Fortigate | CLI Command & Verification Part-3
FortiGate1 # show full-configuration | grep
FortiGate1 # show full-configuration
FortiGate1 # get system status
FortiGate1 # show firewall policy
FortiGate1 # get router info routing-table static
FortiGate1 # get router info routing-table all
FortiGate1 # show full-configuration system admin
FortiGate1 # show system interface port4
FortiGate1 # show system dns
FortiGate1 # show full-configuration
FortiGate1 # get system status
FortiGate1 # show firewall policy
FortiGate1 # get router info routing-table static
FortiGate1 # get router info routing-table all
FortiGate1 # show full-configuration system admin
FortiGate1 # show system interface port4
FortiGate1 # show system dns
FortiGate1 # get system dns
FG-1 # get system admin
FG-1 # get system arp
FG-1 # get system session list
FG-1 # get system session list | grep 10.20.78.10
FG-1 # execute log display
FG-1# diagnose ip address list
FG-1 # get system admin
FG-1 # get system arp
FG-1 # get system session list
FG-1 # get system session list | grep 10.20.78.10
FG-1 # execute log display
FG-1# diagnose ip address list
FG-1# get system arp
diagnose sniffer packet port2
diagnose sniffer packet port2 ' host 192.168.1.1 '
diagnose sniffer packet port2 ' host 192.168.1.1 and host 8.8.8.8 '
diagnose sniffer packet port2 ' host 192.168.1.1 and port 80 '
diagnose sniffer packet any ' host 192.168.1.1 '
diagnose sniffer packet any ' host 192.168.1.1 or host 8.8.8.8 '
diagnose sniffer packet port2 ' host 192.168.1.1 '
diagnose sniffer packet port2 ' host 192.168.1.1 and host 8.8.8.8 '
diagnose sniffer packet port2 ' host 192.168.1.1 and port 80 '
diagnose sniffer packet any ' host 192.168.1.1 '
diagnose sniffer packet any ' host 192.168.1.1 or host 8.8.8.8 '
diagnose sniffer packet any port2 ' host 192.168.1.1 or host 8.8.8.8 '
diagnose sniffer packet any port2 ' host 192.168.1.1 and port 22 '
diagnose sniffer packet any port2 ' host 192.168.1.1 and port 443 ' diagnose sniffer packet any ' host 192.168.1.1 or host 8.8.8.8 ' 4 10
diagnose sniffer packet any ' host 192.168.1.1 or host 8.8.8.8 ' 4 0 a
diagnose sniffer packet any ' src 192.168.1.1 '
diagnose debug disable
diagnose debug reset
diagnose debug flow filter addr 192.168.1.1
diagnose debug flow filter port 80
diagnose sniffer packet IT ' dst 8.8.8.8 and icmp '
diagnose sniffer packet IT ' host 10.20.38.10 and host 8.8.8.8 ' 4 0 a
diagnose sniffer packet IT ' host 10.20.38.10 and host 8.8.8.8 ' 4 10 a
diagnose sniffer packet any ' host 192.168.1.1 or host 8.8.8.8 ' 4 0 a
diagnose sniffer packet any ' src 192.168.1.1 '
diagnose debug disable
diagnose debug reset
diagnose debug flow filter addr 192.168.1.1
diagnose debug flow filter port 80

Posting Komentar untuk "Fortigate | CLI Command & Verification Part-3"