Sha256: 3dc9273d3e597a4a550621e37e17307220daede9504b61556208638c19e62a66

Contents?: true

Size: 1.26 KB

Versions: 3

Compression:

Stored size: 1.26 KB

Contents

# FortiOS Configuration

## Create user oxidized with ED25519 public key
You can use a user/password for retrieving the configuration or use a SSH public key:

```text
config system admin
edit oxidized
set trusthost1 192.0.2.1 255.255.255.255
set accprofile "super_admin_readonly"
set ssh-public-key1 "ssh-ed25519 AAAAThisIsJustAnExampleKey_UseYourOxidizedPUBLICKEY oxidized@librenms"
end
```


## Configuration changes / hiding passwords
Fortigate reencrypts its passwords every time the configuration is shown.
This produces a lot of config changes.
If you don't want to have a new version every time the configuration is
downloaded, you can hide all secrets. Beware that you won't have a full backup,
as all passwords will be replaced with <configuration removed>

```yaml
models:
  fortios:
    vars:
      remove_secret: true
```

## config vs. full config
On fortios, you can get a configuration without default values (`show .`) or
including all the default values (`show full-configuration`).

The full configuration can be quite long and produce time-outs.
Beginning with oxidized 0.30.1, the default is to get the short configuration.

If you need the full configuration, you can activate it in oxidized config file:
```yaml
models:
  fortios:
    vars:
      fullconfig: true
```

Version data entries

3 entries across 3 versions & 1 rubygems

Version Path
oxidized-0.32.1 docs/Model-Notes/FortiOS.md
oxidized-0.32.0 docs/Model-Notes/FortiOS.md
oxidized-0.31.0 docs/Model-Notes/FortiOS.md