.2]

Current Test Block: 4M.

disktest device

       # diagnose disktest device                                            Device to test.                                                                 [5.2]
       
       # diagnose disktest device 
       1    /dev/sda, size 3864MB, boot device
       2    /dev/sdb, size 7728MB
       
       # diagnose disktest device 1
       Current Test Device: /dev/sda

disktest run

       # diagnose disktest run                                               Run test with specified cycle.                                                  [5.2]
       Round 1 started.
       Current Test Device: /dev/sda
       Total size: 3864M
       Current Test Block: 4M.
       Current Time Limit: No limit
       Current Size Limit: No limit
       Time(Sec)    Size(MB)                                                 Read(MB/s) Write(MB/s)
       ...........................
       ..........................

disktest size

       # diagnose disktest size                                              Test size limit for each cycle.                                                 [5.2]
       Current Size Limit: No limit

disktest time

       # diagnose disktest time                                              Test time limit for each cycle.                                                 [5.2]
       Current Time Limit: No limit

endpoint

Endpoint compliance diagnostics.

endpoint ec-feature-list

       # diagnose endpoint ec-feature-list                                                    Endpoint checking feature list information.                    [5.0][5.2]
       Number of list entries: 0

endpoint filter

       # diagnose endpoint filter clear                                                       Erase the current filter.                                      [5.0][5.2]
       # diagnose endpoint filter ftcl-uid [uid FortiClient UID]                              FortiClient UID to filter by.                                  [5.0][5.2]
       # diagnose endpoint filter list                                                        Display the current filter.                                    [5.0][5.2]
       source IP : any
       session IP : any
       MAC : any
       FortiClient UID : any
       # diagnose endpoint filter mac [MAC address (xx:xx:xx:xx:xx:xx)]                       MAC address to filter by.                                      [5.0][5.2]
       # diagnose endpoint filter ses-ip [ipv4-address Session IPv4 address]                  IPv4 session address to filter by.                             [5.0][5.2]
       # diagnose endpoint filter src-ip [ipv4-address Session IPv4 address]                  IPv4 source address to filter by.                              [5.0][5.2]

endpoint information

       # diagnose endpoint information                                                        Latest endpoint related information.                           [5.0][5.2]
       FortiGuard Availability: not reachable
       FortiClient Downloads: 0

endpoint record-delete

       # diagnose endpoint record-delete [ipv4-address Source IPv4 address]                   Delete endpoint records.                                       [5.0][5.2]

endpoint record-list

       # diagnose endpoint record-list any                                                    List endpoint records.                                         [5.0][5.2]
       online records: 0; offline records: 0
       status -- none: 0; uninstalled: 0; unregistered: 0; registered: 0; blocked: 0

endpoint record-summary

       # diagnose endpoint record-summary                                                     List summary of endpoint records.                              [5.0][5.2]
       online records: 0; offline records: 0
       status -- none: 0; uninstalled: 0; unregistered: 0; registered: 0; blocked: 0

endpoint registration

       # diagnose endpoint registration block [id FortiClient UID]                            Block a FortiClient from registering.                          [5.0]
       # diagnose endpoint registration cmdb-list [ipv4 Source or any]                        List FortiClients stored in CMDB.                              [5.0]
       # diagnose endpoint registration deregister [id FortiClient UID]                       Deregister a registered FortiClient.                           [5.0]
       # diagnose endpoint registration force-peer-resync                                     force to resync registration with all peers.                   [5.0]
       # diagnose endpoint registration keepalive-timestamp [FortiClient UID]                 List KeepAlive timestamps.                                     [5.0]
       # diagnose endpoint registration list blocked-forticlients [ipv4 address or any]       List blocked FortiClients.                                     [5.0]
       # diagnose endpoint registration list registered-forticlients [ipv4 address or any]    List registered FortiClients.                                  [5.0]
       # diagnose endpoint registration recalculate-registered-forticlients                   Re-calculate number of registered forticlients.                [5.0]
       Total number of licences: 10
       Total number of granted licenses: 0 (0)
       Total number of available licences: 10
       # diagnose endpoint registration skip-forticlient-system-update [1/0 Skip/Unskip]      Skip the system update upon receiving KeepAlive from FC        [5.0]
       # diagnose endpoint registration ssl-session-timeout [SSL session timeout]             Set the SSL session timeout.                                   [5.0]
       # diagnose endpoint registration summary                                               Summary of FortiClient registrations.                          [5.0]
       Total number of licences: 10 
       Total number of granted licenses: 0 
       Total number of available licences: 10 
       # diagnose endpoint registration sync-peer-list [1/0 signal daemon]                    List registration sync peers.                                  [5.0]
       # diagnose endpoint registration unblock [FortiClient UID]                             Unblock a previously blocked FortiClient.                      [5.0]

extender

extender atcmd

       # diagnose extender atcmd                                              at command
       
       # diagnose extender atcmd[at-command] [mark - change mark to '?' in at command] [sn - serial number of extender]                                      [5.2]

extender cmd

       # diagnose extender cmd                                                generic at command                                                             [5.2]
       
       # diagnose extender cmd [Integer - a number mapping a generic at command] [sn - serial number of extender] 
       
       Description of Test Level
       
       1  Show device info  
       2  Show data session connection status  
       3  Test connection  
       4  Test disconnection  
       5  Get signal strength

fdsm

FortiCloud/FortiManager Service.

fdsm account-info

       # diagnose fdsm account-info                                           FortiCloud account information.                                                [5.0][5.2]
       Account information: status=0, type=basic.

fdsm cfg-diff

       # diagnose fdsm cfg-diff [revision1] [revision2]                       Configuration difference.                                                      [5.0] [5.2]

fdsm cfg-download

       # diagnose fdsm cfg-download [normal | template | script]              Download configuration.                                                        [5.0][5.2]

fdsm cfg-list

       # diagnose fdsm cfg-list [normal | template | script]                  Download configuration list.                                                   [5.0][5.2]

fdsm cfg-upload

       # diagnose fdsm cfg-upload  [comments]                                 Upload configuration.                                                          [5.0][5.2]

fdsm contract-controller-update

       # diagnose fdsm contract-controller-update                             Update contract controller.                                                    [5.0][5.2]
       Protocol=2.0|Response=202|Firmware=FAZ-4K-FW-2.50-100|SerialNumber=FAMS000000000000| 
       Persistent=false|ResponseItem=HomeServer:208.91.113.180:443*AlterServer:208.91.113.180:443*Contract:20141016*NextRequest:86400*UploadConfig:False*ManagementMode:Local*ManagementID:650735713 
       Result=Success 

fdsm fc-installer-download

       # diagnose fdsm fc-installer-download [Installer ID]                   Download FortiClient installer.                                                [5.0][5.2]

fdsm fds-update

       # diagnose fdsm fds-update                                             Perform FortiGuard update.                                                     [5.0][5.2]

fdsm ftk-activiate

       # diagnose fdsm ftk-activiate [arg please input args]                  FortiToken activation.                                                         [5.0][5.2]

fdsm log-controller-update

       # diagnose fdsm log-controller-update                                  Perform log update.                                                            [5.0][5.2]
       Protocol=2.0|Response=202|Firmware=FAZ-4K-FW 2.50-
       100|SerialNumber=FAMS000000000000|Persistent=false|ResponseItem=HomeServer:208.91.113.183:514*AlterServer:208.91.113.201:514*Contract:20141016*ContractType:Basic*NextRequest:86400*Disk:1024*Used:3.44*Volume:102*Archive:True
       Result=Success

fdsm message-update

       # diagnose fdsm message-update                                         Perform message update.                                                        [5.0][5.2]
       Protocol=2.0|Response=202|Firmware=FAZ-4K-FW 2.50-
       100|SerialNumber=FAMS000000000000|Persistent=false|ResponseItem=HomeServer:208.91.113.183:514*AlterServer:208.91.113.201:514*Contract:20141016*ContractType:Basic*NextRequest:86400*Disk:1024*Used:3.44*Volume:102*Archive:True
       Result=Success

fdsm forticlient-update

       # diagnose fdsm forticlient-update                                     FortiClient update.                                                            [5.0][5.2]

fdsm forticlient-net-info

       # diagnose fdsm forticlient-net-info                                   FortiClient net information.                                                   [5.0][5.2]
       SerialNumber=FPT-FCS-29500013|Address=208.91.112.135:443|FDNListener=208.91.112.135:8889|TimeZone=-5
       SerialNumber=FPT-FCS-DELL0005|Address=208.91.112.132:443|FDNListener=208.91.112.132:8889|TimeZone=-5 
       SerialNumber=FPT-FCS-DELL0007|Address=62.209.40.71:443|FDNListener=62.209.40.71:8889|TimeZone=1 
       .......................................................
       .......................................................
       ......................................................
       TimeZone=-8|Address=support.fortinet.com|Registration=/registration.aspx|Login=/login.aspx: 
       Result=Success 

fdsm fortiap-download

       # diagnose fdsm fortiap-download [Image ID]                            Download FortiAP image.                                                        [5.0][5.2]

fdsm fortiap-latest-ver

       # diagnose fdsm fortiap-latest-ver [model Model name]                  Get most recent FortiAP build information.                                     [5.0][5.2]

fdsm image-download

       # diagnose fdsm image-download [Image ID]                              Download image.                                                                [5.0][5.2]

fdsm image-list

       # diagnose fdsm image-list                                             Download image list.                                                           [5.0][5.2]
       05000000FIMG0007000007 v5.00 GA P7 b3608 (downgrade) 
       04000000FIMG0007003015 v4.00 MR3-GA P15 b0672 (downgrade)
       04000000FIMG0007002011 v4.00 MR2-GA P11 b0342 (downgrade)

fdsm modem-list

       # diagnose fdsm modem-list                                             MODEM list.                                                                    [5.0][5.2]

fdsm report-download

       # diagnose fdsm report-download [OID]                                  Download report.                                                               [5.0][5.2]

fdsm report-list

       # diagnose fdsm report-list [VDOM Name]                                Download report list.                                                          [5.0][5.2]

fdsm sslvpn-man-upgrade-package-download

       # diagnose fdsm sslvpn-man-upgrade-package-download [Package ID]       Download SSL-VPN manual upgrade package.                                       [5.0][5.2]

fdsm sslvpn-package-download

       # diagnose fdsm sslvpn-package-download [Package ID]                   Download SSL-VPN package.                                                      [5.0][5.2]

firewall

firewall auth

       # diagnose firewall auth clear                                         Clear authenticated IPv4 users.                                                [5.0]
       # diagnose firewall auth filter                                        Filters used to list entries.                                                  [5.0]
       
       # diagnose firewall auth filter clear [Enter]                          Clear all filters.                                                             [5.0] 
       # diagnose firewall auth filter group [Group name]                     Group name.                                                                    [5.0]
       # diagnose firewall auth filter method [fw, fsso, ntlm]                method                                                                         [5.0]
       # diagnose firewall auth filter policy [xxx - Policy ID]               Policy ID.                                                                     [5.0]
       # diagnose firewall auth filter source [IPv4 source]                   IPv4 source address.                                                           [5.0]
       # diagnose firewall auth filter source6 [IPv6 source]                  IPv6 source address.                                                           [5.0]
       # diagnose firewall auth filter user [User name]                       User name                                                                      [5.0] 
       # diagnose firewall auth ipv6 [clear | list]                           Authenticated IPv6 users.                                                      [5.0]
       # diagnose firewall auth list                                          List authenticated IPv4 users.                                                 [5.0]
       ----- 0 listed, 0 filtered ------

firewall blocking

       # diagnose firewall blocking list [ipv4 Source IP]                     List information.                                                              [5.0] 

firewall dns-xlate

       # diagnose firewall dns-xlate [mapping | pool]                         DNS translation.                                                               [5.2]
       
       # diagnose firewall dns-xlate mapping list
       List DNS translation mapping:(vf=root)
       
       # diagnose firewall dns-xlate pool list
       List DNS translation pool:(vf=root)

firewall fqdn

       # diagnose firewall fqdn flush                                         Flush IP info of FQDN.                                                         [5.0]
       # diagnose firewall fqdn list                                          List all FQDN.                                                                 [5.0]
       List all FQDN:
       albert.apple.com: ID(39) REF(2)
       phobos.apple.com: ID(56) REF(2)
       swscan.apple.com: ID(60) REF(2)
       test.stats.update.microsoft.com: ID(63) REF(2)
       itunes.apple.com: ID(69) REF(2)
       ax.itunes.apple.com: ID(76) REF(2)
       deimos3.apple.com: ID(97) REF(2)
       www.msftncsi.com: ID(103) REF(2)
       download.windowsupdate.com: ID(129) REF(2)
       au.download.windowsupdate.com: ID(133) REF(2)
       gs.apple.com: ID(135) REF(2)
       phobos.apple.com.edgesuite.net: ID(154) REF(2)
       metrics.apple.com: ID(164) REF(2)
       download.microsoft.com: ID(201) REF(2)
       swcdn.apple.com: ID(204) REF(2)
       swquery.apple.com: ID(205) REF(2)
       ntservicepack.microsoft.com: ID(227) REF(2)
       swdownload.apple.com: ID(239) REF(2)
       update.microsoft.com: ID(244) REF(2)
       appldnld.apple.com: ID(252) REF(2)
       windowsupdate.microsoft.com: ID(255) REF(2)
       # diagnose firewall fqdn purge                                         Purge all unused FQDN.                                                         [5.0]

firewall ip-translation

       # diagnose firewall ip-translation [flush | list]                      IP translation.                                                                [5.0][5.2]

firewall ip_host

       # diagnose firewall ip_host add                                        Add ip_host.                                                                   [5.0]
       
       # diagnose firewall ip_host add dev [Device name]                      Device tree name                                                               [5.0]
       # diagnose firewall ip_host add dst [ipv4 Destination]                 Destination tree ipv4                                                          [5.0]
       # diagnose firewall ip_host add src [ipv4 Source]                      Source tree ipv4                                                               [5.0] 
       # diagnose firewall ip_host clr [dev | dst | src]                      Clear ip_host node.                                                            [5.0]
       # diagnose firewall ip_host del                                        Del ip_host entry.                                                             [5.0]
       
       # diagnose firewall ip_host del dev [Device name]                      Device tree name                                                               [5.0]
       # diagnose firewall ip_host del dst [ipv4 Destination]                 Destination tree ipv4                                                          [5.0]
       # diagnose firewall ip_host del src [ipv4 Source]                      Source tree ipv4                                                               [5.0] 
       # diagnose firewall ip_host list                                       List ip_host.                                                                  [5.0]
       
       # diagnose firewall ip_host list dev [Device name]                     Device tree name                                                               [5.0]
       # diagnose firewall ip_host list dst [ipv4 Destination]                Destination tree ipv4                                                          [5.0]
       # diagnose firewall ip_host list ep-ip [ipv4 Source]                   Source tree ipv4                                                               [5.0] 
       # diagnose firewall ip_host list src [ipv4 Source]                     Source tree ipv4                                                               [5.0] 
       # diagnose firewall ip_host rem                                        Del ip_host node.                                                              [5.0]
       
       # diagnose firewall ip_host rem dev [Device name]                      Device tree name                                                               [5.0]
       # diagnose firewall ip_host rem dst [ipv4 Destination]                 Destination tree ipv4                                                          [5.0]
       # diagnose firewall ip_host rem src [ipv4 Source]                      Source tree ipv4                                                               [5.0]
       # diagnose firewall ip_host stat                                       stat                                                                           [5.0]
       iph_size=0

firewall ipgeo

       # diagnose firewall ipgeo copyright-notice                             Copyright note.                                                                [5.0]
       Copyright (c) 2011 MaxMind Inc.  All Rights Reserved.
       # diagnose firewall ipgeo country-list                                 List all countries.                                                            [5.0]
       Total countries loaded:2
       EU
       CH
       # diagnose firewall ipgeo ip-list [Country ID example CH]              List IP info of country.                                                       [5.0] 
                   5.1.96.0 - 5.1.103.255
                  5.1.112.0 - 5.1.119.255
                 5.39.2.205 - 5.39.2.206
                 5.39.56.32 - 5.39.56.47
                 5.44.112.0 - 5.44.127.255
                 5.53.104.0 - 5.53.111.255
                 5.57.200.0 - 5.57.207.255
                 5.61.224.0 - 5.61.231.255
                5.102.144.0 - 5.102.151.255
                 5.104.88.0 - 5.104.95.255
                 5.133.32.0 - 5.133.39.255
                 5.134.24.0 - 5.134.31.255
                  5.144.0.0 - 5.144.47.255
                  ........................
                  ........................
                  ........................
       # diagnose firewall ipgeo ip2country [ipv4 address]                    Get country info for the IP.                                                   [5.0]
       # diagnose firewall ipgeo override                                     Print out all user defined IP geolocation data.                                [5.0]

firewall iplist

       # diagnose firewall iplist [flush | list optimized]                    IP list.                                                                       [5.0][5.2]

firewall iplist6

       # diagnose firewall iplist6 [flush | list optimized]                   IP list.                                                                       [5.0][5.2]

firewall ipmac

       # diagnose firewall ipmac                                              ipmac                                                                          [5.0][5.2]
       
       # diagnose firewall ipmac add [xxx.xxx.xxx.xxx - IP address]           IP address.                                                                    [5.0]
       
       # diagnose firewall ipmac delete [xx.xxx.xxx.xxx - IP address]         IP address.                                                                    [5.0]
       
       # diagnose firewall ipmac flush                                        flush                                                                          [5.0]
       
       # diagnose firewall ipmac list                                         list                                                                           [5.0]
       List firewall IP/MAC address pairs:
       ip=198.18.3.2 mac=08:5b:0e:a3:97:a6 act=01 flag=00
       ip=198.18.2.2 mac=9c:b7:0d:de:8f:74 act=01 flag=00
       ip=198.18.3.3 mac=08:5b:0e:5d:f7:0c act=01 flag=00
       # diagnose firewall ipmac status                                       status                                                                         [5.0] 
       ipmac status: enable=0, default_act=0, count=3

firewall ippool

       # diagnose firewall ippool flush                                       flush                                                                          [5.0]
       # diagnose firewall ippool list                                        list                                                                           [5.0]
       # diagnose firewall ippool list nat-ip                                 List allocated IP in ippool.                                                   [5.0]
       # diagnose firewall ippool list pba                                    List PBA in ippool.                                                            [5.0]
       # diagnose firewall ippool list user                                   List users of ippool.                                                          [5.0]

       # diagnose firewall ippool stats                                       statistics                                                                     [5.0]
       Total 0 ippool is allocated.
       Total 0 client host is online.
       Total 0 natip is allocated.
       Total 0 PBA is allocated.
       Approximate 0 PBA is allocated in 1 second before.

firewall ippool-fixed-range

       # diagnose firewall ippool-fixed-range                                 Fixed range IP pool.                                                           [5.0][5.2]
       
       # diagnose firewall ippool-fixed-range list natip [natip <xxx.xxx.xxx.xxx | natip + port]

firewall iprope

       # diagnose firewall iprope appctrl                                     List application control lists.                                                [5.0]
       
       # diagnose firewall iprope appctrl list                                List application control lists.                                                [5.0]
       app-list=default/2000 other-action=Pass
         app-id=1          list-id=2000  action=Pass
         app-id=2          list-id=2000  action=Pass
         app-id=3          list-id=2000  action=Pass
         app-id=4          list-id=2000  action=Pass
         app-id=6          list-id=2000  action=Pass
         app-id=7          list-id=2000  action=Pass
         app-id=8          list-id=2000  action=Pass
         ...........................................
         ...........................................
       
       # diagnose firewall iprope appctrl shaper list                         List application control app shapers.                                          [5.0]
       
       # diagnose firewall iprope appctrl stats clear                         Clear application control app statistics.                                      [5.0]
       
       # diagnose firewall iprope appctrl stats list                          List application control app statistics.                                       [5.0]
       
       # diagnose firewall iprope appctrl status                              Application control list status.                                               [5.0] 
       appctrl table 3 list 2 app 6762 shaper 0
       
       # diagnose firewall iprope clear                                       Clear policy statistic.                                                        [5.0]
        clear group idx ...
       
       # diagnose firewall iprope flush [No. - Number, hexadecimal]           flush                                                                          [5.0]
       
       # diagnose firewall iprope list [No. - Number, hexadecimal]            list                                                                           [5.0]
       
       # diagnose firewall iprope show                                        show                                                                           [5.0]
       
       # diagnose firewall iprope state                                       state                                                                          [5.0]
       av_break=pass/off av_conserve=off Alloc: iprope=196 shaper=27 user=0 nodes=27 pol=332
       app_src=0 auth_logon=0 auth_info=0
       av_service=http  fail open act=off
       av_service=imap  fail open act=off
       av_service=pop3  fail open act=off
       av_service=smtp  fail open act=off
       av_service=ftp   fail open act=off
       av_service=im    fail open act=off
       av_service=p2p   fail open act=off
       av_service=nntp  fail open act=off
       av_service=https fail open act=off
       av_service=imaps fail open act=off
       av_service=pop3s fail open act=off
       av_service=smtps fail open act=off
       av_service=ftps  fail open act=off
       av_service=cifs  fail open act=off
       total group number = 24 act=2
       00004e20 00100000 00000001 00004e21 00100012 00004e22 00100002 00004e23 00100003 00000003 00004e24 00100004 00000005 00004e25 00060005 00000006 00000007 00000008 00100009 0010000a 0010000c 0010000d 0010000e 0010000f 

firewall iprope6

       # diagnose firewall iprope6 clear                                      Clear policy statistic.                                                        [5.0]
       
       # diagnose firewall iprope6 flush [No. - Number, hexadecimal]          flush                                                                          [5.0]
       
       # diagnose firewall iprope6 list [No. - Number, hexadecimal]           list                                                                           [5.0]
       
       # diagnose firewall iprope6 show                                       show                                                                           [5.0]
        show group idx ...
       
       # diagnose firewall iprope6 state                                      state                                                                          [5.0]
       av_break = off/block av_conserve = block
       alloc: iprope = 196 shaper = 27 user = 0
       default action: 2
       groups: total number 9
       00000001 00100012 00100003 00000003 00100004 00000005 00000006 0010000e 0010000f 

firewall ipv6-ehf

       # diagnose firewall ipv6-ehf                                           IPv6 extension header filter.                                                  [5.0][5.2]
       
       ipv6 extension header filter:
               flags: 0x00000004 rout
               routing types: 0

firewall packet

       # diagnose firewall packet distribution                                Packet statistics.                                                             [5.0][5.2]
       getting packet distribution statistics...
       0 bytes - 63 bytes: 3243883 packets
       64 bytes - 127 bytes: 11859967 packets
       128 bytes - 255 bytes: 964121 packets
       256 bytes - 383 bytes: 190072 packets
       384 bytes - 511 bytes: 13840 packets
       512 bytes - 767 bytes: 59863 packets
       768 bytes - 1023 bytes: 18604 packets
       1024 bytes - 1279 bytes: 98551 packets
       1280 bytes - 1500 bytes: 72256 packets
        > 1500 bytes: 0 packets

firewall proute

       # diagnose firewall proute list                                        Policy route.                                                                  [5.0][5.2]
       list route policy info(vf=root):

firewall proute6

       # diagnose firewall proute6 list                                       IPv6 policy route.                                                             [5.0][5.2]

firewall schedule

       # diagnose firewall schedule list                                      schedule                                                                       [5.0][5.2]
       none weekly ------- start 0:0 stop 0:0 stat=00000001 use=1
       always weekly SMTWTFS start 0:0 stop 0:0 stat=00000000 use=27

firewall shaper

       # diagnose firewall shaper per-ip-shaper                               Traffic shapers.                                                               [5.0]
       
       clear        Use this command to clear the per-ip statistical data to begin a fresh diagnoses. 
       list         Use this command to view information for the per-IP shaper for security policies. 
       state        This command displays the total number of per-ip shapers on the FortiGate unit. 
       stats        This command displays a summary statistics on the shapers. 
       
       # diagnose firewall shaper per-ip-shaper clear                         Per-IP clear statistic data.                                                   [5.0]
       # diagnose firewall shaper per-ip-shaper list                          List per-IP shapers.                                                           [5.0]
       # diagnose firewall shaper per-ip-shaper state                         Per-IP shapers state.                                                          [5.0]
       memory allocated 0
       # diagnose firewall shaper per-ip-shaper stats                         Per-IP shapers statistic.                                                      [5.0] 
       memory allocated 0 packet dropped: 0
       # diagnose firewall shaper traffic-shaper                              Traffic shapers.                                                               [5.0]
       
       list         Use this command to view information for the shared traffic shaper for security policies. 
       state        Use this command to display the total number of traffic shapers on the FortiGate unit. 
       stats clear  Use this command to clear the per-ip statistical data to begin a fresh diagnoses. 
       stats list   Use this command to view information for the per-IP shaper for security policies enter the command. 
       
       # diagnose firewall shaper traffic-shaper list                         List traffic shapers.                                                          [5.0]
       name Citrix-CS4-AF41
       maximum-bandwidth 0 KB/sec
       guaranteed-bandwidth 0 KB/sec
       current-bandwidth 0 B/sec
       priority 2
       tos 22 
       packets dropped 0
       
       name local-guarantee-100kbps.intra
       maximum-bandwidth 131072 KB/sec
       guaranteed-bandwidth 12 KB/sec
       current-bandwidth 0 B/sec
       priority 2
       tos ff 
       packets dropped 0
       
       # diagnose firewall shaper traffic-shaper state                        Global traffic shaper state.                                                   [5.0]
       shapers 6
       
       # diagnose firewall shaper traffic-shaper stats clear                  Clear traffic shaper statistics.                                               [5.0]
       
       # diagnose firewall shaper traffic-shaper stats list                   List traffic shaper statistics.                                                [5.0] 
       shapers 6 ipv4 0 ipv6 0 drops 0

firewall statistic

       # diagnose firewall statistic                                          Traffic statistics.                                                            [5.0][5.2]
       
       # diagnose firewall statistic clear                                    Clear traffic stats.                                                           [5.0] 
       # diagnose firewall statistic show                                     Show traffic stats.                                                            [5.0] 
       
       show        Use the show command to display throughput information for the firewall broken down, into categories, 
                   by both packets and bytes. Categories include common applications such as DNS, FTP, IM, P2P, and VoIP 
                   and also includes the lower level protocols — TCP, UDP, ICMP, and IP. 
       clear       Use the clear command to clear and reset the throughput information. 

firewall uuid

       # diagnose firewall uuid                                               UUID list.                                                                     [5.2]

firewall vip

       # diagnose firewall vip                                                                        VIP diagnostics.                                       [5.0][5.2]
       # diagnose firewall vip realserver                                                             Load balance real servers.                             [5.0]
       
       # diagnose firewall vip realserver down [name | xxx.xxx.xxx.xxx]                               Change address down.                                   [5.0]
       # diagnose firewall vip realserver flush                                                       flush                                                  [5.0]
       # diagnose firewall vip realserver healthcheck stats clear                                     Clear health check statistics.                         [5.0]
       # diagnose firewall vip realserver healthcheck stats show                                      Show health check statistics.                          [5.0]
       # diagnose firewall vip realserver list                                                        list                                                   [5.0]
       # diagnose firewall vip realserver up [name | xxx.xxx.xxx.xxx]                                 Change address up.                                     [5.0] 
       # diagnose firewall vip virtual-server filter                                                  Filter for various virtual server diagnostics.         [5.0] 
       # diagnose firewall vip virtual-server filter clear                                            Erase the current filter.                              [5.0]
       # diagnose firewall vip virtual-server filter dst [ip-address from |ip-address to]             Destination address range to filter by.                [5.0]
       # diagnose firewall vip virtual-server filter dst-port [port from | port to]                   Destination port range to filter by.                   [5.0]
       # diagnose firewall vip virtual-server filter list                                             Display the current filter.                            [5.0]
       # diagnose firewall vip virtual-server filter name [name]                                      VIP name to filter by.                                 [5.0]
       # diagnose firewall vip virtual-server filter negate dst-addr                                  Negate IPv4 destination address.                       [5.0]
       # diagnose firewall vip virtual-server filter negate dst-port                                  Negate destination port.                               [5.0]
       # diagnose firewall vip virtual-server filter negate name                                      Negate name.                                           [5.0]
       # diagnose firewall vip virtual-server filter negate src-addr                                  Negate IPv4 source address.                            [5.0]
       # diagnose firewall vip virtual-server filter negate src-port                                  Negate source port.                                    [5.0]
       # diagnose firewall vip virtual-server filter negate vd                                        negate virtual domain                                  [5.0] 
       # diagnose firewall vip virtual-server log                                                     Logging diagnostics.                                   [5.0]
       # diagnose firewall vip virtual-server log console disable                                     Do not show virtual-server log on console.             [5.0]
       # diagnose firewall vip virtual-server log console enable                                      Show virtual-server log on console.                    [5.0]
       # diagnose firewall vip virtual-server log filter clear                                        Erase the current filter. 
       # diagnose firewall vip virtual-server log filter dst [ip-address from | ip-address to]        Destination address range to filter by.                [5.0]
       # diagnose firewall vip virtual-server log filter dst-port [port destination]                  Destination port range to filter by.                   [5.0]
       # diagnose firewall vip virtual-server log filter list                                         Display the current filter.                            [5.0] 
       # diagnose firewall vip virtual-server log filter name [name]                                  Virtual-server name to filter by.                      [5.0] 
       # diagnose firewall vip virtual-server log filter negate dst-addr                              Negate IPv4 destination address.                       [5.0] 
       # diagnose firewall vip virtual-server log filter negate dst-port                              Negate destination port.                               [5.0]  
       # diagnose firewall vip virtual-server log filter negate name                                  Negate name.                                           [5.0]  
       # diagnose firewall vip virtual-server log filter negate src-addr                              Negate IPv4 source address.                            [5.0] 
       # diagnose firewall vip virtual-server log filter negate src-port                              Negate source port.                                    [5.0]
       # diagnose firewall vip virtual-server log filter negate vd                                    Negate virtual domain.                                 [5.0]
       # diagnose firewall vip virtual-server log terminal clear                                      Clear debug log terminals.                             [5.0]
       # diagnose firewall vip virtual-server log terminal reset                                      Reset debug log terminals.                             [5.0] 
       # diagnose firewall vip virtual-server log terminal stats                                      Show debug log terminal statistics.                    [5.0] 
       # diagnose firewall vip virtual-server real-server                                             Real-server diagnostics.                               [5.0]
       # diagnose firewall vip virtual-server session                                                 Session diagnostics.                                   [5.0]
       # diagnose firewall vip virtual-server session clear                                           Clear all active sessions.                             [5.0]
       # diagnose firewall vip virtual-server session client clear                                    Clear client sessions.                                 [5.0]
       # diagnose firewall vip virtual-server session client list                                     List active client sessions.                           [5.0]
       # diagnose firewall vip virtual-server session list                                            List active sessions.                                  [5.0]
       # diagnose firewall vip virtual-server session server clear                                    Clear server sessions.                                 [5.0]
       # diagnose firewall vip virtual-server session server list                                     List active server sessions.                           [5.0] 
       # diagnose firewall vip virtual-server stats                                                   Statistics.                                            [5.0]
       # diagnose firewall vip virtual-server stats clear                                             Clear all statistics.                                  [5.0]
       # diagnose firewall vip virtual-server stats http clear                                        Clear HTTP statistics.                                 [5.0]
       # diagnose firewall vip virtual-server stats http list                                         List HTTP statistics.                                  [5.0]
       # diagnose firewall vip virtual-server stats list                                              List all statistics.                                   [5.0]
       # diagnose firewall vip virtual-server stats operational all                                   Display per-process operational info and statistics.   [5.0]
       # diagnose firewall vip virtual-server stats operational list                                  Display operational info and statistics.               [5.0]
       # diagnose firewall vip virtual-server stats summary clear                                     Clear summary statistics.                              [5.0]
       # diagnose firewall vip virtual-server stats summary list                                      List summary statistics.                               [5.0] 

forticare

FortiCare Service.

forticare protocol

       # diagnose forticare protocol [HTTP or HTTPS]                          HTTP or HTTPS.                                                                 [5.0][5.2]

forticare server

       # diagnose forticare server [Server IP (0:disable)]                    FortiCare server.                                                              [5.0][5.2]

forticlient

forticlient add-connection

       # diagnose forticlient add-connection                                  Add test FortiClient connection.                                               [5.0][5.2]
       
       # diagnose forticlient add-connection [Forticlient name] [User name] [Client Id] [Host OS] [Source IP] 

forticlient close-all-connection

       # diagnose forticlient close-all-connection                            Close all test FortiClient connection.                                         [5.0][5.2]

forticlient close-connection

       # diagnose forticlient close-connection                                Close test FortiClient connection.                                             [5.0][5.2]
       # diagnose forticlient close-connection handle                         FortiClient connection handle; Type enter to list current handles

fortitoken

fortitoken debug

       # diagnose fortitoken debug disable                                   Disable debug output.                                                           [5.0]
       # diagnose fortitoken debug enable                                    Enable debug output.                                                            [5.0]

fortitoken info

       # diagnose fortitoken info                                            Show current drift and status for each FortiToken.                              [5.0][5.2]
       FORTITOKEN       DRIFT  STATUS
       FTKMOB619EA900F5 0      new
       FTKMOB41806139B5 0      new
       
       Total activated token: 0
       Total global activated token: 0
       
       Token server status: reachable

fortitoken test

       # diagnose fortitoken test [FortiToken ID]                            Test FortiToken with screen setting for drift of internal clock.                [5.0][5.2]

hardware

hardware certificate

       # diagnose hardware certificate                                       Verify certificates.                                                            [5.0][5.2]

Checking Fortinet_CA.cer integrality ........Passed Checking Fortinet_Factory.cer integrality ........Passed Checking Fortinet_Factory.cer key-pair integrality ........Passed Checking Fortinet_Factory.cer Serial-No. ........Passed Checking Fortinet_Factory.cer timeliness ........Passed Checking Fortinet_Factory.key integrality ........Passed Checking Fortinet_CA2.cer existent ........[Not Exist] Checking Fortinet_Factory2.cer existent ........[Not Exist] Checking Fortinet_Factory2.key existent ........[Not Exist]

hardware deviceinfo

       # diagnose hardware deviceinfo                                                       Get device information.                                          [5.0][5.2]
       
       disk    Use the <disk> command to display all disks in the FortiGate unit. This includes hard disks, and SSD disks.
               The information includes partitions, size, type, and available space. 
       
       nic     Use the <nic> command to display information about the network card attached to the interface. The information 
               displayed varies by the type of NIC. It will include the VLAN id, state,link, speed, counts for received and 
               transmitted packets and bytes. The MAC for this NIC is Current_HWaddr and Permant_HWaddr, and this is only 
               place you can see both the old and new MAC when it is changed. 
       
       # diagnose hardware deviceinfo disk                                                   Display information of all disks.                               [5.0] 
       EXT2-fs warning: mounting unchecked fs, running e2fsck is recommended
       
       Disk Internal-0(boot) ref:       3.8GB    type: USB [FORTINET S01_V130521_004] dev: /dev/sda
         partition ref:     247.0MB, 216.0MB free  mounted: Y  label:  dev: /dev/sda1(boot)
         partition ref:     247.0MB, 216.0MB free  mounted: N  label:  dev: /dev/sda2(boot)
         partition ref:       3.2GB,   3.1GB free  mounted: Y  label:  dev: /dev/sda3
       
       Disk Internal        ref:  16   7.5GB    type: USB [FORTINET S01_V130819_008] dev: /dev/sdb
         partition ref:  17   7.4GB,   7.3GB free  mounted: Y  label: 27079BFE01A8811C dev: /dev/sdb1
       
       Total available disks: 2
       Max SSD disks: 0  Available storage disks: 1
       # diagnose hardware deviceinfo nic [dmz|eth4|eth5|eth6|eth7|eth8|internal|wan1|wan2]  Display NIC information.                                        [5.0] 
       
       # diagnose hardware deviceinfo nic
       The following NICs are available:
               dmz
               internal1
               internal2
               internal3
               internal4
               internal5
               internal6
               internal7
               wan1
               wan2
               
       # diagnose hardware deviceinfo nic dmz
       Driver Name     :Fortinet NP4Lite Driver
       Version         :1.0.0
       Admin           :up
       Current_HWaddr   08:5b:0e:47:db:57
       Permanent_HWaddr 08:5b:0e:47:db:57
       Status          :up
       Speed           :100
       Duplex          :Half
       Host Rx Pkts    :2303106
       Host Rx Bytes   :548062496
       Host Tx Pkts    :2250533
       Host Tx Bytes   :347212131
       Rx Pkts         :2303106
       Rx Bytes        :580305980
       Tx Pkts         :2250533
       Tx Bytes        :330921975
       rx_buffer_len   :2048
       Hidden          :No
       cmd_in_list     : 0
       promiscuous     : 1

hardware ioport

       # diagnose hardware ioport                                            Read/write data via IO port.                                                    [5.0][5.2]
       
       # diagnose hardware ioport byte [arg] [address_hex]                   Read/write byte via IO port.                                                    [5.0]
       # diagnose hardware ioport long [arg] [address_hex]                   Read/write long via IO port.                                                    [5.0]
       # diagnose hardware ioport word [arg] [address_hex]                   Read/write word via IO port.                                                    [5.0] 
       
       Variable       Description
       <address_hex>  Type the hexadecimal address of the I/O port of which you want to read data in byte.  
       <address_hex>  Type the hexadecimal address of the I/O port of which you want to read data in sentence.  
       <address_hex>  Type the hexadecimal address of the I/O port of which you want to read data in word.  

hardware ipsec

       # diagnose hardware ipsec                                             Get ASIC IPsec information.                                                     [5.0][5.2]

hardware lspci

       # diagnose hardware lspci [arg]                                       List PCI parameters.                                                            [5.0][5.2]
       
       arg   Description
       -v    Be verbose  
       -n    Show numeric ID's  
       -nn   Show both textual and numeric ID's (names & numbers)  
       -b    Bus-centric view (PCI addresses and IRQ's instead of those seen by the CPU)  
       -x    Show hex-dump of the standard portion of config space  
       -xxx  Show hex-dump of the whole config space (dangerous; root only)  
       -xxxx Show hex-dump of the 4096-byte extended config space (root only)  
       -s    [[[[<domain>]:]<bus>]:][<slot>][.[<func>]] Show only devices in selected slots  
       -d    [<vendor>]:[<device>] Show only selected devices  
       -t    Show bus tree  
       -m    Produce machine-readable output  
       -i    <file>  Use specified ID database instead of /etc//pci.ids  
       -D    Always show domain numbers  
       -M    Enable `bus mapping' mode (dangerous; root only)  
       -P    <dir> Use specified directory instead of /proc/bus/pci  
       -F    <file> Read configuration data from given file  
       -G    Enable PCI access debugging  

hardware pciconfig

       # diagnose hardware pciconfig                                         Get PCI information.                                                            [5.0][5.2]

hardware setpci

       # diagnose hardware setpci [arg] [arg] [arg]                          Set PCI parameters.                                                             [5.0][5.2]
       
       Example
       
       -f Don't complain if there's nothing to do 
       -v Be verbose 
       -D List changes, don't commit them 
       -P <dir> Use specified directory instead of /proc/bus/pci 
       -F <file> Read configuration data from given file 
       -G Enable PCI access debugging 
       <device>: -s [[[<domain>]:][<bus>]:][<slot>][.[<func>]] 
       | -d [<vendor>]:[<device>] 
       <reg>: <number>[.(B|W|L)] 
       | <name> 
       <values>: <value>[,<value>...] 
       <value>: <hex> 
       | <hex>:<mask> 

hardware sysinfo

       # diagnose hardware sysinfo cpu                                       Display detailed information for all installed CPU(s).                          [5.0]
       Processor       : ARMid(wb) rev 1 (v4l)
       model name      : FortiSOC2
       BogoMIPS        : 799.53
       Features        : swp half thumb 
       
       Hardware        : FSoC2_ASIC
       Revision        : 0000
       Serial          : 0000000000000000
       Imp: 0x66 Arch: 0x5 Part: 0x726 Ver: 0x1
       Ctype: 14 DSize: 6 DASS: 8 DLEN: 32 ISize: 6 IASS: 8 ILEN: 32
       Seperated TLB: Associativity 0
       0x0005317f HUM: En Vec Base:0xffff0000 IC:En BP:Dis RomP:Dis
       SysP:En WB:En DC: En Align:En
       0x00000000 SB: Dis DB:Dis RS:Dis
       # diagnose hardware sysinfo interrupts                                Display system interrupts information.                                          [5.0]
         0:  344849539   Timer Tick
         8:          0   soc2_vpn
        10:          0   soc2_pkce2
        20:   36073893   np4lite
        27:          0   ehci_hcd
        28:    1377222   ehci_hcd
        32:      16008   serial
       Err:          0
       # diagnose hardware sysinfo iomem                                     Display memory map of I/O ports.                                                [5.0]
       00000000-77ffffff : System RAM
         00018000-00210f83 : Kernel code
         00210f84-0028b877 : Kernel data
       # diagnose hardware sysinfo ioports                                   Display address list of I/O ports.                                              [5.0]
       fe410000-fe410007 : serial(set)
       fe420000-fe420007 : serial(auto)
       fe430000-fe430007 : serial(auto)
       fe470000-fe480000 : Timer 0~2
       # diagnose hardware sysinfo memory                                    Display system memory information.                                              [5.0]
       total:    used:    free:  shared: buffers:  cached: shm:
       Mem:  1928380416 500678656 1427701760        0 68730880 176816128 167763968
       Swap:        0        0        0
       MemTotal:      1883184 kB
       MemFree:       1394240 kB
       MemShared:           0 kB
       Buffers:         67120 kB
       Cached:         172672 kB
       SwapCached:          0 kB
       Active:         126976 kB
       Inactive:       112944 kB
       HighTotal:           0 kB
       HighFree:            0 kB
       LowTotal:      1883184 kB
       LowFree:       1394240 kB
       SwapTotal:           0 kB
       SwapFree:            0 kB
       # diagnose hardware sysinfo mtrr                                      Display memory type range register.                                             [5.0]
       # diagnose hardware sysinfo slab                                      Display memory allocation information.                                          [5.0]
       slabinfo - version: 1.1
       kmem_cache            72    140    112    2    2    1 0
       tcp6_session           0      0    928    0    0    1 0
       ip6_session            0      9    864    0    1    1 1
       sctp_session           0      0    864    0    0    1 0
       tcp_session            6     18    864    1    2    1 1
       ip_session             7     60    800    2    6    1 4
       ip6_mrt_cache          0      0    352    0    0    1 0
       fib6_nodes            15    226     32    1    1    1 0
       ip6_dst_cache         49     70    224    2    2    1 0
       ndisc_cache            3     61    128    1    1    1 0
       ip_mrt_cache           0      0    320    0    0    1 0
       tcp_tw_bucket          0     49    160    0    1    1 1
       tcp_bind_bucket       46    226     32    1    1    1 0
       tcp_open_request       0     61    128    0    1    1 1
       inet_peer_cache        5    120     64    1    1    1 0
       ip_dst_cache          13     41    192    1    1    1 0
       ip_fib_hash           34    226     32    1    1    1 0
       arp_cache              5     61    128    1    1    1 0
       vf                     4      7   2208    1    1    2 0
       vf_entry              21    290     24    1    1    1 0
       if_event_cache         0    120     64    0    1    1 1
       blkdev_requests     2048   3078     96   26   38    1 12
       journal_head           5    156     48    1    1    1 0
       revoke_table           2    509     12    1    1    1 0
       revoke_record          0    226     32    0    1    1 1
       eventpoll pwq        346    406     36    2    2    1 0
       eventpoll epi        340    405     96    5    5    1 0
       dnotify_cache          0      0     20    0    0    1 0
       file_lock_cache        2     88     88    1    1    1 0
       fasync_cache           0      0     16    0    0    1 0
       uid_cache              0      0     32    0    0    1 0
       pkt_buf_head_cache    401    464    480   28   29    1 1
       sock                 403    440    928   52   55    1 3
       sigqueue               0     59    132    0    1    1 1
       kiobuf                 0      0     64    0    0    1 0
       cdev_cache           638    720     64    6    6    1 0
       bdev_cache             3    120     64    1    1    1 0
       mnt_cache             19    120     64    1    1    1 0
       inode_cache         5673   5724    448  317  318    1 1
       dentry_cache        5580   5673    128   92   93    1 1
       filp                3651   3660    128   60   60    1 0
       names_cache            0      4   4096    0    2    1 2
       buffer_head        25382  29727     96  315  367    1 52
       mm_struct             71    122    128    2    2    1 0
       vm_area_struct     12314  13800     64  108  115    1 7
       fs_cache              70    226     32    1    1    1 0
       files_cache           71     95    416    4    5    1 1
       signal_act            79     90   1312   14   15    1 1
       pte-cache           3303   3752   2048  826  938    1 112
       size-131072(DMA)       0      0 131072    0    0   16 0
       size-131072            5      5 131072    5    5   16 0
       size-65536(DMA)        0      0  65536    0    0    8 0
       size-65536             4      4  65536    4    4    8 0
       size-32768(DMA)        0      0  32768    0    0    4 0
       size-32768             2      3  32768    2    3    4 1
       size-16384(DMA)        0      0  16384    0    0    2 0
       size-16384            12     15  16384   12   15    2 3
       size-8192(DMA)         0      0   8192    0    0    1 0
       size-8192              7      8   8192    7    8    1 1
       size-4096(DMA)         0      0   4096    0    0    1 0
       size-4096            378    402   4096  192  201    1 9
       size-2048(DMA)         0      0   2048    0    0    1 0
       size-2048            227    312   2048   57   78    1 21
       size-1024(DMA)         0      0   1024    0    0    1 0
       size-1024            283    312   1024   38   39    1 1
       size-512(DMA)          0      0    512    0    0    1 0
       size-512             303    345    512   22   23    1 1
       size-256(DMA)          0      0    256    0    0    1 0
       size-256              42    186    256    2    6    1 4
       size-128(DMA)          0      0    128    0    0    1 0
       size-128            5072   5124    128   84   84    1 0
       size-64(DMA)           0      0     64    0    0    1 0
       size-64            14828  21720     64  133  181    1 48
       

imp2p

IM and P2P.

imp2p aim-sip-factories

       # diagnose imp2p aim-sip-factories                                   AIM SIP factories.                                                               [5.0]

imp2p aim-voice-calls

       # diagnose imp2p aim-voice-calls                                     AIM SIP factories.                                                               [5.0]

imp2p debug-console

       # diagnose imp2p debug-console                                       Debug consoles.                                                                  [5.0]

imp2p flush

       # diagnose imp2p flush aim                                           AOL Messenger sessions.                                                          [5.0]
       # diagnose imp2p flush all                                           All IM sessions.                                                                 [5.0]
       # diagnose imp2p flush icq                                           ICQ sessions.                                                                    [5.0]
       # diagnose imp2p flush msn                                           MSN Messenger sessions.                                                          [5.0]
       # diagnose imp2p flush yahoo                                         Yahoo Messenger sessions.                                                        [5.0]

imp2p im-configs

       # diagnose imp2p im-configs                                          Debug consoles.                                                                  [5.0]

imp2p log-debug

       # diagnose imp2p log-debug [log on console, 0 off, otherwise, on]    Enable/disable IM proxy log on console.                                          [5.0]

imp2p log-filter

       # diagnose imp2p log-filter clear                                    Clear the current filter.                                                        [5.0]
       # diagnose imp2p log-filter dst-addr [Destination IPv4]              IPv4 destination address range to filter by.                                     [5.0]
       # diagnose imp2p log-filter dst-port [Destination Port]              Destination port to filter by.                                                   [5.0]
       # diagnose imp2p log-filter list                                     Display the current filter.                                                      [5.0]
       # diagnose imp2p log-filter negate dst-addr4                         Negate the dst-addr4 filter.                                                     [5.0]
       # diagnose imp2p log-filter negate dst-port                          Negate the dst-port filter.                                                      [5.0]
       # diagnose imp2p log-filter negate protocol                          Negate the protocol filter.                                                      [5.0]
       # diagnose imp2p log-filter negate src-addr4                         Negate the src-addr4 filter.                                                     [5.0]
       # diagnose imp2p log-filter negate src-port                          Negate the src-port filter.                                                      [5.0]
       # diagnose imp2p log-filter negate vd                                Negate the virtual domain filter.                                                [5.0]
       # diagnose imp2p log-filter protocol aim                             Filter AIM traffic.                                                              [5.0]
       # diagnose imp2p log-filter protocol icq                             Filter ICQ traffic.                                                              [5.0]
       # diagnose imp2p log-filter protocol msn                             Filter MSN traffic.                                                              [5.0]
       # diagnose imp2p log-filter protocol yahoo                           Filter Yahoo traffic.                                                            [5.0]
       # diagnose imp2p log-filter src-addr4 [Source IPv4]                  IPv4 source address range to filter by.                                          [5.0]
       # diagnose imp2p log-filter src-port [Source Port]                   Source port to filter by.                                                        [5.0]
       # diagnose imp2p log-filter vd [Index | -1]                         ]Index of virtual domain. -1 matches all.                                         [5.0]

imp2p profile

       # diagnose imp2p profile app                                        All application profiles.                                                         [5.0]
       # diagnose imp2p profile av                                         All AV profiles.                                                                  [5.0]
       # diagnose imp2p profile dlp                                        All DLP profiles.                                                                 [5.0]
       # diagnose imp2p profile proto-opts                                 All protocol options                                                              [5.0]

imp2p redirect

       # diagnose imp2p redirect dns flush                                  Flush DNS-detected redirects.                                                    [5.0]
       # diagnose imp2p redirect dns list                                   List DNS-detected redirects.                                                     [5.0]
       # diagnose imp2p redirect dns remove                                 Remove persistent copy of DNS-detected redirects.                                [5.0]
       # diagnose imp2p redirect dns restore                                Restore persistent copy of DNS-detected redirects.                               [5.0]
       # diagnose imp2p redirect dns save                                   Store a persistent copy of DNS-detected redirects.                               [5.0]
       # diagnose imp2p redirect list                                       All IM redirects.                                                                [5.0]
       # diagnose imp2p redirect range list                                 Permanent IP address redirect ranges.                                            [5.0]

imp2p restart

       # diagnose imp2p restart                                             Restart IM, SIP, and SCCP.                                                       [5.0]

imp2p session

       # diagnose imp2p session list                                        List IM sessions.                                                                [5.0]

imp2p stats

       # diagnose imp2p stats bandwidth                                     P2P bandwidth usage.                                                             [5.0]
       # diagnose imp2p stats block-users aim                               AOL Messenger users.                                                             [5.0]
       # diagnose imp2p stats block-users all                               All IM users.                                                                    [5.0]
       # diagnose imp2p stats block-users icq                               ICQ users.                                                                       [5.0]
       # diagnose imp2p stats block-users msn                               MSN Messenger users.                                                             [5.0]
       # diagnose imp2p stats block-users yahoo                             Yahoo Messenger users.                                                           [5.0]
       # diagnose imp2p stats chat                                          Statistics of IM chat usage.                                                     [5.0]
       # diagnose imp2p stats clear                                         Reset all the IM and P2P statistics.                                             [5.0]
       # diagnose imp2p stats files                                         Statistics of IM file transfers.                                                 [5.0]
       # diagnose imp2p stats mem full                                      Memory usage details.                                                            [5.0]
       # diagnose imp2p stats mem summary                                   Memory usage summary.                                                            [5.0]
       # diagnose imp2p stats messages                                      Statistics of IM messages exchanged.                                             [5.0]
       # diagnose imp2p stats proto                                         Full listing of raw protocol statistics.                                         [5.0]
       # diagnose imp2p stats reset-time                                    Time of last stats reset.                                                        [5.0]
       # diagnose imp2p stats usage                                         Statistics of IM usage.                                                          [5.0]

imp2p tmp-users

       # diagnose imp2p tmp-users aim                                       Temporary AOL Messenger users.                                                   [5.0]
       # diagnose imp2p tmp-users all                                       All Temporary IM users.                                                          [5.0]
       # diagnose imp2p tmp-users icq                                       Temporary ICQ users.                                                             [5.0]
       # diagnose imp2p tmp-users msn                                       Temporary MSN Messenger users.                                                   [5.0]
       # diagnose imp2p tmp-users yahoo                                     Temporary Yahoo Messenger users.                                                 [5.0]

imp2p users

       # diagnose imp2p users aim                                           AOL Messenger users.                                                             [5.0]
       # diagnose imp2p users aim-stun                                      AIM STUN users.                                                                  [5.0]
       # diagnose imp2p users all                                           All IM users.                                                                    [5.0]
       # diagnose imp2p users icq                                           ICQ users.                                                                       [5.0]
       # diagnose imp2p users msn                                           MSN Messenger users.                                                             [5.0]
       # diagnose imp2p users yahoo                                         Yahoo Messenger users.                                                           [5.0]

ip

ip address

       # diagnose ip address add [intf-name] [ipv4 address] [Subnet Mask]   Add IP address.                                                                  [5.0]
       # diagnose ip address delete [intf-name] [ipv4 address]              Delete IP address.                                                               [5.0]
       # diagnose ip address flush [intf-name]                              Flush IP addresses.                                                              [5.0]
       # diagnose ip address list                                           List IP addresses.                                                               [5.0]
       IP=198.18.3.1->198.18.3.1/255.255.255.0 index=4 devname=dmz
       IP=193.193.135.66->193.193.135.66/255.255.255.224 index=5 devname=wan1
       IP=198.18.0.1->198.18.0.1/255.255.255.0 index=7 devname=internal1
       IP=127.0.0.1->127.0.0.1/255.0.0.0 index=66 devname=root
       IP=198.18.2.1->198.18.2.1/255.255.255.128 index=68 devname=fortinet4intern
       IP=198.18.2.129->198.18.2.129/255.255.255.128 index=69 devname=fortinet4guest
       IP=127.0.0.1->127.0.0.1/255.0.0.0 index=73 devname=vsys_ha
       IP=127.0.0.1->127.0.0.1/255.0.0.0 index=75 devname=vsys_fgfm

ip arp

       # diagnose ip arp add [intf-name] [ipv4 address] [MAC Address]       Add an ARP entry.                                                                [5.0]
       # diagnose ip arp delete [intf-name] [ipv4 address]                  Delete an ARP entry.                                                             [5.0]
       # diagnose ip arp flush  [intf-name]                                 Flush ARP table.                                                                 [5.0]
       # diagnose ip arp list                                               Show ARP table.                                                                  [5.0]
       index=66 ifname=root 0.0.0.0 00:00:00:00:00:00 state=00000040 use=96620321 confirm=96626321 update=96620321 ref=2
       index=7 ifname=internal1 198.18.0.90 state=00000001 use=87 confirm=96626622 update=244 ref=3
       index=4 ifname=dmz 198.18.3.2 08:5b:0e:a3:97:a6 state=00000002 use=852 confirm=3353 update=1853 ref=2
       index=4 ifname=dmz 198.18.3.3 08:5b:0e:5d:f7:0c state=00000002 use=419 confirm=2920 update=2920 ref=2
       index=5 ifname=wan1 193.193.135.65 00:90:0b:3b:d6:c2 state=00000008 use=94 confirm=4091 update=496 ref=3

ip framed-ip

       # diagnose ip framed-ip                                              Framed IP.                                                                       [5.0][5.2]
       
       # diagnose ip framed-ip delete [ipv4 address]                        Delete Framed IP.                                                                [5.0]
       # diagnose ip framed-ip delete-all [Service name, ENTER for options] Delete Framed IPS belong to the same service.
       # diagnose ip framed-ip delete-all
       Available services:
               wad
               ipsec
               pptp
               l2tp
               sslvpn
               admin-login
               test                                   [5.0]
       # diagnose ip framed-ip list                                         List Framed IP.                                                                  [5.0] 

ip get-igmp-limit

       # diagnose ip get-igmp-limit                                         Get max IGMP states.                                                             [5.0] 
       igmp limit: 3200

ip group-membership

       # diagnose ip group-membership                                       Multicast group membership.                                                      [5.0]
       Idx     Device    : Count Querier       Group    Users Timer    Reporter
       3       eth0      :     1      V2
       4       dmz       :     3      V2
                                       8C0100E0     1 0:FA3D484B               1
                                       010000E0     1 0:EB6DA98C               0
       5       wan1      :     3      V2
                                       8C0100E0     1 0:FA3D46AC               1
                                       010000E0     1 0:EB6DA98C               0
       6       wan2      :     1      V2
       7       internal1 :     3      V2
                                       8C0100E0     1 0:FA3D4992               1
                                       010000E0     1 0:EB6DA98C               0
       8       internal2 :     1      V2
       9       internal3 :     1      V2
       10      internal4 :     1      V2
       11      internal5 :     1      V2
       12      internal6 :     1      V2
       13      internal7 :     1      V2
       14      eth11     :     1      V2
       15      swvl12    :     1      V2
       16      swvl13    :     1      V2
       17      swvl14    :     1      V2
       18      swvl15    :     1      V2
       19      swvl16    :     1      V2
       20      swvl17    :     1      V2
       21      swvl18    :     1      V2
       22      swvl19    :     1      V2
       23      swvl20    :     1      V2
       24      swvl21    :     1      V2
       25      swvl22    :     1      V2
       26      swvl23    :     1      V2
       27      swvl24    :     1      V2
       28      swvl25    :     1      V2
       29      swvl26    :     1      V2
       30      swvl27    :     1      V2
       31      swvl28    :     1      V2
       32      swvl29    :     1      V2
       33      swvl30    :     1      V2
       34      swvl31    :     1      V2
       35      swvl32    :     1      V2
       36      swvl33    :     1      V2
       37      swvl34    :     1      V2
       38      swvl35    :     1      V2
       39      swvl36    :     1      V2
       40      swvl37    :     1      V2
       41      swvl38    :     1      V2
       42      swvl39    :     1      V2
       43      swvl40    :     1      V2
       44      swvl41    :     1      V2
       45      swvl42    :     1      V2
       46      swvl43    :     1      V2
       47      swvl44    :     1      V2
       48      swvl45    :     1      V2
       49      swvl46    :     1      V2
       50      swvl47    :     1      V2
       51      swvl48    :     1      V2
       52      swvl49    :     1      V2
       53      swvl50    :     1      V2
       54      swvl51    :     1      V2
       55      swvl52    :     1      V2
       56      swvl53    :     1      V2
       57      swvl54    :     1      V2
       58      swvl55    :     1      V2
       59      swvl56    :     1      V2
       60      swvl57    :     1      V2
       61      swvl58    :     1      V2
       62      swvl59    :     1      V2
       63      modem     :     0      V2
       66      root      :     0      V2
                                       010000E0     1 0:EB6DA98C               0
       67      ssl.root  :     0      V2
                                       010000E0     1 0:EB6DA98C               0
       68      fortinet4intern:     2      V2
                                       010000E0     1 0:EB6DA999               0
       69      fortinet4guest:     2      V2
                                       010000E0     1 0:EB6DA98C               0
       70      ipsec-fc  :     0      V2
       71      ipsec-ios :     0      V2
       72      ipsec-cisco:     0      V2
       73      vsys_ha   :     0      V2
                                       010000E0     1 0:EB6DA98C               0
       74      port_ha   :     2      V2
                                       010000E0     1 0:EC97A9D5               0
       75      vsys_fgfm :     0      V2
                                       010000E0     1 0:EB6DA98C               0

ip mac

       # diagnose ip mac                                                    Multicast MAC listing.                                                           [5.0]                
       3    eth0            1     0     333300000001
       4    dmz             1     0     01005e00018c
       4    dmz             1     0     01005e000001
       4    dmz             1     0     333300000001
       5    wan1            1     0     01005e00018c
       5    wan1            1     0     01005e000001
       5    wan1            1     0     333300000001
       6    wan2            1     0     333300000001
       7    internal1       1     0     01005e00018c
       7    internal1       1     0     01005e000001
       7    internal1       1     0     333300000001
       8    internal2       1     0     333300000001
       9    internal3       1     0     333300000001
       10   internal4       1     0     333300000001
       11   internal5       1     0     333300000001
       12   internal6       1     0     333300000001
       13   internal7       1     0     333300000001
       14   eth11           1     0     333300000001
       15   swvl12          1     0     333300000001
       16   swvl13          1     0     333300000001
       17   swvl14          1     0     333300000001
       18   swvl15          1     0     333300000001
       19   swvl16          1     0     333300000001
       20   swvl17          1     0     333300000001
       21   swvl18          1     0     333300000001
       22   swvl19          1     0     333300000001
       23   swvl20          1     0     333300000001
       24   swvl21          1     0     333300000001
       25   swvl22          1     0     333300000001
       26   swvl23          1     0     333300000001
       27   swvl24          1     0     333300000001
       28   swvl25          1     0     333300000001
       29   swvl26          1     0     333300000001
       30   swvl27          1     0     333300000001
       31   swvl28          1     0     333300000001
       32   swvl29          1     0     333300000001
       33   swvl30          1     0     333300000001
       34   swvl31          1     0     333300000001
       35   swvl32          1     0     333300000001
       36   swvl33          1     0     333300000001
       37   swvl34          1     0     333300000001
       38   swvl35          1     0     333300000001
       39   swvl36          1     0     333300000001
       40   swvl37          1     0     333300000001
       41   swvl38          1     0     333300000001
       42   swvl39          1     0     333300000001
       43   swvl40          1     0     333300000001
       44   swvl41          1     0     333300000001
       45   swvl42          1     0     333300000001
       46   swvl43          1     0     333300000001
       47   swvl44          1     0     333300000001
       48   swvl45          1     0     333300000001
       49   swvl46          1     0     333300000001
       50   swvl47          1     0     333300000001
       51   swvl48          1     0     333300000001
       52   swvl49          1     0     333300000001
       53   swvl50          1     0     333300000001
       54   swvl51          1     0     333300000001
       55   swvl52          1     0     333300000001
       56   swvl53          1     0     333300000001
       57   swvl54          1     0     333300000001
       58   swvl55          1     0     333300000001
       59   swvl56          1     0     333300000001
       60   swvl57          1     0     333300000001
       61   swvl58          1     0     333300000001
       62   swvl59          1     0     333300000001
       68   fortinet4intern 1     0     01005e000001
       68   fortinet4intern 1     0     333300000001
               69   fortinet4guest  1     0     01005e000001
       69   fortinet4guest  1     0     333300000001
       74   port_ha         1     0     01005e000001
       74   port_ha         1     0     333300000001
       

ip mroute

       # diagnose ip mroute                                                 Multicast FIB.                                                                   [5.0]

ip status

       # diagnose ip status                                                 Multicast status.                                                                [5.0]
       PIM OFF      Assert: OFF     Socket in use: FALSE

ip vif

       # diagnose ip vif                                                    Multicast VIF device info.                                                       [5.0]

ip route

       # diagnose ip route add                                              Add static route.                                                                [5.0]
       
       # diagnose ip route add [intf-name] [ipv4 address] [Subnet Mask] [Nexthop IP address] [Distance 1-255] [Priority 0-4294967295] [verify]
       # diagnose ip route delete                                           Delete static route.                                                             [5.0]
       
       # diagnose ip route delete [intf-name] [ipv4 address] [Subnet Mask] [Nexthop IP address] [Distance 1-255] [Priority 0-4294967295] [verify]
       # diagnose ip route flush                                            Flush routing table.                                                             [5.0]
       # diagnose ip route list                                             List routing table.                                                              [5.0]
       tab=254 vf=0 scope=253 type=1 proto=2 prio=0 0.0.0.0/0.0.0.0/0->193.193.135.64/27 pref=193.193.135.66 gwy=0.0.0.0 dev=5(wan1)
       tab=254 vf=0 scope=0 type=1 proto=11 prio=0 0.0.0.0/0.0.0.0/0->198.18.1.0/25 pref=0.0.0.0 gwy=0.0.0.0 dev=67(ssl.root)
       tab=254 vf=0 scope=253 type=1 proto=2 prio=0 0.0.0.0/0.0.0.0/0->198.18.2.128/25 pref=198.18.2.129 gwy=0.0.0.0 dev=69(fortinet4guest)
       tab=254 vf=0 scope=253 type=1 proto=2 prio=0 0.0.0.0/0.0.0.0/0->198.18.2.0/25 pref=198.18.2.1 gwy=0.0.0.0 dev=68(fortinet4intern)
       tab=254 vf=0 scope=253 type=1 proto=2 prio=0 0.0.0.0/0.0.0.0/0->198.18.0.0/24 pref=198.18.0.1 gwy=0.0.0.0 dev=7(internal1)
       tab=254 vf=0 scope=253 type=1 proto=2 prio=0 0.0.0.0/0.0.0.0/0->198.18.3.0/24 pref=198.18.3.1 gwy=0.0.0.0 dev=4(dmz)
       tab=254 vf=0 scope=0 type=1 proto=11 prio=0 0.0.0.0/0.0.0.0/0->0.0.0.0/0 pref=0.0.0.0 gwy=193.193.135.65 dev=5(wan1)
       
       Routing Table     Description of Entry
        
       tab               table number. This will be either 254 (unicast) or 255 (multicast).  
              
       vf                virtual domain of the firewall. This is the vdom index number. If vdoms are not enabled, this number will be 0. 
               
       type              type of routing connection. Valid values include: 
                         
                         0 - unspecific 
                         1 - unicast 
                         2 - local 
                         3 - broadcast 
                         4 - anycast 
                         5 - multicast 
                         6 - blackhole 
                         7 - unreachable 
                         8 - prohibited 
                         
       proto             type of installation. This indicates where the route came from. Valid values include: 
                         
                          0 - unspecific 
                          2 - kernel 
                         11 - ZebOS routing module 
                         14 - FortiOS 
                         15 - HA 
                         16 - authentication based 
                         17 - HA 
                  
       prio              priority of the route. Lower priorities are preferred.  
       
       ->10.11.201.0/24  the IP address and subnet mask of the destination. 
       (->x.x.x.x/mask)  
               
       pref              preferred next hop along this route.  
                         
       gwy               gateway - the IPv4 address of the gateway this route will use.  
              
       dev               outgoing interface index. This number is associated with the interface for this route, and if VDOMs 
                         are enabled the VDOM will be included here as well. If an interface alias is set for this interface 
                        it will also be displayed here.
       # diagnose ip route verify                                           Verify static route.                                                             [5.0]
       
       # diagnose ip route verify [intf-name] [ipv4 address] [Subnet Mask] [Nexthop IP address] [Distance 1-255] [Priority 0-4294967295] 
       # diagnose ip router bfd                                             BFD debug.                                                                       [5.0]
       # diagnose ip router bfd all [enable | disable]                      Enable all debugging.                                                            [5.0]
       # diagnose ip router bfd events [enable | disable]                   BFD events.                                                                      [5.0]
       # diagnose ip router bfd fsm [arg]                                   BFD finite state machine.                                                        [5.0]
       # diagnose ip router bfd level critical                              Critical level.                                                                  [5.0]
       # diagnose ip router bfd level error                                 Error level.                                                                     [5.0]
       # diagnose ip router bfd level info                                  Information level.                                                               [5.0]
       # diagnose ip router bfd level none                                  None level.                                                                      [5.0]
       # diagnose ip router bfd level warn                                  Warning level.                                                                   [5.0]
       # diagnose ip router bfd nsm [arg]                                   BFD nsm debug.                                                                   [5.0]
       # diagnose ip router bfd packet [arg]                                BFD packets.                                                                     [5.0]
       # diagnose ip router bfd show                                        Show status of BFD debugging.                                                    [5.0] 
       # diagnose ip router bgp                                             BGP protocol.                                                                    [5.0]
       # diagnose ip router bgp all [arg] [arg]                             All debugging.                                                                   [5.0]
       # diagnose ip router bgp dampening [arg] [arg]                       BGP dampening.                                                                   [5.0]
       # diagnose ip router bgp events [arg] [arg]                          BGP events.                                                                      [5.0]
       # diagnose ip router bgp filters [arg] [arg]                         BGP filters.                                                                     [5.0]
       # diagnose ip router bgp fsm [arg] [arg]                             BGP finite state machine.                                                        [5.0]
       # diagnose ip router bgp keepalives [arg] [arg]                      BGP keep alive messages.                                                         [5.0]
       # diagnose ip router bgp level critical                              Critical level.                                                                  [5.0]
       # diagnose ip router bgp level error                                 Error level.                                                                     [5.0]
       # diagnose ip router bgp level info                                  Information level.                                                               [5.0]
       # diagnose ip router bgp level none                                  None level.                                                                      [5.0]
       # diagnose ip router bgp level warn                                  Warning level.                                                                   [5.0]
       # diagnose ip router bgp nsm [arg] [arg]                             NSM message.                                                                     [5.0]
       # diagnose ip router bgp show                                        Show status of BGP debugging.                                                    [5.0]
       # diagnose ip router bgp updates [arg] [arg] [arg]                   BGP updates.                                                                     [5.0] 
       # diagnose ip router command                                         Send command to routing daemon.                                                  [5.0]
       # diagnose ip router command show                                    Send show command to imi.                                                        [5.0]
       # diagnose ip router command show-vrf                                Send show command to imi (in virtual router).                                    [5.0] 
       # diagnose ip router igmp                                            IGMP debug.                                                                      [5.0]
       # diagnose ip router igmp all [arg] [arg]                            All debugging.                                                                   [5.0]
       # diagnose ip router igmp decode [arg] [arg]                         Decode debugging.                                                                [5.0]
       # diagnose ip router igmp encode [arg] [arg]                         Encode debugging.                                                                [5.0]
       # diagnose ip router igmp events [arg] [arg]                         Events debugging.                                                                [5.0]
       # diagnose ip router igmp fsm [arg] [arg]                            FSM debugging.                                                                   [5.0]
       # diagnose ip router igmp level critical                             Critical level.                                                                  [5.0]
       # diagnose ip router igmp level error                                Error level.                                                                     [5.0]
       # diagnose ip router igmp level info                                 Information level.                                                               [5.0]
       # diagnose ip router igmp level none                                 None level.                                                                      [5.0]
       # diagnose ip router igmp level warn                                 Warning level.                                                                   [5.0]
       # diagnose ip router igmp show                                       Show status of IGMP debugging.                                                   [5.0]
       # diagnose ip router igmp tib [arg] [arg]                            TIB (tree-info-base) debugging.                                                  [5.0] 
       # diagnose ip router isis                                            IS-IS protocol.                                                                  [5.0]
       # diagnose ip router isis all [arg] [arg]                            All IS-IS debug.                                                                 [5.0]
       # diagnose ip router isis events [arg] [arg]                         IS-IS Events.                                                                    [5.0]
       # diagnose ip router isis ifsm [arg] [arg]                           IS-IS Interface State Machine.                                                   [5.0]
       # diagnose ip router isis level critical                             Critical level.                                                                  [5.0]
       # diagnose ip router isis level error                                Error level.                                                                     [5.0]
       # diagnose ip router isis level info                                 Information level.                                                               [5.0]
       # diagnose ip router isis level none                                 None level.                                                                      [5.0]
       # diagnose ip router isis level warn                                 Warning level.                                                                   [5.0]
       # diagnose ip router isis lsp [arg] [arg]                            IS-IS Link State PDU.                                                            [5.0]
       # diagnose ip router isis nfsm [arg] [arg]                           IS-IS Neighbor State Machine.                                                    [5.0]
       # diagnose ip router isis nsm [arg] [arg]                            IS-IS NSM information.                                                           [5.0]
       # diagnose ip router isis pdu [arg] [arg]                            IS-IS Protocol Data Unit.                                                        [5.0]
       # diagnose ip router isis show                                       Show IS-IS debugging.                                                            [5.0]
       # diagnose ip router isis spf                                        IS-IS SPF Calculation.                                                           [5.0] 
       # diagnose ip router ospf                                            OSPF protocol.                                                                   [5.0]
       # diagnose ip router ospf all [enable | disable] [arg]               All OSPF debug.                                                                  [5.0]
       # diagnose ip router ospf events [arg] [arg]                         OSPF Events.                                                                     [5.0]
       # diagnose ip router ospf ifsm [arg] [arg]                           OSPF Interface State Machine.                                                    [5.0]
       # diagnose ip router ospf level critical                             Critical level.                                                                  [5.0]
       # diagnose ip router ospf level error                                Error level.                                                                     [5.0]
       # diagnose ip router ospf level info                                 Information level.                                                               [5.0]
       # diagnose ip router ospf level none                                 None level.                                                                      [5.0]
       # diagnose ip router ospf level warn                                 Warning level.                                                                   [5.0]
       # diagnose ip router ospf lsa [arg] [arg]                            OSPF Link State Advertisement.                                                   [5.0]
       # diagnose ip router ospf nfsm [arg] [arg]                           OSPF Neighbor State Machine.                                                     [5.0]
       # diagnose ip router ospf nsm [arg] [arg]                            OSPF NSM information.                                                            [5.0]
       # diagnose ip router ospf packet [arg] [arg]                         OSPF Packets.                                                                    [5.0]
       # diagnose ip router ospf route [arg] [arg]                          OSPF route information.                                                          [5.0]
       # diagnose ip router ospf show                                       Show status of OSPF debugging.                                                   [5.0] 
       # diagnose ip router pim-dm                                          PIM dense-mode.                                                                  [5.0]
       # diagnose ip router pim-dm all [arg] [arg]                          All debugging.                                                                   [5.0] 
       # diagnose ip router pim-dm context [arg] [arg]                      VF-VRF context debugging.                                                        [5.0] 
       # diagnose ip router pim-dm decode [arg] [arg]                       Message decode debugging.                                                        [5.0] 
       # diagnose ip router pim-dm encode [arg] [arg]                       Message encode debugging.                                                        [5.0] 
       # diagnose ip router pim-dm fsm [arg] [arg]                          FSM debugging.                                                                   [5.0] 
       # diagnose ip router pim-dm level critical                           Critical level.                                                                  [5.0] 
       # diagnose ip router pim-dm level error                              Error level.                                                                     [5.0] 
       # diagnose ip router pim-dm level info                               Information level.                                                               [5.0] 
       # diagnose ip router pim-dm level none                               None level.                                                                      [5.0] 
       # diagnose ip router pim-dm level warn                               Warning level.                                                                   [5.0] 
       # diagnose ip router pim-dm mrt [arg] [arg]                          Multicast-route-table debugging.                                                 [5.0] 
       # diagnose ip router pim-dm nexthop [arg] [arg]                      Nexthop debugging.                                                               [5.0] 
       # diagnose ip router pim-dm nsm [arg] [arg]                          NSM interaction debugging.                                                       [5.0] 
       # diagnose ip router pim-dm show                                     Show status of PIM dense-mode debugging.                                         [5.0] 
       # diagnose ip router pim-dm vif [arg] [arg]                          Multicast VI debugging.                                                          [5.0] 
       # diagnose ip router pim-sm                                          PIM sparse-mode.                                                                 [5.0]
       # diagnose ip router pim-sm all [arg] [arg]                          All debugging.                                                                   [5.0] 
       # diagnose ip router pim-sm events [arg] [arg]                       Events debugging.                                                                [5.0] 
       # diagnose ip router pim-sm level critical                           Critical level.                                                                  [5.0] 
       # diagnose ip router pim-sm level error                              Error level.                                                                     [5.0] 
       # diagnose ip router pim-sm level info                               Information level.                                                               [5.0] 
       # diagnose ip router pim-sm level none                               None level.                                                                      [5.0] 
       # diagnose ip router pim-sm level warn                               Warning level.                                                                   [5.0] 
       # diagnose ip router pim-sm mfc [arg] [arg]                          MFC debugging.                                                                   [5.0] 
       # diagnose ip router pim-sm mib [arg] [arg]                          MIB debugging.                                                                   [5.0] 
       # diagnose ip router pim-sm nexthop [arg] [arg]                      Nexthop debugging.                                                               [5.0] 
       # diagnose ip router pim-sm nsm [arg] [arg]                          NSM debugging.                                                                   [5.0] 
       # diagnose ip router pim-sm packet all [arg] [arg]                   All packet debugging.                                                            [5.0] 
       # diagnose ip router pim-sm packet in [arg] [arg]                    Incoming packet debugging.                                                       [5.0] 
       # diagnose ip router pim-sm packet out [arg] [arg]                   Outgoing packet debugging.                                                       [5.0] 
       # diagnose ip router pim-sm show                                     Show status of PIM sparse-mode debugging.                                        [5.0] 
       # diagnose ip router pim-sm state [arg] [arg]                        State debugging.                                                                 [5.0] 
       # diagnose ip router pim-sm timer all [arg] [arg]                    All timer debugging.                                                             [5.0] 
       # diagnose ip router pim-sm timer assert all [arg] [arg]             All assert timers.                                                               [5.0] 
       # diagnose ip router pim-sm timer assert at [arg] [arg]              Assert timer.                                                                    [5.0] 
       # diagnose ip router pim-sm timer bsr all [arg] [arg]                All BSR timers.                                                                  [5.0] 
       # diagnose ip router pim-sm timer bsr bst [arg] [arg]                Bootstrap timer.                                                                 [5.0] 
       # diagnose ip router pim-sm timer bsr crp [arg] [arg]                Candidate-RP timer.                                                              [5.0] 
       # diagnose ip router pim-sm timer hello all [arg] [arg]              All hello-related timers.                                                        [5.0] 
       # diagnose ip router pim-sm timer hello ht [arg] [arg]               Hello timer.                                                                     [5.0] 
       # diagnose ip router pim-sm timer hello nlt [arg] [arg]              Hello timer debugging.                                                           [5.0] 
       # diagnose ip router pim-sm timer hello tht [arg] [arg]              Triggered hello timer.                                                           [5.0] 
       # diagnose ip router pim-sm timer joinprune all [arg] [arg]          All join prune timers.                                                           [5.0] 
       # diagnose ip router pim-sm timer joinprune et [arg] [arg]           Expiry timer.                                                                    [5.0] 
       # diagnose ip router pim-sm timer joinprune jt [arg] [arg]           Join prune timer.                                                                [5.0] 
       # diagnose ip router pim-sm timer joinprune kat [arg] [arg]          Keep alive timer.                                                                [5.0] 
       # diagnose ip router pim-sm timer joinprune ot [arg] [arg]           Override timer.                                                                  [5.0] 
       # diagnose ip router pim-sm timer joinprune ppt [arg] [arg]          Prune pending timer.                                                             [5.0] 
       # diagnose ip router pim-sm timer register all [arg] [arg]           All register timers.                                                             [5.0] 
       # diagnose ip router pim-sm timer register rst [arg] [arg]           Register stop timer.                                                             [5.0] 
       # diagnose ip router rip                                             RIP protocol.                                                                    [5.0]
       # diagnose ip router rip all [arg]                                   Enable all debugging.                                                            [5.0] 
       # diagnose ip router rip events [arg]                                RIP events.                                                                      [5.0] 
       # diagnose ip router rip level critical                              Critical level.                                                                  [5.0] 
       # diagnose ip router rip level error                                 Error level.                                                                     [5.0] 
       # diagnose ip router rip level info                                  Information level.                                                               [5.0] 
       # diagnose ip router rip level none                                  None level.                                                                      [5.0] 
       # diagnose ip router rip level warn                                  Warning level.                                                                   [5.0] 
       # diagnose ip router rip packet-receive [arg]                        RIP receive events.                                                              [5.0] 
       # diagnose ip router rip packet-send [arg]                           RIP send events.                                                                 [5.0] 
       # diagnose ip router rip show                                        Show status of RIP debugging.                                                    [5.0] 

ip rtcache

       # diagnose ip rtcache                                                Routing cache.                                                                   [5.0][5.2]

ip tcp

       # diagnose ip tcp [flush | list]                                     TCP sockets.                                                                     [5.0][5.2]

ip udp

       # diagnose ip udp [flush | list]                                     UDP sockets.                                                                     [5.0][5.2]

ips

ips anomaly

       # diagnose ips anomaly clear                                         Clear anomaly meters.                                                            [5.0]
       # diagnose ips anomaly config                                        List DoS-sensor.                                                                 [5.0]
       DoS sensors in kernel vd 0:
       DoS id 1 proxy 0
         0 tcp_syn_flood status 1 log 1 nac 0 action 7 threshold 2000
         1 tcp_port_scan status 1 log 1 nac 0 action 0 threshold 1000
         2 tcp_src_session status 1 log 1 nac 0 action 0 threshold 5000
         3 tcp_dst_session status 1 log 1 nac 0 action 0 threshold 5000
         4 udp_flood status 1 log 1 nac 0 action 7 threshold 2000
         5 udp_scan status 1 log 1 nac 0 action 0 threshold 2000
         6 udp_src_session status 1 log 1 nac 0 action 0 threshold 5000
         7 udp_dst_session status 1 log 1 nac 0 action 7 threshold 5000
         8 icmp_flood status 1 log 1 nac 0 action 7 threshold 250
         9 icmp_sweep status 1 log 1 nac 0 action 0 threshold 100
         10 icmp_src_session status 1 log 1 nac 0 action 0 threshold 300
         11 icmp_dst_session status 1 log 1 nac 0 action 0 threshold 1000
         12 ip_src_session status 0 log 0 nac 0 action 0 threshold 5000
         13 ip_dst_session status 0 log 0 nac 0 action 0 threshold 5000
         14 sctp_flood status 0 log 0 nac 0 action 0 threshold 2000
         15 sctp_scan status 0 log 0 nac 0 action 0 threshold 1000
         16 sctp_src_session status 0 log 0 nac 0 action 0 threshold 5000
         17 sctp_dst_session status 0 log 0 nac 0 action 0 threshold 5000
       total # DoS sensors: 1.
       # diagnose ips anomaly filter clear                                  Clear anomaly filter.                                                            [5.0]
       # diagnose ips anomaly filter freq [Frequency from] [Frequency to]   Frequency                                                                        [5.0]
       # diagnose ips anomaly filter id [0-11]                              Anomaly ID.                                                                      [5.0]
       # diagnose ips anomaly filter id [0-11]                              IP and subnet mask.                                                              [5.0]
       # diagnose ips anomaly filter pps [PPS from]                         pps                                                                              [5.0]
       # diagnose ips anomaly list                                          List anomaly meters.                                                             [5.0]
       list nids meter:
       id=udp_dst_session    ip=198.41.0.4 dos_id=1 exp=5956 pps=0 freq=0
       id=udp_flood          ip=198.41.0.4 dos_id=1 exp=954 pps=0 freq=10
       id=udp_src_session    ip=193.193.135.65 dos_id=1 exp=5956 pps=0 freq=0
       id=udp_scan           ip=193.193.135.65 dos_id=1 exp=954 pps=0 freq=9
       id=udp_flood          ip=193.193.135.66 dos_id=1 exp=917 pps=1 freq=1
       id=udp_dst_session    ip=193.193.135.95 dos_id=1 exp=5652 pps=0 freq=0
       id=udp_flood          ip=193.193.135.95 dos_id=1 exp=650 pps=2 freq=2
       id=udp_dst_session    ip=192.228.79.201 dos_id=1 exp=5819 pps=0 freq=0
       id=udp_flood          ip=192.228.79.201 dos_id=1 exp=817 pps=1 freq=1
       total # of nids meters: 9.
       # diagnose ips anomaly status                                        List anomaly status.                                                             [5.0]
       meter budget: 100000
       meter used: 8/8
       meter depth: 2
       
       sensor active: 1
       sensor pending: 0

ips anomaly6

       # diagnose ips anomaly6 clear                                        Clear anomaly meters.                                                            [5.0]
       # diagnose ips anomaly6 config                                       List DoS-sensor.                                                                 [5.0]
       DoS sensors in kernel vd 0:
       total # DoS sensors: 0.
       # diagnose ips anomaly6 filter clear                                 Clear anomaly filter.                                                            [5.0]
       
       # diagnose ips anomaly6 filter freq [Frequency from]                 Frequency                                                                        [5.0]
       
       # diagnose ips anomaly6 filter id [0-11]                             Anomaly ID.                                                                      [5.0]
       
       # diagnose ips anomaly6 filter ip [IP address and Subnet Mask]       IP and subnet mask.                                                              [5.0]
       
       # diagnose ips anomaly6 filter pps [PPS from]                        pps                                                                              [5.0]
       
       # diagnose ips anomaly6 list                                         List anomaly meters.                                                             [5.0]
       list nids meter:
       total # of nids meters: 0.
       # diagnose ips anomaly6 status                                       List anomaly status.                                                             [5.0]
       meter budget: 100000
       meter used: 0/0
       meter depth: 0
       
       sensor active: 0
       sensor pending: 0

ips config

       # diagnose ips config disable log-verbose                            log-verbose                                                                      [5.0]  
       # diagnose ips config enable log-verbose                             log-verbose                                                                      [5.0]

ips debug

       # diagnose ips debug disable all                                     all                                                                              [5.0]
       # diagnose ips debug disable av                                      av                                                                               [5.0]
       # diagnose ips debug disable content                                 content                                                                          [5.0]
       # diagnose ips debug disable content_detail                          content_detail                                                                   [5.0]
       # diagnose ips debug disable detect                                  detect                                                                           [5.0]
       # diagnose ips debug disable dissector                               dissector                                                                        [5.0]
       # diagnose ips debug disable dns                                     dns                                                                              [5.0]
       # diagnose ips debug disable error                                   error                                                                            [5.0]
       # diagnose ips debug disable http                                    http                                                                             [5.0]
       # diagnose ips debug disable im                                      im                                                                               [5.0]
       # diagnose ips debug disable init                                    init                                                                             [5.0]
       # diagnose ips debug disable ipsa                                    ipsa                                                                             [5.0]
       # diagnose ips debug disable log                                     log                                                                              [5.0]
       # diagnose ips debug disable mail                                    mail                                                                             [5.0]
       # diagnose ips debug disable mime                                    mime                                                                             [5.0]
       # diagnose ips debug disable p2p                                     p2p                                                                              [5.0]
       # diagnose ips debug disable packet                                  packet                                                                           [5.0]
       # diagnose ips debug disable packet_detail                           packet_detail                                                                    [5.0]
       # diagnose ips debug disable packet_dump                             packet_dump                                                                      [5.0]
       # diagnose ips debug disable parse                                   parse                                                                            [5.0]
       # diagnose ips debug disable proxy                                   proxy                                                                            [5.0]
       # diagnose ips debug disable rpc                                     rpc                                                                              [5.0]
       # diagnose ips debug disable session                                 session                                                                          [5.0]
       # diagnose ips debug disable ssh                                     ssh                                                                              [5.0]
       # diagnose ips debug disable ssl                                     ssl                                                                              [5.0]
       # diagnose ips debug disable state                                   state                                                                            [5.0]
       # diagnose ips debug disable tcp                                     tcp                                                                              [5.0]
       # diagnose ips debug disable timeout                                 timeout                                                                          [5.0]
       # diagnose ips debug disable urlfilter                               urlfilter                                                                        [5.0]
       # diagnose ips debug disable voip                                    voip                                                                             [5.0]
       # diagnose ips debug disable warn                                    warn                                                                             [5.0]
       # diagnose ips debug enable all                                      all                                                                              [5.0]
       # diagnose ips debug enable av                                       av                                                                               [5.0]
       # diagnose ips debug enable content                                  content                                                                          [5.0]
       # diagnose ips debug enable content_detail                           content_detail                                                                   [5.0]
       # diagnose ips debug enable detect                                   detect                                                                           [5.0]
       # diagnose ips debug enable dissector                                dissector                                                                        [5.0]
       # diagnose ips debug enable dns                                      dns                                                                              [5.0]
       # diagnose ips debug enable error                                    error                                                                            [5.0]
       # diagnose ips debug enable http                                     http                                                                             [5.0]
       # diagnose ips debug enable im                                       im                                                                               [5.0]
       # diagnose ips debug enable init                                     init                                                                             [5.0]
       # diagnose ips debug enable ipsa                                     ipsa                                                                             [5.0]
       # diagnose ips debug enable log                                      log                                                                              [5.0]
       # diagnose ips debug enable mail                                     mail                                                                             [5.0]
       # diagnose ips debug enable mime                                     mime                                                                             [5.0]
       # diagnose ips debug enable p2p                                      p2p                                                                              [5.0]
       # diagnose ips debug enable packet                                   packet                                                                           [5.0]
       # diagnose ips debug enable packet_detail                            packet_detail                                                                    [5.0]
       # diagnose ips debug enable packet_dump                              packet_dump                                                                      [5.0]
       # diagnose ips debug enable parse                                    parse                                                                            [5.0]
       # diagnose ips debug enable proxy                                    proxy                                                                            [5.0]
       # diagnose ips debug enable rpc                                      rpc                                                                              [5.0]
       # diagnose ips debug enable session                                  session                                                                          [5.0]
       # diagnose ips debug enable ssh                                      ssh                                                                              [5.0]
       # diagnose ips debug enable ssl                                      ssl                                                                              [5.0]
       # diagnose ips debug enable state                                    state                                                                            [5.0]
       # diagnose ips debug enable tcp                                      tcp                                                                              [5.0]
       # diagnose ips debug enable timeout                                  timeout                                                                          [5.0]
       # diagnose ips debug enable urlfilter                                urlfilter                                                                        [5.0]
       # diagnose ips debug enable voip                                     voip                                                                             [5.0]
       # diagnose ips debug enable warn                                     warn                                                                             [5.0]

ips dissector

       # diagnose ips dissector dump                                        dump                                                                             [5.0]
       # diagnose ips dissector status                                      status                                                                           [5.0]

ips filter

       # diagnose ips filter asm [assembled packets]                        asm                                                                              [5.0]
       # diagnose ips filter clear                                          clear                                                                            [5.0]
       # diagnose ips filter ip [IPv4 address]                              ip                                                                               [5.0]
       # diagnose ips filter length [session length]                        length                                                                           [5.0]
       # diagnose ips filter port [port]                                    port                                                                             [5.0]
       # diagnose ips filter protocol [protocol number]                     protocol                                                                         [5.0]
       # diagnose ips filter session [session id]                           session                                                                          [5.0]
       # diagnose ips filter status                                         status                                                                           [5.0]
       2015-11-17 00:47:48 DEBUG FILTER:
       2015-11-17 00:47:48   ip          0.0.0.0  0.0.0.0
       2015-11-17 00:47:48   port        0
       2015-11-17 00:47:48   protocol    0
       2015-11-17 00:47:48   session id  0
       2015-11-17 00:47:48   l7          0
       2015-11-17 00:47:48   asm         0
       2015-11-17 00:47:48   length      0

ips global

       # diagnose ips global rule reload                                    Reload rule file.                                                                [5.0]

ips memory

       # diagnose ips memory compact                                        compact                                                                          [5.0]
       # diagnose ips memory list                                           list                                                                             [5.0]
       # diagnose ips memory pool                                           pool                                                                             [5.0]
       # diagnose ips memory status                                         status                                                                           [5.0] 

ips packet

       # diagnose ips packet clear                                          clear                                                                            [5.0] 
       # diagnose ips packet status                                         status                                                                           [5.0]

ips raw

       # diagnose ips raw clear                                             Clear status.                                                                    [5.0]
       # diagnose ips raw status                                            Show status.                                                                     [5.0]
       raw total packets: 428
       raw open:          0
       raw dropped:       0
       
       l2 total packets: 0
       l2 open:          0
       l2 dropped:       0

ips session

       # diagnose ips session clear                                         clear                                                                            [5.0]
       # diagnose ips session content                                       content                                                                          [5.0]
       # diagnose ips session list                                          list                                                                             [5.0]
       # diagnose ips session performance                                   performance                                                                      [5.0]
       # diagnose ips session status                                        status                                                                           [5.0]

ips share

       # diagnose ips share clear [pool]                                    clear                                                                            [5.0]
       # diagnose ips share list [pool]                                     list                                                                             [5.0]
       # diagnose ips share pool                                            pool                                                                             [5.0]

ips signature

       # diagnose ips signature av                                          av                                                                               [5.0]
       2015-11-17 00:52:41 FLOW-AV SIGNATURE STATISTICS:
       2015-11-17 00:52:41 version: 0.00000
       2015-11-17 00:52:41 virus: 0
       2015-11-17 00:52:41 grayware: 0
       2015-11-17 00:52:41 valid: 0, purge: 0
       # diagnose ips signature cycle                                       cycle                                                                            [5.0]
       2015-11-17 00:52:53 SIGNATURE PERFORMANCE: 34 packets
       2015-11-17 00:52:53        Total       Hits          Cycles         Per-Hit       Hits          Cycles
       2015-11-17 00:52:53 --------------------------------------------------------------------------------
       2015-11-17 00:52:53 
       # diagnose ips signature hit [top N]                                 hit                                                                              [5.0]
       2015-11-17 00:52:25 SIGNATURE PERFORMANCE: 34 packets
       2015-11-17 00:52:25      Pattern       Hits          Cycles         Non-Pat       Hits          Cycles
       2015-11-17 00:52:25 --------------------------------------------------------------------------------
       2015-11-17 00:52:25 
       # diagnose ips signature status [severity mask]                      status                                                                           [5.0]
       # diagnose ips signature status
       2015-11-17 00:53:19 SIGNATURE STATISTICS: 23
       2015-11-17 00:53:19 ---------------- 0 ----------------
       2015-11-17 00:53:19 av:2015-11-17 00:53:19 
       2015-11-17 00:53:19 webf: http:0x0 https:0x0 rules:0
       2015-11-17 00:53:19 dlp: rules:02015-11-17 00:53:19 
       2015-11-17 00:53:19 spam: rules:0
       2015-11-17 00:53:19 ips: enabled:0 pattern:0, engine:0
       2015-11-17 00:53:19 ---------------- 1 ----------------
       2015-11-17 00:53:19 av:2015-11-17 00:53:19 
       2015-11-17 00:53:19 webf: http:0x0 https:0x0 rules:0
       2015-11-17 00:53:19 dlp: rules:02015-11-17 00:53:19 
       2015-11-17 00:53:19 spam: rules:0
       2015-11-17 00:53:19 ips: enabled:6059 pattern:6856, engine:25
       2015-11-17 00:53:19 ---------------- 2 ----------------
       2015-11-17 00:53:19 av:2015-11-17 00:53:19 
       2015-11-17 00:53:19 webf: http:0x0 https:0x0 rules:0
       2015-11-17 00:53:19 dlp: rules:02015-11-17 00:53:19 
       2015-11-17 00:53:19 spam: rules:0
       2015-11-17 00:53:19 ips: enabled:6059 pattern:6856, engine:25
       2015-11-17 00:53:19 ---------------- 3 ----------------
       2015-11-17 00:53:19 av:2015-11-17 00:53:19 
       2015-11-17 00:53:19 webf: http:0x0 https:0x0 rules:0
       2015-11-17 00:53:19 dlp: rules:02015-11-17 00:53:19 
       2015-11-17 00:53:19 spam: rules:0
       2015-11-17 00:53:19 ips: enabled:6059 pattern:6856, engine:25
       2015-11-17 00:53:19 ---------------- 4 ----------------
       .......................................................
       .......................................................
       .......................................................
       .......................................................

ips ssl

       # diagnose ips ssl bypass disable                                    disable bypasse                                                                  [5.0]
       # diagnose ips ssl bypass enable                                     enable bypass                                                                    [5.0]
       # diagnose ips ssl clear                                             clear                                                                            [5.0]
       # diagnose ips ssl debug dbg                                         debug dbg                                                                        [5.0]
       # diagnose ips ssl debug err                                         debug error                                                                      [5.0]
       # diagnose ips ssl debug noise                                       debug noise                                                                      [5.0] 
       # diagnose ips ssl debug none                                        debug none                                                                       [5.0] 
       # diagnose ips ssl debug warn                                        debug warn                                                                       [5.0]
       # diagnose ips ssl noscan disable                                    disable noscan                                                                   [5.0]
       # diagnose ips ssl noscan enable                                     enable noscan                                                                    [5.0] 
       # diagnose ips ssl status                                            status                                                                           [5.0]
       2015-11-17 00:57:06 -------------------- SSL statistics ---------------------
       2015-11-17 00:57:06 SSL transactions: C/T/E/S
       
         SSL v3:  0/0/0/0
         TLS 1.0: 0/0/0/0
         TLS 1.1: 0/0/0/0
         TLS 1.2: 0/0/0/0
       2015-11-17 00:57:06 ---------------------------------------------------------
       Cipher suites:
       
       2015-11-17 00:57:06 ---------------------------------------------------------
       Negotiated protocols:
       
         HTTP/1:  0
         HTTP/2:  0
         SPDY/2:  0
         SPDY/3:  0
         SPDY/4:  0
       2015-11-17 00:57:06 ---------------------------------------------------------
       Packets:
       
         Received: 0
         Sent:     0
         Error:    0
         Err rate: 0.00%
       2015-11-17 00:57:06 ---------------------------------------------------------
       Key Exchange:
       
         Certificate cache entries:   0
         Certificate cache size:      0
         Certificate cache saving:    0
         Certificate cache hits:      0
         Certificate cache miss:      0
         Certificate cache reset:     0
         Different certificate size:  0
         Different DH client key:     0
         Different DH server key:     0
         Different DH signature:      0
         Different ECDH client key:   0
         Different ECDH server key:   0
         Different ECDH signature:    0
         Encrypt-then-MAC:            0
         Truncated HMAC:              0
         Extended Master Secret:      0
         OCSP stapling:               0
         Decryption only:             0
         Stitched ciphers:            0
       2015-11-17 00:57:06 ---------------------------------------------------------
       Error counters:
       
         Unknown SSL records:         0
         Unsupported SSL versions:    0
         Unsupported cipher suites:   0
         Malformed SSL records:       0
         Decryption failure:          0
         Cert replacement failure:    0
         Unknown CA alerts:           0
         Client certificates:         0
         Exempted:                    0
       2015-11-17 00:57:06 ---------------------------------------------------------

ips urlfilter

       # diagnose ips urlfilter clear                                       clear                                                                            [5.0]
       # diagnose ips urlfilter status                                      status                                                                           [5.0]
       2015-11-17 00:58:43 
       URL-FILTER STATISTICS:
       2015-11-17 00:58:43     request   response pending    error timeout   blocked   allowed
       2015-11-17 00:58:43           0          0       0        0       0         0         0

ipv6

ipv6 address

       # diagnose ipv6 address add [intf-name] [IPv6 prefix]                Add IPv6 address.                                                                [5.0]
       # diagnose ipv6 address anycast [arg] [arg]                          Add IPv6 anycast address.                                                        [5.0] 
       # diagnose ipv6 address delete [intf-name] [IPv6 prefix]             Delete IPv6 address.                                                             [5.0]
       # diagnose ipv6 address flush                                        Flush IPv6 addresses.                                                            [5.0]
       # diagnose ipv6 address list                                         List IPv6 addresses.                                                             [5.0]
       dev=75 devname=vsys_fgfm flag=P scope=254 prefix=128 addr=::1 
       dev=73 devname=vsys_ha flag=P scope=254 prefix=128 addr=::1 
       dev=66 devname=root flag=P scope=254 prefix=128 addr=::1 
       # diagnose ipv6 address multicast [intf-name] [IPv6 prefix]          Add IPv6 multicast address.                                                      [5.0]

ipv6 devconf

       # diagnose ipv6 devconf                                              IPv6 device config.                                                              [5.0][5.2]
       
       # diagnose ipv6 devconf accept-dad [0,1, or 2]                       IPv6 Duplicate Address Detection.                                                [5.0] 
       # diagnose ipv6 devconf disable_ipv6 [0 or 1]                        Disable/enable IPv6 operation.                                                   [5.0] 
       
       0: disable DAD; 
       1: enable DAD; 
       2: enable DAD, and disable IPv6 operation if MAC-based duplicate link-local address has been found 
       0: enabling IPv6 operation; 
       1: disabling. 

ipv6 ipv6-tunnel

       # diagnose ipv6 ipv6-tunnel                                                                                tunnels                                   [5.0][5.2]
       # diagnose ipv6 ipv6-tunnel add [Tunnel name] [intf-name] [Source IP address] [Destination IP address]     Add tunnel.                               [5.0] 
       # diagnose ipv6 ipv6-tunnel delete [Tunnel name]                                                           Delete tunnel.                            [5.0] 
       # diagnose ipv6 ipv6-tunnel list                                                                           Show tunnels.                             [5.0] 

ipv6 multicast

       # diagnose ipv6 multicast                                           Multicast information.                                                           [5.0][5.2]
       
       # diagnose ipv6 multicast mroute                                    Multicast FIB.                                                                   [5.0] 
       # diagnose ipv6 multicast vif                                       Multicast VIF device info.                                                       [5.0] 
       # diagnose ipv6 multicast status                                    Multicast status.                                                                [5.0]  
       PIM6 OFF      Assert: OFF     Socket in use: FALSE

ipv6 neighbor-cache

       # diagnose ipv6 neighbor-cache                                                 IPv6 neighbor-cache table.                                            [5.0][5.2]
       # diagnose ipv6 neighbor-cache add [intf-name] [IPv6 address] [MAC address]    Add an IPv6 neighbor cache entry.                                     [5.0] 
       # diagnose ipv6 neighbor-cache delete [intf-name] [IPv6 address]               Delete an IPv6 neighbor cache entry.                                  [5.0] 
       # diagnose ipv6 neighbor-cache flush [intf-name]                               Flush IPv6 neighbor cache table.                                      [5.0] 
       # diagnose ipv6 neighbor-cache list                                            Show IPv6 neighbor cache table.                                       [5.0] 
       ifindex=66 ifname=root :: 00:00:00:00:00:00 state=00000040 use=345690114 confirm=345696114 update=345690114 ref=1

ipv6 route

       # diagnose ipv6 route [flush | list]                                 IPv6 routing table.                                                             [5.0][5.2]
       # diagnose ipv6 route list
       vf=0 type=02 protocol=0(unspec) flag=80200001 oif=66(root) dst:::1/128 gwy::: prio=100 pmtu=16436
       vf=0 type=07 protocol=3(boot) flag=00200200 oif=66(root) dst:fe80::/10 prio=100 pmtu=16436
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=67(ssl.root) dst:fe80::/10 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=70(ipsec-fc) dst:fe80::/10 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=71(ipsec-ios) dst:fe80::/10 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=72(ipsec-cisco) dst:fe80::/10 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=4(dmz) dst:fe80::/10 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=69(fortinet4guest) dst:fe80::/10 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=68(fortinet4intern) dst:fe80::/10 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=7(internal1) dst:fe80::/10 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=8(internal2) dst:fe80::/10 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=9(internal3) dst:fe80::/10 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=10(internal4) dst:fe80::/10 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=11(internal5) dst:fe80::/10 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=12(internal6) dst:fe80::/10 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=13(internal7) dst:fe80::/10 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=63(modem) dst:fe80::/10 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=5(wan1) dst:fe80::/10 prio=100 pmtu=1492
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=6(wan2) dst:fe80::/10 prio=100 pmtu=1500
       vf=0 type=07 protocol=3(boot) flag=00200200 oif=66(root) dst:ff00::/8 prio=100 pmtu=16436
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=67(ssl.root) dst:ff00::/8 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=70(ipsec-fc) dst:ff00::/8 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=71(ipsec-ios) dst:ff00::/8 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=72(ipsec-cisco) dst:ff00::/8 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=4(dmz) dst:ff00::/8 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=69(fortinet4guest) dst:ff00::/8 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=68(fortinet4intern) dst:ff00::/8 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=7(internal1) dst:ff00::/8 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=8(internal2) dst:ff00::/8 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=9(internal3) dst:ff00::/8 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=10(internal4) dst:ff00::/8 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=11(internal5) dst:ff00::/8 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=12(internal6) dst:ff00::/8 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=13(internal7) dst:ff00::/8 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=63(modem) dst:ff00::/8 prio=100 pmtu=1500
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=5(wan1) dst:ff00::/8 prio=100 pmtu=1492
       vf=0 type=01 protocol=2(kernel) flag=00040001 oif=6(wan2) dst:ff00::/8 prio=100 pmtu=1500
       vf=0 type=07 protocol=0(unspec) flag=00200200 oif=66(root) prio=ffffffff pmtu=0

ipv6 router

       # diagnose ipv6 router ospf                                          OSPFv3 protocol.                                                                 [5.0]
       # diagnose ipv6 router ospf all [arg] [arg]                          All OSPFv3 debug.                                                                [5.0] 
       # diagnose ipv6 router ospf events [arg] [arg]                       OSPFv3 Events.                                                                   [5.0] 
       # diagnose ipv6 router ospf ifsm [arg] [arg]                         OSPFv3 Interface State Machine.                                                  [5.0] 
       # diagnose ipv6 router ospf level critical                           Critical level.                                                                  [5.0] 
       # diagnose ipv6 router ospf level error                              Error level.                                                                     [5.0] 
       # diagnose ipv6 router ospf level info                               Information level.                                                               [5.0] 
       # diagnose ipv6 router ospf level none                               None level.                                                                      [5.0] 
       # diagnose ipv6 router ospf level warn                               Warning level.                                                                   [5.0] 
       # diagnose ipv6 router ospf lsa [arg] [arg]                          OSPFv3 Link State Advertisement.                                                 [5.0] 
       # diagnose ipv6 router ospf nfsm [arg] [arg]                         OSPFv3 Neighbor State Machine.                                                   [5.0] 
       # diagnose ipv6 router ospf nsm [arg] [arg]                          OSPFv3 NSM information.                                                          [5.0] 
       # diagnose ipv6 router ospf packet [arg] [arg]                       OSPFv3 Packets.                                                                  [5.0] 
       # diagnose ipv6 router ospf route [arg] [arg]                        OSPFv3 route information.                                                        [5.0] 
       # diagnose ipv6 router ospf show                                     Show status of OSPFv3 debugging.                                                 [5.0] 
       OSPFv3 debugging status:
         OSPFv3 debugging level is CRITICAL
       # diagnose ipv6 router rip                                           RIPng protocol.                                                                  [5.0]
       # diagnose ipv6 router rip all [enable | disable]                    Enable all debugging.                                                            [5.0] 
       # diagnose ipv6 router rip events [arg]                              RIPng events.                                                                    [5.0] 
       # diagnose ipv6 router rip level critical                            Critical level.                                                                  [5.0] 
       # diagnose ipv6 router rip level error                               Error level.                                                                     [5.0] 
       # diagnose ipv6 router rip level info                                Information level.                                                               [5.0] 
       # diagnose ipv6 router rip level none                                None level.                                                                      [5.0] 
       # diagnose ipv6 router rip level warn                                Warning level.                                                                   [5.0] 
       # diagnose ipv6 router rip packet-receive [arg]                      RIPng receive events.                                                            [5.0] 
       # diagnose ipv6 router rip packet-send [arg]                         RIPng send events.                                                               [5.0] 
       # diagnose ipv6 router rip show                                      Show status of RIPng debugging.                                                  [5.0] 
       RIPng debugging status:
         RIPng debugging level is INFO

ipv6 sit-tunnel

       # diagnose ipv6 sit-tunnel                                                                               tunnels                                      [5.0][5.2]
       # diagnose ipv6 sit-tunnel add [Tunnel name] [intf-name] [Source IP address] [Destination IP address]    Add tunnel.                                  [5.0] 
       # diagnose ipv6 sit-tunnel delete [Tunnel name]                                                          Delete tunnel.                               [5.0] 
       # diagnose ipv6 sit-tunnel list                                                                          Show tunnels.                                [5.0] 
       total tunnel = 0:

lldptx

Link Layer Transmission Protocol (LLDP) Transmitter diagnostics.

lldptx log

       # diagnose lldptx log                                                Debug log.                                                                       [5.2]

lldptx restart

       # diagnose lldptx restart                                            Restart LLDP transmitter.                                                        [5.2]

lldptx scheduler-times

       # diagnose lldptx scheduler-times                                    Scheduler times.                                                                 [5.2]

lldptx stats

       # diagnose lldptx stats                                              Source visibility statistics.                                                    [5.2]

log

log alertconsole

       # diagnose log alertconsole                                         alertconsole                                                                      [5.0][5.2]
       # diagnose log alertconsole clear                                   Clear alert messages.                                                             [5.0] 
       Cleared all alert console messages.
       # diagnose log alertconsole fgd-retrieve                            Retrieve FortiGuard alerts.                                                       [5.0] 
       retrieve FortiGuard alert console messages successful
       # diagnose log alertconsole list                                    List current alert messages.                                                      [5.0] 
       There are 0 alert console messages:
       # diagnose log alertconsole test                                    Generate alert messages (showed after generating by list).                        [5.0] 
       There are 24 alert console messages:
       2015-11-17 16:19:07 VDOM Test policy X
       2015-11-17 16:19:07 FortiClient license maximum has been reached. Attempts failed: 10
       2015-11-17 16:19:07 FortiGuard New Attack DB FortiGuard new attack DB release
       2015-11-17 16:19:07 FortiGuard New AntiVirus DB FortiGuard new antivirus DB release
       2015-11-17 16:19:07 FortiGuard Latest Attack FortiGuard latest attack
       2015-11-17 16:19:07 FortiGuard Latest Virus FortiGuard latest virus
       2015-11-17 16:19:07 FortiGuard Latest Threat FortiGuard latest threat
       2015-11-17 16:19:07 FortiGuard Advisory FortiGuard Advisory
       2015-11-17 16:19:07 Administrator  login failed
       2015-11-17 16:19:07 The bypass port pairs have entered bypass mode
       2015-11-17 16:19:07 FortiCloud daily quota has been reached
       2015-11-17 16:19:07 FortiCloud disk quota is 95% used
       2015-11-17 16:19:07 New firmware is available from FortiGuard
       2015-11-17 16:19:07 Log disk is unavailable
       2015-11-17 16:19:07 Log disk failure is imminent
       2015-11-17 16:19:07 Lost the connection to FortiAnalyzer (FLGxxx1234567890)
       2015-11-17 16:19:07 Found a new FortiAnalyzer (FLGxxx1234567890)
       2015-11-17 16:19:07 Firmware downgraded by test
       2015-11-17 16:19:07 System is rebooted and operating in USB mode with configurations from USB (read-only)
       2015-11-17 16:19:07 Fortigate has reached system connection limit for 30 seconds
       2015-11-17 16:19:07 Fortigate has reached connection limit for 30 seconds
       2015-11-17 16:19:07 Firmware upgraded by test
       2015-11-17 16:19:07 System shutdown test
       2015-11-17 16:19:07 System restart

log alertmail

       # diagnose log alertmail                                            alertmail                                                                         [5.0][5.2]
       # diagnose log alertmail authcode [recipient's email address]       Send a test authentication code.                                                  [5.0] 
       # diagnose log alertmail bugtest                                    Send a test bug report.                                                           [5.0] 
       # diagnose log alertmail test [Log level] [Number of messages]      Send a test alert mail.                                                           [5.0] 

log kernel-stats

       # diagnose log kernel-stats                                         Query logging statistics.                                                         [5.0][5.2]
       fgtlog: 1
       fgtlog 0: total-log=513617, failed-log=0

log test

       # diagnose log test                                                 Test miglog.                                                                      [5.0][5.2]
       generating a system event message with level - warning
       generating an infected virus message with level - warning
       generating a blocked virus message with level - warning
       generating a URL block message with level - warning
       generating a DLP message with level - warning
       generating an IPS log message
       generating an anomaly log message
       generating an application control IM message with level - information
       generating an IPv6 application control IM message with level - information
       generating deep application control logs with level - information
       generating an antispam message with level - notification
       generating an allowed traffic message with level - notice
       generating a multicast traffic message with level - notice
       generating a ipv6 traffic message with level - notice
       generating a wanopt traffic log message with level - notification
       generating a HA event message with level - warning
       generating netscan log messages with level - notice
       generating a VOIP event message with level - information
       generating a DNS event message with level - information
       generating authentication event messages
       generating a Forticlient message with level - information
       generating a URL block message with level - warning

log wireless-controller

       # diagnose log wireless-controller                                  Test wireless event log.                                                          [5.0][5.2]
       generating a wireless system restarted event message with level - notice
       generating a wireless system hostapd up event message with level - notice
       generating a wireless system hostapd down event message with level - notice
       generating a wireless ap status config rogue event message with level - notice
       generating a wireless ap status config accepted event message with level - notice
       generating a wireless ap status config suppressed event message with level - notice
       generating a wireless ap status config unclassified event message with level - notice
       generating a wireless ap status rogue ap detected event message with level - notice
       generating a wireless ap status rogue ap changed event message with level - notice
       generating a wireless ap status rogue ap off air event message with level - notice
       generating a wireless ap status rogue ap on air event message with level - notice
       generating a wireless ap status rogue ap off wire event message with level - notice
       generating a wireless ap status fake ap detected event message with level - notice
       generating a wireless ap status fake ap on air event message with level - notice
       generating a wireless ap status rogue ap suppressed event message with level - notice
       generating a wireless ap status rogue ap unsuppressed event message with level - notice
       generating 2 wireless ap status rogue ap on wire event message with level - warning
       generating a wireless wtp join event message with level - notice
       generating a wireless wtp leave event message with level - notice
       generating a wireless wtp fail event message with level - notice
       generating a wireless wtp update event message with level - notice
       generating a wireless wtp reset event message with level - notice
       generating a wireless wtp kick event message with level - notice
       generating a wireless wtp add failure event message with level - notice
       generating a wireless wtp config error event message with level - notice
       generating a wireless wtp sn mismatch event message with level - notice
       generating a wireless wtp add event message with level - notice
       generating a wireless wtp add xss event message with level - notice
       generating a wireless wtp cmdb add event message with level - notice
       generating a wireless wtp cmdb delete event message with level - notice
       generating a wireless wtp radio darrp start event message with level - notice
       generating a wireless wtp radio darrp channel event message with level - notice
       generating a wireless wtp radio darrp stop event message with level - notice
       generating a wireless wtp radio oper channel event message with level - notice
       generating a wireless wtp radio country config success event message with level - notice
       generating a wireless wtp radio oper country event message with level - notice
       generating a wireless wtp radio radar detected event message with level - notice
       generating a wireless wtp radio NOL removed event message with level - notice
       generating a wireless wtp radio config txpower event message with level - notice
       generating a wireless wtp radio oper txpower event message with level - notice
       generating a wireless wtp radio country config failure event message with level - error
       generating a wireless sta association event message with level - notice
       generating a wireless sta authentication event message with level - notice
       generating a wireless sta disassociation event message with level - notice
       generating a wireless sta deauthentication event message with level - notice
       generating a wireless sta idle event message with level - notice
       generating a wireless sta denial event message with level - notice
       generating a wireless sta kick event message with level - notice
       generating a wireless sta ip detected event message with level - notice
       generating a wireless sta leave wtp event message with level - notice
       generating a wireless sta disconnected by wtp event message with level - notice
       generating 2 wireless client load balance deny event message with level - notice
       generating a wireless client load balance retry event message with level - notice
       generating a wireless station presence detection event message with level - notice
       generating 10 wireless wids event message with level - notice

netlink

netlink aggregate

       # diagnose netlink aggregate                                        802.3ad link aggregation                                                          [5.2]

netlink backlog

       # diagnose netlink backlog get                                      Show backlog.                                                                     [5.0]
       Current backlog is 1000
       # diagnose netlink backlog set backlog                              backlog value                                                                     [5.0] 

netlink brctl

       # diagnose netlink brctl domain [name] [id]                         domain (Where  <name>  is the name of the forwarding domain to display.)          [5.0]
       # diagnose netlink brctl list [bridge_name]                         list                                                                              [5.0]
       list bridge information
       
       Total 0 bridges
       # diagnose netlink brctl name                                       name                                                                              [5.0]
       # diagnose netlink brctl name  [type "host" or "port"]              name                                                                              [5.0]  
       # diagnose netlink brctl name  [host]                               list existing bridge MAC table                                                    [5.0]  
       # diagnose netlink brctl name  [port]                               list the existing bridge port list                                                [5.0] 

netlink device

       # diagnose netlink device list                                      List devices.                                                                     [5.0]
         Interface|       bytes    packets errs drop fifo other compressed mcast colls
             lo.Rx:                   0                    0                    0                    0                    0                    0                    0                    0   N/A
               .Tx:                   0                    0                    0                    0                    0                    0                    0   N/A                    0
         dummy0.Rx:                   0                    0                    0                    0                    0                    0                    0                    0   N/A
               .Tx:                   0                    0                    0                    0                    0                    0                    0   N/A                    0
           eth0.Rx:                   0                    0                    0                    0                    0                    0                    0                    0   N/A
               .Tx:                   0                    0                    0                    0                    0                    0                    0   N/A                    0
            dmz.Rx:           587672773              2341158                    0                    0                    0                    0                    0                    0   N/A
               .Tx:           335251096              2287514                    0                    0                    0                    0                    0   N/A                    0
           wan1.Rx:          1261430295             14461232                    0                    0                    0                    0                    0                    0   N/A
               .Tx:          2168761410             22117673                    0                    0                    0                    0                    0   N/A                    0
           wan2.Rx:                   0                    0                    0                    0                    0                    0                    0                    0   N/A
               .Tx:                   0                    0                    0                    0                    0                    0                    0   N/A                    0
       internal1.Rx:            20194575                58535                    0                    0                    0                    0                    0                    0   N/A
               .Tx:            78959460              1315991                    0                    0                    0                    0                    0   N/A                    0
       internal2.Rx:                   0                    0                    0                    0                    0                    0                    0                    0   N/A
               .Tx:                   0                    0                    0                    0                    0                    0                    0   N/A                    0
       internal3.Rx:                   0                    0                    0                    0                    0                    0                    0                    0   N/A
               .Tx:                   0                    0                    0                    0                    0                    0                    0   N/A                    0
       internal4.Rx:                   0                    0                    0                    0                    0                    0                    0                    0   N/A
               .Tx:                   0                    0                    0                    0                    0                    0                    0   N/A                    0
       internal5.Rx:                   0                    0                    0                    0                    0                    0                    0                    0   N/A
               .Tx:                   0                    0                    0                    0                    0                    0                    0   N/A                    0
       internal6.Rx:                   0                    0                    0                    0                    0                    0                    0                    0   N/A
               .Tx:                   0                    0                    0                    0                    0                    0                    0   N/A                    0
       internal7.Rx:                   0                    0                    0                    0                    0                    0                    0                    0   N/A
               .Tx:                   0                    0                    0                    0                    0                    0                    0   N/A                    0

netlink dstmac

       # diagnose netlink dstmac flush                                     Destination MAC substitution flush                                                [5.0]
       # diagnose netlink dstmac list [name - Interface name]              Destination MAC substitution list                                                 [5.0]
       # diagnose netlink dstmac list
       dev=lo mac=00:00:00:00:00:00 rx_tcp_mss=0 tx_tcp_mss=0 overspill-threshold=0 bytes=0 over_bps=0 sampler_rate=0
       dev=dummy0 mac=00:00:00:00:00:00 rx_tcp_mss=0 tx_tcp_mss=0 overspill-threshold=0 bytes=0 over_bps=0 sampler_rate=0
       dev=eth0 mac=00:00:00:00:00:00 rx_tcp_mss=0 tx_tcp_mss=0 overspill-threshold=0 bytes=0 over_bps=0 sampler_rate=0
       dev=dmz mac=00:00:00:00:00:00 src-vis-os src-vis-host src-vis-user rx_tcp_mss=0 tx_tcp_mss=0 overspill-threshold=0 bytes=0 over_bps=0 sampler_rate=0
       dev=wan1 mac=00:00:00:00:00:00 policy rx_tcp_mss=0 tx_tcp_mss=0 overspill-threshold=0 bytes=0 over_bps=0 sampler_rate=0
       dev=wan2 mac=00:00:00:00:00:00 rx_tcp_mss=0 tx_tcp_mss=0 overspill-threshold=0 bytes=0 over_bps=0 sampler_rate=0
       dev=internal1 mac=00:00:00:00:00:00 src-vis-os src-vis-host src-vis-user rx_tcp_mss=0 tx_tcp_mss=0 overspill-threshold=0 bytes=0 over_bps=0 sampler_rate=0
       dev=internal2 mac=00:00:00:00:00:00 rx_tcp_mss=0 tx_tcp_mss=0 overspill-threshold=0 bytes=0 over_bps=0 sampler_rate=0
       dev=internal3 mac=00:00:00:00:00:00 rx_tcp_mss=0 tx_tcp_mss=0 overspill-threshold=0 bytes=0 over_bps=0 sampler_rate=0
       dev=internal4 mac=00:00:00:00:00:00 rx_tcp_mss=0 tx_tcp_mss=0 overspill-threshold=0 bytes=0 over_bps=0 sampler_rate=0
       dev=internal5 mac=00:00:00:00:00:00 rx_tcp_mss=0 tx_tcp_mss=0 overspill-threshold=0 bytes=0 over_bps=0 sampler_rate=0
       dev=internal6 mac=00:00:00:00:00:00 rx_tcp_mss=0 tx_tcp_mss=0 overspill-threshold=0 bytes=0 over_bps=0 sampler_rate=0
       dev=internal7 mac=00:00:00:00:00:00 rx_tcp_mss=0 tx_tcp_mss=0 overspill-threshold=0 bytes=0 over_bps=0 sampler_rate=0

netlink interface

       # diagnose netlink interface clear [Interface name]                 Clear interface counters.                                                         [5.0]
       # diagnose netlink interface list [Interface name]                  List interfaces.                                                                  [5.0]
       # diagnose netlink interface list
       if=lo family=00 type=772 index=1 mtu=16436 link=0 master=0
       ref=4 state=present fw_flags=0 flags=loopback 
       
       if=dummy0 family=00 type=1 index=2 mtu=1500 link=0 master=0
       ref=1 state=present fw_flags=0 flags=broadcast noarp 
       
       if=eth0 family=00 type=1 index=3 mtu=1500 link=0 master=0
       ref=3 state=present tx_sched fw_flags=0 flags=broadcast multicast 
       
       if=dmz family=00 type=1 index=4 mtu=1500 link=0 master=0
       ref=17 state=start present fw_flags=3800 flags=up broadcast run allmulti multicast 
       
       if=wan1 family=00 type=1 index=5 mtu=1492 link=0 master=0
       ref=14 state=start present fw_flags=10 flags=up broadcast run allmulti multicast 
       
       if=wan2 family=00 type=1 index=6 mtu=1500 link=0 master=0
       ref=7 state=present tx_sched fw_flags=0 flags=broadcast allmulti multicast 
       
       if=internal1 family=00 type=1 index=7 mtu=1500 link=0 master=0
       ref=14 state=start present fw_flags=3800 flags=up broadcast run allmulti multicast 
       
       if=internal2 family=00 type=1 index=8 mtu=1500 link=0 master=0
       ref=7 state=present tx_sched fw_flags=0 flags=broadcast allmulti multicast 
       
       if=internal3 family=00 type=1 index=9 mtu=1500 link=0 master=0
       ref=7 state=present tx_sched fw_flags=0 flags=broadcast allmulti multicast 
       
       if=internal4 family=00 type=1 index=10 mtu=1500 link=0 master=0
       ref=7 state=present tx_sched fw_flags=0 flags=broadcast allmulti multicast 
       
       if=internal5 family=00 type=1 index=11 mtu=1500 link=0 master=0
       ref=7 state=present tx_sched fw_flags=0 flags=broadcast allmulti multicast 
       
       if=internal6 family=00 type=1 index=12 mtu=1500 link=0 master=0
       ref=7 state=present tx_sched fw_flags=0 flags=broadcast allmulti multicast 
       
       if=internal7 family=00 type=1 index=13 mtu=1500 link=0 master=0
       ref=7 state=present tx_sched fw_flags=0 flags=broadcast allmulti multicast 

netlink qlen

       # diagnose netlink qlen get [Interface name]                        Get queue length.                                                                 [5.0]
       TX queue length for interface wan1 is 100
       # diagnose netlink qlen set [Interface name]                        Queue length.                                                                     [5.0]

netlink redundant

       # diagnose netlink redundant                                        redundant interfaces                                                              [5.2]

netlink switch

       # diagnose netlink switch list                                      list switch ports                                                                 [5.0]

npl

npl npl_debug

       # diagnose npl npl_debug [param1] [param2] [param3]                 npl_diag.                                                                         [5.2]

npu

npu nplite

       # diagnose npu nplite [enable | disable]                            Network Processor SoC.                                                            [5.2]

radiusd

Radius daemon diagnostic commands.

radiusd test

       # diagnose radiusd test [Test level]                                Send test command to RADIUS daemon.                                               [5.0][5.2]

remote-content-archive

remote-content-archive msgstats

       # diagnose remote-content-archive msgstats                          Remote content archive statistics.                                                [5.0]
       
       # diagnose remote-content-archive msgstats flush                    Flush content archive statistics.                                                 [5.0] 
       # diagnose remote-content-archive msgstats show                     Show content archive statistics.                                                  [5.0] 

report

NOTE Not Available on Model(s) "FortiGate 60C"

report [5.2]

rsso

RSSO diagnostic commands.

rsso query

       # diagnose rsso query carrier-endpoint                                                       Query by End Point.                                      [5.0]
       # diagnose rsso query carrier-endpoint [End Point to query] [IP address of TFTP server]      Query by End Point.                                      [5.0] 
       # diagnose rsso query ip  [End Point to query] [IP address of TFTP server]                   Query by IP address.                                     [5.0]
       # diagnose rsso query rsso-key [RSSO key to query] [IP address of TFTP server]               Query by RSSO key.                                       [5.0]

settings

settings info

       # diagnose settings info                                          Show all         # diagnose settings.                                               [5.0][5.2]
       debug output:           disable
       console timestamp:      enable
       console no user log message:    disable
       CLI debug level:        3
       ipsmonitor test level:  20
       ipsengine test level:   99

settings reset

       # diagnose settings reset                                         Reset all         # diagnose settings.                                              [5.0][5.2]

sniffer

sniffer packet

The sniffer diagnose command can be used for debugging purposes. The FortiGate can sniff traffic on a specific Interface or on all Interfaces. There are 3 different Levels of Information, a.k.a. Verbose Levels 1 to 3, where verbose 1 shows less information and verbose 3 shows the most information. Verbose 4, 5 and 6 would additionally provide the interface details.

       NOTE Enabling the sniffer will consume additional CPU resources. This can be as high as an additional 25% of CPU usage on 
            low-end models. Short Ethernet frames sent by the FortiGate may appear to be under the minimum length of 64 bytes. 
            The Ethernet source and/or destination MAC addresses may be incorrect when using the "any" interface. They may be 
            displayed as all zeros (00:00:00:00:00:00) or 00:00:00:00:00:01. 

How to use the "sniffer packet" command as various example follow the below link:

       FortiGate:Diagnose-Sniffer-Guide

snmp

snmp ip

       # diagnose snmp ip frags                                           Fragmentation and reassembly info.                                                 [5.0]
       ReasmTimeout = 0
       ReasmReqds   = 0
       ReasmOKs     = 0
       ReasmFails   = 0
       FragOKs      = 0
       FragFails    = 0
       FragCreates  = 0

snmp trap

       # diagnose snmp trap send                                          Generate a trap event                                                              [5.0]
       Generating test trap...
       Test trap successfully sent to snmp daemon.

spamfilter

spamfilter bword

       # diagnose spamfilter bword                                                                               Spam banned word match filter.              [5.0][5.2]
       # diagnose spamfilter bword matchfilter [Filter string from end of spam filter banned word log line]      Spam banned word match filter.              [5.0] 

spamfilter fortishield

       # diagnose spamfilter fortishield                                                        fortishield                                                   [5.0][5.2]
       
       # diagnose spamfilter fortishield servers [Frequency to refresh server list (sec)]       FortiGuard - AntiSpam server status.                          [5.0] 
       # diagnose spamfilter fortishield statistics flush                                       Flush cache and daemon statistics.                            [5.0] 
       # diagnose spamfilter fortishield statistics list                                        Display server status, cache and daemon statistics.           [5.0] 
       FortiGuard-AntiSpam Statistics:
       =====================
       DNS failures                     :          0
       DNS lookups                      :          0
       Data send failures               :          0
       Data read failures               :          0
       Incorrect CRC                    :          0
       Proxy request failures           :          0
       Total Requests                   :          0
       Requests to rating servers       :          0
       Server errored responses         :          0
       Relayed requests                 :          0
       Timeout Allowed                  :          0
       Shutdown-remain allowed          :          0
       Server-error allowed             :          0
       Bad-licence allowed              :          0
       Query-full allowed               :          0
       NO-init allowed                  :          0
       No-server allowed                :          0
       No-resource allowed              :          0
       Bad-query allowed                :          0
       Cache mem allowed                :   38567608
       Cache mem used                   :          0
       Number of cache entries          :          0
       Cache queries                    :          0
       Cache hits                       :          0
       IP White                         :          0
       IP Allowed                       :          0
       IP Spammed                       :          0
       URL Allowed                      :          0
       URL Spammed                      :          0
       Hash Allowed                     :          0
       Hash Spammed                     :          0
       Emails Count                     :          0
       Total Latency                    :          0
       Last Latency                     :          0
       Max Latency                      :          0
       Min Latency                      :          0
       -- latency counters --
       [ 0] :     0     0     0     0     0     0     0     0     0     0     0     0
       [12] :     0     0     0     0     0     0     0     0
       -- diagnostic counters --
       [ 0] :     0     0     0     0     0     0     0     0     0     0     0     0
       [12] :     0     0     0     0     0     0     0     0     0     0     0     0
       [24] :     0     0     0     0     0     0     0     0     0     0     0     0
       [36] :     0     0     0     0     0     0     0     0     0     0     0     0
       [48] :     0     0     0     0     0     0     0     0     0     0     0     0
       [60] :     0     0     0     0

src-vis

src-vis log

       # diagnose src-vis log terminal clear                              Clear debug log terminals.                                                         [5.0]
       # diagnose src-vis log terminal reset                              Reset debug log terminals.                                                         [5.0]
       # diagnose src-vis log terminal stats                              Show debug log terminal statistics.                                                [5.0]

src-vis restart

       # diagnose src-vis restart                                         Restart src-vis daemon.                                                            [5.0][5.2]

src-vis restore

       # diagnose src-vis restore                                         Restore hosts list from flash.                                                     [5.0][5.2]

src-vis ring

       # diagnose src-vis ring [Start point in the ring]                  Display contents of ring buffer.                                                   [5.0][5.2]

src-vis save

       # diagnose src-vis save                                            Save hosts list to flash.                                                          [5.0][5.2]

src-vis scheduler

       # diagnose src-vis scheduler-times display                         Display scheduler times.                                                           [5.0]
       # diagnose src-vis scheduler-times start                           Start measuring scheduler times.                                                   [5.0]
       # diagnose src-vis scheduler-times stop                            Stop measuring scheduler times.                                                    [5.0]

src-vis stats

       # diagnose src-vis stats count                                     Object counts.                                                                     [5.0]

src-vis stats

       # diagnose src-vis stats list                                      List all statistics.                                                               [5.0]

stats

Usage statistics.

stats app-bandwidth

       # diagnose stats app-bandwidth [Number of entries to print out]   Applications by bandwidth of last minute.                                           [5.0][5.2]

stats app-stat-clear

       # diagnose stats app-stat-clear                                   Clear application statistics.                                                       [5.0][5.2]

stats app-usage-ip

       # diagnose stats app-usage-ip                                     Per IP usage of application.                                                        [5.0][5.2]
       
       # diagnose stats app-usage-ip [ID or name of application to print by IP address>] [Number of entries to print out] [Beginning of IP range] [End of IP range]

stats per-ip-bw

       # diagnose stats per-ip-bw                                        Top bandwidth by IP address.                                                        [5.0]
       
       # diagnose stats per-ip-bw [Number of entries to print out] [Beginning of IP range] [End of IP range]

switch-controller

NOTE Der Switch Controller ist nicht auf allen Modelen verfügbar:

    FortiGate-100D, FortiGate-140D, FortiGate-200D, FortiGate-240D, FortiGate-600C, FortiGate-800C, and FortiGate-1000C

switch-controller dump

       # diagnose switch-controller dump                                 dump daemon data                                                                    [5.2]
       
       # diagnose switch-controller dump vlan_config                     configured switch-controller vlan info                                              [5.2]
       # diagnose switch-controller dump switch_config                   configured managed-switch info                                                      [5.2]
       # diagnose switch-controller dump mac_hosts                       cached kernel mac hosts                                                             [5.2]
       # diagnose switch-controller dump device_access_list              cached device access list                                                           [5.2]
       # diagnose switch-controller dump client                          running clients                                                                     [5.2]

switch-controller kick

       # diagnose switch-controller kick                                 kick client                                                                         [5.2]
       
       # diagnose switch-controller kick [vdom] [device-id] [vlanid] [portid | 0 for all] [client mac]

sys

sys checkused

       # diagnose sys checkused [path.object.mkey] [tablename]           Check who use the entry.                                                            [5.0][5.2]
       
       # diagnose sys checkused system.interface.name wan1
       entry used by table system.interface:name 'ipsec-cisco'
       entry used by table system.interface:name 'ipsec-fc'
       entry used by table system.interface:name 'ipsec-ios'
       entry used by child table dashboard:id '9' of table system.admin:name 'admin'
       entry used by child table monitor-interface:interface-name 'wan1' of table system.ddns:ddnsid '1'
       entry used by child table source-interface:name 'wan1' of complex vpn.ssl.settings:source-interface.name
       entry used by child table source-interface:name 'wan1' of table authentication-rule:id '1' of entry used by child table source-interface:name 'wan1' of table authentication-rule:id '2' of complex vpn.ssl.settings:authentication-rule.source-interface.name
       entry used by table vpn.ipsec.phase1:name 'ipsec-l2tp'
       entry used by table vpn.ipsec.phase1-interface:name 'ipsec-cisco'
       entry used by table vpn.ipsec.phase1-interface:name 'ipsec-fc'
       entry used by table vpn.ipsec.phase1-interface:name 'ipsec-ios'
       entry used by table firewall.vip:name 'nat-ip-local-193.193.135.66-32-port-25'
       entry used by table firewall.vip:name 'nat-ip-local-193.193.135.66-32-port-443'
       entry used by table firewall.vip:name 'nat-ip-local-193.193.135.66-32-port-465'
       entry used by table firewall.vip:name 'nat-ip-local-193.193.135.66-32-port-993'
       entry used by table firewall.vip:name 'nat-ip-local-193.193.135.66-32-port-995'
       entry used by table firewall.vip:name 'nat-ip-local-193.193.135.66-32-port-5060'
       entry used by child table srcintf:name 'wan1' of table firewall.policy:policyid '6'
       entry used by child table srcintf:name 'wan1' of table firewall.policy:policyid '7'

sys csum

       # diagnose sys csum [File name]                                   System checksum.                                                                    [5.0][5.2]

sys cpuset

       # diagnose sys cpuset                                             cpuset                                                                              [5.2]

sys dashboard

       # diagnose sys dashboard                                                                                Dashboard for admin user.                     [5.0][5.2]
       
       # diagnose sys dashboard reset                                                                          Reset dashboard config for current admin.     [5.0] 
       # diagnose sys dashboard stats app-usage clear [User name]                                              Clear stats.                                  [5.0] 
       # diagnose sys dashboard stats app-usage show [User name] [Application ID] [VDOM Name (optional)]       Show stats.                                   [5.0] 
       # diagnose sys dashboard stats dlp-archive clear [User name]                                            Clear stats.                                  [5.0] 
       # diagnose sys dashboard stats dlp-archive show [User name]                                             Show stats.                                   [5.0] 
       # diagnose sys dashboard stats log [arg]                                                                Log statistics.                               [5.0] 
       # diagnose sys dashboard stats log-clear                                                                Log statistics.                               [5.0] 
       # diagnose sys dashboard stats pol-usage clear [arg] [arg] [arg]                                        Top policy usage.                             [5.0] 
       # diagnose sys dashboard stats pol6-usage clear [arg] [arg] [arg]                                       Top policy6 usage.                            [5.0] 
       # diagnose sys dashboard stats session-top [User name]                                                  Top sessions.                                 [5.0] 
       # diagnose sys dashboard stats traffic-history [Interface name]                                         Traffic history.                              [5.0] 

sys dayst-info

       # diagnose sys dayst-info [Num] [year]                            Daylight saving time information.                                                   [5.0][5.2]
       
       # diagnose sys dayst-info
       The current timezone '(GMT+1:00)Amsterdam,Berlin,Bern,Rome,Stoc daylight saving time starts at Sun Mar 29 02:00:00 2015, ends at Sun Oct 25 02:00:00 2015
       0   (GMT-12:00)Eniwetok,Kwajalein  
       1   (GMT-11:00)Midway Island, Samoa  
       2   (GMT-10:00)Hawaii  
       3   (GMT-9:00)Alaska  
       4   (GMT-8:00)Pacific Time(US&Canada)  
       5   (GMT-7:00)Arizona  
       81  (GMT-7:00)Baja California Sur, Chihuahua  
       6   (GMT-7:00)Mountain Time(US&Canada)  
       7   (GMT-6:00)Central America  
       8   (GMT-6:00)Central Time(US&Canada)  
       9   (GMT-6:00)Mexico City  
       10  (GMT-6:00)Saskatchewan  
       11  (GMT-5:00)Bogota,Lima,Quito  
       12  (GMT-5:00)Eastern Time(US & Canada)  
       13  (GMT-5:00)Indiana(East)  
       74  (GMT-4:30)Caracas  
       14  (GMT-4:00)Atlantic Time(Canada)  
       77  (GMT-4:00)Georgetown  
       15  (GMT-4:00)La Paz  
       16  (GMT-4:00)Santiago  
       17  (GMT-3:30)Newfoundland  
       18  (GMT-3:00)Brasilia  
       19  (GMT-3:00)Buenos Aires  
       20  (GMT-3:00)Nuuk(Greenland)  
       75  (GMT-3:00)Uruguay  
       21  (GMT-2:00)Mid-Atlantic  
       22  (GMT-1:00)Azores  
       23  (GMT-1:00)Cape Verde Is.  
       24  (GMT)Monrovia  
       80  (GMT)Greenwich Mean Time  
       79  (GMT)Casablanca  
       25  (GMT)Dublin,Edinburgh,Lisbon,London  
       26  (GMT+1:00)Amsterdam,Berlin,Bern,Rome,Stockholm,Vienna  
       27  (GMT+1:00)Belgrade,Bratislava,Budapest,Ljubljana,Prague  
       28  (GMT+1:00)Brussels,Copenhagen,Madrid,Paris  
       78  (GMT+1:00)Namibia  
       29  (GMT+1:00)Sarajevo,Skopje,Warsaw,Zagreb  
       30  (GMT+1:00)West Central Africa  
       31  (GMT+2:00)Athens,Istanbul,Minsk,Sofija  
       32  (GMT+2:00)Bucharest  
       33  (GMT+2:00)Cairo  
       34  (GMT+2:00)Harare,Pretoria  
       35  (GMT+2:00)Helsinki,Riga,Tallinn  
       36  (GMT+2:00)Jerusalem  
       37  (GMT+3:00)Baghdad  
       38  (GMT+3:00)Kuwait,Riyadh  
       40  (GMT+3:00)Nairobi  
       41  (GMT+3:30)Tehran  
       42  (GMT+4:00)Abu Dhabi,Muscat  
       43  (GMT+4:00)Baku  
       39  (GMT+4:00)Moscow,St.Petersburg,Volgograd  
       44  (GMT+4:30)Kabul  
       46  (GMT+5:00)Islamabad,Karachi,Tashkent  
       47  (GMT+5:30)Calcutta,Chennai,Mumbai,New Delhi  
       51  (GMT+5:30)Sri Jayawardenepara  
       48  (GMT+5:45)Kathmandu  
       45  (GMT+6:00)Ekaterinburg  
       49  (GMT+6:00)Almaty  
       50  (GMT+6:00)Astana,Dhaka  
       52  (GMT+6:30)Rangoon  
       53  (GMT+7:00)Bangkok,Hanoi,Jakarta,Novosibirsk  
       54  (GMT+8:00)Krasnoyarsk  
       55  (GMT+8:00)Beijing,ChongQing,HongKong,Urumgi  
       56  (GMT+8:00)Ulaan Bataar  
       57  (GMT+8:00)Kuala Lumpur,Singapore  
       58  (GMT+8:00)Perth  
       59  (GMT+8:00)Taipei  
       60  (GMT+9:00)Irkutsk,Osaka,Sapporo,Tokyo,Seoul  
       62  (GMT+9:30)Adelaide  
       63  (GMT+9:30)Darwin  
       61  (GMT+10:00)Yakutsk  
       64  (GMT+10:00)Brisbane  
       65  (GMT+10:00)Canberra,Melbourne,Sydney  
       66  (GMT+10:00)Guam,Port Moresby  
       67  (GMT+10:00)Hobart  
       68  (GMT+11:00)Vladivostok  
       69  (GMT+12:00)Magadan  
       70  (GMT+11:00)Solomon Is.,New Caledonia  
       71  (GMT+12:00)Auckland,Wellington  
       72  (GMT+12:00)Fiji,Kamchatka,Marshall Is.  
       82  (GMT+12:45)Chatham Islands  
       73  (GMT+13:00)Nuku'alofa  
       76  (GMT+14:00)Kiritimati

sys device

       # diagnose sys device add [Virtual Domain Name] [Device Name]     Virtual domain device management.                                                   [5.0][5.2]

sys flash

       # diagnose sys flash                                              Flash image.                                                                        [5.0][5.2]
       
       # diagnose sys flash format                                       format shared data partition (flash partition #3)                                   [5.0] 
       # diagnose sys flash list [List files]                            List flash images.                                                                  [5.0] 
       Partition  Image                                     TotalSize(KB)  Used(KB)  Use%  Active
       1          FGT60D-5.02-FW-build688-150722                   253871     32279   13%  Yes   
       2          FGT60D-5.02-FW-build670-150318                   253871     32262   13%  No    
       3          ETDB-1.00000                                    3368360    125216    4%  No    
       Image build at Jul 22 2015 06:22:38 for b0688

sys fullcone

       # diagnose sys fullcone                                           Fullcone diagnostics.                                                               [5.0][5.2]

sys h323

       # diagnose sys h323                                                                   H323 diagnostics.                                               [5.0][5.2]
       
       # diagnose sys h323 call list                                                         H323 calls.                                                     [5.0] 
       # diagnose sys h323 debug-mask [mask - 0-disable, 1-parser, 2-CS, 4-RAS, 8-h245]      Mask for H323 kernel trace.                                     [5.0] 
       # diagnose sys h323 peer list                                                         H323 peers.                                                     [5.0] 
       # diagnose sys h323 status                                                            Display h323 status.                                            [5.0] 
       Peer: alloc=0           free=0           used=0
       Call: alloc=0           free=0           used=0

sys ha

       # diagnose sys ha cached-csum [Show cached checksum VDOM-name]   Show HA cached checksum.                                                             [5.0] 
       # diagnose sys ha cluster-csum [arg]                             Show HA cluster checksum.                                                            [5.0]
       ================== FGT60D4613048017 ==================
       
       is_manage_master()=1, is_root_master()=1
       debugzone
       global: f8 59 14 50 b2 72 41 14 67 3d a6 49 8c 00 cc 4a 
       root: 57 57 c5 55 3b 5c 22 d1 ed 06 28 13 2e bb a5 8a 
       all: b4 96 88 40 ed 8b 72 f0 89 72 c8 d5 2f df 31 9e 
       
       checksum
       global: f8 59 14 50 b2 72 41 14 67 3d a6 49 8c 00 cc 4a 
       root: 57 57 c5 55 3b 5c 22 d1 ed 06 28 13 2e bb a5 8a 
       all: b4 96 88 40 ed 8b 72 f0 89 72 c8 d5 2f df 31 9e 
       # diagnose sys ha csum-recalculate [vdom-name or global]          Re-calculate HA checksum.                                                           [5.0] 
       # diagnose sys ha dump-by all-xdb                                 Dump all xdb.                                                                       [5.0]
       
       NOTE This command displays information about the current configuration of the cluster and how its operating. 
            You can use the out to determine the primary unit, the state of port monitoring as well as most cluster 
            configuration details and status. 
       
       # diagnose sys ha dump-by all-vcluster                            Dump all vcluster.                                                                  [5.0]
       
       NOTE This command displays the status and configuration of the individual cluster units. You can use the output of 
            this command to determine the primary unit and the status of each cluster unit. 
       
       # diagnose sys ha dump-by rcache                                  Dump rcache.                                                                        [5.0]
       # diagnose sys ha dump-by all-group                               Dump all group.                                                                     [5.0]
       # diagnose sys ha dump-by memory                                  Dump memory.                                                                        [5.0]
       # diagnose sys ha dump-by debug-zone                              Dump HA debug zone.                                                                 [5.0]
       # diagnose sys ha dump-by vdom                                    Dump HA vdom info.                                                                  [5.0]
       # diagnose sys ha dump-by kernel                                  Dump HA kernel info.                                                                [5.0]
       # diagnose sys ha dump-by device                                  Dump HA device.                                                                     [5.0]
       # diagnose sys ha dump-by stat                                    Dump HA statistics.                                                                 [5.0]
       
       NOTE This command displays some statistics about how well the cluster is functioning. Information includes packet counts, 
            memory use, failed links and ping failures. 
       
       # diagnose sys ha dump-by sesync                                  Dump HA session sync peers.                                                         [5.0]
       # diagnose sys ha extfile-sig                                     Dump extfile's signature.                                                           [5.0]
       # diagnose sys ha fib                                             FIB information.                                                                    [5.0]
       # diagnose sys ha hadiff                                          HA diff debug.                                                                      [5.0]
       
       # diagnose sys ha hadiff log clear                                Clear log.                                                                          [5.0] 
       # diagnose sys ha hadiff log disable                              Disable log.                                                                        [5.0] 
       # diagnose sys ha hadiff log enable                               Enable log.                                                                         [5.0] 
       # diagnose sys ha hadiff max-sync-turns [Set/get max number sync] Set/get max number of sync turns.                                                   [5.0] 
       # diagnose sys ha hadiff max-unsync-wait [max unsync wait times]  Set/get max unsync wait times.                                                      [5.0] 
       # diagnose sys ha hadiff status                                   HA diff status.                                                                     [5.0] 
       pid: 0
       state: idle
       vdom: 
       log: disabled
       max-sync-turns: 0
       max-unsync-wait: 0
       sync-failure: 0
       master-lastcsum: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
       # diagnose sys ha mac                                             Mac Information.                                                                    [5.0]
       HA mac msg name=port1, phyindex=0, 00:09:0F:09:00:01, linkfail=0 
       name=port2, phyindex=1, 00:09:0F:09:00:02, linkfail=1 
       name=port3, phyindex=2, 00:09:0F:09:00:03, linkfail=0 
       name=port4, phyindex=3, 00:09:0F:09:00:04, linkfail=1
       # diagnose sys ha recalculate-extfile-signature                   Recalculate external files signature in hasync daemon.                              [5.0]
       # diagnose sys ha reset-uptime                                    Reset HA up time.                                                                   [5.0]
       
       NOTE This command resets the age of a unit back to zero so that if no other unit in the cluster was reset at the same time,
            it will now have the lowest age and can become the primary unit. The diagnose sys ha reset-uptime command should only 
            be used as a temporary solution. The command resets the HA age internally and does not affect the up time displayed 
            for cluster units using the diagnose sys ha dump-by all-vcluster command or the up time displayed on the Dashboard 
            or cluster members list. To make sure the actual up time for cluster units is the same as the HA age you should reboot 
            the cluster units during a maintenance window. 
       # diagnose sys ha session-sync-dev                                Session sync ports.                                                                 [5.0]
       
       # diagnose sys ha session-sync-dev clear                          Clear session sync ports.                                                           [5.0] 
       # diagnose sys ha session-sync-dev set [arg] [arg] [arg] [arg]    Configure session sync ports.                                                       [5.0] 
       # diagnose sys ha sesync-stats                                    Dump session sync statistics.                                                       [5.0]
       # diagnose sys ha showcsum                                        Show HA checksum.                                                                   [5.0]
       
       # diagnose sys ha showcsum [level] | [path.object] [Show detail checksum for table entry]
       # diagnose sys ha showcsum 1
       system.global: 29ec8b3f021fc3bed8d6509cc657044f
       system.accprofile: 7acee39e9d2d9f8911badae10c754ae2
       system.npu: 7acee39e9d2d9f8911badae10c754ae2
       system.vdom-link: 7acee39e9d2d9f8911badae10c754ae2
       wireless-controller.global: 7acee39e9d2d9f8911badae10c754ae2
       wireless-controller.vap: 5f737dda1df100ed964fdeafcfa9811e
       system.switch-interface: 5f737dda1df100ed964fdeafcfa9811e
       system.lte-modem: 5f737dda1df100ed964fdeafcfa9811e
       system.interface: 2aa8491bba9032ba04a908af1acce4dd
       system.physical-switch: 99444dbe30124b89f2890533bb622eed
       system.virtual-switch: 99444dbe30124b89f2890533bb622eed
       system.password-policy: 99444dbe30124b89f2890533bb622eed
       system.sms-server: 99444dbe30124b89f2890533bb622eed
       system.custom-language: 69409117e787b3584a3c54311d0e5223
       system.admin: d6caae54eee0045e7bf796edfc82391f
       system.fsso-polling: d6caae54eee0045e7bf796edfc82391f
       system.ha: 7311b30a32ce7f20da9bf17d40a9d7bc
       # diagnose sys ha stats                                           statistics                                                                          [5.0]
       # diagnose sys ha status                                          status                                                                              [5.0]

sys kill

       # diagnose sys kill [Signal number(1-32)] [Process ID]            Kill the process ID.                                                                [5.0][5.2]
       
       NOTE Use this command to terminate a process currently running on FortiWeb, or send another signal from the FortiWeb OS 
            to the process. Type the ID of the signal to send to the process. This in an integer between 1 and 32. For <pid> 
            type the process ID where the signal is sent to. 
       
       Signal Integer
       1  Varies by the process’s interpretation, such as re-read configuration files or re-initialize (hang up; SIGHUP). 
          For example, the FortiWeb web UI verifies its configuration files, then restarts gracefully.  
       2  Request termination by simulating the pressing of the interrupt keys, such as Ctrl + C (interrupt; SIGINT).  
       3  Force termination immediately and do a core dump (quit; SIGQUIT).:9 — Force termination immediately (kill; SIGKILL).  
       9  Force termination immediately (kill; SIGKILL).  
       15  Request termination by inter-process communication (terminate; SIGTERM).  


sys last-modified

       # diagnose sys last-modified                                      List files that were modified last..                                                [5.0][5.2]

sys link-monitor

       # diagnose sys link-monitor                                       Link Monitor.                                                                       [5.2]

sys logdisk

       # diagnose sys logdisk                                            Display log disk status.                                                            [5.2]

sys modem

       # diagnose sys modem                                              modem                                                                               [5.0][5.2]
       
       # diagnose sys modem cmd [AT command for MODEM]                   cmd                                                                                 [5.0] 
       # diagnose sys modem com [arg] [arg]                              Start a interactive session.                                                        [5.0] 
       # diagnose sys modem detect                                       detect                                                                              [5.0] 
       # diagnose sys modem external-modem                               Show external MODEM information.                                                    [5.0] 
       # diagnose sys modem history                                      List MODEM usage history.                                                           [5.0] 
       # diagnose sys modem query [[0|1] - 1 to force re-query via AT]   Query information from external MODEM.                                              [5.0] 
       # diagnose sys modem reset                                        Reset serial driver from external MODEM.                                            [5.0] 

sys mpstat

       # diagnose sys mpstat                                             mpstat                                                                              [5.2]

sys nmi-watchdog

       # diagnose sys nmi-watchdog                                       nmi-watchdog                                                                        [5.0][5.2]
       nmi-watchdog is disabled
       
       # diagnose sys nmi-watchdog disable                               Disable NMI watchdog.                                                               [5.0] 
       # diagnose sys nmi-watchdog enable                                Enable NMI watchdog.                                                                [5.0] 

sys ntp

       # diagnose sys ntp                                                NTP daemon command.                                                                 [5.0][5.2]
       synchronized: yes, ntpsync: enabled, server-mode: enabled
       
       ipv4 server(developer.local.ch) 193.193.135.65 -- reachable(0x1) S:5 T:1761 selected 
               server-version=4, stratum=11
               reference time is d9f5d7ae.9e7f57e1 -- UTC Tue Nov 17 16:43:26 2015
               clock offset is -0.798009 sec, root delay is 0 msec
               root dispersion is 724 msec, peer dispersion is 8968 msec

sys pair

       # diagnose sys pair                                               Pair device.                                                                        [5.0][5.2]

sys pipb

       # diagnose sys pipb                                               pipb                                                                                [5.0]

sys pipb-global

       # diagnose sys pipb-global                                       Global pipb.                                                                         [5.0]
       
       # diagnose sys pipb-global bps-list                              List global per-IP-bandwidth meter ordered by bps.                                   [5.0] 
       # diagnose sys pipb-global list                                  List global per-IP-bandwidth meter.                                                  [5.0] 
       # diagnose sys pipb-global sort                                  Sort global per-IP-bandwidth meter by bps.                                           [5.0] 
       # diagnose sys pipb-global stat                                  Global per-IP-bandwidth meter status.                                                [5.0] 

sys process

       # diagnose sys process                                           Dump process stack.                                                                  [5.0][5.2]
       
       # diagnose sys process dump [PID of the process to dump]         Dump process stack.                                                                  [5.0] 
       # diagnose sys process trace [arg] [arg] [arg] [arg]             Sample process instructions.                                                         [5.0] 

sys profile

       # diagnose sys profile start                                      start kernel profiling data                                                         [5.2]
       # diagnose sys profile stop                                       copy kernel profiling data                                                          [5.2]
       # diagnose sys profile show                                       show kernel profiling result                                                        [5.2]
       # diagnose sys profile sysmap                                     show kernel sysmap                                                                  [5.2]
       0x80008000    60 _stext
       0x8000803c    28 __switch_data
       0x80008058    40 __ret
       0x80008080    48 __mmap_switched
       0x800080b0   140 __create_page_tables
       0x8000813c     8 __error
       0x80008144    80 __lookup_processor_type
       0x80008194    76 __lookup_architecture_type
       0x800081e0    40 debug_kernel
       0x80008208    40 quiet_kernel
       0x80008230    64 profile_setup
       0x80008270   296 calibrate_delay
       0x80008398   944 start_kernel
       0x80008748    24 no_initrd
       0x80008760    24 root_data_setup
       0x80008778    24 fs_names_setup
       ...............................
       ...............................
       ...............................
       # diagnose sys profile cpumask                                    profile which CPUs                                                                  [5.2]
       # diagnose sys profile module                                     show kernel module                                                                  [5.2]
       ftk                  1309124  38 0xf8a2c060

sys proxy

       # diagnose sys proxy bypass                                       bypass                                                                              [5.0]
       
       # diagnose sys proxy bypass ftp [on|off bypass proxy AV]          FTP protocol.                                                                       [5.0] 
       # diagnose sys proxy bypass http [on|off bypass proxy AV]         HTTP protocol.                                                                      [5.0] 
       # diagnose sys proxy bypass imap [on|off bypass proxy AV]         IMAP protocol.                                                                      [5.0] 
       # diagnose sys proxy bypass nntp [[on|off bypass proxy AV]        NNTP protocol.                                                                      [5.0] 
       # diagnose sys proxy bypass pop3 [[on|off bypass proxy AV]        POP3 protocol.                                                                      [5.0] 
       # diagnose sys proxy bypass smtp [on|off bypass proxy AV]         SMTP protocol.                                                                      [5.0] 
       # diagnose sys proxy filter                                       Filter for displaying debug information.                                            [5.0]
       
       # diagnose sys proxy filter clear                                 Erase the current filter.                                                           [5.0] 
       # diagnose sys proxy filter list                                  Display the current filter.                                                         [5.0] 
       # diagnose sys proxy filter src [Source IP from] [Source IP to]   Source address range to filter by.                                                  [5.0] 
       # diagnose sys proxy stats                                        Proxy statistics.                                                                   [5.0]
       
       # diagnose sys proxy stats ftp                                    FTP statistics.                                                                     [5.0] 
       # diagnose sys proxy stats http                                   HTTP statistics.                                                                    [5.0] 
       sample-count: 10
       sample-interval: 5 seconds
       sample-average: 0
       sample[9]: 0
       sample[8]: 0
       sample[7]: 0
       sample[6]: 0
       sample[5]: 0
       sample[4]: 0
       sample[3]: 0
       sample[2]: 0
       sample[1]: 0
       sample[0]: 0
       # diagnose sys proxy stats imap                                   IMAP statistics.                                                                    [5.0] 
       # diagnose sys proxy stats nntp                                   NNTP statistics.                                                                    [5.0] 
       # diagnose sys proxy stats pop3                                   POP3 statistics.                                                                    [5.0] 
       # diagnose sys proxy stats reset [Proxy protocol name]            Reset proxy statistics.                                                             [5.0] 
       # diagnose sys proxy stats smtp                                   SMTP statistics.                                                                    [5.0] 

sys sccp-proxy

       # diagnose sys sccp-proxy debug-console                           Debug consoles.                                                                     [5.0]
       # diagnose sys sccp-proxy phone                                   SCCP phones.                                                                        [5.0]
       # diagnose sys sccp-proxy redirect                                Redirects                                                                           [5.0]
       # diagnose sys sccp-proxy restart                                 Restart IM, SIP, and SCCP.                                                          [5.0]
       # diagnose sys sccp-proxy stat                                    SCCP statistics.                                                                    [5.0]
       
       # diagnose sys sccp-proxy stats clear                             Clear SCCP statistics.                                                              [5.0] 
       # diagnose sys sccp-proxy stats list                              List SCCP statistics.                                                               [5.0] 
       # diagnose sys sccp-proxy stats mem full                          Memory usage details.                                                               [5.0] 
       # diagnose sys sccp-proxy stats mem summary                       Memory usage summary.                                                               [5.0] 

sys server-probe

       # diagnose sys server-probe                                      Server probe.                                                                        [5.0][5.2]
       
       # diagnose sys server-probe launch [entry-id]                    Launching an SLA probe.                                                              [5.0] 
       # diagnose sys server-probe response                             Probe response.                                                                      [5.0] 
       # diagnose sys server-probe status [entry-id | all]              status                                                                               [5.0] 

sys session

       # diagnose sys session clear                                                     Clear the sessions defined by filter.                                [5.0]
       # diagnose sys session daemon                                                    Session sync daemon.                                                 [5.0]
       
       # diagnose sys session daemon pid-log [Log level]                                Enable/disable PID log.                                              [5.0] 
       # diagnose sys session daemon shm                                                shm                                                                  [5.0] 
       shm[0]: not-exist
       shm[1]: not-exist
       shm[2]: not-exist
       shm[3]: not-exist
       shm[4]: not-exist
       shm[5]: not-exist
       shm[6]: not-exist
       shm[7]: not-exist
       shm[8]: not-exist
       shm[9]: not-exist
       shm[10]: not-exist
       shm[11]: not-exist
       shm[12]: not-exist
       shm[13]: not-exist
       shm[14]: not-exist
       shm[15]: not-exist
       
       # diagnose sys session daemon shm status                                         Shm segment status.                                                  [5.0] 
       shm[0]: not-exist
       shm[1]: not-exist
       shm[2]: not-exist
       shm[3]: not-exist
       shm[4]: not-exist
       shm[5]: not-exist
       shm[6]: not-exist
       shm[7]: not-exist
       shm[8]: not-exist
       shm[9]: not-exist
       shm[10]: not-exist
       shm[11]: not-exist
       shm[12]: not-exist
       shm[13]: not-exist
       shm[14]: not-exist
       shm[15]: not-exist
       
       # diagnose sys session daemon status                                             Daemon status.                                                       [5.0] 
       sesync_next_seq=-1, packet_pid_nr=0, flush_pid_nr=0, shm_seg_nr=16, shm_peak_seg_cnt=0
       pid_log=0
       now=352011566
       
       shm_seg_cnt=0
       0: status=0, append_pid=0, head=0, tail=0, expire_jiffies=0
       1: status=0, append_pid=0, head=0, tail=0, expire_jiffies=0
       2: status=0, append_pid=0, head=0, tail=0, expire_jiffies=0
       3: status=0, append_pid=0, head=0, tail=0, expire_jiffies=0
       4: status=0, append_pid=0, head=0, tail=0, expire_jiffies=0
       5: status=0, append_pid=0, head=0, tail=0, expire_jiffies=0
       6: status=0, append_pid=0, head=0, tail=0, expire_jiffies=0
       7: status=0, append_pid=0, head=0, tail=0, expire_jiffies=0
       8: status=0, append_pid=0, head=0, tail=0, expire_jiffies=0
       9: status=0, append_pid=0, head=0, tail=0, expire_jiffies=0
       10: status=0, append_pid=0, head=0, tail=0, expire_jiffies=0
       11: status=0, append_pid=0, head=0, tail=0, expire_jiffies=0
       12: status=0, append_pid=0, head=0, tail=0, expire_jiffies=0
       13: status=0, append_pid=0, head=0, tail=0, expire_jiffies=0
       14: status=0, append_pid=0, head=0, tail=0, expire_jiffies=0
       15: status=0, append_pid=0, head=0, tail=0, expire_jiffies=0
       # diagnose sys session filter clear                                              Clear session filter.                                                [5.0]
       # diagnose sys session filter clear dintf [Interface name]                       Clear destination interface filter.                                  [5.0] 
       # diagnose sys session filter clear dport [from port0-65535] [to port 0-65535]   Clear destination port filter from to.                               [5.0] 
       # diagnose sys session filter clear dst [from dst IP] [to dst IP]                Clear destination IP filter.                                         [5.0] 
       # diagnose sys session filter clear duration [from duration] [to durartion]      Clear duration filter.                                               [5.0] 
       # diagnose sys session filter clear expire [from expire] [to expire]             Clear expire filter.                                                 [5.0] 
       # diagnose sys session filter clear nport [from expire] [to expire]              clear NAT'd source port filter                                       [5.0] 
       # diagnose sys session filter clear nsrc [from NAT srcip] [to NAT scrcip]        clear NAT'd source IP filter                                         [5.0] 
       # diagnose sys session filter clear policy [from policy] [to policy]             Clear policy ID filter.                                              [5.0] 
       # diagnose sys session filter clear proto [from protocoll] [to protocoll]        Clear protocol filter (0-255).                                       [5.0] 
       # diagnose sys session filter clear proto-state [from 0-9] [to 0-9]              Clear protocol state filter.                                         [5.0] 
       
       NOTE This command allows you to view the counts of various TCP states. This command can help in enterprise-type 
            environments when tuning various protocol timers, for example, there are 60 percent of sessions in syn-sent 
            state in comparison to the established sessions. 
       
       # diagnose sys session filter clear sintf [Interface name]                       Clear source interface filter.                                       [5.0] 
       # diagnose sys session filter clear sport [from 0-65535] [to 0-65535]            Clear source port filter.                                            [5.0] 
       # diagnose sys session filter clear src [from srcip] [to srcip]                  Clear source IP filter.                                              [5.0] 
       # diagnose sys session filter clear vd [Index of virtual domain. -1 matches all] Clear virtual domain filter.                                         [5.0] 
       # diagnose sys session filter dintf [Interface name]                             Destination interface.                                               [5.0]
       # diagnose sys session filter dport [from port0-65535] [to port 0-65535]         Destination port.                                                    [5.0]
       # diagnose sys session filter dst [from dst IP] [to dst IP]                      Destination IP address.                                              [5.0]
       # diagnose sys session filter duration [from duration] [to durartion]            duration                                                             [5.0]
       # diagnose sys session filter expire [from expire] [to expire]                   expire                                                               [5.0]
       # diagnose sys session filter negate                                             Inverse filter.                                                      [5.0]
       # diagnose sys session filter negate dintf                                       Inverse destination interface.                                       [5.0] 
       # diagnose sys session filter negate dport                                       Inverse destination port.                                            [5.0] 
       # diagnose sys session filter negate dst                                         Inverse destination IP.                                              [5.0] 
       # diagnose sys session filter negate duration                                    Inverse duration.                                                    [5.0] 
       # diagnose sys session filter negate expire                                      Inverse expire.                                                      [5.0] 
       # diagnose sys session filter negate nport                                       inverse NAT'd source port                                            [5.0] 
       # diagnose sys session filter negate nsrc                                        inverse NAT'd source IP                                              [5.0] 
       # diagnose sys session filter negate policy                                      Inverse policy ID.                                                   [5.0] 
       # diagnose sys session filter negate proto                                       Inverse protocol.                                                    [5.0] 
       # diagnose sys session filter negate proto-state                                 Inverse protocol state.                                              [5.0] 
       # diagnose sys session filter negate sintf                                       Inverse source interface.                                            [5.0] 
       # diagnose sys session filter negate sport                                       Inverse source port.                                                 [5.0] 
       # diagnose sys session filter negate src                                         Inverse source IP.                                                   [5.0] 
       # diagnose sys session filter negate vd                                          Inverse virtual domain.                                              [5.0] 
       # diagnose sys session filter nport [from expire] [to expire]                    NAT'd source port                                                    [5.0] 
       # diagnose sys session filter nsrc [from NAT srcip] [to NAT scrcip]              NAT'd source ip address                                              [5.0] 
       # diagnose sys session filter policy [from policy] [to policy]                   Policy ID.                                                           [5.0]
       # diagnose sys session filter proto [from protocoll] [to protocoll]              Protocol number (0-255).                                             [5.0] 
       # diagnose sys session filter proto-state [from 0-9] [to 0-9]                    Protocol state.                                                      [5.0]
       # diagnose sys session filter sintf [Interface name]                             Source interface.                                                    [5.0]
       # diagnose sys session filter sport [from 0-65535] [to 0-65535]                  Source port.                                                         [5.0]
       # diagnose sys session filter src [from srcip] [to srcip]                        Source IP address.                                                   [5.0] 
       # diagnose sys session filter vd [Index of virtual domain. -1 matches all]       Index of virtual domain. -1 matches all.                             [5.0]                          
       # diagnose sys session full-stat                                                 Fully stat session.                                                  [5.0]
       session table:           table_size=524288 max_depth=1 used=26
       misc info:       session_count=13 setup_rate=0 exp_count=0 clash=0
               memory_tension_drop=0 ephemeral=0/61440 removeable=0
       delete=0, flush=0, dev_down=0/0
       TCP sessions:
                6 in SYN_SENT state
       firewall error stat:
       error1=00000000
       error2=00000000
       error3=00000000
       error4=00000000
       tt=00000000
       cont=0000008b
       ids_recv=000001bb
       url_recv=00000000
       av_recv=00000116
       fqdn_count=00000015
       tcp reset stat:
               syncqf=0 acceptqf=0 no-listener=0 data=0 ses=0 ips=0
       # diagnose sys session help                                                      Session help.                                                        [5.0]
       # diagnose sys session help add [Help name] [Protocol number] [Help port]        Add session help.                                                    [5.0] 
       # diagnose sys session help delete [Protocol number] [Help port]                 Delete session help.                                                 [5.0] 
       # diagnose sys session help list                                                 List session help.                                                   [5.0] 
       list builtin help module:
       mgcp
       dcerpc
       rsh
       pmap
       dns-tcp
       dns-udp
       rtsp
       pptp
       sip
       mms
       tns
       h245
       h323
       ras
       tftp
       ftp
       list session help:
       help=pmap, protocol=17 port=111
       help=rtsp, protocol=6 port=8554
       help=rtsp, protocol=6 port=554
       help=pptp, protocol=6 port=1723
       help=rtsp, protocol=6 port=7070
       help=pmap, protocol=6 port=111
       help=rsh, protocol=6 port=512
       help=dns-udp, protocol=17 port=53
       help=tftp, protocol=17 port=69
       help=tns, protocol=6 port=1521
       help=mgcp, protocol=17 port=2727
       help=dcerpc, protocol=17 port=135
       help=rsh, protocol=6 port=514
       help=ras, protocol=17 port=1719
       help=ftp, protocol=6 port=21
       help=mgcp, protocol=17 port=2427
       help=dcerpc, protocol=6 port=135
       help=mms, protocol=6 port=1863
       help=h323, protocol=6 port=1720
       # diagnose sys session list [List expectation session]                           List session.                                                        [5.0]
       
       # diag sys session list 
       
       session info: proto=6 proto_state=02 duration=16 expire=13 timeout=3600 flags=00000000 sockflag=00000000 sockport=0 av_idx=0 use=3
       origin-shaper=
       reply-shaper=
       per_ip_shaper=
       ha_id=0 policy_dir=0 tunnel=/
       state=local nds 
       statistic(bytes/packets/allow_err): org=60/1/0 reply=88/1/1 tuples=2
       orgin->sink: org out->post, reply pre->in dev=0->7/7->0 gwy=0.0.0.0/0.0.0.0
       hook=out dir=org act=noop 198.18.0.1:13764->198.18.0.90:541(0.0.0.0:0)
       hook=in dir=reply act=noop 198.18.0.90:541->198.18.0.1:13764(0.0.0.0:0)
       pos/(before,after) 0/(0,0), 0/(0,0)
       misc=0 policy_id=0 auth_info=0 chk_client_info=0 vd=0
       serial=00d42ac1 tos=ff/ff ips_view=0 app_list=0 app=0
       dd_type=0 dd_mode=0
       npu_state=00000000
       
       session info: proto=6 proto_state=02 duration=10 expire=22 timeout=3600 flags=00000000 sockflag=00000000 sockport=0 av_idx=0 use=3
       origin-shaper=
       reply-shaper=
       per_ip_shaper=
       ha_id=0 policy_dir=0 tunnel=/
       state=local nds 
       statistic(bytes/packets/allow_err): org=120/2/0 reply=176/2/1 tuples=2
       orgin->sink: org out->post, reply pre->in dev=0->7/7->0 gwy=0.0.0.0/0.0.0.0
       hook=out dir=org act=noop 198.18.0.1:13765->198.18.0.90:514(0.0.0.0:0)
       hook=in dir=reply act=noop 198.18.0.90:514->198.18.0.1:13765(0.0.0.0:0)
       pos/(before,after) 0/(0,0), 0/(0,0)
       misc=0 policy_id=0 auth_info=0 chk_client_info=0 vd=0
       serial=00d42adb tos=ff/ff ips_view=0 app_list=0 app=0
       dd_type=0 dd_mode=0
       npu_state=00000000
       ........................................................................
       ........................................................................
       ........................................................................
       
       # diagnose sys session stat                                                      Stat session.                                                        [5.0]
       misc info:       session_count=13 setup_rate=0 exp_count=0 clash=0
               memory_tension_drop=0 ephemeral=0/61440 removeable=0
       delete=0, flush=0, dev_down=0/0
       TCP sessions:
                6 in SYN_SENT state
       firewall error stat:
       error1=00000000
       error2=00000000
       error3=00000000
       error4=00000000
       tt=00000000
       cont=0000008b
       ids_recv=000001bb
       url_recv=00000000
       av_recv=00000116
       fqdn_count=00000015
       tcp reset stat:
               syncqf=0 acceptqf=0 no-listener=0 data=0 ses=0 ips=0
       global: ses_limit=0 ses6_limit=0 rt_limit=0 rt6_limit=0
       
       # diagnose sys session sync                                                      List session sync.                                                   [5.0]
       sync_ctx: sync_started=0, sync_tcp=0, sync_others=0,
       sync_expectation=0, sync_redir=0, sync_nat=0, stdalone_sesync=0.
       sync: create=0:0, update=0, delete=0:0, query=0
       recv: create=0:0, update=0, delete=0:0, query=0
       ses pkts: send=0, alloc_fail=0, recv=0, recv_err=0 sz_err=0
       nCfg_sess_sync_num=4, mtu=0
       sync_filter:
       
       # diagnose sys session sync reset                                                Reset session sync.                                                  [5.0] 
       # diagnose sys session ttl                                                       TTL session.                                                         [5.0]
       list session timeout:
       Default timeout=3600
       
       # diagnose sys session clear                                                     Clear the sessions defined by filter.                                [5.0]

sys session6

       # diagnose sys session6 filter clear                                             Clear session filter.                                                [5.0]
       # diagnose sys session6 filter clear dintf [Interface name]                      Clear destination interface filter.                                  [5.0] 
       # diagnose sys session6 filter clear dport [from port0-65535] [to port 0-65535]  Clear destination port filter from to.                               [5.0] 
       # diagnose sys session6 filter clear dst [from dst IP] [to dst IP]               Clear destination IP filter.                                         [5.0] 
       # diagnose sys session6 filter clear duration [from duration] [to durartion]     Clear duration filter.                                               [5.0] 
       # diagnose sys session6 filter clear expire [from expire] [to expire]            Clear expire filter.                                                 [5.0] 
       # diagnose sys session6 filter clear nport [from expire] [to expire]             clear NAT'd source port filter                                       [5.0] 
       # diagnose sys session6 filter clear nsrc [from NAT srcip] [to NAT scrcip]       clear NAT'd source IP filter                                         [5.0] 
       # diagnose sys session6 filter clear policy [from policy] [to policy]            Clear policy ID filter.                                              [5.0] 
       # diagnose sys session6 filter clear proto [from protocoll] [to protocoll]       Clear protocol filter (0-255).                                       [5.0] 
       # diagnose sys session6 filter clear proto-state [from 0-9] [to 0-9]             Clear protocol state filter.                                         [5.0] 
       
       NOTE This command allows you to view the counts of various TCP states. This command can help in enterprise-type 
            environments when tuning various protocol timers, for example, there are 60 percent of sessions in syn-sent 
            state in comparison to the established sessions. 
       
       # diagnose sys session6 filter clear sintf [Interface name]                      Clear source interface filter.                                       [5.0] 
       # diagnose sys session6 filter clear sport [from 0-65535] [to 0-65535]           Clear source port filter.                                            [5.0] 
       # diagnose sys session6 filter clear src [from srcip] [to srcip]                 Clear source IP filter.                                              [5.0] 
       # diagnose sys session6 filter clear vd [Index of virt. domain. -1 matches all]  Clear virtual domain filter.                                         [5.0] 
       # diagnose sys session6 filter dintf [Interface name]                            Destination interface.                                               [5.0]
       # diagnose sys session6 filter dport [from port0-65535] [to port 0-65535]        Destination port.                                                    [5.0]
       # diagnose sys session6 filter dst [from dst IP] [to dst IP]                     Destination IP address.                                              [5.0]
       # diagnose sys session6 filter duration [from duration] [to durartion]           duration                                                             [5.0]
       # diagnose sys session6 filter expire [from expire] [to expire]                  expire                                                               [5.0]
       # diagnose sys session filter negate                                             Inverse filter.                                                      [5.0]
       # diagnose sys session6 filter negate dintf                                      Inverse destination interface.                                       [5.0] 
       # diagnose sys session6 filter negate dport                                      Inverse destination port.                                            [5.0] 
       # diagnose sys session6 filter negate dst                                        Inverse destination IP.                                              [5.0] 
       # diagnose sys session6 filter negate duration                                   Inverse duration.                                                    [5.0] 
       # diagnose sys session6 filter negate expire                                     Inverse expire.                                                      [5.0] 
       # diagnose sys session6 filter negate nport                                      inverse NAT'd source port                                            [5.0] 
       # diagnose sys session6 filter negate nsrc                                       inverse NAT'd source IP                                              [5.0] 
       # diagnose sys session6 filter negate policy                                     Inverse policy ID.                                                   [5.0] 
       # diagnose sys session6 filter negate proto                                      Inverse protocol.                                                    [5.0] 
       # diagnose sys session6 filter negate proto-state                                Inverse protocol state.                                              [5.0] 
       # diagnose sys session6 filter negate sintf                                      Inverse source interface.                                            [5.0] 
       # diagnose sys session6 filter negate sport                                      Inverse source port.                                                 [5.0] 
       # diagnose sys session6 filter negate src                                        Inverse source IP.                                                   [5.0] 
       # diagnose sys session6 filter negate vd                                         Inverse virtual domain.                                              [5.0] 
       # diagnose sys session6 filter nport [from expire] [to expire]                   NAT'd source port                                                    [5.0] 
       # diagnose sys session6 filter nsrc [from NAT srcip] [to NAT scrcip]             NAT'd source ip address                                              [5.0] 
       # diagnose sys session6 filter policy [from policy] [to policy]                  Policy ID.                                                           [5.0]
       # diagnose sys session6 filter proto [from protocoll] [to protocoll]             Protocol number (0-255).                                             [5.0] 
       # diagnose sys session6 filter proto-state [from 0-9] [to 0-9]                   Protocol state.                                                      [5.0]
       # diagnose sys session6 filter sintf [Interface name]                            Source interface.                                                    [5.0]
       # diagnose sys session6 filter sport [from 0-65535] [to 0-65535]                 Source port.                                                         [5.0]
       # diagnose sys session6 filter src [from srcip] [to srcip]                       Source IP address.                                                   [5.0] 
       # diagnose sys session6 filter vd [Index of virtual domain. -1 matches all]      Index of virtual domain. -1 matches all.                             [5.0]                          
       # diagnose sys session6 full-stat                                                Fully stat session.                                                  [5.0]
       # diagnose sys session help                                                      Session help.                                                        [5.0]
       # diagnose sys session help add [Help name] [Protocol number] [Help port]        Add session help.                                                    [5.0] 
       # diagnose sys session help delete [Protocol number] [Help port]                 Delete session help.                                                 [5.0] 
       # diagnose sys session help list                                                 List session help.                                                   [5.0] 
       # diagnose sys session6 list                                                     List session.                                                        [5.0]
       # diagnose sys session6 list expectation                                         List IPv6 expectation session.                                       [5.0] 
       # diagnose sys session6 stat                                                     Stat session.                                                        [5.0]
       # diagnose sys session6 sync                                                     List session sync.                                                   [5.0]

sys sip

       # diagnose sys sip debug-mask [mask - For example, 0, 1, 2, 3..]        Mask for SIP kernel trace.                                                    [5.0]
       # diagnose sys sip dialog                                               SIP dialog.                                                                   [5.0]
       # diagnose sys sip dialog clear                                         Clear SIP dialogs.                                                            [5.0]

       # diagnose sys sip dialog list                                          List SIP dialogs.                                                             [5.0]

       # diagnose sys sip mapping                                              SIP mapping.                                                                  [5.0]
       # diagnose sys sip status                                               Display SIP status.                                                           [5.0]     
       dialogs: max=131072, used=0
       mappings: used=0
       dialog hash by ID: size=8192, used=0, depth=0
       dialog hash by RTP: size=8192, used=0, depth=0
       mapping hash: size=8192, used=0, depth=0
       count0: 0
       count1: 0
       count2: 0
       count3: 0
       count4: 0
       # diagnose sys sip-proxy calls                                          SIP calls.                                                                    [5.0]
       
       # diagnose sys sip-proxy calls clear                                    Clear all active SIP calls.                                                   [5.0] 
       # diagnose sys sip-proxy calls idle                                     List idle SIP calls.                                                          [5.0] 
       # diagnose sys sip-proxy calls invite                                   List SIP invite transactions.                                                 [5.0] 
       # diagnose sys sip-proxy calls list                                     List active SIP calls.                                                        [5.0] 
       # diagnose sys sip-proxy debug-console                                  Debug consoles.                                                               [5.0]
       # diagnose sys sip-proxy filter clear                                   Erase the current filter.                                                     [5.0]
       # diagnose sys sip-proxy filter dst-addr4 [from dstip] [to dstip]       Destination address range to filter by.                                       [5.0]
       # diagnose sys sip-proxy filter dst-addr6 [from dstip] [to dstip]       IPv6 destination address range to filter by.                                  [5.0]
       # diagnose sys sip-proxy filter dst-port [source port]                  Destination port to filter by.                                                [5.0]
       # diagnose sys sip-proxy filter identity-policy [identity-policy]       Identity-policy to filter by.                                                 [5.0]
       # diagnose sys sip-proxy filter list                                    Display the current filter.                                                   [5.0]
       # diagnose sys sip-proxy filter negate                                  Negate the specified filter parameter.                                        [5.0]
       # diagnose sys sip-proxy filter negate dst-addr4                        Negate the dst-addr4 filter.                                                  [5.0]  
       # diagnose sys sip-proxy filter negate dst-addr6                        Negate the dst-addr6 filter.                                                  [5.0]  
       # diagnose sys sip-proxy filter negate dst-port                         Negate the dst-port filter.                                                   [5.0]  
       # diagnose sys sip-proxy filter negate identity-policy                  Negate the identity-policy filter.                                            [5.0]  
       # diagnose sys sip-proxy filter negate policy                           Negate the policy filter.                                                     [5.0]  
       # diagnose sys sip-proxy filter negate policy-type                      Negate the policy-type filter.                                                [5.0]  
       # diagnose sys sip-proxy filter negate src-addr4                        Negate the src-addr4 filter.                                                  [5.0]  
       # diagnose sys sip-proxy filter negate src-addr6                        Negate the src-addr6 filter.                                                  [5.0]  
       # diagnose sys sip-proxy filter negate src-port                         Negate the src-port filter.                                                   [5.0]  
       # diagnose sys sip-proxy filter negate vd                               Negate the virtual domain filter.                                             [5.0]  
       # diagnose sys sip-proxy filter negate voip-profile                     Negate the VoIP-profile filter.                                               [5.0] 
       # diagnose sys sip-proxy filter policy [policy]                         Policy to filter by.                                                          [5.0]
       # diagnose sys sip-proxy filter policy-type                             Policy-type to filter by.                                                     [5.0]
       # diagnose sys sip-proxy filter policy-type ipv4                        Filter IPv4 policies.                                                         [5.0] 
       # diagnose sys sip-proxy filter policy-type ipv6                        Filter IPv6 policies.                                                         [5.0] 
       # diagnose sys sip-proxy filter src-addr4 [from srcip] [to srcip]       Source address range to filter by.                                            [5.0]
       # diagnose sys sip-proxy filter src-addr6 [from srcip] [to srcip]       IPv6 source address range to filter by.                                       [5.0]
       # diagnose sys sip-proxy filter src-port [source port]                  Source port to filter by.                                                     [5.0]                                                
       # diagnose sys sip-proxy filter vd [index vdom | -1 match all]          Index of virtual domain. -1 matches all.                                      [5.0]
       # diagnose sys sip-proxy filter voip-profile                            VoIP profile to filter by.                                                    [5.0]
       # diagnose sys sip-proxy filter voip-profile [voip-profile]             VoIP profile to filter by.                                                    [5.0] 
       # diagnose sys sip-proxy filter voip-profile default                    default profile                                                               [5.0] 
       # diagnose sys sip-proxy filter voip-profile strict                     strict profile                                                                [5.0] 
       # diagnose sys sip-proxy log-filter clear                               Clear the current filter.                                                     [5.0]
       # diagnose sys sip-proxy log-filter dst-addr4 [from dstip] [to dstip]   IPv4 destination address range to filter by.                                  [5.0]
       # diagnose sys sip-proxy log-filter dst-addr6 [from dstip] [to dstip]   IPv6 destination address range to filter by.                                  [5.0]
       # diagnose sys sip-proxy log-filter dst-port [destination port]         Destination port to filter by.                                                [5.0]
       # diagnose sys sip-proxy log-filter identity-policy [identity-policy]   Identity-policy to filter by.                                                 [5.0]
       # diagnose sys sip-proxy log-filter list                                Display the current filter.                                                   [5.0]
       # diagnose sys sip-proxy log-filter negate                              Negate the specified filter parameter.                                        [5.0]
       # diagnose sys sip-proxy log-filter negate dst-addr4                    Negate the dst-addr4 filter.                                                  [5.0]  
       # diagnose sys sip-proxy log-filter negate dst-addr6                    Negate the dst-addr6 filter.                                                  [5.0]  
       # diagnose sys sip-proxy log-filter negate dst-port                     Negate the dst-port filter.                                                   [5.0]  
       # diagnose sys sip-proxy log-filter negate identity-policy              Negate the identity-policy filter.                                            [5.0]  
       # diagnose sys sip-proxy log-filter negate policy                       Negate the policy filter.                                                     [5.0]  
       # diagnose sys sip-proxy log-filter negate policy-type                  Negate the policy-type filter.                                                [5.0]  
       # diagnose sys sip-proxy log-filter negate src-addr4                    Negate the src-addr4 filter.                                                  [5.0]  
       # diagnose sys sip-proxy log-filter negate src-addr6                    Negate the src-addr6 filter.                                                  [5.0]  
       # diagnose sys sip-proxy log-filter negate src-port                     Negate the src-port filter.                                                   [5.0]  
       # diagnose sys sip-proxy log-filter negate vd                           Negate the virtual domain filter.                                             [5.0]  
       # diagnose sys sip-proxy log-filter negate voip-profile                 Negate the VoIP-profile filter.                                               [5.0]

       # diagnose sys sip-proxy log-filter policy                              Policy to filter by.                                                          [5.0]
       # diagnose sys sip-proxy log-filter policy-type                         Policy-type to filter by.                                                     [5.0]
       # diagnose sys sip-proxy log-filter policy-type ipv4                    Filter IPv4 policies.                                                         [5.0] 
       # diagnose sys sip-proxy log-filter policy-type ipv6                    Filter IPv6 policies.                                                         [5.0] 
       # diagnose sys sip-proxy log-filter src-addr4 [from srcip] [to srcip]   IPv4 source address range to filter by.                                       [5.0]
       # diagnose sys sip-proxy log-filter src-addr6 [from srcip] [to srcip]   IPv6 source address range to filter by.                                       [5.0]
       # diagnose sys sip-proxy log-filter src-port [source port]              Source port to filter by.                                                     [5.0]
       # diagnose sys sip-proxy log-filter vd [index vdom | -1 match all]      Index of virtual domain. -1 matches all.                                      [5.0]
       # diagnose sys sip-proxy log-filter voip-profile                        VoIP profile to filter by.                                                    [5.0]
       # diagnose sys sip-proxy log-filter voip-profile [voip-profile]         VoIP profile to filter by.                                                    [5.0] 
       # diagnose sys sip-proxy log-filter voip-profile default                profile                                                                       [5.0] 
       # diagnose sys sip-proxy log-filter voip-profile strict                 profile                                                                       [5.0] 
       # diagnose sys sip-proxy meters                                         Diagnostics for SIP rate limiting meters.                                     [5.0]
       
       NOTE For the following command: output  rate 1  shows that the current (over last second) measured rate for 
            INVITE/ACK and BYTE was 1 per second, the  peak 1  shows that the peak rate recorded is 1 per second, 
            the  max 0  shows that there is no maximum limit set, the  count 18  indicates that 18 messages were 
            received and  drop 0  indicates that none were dropped due to being over the limit.
       # diagnose sys sip-proxy redirect                                       Redirects                                                                     [5.0]
       # diagnose sys sip-proxy restart                                        Restart IM, SIP, and SCCP.                                                    [5.0]
       # diagnose sys sip-proxy scheduler-times                                Scheduler times.                                                              [5.0]
       # diagnose sys sip-proxy scheduler-times display                        Display scheduler times.                                                      [5.0] 
       # diagnose sys sip-proxy scheduler-times start                          Start measuring scheduler times.                                              [5.0] 
       # diagnose sys sip-proxy scheduler-times stop                           Stop measuring scheduler times.                                               [5.0] 
       # diagnose sys sip-proxy session                                        SIP sessions.                                                                 [5.0]
       # diagnose sys sip-proxy stats                                          SIP proxy statistics.                                                         [5.0]
       # diagnose sys sip-proxy stats call                                     SIP proxy call statistics summary.                                            [5.0] 
       # diagnose sys sip-proxy stats clear                                    Clear SIP proxy activity statistics.                                          [5.0] 
       # diagnose sys sip-proxy stats ha                                       SIP proxy HA statistics summary.                                              [5.0] 
       # diagnose sys sip-proxy stats list                                     SIP proxy activity statistics.                                                [5.0] 
       # diagnose sys sip-proxy stats mem full                                 Memory usage details.                                                         [5.0] 
       # diagnose sys sip-proxy stats mem summary                              Memory usage summary.                                                         [5.0] 
       # diagnose sys sip-proxy stats proto                                    SIP proxy general protocol statistics summary.                                [5.0] 
       # diagnose sys sip-proxy stats ssl-auth                                 SIP proxy SSL authentication statistics.                                      [5.0] 
       # diagnose sys sip-proxy stats udp                                      SIP proxy UDP statistics summary.                                             [5.0] 
       # diagnose sys sip-proxy vip                                            VIPs                                                                          [5.0]
       # diagnose sys sip-proxy vip policy                                     Policy VIP list.                                                              [5.0] 
       # diagnose sys sip-proxy vip real-server                                Real server VIP list.                                                         [5.0] 
       # diagnose sys sip-proxy vip rtp-policies                               RTP policies.                                                                 [5.0] 

sys stp

       # diagnose sys stp status                                         Display STP status.                                                                 [5.0][5.2]

sys tcp-option

       # diagnose sys tcp-option                                         Enable/disable TCP option.                                                          [5.0][5.2]
       # diagnose sys tcp-option disable                                 Disable TCP option.                                                                 [5.0] 
       # diagnose sys tcp-option enable                                  Enable TCP option.                                                                  [5.0] 

sys tcpsock

       # diagnose sys tcpsock                                            TCP sock info.                                                                      [5.0][5.2]
       0.0.0.0:993->0.0.0.0:0->state=listen err=0 sockflag=0x2 rma=0 wma=0 fma=0 tma=0
       0.0.0.0:995->0.0.0.0:0->state=listen err=0 sockflag=0x2 rma=0 wma=0 fma=0 tma=0
       0.0.0.0:5060->0.0.0.0:0->state=listen err=0 sockflag=0x2 rma=0 wma=0 fma=0 tma=0
       0.0.0.0:709->0.0.0.0:0->state=listen err=0 sockflag=0x1 rma=0 wma=0 fma=0 tma=0
       0.0.0.0:5190->0.0.0.0:0->state=listen err=0 sockflag=0x2 rma=0 wma=0 fma=0 tma=0
       0.0.0.0:1863->0.0.0.0:0->state=listen err=0 sockflag=0x2 rma=0 wma=0 fma=0 tma=0
       0.0.0.0:1000->0.0.0.0:0->state=listen err=0 sockflag=0x8 rma=0 wma=0 fma=0 tma=0
       0.0.0.0:1001->0.0.0.0:0->state=listen err=0 sockflag=0x8 rma=0 wma=0 fma=0 tma=0
       0.0.0.0:1002->0.0.0.0:0->state=listen err=0 sockflag=0x8 rma=0 wma=0 fma=0 tma=0
       0.0.0.0:10443->0.0.0.0:0->state=listen err=0 sockflag=0x4 rma=0 wma=0 fma=0 tma=0
       0.0.0.0:1003->0.0.0.0:0->state=listen err=0 sockflag=0x8 rma=0 wma=0 fma=0 tma=0
       0.0.0.0:1004->0.0.0.0:0->state=listen err=0 sockflag=0x8 rma=0 wma=0 fma=0 tma=0
       0.0.0.0:1005->0.0.0.0:0->state=listen err=0 sockflag=0x8 rma=0 wma=0 fma=0 tma=0
       0.0.0.0:110->0.0.0.0:0->state=listen err=0 sockflag=0x2 rma=0 wma=0 fma=0 tma=0
       0.0.0.0:910->0.0.0.0:0->state=listen err=0 sockflag=0x1 rma=0 wma=0 fma=0 tma=0
       0.0.0.0:1006->0.0.0.0:0->state=listen err=0 sockflag=0x8 rma=0 wma=0 fma=0 tma=0
       0.0.0.0:143->0.0.0.0:0->state=listen err=0 sockflag=0x2 rma=0 wma=0 fma=0 tma=0
       0.0.0.0:80->0.0.0.0:0->state=listen err=0 sockflag=0x1 rma=0 wma=0 fma=0 tma=0

sys top

       # diagnose sys top                                                Show top processes information.                                                     [5.0][5.2]
       # diagnose sys top [Delay in seconds (default 5)] [Maximum lines (default 20)] 
       Run Time:  40 days, 20 hours and 9 minutes
       0U, 0N, 1S, 99I; 1839T, 1403F, 159KF
                 newcli    12803      R <     1.4     0.7
                 httpsd     2769      S       0.0     1.5
                 httpsd      121      S       0.0     1.5
                pyfcgid    32457      S       0.0     1.3
                pyfcgid    32459      S       0.0     1.3
                pyfcgid    32460      S       0.0     1.3
                pyfcgid    32461      S       0.0     1.3
            proxyworker       87      S       0.0     1.2
                cmdbsvr       38      S       0.0     1.2
                miglogd       58      S       0.0     1.1
                sslvpnd     5439      S       0.0     1.0
              ipshelper    23154      S <     0.0     1.0
              ipsengine    10176      S <     0.0     1.0
                 httpsd       60      S       0.0     0.9
                 httpsd      120      S       0.0     0.9
                 cw_acd     5444      S       0.0     0.8
                  fgfmd      110      S       0.0     0.7
                 newcli    12765      S <     0.0     0.7
                src-vis       95      S       0.0     0.7
                   iked       88      S       0.0     0.6
       Press q  to quit and return to the normal CLI prompt. 
       Press p  to sort the processes by the amount of CPU that the processes are using. 
       Press m  to sort the processes by the amount of memory that the processes are using.
       Where the codes displayed on the second output line mean the following: 
       
       U is % of user space applications using CPU. In the example, 0U means 0% of the user space applications are using CPU. 
       S is % of system processes (or kernel processes) using CPU. In the example, 4S means 4% of the system processes are using the CPU. 
       I is % of idle CPU. In the example, 95I means the CPU is 95% idle. 
       T is the total FortiOS system memory in Mb. In the example, 1035792T means there are 1035792 Mb of system memory. 
       F is free memory in Mb. In the example, 646920F means there is 646920 Mb of free memory. 
       KF is the total shared memory pages used. 
       
       Each additional line of the command output displays information for each of the processes running on the FortiGate unit. 
       The following table describes the output format of the other lines.
       
       Column 1  Process Name  
       Column 2  Process identification (PID)  
       Column 3  One letter process status. S: sleeping process R: running process <: high priority  
       Column 4  CPU usage (%)  
       Column 5  Memory usage (%)  

sys top-summary

       # diagnose sys top-summary [Option]                              Show top aggregated processes information.                                           [5.0][5.2]
       Options
       --n or --num: Lines
       --i or --interval or : Interval
       --s or --sort:Sort (Sort can be: cpu_percent, mem, fds, pid) 
       --d or --dump: Dump
       --h or --help: Help
       
       - These options are only set temporarily. If you run the base command again without any options all of the 
         default settings will be used. 
       
       - Only one option can be used at a time. Combining multiple options will produce an error output. 
       # diagnose sys top-summary --n=12
          CPU [|||||||||||||                           ]  34.2%
          Mem [|||||||||                               ]  23.0%   438M/1839M
          Processes: 12 (running=3 sleeping=82)
          
          PID      RSS  ^CPU% MEM%   FDS     TIME+  NAME
        * 12765    18M   33.8  1.0    12  00:03.71  newcli [x2]
          23150    29M    0.0  1.6    32  00:12.39  ipsmonitor [x3]
          5444     16M    0.0  0.9    30  06:22.44  cw_acd
          38       23M    0.0  1.3    13  02:22.65  cmdbsvr
          6769     10M    0.0  0.6    22  00:00.18  dhcpd
          45       11M    0.0  0.6    87  00:01.35  zebos_launcher [x12]
          32457    24M    0.0  1.4    12  00:01.21  pyfcgid [x4]
          57       10M    0.0  0.5    12  00:00.20  uploadd
          58       21M    0.0  1.2    25  00:25.68  miglogd
          59        9M    0.0  0.5     8  00:00.00  kmiglogd
          60       39M    0.0  2.1    19  02:46.10  httpsd [x4]
          5439     20M    0.0  1.1    28  00:00.93  sslvpnd
       # diagnose sys top-summary --s=mem
          CPU [|||||||||||||                           ]  33.8%
          Mem [|||||||||                               ]  23.0%   438M/1839M
          Processes: 20 (running=3 sleeping=82)
          
          PID      RSS   CPU% ^MEM%   FDS     TIME+  NAME
        * 60       39M    0.0  2.1    19  02:46.10  httpsd [x4]
          23150    29M    0.0  1.6    32  00:12.39  ipsmonitor [x3]
          32457    24M    0.0  1.4    12  00:01.21  pyfcgid [x4]
          83       23M    0.0  1.3   780  00:00.85  proxyd [x5]
          38       23M    0.0  1.3    13  02:22.65  cmdbsvr
          58       21M    0.0  1.2    25  00:25.68  miglogd
          5439     20M    0.0  1.1    28  00:00.93  sslvpnd
          12765    18M   33.8  1.0    12  00:03.71  newcli [x2]
          5444     16M    0.0  0.9    30  06:22.48  cw_acd
          110      14M    0.0  0.8    16  00:00.43  fgfmd
          95       14M    0.0  0.8    16  00:12.30  src-vis
          85       12M    0.0  0.7    25  00:02.90  scanunitd [x3]
          88       12M    0.0  0.7    29  00:07.10  iked
          84       12M    0.0  0.7    34  00:10.60  imd
          108      11M    0.0  0.6    30  00:29.27  dnsproxy
          97       11M    0.0  0.6    20  00:00.45  urlfilter
          71       11M    0.0  0.6    21  00:00.52  forticron
          45       11M    0.0  0.6    87  00:01.35  zebos_launcher [x12]
          73       11M    0.0  0.6    38  00:00.30  authd
          89       10M    0.0  0.6    11  00:03.17  updated

sys tos-based-priority

       # diagnose sys tos-based-priority                                 ToS based priority.                                                                 [5.0]
       
       NOTE This example displays the priority value currently correlated with each possible TOS bit value. Priority 
            values are displayed in order of their corresponding TOS bit values, which can range between 0 and 15, 
            from lowest TOS bit value to highest. 

sys traffic-priority

       # diagnose sys traffic-priority                                   Traffic Priority (DSCP/TOS).                                                        [5.2]

sys uuid

       # diagnose sys uuid                                               UUID debug.                                                                         [5.2]

sys vd

       # diagnose sys vd                                                 Virtual domain management.                                                          [5.0][5.2]
       # diagnose sys vd add [Virtual Domain Name]                       Add a Virtual System.                                                               [5.0] 
       # diagnose sys vd delete [Virtual Domain Name]                    Delete a Virtual System.                                                            [5.0] 
       # diagnose sys vd list                                            List Virtual Domains.                                                               [5.0] 
       system fib version=62
       list virtual firewall info:
       name=vsys_fgfm index=2 enabled use=8 rt_num=0 asym_rt=0 sip_helper=0, sip_nat_trace=1, mc_fwd=0, mc_ttl_nc=0, tpmc_sk_pl=0
               ecmp=source-ip-based asym_rt6=0 rt6_num=4 strict_src_check=0 dns_log=0 ses_num=0 ses6_num=0 pkt_num=0
               tree_flag=0 tree6_flag=0 dnat_tree_flag=0 nataf=0 traffic_log=0 extended_traffic_log=0 svc_depth=0
               log_neigh=0, deny_tcp_with_icmp=0 ses_denied_traffic=no
               ipv4_rate=0, ipv6_rate=0
       name=vsys_ha index=1 enabled use=11 rt_num=0 asym_rt=0 sip_helper=0, sip_nat_trace=1, mc_fwd=0, mc_ttl_nc=0, tpmc_sk_pl=0
               ecmp=source-ip-based asym_rt6=0 rt6_num=6 strict_src_check=0 dns_log=0 ses_num=0 ses6_num=0 pkt_num=1167
               tree_flag=0 tree6_flag=0 dnat_tree_flag=0 nataf=0 traffic_log=0 extended_traffic_log=0 svc_depth=0
               log_neigh=0, deny_tcp_with_icmp=0 ses_denied_traffic=no
               ipv4_rate=0, ipv6_rate=0
               ha_flags={no-ses-sync,no-ses-flush,no-ha-stats} mode=standalone ha_state=work prio=0 vid=0
       name=root index=0 enabled use=76 rt_num=13 asym_rt=0 sip_helper=0, sip_nat_trace=0, mc_fwd=1, mc_ttl_nc=0, tpmc_sk_pl=0
               ecmp=source-ip-based asym_rt6=0 rt6_num=38 strict_src_check=0 dns_log=1 ses_num=13 ses6_num=0 pkt_num=70604913
               tree_flag=1 tree6_flag=1 dnat_tree_flag=1 nataf=0 traffic_log=1 extended_traffic_log=0 svc_depth=19
               log_neigh=0, deny_tcp_with_icmp=0 ses_denied_traffic=no
               ipv4_rate=0, ipv6_rate=0
       vf_count=4 vfe_count=21
       
       # diagnose sys vd set [Virtual Domain Name]                       Set current VDOM.                                                                   [5.0] 

sys vlan

       # diagnose sys vlan                                               vlan                                                                                [5.0][5.2]

sys wccp

       # diagnose sys wccp                                               wccp                                                                                [5.0][5.2]
       # diagnose sys wccp delete [Service ID]                           Delete one wccp service.                                                            [5.0] 
       # diagnose sys wccp flush                                         Flush wccp services.                                                                [5.0] 
       # diagnose sys wccp list                                          List wccp services.                                                                 [5.0] 

test

test application

       # diagnose test application ddnscd [Integer]                      DDNS client daemon.                                                                 [5.0]
       Integer        
       1.  Show Peanut Hull Status
       2.  Peanut Hull Reconnect
       3.  Show FortiDDNS Status
       4.  Reset FortiDDNS Status
       # diagnose test application dhcp6c [Integer]                      DHCP6 client daemon.                                                                [5.0]
       # diagnose test application dhcprelay [Integer]                   DHCP relay daemon.                                                                  [5.0]
       # diagnose test application dnsproxy [Integer]                    DNS proxy.                                                                          [5.0]
       
       Integer
       1. Clear DNS cache
       2. Show stats
       3. Dump DNS setting
       4. Reload FQDN
       5. Requery FQDN
       6. Dump FQDN
       7. Dump DNS cache
       8. Dump DNS DB
       9. Reload DNS DB
       10. Dump secure DNS policy/profile
       11. Reload Secure DNS setting
       12. Show Hostname cache
       13. Clear Hostname cache
       14. DNS debug bit mask
       # diagnose test application dsd [Integer]                         DLP Statistics daemon.                                                              [5.0]
       
       Integer
       1.    This menu
       2.    Display memory usage
       3.    Display malloced devices
       # diagnose test application forticldd [Integer]                   FortiCloud daemon.                                                                  [5.0]
       
       Integer
       1. dump fds setting
       2. dump log controller status
       3. dump log server status
       4. dump msg controller status
       5. dump msg server status
       7. dump FDS default update server status
       8. dump FDNI status
       9. dump Contract Controller status
       10. dump Configuration Manager status
       11. dump FortiClient status
       12. dump FortiManager status
       13. dump image/cfg/script schedule
       14. dump image list
       15. dump fap version list
       20. toggle debug of FortiGuard log
       # diagnose test application forticron [Integer]                   Forticron daemon.                                                                   [5.0]
       
       Integer
       1. show stats
       2. dump certificate list
       3. dump CRL
       4. dump misc timers
       5. dump scheduled jobs
       6. dump scep list
       100. dump vdom-root log setting
       # diagnose test application fsd [Integer]                         FortiExplorer daemon.                                                               [5.0]
       # diagnose test application ftpd [Integer]                        FTP proxy.                                                                          [5.0]
       
       Integer
       Proxy Worker 0 - ftpd:
       [0:F] 
       FTP Proxy Test Usage
       [0:F] 
       [0:F]    2: Drop all connections
       [0:F]    4: Display connection stat
       [0:F]   44: Display info per connection
       [0:F]  444: Display connections per state
       [0:F] 4444: Display per vdom stats
       # diagnose test application harelay [Integer]                     HA relay daemon.                                                                    [5.0]
       # diagnose test application http [Integer]                        HTTP proxy.                                                                         [5.0]
       
       Integer
       Proxy Worker 0 - http:
       [0:H] 
       HTTP Proxy Test Usage
       [0:H] 
       [0:H]     2: Drop all connections
       [0:H]    22: Drop idle connections
       [0:H]     4: Display connection stat
       [0:H]    44: Display info per connection
       [0:H]   444: Display connections per state
       [0:H]  4444: Display per-VDOM statistics
       [0:H]    55: Display tcp info per connection
       [0:H]     6: Display ICAP information
       [0:H]    70: Disable ICAP 'Allow: 204' (default)
       [0:H]    71: Enable ICAP 'Allow: 204'
       [0:H]    72: Drop all ICAP server connections
       [0:H]     8: Display client comfort / infection cache stats
       [0:H]    88: Display client comfort / infection cache stats
       [0:H]    11: Display the SSL session ID cache statistics
       [0:H]    12: Clear the SSL session ID cache statistics
       [0:H]    13: Display the SSL session ID cache
       [0:H]    14: Clear the SSL session ID cache
       [0:H]    80: Show Fortinet bar SSL-VPN bookmark info
       [0:H]    81: Show Fortinet bar SSL-VPN bookmark cache
       [0:H]    82: Show Fortinet bar SSL-VPN bookmark LRU list
       # diagnose test application imap [Integer]                        IMAP proxy.                                                                         [5.0]
       
       Integer
       Proxy Worker 0 - imap:
       [0:I] 
       IMAP Proxy Test Usage
       [0:I] 
       [0:I]    2: Drop all connections
       [0:I]    4: Display connection stat
       [0:I]   44: Display info per connection
       [0:I]  444: Display connections per state
       [0:I] 4444: Display per vdom stats
       # diagnose test application info-sslvpnd [Integer]                SSL-VPN info daemon.                                                                [5.0]
       
       Integer
       SSL-VPN Info Daemon Test Usage:
       -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
         1 : Dump app session cache
        11 : Dump app session LRU list
         2 : Dump web session cache
        21 : Dump web session cache (IP index)
        50 : Dump daemon memory stats
        51 : Dump daemon object counts
        99 : Restart daemon
       # diagnose test application ipldbd [Integer]                      IP load balancing daemon.                                                           [5.0]
       # diagnose test application ipsengine [Integer]                   ips sensor                                                                          [5.0]
       # diagnose test application ipsmonitor [Integer]                  ips monitor                                                                         [5.0]
       
       Integer
       IPS Engine Test Usage:
       
           1: Display IPS engine information
           2: Toggle IPS engine enable/disable status
           3: Display restart log
           4: Clear restart log
           5: Toggle bypass status
           6: Submit attack characteristics now
          10: IPS queue length
          11: Clear IPS queue length
          12: IPS L7 socket statistics
          13: IPS session list
          14: IPS NTurbo statistics
          15: IPSA statistics
          16: Display device identification cache
          17: Clear device identification cache
          96: Toggle IPS engines watchdog timer
          97: Start all IPS engines
          98: Stop all IPS engines
          99: Restart all IPS engines and monitor
       # diagnose test application ipsufd [Integer]                      IPS urlfilter daemon.                                                               [5.0]
       
       Integer
       Test Commands:
           1. show all domain name & ip entries
           2. show all unresolved domain names
           3. show summary statistics
           4. verify routing table entries
           44. verify routing table entries (verbose)
           5. show all join table entries
           91. remove stale routes in routing table
       
       Debug Levels:
             1. critical   - disabled.  To   enable, set level 1
             2. error      - disabled.  To   enable, set level 2
             4. major      - disabled.  To   enable, set level 4
             8. minor      - disabled.  To   enable, set level 8
            16. CMDB       - disabled.  To   enable, set level 16
            32. routes     - disabled.  To   enable, set level 32
            64. detailed   - disabled.  To   enable, set level 64
           128. DNS        - disabled.  To   enable, set level 128
           256. memory     - disabled.  To   enable, set level 256
       # diagnose test application l2tpcd [Integer]                      L2TP client daemon.                                                                 [5.0]
       # diagnose test application lted [Integer]                        USB LTE daemon.                                                                     [5.0]
       # diagnose test application miglogd [Integer]                     Miglog logging daemon.                                                              [5.0]
       
       Integer
       1. Show global log setting.
       2. Show vdom log setting.
       3. Show log buffer sz.
       4. Show active log devices.
       5. Show MAX file descriptor number.
       6. Dump statistics.
       9. Delete all policy sniffer files.
       10. Show cid cache.
       11. Show UTM traffic cache.
       13. Increase the number of miglog children.
       14. Decrease the number of miglog children.
       15. Show miglog ID.
       16. Show log disk usage.
       18. Show network interface cache.
       19. Show application cache.
       20. Show FortiCloud log state.
       21. Show memory log statistics.
       22. Show memory traffic logs.
       23. Show memory event logs.
       
       101. Vdom-root Show log setting.
       102. Vdom-root Show application custom cache.
       103. Vdom-root Show application list cache.
       104. Vdom-root Show UTM traffic cache.
       105. Vdom-root Show reputation traffic cache.
       # diagnose test application nntp [Integer]                        NNTP proxy.                                                                         [5.0]
       
       Integer
       Proxy Worker 0 - nntp:
       [0:N] 
       NNTP Proxy Test Usage
       [0:N] 
       [0:N]    2: Drop all connections
       [0:N]    4: Display connection stat
       [0:N]   44: Display info per connection
       [0:N]  444: Display connections per state
       [0:N] 4444: Display per vdom stats
       # diagnose test application pop3 [Integer]                        POP3 proxy.                                                                         [5.0]
       
       Integer
       Proxy Worker 0 - pop3:
       [0:P] 
       POP3 Proxy Test Usage
       [0:P] 
       [0:P]    2: Drop all connections
       [0:P]    4: Display connection stat
       [0:P]   44: Display info per connection
       [0:P]  444: Display connections per state
       [0:P] 4444: Display per vdom stats
       # diagnose test application pptpcd [Integer]                      PPTP client.                                                                        [5.0]
       # diagnose test application proxyacceptor[Integer]                Proxy acceptor.                                                                     [5.0]
       
       Integer
       Proxy Acceptor Test Usage
       
          1: Dump Memory Usage
          4: Display acceptor stats
         99: Restart proxy acceptor
       # diagnose test application proxyworker [Integer]                 Proxy worker.                                                                       [5.0]
       
       Integer
       Proxy Worker 0 - worker:
       [0:W] 
       Proxy Worker Test Usage
       [0:W] 
       [0:W]    1: Dump Memory Usage
       [0:W]    2: Dump vdom list
       [0:W]    3: Display pid
       [0:W]    4: Display stats for all protocols
       [0:W] 4444: Display per vdom stats for all protocols
       [0:W]    5: Display debug log stats
       [0:W]    6: Toggle Print Stat mode every ~40 seconds
       [0:W]   88: Toggle statistic recording
       [0:W]   99: Restart proxy
       # diagnose test application quarantined [Integer]                 Quarantine daemon.                                                                  [5.0]
       
       Integer
       1. Dump daemon setting
       2. Dump daemon status
       3. Dump quarantine cache
       4. Clear quarantine cache
       5. Dump quarantine list
       6. Reclaim disk space
       7. Dump fortiguard analytic cache
       8. Clear fortiguard analytic cache
       9. Request analytic stats
       50. Toggle quarantine processing
       100. Dump vdom-root quaratine setting
       # diagnose test application radiusd [Integer]                     RADIUS daemon.                                                                      [5.0]
       # diagnose test application scanunit [Integer]                    Scanning unit.                                                                      [5.0]
       
       Integer
       Scanunit Test Usage
       
         20: Set   ASE debug flag bit 0
         21: Set   ASE debug flag bit 1
         22: Set   ASE debug flag bit 2
         23: Set   ASE debug flag bit 3
         24: Set   ASE debug flag bit 4
         25: Set   ASE debug flag bit 5
         26: Set   ASE debug flag bit 6
         27: Set   ASE debug flag bit 7
       # diagnose test application sflowd [Integer]                      sFlow daemon.                                                                       [5.0]
       # diagnose test application smtp [Integer]                        SMTP proxy.                                                                         [5.0]
       
       Integer
       Proxy Worker 0 - smtp:
       [0:S] 
       SMTP Proxy Test Usage
       [0:S] 
       [0:S]    2: Drop all connections
       [0:S]    4: Display connection stat
       [0:S]   44: Display info per connection
       [0:S]  444: Display connections per state
       [0:S] 4444: Display per vdom stats
       # diagnose test application snmpd [Integer]                       SNMP daemon.                                                                        [5.0]
       
       Integer
       SNMP Daemon Test Usage
          1: display daemon pid
          2: display snmp statistics
          3: clear snmp statistics
          4: generate test trap (oid: 999)
         99: restart daemon
       # diagnose test application sslacceptor [Integer]                 SSL proxy.                                                                          [5.0]
       
       Integer
       SSL Proxy Acceptor Test Usage
       
          1: Dump Memory Usage
          3: Display PID
          4: Display Acceptor stats
         99: Restart proxy
       # diagnose test application sslworker [Integer]                   SSL proxy.                                                                          [5.0]
       
       Integer
       SSL Worker 0:
       
       SSL Proxy Test Usage
       
          1: Dump Memory Usage
          2: Drop all connections
          3: Display PID
          4: Display connection stat
          5: Toggle AV Bypass mode
          6: Display memory statistics
          7: Display SSL proxy options
          8: Toggle SSL only mode
         10: Display connection TCP info
         44: Display info per connection
        444: Display connections per state
         11: Display connection TTL list
         12: Clear the SSL certificate cache
         13: Display config statistics
         99: Restart proxy
       # diagnose test application uploadd [Integer]                     Upload daemon.                                                                      [5.0]
       
       Integer
       1. show stats
       99. restart
       # diagnose test application urlfilter [Integer]                   URL filter daemon.                                                                  [5.0]
       
       Integer
       1.   This menu
       2.   Clear WF cache
       3.   Display WF cache contents
       4.   Display WF cache TTL list
       5.   Display WF cache LRU list
       6.   Display WF cache in tree format
       7.   Toggle switch for dumping unrated packet
       10.  Print debug values
       11.  Clear Spam Filter cache
       12.  Clear AV Query cache
       13. Toggle switch for dumping expired license packets
       14.  Show running timers (except request timers)
       144. Show running timers (including request timers)
       15.  Send INIT requests.
       16.  Display WF cache contents of prefix type
       19.  Display object counts
       20.  Display FTGD TCP stats
       99.  Restart the urlfilter daemon.
       
       Debug levels:
       Warning messages:             1   (0x001)
       Block events:                 2   (0x002)
       Pass events:                  4   (0x004)
       URL request events:           8   (0x008)
       Cache events:                 16  (0x010)
       Prefix events:                32  (0x020)
       Prefix delete subtree events: 64  (0x040)
       Add after prefix events:      128 (0x080)
       CMDB events:                  256 (0x100)
       DNS resolver messages:        512 (0x200)
       Keyword search messages:     1024 (0x400)
       INIT request messages:       2048 (0x800)
       Quota messages:              4096 (0x1000)
       # diagnose test application wad [Integer]                         WAD related processes.                                                              [5.0]
       # diagnose test application wccpd [Integer]                       WCCP daemon.                                                                        [5.0]
       # diagnose test application wpad [Integer]                        WPA daemon.                                                                         [5.0]
       
       Integer
       wpad test usage:
       
                1: Dump VAP
                2: Dump STA
                3: Reauth EAPOL STA in 5...25 seconds
                4: rekey gtk in 5 seconds
                5: STA debugging filter
                6: Dump VAP with key
                7: Dump STA with key

test authserver

       # diagnose test authserver cert [please input args]                                                                Test certificate authentication.   [5.0]
       # diagnose test authserver ldap [server_name] [username] [password]                                                Test LDAP server.                  [5.0]
       # diagnose test authserver ldap-digest [please input args]                                                         Test LDAP HA1 password query.      [5.0]
       # diagnose test authserver ldap-direct [server_name or IP]                                                         Test LDAP server directly.         [5.0]
       # diagnose test authserver ldap-group [ldapserver] [account] [domain] [DomainDN] [BaseDN]                          Search LDAP server.                [5.0]
       # diagnose test authserver ldap-search [please input args]                                                         Search LDAP server.                [5.0]
       # diagnose test authserver local [please input args]                                                               Test local user.                   [5.0]
       # diagnose test authserver pop3 [please input args]                                                                Test POP3 server.                  [5.0]
       # diagnose test authserver radius [server_name] [chap | pap | mschap | mschap2] [username] [password]              Test RADIUS server.                [5.0]
       # diagnose test authserver radius-direct [server_name or IP] [port no(0=default port] [secret] [user] [password]   Test RADIUS server directly.       [5.0]
       # diagnose test authserver tacacs+ [server_name] [username] [password]                                             Test TACACS+ server.               [5.0]
       # diagnose test authserver tacacs+-direct [server_name or IP] [port no(0=default port] [key]                       Test TACACS+ server directly.      [5.0]
       # diagnose test authserver user [please input args]                                                                Test user group ID(s) name(s).     [5.0]

test guest

       # diagnose test guest add [please input args]                     Add a guest user.                                                                   [5.0]
       # diagnose test guest del [please input args]                     Delete guest users.                                                                 [5.0]
       # diagnose test guest list [please input args]                    List guest users.                                                                   [5.0]

test update

       # diagnose test update info                                       Display debug info.                                                                 [5.0]

traffictest

       # diagnose traffictest show                                       Traffic settings show (show filters)                                                [5.2.5]
       
       to set filter parameters:
       
       # diagnose traffictest server-intf                                set server interface                                                                [5.2.5]
       # diagnose traffictest client-intf                                set client interface                                                                [5.2.5]
       # diagnose traffictest port                                       TCP or UDP port number (0 - 65535)                                                  [5.2.5]
       # diagnose traffictest proto                                      0 for TCP or 1 for UDP (default = 0)                                                [5.2.5]
       # diagnose traffictest run                                        Start traffic                                                                       [5.2.5]
       # diagnose traffictest run [argument]                             Start traffic with argument                                                         [5.2.5]
       
       Where argument can be :                                           [KMG] indicates options that support a K/M/G suffix for kilo-, mega-, or giga-
       
         -f                                                              format [kmgKMG] format to report: Kbits, Mbits, KBytes, MBytes
         -i                                                              interval # seconds between periodic bandwidth reports
         -F                                                              file name xmit/recv the specified file
         -A                                                              affinity n/n,m set CPU affinity
         -V                                                              verbose more detailed output
         -J                                                              json output in JSON format
         -d                                                              debug emit debugging output
         -v                                                              version show version information and quit
         -h                                                              help show this message and quit
         -b                                                              bandwidth #[KMG][/#] target bandwidth in bits/sec (0 for unlimited) 
                                                                         (default %d Mbit/sec for UDP, unlimited for TCP) (optional slash and packet count for burst mode)
         -t                                                              time # time in seconds to transmit for (default %d secs)
         -n                                                              bytes #[KMG] number of bytes to transmit (instead of -t)
         -k                                                              blockcount #[KMG] number of blocks (packets) to transmit (instead of -t or -n)
         -l                                                              len #[KMG] length of buffer to read or write (default %d KB for TCP, %d KB for UDP)
         -P                                                              parallel # number of parallel client streams to run
         -R                                                              reverse run in reverse mode (server sends, client receives)
         -w                                                              window #[KMG] TCP window size (socket buffer size)
         -C                                                              linux-congestion <algo> set TCP congestion control algorithm (Linux only)
         -M                                                              set-mss # set TCP maximum segment size (MTU - 40 bytes)
         -N                                                              nodelay set TCP no delay, disabling Nagle's Algorithm
         -4                                                              version4 only use IPv4
         -6                                                              version6 only use IPv6
         -S                                                              tos N set the IP 'type of service'
         -L                                                              flowlabel N set the IPv6 flow label (only supported on Linux)
         -Z                                                              zerocopy use a 'zero copy' method of sending data
         -O                                                              omit N omit the first n seconds
         -T                                                              title str prefix every output line with this string          
         -get-server-output                                              get results from server

user

       # diagnose user device clear                                      Clear discovered hosts.                                                             [5.0]
       # diagnose user device del [MAC address]                          Remove a specific host.                                                             [5.0]
       # diagnose user device filter addr [from ip] [to ip]              IPv4 address range.                                                                 [5.0]
       # diagnose user device filter clear                               Clear the filter or parameter.                                                      [5.0]
       # diagnose user device filter clear addr                          Clear parameter.                                                                    [5.0]  
       # diagnose user device filter clear generation                    Clear parameter.                                                                    [5.0]  
       # diagnose user device filter clear index                         Clear parameter.                                                                    [5.0]  
       # diagnose user device filter clear joined                        Clear parameter.                                                                    [5.0] 
       # diagnose user device filter clear os-name                       Clear parameter.                                                                    [5.0]  
       # diagnose user device filter clear type                          Clear parameter.                                                                    [5.0]  
       # diagnose user device filter clear type-generation               Clear parameter.                                                                    [5.0]  
       # diagnose user device filter clear type-src                      Clear parameter.                                                                    [5.0]  
       # diagnose user device filter clear vd                            Clear parameter.                                                                    [5.0] 
       # diagnose user device filter generation [from] [to]              Device generation.                                                                  [5.0]
       # diagnose user device filter joined [value]                      Device is joined to another.                                                        [5.0]
       # diagnose user device filter list                                Display the current filter.                                                         [5.0]
       # diagnose user device filter negate                              Negate the specified filter parameter.                                              [5.0]
       # diagnose user device filter negate addr                         Negate parameter.                                                                   [5.0]  
       # diagnose user device filter negate generation                   Negate parameter.                                                                   [5.0]  
       # diagnose user device filter negate index                        Negate parameter.                                                                   [5.0]  
       # diagnose user device filter negate joined                       Negate parameter.                                                                   [5.0]  
       # diagnose user device filter negate os-name                      Negate parameter.                                                                   [5.0]  
       # diagnose user device filter negate type                         Negate parameter.                                                                   [5.0]  
       # diagnose user device filter negate type-generation              Negate parameter.                                                                   [5.0]  
       # diagnose user device filter negate type-src                     Negate parameter.                                                                   [5.0]  
       # diagnose user device filter negate vd                           Negate parameter.                                                                   [5.0] 
       # diagnose user device filter os-name [OS | "" matches unknown]   Operating system name; "" matches unknown.                                          [5.0]
       # diagnose user device filter type [Device | "" matches unknown]  Device type; "" matches unknown.                                                    [5.0]
       # diagnose user device filter type-generation [from] [to]         Device type generation.                                                             [5.0]
       # diagnose user device filter type-src                            Device type source.                                                                 [5.0]
       # diagnose user device filter vd [index vdom]                     Index of virtual domain.                                                            [5.0]
       # diagnose user device get [MAC address]                          List a specific host.                                                               [5.0]
       # diagnose user device host-type-summary                          Discovered host type summary.                                                       [5.0]
       # diagnose user device invalidate [MAC address]                   Flag discovered data for revalidation.                                              [5.0]
       # diagnose user device list                                       List known hosts.                                                                   [5.0]
       # diagnose user device os-summary                                 Discovered OS summary.                                                              [5.0]
       # diagnose user device stats                                      User device stats.                                                                  [5.0]

vpn

vpn auto-ipsec

       # diagnose vpn auto-ipsec bootstrap accept [preshared-key]        Accept tunnel setup request from remote server.                                     [5.0]
       # diagnose vpn auto-ipsec bootstrap reject                        Reject tunnel setup request from remote server.                                     [5.0]
       # diagnose vpn auto-ipsec bootstrap status                        Show IPsec auto-configuration bootstrap status.                                     [5.0]
       # diagnose vpn auto-ipsec client clear-config [name]              Clear dynamically created IPsec configuration.                                      [5.0]
       # diagnose vpn auto-ipsec client status                           Show IPsec auto-configuration client status.                                        [5.0]
       # diagnose vpn auto-ipsec gateway notify [Name auto-config gw]    Send IPsec auto-configuration notification to peer.                                 [5.0]
       # diagnose vpn auto-ipsec gateway status                          Show IPsec auto-configuration gateway status.                                       [5.0]

vpn concentrator

       # diagnose vpn concentrator list [please input args]              List all concentrators                                                              [5.0]

vpn ike

       # diagnose vpn ike config list                                    List IKE configuration                                                              [5.0]
       vd: root/0
       name: ipsec-cisco
       serial: 4
       version: 1
       type: dynamic
       mode: main
       dpd: enable  retry-count 3  interval 5000ms
       auth: psk
       dhgrp:  2
       fragmentation: enable
       xauth: server-auto
       xauth-group: gr-ipsec-cisco-vpn-local.intra
       interface: wan1
       add-route: enable
       distance: 1
       priority: 0
       phase2s:
         ipsec-cisco proto 0 src 0.0.0.0/0.0.0.0:0 dst 0.0.0.0/0.0.0.0:0  replay  keep-alive
       policy: yes
       # diagnose vpn ike counts                                         IKE object counts.                                                                  [5.0]
       
       NOTE This command displays list of IKE objects and their current, maximum, and total counts.
       # diagnose vpn ike crypto hardware                                Use hardware crypto if available.                                                   [5.0]
       # diagnose vpn ike crypto software                                Use software crypto.                                                                [5.0]
       # diagnose vpn ike crypto stats                                   Crypto statistics.                                                                  [5.0]
       software.dh-modp: 0 0
       hardware.dh-modp: 0 0
       software.dh-ecp: 0 0
       hardware.dh-ecp: 0 0
       ....................
       ....................
       ....................
       # diagnose vpn ike errors                                         IKE errors.                                                                         [5.0]
       limits.euthanized: 0
       limits.blocked: 0
       in.truncated: 0
       in.giant: 0
       in.baby: 0
       in.baby.float: 0
       out.fail: 0
       isakmp.truncated: 0
       isakmp.embryonic.connection.killed: 0
       isakmp.embryonic.sa.killed: 0
       isakmp.established.sa.killed: 0
       isakmp.duplicate: 0
       isakmp.unknown: 0
       isakmp.remote-addr-mismatch: 0
       isakmp.local-addr-mismatch: 0
       ...................................
       ...................................
       ...................................
       # diagnose vpn ike filter autoconf-status [Auto status | 0=all]   Auto-configuration status.                                                          [5.0]
       # diagnose vpn ike filter autoconf-type [Auto type | 0=all]       Auto-configuration type.                                                            [5.0]
       # diagnose vpn ike filter clear                                   Erase the current filter.                                                           [5.0]
       # diagnose vpn ike filter dst-addr4 [dstip]                       IPv4 destination address range to filter by.                                        [5.0]
       # diagnose vpn ike filter dst-addr6 [dstip]                       IPv6 destination address range to filter by.                                        [5.0]
       # diagnose vpn ike filter dst-port [dst port]                     Destination port range to filter by.                                                [5.0]
       # diagnose vpn ike filter interface [Index Interface | 0=all]     Interface that IKE connection is negotiated over.                                   [5.0]
       # diagnose vpn ike filter list                                    Display the current filter.                                                         [5.0]
       # diagnose vpn ike filter name [Name to filter by]                Phase1 name to filter by.                                                           [5.0]
       # diagnose vpn ike filter negate autoconf-status                  Negate autoconf-status.                                                             [5.0]
       # diagnose vpn ike filter negate autoconf-type                    Negate autoconf-type.                                                               [5.0]
       # diagnose vpn ike filter negate dst-addr4                        Negate IPv4 destination address.                                                    [5.0]
       # diagnose vpn ike filter negate dst-addr6                        Negate IPv6 destination address.                                                    [5.0]
       # diagnose vpn ike filter negate dst-port                         Negate destination port.                                                            [5.0]
       # diagnose vpn ike filter negate interface                        Negate interface.                                                                   [5.0]
       # diagnose vpn ike filter negate name                             Negate name.                                                                        [5.0]
       # diagnose vpn ike filter negate src-addr4                        Negate IPv4 source address.                                                         [5.0]
       # diagnose vpn ike filter negate src-addr6                        Negate IPv6 source address.                                                         [5.0]
       # diagnose vpn ike filter negate src-port                         Negate source port.                                                                 [5.0]
       # diagnose vpn ike filter negate vd                               Negate virtual domain.                                                              [5.0]
       # diagnose vpn ike filter src-addr4 [srcip]                       IPv4 source address range to filter by.                                             [5.0]
       # diagnose vpn ike filter src-addr6 [srcip]                       IPv6 source address range to filter by.                                             [5.0]
       # diagnose vpn ike filter src-port [source port]                  Source port range to filter by.                                                     [5.0]
       # diagnose vpn ike filter vd [index vdom | -1=all]                Index of virtual domain. -1 matches all.                                            [5.0]
       # diagnose vpn ike gateway clear [Clear gateway by name]          Clear IKE gateways.                                                                 [5.0]
       # diagnose vpn ike gateway flush [Flush gateway by name]          Synonym for clear.                                                                  [5.0]
       # diagnose vpn ike gateway list [List gateway by name]            list                                                                                [5.0]
       # diagnose vpn ike log filter clear                               Erase the current filter.                                                           [5.0]
       # diagnose vpn ike log filter dst-addr4 [dstip]                   IPv4 destination address range to filter by.                                        [5.0]
       # diagnose vpn ike log filter dst-addr6 [dstip]                   IPv6 destination address range to filter by.                                        [5.0]
       # diagnose vpn ike log filter dst-port [dst port]                 Destination port range to filter by.                                                [5.0]
       # diagnose vpn ike log filter interface [index interface | 0=all] Interface that IKE connection is negotiated over.                                   [5.0]
       # diagnose vpn ike log filter list                                Display the current filter.                                                         [5.0]
       # diagnose vpn ike log filter name [Name to filter by]            Phase1 name to filter by.                                                           [5.0]
       # diagnose vpn ike log filter negate dst-addr4                    Negate IPv4 destination address.                                                    [5.0]
       # diagnose vpn ike log filter negate dst-addr6                    Negate IPv6 destination address.                                                    [5.0]
       # diagnose vpn ike log filter negate dst-port                     Negate destination port.                                                            [5.0]
       # diagnose vpn ike log filter negate interface                    Negate interface.                                                                   [5.0]
       # diagnose vpn ike log filter negate name                         Negate name.                                                                        [5.0]
       # diagnose vpn ike log filter negate src-addr4                    Negate IPv4 source address.                                                         [5.0]
       # diagnose vpn ike log filter negate src-addr6                    Negate IPv6 source address.                                                         [5.0]
       # diagnose vpn ike log filter negate src-port                     Negate source port.                                                                 [5.0]
       # diagnose vpn ike log filter negate vd                           Negate virtual domain.                                                              [5.0]
       # diagnose vpn ike log filter src-addr4 [srcip]                   IPv4 source address range to filter by.                                             [5.0]
       # diagnose vpn ike log filter src-addr6 [srcip]                   IPv6 source address range to filter by.                                             [5.0]
       # diagnose vpn ike log filter src-port [source port]              Source port range to filter by.                                                     [5.0]
       # diagnose vpn ike log filter vd [index vdom | -1=0]              Index of virtual domain. -1 matches all.                                            [5.0]
       # diagnose vpn ike log terminal clear                             Clear IKE debug log terminals.                                                      [5.0]
       # diagnose vpn ike log terminal reset                             Reset IKE debug log terminals.                                                      [5.0]
       # diagnose vpn ike log terminal stats                             Show IKE debug log terminal statistics.                                             [5.0]
       # diagnose vpn ike restart                                        Restart IKE.                                                                        [5.0]
       # diagnose vpn ike routes list                                    List IKE routes.                                                                    [5.0]
       # diagnose vpn ike status detailed                                Detailed status.                                                                    [5.0]
       # diagnose vpn ike status summary                                 Status summary.                                                                     [5.0]

vpn ipsec

       # diagnose vpn ipsec status                                       Show status of IPsec                                                                [5.0]

vpn l2tp

       # diagnose vpn l2tp status                                        Display L2TP status                                                                 [5.0]

vpn pptp

       # diagnose vpn pptp status                                        Display PPTP status.                                                                [5.0]

vpn ssl

       # diagnose vpn ssl debug-filter clear                             Erase the current filter.                                                           [5.0]
       # diagnose vpn ssl debug-filter list                              Display the current filter.                                                         [5.0]
       # diagnose vpn ssl debug-filter negate src-addr4 [srcip]          IPv4 source address.                                                                [5.0]
       # diagnose vpn ssl debug-filter negate src-addr6 [srcip]          IPv6 source address.                                                                [5.0]
       # diagnose vpn ssl debug-filter negate vd [vdom]                  Virtual domain.                                                                     [5.0]
       # diagnose vpn ssl debug-filter src-addr4                         IPv4 source address range.                                                          [5.0]
       # diagnose vpn ssl debug-filter src-addr6                         IPv6 source address range.                                                          [5.0]
       # diagnose vpn ssl debug-filter vd                                Name of of virtual domain.                                                          [5.0] 
       # diagnose vpn ssl hw-acceleration-status                         SSL hardware acceleration status.                                                   [5.0]
       # diagnose vpn ssl list                                           List current connections.                                                           [5.0]
       # diagnose vpn ssl mux                                            Show mux information.                                                               [5.0]
       # diagnose vpn ssl statistics                                     statistics                                                                          [5.0]
       # diagnose vpn ssl statistics  [all|vdom-name|vfid]               Display SSL-VPN statistics for all vdoms or given vdom or vifd.                     [5.0] 
       
       NOTE Without argument, statistics for current vdom is shown!

vpn tunnel

       # diagnose vpn tunnel delinbsa [Name of tunnel]                   Remove tunnel sa.                                                                   [5.0]
       # diagnose vpn tunnel deloutbsa [Name of tunnel]                  Remove tunnel sa.                                                                   [5.0]
       # diagnose vpn tunnel dialup-list [please input args]             List dialup tunnel.                                                                 [5.0]
       # diagnose vpn tunnel down [Name of phase2]                       Shut down tunnel.                                                                   [5.0] 
       # diagnose vpn tunnel dumpsa                                      Dump all sa.                                                                        [5.0]
       # diagnose vpn tunnel flush [please input args]                   Flush tunnel SAs.                                                                   [5.0]
       # diagnose vpn tunnel list name [please input args]               List tunnel by name.                                                                [5.0]
       # diagnose vpn tunnel list number [Index of tunnel]               List tunnel by number.                                                              [5.0]
       # diagnose vpn tunnel reset [please input args]                   Flush tunnel SAs and reset NAT-T and DPD configuration.                             [5.0]
       # diagnose vpn tunnel stat flush [please input args]              Flush tunnel stats by name.                                                         [5.0]
       # diagnose vpn tunnel up [Name of Phase2]                         Activate tunnel.                                                                    [5.0]

wacs

Display diagnostic information for the web cache database daemon (wacs)

wacs clear

       # diagnose wacs clear                                             Remove all entries from the database.                                               [5.0][5.2]

wacs recents

       # diagnose wacs recents                                           Recent DB activities.                                                               [5.0][5.2]

wacs restart

       # diagnose wacs restart                                           Restart the daemon and reset the statistical parameters.                            [5.0][5.2]

wacs stats

       # diagnose wacs stats                                             Show statistics.                                                                    [5.0][5.2]
       
       NOTE Use this command to display information about the WAN optimization web cache daemon. The command will only 
            display information if the web cache daemon is running and the statistics displayed show the number of open 
            connections and other indications of activity. 

wad

wad console-log

       # diagnose wad console-log disable                                disable logging.                                                                    [5.0]
       # diagnose wad console-log enable                                 Enable logging.                                                                     [5.0]

wad debug-url

       # diagnose wad debug-url disable                                  disable debug-URL.                                                                  [5.0]
       # diagnose wad debug-url enable                                   Enable debug-URL.                                                                   [5.0]

wad stats

       # diagnose wad stats clear                                        Clear statistics.                                                                   [5.0]
       # diagnose wad stats crypto clear                                 clear crypto statistics                                                             [5.0]
       # diagnose wad stats crypto list                                  list crypto statistics                                                              [5.0]
       # diagnose wad stats filter clear                                 clear filter statistics                                                             [5.0]
       # diagnose wad stats filter list                                  list filter statistics                                                              [5.0]
       # diagnose wad stats list                                         List all statistics.                                                                [5.0]
       # diagnose wad stats mem clear                                    clear mem statistics                                                                [5.0]
       # diagnose wad stats mem list                                     list mem statistics                                                                 [5.0]
       # diagnose wad stats scan clear                                   clear scan statistics                                                               [5.0]
       # diagnose wad stats scan list                                    list scan statistics                                                                [5.0]
       # diagnose wad stats scripts clear                                clear scripts statistics                                                            [5.0]
       # diagnose wad stats scripts list                                 list scripts statistics                                                             [5.0]
       # diagnose wad stats summary clear                                clear summary statistics                                                            [5.0]
       # diagnose wad stats summary list                                 list summary statistics                                                             [5.0]

wad filter

       # diagnose wad filter clear                                       Erase current filter settings.                                                      [5.0]
       # diagnose wad filter dport [destination port]                    Destination port range to filter by.                                                [5.0]
       # diagnose wad filter drop-unknown-session [1=enable | 2=disable] Enable drop message unknown sessions.                                               [5.0]
       # diagnose wad filter dst [dstip]                                 Destination address range to filter by.                                             [5.0]
       # diagnose wad filter list                                        Display current filter.                                                             [5.0]
       # diagnose wad filter negate [parameter to negate]                Negate the specified filter parameter.                                              [5.0]
       # diagnose wad filter protocol [http To match (1), otherwise (0)] Select protocols to filter by.                                                      [5.0]
       # diagnose wad filter sport [source port]                         Source port range to filter by.                                                     [5.0]
       # diagnose wad filter src [srcip]                                 Source address range to filter by.                                                  [5.0]
       # diagnose wad filter vd [index vdom | -1=all]                    Index of virtual domain. -1 matches all.                                            [5.0]

wad user

       # diagnose wad user clear [User ID]                               Enter a user's id, ip and vdom to clear this particular user                        [5.0]
       # diagnose wad user list                                          List proxy users.                                                                   [5.0]

wad history

       # diagnose wad history [proto]                                    Statistics history.                                                                 [5.2]
       
       [proto]     All | HTTP | FTP | CIFS | MAPI | TCP <period> 10min | hour | day | 30days 

wad tunnel

       # diagnose wad tunnel [clear | list]                              Tunnel diagnostics.                                                                 [5.0][5.2]
       
       NOTE Use this command to list all of the running WAN optimization tunnels and display information about each one

wadbd

Display diagnostic information for the WAN optimization database daemon (waddb).


wadbd check

       # diagnose wadbd check                                            Check database integrity.                                                           [5.0][5.2]

wadbd clear

       # diagnose wadbd clear                                            Remove all entries from the database.                                               [5.0][5.2]

wadbd recents

       # diagnose wadbd recents                                          Recent DB activities.                                                               [5.0][5.2]

wadbd restart

       # diagnose wadbd restart                                          Restart the daemon and reset the statistical parameters.                            [5.0][5.2]

wadbd stats

       # diagnose wadbd stats                                            how statistics.                                                                     [5.0][5.2]

web-ui

       # diagnose web-ui                                                 Web user interface.                                                                 [5.0][5.2]

webfilter

webfilter bword

       # diagnose webfilter bword [Filter string]                        Web banned word match filter.                                                       [5.0][5.2]

webfilter fortiguard

       # diagnose webfilter fortiguard                                   FortiGuard Web Filter information                                                   [5.0][5.2]
       # diagnose webfilter fortiguard ovrd refresh                      remove expired rules from FortiGuard Web Filter overrides                           [5.0] 
       # diagnose webfilter fortiguard statistics flush                  Flush rating cache and daemon statistics.                                           [5.0] 
       # diagnose webfilter fortiguard statistics list                   Display rating cache and daemon statistics.                                         [5.0] 

wireless-controller

wireless-controller wlac

       # diagnose wireless-controller wlac [-c|-d|-k|-h]                 Control plane, data plane or help                                                   [5.0][5.2]
       wlac usage:
           wlac help                       --show this usage
           wlac ping [-c cnt] [-s len] <ip> --send cnt len-bytes ping request
           wlac tpt                        --show non-wireless terminaton point info
           wlac kickmac mac                --disassociate a sta
           wlac kickwtp ip cport           --tear down a wtp session
           wlac plain-ctl [[wtp-id] [0|1] | clear]   --show, set or clear current plain control setting
           wlac sniff-cfg [[ip port] | clear]   --show, set or clear sniff server ip and port
           wlac sniff [intf [wtp-id] [0|1|2] | clear]     --show, set or clear sniff setting on intf for wtp-id
           wlac scanclr                    --clear the scanned rogue ap list
           wlac scanstaclr                 --clear the scanned rogue sta list
           wlac sta_filter [sta-mac level | clear]    --show, set or clear sta filter
           wlac wtp_filter [id vfid-ip:port level | clear]  --show, set or clear wtp filter
           wlac clear debug                --clear all debug settings
           wlac show debug                 --show all debug settings
           wlac show kernel                --show all -k command settings
           wlac show data                  --show all -d settings
           wlac show control               --show all -c settings
           wlac show all                   --show all -k,-c,-d and debug settings
           wlac -k cws [wlan]                   --list cws info(kern) 
           wlac -k wtp [vfid-ip:port lip:port]  --list wtp info(kern) 
           wlac -k vap [wlan | bssid]           --list vap info(kern)
           wlac -k sta [wlan | bssid mac]       --list sta info(kern)
           wlac -k wlan-sta wlan sta-ip         --list wlan's sta info(kern)
           wlac -d usage                   --list objects usage(data)
           wlac wpad_vap [ip|bssid]        --list vap info in wpad_ac
           wlac wpad_sta [mac]             --list sta info in wpad_ac
           wlac sta-idle-auth [time]       --get/set non-auth sta idle time
           wlac -d all                     --list wlan/wtp/vap/sta info(data)
           wlac -d wlan                    --list wlan info(data)
           wlac -d wtp                     --list wtp info(data)
           wlac -d vap                     --list vap info(data)
           wlac -d sta                     --list sta info(data)
           wlac -d sta-idx [wlan mac next] --list indexed sta info(data)
           wlac -d wlsta wlan              --list wlan's sta info(data)
           wlac -d wtpsta wtp-index        --list wtp's sta info(data)
           wlac -d radiosta wtp-id rId     --list radio's sta info(data)
           wlac -c sta [mac]               --list sta(ctl)
           wlac -c wtpprof [wtpprof]         --list configured wtp profiles(ctl)
           wlac -c wtp [wtp]               --list configured wtps(ctl)
           wlac -c wtp-idx [wtp next]        --list indexed wtp (ctl)
           wlac -c radio-idx [wtp rId next]  --list indexed radio (ctl)
           wlac -c vap-idx [wtp rId wlan next] --list indexed vap (ctl)
           wlac -c wlan [wlan|ssid]        --list configured wlans(ctl)
           wlac -c swintf                  --list configured switch interface(ctl)
           wlac -c ap-status               --list configured ap status(ctl)
           wlac -c widsprof                 --list configured wids profiles(ctl)
           wlac -c byod_dev [dev | mac]    --list configured devices(ctl)
           wlac -c byod_devgrp [devgrp     --list configured device groups(ctl)
           wlac -c byod_devacl [devacl]    --list configured device access lists(ctl)
           wlac -c byod_devtype [devtype]  --list configured device types(ctl)
           wlac -c byod [wlan]             --show device access in control plane
           wlac -c byod_detected [wlan]    --list detected devices(ctl)
           wlac -c ws [ip]                 --list current wtp sessions(ctl)
           wlac -c ws-fail                 --show current wtp sessions with SSID config failures
           wlac -c ws-mesh vfid-ip:port    --list this wtp session's mesh parent and child info(ctl)
           wlac -c vap                     --list vap info(ctl)
           wlac -c ap-rogue                --list rogue ap info(ctl)
           wlac -c sta-rogue               --list rogue sta info(ctl)
           wlac -c rap-hostlist bssid      --list hosts related to the ap(ctl)
           wlac -c arp-req                 --list arp info on the controller(ctl)
           wlac -c mac-table               --list mac table(ctl)
           wlac -c br-table                --list bridge table(ctl)
           wlac -c nol                     --list the AP's non occupancy channel list for radar
           wlac -c scan-clr-all            --clear the scanned rogue ap and sta data(ctl)
           wlac -c ap-onwire-clr bssid     --clear the rogue ap's on wire flag(ctl)
           wlac -c darrp                   --list darrp radio table(ctl)
           wlac -c sta-cap [mac]           --list sta capability(ctl)
           wlac -c sta-locate              --list located wireless stations(ctl)
           wlac -c sta-locate-reset [1|2]  --reset sta-locate data(ctl); 1: reset stats, 2 (default): flush entries
           wlac -c rf-analysis [wtp-id|ac] --list rf analysis results(ctl)
           wlac -c rf-sa wtp-id rId [chan] --list rf spectrum info
           wlac -c radio-ifr wtp-id rId    --list radio's interfering APs
           wlac -c wids                    --show detected sta threat in control plane