diff --git a/templates/fortinet_get_system_ha_status.textfsm b/templates/fortinet_get_system_ha_status.textfsm new file mode 100644 index 0000000000..d24b20b984 --- /dev/null +++ b/templates/fortinet_get_system_ha_status.textfsm @@ -0,0 +1,54 @@ +# +# Refried Jello +# +# 2021-01-08: Initial Version +# +# FG Version: 5.6, 6.0, 6.2 +# HW : varied +# +Value HA_HEALTH (\S+) +Value MODEL (\S+) +Value HA_MODE ([\S\s]+) +Value HA_GROUP (\S+) +Value CLUSTER_UPTIME ([\S\s]+) +Value CLUSTER_STATE_CHANGED_TIME ([\S\s]+) +Value HA_SESSION_PICKUP_STATUS (\S+) +Value HA_SESSION_PICKUP_DELAY (\S+) +Value HA_OVERRIDE_STATUS (\S+) +Value HA_MASTER_UNIT_NAME (\S+) +Value HA_SLAVE_UNIT_NAME (\S+) +Value HA_MASTER_UNIT_SERIAL (\S+) +Value HA_SLAVE_UNIT_SERIAL (\S+) +Value HA_MASTER_UNIT_INDEX (\S+) +Value HA_SLAVE_UNIT_INDEX (\S+) + +Start + ^HA\s+Health\s+Status:\s+${HA_HEALTH} + ^Model:\s+${MODEL} + ^Mode:\s+${HA_MODE} + ^Group:\s+${HA_GROUP} + ^Debug:\s+\d+ + ^Cluster\s+Uptime:\s+${CLUSTER_UPTIME} + ^Cluster\s+state\s+change\s+time:\s+${CLUSTER_STATE_CHANGED_TIME} + ^Master\s+selected\s+using: + ^\s+\<\S+ + ^ses_pickup:\s+${HA_SESSION_PICKUP_STATUS},\s+ses_pickup_delay=${HA_SESSION_PICKUP_DELAY} + ^override:\s+${HA_OVERRIDE_STATUS} + ^Configuration\s+Status: + ^\s+\S+\([\S\s]+\): + ^System\s+Usage\s+stats: + ^\s+\S+:\s+ + ^\s+sessions= + ^HBDEV\s+stats: + ^\s+\S+:\s+ + ^\sha:+\S+:\s+ + ^MONDEV\s+stats: + ^\s+\S+:\s+ + ^\s:+\S+:\s+ + ^Master\s*:\s+${HA_MASTER_UNIT_NAME}\s*,\s+${HA_MASTER_UNIT_SERIAL},\s+(HA\s+cluster\s+index|cluster\s+index)\s+=\s+${HA_MASTER_UNIT_INDEX} + ^Slave\s*:\s+${HA_SLAVE_UNIT_NAME}\s*,\s+${HA_SLAVE_UNIT_SERIAL},\s+(|HA)\s*cluster\s+index\s+=\s+${HA_SLAVE_UNIT_INDEX} + ^number\s+of\s+vcluster:\s+\d+ + ^vcluster\s+\d+: + ^(Master|Slave)\s*:\s+\S+,\s+(operating\s+cluster\s+index|HA\s+operating\s+index)\s+=\s+\d+ -> Record + ^\s*$$ + ^. -> Error diff --git a/templates/fortinet_get_system_interface.textfsm b/templates/fortinet_get_system_interface.textfsm index 77e28367dd..7e24d6fdae 100644 --- a/templates/fortinet_get_system_interface.textfsm +++ b/templates/fortinet_get_system_interface.textfsm @@ -1,9 +1,10 @@ # -# Patrick Marc Preuss +# Patrick Marc Preuss, Refried Jello # 2020-01-13 - Initial Version +# 2021-01-08 - Update for 6.2 # -# FG Version: 6.0.7 -# HW : FG1500D +# FG Version: 5.6, 6.0.7, 6.2 +# HW : varied # HA : AP # VDOMS : ENABLED Value Required NAME (\S+) @@ -29,7 +30,41 @@ Value DROP_FRAGMENT (\S+) Start ^==\s+\[\s+\S+\s\]$$ - ^name:\s+${NAME}\s+mode:\s+${MODE}\s+management-ip:\s+${MANAGEMENT_IP}\s+${MANAGEMENT_NETMASK}\s+ip:\s+${IP}\s+${NETMASK}\s+status:\s+${STATUS}\s+netbios-forward:\s+${NETBIOS_FORWARD}\s+type:\s+${TYPE}\s+netflow-sampler:\s+${NETFLOW_SAMPLER}\s+sflow-sampler:\s+${SFLOW_SAMPLER}\s+scan-botnet-connections:\s+${SCAN_BOTNET_CONNECTIONS}\s+src-check:\s+${SRC_CHECK}\s+explicit-web-proxy:\s+${EXPLICIT_WEB_PROXY}\s+explicit-ftp-proxy:\s+${EXPLICIT_FTP_PROXY}\s+proxy-captive-portal:\s+${PROXY_CAPTIVE_PORTAL}\s+mtu-override:\s+${MTU_OVERRIDE}\s+wccp:\s+${WCCP}\s+drop-overlapped-fragment:\s+${DROP_OVERLAPPED_FRAGMENT}\s+drop-fragment:\s+${DROP_FRAGMENT}\s+$$ -> Record + # mgmt + # name:ip:status:netbios-forward:type:netflow-sampler:sflow-sampler:scan-botnet-connections:src-check:explicit-web-proxy:explicit-ftp-proxy:proxy-captive-portal:mtu-override:wccp:drop-overlapped-fragment:drop-fragment + ^name:\s+${NAME}\s+ip:\s+${IP}\s+${NETMASK}\s+status:\s+${STATUS}\s+netbios-forward:\s+${NETBIOS_FORWARD}\s+type:\s+${TYPE}\s+netflow-sampler:\s+${NETFLOW_SAMPLER}\s+sflow-sampler:\s+${SFLOW_SAMPLER}\s+scan-botnet-connections:\s+${SCAN_BOTNET_CONNECTIONS}\s+src-check:\s+${SRC_CHECK}\s+explicit-web-proxy:\s+${EXPLICIT_WEB_PROXY}\s+explicit-ftp-proxy:\s+${EXPLICIT_FTP_PROXY}\s+proxy-captive-portal:\s+${PROXY_CAPTIVE_PORTAL}\s+mtu-override:\s+${MTU_OVERRIDE}\s+wccp:\s+${WCCP}\s+drop-overlapped-fragment:\s+${DROP_OVERLAPPED_FRAGMENT}\s+drop-fragment:\s+${DROP_FRAGMENT}\s*$$ -> Record + # modem <=6.0 + # name:mode:management-ip:ip:netbios-forward:type:netflow-sampler:sflow-sampler:scan-botnet-connections:src-check:proxy-captive-portal:mtu-override:wccp:drop-overlapped-fragment:drop-fragment + ^name:\s+${NAME}\s+mode:\s+${MODE}\s+management-ip:\s+${MANAGEMENT_IP}\s+${MANAGEMENT_NETMASK}\s+ip:\s+${IP}\s+${NETMASK}\s+netbios-forward:\s+${NETBIOS_FORWARD}\s+type:\s+${TYPE}\s+netflow-sampler:\s+${NETFLOW_SAMPLER}\s+sflow-sampler:\s+${SFLOW_SAMPLER}\s+scan-botnet-connections:\s+${SCAN_BOTNET_CONNECTIONS}\s+src-check:\s+${SRC_CHECK}\s+proxy-captive-portal:\s+${PROXY_CAPTIVE_PORTAL}\s+mtu-override:\s+${MTU_OVERRIDE}\s+wccp:\s+${WCCP}\s+drop-overlapped-fragment:\s+${DROP_OVERLAPPED_FRAGMENT}\s+drop-fragment:\s+${DROP_FRAGMENT}\s*$$ -> Record + # modem =6.2 + # name:mode:management-ip:ip:netbios-forward:type:netflow-sampler:sflow-sampler:src-check:proxy-captive-portal:mtu-override:wccp:drop-overlapped-fragment:drop-fragment + ^name:\s+${NAME}\s+mode:\s+${MODE}\s+management-ip:\s+${MANAGEMENT_IP}\s+${MANAGEMENT_NETMASK}\s+ip:\s+${IP}\s+${NETMASK}\s+netbios-forward:\s+${NETBIOS_FORWARD}\s+type:\s+${TYPE}\s+netflow-sampler:\s+${NETFLOW_SAMPLER}\s+sflow-sampler:\s+${SFLOW_SAMPLER}\s+src-check:\s+${SRC_CHECK}\s+proxy-captive-portal:\s+${PROXY_CAPTIVE_PORTAL}\s+mtu-override:\s+${MTU_OVERRIDE}\s+wccp:\s+${WCCP}\s+drop-overlapped-fragment:\s+${DROP_OVERLAPPED_FRAGMENT}\s+drop-fragment:\s+${DROP_FRAGMENT}\s*$$ -> Record + # type physical and vlan + # name:mode:management-ip:ip:status:netbios-forward:type:netflow-sampler:sflow-sampler:scan-botnet-connections:src-check:explicit-web-proxy:explicit-ftp-proxy:proxy-captive-portal:mtu-override:wccp:drop-overlapped-fragment:drop-fragment + ^name:\s+${NAME}\s+mode:\s+${MODE}\s+management-ip:\s+${MANAGEMENT_IP}\s+${MANAGEMENT_NETMASK}\s+ip:\s+${IP}\s+${NETMASK}\s+status:\s+${STATUS}\s+netbios-forward:\s+${NETBIOS_FORWARD}\s+type:\s+${TYPE}\s+netflow-sampler:\s+${NETFLOW_SAMPLER}\s+sflow-sampler:\s+${SFLOW_SAMPLER}\s+scan-botnet-connections:\s+${SCAN_BOTNET_CONNECTIONS}\s+src-check:\s+${SRC_CHECK}\s+explicit-web-proxy:\s+${EXPLICIT_WEB_PROXY}\s+explicit-ftp-proxy:\s+${EXPLICIT_FTP_PROXY}\s+proxy-captive-portal:\s+${PROXY_CAPTIVE_PORTAL}\s+mtu-override:\s+${MTU_OVERRIDE}\s+wccp:\s+${WCCP}\s+drop-overlapped-fragment:\s+${DROP_OVERLAPPED_FRAGMENT}\s+drop-fragment:\s+${DROP_FRAGMENT}\s*$$ -> Record + # ha + # name:mode:management-ip:ip:status:netbios-forward:type:netflow-sampler:sflow-sampler:src-check:explicit-web-proxy:explicit-ftp-proxy:proxy-captive-portal:mtu-override:wccp:drop-overlapped-fragment:drop-fragment + ^name:\s+${NAME}\s+mode:\s+${MODE}\s+management-ip:\s+${MANAGEMENT_IP}\s+${MANAGEMENT_NETMASK}\s+ip:\s+${IP}\s+${NETMASK}\s+status:\s+${STATUS}\s+netbios-forward:\s+${NETBIOS_FORWARD}\s+type:\s+${TYPE}\s+netflow-sampler:\s+${NETFLOW_SAMPLER}\s+sflow-sampler:\s+${SFLOW_SAMPLER}\s+src-check:\s+${SRC_CHECK}\s+explicit-web-proxy:\s+${EXPLICIT_WEB_PROXY}\s+explicit-ftp-proxy:\s+${EXPLICIT_FTP_PROXY}\s+proxy-captive-portal:\s+${PROXY_CAPTIVE_PORTAL}\s+mtu-override:\s+${MTU_OVERRIDE}\s+wccp:\s+${WCCP}\s+drop-overlapped-fragment:\s+${DROP_OVERLAPPED_FRAGMENT}\s+drop-fragment:\s+${DROP_FRAGMENT}\s*$$ -> Record + # type tunnel + # name:ip:status:netbios-forward:type:netflow-sampler:sflow-sampler:scan-botnet-connections:src-check:explicit-web-proxy:explicit-ftp-proxy:proxy-captive-portal:wccp + ^name:\s+${NAME}\s+ip:\s+${IP}\s+${NETMASK}\s+status:\s+${STATUS}\s+netbios-forward:\s+${NETBIOS_FORWARD}\s+type:\s+${TYPE}\s+netflow-sampler:\s+${NETFLOW_SAMPLER}\s+sflow-sampler:\s+${SFLOW_SAMPLER}\s+scan-botnet-connections:\s+${SCAN_BOTNET_CONNECTIONS}\s+src-check:\s+${SRC_CHECK}\s+explicit-web-proxy:\s+${EXPLICIT_WEB_PROXY}\s+explicit-ftp-proxy:\s+${EXPLICIT_FTP_PROXY}\s+proxy-captive-portal:\s+${PROXY_CAPTIVE_PORTAL}\s+wccp:\s+${WCCP}\s*$$ -> Record + # vw1 + # name:status:type:netflow-sampler:sflow-sampler:src-check:mtu-override:wccp:drop-overlapped-fragment:drop-fragment + ^name:\s+${NAME}\s+status:\s+${STATUS}\s+type:\s+${TYPE}\s+netflow-sampler:\s+${NETFLOW_SAMPLER}\s+sflow-sampler:\s+${SFLOW_SAMPLER}\s+src-check:\s+${SRC_CHECK}\s+mtu-override:\s+${MTU_OVERRIDE}\s+wccp:\s+${WCCP}\s+drop-overlapped-fragment:\s+${DROP_OVERLAPPED_FRAGMENT}\s+drop-fragment:\s+${DROP_FRAGMENT}\s*$$ -> Record + # ssl. that have less output - unsure why different + # name:ip:status:netbios-forward:type:netflow-sampler:sflow-sampler:scan-botnet-connections:src-check:wccp + ^name:\s+${NAME}\s+ip:\s+${IP}\s+${NETMASK}\s+status:\s+${STATUS}\s+netbios-forward:\s+${NETBIOS_FORWARD}\s+type:\s+${TYPE}\s+netflow-sampler:\s+${NETFLOW_SAMPLER}\s+sflow-sampler:\s+${SFLOW_SAMPLER}\s+scan-botnet-connections:\s+${SCAN_BOTNET_CONNECTIONS}\s+src-check:\s+${SRC_CHECK}\s+wccp:\s+${WCCP}\sv$$ -> Record + # ssl. =6.2 + # name:ip:status:netbios-forward:type:netflow-sampler:sflow-sampler:src-check:explicit-web-proxy:explicit-ftp-proxy:proxy-captive-portal:wccp + ^name:\s+${NAME}\s+ip:\s+${IP}\s+${NETMASK}\s+status:\s+${STATUS}\s+netbios-forward:\s+${NETBIOS_FORWARD}\s+type:\s+${TYPE}\s+netflow-sampler:\s+${NETFLOW_SAMPLER}\s+sflow-sampler:\s+${SFLOW_SAMPLER}\s+src-check:\s+${SRC_CHECK}\s+explicit-web-proxy:\s+${EXPLICIT_WEB_PROXY}\s+explicit-ftp-proxy:\s+${EXPLICIT_FTP_PROXY}\s+proxy-captive-portal:\s+${PROXY_CAPTIVE_PORTAL}\s+wccp:\s+${WCCP}\s*$$ -> Record + # type loopback + # name:management-ip:ip:status:type:netflow-sampler:sflow-sampler:scan-botnet-connections:src-check:explicit-web-proxy:explicit-ftp-proxy:proxy-captive-portal + ^name:\s+${NAME}\s+management-ip:\s+${MANAGEMENT_IP}\s+${MANAGEMENT_NETMASK}\s+ip:\s+${IP}\s+${NETMASK}\s+status:\s+${STATUS}\s+type:\s+${TYPE}\s+netflow-sampler:\s+${NETFLOW_SAMPLER}\s+sflow-sampler:\s+${SFLOW_SAMPLER}\s+scan-botnet-connections:\s+${SCAN_BOTNET_CONNECTIONS}\s+src-check:\s+${SRC_CHECK}\s+explicit-web-proxy:\s+${EXPLICIT_WEB_PROXY}\s+explicit-ftp-proxy:\s+${EXPLICIT_FTP_PROXY}\s+proxy-captive-portal:\s+${PROXY_CAPTIVE_PORTAL}\s*$$ -> Record + # loopback =6.2 + # name:management-ip:ip:status:type:netflow-sampler:sflow-sampler:src-check:explicit-web-proxy:explicit-ftp-proxy:proxy-captive-portal + ^name:\s+${NAME}\s+management-ip:\s+${MANAGEMENT_IP}\s+${MANAGEMENT_NETMASK}\s+ip:\s+${IP}\s+${NETMASK}\s+status:\s+${STATUS}\s+type:\s+${TYPE}\s+netflow-sampler:\s+${NETFLOW_SAMPLER}\s+sflow-sampler:\s+${SFLOW_SAMPLER}\s+src-check:\s+${SRC_CHECK}\s+explicit-web-proxy:\s+${EXPLICIT_WEB_PROXY}\s+explicit-ftp-proxy:\s+${EXPLICIT_FTP_PROXY}\s+proxy-captive-portal:\s+${PROXY_CAPTIVE_PORTAL}\s*$$ -> Record + # npu_vlink + # name:mode:management-ip:ip:status:netbios-forward:type:netflow-sampler:sflow-sampler:src-check:explicit-web-proxy:explicit-ftp-proxy:proxy-captive-portal:wccp:drop-overlapped-fragment:drop-fragment + ^name:\s+${NAME}\s+mode:\s+${MODE}\s+management-ip:\s+${MANAGEMENT_IP}\s+${MANAGEMENT_NETMASK}\s+ip:\s+${IP}\s+${NETMASK}\s+status:\s+${STATUS}\s+netbios-forward:\s+${NETBIOS_FORWARD}\s+type:\s+${TYPE}\s+netflow-sampler:\s+${NETFLOW_SAMPLER}\s+sflow-sampler:\s+${SFLOW_SAMPLER}\s+src-check:\s+${SRC_CHECK}\s+explicit-web-proxy:\s+${EXPLICIT_WEB_PROXY}\s+explicit-ftp-proxy:\s+${EXPLICIT_FTP_PROXY}\s+proxy-captive-portal:\s+${PROXY_CAPTIVE_PORTAL}\s+wccp:\s+${WCCP}\s+drop-overlapped-fragment:\s+${DROP_OVERLAPPED_FRAGMENT}\s+drop-fragment:\s+${DROP_FRAGMENT}\s*$$ -> Record ^\s*$$ ^. -> Error - diff --git a/templates/fortinet_get_system_interface_physical.textfsm b/templates/fortinet_get_system_interface_physical.textfsm new file mode 100644 index 0000000000..3a970d798a --- /dev/null +++ b/templates/fortinet_get_system_interface_physical.textfsm @@ -0,0 +1,29 @@ +# +# Refried Jello, Stephen Kiely +# 2021-01-06 - Initial Version +# +# FG Version: 5.6, 6.0, 6.2 +# HW : variety +# HA : AP +# VDOMS : ENABLED +Value Required NAME (\S+) +Value MODE (\S+) +Value IP (\d+?\.\d+?\.\d+?\.\d+?) +Value NETMASK (\S+) +Value IPV6 (\S+) +Value IPV6NETMASK (\S+) +Value STATUS (\S+) +Value SPEED (\d+|n\/a) +Value DUPLEX (\S+) + +Start + ^==\s+\[onboard\]$$ + ^\s+==\[${NAME}\]$$ + ^\s+mode:\s+${MODE}$$ + ^\s+ip:\s+${IP}\s+${NETMASK}$$ + ^\s+ipv6:\s+${IPV6}/${IPV6NETMASK}$$ + ^\s+status:\s+${STATUS}$$ + ^\s+speed:\s+${SPEED}(|Mbps)\s+\(Duplex:\s+${DUPLEX}\)$$ -> Record + ^\s+speed:\s+${SPEED}$$ -> Record + ^\s*$$ + ^. -> Error diff --git a/templates/fortinet_get_system_status.textfsm b/templates/fortinet_get_system_status.textfsm index d7c31f97ad..ca67ce0f1a 100644 --- a/templates/fortinet_get_system_status.textfsm +++ b/templates/fortinet_get_system_status.textfsm @@ -1,15 +1,17 @@ # -# Patrick Marc Preuss +# Patrick Marc Preuss, Refried Jello # # 2020-01-13: Inital Version +# 2021-01-08: Update for 6.2 # -# FG Version: 6.0.7 +# FG Version: 5.6, 6.0.7, 6.2 # HW : FG1500D # CLUSTER MODE: AP # VDOMS : ENABLED # Value Required HOSTNAME (\S+) Value VERSION (.*) +Value SIGNATURE (.*) Value VIRUS_DB (.*) Value EXTENDED_DB (.*) Value EXTREME_DB (.*) @@ -23,6 +25,7 @@ Value BOTNET_DB (.*) Value BIOS_VERSION (\S+) Value SYSTEM_PART_NUMBER (\S+) Value LOG_HARD_DISK (\S+) +Value PRIVATE_ENCRYPTION (\S+) Value OPERATION_MODE (\S+) Value CURRENT_VIRTUAL_DOMAIN (\S+) Value MAX_NUMBER_OF_VIRTUAL_DOMAINS (\d+) @@ -39,6 +42,7 @@ Value SYSTEM_TIME (.*) Start ^Version:\s+${VERSION} + ^Firmware Signature:\s+${SIGNATURE} ^Virus-DB:\s+${VIRUS_DB} ^Extended\s+DB:\s+${EXTENDED_DB} ^Extreme\s+DB:\s+${EXTREME_DB} @@ -53,6 +57,7 @@ Start ^System\s+Part-Number:\s+${SYSTEM_PART_NUMBER} ^Log\s+hard\s+disk:\s+${LOG_HARD_DISK} ^Hostname:\s+${HOSTNAME} + ^Private\s+Encryption:\s+${PRIVATE_ENCRYPTION} ^Operation\s+Mode:\s+${OPERATION_MODE} ^Current\s+virtual\s+domain:\s+${CURRENT_VIRTUAL_DOMAIN} ^Max\s+number\s+of\s+virtual\s+domains:\s+${MAX_NUMBER_OF_VIRTUAL_DOMAINS} diff --git a/templates/index b/templates/index index b747be8aef..975f58b161 100644 --- a/templates/index +++ b/templates/index @@ -383,10 +383,12 @@ dell_powerconnect_show_interfaces_description.textfsm, .*, dell_powerconnect, sh dell_powerconnect_show_bridge_address_table.textfsm, .*, dell_powerconnect, sh[[ow]] br[[idge]] a[[ddress-table]] dell_powerconnect_show_interfaces_status.textfsm, .*, dell_powerconnect, sh[[ow]] int[[erfaces]] st[[atus]] +fortinet_get_system_interface_physical.textfsm, .*, fortinet, g[[et]] sy[[stem]] in[[terface]] p[[hysical]] fortinet_get_router_info_bgp_summary.textfsm, .*, fortinet, g[[et]] r[[outer]] info bg[[p]] su[[mmary]] -fortinet_get_system_interface.textfsm, .*, fortinet, [[g]]et [[s]]ystem [[i]]nterface -fortinet_get_system_status.textfsm, .*, fortinet, [[g]]et [[s]]ystem [[s]]tatus -fortinet_get_system_arp.textfsm, .*, fortinet, [[g]]et [[sy]]stem arp +fortinet_get_system_ha_status.textfsm, .*, fortinet, g[[et]] sy[[stem]] ha s[[tatus]] +fortinet_get_system_interface.textfsm, .*, fortinet, g[[et]] sy[[stem]] in[[terface]] +fortinet_get_system_status.textfsm, .*, fortinet, g[[et]] sy[[stem]] stat[[us]] +fortinet_get_system_arp.textfsm, .*, fortinet, g[[et]] sy[[stem]] arp hp_comware_display_lldp_neighbor-information_verbose.textfsm, .*, hp_comware, di[[splay]] ll[[dp]] n[[eighbor-information]] v[[erbose]] hp_comware_display_counters_bound_interface.textfsm, .*, hp_comware, di[[splay]] cou[[nters]] (\S+) i[[nterface]] diff --git a/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_5.6.raw b/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_5.6.raw new file mode 100644 index 0000000000..610edca146 --- /dev/null +++ b/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_5.6.raw @@ -0,0 +1,45 @@ +HA Health Status: OK +Model: FortiGate-200D +Mode: HA A-P +Group: 0 +Debug: 0 +Cluster Uptime: 913 days 6:17:44 +Cluster state change time: 2020-11-18 20:06:07 +Master selected using: + <2020/11/18 20:06:07> FG200Dyyyyyyyyyy is selected as the master because it has the least value 0 of link-failure + pingsvr-failure. +ses_pickup: enable, ses_pickup_delay=disable +override: disable +Configuration Status: + FG200Dxxxxxxxxxx(updated 3 seconds ago): in-sync + FG200Dyyyyyyyyyy(updated 2 seconds ago): in-sync +System Usage stats: + FG200Dxxxxxxxxxx(updated 3 seconds ago): + sessions=783, average-cpu-user/nice/system/idle=0%/0%/0%/100%, memory=36% + FG200Dyyyyyyyyyy(updated 2 seconds ago): + sessions=2133, average-cpu-user/nice/system/idle=0%/0%/0%/100%, memory=45% +HBDEV stats: + FG200Dxxxxxxxxxx(updated 3 seconds ago): + port16: physical/1000auto, up, rx-bytes/packets/dropped/errors=159611572717/161193511/0/0, tx=33081101596/72820100/0/0 + FG200Dyyyyyyyyyy(updated 2 seconds ago): + port16: physical/1000auto, up, rx-bytes/packets/dropped/errors=33102078904/72841639/0/0, tx=159622538782/161222515/0/0 +MONDEV stats: + FG200Dxxxxxxxxxx(updated 3 seconds ago): + port1: physical/1000auto, up, rx-bytes/packets/dropped/errors=772333476/10120455/0/0, tx=0/0/0/0 + port2: physical/1000auto, up, rx-bytes/packets/dropped/errors=24489027465/180044269/0/0, tx=1216527080/20272865/0/0 + port3: physical/1000auto, up, rx-bytes/packets/dropped/errors=738612670/8494189/0/0, tx=0/0/0/0 + port4: physical/1000auto, up, rx-bytes/packets/dropped/errors=1326403723/10314862/0/0, tx=7221960/120366/0/0 + port9: physical/1000auto, up, rx-bytes/packets/dropped/errors=631932574/7780810/0/0, tx=0/0/0/0 + port10: physical/1000auto, up, rx-bytes/packets/dropped/errors=1448638924/21408174/0/0, tx=0/0/0/0 + FG200Dyyyyyyyyyy(updated 2 seconds ago): + port1: physical/1000auto, up, rx-bytes/packets/dropped/errors=4792670497191/8032421997/0/0, tx=2567023541941/6420616690/0/0 + port2: physical/1000auto, up, rx-bytes/packets/dropped/errors=3164841988838/9813426301/0/0, tx=5238589087538/11151680911/0/0 + port3: physical/1000auto, up, rx-bytes/packets/dropped/errors=2121416101948/1691293285/0/0, tx=193581440599/636568993/0/0 + port4: physical/1000auto, up, rx-bytes/packets/dropped/errors=195739651207/655711324/0/0, tx=2119206966925/1682026942/0/0 + port9: physical/1000auto, up, rx-bytes/packets/dropped/errors=4228611730/46724818/0/0, tx=1390605465/10026243/0/0 + port10: physical/1000auto, up, rx-bytes/packets/dropped/errors=1353423864/19920614/0/0, tx=89179816/1486318/0/0 +Slave : fgt_200d_a , FG200Dxxxxxxxxxx, cluster index = 1 +Master: fgt_200d_b , FG200Dyyyyyyyyyy, cluster index = 0 +number of vcluster: 1 +vcluster 1: standby 169.254.0.1 +Slave : FG200Dxxxxxxxxxx, operating cluster index = 1 +Master: FG200Dyyyyyyyyyy, operating cluster index = 0 diff --git a/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_5.6.yml b/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_5.6.yml new file mode 100644 index 0000000000..9c3c4a2448 --- /dev/null +++ b/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_5.6.yml @@ -0,0 +1,17 @@ +--- +parsed_sample: + - ha_health: "OK" + model: "FortiGate-200D" + ha_mode: "HA A-P" + ha_group: "0" + cluster_uptime: "913 days 6:17:44" + cluster_state_changed_time: "2020-11-18 20:06:07" + ha_session_pickup_status: "enable" + ha_session_pickup_delay: "disable" + ha_override_status: "disable" + ha_master_unit_name: "fgt_200d_b" + ha_slave_unit_name: "fgt_200d_a" + ha_master_unit_serial: "FG200Dyyyyyyyyyy" + ha_slave_unit_serial: "FG200Dxxxxxxxxxx" + ha_master_unit_index: "0" + ha_slave_unit_index: "1" diff --git a/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.0.raw b/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.0.raw new file mode 100644 index 0000000000..6ed6392350 --- /dev/null +++ b/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.0.raw @@ -0,0 +1,31 @@ +HA Health Status: OK +Model: FortiGate-200D +Mode: HA A-P +Group: 0 +Debug: 0 +Cluster Uptime: 764 days 22:45:44 +Cluster state change time: 2019-08-16 11:08:27 +Master selected using: + <2019/08/16 11:08:27> FG200Dxxxxxxxxxx is selected as the master because it has the largest value of override priority. + <2019/08/14 12:32:47> FG200Dyyyyyyyyyy is selected as the master because it has the largest value of override priority. +ses_pickup: enable, ses_pickup_delay=disable +override: enable +Configuration Status: + FG200Dxxxxxxxxxx(updated 2 seconds ago): in-sync + FG200Dyyyyyyyyyy(updated 5 seconds ago): in-sync +System Usage stats: + FG200Dxxxxxxxxxx(updated 2 seconds ago): + sessions=2421, average-cpu-user/nice/system/idle=0%/0%/0%/100%, memory=25% + FG200Dyyyyyyyyyy(updated 5 seconds ago): + sessions=326, average-cpu-user/nice/system/idle=0%/0%/0%/100%, memory=23% +HBDEV stats: + FG200Dxxxxxxxxxx(updated 2 seconds ago): + port16: physical/1000auto, up, rx-bytes/packets/dropped/errors=152066501590/357378132/0/0, tx=476952801500/678960488/0/0 + FG200Dyyyyyyyyyy(updated 5 seconds ago): + port16: physical/1000auto, up, rx-bytes/packets/dropped/errors=477266958857/680444657/0/0, tx=151761016675/355910298/0/0 +Master: fgt-200d_a, FG200Dxxxxxxxxxx, cluster index = 1 +Slave : fgt-200d_b, FG200Dyyyyyyyyyy, cluster index = 0 +number of vcluster: 1 +vcluster 1: work 169.254.0.2 +Master: FG200Dxxxxxxxxxx, operating cluster index = 0 +Slave : FG200Dyyyyyyyyyy, operating cluster index = 1 diff --git a/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.0.yml b/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.0.yml new file mode 100644 index 0000000000..39c97d1a12 --- /dev/null +++ b/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.0.yml @@ -0,0 +1,17 @@ +--- +parsed_sample: + - ha_health: "OK" + model: "FortiGate-200D" + ha_mode: "HA A-P" + ha_group: "0" + cluster_uptime: "764 days 22:45:44" + cluster_state_changed_time: "2019-08-16 11:08:27" + ha_session_pickup_status: "enable" + ha_session_pickup_delay: "disable" + ha_override_status: "enable" + ha_master_unit_name: "fgt-200d_a" + ha_slave_unit_name: "fgt-200d_b" + ha_master_unit_serial: "FG200Dxxxxxxxxxx" + ha_slave_unit_serial: "FG200Dyyyyyyyyyy" + ha_master_unit_index: "1" + ha_slave_unit_index: "0" diff --git a/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.0_noha.raw b/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.0_noha.raw new file mode 100644 index 0000000000..699deb0d44 --- /dev/null +++ b/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.0_noha.raw @@ -0,0 +1,12 @@ +HA Health Status: OK +Model: FortiGate-60D +Mode: Standalone +Group: 0 +Debug: 0 +Cluster Uptime: 0 days 0:0:0 +Cluster state change time: N/A +ses_pickup: enable, ses_pickup_delay=disable +override: enable +System Usage stats: +HBDEV stats: +number of vcluster: 0 diff --git a/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.0_noha.yml b/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.0_noha.yml new file mode 100644 index 0000000000..06eb1163a2 --- /dev/null +++ b/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.0_noha.yml @@ -0,0 +1,17 @@ +--- +parsed_sample: + - ha_health: "OK" + model: "FortiGate-60D" + ha_mode: "Standalone" + ha_group: "0" + cluster_uptime: "0 days 0:0:0" + cluster_state_changed_time: "N/A" + ha_session_pickup_status: "enable" + ha_session_pickup_delay: "disable" + ha_override_status: "enable" + ha_master_unit_name: "" + ha_slave_unit_name: "" + ha_master_unit_serial: "" + ha_slave_unit_serial: "" + ha_master_unit_index: "" + ha_slave_unit_index: "" diff --git a/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.2.raw b/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.2.raw new file mode 100644 index 0000000000..cfec24be79 --- /dev/null +++ b/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.2.raw @@ -0,0 +1,37 @@ +HA Health Status: OK +Model: FortiGate-600E +Mode: HA A-P +Group: 5 +Debug: 0 +Cluster Uptime: 36 days 22:20:40 +Cluster state change time: 2020-12-02 22:40:46 +Master selected using: + <2020/12/02 22:40:46> FG6H0Exxxxxxxxxx is selected as the master because it has the largest value of override priority. +ses_pickup: enable, ses_pickup_delay=disable +override: enable +Configuration Status: + FG6H0Exxxxxxxxxx(updated 1 seconds ago): in-sync + FG6H0Eyyyyyyyyyy(updated 3 seconds ago): in-sync +System Usage stats: + FG6H0Exxxxxxxxxx(updated 1 seconds ago): + sessions=692, average-cpu-user/nice/system/idle=0%/0%/0%/100%, memory=25% + FG6H0Eyyyyyyyyyy(updated 3 seconds ago): + sessions=303, average-cpu-user/nice/system/idle=0%/0%/0%/100%, memory=23% +HBDEV stats: + FG6H0Exxxxxxxxxx(updated 1 seconds ago): + ha: physical/1000auto, up, rx-bytes/packets/dropped/errors=13086049757/51933375/0/0, tx=93993034207/102822032/0/0 + FG6H0Eyyyyyyyyyy(updated 3 seconds ago): + ha: physical/1000auto, up, rx-bytes/packets/dropped/errors=93993244676/102822709/0/0, tx=13085729171/51934319/0/0 +MONDEV stats: + FG6H0Exxxxxxxxxx(updated 1 seconds ago): + x1: physical/10000full, up, rx-bytes/packets/dropped/errors=166373929414532/122946162431/0/0, tx=51746004768400/50869381172/0/0 + x2: physical/10000full, up, rx-bytes/packets/dropped/errors=49656542180617/50909579016/0/337, tx=165637609617619/122981014444/0/0 + FG6H0Eyyyyyyyyyy(updated 3 seconds ago): + x1: physical/10000full, up, rx-bytes/packets/dropped/errors=409699822/4202261/0/0, tx=0/0/0/0 + x2: physical/10000full, up, rx-bytes/packets/dropped/errors=12425072765/11621697/0/0, tx=0/0/0/0 +Master: fgt-600e_a, FG6H0Exxxxxxxxxx, HA cluster index = 1 +Slave : fgt-600e_b, FG6H0Eyyyyyyyyyy, HA cluster index = 0 +number of vcluster: 1 +vcluster 1: work 169.254.0.2 +Master: FG6H0Exxxxxxxxxx, HA operating index = 0 +Slave : FG6H0Eyyyyyyyyyy, HA operating index = 1 diff --git a/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.2.yml b/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.2.yml new file mode 100644 index 0000000000..ee3f1a6d44 --- /dev/null +++ b/tests/fortinet/get_system_ha_status/fortinet_get_system_ha_status_6.2.yml @@ -0,0 +1,17 @@ +--- +parsed_sample: + - ha_health: "OK" + model: "FortiGate-600E" + ha_mode: "HA A-P" + ha_group: "5" + cluster_uptime: "36 days 22:20:40" + cluster_state_changed_time: "2020-12-02 22:40:46" + ha_session_pickup_status: "enable" + ha_session_pickup_delay: "disable" + ha_override_status: "enable" + ha_master_unit_name: "fgt-600e_a" + ha_slave_unit_name: "fgt-600e_b" + ha_master_unit_serial: "FG6H0Exxxxxxxxxx" + ha_slave_unit_serial: "FG6H0Eyyyyyyyyyy" + ha_master_unit_index: "1" + ha_slave_unit_index: "0" diff --git a/tests/fortinet/get_system_interface/fortinet_get_system_interface.raw b/tests/fortinet/get_system_interface/fortinet_get_system_interface.raw deleted file mode 100644 index 16bea61532..0000000000 --- a/tests/fortinet/get_system_interface/fortinet_get_system_interface.raw +++ /dev/null @@ -1,4 +0,0 @@ -== [ port1 ] -name: port1 mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 0.0.0.0 0.0.0.0 status: down netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable -== [ port2 ] -name: port2 mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 0.0.0.0 0.0.0.0 status: down netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable diff --git a/tests/fortinet/get_system_interface/fortinet_get_system_interface.yml b/tests/fortinet/get_system_interface/fortinet_get_system_interface.yml deleted file mode 100644 index a7ce299713..0000000000 --- a/tests/fortinet/get_system_interface/fortinet_get_system_interface.yml +++ /dev/null @@ -1,42 +0,0 @@ ---- -parsed_sample: - - name: "port1" - mode: "static" - management_ip: "0.0.0.0" - management_netmask: "0.0.0.0" - ip: "0.0.0.0" - netmask: "0.0.0.0" - status: "down" - netbios_forward: "disable" - type: "physical" - netflow_sampler: "disable" - sflow_sampler: "disable" - scan_botnet_connections: "disable" - src_check: "enable" - explicit_web_proxy: "disable" - explicit_ftp_proxy: "disable" - proxy_captive_portal: "disable" - mtu_override: "disable" - wccp: "disable" - drop_overlapped_fragment: "disable" - drop_fragment: "disable" - - name: "port2" - mode: "static" - management_ip: "0.0.0.0" - management_netmask: "0.0.0.0" - ip: "0.0.0.0" - netmask: "0.0.0.0" - status: "down" - netbios_forward: "disable" - type: "physical" - netflow_sampler: "disable" - sflow_sampler: "disable" - scan_botnet_connections: "disable" - src_check: "enable" - explicit_web_proxy: "disable" - explicit_ftp_proxy: "disable" - proxy_captive_portal: "disable" - mtu_override: "disable" - wccp: "disable" - drop_overlapped_fragment: "disable" - drop_fragment: "disable" diff --git a/tests/fortinet/get_system_interface/fortinet_get_system_interface_5.6.raw b/tests/fortinet/get_system_interface/fortinet_get_system_interface_5.6.raw new file mode 100644 index 0000000000..9efee55c3d --- /dev/null +++ b/tests/fortinet/get_system_interface/fortinet_get_system_interface_5.6.raw @@ -0,0 +1,18 @@ +== [ mgmt ] +name: mgmt ip: 1.2.3.4 255.255.255.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ wan1 ] +name: wan1 mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 0.0.0.0 0.0.0.0 status: down netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ dmz1 ] +name: dmz1 mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 0.0.0.0 0.0.0.0 status: down netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ modem ] +name: modem mode: pppoe management-ip: 0.0.0.0 0.0.0.0 ip: 0.0.0.0 0.0.0.0 netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ ssl.root ] +name: ssl.root ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: tunnel netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable +== [ port1 ] +name: port1 mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 2.3.4.5 255.255.255.240 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ port2.10 ] +name: port2.10 mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 3.4.5.6 255.255.255.0 status: up netbios-forward: disable type: vlan netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ VPN-TUN ] +name: VPN-TUN ip: 4.5.6.7 255.255.255.255 status: up netbios-forward: disable type: tunnel netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable +== [ loopback.0 ] +name: loopback.0 management-ip: 0.0.0.0 0.0.0.0 ip: 10.0.0.100 255.255.255.255 status: up type: loopback netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable diff --git a/tests/fortinet/get_system_interface/fortinet_get_system_interface_5.6.yml b/tests/fortinet/get_system_interface/fortinet_get_system_interface_5.6.yml new file mode 100644 index 0000000000..c6767ff055 --- /dev/null +++ b/tests/fortinet/get_system_interface/fortinet_get_system_interface_5.6.yml @@ -0,0 +1,182 @@ +--- +parsed_sample: + - name: "mgmt" + mode: "" + management_ip: "" + management_netmask: "" + ip: "1.2.3.4" + netmask: "255.255.255.0" + status: "up" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "wan1" + mode: "static" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "0.0.0.0" + netmask: "0.0.0.0" + status: "down" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "dmz1" + mode: "static" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "0.0.0.0" + netmask: "0.0.0.0" + status: "down" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "modem" + mode: "pppoe" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "0.0.0.0" + netmask: "0.0.0.0" + status: "" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "" + explicit_ftp_proxy: "" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "ssl.root" + mode: "" + management_ip: "" + management_netmask: "" + ip: "0.0.0.0" + netmask: "0.0.0.0" + status: "up" + netbios_forward: "disable" + type: "tunnel" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "" + wccp: "disable" + drop_overlapped_fragment: "" + drop_fragment: "" + - name: "port1" + mode: "static" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "2.3.4.5" + netmask: "255.255.255.240" + status: "up" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "port2.10" + mode: "static" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "3.4.5.6" + netmask: "255.255.255.0" + status: "up" + netbios_forward: "disable" + type: "vlan" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "VPN-TUN" + mode: "" + management_ip: "" + management_netmask: "" + ip: "4.5.6.7" + netmask: "255.255.255.255" + status: "up" + netbios_forward: "disable" + type: "tunnel" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "" + wccp: "disable" + drop_overlapped_fragment: "" + drop_fragment: "" + - name: "loopback.0" + mode: "" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "10.0.0.100" + netmask: "255.255.255.255" + status: "up" + netbios_forward: "" + type: "loopback" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "" + wccp: "" + drop_overlapped_fragment: "" + drop_fragment: "" diff --git a/tests/fortinet/get_system_interface/fortinet_get_system_interface_6.0.raw b/tests/fortinet/get_system_interface/fortinet_get_system_interface_6.0.raw new file mode 100644 index 0000000000..d5bfd0b133 --- /dev/null +++ b/tests/fortinet/get_system_interface/fortinet_get_system_interface_6.0.raw @@ -0,0 +1,18 @@ +== [ mgmt ] +name: mgmt mode: static management-ip: 1.2.3.4 255.255.255.248 ip: 1.2.3.4 255.255.255.248 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ wan1 ] +name: wan1 mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ dmz1 ] +name: dmz1 mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ modem ] +name: modem mode: pppoe management-ip: 0.0.0.0 0.0.0.0 ip: 0.0.0.0 0.0.0.0 netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ ssl.root ] +name: ssl.root ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: tunnel netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable +== [ port1 ] +name: port1 mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 2.3.4.5 255.255.255.248 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ port2 ] +name: port2 mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ port2.103 ] +name: port2.103 mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 3.4.5.6 255.255.255.0 status: up netbios-forward: disable type: vlan netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ VPN-TUN ] +name: VPN-LAB ip: 7.8.9.10 255.255.255.255 status: up netbios-forward: disable type: tunnel netflow-sampler: disable sflow-sampler: disable scan-botnet-connections: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable diff --git a/tests/fortinet/get_system_interface/fortinet_get_system_interface_6.0.yml b/tests/fortinet/get_system_interface/fortinet_get_system_interface_6.0.yml new file mode 100644 index 0000000000..f866255662 --- /dev/null +++ b/tests/fortinet/get_system_interface/fortinet_get_system_interface_6.0.yml @@ -0,0 +1,182 @@ +--- +parsed_sample: + - name: "mgmt" + mode: "static" + management_ip: "1.2.3.4" + management_netmask: "255.255.255.248" + ip: "1.2.3.4" + netmask: "255.255.255.248" + status: "up" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "wan1" + mode: "static" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "0.0.0.0" + netmask: "0.0.0.0" + status: "up" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "dmz1" + mode: "static" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "0.0.0.0" + netmask: "0.0.0.0" + status: "up" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "modem" + mode: "pppoe" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "0.0.0.0" + netmask: "0.0.0.0" + status: "" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "" + explicit_ftp_proxy: "" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "ssl.root" + mode: "" + management_ip: "" + management_netmask: "" + ip: "0.0.0.0" + netmask: "0.0.0.0" + status: "up" + netbios_forward: "disable" + type: "tunnel" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "" + wccp: "disable" + drop_overlapped_fragment: "" + drop_fragment: "" + - name: "port1" + mode: "static" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "2.3.4.5" + netmask: "255.255.255.248" + status: "up" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "port2" + mode: "static" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "0.0.0.0" + netmask: "0.0.0.0" + status: "up" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "port2.103" + mode: "static" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "3.4.5.6" + netmask: "255.255.255.0" + status: "up" + netbios_forward: "disable" + type: "vlan" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "VPN-LAB" + mode: "" + management_ip: "" + management_netmask: "" + ip: "7.8.9.10" + netmask: "255.255.255.255" + status: "up" + netbios_forward: "disable" + type: "tunnel" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "disable" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "" + wccp: "disable" + drop_overlapped_fragment: "" + drop_fragment: "" diff --git a/tests/fortinet/get_system_interface/fortinet_get_system_interface_6.2.raw b/tests/fortinet/get_system_interface/fortinet_get_system_interface_6.2.raw new file mode 100644 index 0000000000..efecabd144 --- /dev/null +++ b/tests/fortinet/get_system_interface/fortinet_get_system_interface_6.2.raw @@ -0,0 +1,28 @@ +== [ ha ] +name: ha mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ mgmt ] +name: mgmt mode: static management-ip: 1.2.3.4 255.255.255.248 ip: 1.2.3.4 255.255.255.248 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ port1 ] +name: port1 mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ port2 ] +name: port2 mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ s1 ] +name: s1 mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ vw1 ] +name: vw1 status: up type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ x1 ] +name: x1 mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ modem ] +name: modem mode: pppoe management-ip: 0.0.0.0 0.0.0.0 ip: 0.0.0.0 0.0.0.0 netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ ssl.root ] +name: ssl.root ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: tunnel netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable +== [ npu0_vlink0 ] +name: npu0_vlink0 mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: physical netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ fortilink ] +name: fortilink mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 169.254.1.1 255.255.255.0 status: up netbios-forward: disable type: aggregate netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ x1.113 ] +name: x1.113 mode: static management-ip: 0.0.0.0 0.0.0.0 ip: 2.3.4.5 255.255.255.0 status: up netbios-forward: disable type: vlan netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable mtu-override: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable +== [ loopback.0 ] +name: loopback.0 management-ip: 0.0.0.0 0.0.0.0 ip: 10.0.0.100 255.255.255.255 status: up type: loopback netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable +== [ VPN-TUN ] +name: VPN-TUN ip: 3.4.5.6 255.255.255.255 status: up netbios-forward: disable type: tunnel netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable diff --git a/tests/fortinet/get_system_interface/fortinet_get_system_interface_6.2.yml b/tests/fortinet/get_system_interface/fortinet_get_system_interface_6.2.yml new file mode 100644 index 0000000000..6d55c45303 --- /dev/null +++ b/tests/fortinet/get_system_interface/fortinet_get_system_interface_6.2.yml @@ -0,0 +1,282 @@ +--- +parsed_sample: + - name: "ha" + mode: "static" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "0.0.0.0" + netmask: "0.0.0.0" + status: "up" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "mgmt" + mode: "static" + management_ip: "1.2.3.4" + management_netmask: "255.255.255.248" + ip: "1.2.3.4" + netmask: "255.255.255.248" + status: "up" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "port1" + mode: "static" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "0.0.0.0" + netmask: "0.0.0.0" + status: "up" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "port2" + mode: "static" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "0.0.0.0" + netmask: "0.0.0.0" + status: "up" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "s1" + mode: "static" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "0.0.0.0" + netmask: "0.0.0.0" + status: "up" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "vw1" + mode: "" + management_ip: "" + management_netmask: "" + ip: "" + netmask: "" + status: "up" + netbios_forward: "" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "" + src_check: "enable" + explicit_web_proxy: "" + explicit_ftp_proxy: "" + proxy_captive_portal: "" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "x1" + mode: "static" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "0.0.0.0" + netmask: "0.0.0.0" + status: "up" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "modem" + mode: "pppoe" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "0.0.0.0" + netmask: "0.0.0.0" + status: "" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "" + src_check: "enable" + explicit_web_proxy: "" + explicit_ftp_proxy: "" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "ssl.root" + mode: "" + management_ip: "" + management_netmask: "" + ip: "0.0.0.0" + netmask: "0.0.0.0" + status: "up" + netbios_forward: "disable" + type: "tunnel" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "" + wccp: "disable" + drop_overlapped_fragment: "" + drop_fragment: "" + - name: "npu0_vlink0" + mode: "static" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "0.0.0.0" + netmask: "0.0.0.0" + status: "up" + netbios_forward: "disable" + type: "physical" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "fortilink" + mode: "static" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "169.254.1.1" + netmask: "255.255.255.0" + status: "up" + netbios_forward: "disable" + type: "aggregate" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "x1.113" + mode: "static" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "2.3.4.5" + netmask: "255.255.255.0" + status: "up" + netbios_forward: "disable" + type: "vlan" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "disable" + wccp: "disable" + drop_overlapped_fragment: "disable" + drop_fragment: "disable" + - name: "loopback.0" + mode: "" + management_ip: "0.0.0.0" + management_netmask: "0.0.0.0" + ip: "10.0.0.100" + netmask: "255.255.255.255" + status: "up" + netbios_forward: "" + type: "loopback" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "" + wccp: "" + drop_overlapped_fragment: "" + drop_fragment: "" + - name: "VPN-TUN" + mode: "" + management_ip: "" + management_netmask: "" + ip: "3.4.5.6" + netmask: "255.255.255.255" + status: "up" + netbios_forward: "disable" + type: "tunnel" + netflow_sampler: "disable" + sflow_sampler: "disable" + scan_botnet_connections: "" + src_check: "enable" + explicit_web_proxy: "disable" + explicit_ftp_proxy: "disable" + proxy_captive_portal: "disable" + mtu_override: "" + wccp: "disable" + drop_overlapped_fragment: "" + drop_fragment: "" diff --git a/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_5.6.raw b/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_5.6.raw new file mode 100644 index 0000000000..f7fa7461de --- /dev/null +++ b/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_5.6.raw @@ -0,0 +1,133 @@ +== [onboard] + ==[dmz1] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[dmz2] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[mgmt] + mode: static + ip: 1.2.3.4 255.255.255.248 + ipv6: ::/0 + status: up + speed: 1000Mbps (Duplex: full) + ==[port1] + mode: static + ip: 2.3.4.5 255.255.255.240 + ipv6: ::/0 + status: up + speed: 1000Mbps (Duplex: full) + ==[port2] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: up + speed: 1000Mbps (Duplex: full) + ==[port3] + mode: static + ip: 66.51.24.44 255.255.255.248 + ipv6: ::/0 + status: up + speed: 1000Mbps (Duplex: full) + ==[port4] + mode: static + ip: 192.168.111.1 255.255.255.0 + ipv6: ::/0 + status: up + speed: 1000Mbps (Duplex: full) + ==[port5] + mode: static + ip: 3.4.5.6 255.255.255.240 + ipv6: ::/0 + status: up + speed: 1000Mbps (Duplex: full) + ==[port6] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: up + speed: 1000Mbps (Duplex: full) + ==[port7] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port8] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port9] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port10] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port11] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port12] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port13] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port14] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port15] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port16] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: up + speed: 1000Mbps (Duplex: full) + ==[wan1] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[wan2] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[modem] + mode: pppoe + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a diff --git a/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_5.6.yml b/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_5.6.yml new file mode 100644 index 0000000000..26588ac53d --- /dev/null +++ b/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_5.6.yml @@ -0,0 +1,200 @@ +--- +parsed_sample: + - name: "dmz1" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "dmz2" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "mgmt" + mode: "static" + ip: "1.2.3.4" + netmask: "255.255.255.248" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "1000" + duplex: "full" + - name: "port1" + mode: "static" + ip: "2.3.4.5" + netmask: "255.255.255.240" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "1000" + duplex: "full" + - name: "port2" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "1000" + duplex: "full" + - name: "port3" + mode: "static" + ip: "66.51.24.44" + netmask: "255.255.255.248" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "1000" + duplex: "full" + - name: "port4" + mode: "static" + ip: "192.168.111.1" + netmask: "255.255.255.0" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "1000" + duplex: "full" + - name: "port5" + mode: "static" + ip: "3.4.5.6" + netmask: "255.255.255.240" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "1000" + duplex: "full" + - name: "port6" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "1000" + duplex: "full" + - name: "port7" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port8" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port9" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port10" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port11" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port12" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port13" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port14" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port15" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port16" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "1000" + duplex: "full" + - name: "wan1" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "wan2" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "modem" + mode: "pppoe" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" diff --git a/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_6.0.raw b/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_6.0.raw new file mode 100644 index 0000000000..5e0bc5a440 --- /dev/null +++ b/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_6.0.raw @@ -0,0 +1,133 @@ +== [onboard] + ==[dmz1] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[dmz2] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[mgmt] + mode: static + ip: 1.2.3.4 255.255.255.248 + ipv6: ::/0 + status: up + speed: 1000Mbps (Duplex: full) + ==[port1] + mode: static + ip: 2.3.4.5 255.255.255.224 + ipv6: ::/0 + status: up + speed: 1000Mbps (Duplex: full) + ==[port2] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: up + speed: 1000Mbps (Duplex: full) + ==[port3] + mode: static + ip: 3.4.5.6 255.255.255.248 + ipv6: ::/0 + status: up + speed: 1000Mbps (Duplex: full) + ==[port4] + mode: static + ip: 192.168.107.1 255.255.255.0 + ipv6: ::/0 + status: up + speed: 1000Mbps (Duplex: full) + ==[port5] + mode: static + ip: 10.107.128.68 255.255.255.248 + ipv6: ::/0 + status: up + speed: 1000Mbps (Duplex: full) + ==[port6] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port7] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port8] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port9] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port10] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port11] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port12] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port13] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port14] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port15] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port16] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: up + speed: 1000Mbps (Duplex: full) + ==[wan1] + mode: dhcp + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[wan2] + mode: dhcp + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[modem] + mode: pppoe + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a diff --git a/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_6.0.yml b/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_6.0.yml new file mode 100644 index 0000000000..b15461aa4e --- /dev/null +++ b/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_6.0.yml @@ -0,0 +1,200 @@ +--- +parsed_sample: + - name: "dmz1" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "dmz2" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "mgmt" + mode: "static" + ip: "1.2.3.4" + netmask: "255.255.255.248" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "1000" + duplex: "full" + - name: "port1" + mode: "static" + ip: "2.3.4.5" + netmask: "255.255.255.224" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "1000" + duplex: "full" + - name: "port2" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "1000" + duplex: "full" + - name: "port3" + mode: "static" + ip: "3.4.5.6" + netmask: "255.255.255.248" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "1000" + duplex: "full" + - name: "port4" + mode: "static" + ip: "192.168.107.1" + netmask: "255.255.255.0" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "1000" + duplex: "full" + - name: "port5" + mode: "static" + ip: "10.107.128.68" + netmask: "255.255.255.248" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "1000" + duplex: "full" + - name: "port6" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port7" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port8" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port9" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port10" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port11" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port12" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port13" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port14" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port15" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port16" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "1000" + duplex: "full" + - name: "wan1" + mode: "dhcp" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "wan2" + mode: "dhcp" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "modem" + mode: "pppoe" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" diff --git a/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_6.2.raw b/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_6.2.raw new file mode 100644 index 0000000000..fc918e2318 --- /dev/null +++ b/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_6.2.raw @@ -0,0 +1,139 @@ +== [onboard] + ==[ha] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: up + speed: 1000Mbps (Duplex: full) + ==[mgmt] + mode: static + ip: 1.2.3.4 255.255.255.248 + ipv6: ::/0 + status: up + speed: 1000Mbps (Duplex: full) + ==[npu0_vlink0] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: up + speed: n/a (Duplex: n/a) + ==[npu0_vlink1] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: up + speed: n/a (Duplex: n/a) + ==[port1] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port2] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port3] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port4] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port5] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port6] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port7] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port8] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port9] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port10] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port11] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[port12] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[s1] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[s2] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[vw1] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[vw2] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a + ==[x1] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: up + speed: 10000Mbps (Duplex: full) + ==[x2] + mode: static + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: up + speed: 10000Mbps (Duplex: full) + ==[modem] + mode: pppoe + ip: 0.0.0.0 0.0.0.0 + ipv6: ::/0 + status: down + speed: n/a diff --git a/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_6.2.yml b/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_6.2.yml new file mode 100644 index 0000000000..5f7f4f1f0d --- /dev/null +++ b/tests/fortinet/get_system_interface_physical/fortinet_get_system_interface_physical_6.2.yml @@ -0,0 +1,209 @@ +--- +parsed_sample: + - name: "ha" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "1000" + duplex: "full" + - name: "mgmt" + mode: "static" + ip: "1.2.3.4" + netmask: "255.255.255.248" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "1000" + duplex: "full" + - name: "npu0_vlink0" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "n/a" + duplex: "n/a" + - name: "npu0_vlink1" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "n/a" + duplex: "n/a" + - name: "port1" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port2" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port3" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port4" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port5" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port6" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port7" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port8" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port9" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port10" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port11" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "port12" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "s1" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "s2" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "vw1" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "vw2" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" + - name: "x1" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "10000" + duplex: "full" + - name: "x2" + mode: "static" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "up" + speed: "10000" + duplex: "full" + - name: "modem" + mode: "pppoe" + ip: "0.0.0.0" + netmask: "0.0.0.0" + ipv6: "::" + ipv6netmask: "0" + status: "down" + speed: "n/a" + duplex: "" diff --git a/tests/fortinet/get_system_status/fortinet_get_system_status.yml b/tests/fortinet/get_system_status/fortinet_get_system_status.yml index 5fd5e14ca2..1c309a1c9b 100644 --- a/tests/fortinet/get_system_status/fortinet_get_system_status.yml +++ b/tests/fortinet/get_system_status/fortinet_get_system_status.yml @@ -2,6 +2,7 @@ parsed_sample: - hostname: "MYCOOLEFIREWALLNAME" version: "FortiGate-1500D v6.0.7,build0302,191112 (GA)" + signature: "" virus_db: "16.00560(2012-10-19 08:31)" extended_db: "1.00000(2018-04-09 18:07)" extreme_db: "1.00000(2018-04-09 18:07)" @@ -15,6 +16,7 @@ parsed_sample: bios_version: "05000006" system_part_number: "P12917-08" log_hard_disk: "Available" + private_encryption: "" operation_mode: "NAT" current_virtual_domain: "root" max_number_of_virtual_domains: "10" diff --git a/tests/fortinet/get_system_status/fortinet_get_system_status_6.2.raw b/tests/fortinet/get_system_status/fortinet_get_system_status_6.2.raw new file mode 100644 index 0000000000..f909bdd378 --- /dev/null +++ b/tests/fortinet/get_system_status/fortinet_get_system_status_6.2.raw @@ -0,0 +1,30 @@ +Version: FortiGate-600E v6.2.6,build1175,201110 (GA) +Firmware Signature: certified +Virus-DB: 83.00146(2021-01-08 11:20) +Extended DB: 83.00146(2021-01-08 11:20) +Extreme DB: 1.00000(2018-04-09 18:07) +IPS-DB: 6.00741(2015-12-01 02:30) +IPS-ETDB: 16.00993(2021-01-07 00:45) +APP-DB: 16.00992(2021-01-06 02:37) +INDUSTRIAL-DB: 6.00741(2015-12-01 02:30) +Serial-Number: FG6H0Exxxxxxxxx +IPS Malicious URL Database: 2.00883(2021-01-08 06:19) +Botnet DB: 1.00000(2012-05-28 22:51) +BIOS version: 05000006 +System Part-Number: P24088-03 +Log hard disk: Not available +Hostname: fgt-600e +Private Encryption: Disable +Operation Mode: NAT +Current virtual domain: root +Max number of virtual domains: 10 +Virtual domains status: 2 in NAT mode, 0 in TP mode +Virtual domain configuration: multiple +FIPS-CC mode: disable +Current HA mode: a-p, master +Cluster uptime: 36 days, 21 hours, 42 minutes, 22 seconds +Cluster state change time: 2020-12-02 22:40:46 +Branch point: 1175 +Release Version Information: GA +FortiOS x86-64: Yes +System time: Fri Jan 8 13:22:01 2021 diff --git a/tests/fortinet/get_system_status/fortinet_get_system_status_6.2.yml b/tests/fortinet/get_system_status/fortinet_get_system_status_6.2.yml new file mode 100644 index 0000000000..f63d2f7186 --- /dev/null +++ b/tests/fortinet/get_system_status/fortinet_get_system_status_6.2.yml @@ -0,0 +1,32 @@ +--- +parsed_sample: + - hostname: "fgt-600e" + version: "FortiGate-600E v6.2.6,build1175,201110 (GA)" + signature: "certified" + virus_db: "83.00146(2021-01-08 11:20)" + extended_db: "83.00146(2021-01-08 11:20)" + extreme_db: "1.00000(2018-04-09 18:07)" + ips_db: "6.00741(2015-12-01 02:30)" + ips_etdb: "16.00993(2021-01-07 00:45)" + app_db: "16.00992(2021-01-06 02:37)" + industrial_db: "6.00741(2015-12-01 02:30)" + serial_number: "FG6H0Exxxxxxxxx" + ips_malicious_url_database: "2.00883(2021-01-08 06:19)" + botnet_db: "1.00000(2012-05-28 22:51)" + bios_version: "05000006" + system_part_number: "P24088-03" + log_hard_disk: "Not" + private_encryption: "Disable" + operation_mode: "NAT" + current_virtual_domain: "root" + max_number_of_virtual_domains: "10" + virtual_domains_status: "2 in NAT mode, 0 in TP mode" + virtual_domain_configuration: "multiple" + fips_cc_mode: "disable" + current_ha_mode: "a-p, master" + cluster_uptime: "36 days, 21 hours, 42 minutes, 22 seconds" + cluster_state_change_time: "2020-12-02 22:40:46" + branch_point: "1175" + release_version_information: "GA" + fortios_x86_64: "Yes" + system_time: "Fri Jan 8 13:22:01 2021"