Comprehensive list of FortiGate-specific CLI commands!

  • Jun, Mon, 2025
  • Emi

Here’s a comprehensive list of FortiGate-specific CLI commands categorized by common advanced troubleshooting tasks. These are used via the FortiGate console or SSH.

🔧 1. Basic System Information

get system status # Shows firmware, serial number, mode, etc.
get system performance status # Shows CPU, memory, sessions, etc.


🌐 2. Network & Interface Debugging

get system interface physical # Shows physical interfaces and link status
diagnose ip address list # Lists all configured IP addresses
diagnose netlink interface list # Shows interface statistics


🔎 3. Policy & Session Debugging

diagnose firewall iprope show # Show how traffic is evaluated by policies
diagnose debug enable
diagnose debug flow show console enable
diagnose debug flow trace start 100
diagnose debug flow filter addr x.x.x.x # Filter by source/dest IP
# Useful for analyzing traffic path issues


🔐 4. VPN Troubleshooting

IPsec VPN

  • diagnose vpn tunnel list # Show active tunnels
  • diagnose vpn ike gateway list # Show IKE Phase 1 details
  • diagnose vpn ike log-filter dst-addr4 x.x.x.x
  • diagnose debug application ike -1
  • diagnose debug enable

SSL VPN

diagnose debug application sslvpn -1
diagnose debug enable


📊 5. Routing & Connectivity

get router info routing-table all # Show all routing tables
execute ping x.x.x.x # Ping from FortiGate
execute traceroute x.x.x.x # Trace route from FortiGate


🛠️ 6. Session Table

diagnose sys session list # Full session table
diagnose sys session filter dst x.x.x.x
diagnose sys session clear # Clear sessions if stuck


📦 7. Traffic Capture

diagnose sniffer packet any "host x.x.x.x" 4 100
# Captures traffic to/from specific host


🔐 8. Deep Inspection / Certificate Debug

diagnose debug application ssl -1
diagnose debug enable


🔄 9. High Availability (HA)

get system ha status # View HA cluster status
diagnose sys ha checksum show # Check config sync between units
diagnose sys ha history # Shows failover events

🧰 10. UTM/Inspection Engine

diagnose test application ipsmonitor 1 # Test IPS engine
diagnose test application av 99 # Check antivirus status


Here is a step-by-step guide for troubleshooting common FortiGate firewall issues, using CLI commands and GUI suggestions. It’s categorized by real-world problems and includes commands, explanations, and tips.

🔧 Step-by-Step FortiGate Troubleshooting Guide


🛑 1. Internet Not Working Through Firewall

Step 1: Check Interface & IP

get system interface physical
diagnose ip address list

✅ Confirm WAN and LAN interfaces are UP and have IPs.

Step 2: Check Default Route

get router info routing-table all

✅ Ensure there’s a default route (0.0.0.0/0) via the WAN gateway.

Step 3: Ping from FortiGate

execute ping 8.8.8.8

✅ If this fails, your FortiGate may not have upstream internet access.

Step 4: DNS Test

execute ping google.com

❌ If IP ping works but not DNS, check:

show system dns

Step 5: Check Policy
Go to:
Policy & Objects > IPv4 Policy
✅ Ensure LAN > WAN policy exists and allows traffic.


🔐 2. VPN Not Connecting (IPsec)

Step 1: Check Tunnel Status

diagnose vpn tunnel list

Step 2: Enable Debug

diagnose vpn ike log-filter dst-addr4 <peer-ip>
diagnose debug application ike -1
diagnose debug enable

👁 Watch logs for negotiation errors (e.g., no proposal chosen).

Step 3: Common Fixes

  • Match Phase 1/2 settings
  • Confirm shared secret
  • Check firewall policy (VPN zone > LAN)

🌐 3. Website or App Not Loading

Step 1: Check Policy Logs
GUI: Log & Report > Forward Traffic

Step 2: Test with Flow Debug

diagnose debug reset
diagnose debug enable
diagnose debug flow show console enable
diagnose debug flow filter addr <client-ip>
diagnose debug flow trace start 10

🔍 See which policy is matched or blocked.

Step 3: Application Control / Web Filter
GUI:
Security Profiles > Application Control / Web Filter
❌ Disable temporarily to test.


🔁 4. Traffic Not Reaching Server (e.g., Web Server in LAN)

Step 1: Check VIP / NAT

show firewall vip

Step 2: Check Firewall Policy
GUI: Policy & Objects > IPv4 Policy
✅ Ensure WAN to LAN policy exists with correct VIP.

Step 3: Monitor Logs
Use:

diagnose debug flow

Or GUI logs to verify if connection reaches internal server.


🔄 5. Sessions or Connections Drop Randomly

Step 1: Check Session Count

get system performance status

Step 2: Session Table

diagnose sys session list

Step 3: Check High Memory/CPU

diagnose sys top

🚨 If CPU > 90%, consider reducing UTM load or offloading SSL.


📶 6. FortiGate Web GUI Not Accessible

Step 1: Check Access Settings

show system interface

✅ Confirm set allowaccess http https ping ssh is set on LAN interface.

Step 2: Check Admin Lockout

diagnose sys lockuser list

Step 3: Console/SSH Access
If GUI fails, use SSH or console to reset settings.

Social Share :