DSRB-S-FW-1 # execute ping service.fortiguard.
net
PING guard.fortinet.net (209.222.147.36): 56 data bytes
64 bytes from 209.222.147.36: icmp_seq=0 ttl=45 time=247.7 ms
64 bytes from 209.222.147.36: icmp_seq=1 ttl=45 time=247.2 ms
64 bytes from 209.222.147.36: icmp_seq=2 ttl=45 time=250.3 ms
64 bytes from 209.222.147.36: icmp_seq=3 ttl=45 time=249.3 ms
64 bytes from 209.222.147.36: icmp_seq=4 ttl=45 time=248.1 ms
--- guard.fortinet.net ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 247.2/248.5/250.3 ms
DSRB-S-FW-1 # execute ping update.fortiguard.net
PING fds1.fortinet.com (173.243.138.66): 56 data bytes
64 bytes from 173.243.138.66: icmp_seq=0 ttl=45 time=207.9 ms
64 bytes from 173.243.138.66: icmp_seq=1 ttl=45 time=207.3 ms
64 bytes from 173.243.138.66: icmp_seq=2 ttl=45 time=207.3 ms
64 bytes from 173.243.138.66: icmp_seq=3 ttl=45 time=207.7 ms
64 bytes from 173.243.138.66: icmp_seq=4 ttl=45 time=207.2 ms
--- fds1.fortinet.com ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 207.2/207.4/207.9 ms
DSRB-S-FW-1 # execute ping google.com
PING google.com (142.250.199.46): 56 data bytes
64 bytes from 142.250.199.46: icmp_seq=0 ttl=108 time=41.2 ms
64 bytes from 142.250.199.46: icmp_seq=1 ttl=108 time=72.9 ms
64 bytes from 142.250.199.46: icmp_seq=2 ttl=108 time=27.2 ms
64 bytes from 142.250.199.46: icmp_seq=3 ttl=108 time=27.5 ms
64 bytes from 142.250.199.46: icmp_seq=4 ttl=108 time=26.9 ms
--- google.com ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 26.9/39.1/72.9 ms
DSRB-S-FW-1 # execute ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8): 56 data bytes
64 bytes from 8.8.8.8: icmp_seq=0 ttl=112 time=26.1 ms
64 bytes from 8.8.8.8: icmp_seq=1 ttl=112 time=25.4 ms
64 bytes from 8.8.8.8: icmp_seq=2 ttl=112 time=26.3 ms
64 bytes from 8.8.8.8: icmp_seq=3 ttl=112 time=25.5 ms
64 bytes from 8.8.8.8: icmp_seq=4 ttl=112 time=25.5 ms
--- 8.8.8.8 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 25.4/25.7/26.3 ms
DSRB-S-FW-1 # execute ping 1.1.1.1
PING 1.1.1.1 (1.1.1.1): 56 data bytes
64 bytes from 1.1.1.1: icmp_seq=0 ttl=255 time=0.1 ms
64 bytes from 1.1.1.1: icmp_seq=1 ttl=255 time=0.1 ms
64 bytes from 1.1.1.1: icmp_seq=2 ttl=255 time=0.1 ms
64 bytes from 1.1.1.1: icmp_seq=3 ttl=255 time=0.1 ms
64 bytes from 1.1.1.1: icmp_seq=4 ttl=255 time=0.1 ms
--- 1.1.1.1 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 0.1/0.1/0.1 ms
DSRB-S-FW-1 #
DSRB-S-FW-1 # get system status
Version: FortiGate-100E v7.0.3,build0237,211207 (GA)
Firmware Signature: certified
Virus-DB: 81.00908(2020-11-17 17:20)
Extended DB: 81.00908(2020-11-17 17:20)
AV AI/ML Model: 0.00000(2001-01-01 00:00)
IPS-DB: 6.00741(2015-12-01 02:30)
IPS-ETDB: 0.00000(2001-01-01 00:00)
APP-DB: 6.00741(2015-12-01 02:30)
INDUSTRIAL-DB: 6.00741(2015-12-01 02:30)
IPS Malicious URL Database: 2.00831(2020-11-17 04:54)
Serial-Number: FG100ETK18038839
BIOS version: 05000008
System Part-Number: P18827-04
Log hard disk: Not available
Hostname: DSRB-S-FW-1
Private Encryption: Disable
Operation Mode: NAT
Current virtual domain: root
Max number of virtual domains: 10
Virtual domains status: 1 in NAT mode, 0 in TP mode
Virtual domain configuration: disable
FIPS-CC mode: disable
Current HA mode: standalone
Branch point: 0237
Release Version Information: GA
System time: Mon Jan 31 12:08:03 2022
Last reboot reason: warm reboot
DSRB-S-FW-1 # get router info
routing-table show routing table information
protocols show routing protocols information
rip show rip information
ospf show ospf information
bgp show router info bgp information
multicast show routing multicast information
bfd show BFD information
isis show isis information
kernel show kernel routing table
vrrp show vrrp status
DSRB-S-FW-1 # get router info routing-table
details show routing table details information
all show all routing table entries
rip show rip routing table
ospf show ospf routing table
bgp show bgp routing table
isis show isis routing table
static show static routing table
connected show connected routing table
database show routing information base
DSRB-S-FW-1 # get router info routing-table all
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default
Routing table for VRF=0
S* 0.0.0.0/0 [10/0] via 10.41.0.181, wan1
S 10.0.0.0/8 [10/0] via 10.41.0.181, wan1
S 10.41.0.0/16 [10/0] via 10.41.2.254, lan
C 10.41.0.0/24 is directly connected, wan1
C 10.41.1.0/24 is directly connected, VL301
C 10.41.2.0/24 is directly connected, lan
C 58.82.131.0/27 is directly connected, wan2
S 192.168.99.5/32 [10/0] via 10.41.0.181, wan1
S 192.168.99.6/32 [10/0] via 10.41.0.181, wan1
S 192.168.99.11/32 [10/0] via 10.41.0.181, wan1
S 203.151.138.134/32 [5/0] via 58.82.131.1, wan2
DSRB-S-FW-1 # diagnose debug enable
DSRB-S-FW-1 # diagnose debug application update -1
Debug messages will be on for 30 minutes.
DSRB-S-FW-1 # tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
do_setup[344]-Failed setup
do_virus_report[681]-Starting VIRUS REPORT
attach_botip_list[745]-Failed to scan botnet ip hits
do_virus_report[689]-No virus stats to report
DSRB-S-FW-1 # execute update-
update-av Update AV engine/definitions.
update-external-resource Download external resource.
update-geo-ip Update IP Geography DB.
update-ips Update IPS engine/definitions.
update-list Download update server list.
update-now Update now.
update-src-vis Update src-vis object.
DSRB-S-FW-1 # execute update-now
DSRB-S-FW-1 # upd_daemon[1603]-Found cached action=00000002
do_update[608]-Starting now UPDATE (final try)
__update_upd_comp_by_settings[465]-Disabling AVEN/FLEN/NIDSDB/FLDB/APPDB/ISDB
components.
upd_fds_load_default_server6[1038]-Resolve and add fds update.fortiguard.net ipv6
address failed.
upd_comm_connect_fds[455]-Trying FDS 208.184.237.66:443
tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
upd_comm_connect_fds[455]-Trying FDS 173.243.138.66:443
tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
upd_comm_connect_fds[455]-Trying FDS 173.243.138.67:443
tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
do_update[615]-UPDATE failed
do_check_wanip[766]-Starting getting wan ip
upd_fds_load_default_server6[1038]-Resolve and add fds update.fortiguard.net ipv6
address failed.
upd_comm_connect_fds[455]-Trying FDS 208.184.237.66:443
tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
upd_comm_connect_fds[455]-Trying FDS 173.243.138.66:443
Timeout
Connection lost. Press Enter to start a new session.
DSRB-S-FW-1 # execute update-now
DSRB-S-FW-1 # get system status
Version: FortiGate-100E v7.0.3,build0237,211207 (GA)
Firmware Signature: certified
Virus-DB: 81.00908(2020-11-17 17:20)
Extended DB: 81.00908(2020-11-17 17:20)
AV AI/ML Model: 0.00000(2001-01-01 00:00)
IPS-DB: 6.00741(2015-12-01 02:30)
IPS-ETDB: 0.00000(2001-01-01 00:00)
APP-DB: 6.00741(2015-12-01 02:30)
INDUSTRIAL-DB: 6.00741(2015-12-01 02:30)
IPS Malicious URL Database: 2.00831(2020-11-17 04:54)
Serial-Number: FG100ETK18038839
BIOS version: 05000008
System Part-Number: P18827-04
Log hard disk: Not available
Hostname: DSRB-S-FW-1
Private Encryption: Disable
Operation Mode: NAT
Current virtual domain: root
Max number of virtual domains: 10
Virtual domains status: 1 in NAT mode, 0 in TP mode
Virtual domain configuration: disable
FIPS-CC mode: disable
Current HA mode: standalone
Branch point: 0237
Release Version Information: GA
System time: Mon Jan 31 12:18:18 2022
Last reboot reason: warm reboot
DSRB-S-FW-1 # get router info routing-table all
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default
Routing table for VRF=0
S* 0.0.0.0/0 [10/0] via 10.41.0.181, wan1
S 10.0.0.0/8 [10/0] via 10.41.0.181, wan1
S 10.41.0.0/16 [10/0] via 10.41.2.254, lan
C 10.41.0.0/24 is directly connected, wan1
C 10.41.1.0/24 is directly connected, VL301
C 10.41.2.0/24 is directly connected, lan
C 58.82.131.0/27 is directly connected, wan2
S 192.168.99.5/32 [10/0] via 10.41.0.181, wan1
S 192.168.99.6/32 [10/0] via 10.41.0.181, wan1
S 192.168.99.11/32 [10/0] via 10.41.0.181, wan1
S 203.151.138.134/32 [5/0] via 58.82.131.1, wan2
DSRB-S-FW-1 # diag debug enable
DSRB-S-FW-1 # diag debug application update -1
Debug messages will be on for 22 minutes.
DSRB-S-FW-1 # execute update-now
DSRB-S-FW-1 # tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
upd_comm_connect_fds[455]-Trying FDS 173.243.138.66:443
tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
upd_comm_connect_fds[455]-Trying FDS 173.243.138.67:443
tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
do_update[615]-UPDATE failed
do_check_wanip[766]-Starting getting wan ip
upd_fds_load_default_server6[1038]-Resolve and add fds update.fortiguard.net ipv6
address failed.
upd_comm_connect_fds[455]-Trying FDS 208.184.237.66:443
tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
upd_comm_connect_fds[455]-Trying FDS 173.243.138.66:443
tcp_connect_fds[256]-select() timed out
upd_comm_connect_fds[469]-Failed TCP connect
upd_comm_connect_fds[455]-Trying FDS 173.243.138.67:443
Timeout
Connection lost. Press Enter to start a new session.
DSRB-S-FW-1 # diag debug dis
DSRB-S-FW-1 # diag debug rating
Locale : english
Service : Web-filter
Status : Disable
Service : Antispam
Status : Disable
Service : Virus Outbreak Prevention
Status : Disable
DSRB-S-FW-1 # get system fortiguard-service status
NAME VERSION LAST UPDATE METHOD EXPIRE
AV Engine 6.266 2021-08-24 17:00:00 manual 2021-06-29 23:59:59
Virus Definitions 81.908 2020-11-18 08:50:56 scheduled 2021-06-29 23:59:59
Extended set 81.908 2020-11-18 08:50:56 scheduled 2021-06-29 23:59:59
AI/Machine Learning Malware Detection Model 0.000 2001-01-01 00:00:00 manual
n/a
Flow-based Virus Definitions 81.908 2020-11-18 08:50:56 scheduled 2021-06-29
23:59:59
Attack Definitions 6.741 2020-11-18 02:50:57 scheduled 2021-06-29 23:59:59
Attack Extended Definitions 0.000 2001-01-01 00:00:00 manual 2021-06-29
23:59:59
IPS Malicious URL Database 2.831 2020-11-17 20:51:28 scheduled 2021-06-29
23:59:59
IPS/FlowAV Engine 7.043 2021-10-05 01:33:00 manual 2021-06-29 23:59:59
IPS Config Script 1.009 2019-06-06 14:02:00 manual 2021-06-29 23:59:59
Application Definitions 6.741 2020-11-18 02:50:57 scheduled 2021-06-29 23:59:59
Industrial Attack Definitions 6.741 2015-12-01 02:30:00 manual n/a
DSRB-S-FW-1 # diagnose autoupdate versions
AV Engine
---------
Version: 6.00266
Contract Expiry Date: Tue Jun 29 2021
Last Updated using manual update on Tue Aug 24 17:00:00 2021
Last Update Attempt: Wed Nov 18 08:50:56 2020
Result: No Updates
Virus Definitions
---------
Version: 81.00908
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Wed Nov 18 08:50:56 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure
Extended set
---------
Version: 81.00908
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Wed Nov 18 08:50:56 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure
Mobile Malware Definitions
---------
Version: 81.00908
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Wed Nov 18 08:50:56 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure
IPS Attack Engine
---------
Version: 7.00043
Contract Expiry Date: Tue Jun 29 2021
Last Updated using manual update on Tue Oct 5 01:33:00 2021
Last Update Attempt: Wed Nov 18 08:50:56 2020
Result: No Updates
IPS Config Script
---------
Version: 1.00009
Contract Expiry Date: Tue Jun 29 2021
Last Updated using manual update on Thu Jun 6 14:02:00 2019
Last Update Attempt: Wed Nov 18 08:50:56 2020
Result: No Updates
Attack Definitions
---------
Version: 6.00741
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Wed Nov 18 02:50:57 2020
Last Update Attempt: Wed Nov 18 08:50:56 2020
Result: No Updates
Attack Extended Definitions
---------
Version: 0.00000
Contract Expiry Date: Tue Jun 29 2021
Last Updated using manual update on Mon Jan 1 00:00:00 2001
Last Update Attempt: Fri Aug 28 01:22:57 2020
Result: Connectivity failure
Application Definitions
---------
Version: 6.00741
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Wed Nov 18 02:50:57 2020
Last Update Attempt: Wed Nov 18 08:50:56 2020
Result: No Updates
Industrial Attack Definitions
---------
Version: 6.00741
Contract Expiry Date: n/a
Last Updated using manual update on Tue Dec 1 02:30:00 2015
Last Update Attempt: n/a
Result: Updates Installed
IPS Malicious URL Database
---------
Version: 2.00831
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Tue Nov 17 20:51:28 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure
Flow-based Virus Definitions
---------
Version: 81.00908
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Wed Nov 18 08:50:56 2020
Last Update Attempt: Wed Nov 18 08:50:56 2020
Result: Updates Installed
Botnet Domain Database
---------
Version: 2.00623
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Wed Nov 18 06:50:50 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure
Internet-service Database
---------
Version: 0.00000
Contract Expiry Date: n/a
Last Updated using manual update on Mon Jan 1 00:00:00 2001
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure
Device and OS Identification
---------
Version: 1.00123
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Thu Nov 5 08:51:49 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure
URL Allow list
---------
Version: 2.00960
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Wed Nov 18 02:50:57 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure
IP Geography DB
---------
Version: 3.00041
Contract Expiry Date: n/a
Last Updated using manual update on Thu Oct 17 12:05:00 2019
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure
Certificate Bundle
---------
Version: 1.00029
Contract Expiry Date: n/a
Last Updated using manual update on Wed Oct 6 17:00:00 2021
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure
Malicious Certificate DB
---------
Version: 1.00294
Contract Expiry Date: Tue Jun 29 2021
Last Updated using scheduled update on Tue Nov 17 06:50:55 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure
Mac Address Database
---------
Version: 1.00033
Contract Expiry Date: n/a
Last Updated using manual update on Wed Oct 14 15:21:00 2020
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure
AntiPhish Pattern DB
---------
Version: 0.00000
Contract Expiry Date: n/a
Last Updated using manual update on Tue Nov 30 00:00:00 1999
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure
AI/Machine Learning Malware Detection Model
---------
Version: 0.00000
Contract Expiry Date: n/a
Last Updated using manual update on Mon Jan 1 00:00:00 2001
Last Update Attempt: Mon Jan 31 12:20:50 2022
Result: Connectivity failure
Modem List
---------
Version: 0.000
FDS Address
---------
DSRB-S-FW-1 # exe telnet 173.243.138.66 443
Trying 173.243.138.66...
Timeout!
Failed to connect to specified unit.
DSRB-S-FW-1 #
DSRB-S-FW-1 #