On this page
fortinet.fortios.fortios_system_global – Configure global attributes in Fortinet’s FortiOS and FortiGate.
Note
This plugin is part of the fortinet.fortios collection (version 2.1.2).
You might already have this collection installed if you are using the ansible package. It is not included in ansible-core. To check whether it is installed, run ansible-galaxy collection list.
To install it, use: ansible-galaxy collection install fortinet.fortios.
To use it in a playbook, specify: fortinet.fortios.fortios_system_global.
New in version 2.10: of fortinet.fortios
Synopsis
- This module is able to configure a FortiGate or FortiOS (FOS) device by allowing the user to set and modify system feature and global category. Examples include all parameters and values need to be adjusted to datasources before usage. Tested with FOS v6.0.0
 
Requirements
The below requirements are needed on the host that executes this module.
- ansible>=2.9.0
 
Parameters
| Parameter | Choices/Defaults | Comments | |
|---|---|---|---|
| access_token
        
        string
         | 
      
        
        Token-based authentication. Generated from GUI of Fortigate.
         | 
     ||
| enable_log
        
        boolean
         | 
      
       
  | 
      
        
        Enable/Disable logging for task.
         | 
     |
| system_global
        
        dictionary
         | 
      
        
        Configure global attributes.
         | 
     ||
| admin_concurrent
        
        string
         | 
      
       
  | 
      
        
        Enable/disable concurrent administrator logins. (Use policy-auth-concurrent for firewall authenticated users.)
         | 
     |
| admin_console_timeout
        
        integer
         | 
      
        
        Console login timeout that overrides the admintimeout value. (15 - 300 seconds) (15 seconds to 5 minutes). 0 the default, disables this timeout.
         | 
     ||
| admin_forticloud_sso_login
        
        string
         | 
      
       
  | 
      
        
        Enable/disable FortiCloud admin login via SSO.
         | 
     |
| admin_hsts_max_age
        
        integer
         | 
      
        
        HTTPS Strict-Transport-Security header max-age in seconds. A value of 0 will reset any HSTS records in the browser.When admin-https-redirect is disabled the header max-age will be 0.
         | 
     ||
| admin_https_pki_required
        
        string
         | 
      
       
  | 
      
        
        Enable/disable admin login method. Enable to force administrators to provide a valid certificate to log in if PKI is enabled. Disable to allow administrators to log in with a certificate or password.
         | 
     |
| admin_https_redirect
        
        string
         | 
      
       
  | 
      
        
        Enable/disable redirection of HTTP administration access to HTTPS.
         | 
     |
| admin_https_ssl_versions
        
        list / elements=string
         | 
      
       
  | 
      
        
        Allowed TLS versions for web administration.
         | 
     |
| admin_lockout_duration
        
        integer
         | 
      
        
        Amount of time in seconds that an administrator account is locked out after reaching the admin-lockout-threshold for repeated failed login attempts.
         | 
     ||
| admin_lockout_threshold
        
        integer
         | 
      
        
        Number of failed login attempts before an administrator account is locked out for the admin-lockout-duration.
         | 
     ||
| admin_login_max
        
        integer
         | 
      
        
        Maximum number of administrators who can be logged in at the same time (1 - 100)
         | 
     ||
| admin_maintainer
        
        string
         | 
      
       
  | 
      
        
        Enable/disable maintainer administrator login. When enabled, the maintainer account can be used to log in from the console after a hard reboot. The password is "bcpb" followed by the FortiGate unit serial number. You have limited time to complete this login.
         | 
     |
| admin_port
        
        integer
         | 
      
        
        Administrative access port for HTTP. (1 - 65535).
         | 
     ||
| admin_restrict_local
        
        string
         | 
      
       
  | 
      
        
        Enable/disable local admin authentication restriction when remote authenticator is up and running.
         | 
     |
| admin_scp
        
        string
         | 
      
       
  | 
      
        
        Enable/disable using SCP to download the system configuration. You can use SCP as an alternative method for backing up the configuration.
         | 
     |
| admin_server_cert
        
        string
         | 
      
        
        Server certificate that the FortiGate uses for HTTPS administrative connections. Source certificate.local.name.
         | 
     ||
| admin_sport
        
        integer
         | 
      
        
        Administrative access port for HTTPS. (1 - 65535).
         | 
     ||
| admin_ssh_grace_time
        
        integer
         | 
      
        
        Maximum time in seconds permitted between making an SSH connection to the FortiGate unit and authenticating (10 - 3600 sec (1 hour)).
         | 
     ||
| admin_ssh_password
        
        string
         | 
      
       
  | 
      
        
        Enable/disable password authentication for SSH admin access.
         | 
     |
| admin_ssh_port
        
        integer
         | 
      
        
        Administrative access port for SSH. (1 - 65535).
         | 
     ||
| admin_ssh_v1
        
        string
         | 
      
       
  | 
      
        
        Enable/disable SSH v1 compatibility.
         | 
     |
| admin_telnet
        
        string
         | 
      
       
  | 
      
        
        Enable/disable TELNET service.
         | 
     |
| admin_telnet_port
        
        integer
         | 
      
        
        Administrative access port for TELNET. (1 - 65535).
         | 
     ||
| admintimeout
        
        integer
         | 
      
        
        Number of minutes before an idle administrator session times out (5 - 480 minutes (8 hours)). A shorter idle timeout is more secure.
         | 
     ||
| alias
        
        string
         | 
      
        
        Alias for your FortiGate unit.
         | 
     ||
| allow_traffic_redirect
        
        string
         | 
      
       
  | 
      
        
        Disable to allow traffic to be routed back on a different interface.
         | 
     |
| anti_replay
        
        string
         | 
      
       
  | 
      
        
        Level of checking for packet replay and TCP sequence checking.
         | 
     |
| arp_max_entry
        
        integer
         | 
      
        
        Maximum number of dynamically learned MAC addresses that can be added to the ARP table (131072 - 2147483647).
         | 
     ||
| asymroute
        
        string
         | 
      
       
  | 
      
        
        Enable/disable asymmetric route.
         | 
     |
| auth_cert
        
        string
         | 
      
        
        Server certificate that the FortiGate uses for HTTPS firewall authentication connections. Source certificate.local.name.
         | 
     ||
| auth_http_port
        
        integer
         | 
      
        
        User authentication HTTP port. (1 - 65535).
         | 
     ||
| auth_https_port
        
        integer
         | 
      
        
        User authentication HTTPS port. (1 - 65535).
         | 
     ||
| auth_keepalive
        
        string
         | 
      
       
  | 
      
        
        Enable to prevent user authentication sessions from timing out when idle.
         | 
     |
| auth_session_limit
        
        string
         | 
      
       
  | 
      
        
        Action to take when the number of allowed user authenticated sessions is reached.
         | 
     |
| auto_auth_extension_device
        
        string
         | 
      
       
  | 
      
        
        Enable/disable automatic authorization of dedicated Fortinet extension devices.
         | 
     |
| autorun_log_fsck
        
        string
         | 
      
       
  | 
      
        
        Enable/disable automatic log partition check after ungraceful shutdown.
         | 
     |
| av_affinity
        
        string
         | 
      
        
        Affinity setting for AV scanning (hexadecimal value up to 256 bits in the format of xxxxxxxxxxxxxxxx).
         | 
     ||
| av_failopen
        
        string
         | 
      
       
  | 
      
        
        Set the action to take if the FortiGate is running low on memory or the proxy connection limit has been reached.
         | 
     |
| av_failopen_session
        
        string
         | 
      
       
  | 
      
        
        When enabled and a proxy for a protocol runs out of room in its session table, that protocol goes into failopen mode and enacts the action specified by av-failopen.
         | 
     |
| batch_cmdb
        
        string
         | 
      
       
  | 
      
        
        Enable/disable batch mode, allowing you to enter a series of CLI commands that will execute as a group once they are loaded.
         | 
     |
| block_session_timer
        
        integer
         | 
      
        
        Duration in seconds for blocked sessions (1 - 300 sec (5 minutes)).
         | 
     ||
| br_fdb_max_entry
        
        integer
         | 
      
        
        Maximum number of bridge forwarding database (FDB) entries.
         | 
     ||
| cert_chain_max
        
        integer
         | 
      
        
        Maximum number of certificates that can be traversed in a certificate chain.
         | 
     ||
| cfg_revert_timeout
        
        integer
         | 
      
        
        Time-out for reverting to the last saved configuration.
         | 
     ||
| cfg_save
        
        string
         | 
      
       
  | 
      
        
        Configuration file save mode for CLI changes.
         | 
     |
| check_protocol_header
        
        string
         | 
      
       
  | 
      
        
        Level of checking performed on protocol headers. Strict checking is more thorough but may affect performance. Loose checking is ok in most cases.
         | 
     |
| check_reset_range
        
        string
         | 
      
       
  | 
      
        
        Configure ICMP error message verification. You can either apply strict RST range checking or disable it.
         | 
     |
| cli_audit_log
        
        string
         | 
      
       
  | 
      
        
        Enable/disable CLI audit log.
         | 
     |
| cloud_communication
        
        string
         | 
      
       
  | 
      
        
        Enable/disable all cloud communication.
         | 
     |
| clt_cert_req
        
        string
         | 
      
       
  | 
      
        
        Enable/disable requiring administrators to have a client certificate to log into the GUI using HTTPS.
         | 
     |
| compliance_check
        
        string
         | 
      
       
  | 
      
        
        Enable/disable global PCI DSS compliance check.
         | 
     |
| compliance_check_time
        
        string
         | 
      
        
        Time of day to run scheduled PCI DSS compliance checks.
         | 
     ||
| cpu_use_threshold
        
        integer
         | 
      
        
        Threshold at which CPU usage is reported. (% of total CPU).
         | 
     ||
| csr_ca_attribute
        
        string
         | 
      
       
  | 
      
        
        Enable/disable the CA attribute in certificates. Some CA servers reject CSRs that have the CA attribute.
         | 
     |
| daily_restart
        
        string
         | 
      
       
  | 
      
        
        Enable/disable daily restart of FortiGate unit. Use the restart-time option to set the time of day for the restart.
         | 
     |
| default_service_source_port
        
        string
         | 
      
        
        Default service source port range.
         | 
     ||
| device_identification_active_scan_delay
        
        integer
         | 
      
        
        Number of seconds to passively scan a device before performing an active scan. (20 - 3600 sec, (20 sec to 1 hour)).
         | 
     ||
| device_idle_timeout
        
        integer
         | 
      
        
        Time in seconds that a device must be idle to automatically log the device user out. (30 - 31536000 sec (30 sec to 1 year)).
         | 
     ||
| dh_params
        
        string
         | 
      
       
  | 
      
        
        Number of bits to use in the Diffie-Hellman exchange for HTTPS/SSH protocols.
         | 
     |
| dnsproxy_worker_count
        
        integer
         | 
      
        
        DNS proxy worker count.
         | 
     ||
| dst
        
        string
         | 
      
       
  | 
      
        
        Enable/disable daylight saving time.
         | 
     |
| edit_vdom_prompt
        
        string
         | 
      
       
  | 
      
        
        Enable/disable edit new VDOM prompt.
         | 
     |
| endpoint_control_fds_access
        
        string
         | 
      
       
  | 
      
        
        Enable/disable access to the FortiGuard network for non-compliant endpoints.
         | 
     |
| endpoint_control_portal_port
        
        integer
         | 
      
        
        Endpoint control portal port (1 - 65535).
         | 
     ||
| failtime
        
        integer
         | 
      
        
        Fail-time for server lost.
         | 
     ||
| faz_disk_buffer_size
        
        integer
         | 
      
        
        Maximum disk buffer size to temporarily store logs destined for FortiAnalyzer. To be used in the event that FortiAnalyzer is unavailalble.
         | 
     ||
| fds_statistics
        
        string
         | 
      
       
  | 
      
        
        Enable/disable sending IPS, Application Control, and AntiVirus data to FortiGuard. This data is used to improve FortiGuard services and is not shared with external parties and is protected by Fortinet"s privacy policy.
         | 
     |
| fds_statistics_period
        
        integer
         | 
      
        
        FortiGuard statistics collection period in minutes. (1 - 1440 min (1 min to 24 hours)).
         | 
     ||
| fec_port
        
        integer
         | 
      
        
        Local UDP port for Forward Error Correction (49152 - 65535).
         | 
     ||
| fgd_alert_subscription
        
        list / elements=string
         | 
      
       
  | 
      
        
        Type of alert to retrieve from FortiGuard.
         | 
     |
| fortiextender
        
        string
         | 
      
       
  | 
      
        
        Enable/disable FortiExtender.
         | 
     |
| fortiextender_data_port
        
        integer
         | 
      
        
        FortiExtender data port (1024 - 49150).
         | 
     ||
| fortiextender_vlan_mode
        
        string
         | 
      
       
  | 
      
        
        Enable/disable FortiExtender VLAN mode.
         | 
     |
| fortiipam_integration
        
        string
         | 
      
       
  | 
      
        
        Enable/disable integration with the FortiIPAM cloud service.
         | 
     |
| fortiservice_port
        
        integer
         | 
      
        
        FortiService port (1 - 65535). Used by FortiClient endpoint compliance. Older versions of FortiClient used a different port.
         | 
     ||
| fortitoken_cloud
        
        string
         | 
      
       
  | 
      
        
        Enable/disable FortiToken Cloud service.
         | 
     |
| gui_allow_default_hostname
        
        string
         | 
      
       
  | 
      
        
        Enable/disable the GUI warning about using a default hostname
         | 
     |
| gui_certificates
        
        string
         | 
      
       
  | 
      
        
        Enable/disable the System > Certificate GUI page, allowing you to add and configure certificates from the GUI.
         | 
     |
| gui_custom_language
        
        string
         | 
      
       
  | 
      
        
        Enable/disable custom languages in GUI.
         | 
     |
| gui_date_format
        
        string
         | 
      
       
  | 
      
        
        Default date format used throughout GUI.
         | 
     |
| gui_date_time_source
        
        string
         | 
      
       
  | 
      
        
        Source from which the FortiGate GUI uses to display date and time entries.
         | 
     |
| gui_device_latitude
        
        string
         | 
      
        
        Add the latitude of the location of this FortiGate to position it on the Threat Map.
         | 
     ||
| gui_device_longitude
        
        string
         | 
      
        
        Add the longitude of the location of this FortiGate to position it on the Threat Map.
         | 
     ||
| gui_display_hostname
        
        string
         | 
      
       
  | 
      
        
        Enable/disable displaying the FortiGate"s hostname on the GUI login page.
         | 
     |
| gui_firmware_upgrade_warning
        
        string
         | 
      
       
  | 
      
        
        Enable/disable the firmware upgrade warning on the GUI.
         | 
     |
| gui_forticare_registration_setup_warning
        
        string
         | 
      
       
  | 
      
        
        Enable/disable the FortiCare registration setup warning on the GUI.
         | 
     |
| gui_fortigate_cloud_sandbox
        
        string
         | 
      
       
  | 
      
        
        Enable/disable displaying FortiGate Cloud Sandbox on the GUI.
         | 
     |
| gui_fortisandbox_cloud
        
        string
         | 
      
       
  | 
      
        
        Enable/disable displaying FortiSandbox Cloud on the GUI.
         | 
     |
| gui_ipv6
        
        string
         | 
      
       
  | 
      
        
        Enable/disable IPv6 settings on the GUI.
         | 
     |
| gui_lines_per_page
        
        integer
         | 
      
        
        Number of lines to display per page for web administration.
         | 
     ||
| gui_local_out
        
        string
         | 
      
       
  | 
      
        
        Enable/disable Local-out traffic on the GUI.
         | 
     |
| gui_replacement_message_groups
        
        string
         | 
      
       
  | 
      
        
        Enable/disable replacement message groups on the GUI.
         | 
     |
| gui_rest_api_cache
        
        string
         | 
      
       
  | 
      
        
        Enable/disable REST API result caching on FortiGate.
         | 
     |
| gui_theme
        
        string
         | 
      
       
  | 
      
        
        Color scheme for the administration GUI.
         | 
     |
| gui_wireless_opensecurity
        
        string
         | 
      
       
  | 
      
        
        Enable/disable wireless open security option on the GUI.
         | 
     |
| honor_df
        
        string
         | 
      
       
  | 
      
        
        Enable/disable honoring of Don"t-Fragment (DF) flag.
         | 
     |
| hostname
        
        string
         | 
      
        
        FortiGate unit"s hostname. Most models will truncate names longer than 24 characters. Some models support hostnames up to 35 characters.
         | 
     ||
| igmp_state_limit
        
        integer
         | 
      
        
        Maximum number of IGMP memberships (96 - 64000).
         | 
     ||
| interval
        
        integer
         | 
      
        
        Dead gateway detection interval.
         | 
     ||
| ip_src_port_range
        
        string
         | 
      
        
        IP source port range used for traffic originating from the FortiGate unit.
         | 
     ||
| ips_affinity
        
        string
         | 
      
        
        Affinity setting for IPS (hexadecimal value up to 256 bits in the format of xxxxxxxxxxxxxxxx; allowed CPUs must be less than total number of IPS engine daemons).
         | 
     ||
| ipsec_asic_offload
        
        string
         | 
      
       
  | 
      
        
        Enable/disable ASIC offloading (hardware acceleration) for IPsec VPN traffic. Hardware acceleration can offload IPsec VPN sessions and accelerate encryption and decryption.
         | 
     |
| ipsec_ha_seqjump_rate
        
        integer
         | 
      
        
        ESP jump ahead rate (1G - 10G pps equivalent).
         | 
     ||
| ipsec_hmac_offload
        
        string
         | 
      
       
  | 
      
        
        Enable/disable offloading (hardware acceleration) of HMAC processing for IPsec VPN.
         | 
     |
| ipsec_soft_dec_async
        
        string
         | 
      
       
  | 
      
        
        Enable/disable software decryption asynchronization (using multiple CPUs to do decryption) for IPsec VPN traffic.
         | 
     |
| ipv6_accept_dad
        
        integer
         | 
      
        
        Enable/disable acceptance of IPv6 Duplicate Address Detection (DAD).
         | 
     ||
| ipv6_allow_anycast_probe
        
        string
         | 
      
       
  | 
      
        
        Enable/disable IPv6 address probe through Anycast.
         | 
     |
| ipv6_allow_traffic_redirect
        
        string
         | 
      
       
  | 
      
        
        Disable to prevent IPv6 traffic with same local ingress and egress interface from being forwarded without policy check.
         | 
     |
| irq_time_accounting
        
        string
         | 
      
       
  | 
      
        
        Configure CPU IRQ time accounting mode.
         | 
     |
| language
        
        string
         | 
      
       
  | 
      
        
        GUI display language.
         | 
     |
| ldapconntimeout
        
        integer
         | 
      
        
        Global timeout for connections with remote LDAP servers in milliseconds (1 - 300000).
         | 
     ||
| lldp_reception
        
        string
         | 
      
       
  | 
      
        
        Enable/disable Link Layer Discovery Protocol (LLDP) reception.
         | 
     |
| lldp_transmission
        
        string
         | 
      
       
  | 
      
        
        Enable/disable Link Layer Discovery Protocol (LLDP) transmission.
         | 
     |
| log_ssl_connection
        
        string
         | 
      
       
  | 
      
        
        Enable/disable logging of SSL connection events.
         | 
     |
| log_uuid
        
        string
         | 
      
       
  | 
      
        
        Whether UUIDs are added to traffic logs. You can disable UUIDs, add firewall policy UUIDs to traffic logs, or add all UUIDs to traffic logs.
         | 
     |
| log_uuid_address
        
        string
         | 
      
       
  | 
      
        
        Enable/disable insertion of address UUIDs to traffic logs.
         | 
     |
| log_uuid_policy
        
        string
         | 
      
       
  | 
      
        
        Enable/disable insertion of policy UUIDs to traffic logs.
         | 
     |
| login_timestamp
        
        string
         | 
      
       
  | 
      
        
        Enable/disable login time recording.
         | 
     |
| long_vdom_name
        
        string
         | 
      
       
  | 
      
        
        Enable/disable long VDOM name support.
         | 
     |
| management_ip
        
        string
         | 
      
        
        Management IP address of this FortiGate. Used to log into this FortiGate from another FortiGate in the Security Fabric.
         | 
     ||
| management_port
        
        integer
         | 
      
        
        Overriding port for management connection (Overrides admin port).
         | 
     ||
| management_vdom
        
        string
         | 
      
        
        Management virtual domain name. Source system.vdom.name.
         | 
     ||
| max_dlpstat_memory
        
        integer
         | 
      
        
        Maximum DLP stat memory (0 - 4294967295).
         | 
     ||
| max_route_cache_size
        
        integer
         | 
      
        
        Maximum number of IP route cache entries (0 - 2147483647).
         | 
     ||
| mc_ttl_notchange
        
        string
         | 
      
       
  | 
      
        
        Enable/disable no modification of multicast TTL.
         | 
     |
| memory_use_threshold_extreme
        
        integer
         | 
      
        
        Threshold at which memory usage is considered extreme (new sessions are dropped) (% of total RAM).
         | 
     ||
| memory_use_threshold_green
        
        integer
         | 
      
        
        Threshold at which memory usage forces the FortiGate to exit conserve mode (% of total RAM).
         | 
     ||
| memory_use_threshold_red
        
        integer
         | 
      
        
        Threshold at which memory usage forces the FortiGate to enter conserve mode (% of total RAM).
         | 
     ||
| miglog_affinity
        
        string
         | 
      
        
        Affinity setting for logging (64-bit hexadecimal value in the format of xxxxxxxxxxxxxxxx).
         | 
     ||
| miglogd_children
        
        integer
         | 
      
        
        Number of logging (miglogd) processes to be allowed to run. Higher number can reduce performance; lower number can slow log processing time. No logs will be dropped or lost if the number is changed.
         | 
     ||
| multi_factor_authentication
        
        string
         | 
      
       
  | 
      
        
        Enforce all login methods to require an additional authentication factor .
         | 
     |
| multicast_forward
        
        string
         | 
      
       
  | 
      
        
        Enable/disable multicast forwarding.
         | 
     |
| ndp_max_entry
        
        integer
         | 
      
        
        Maximum number of NDP table entries (set to 65,536 or higher; if set to 0, kernel holds 65,536 entries).
         | 
     ||
| per_user_bal
        
        string
         | 
      
       
  | 
      
        
        Enable/disable per-user block/allow list filter.
         | 
     |
| per_user_bwl
        
        string
         | 
      
       
  | 
      
        
        Enable/disable per-user black/white list filter.
         | 
     |
| policy_auth_concurrent
        
        integer
         | 
      
        
        Number of concurrent firewall use logins from the same user (1 - 100).
         | 
     ||
| post_login_banner
        
        string
         | 
      
       
  | 
      
        
        Enable/disable displaying the administrator access disclaimer message after an administrator successfully logs in.
         | 
     |
| pre_login_banner
        
        string
         | 
      
       
  | 
      
        
        Enable/disable displaying the administrator access disclaimer message on the login page before an administrator logs in.
         | 
     |
| private_data_encryption
        
        string
         | 
      
       
  | 
      
        
        Enable/disable private data encryption using an AES 128-bit key.
         | 
     |
| proxy_auth_lifetime
        
        string
         | 
      
       
  | 
      
        
        Enable/disable authenticated users lifetime control. This is a cap on the total time a proxy user can be authenticated for after which re-authentication will take place.
         | 
     |
| proxy_auth_lifetime_timeout
        
        integer
         | 
      
        
        Lifetime timeout in minutes for authenticated users (5 - 65535 min).
         | 
     ||
| proxy_auth_timeout
        
        integer
         | 
      
        
        Authentication timeout in minutes for authenticated users (1 - 300 min).
         | 
     ||
| proxy_cipher_hardware_acceleration
        
        string
         | 
      
       
  | 
      
        
        Enable/disable using content processor (CP8 or CP9) hardware acceleration to encrypt and decrypt IPsec and SSL traffic.
         | 
     |
| proxy_hardware_acceleration
        
        string
         | 
      
       
  | 
      
        
        Enable/disable email proxy hardware acceleration.
         | 
     |
| proxy_kxp_hardware_acceleration
        
        string
         | 
      
       
  | 
      
        
        Enable/disable using the content processor to accelerate KXP traffic.
         | 
     |
| proxy_re_authentication_mode
        
        string
         | 
      
       
  | 
      
        
        Control if users must re-authenticate after a session is closed, traffic has been idle, or from the point at which the user was first created.
         | 
     |
| proxy_resource_mode
        
        string
         | 
      
       
  | 
      
        
        Enable/disable use of the maximum memory usage on the FortiGate unit"s proxy processing of resources, such as block lists, allow lists, and external resources.
         | 
     |
| proxy_worker_count
        
        integer
         | 
      
        
        Proxy worker count.
         | 
     ||
| radius_port
        
        integer
         | 
      
        
        RADIUS service port number.
         | 
     ||
| reboot_upon_config_restore
        
        string
         | 
      
       
  | 
      
        
        Enable/disable reboot of system upon restoring configuration.
         | 
     |
| refresh
        
        integer
         | 
      
        
        Statistics refresh interval in GUI.
         | 
     ||
| remoteauthtimeout
        
        integer
         | 
      
        
        Number of seconds that the FortiGate waits for responses from remote RADIUS, LDAP, or TACACS+ authentication servers. (0-300 sec).
         | 
     ||
| reset_sessionless_tcp
        
        string
         | 
      
       
  | 
      
        
        Action to perform if the FortiGate receives a TCP packet but cannot find a corresponding session in its session table. NAT/Route mode only.
         | 
     |
| restart_time
        
        string
         | 
      
        
        Daily restart time (hh:mm).
         | 
     ||
| revision_backup_on_logout
        
        string
         | 
      
       
  | 
      
        
        Enable/disable back-up of the latest configuration revision when an administrator logs out of the CLI or GUI.
         | 
     |
| revision_image_auto_backup
        
        string
         | 
      
       
  | 
      
        
        Enable/disable back-up of the latest configuration revision after the firmware is upgraded.
         | 
     |
| scanunit_count
        
        integer
         | 
      
        
        Number of scanunits. The range and the default depend on the number of CPUs. Only available on FortiGate units with multiple CPUs.
         | 
     ||
| security_rating_result_submission
        
        string
         | 
      
       
  | 
      
        
        Enable/disable the submission of Security Rating results to FortiGuard.
         | 
     |
| security_rating_run_on_schedule
        
        string
         | 
      
       
  | 
      
        
        Enable/disable scheduled runs of Security Rating.
         | 
     |
| send_pmtu_icmp
        
        string
         | 
      
       
  | 
      
        
        Enable/disable sending of path maximum transmission unit (PMTU) - ICMP destination unreachable packet and to support PMTUD protocol on your network to reduce fragmentation of packets.
         | 
     |
| snat_route_change
        
        string
         | 
      
       
  | 
      
        
        Enable/disable the ability to change the static NAT route.
         | 
     |
| special_file_23_support
        
        string
         | 
      
       
  | 
      
        
        Enable/disable IPS detection of HIBUN format files when using Data Leak Protection.
         | 
     |
| split_port
        
        string
         | 
      
        
        Split port(s) to multiple 10Gbps ports.
         | 
     ||
| ssd_trim_date
        
        integer
         | 
      
        
        Date within a month to run ssd trim.
         | 
     ||
| ssd_trim_freq
        
        string
         | 
      
       
  | 
      
        
        How often to run SSD Trim . SSD Trim prevents SSD drive data loss by finding and isolating errors.
         | 
     |
| ssd_trim_hour
        
        integer
         | 
      
        
        Hour of the day on which to run SSD Trim (0 - 23).
         | 
     ||
| ssd_trim_min
        
        integer
         | 
      
        
        Minute of the hour on which to run SSD Trim (0 - 59, 60 for random).
         | 
     ||
| ssd_trim_weekday
        
        string
         | 
      
       
  | 
      
        
        Day of week to run SSD Trim.
         | 
     |
| ssh_cbc_cipher
        
        string
         | 
      
       
  | 
      
        
        Enable/disable CBC cipher for SSH access.
         | 
     |
| ssh_hmac_md5
        
        string
         | 
      
       
  | 
      
        
        Enable/disable HMAC-MD5 for SSH access.
         | 
     |
| ssh_kex_sha1
        
        string
         | 
      
       
  | 
      
        
        Enable/disable SHA1 key exchange for SSH access.
         | 
     |
| ssh_mac_weak
        
        string
         | 
      
       
  | 
      
        
        Enable/disable HMAC-SHA1 and UMAC-64-ETM for SSH access.
         | 
     |
| ssl_min_proto_version
        
        string
         | 
      
       
  | 
      
        
        Minimum supported protocol version for SSL/TLS connections .
         | 
     |
| ssl_static_key_ciphers
        
        string
         | 
      
       
  | 
      
        
        Enable/disable static key ciphers in SSL/TLS connections (e.g. AES128-SHA, AES256-SHA, AES128-SHA256, AES256-SHA256).
         | 
     |
| sslvpn_cipher_hardware_acceleration
        
        string
         | 
      
       
  | 
      
        
        Enable/disable SSL VPN hardware acceleration.
         | 
     |
| sslvpn_ems_sn_check
        
        string
         | 
      
       
  | 
      
        
        Enable/disable verification of EMS serial number in SSL-VPN connection.
         | 
     |
| sslvpn_kxp_hardware_acceleration
        
        string
         | 
      
       
  | 
      
        
        Enable/disable SSL VPN KXP hardware acceleration.
         | 
     |
| sslvpn_max_worker_count
        
        integer
         | 
      
        
        Maximum number of SSL VPN processes. Upper limit for this value is the number of CPUs and depends on the model.
         | 
     ||
| sslvpn_plugin_version_check
        
        string
         | 
      
       
  | 
      
        
        Enable/disable checking browser"s plugin version by SSL VPN.
         | 
     |
| strict_dirty_session_check
        
        string
         | 
      
       
  | 
      
        
        Enable to check the session against the original policy when revalidating. This can prevent dropping of redirected sessions when web-filtering and authentication are enabled together. If this option is enabled, the FortiGate unit deletes a session if a routing or policy change causes the session to no longer match the policy that originally allowed the session.
         | 
     |
| strong_crypto
        
        string
         | 
      
       
  | 
      
        
        Enable to use strong encryption and only allow strong ciphers (AES, 3DES) and digest (SHA1) for HTTPS/SSH/TLS/SSL functions.
         | 
     |
| switch_controller
        
        string
         | 
      
       
  | 
      
        
        Enable/disable switch controller feature. Switch controller allows you to manage FortiSwitch from the FortiGate itself.
         | 
     |
| switch_controller_reserved_network
        
        string
         | 
      
        
        Enable reserved network subnet for controlled switches. This is available when the switch controller is enabled.
         | 
     ||
| sys_perf_log_interval
        
        integer
         | 
      
        
        Time in minutes between updates of performance statistics logging. (1 - 15 min).
         | 
     ||
| tcp_halfclose_timer
        
        integer
         | 
      
        
        Number of seconds the FortiGate unit should wait to close a session after one peer has sent a FIN packet but the other has not responded (1 - 86400 sec (1 day)).
         | 
     ||
| tcp_halfopen_timer
        
        integer
         | 
      
        
        Number of seconds the FortiGate unit should wait to close a session after one peer has sent an open session packet but the other has not responded (1 - 86400 sec (1 day)).
         | 
     ||
| tcp_option
        
        string
         | 
      
       
  | 
      
        
        Enable SACK, timestamp and MSS TCP options.
         | 
     |
| tcp_rst_timer
        
        integer
         | 
      
        
        Length of the TCP CLOSE state in seconds (5 - 300 sec).
         | 
     ||
| tcp_timewait_timer
        
        integer
         | 
      
        
        Length of the TCP TIME-WAIT state in seconds.
         | 
     ||
| tftp
        
        string
         | 
      
       
  | 
      
        
        Enable/disable TFTP.
         | 
     |
| timezone
        
        string
         | 
      
       
  | 
      
        
        Number corresponding to your time zone from 00 to 86. Enter set timezone ? to view the list of time zones and the numbers that represent them.
         | 
     |
| tp_mc_skip_policy
        
        string
         | 
      
       
  | 
      
        
        Enable/disable skip policy check and allow multicast through.
         | 
     |
| traffic_priority
        
        string
         | 
      
       
  | 
      
        
        Choose Type of Service (ToS) or Differentiated Services Code Point (DSCP) for traffic prioritization in traffic shaping.
         | 
     |
| traffic_priority_level
        
        string
         | 
      
       
  | 
      
        
        Default system-wide level of priority for traffic prioritization.
         | 
     |
| two_factor_email_expiry
        
        integer
         | 
      
        
        Email-based two-factor authentication session timeout (30 - 300 seconds (5 minutes)).
         | 
     ||
| two_factor_fac_expiry
        
        integer
         | 
      
        
        FortiAuthenticator token authentication session timeout (10 - 3600 seconds (1 hour)).
         | 
     ||
| two_factor_ftk_expiry
        
        integer
         | 
      
        
        FortiToken authentication session timeout (60 - 600 sec (10 minutes)).
         | 
     ||
| two_factor_ftm_expiry
        
        integer
         | 
      
        
        FortiToken Mobile session timeout (1 - 168 hours (7 days)).
         | 
     ||
| two_factor_sms_expiry
        
        integer
         | 
      
        
        SMS-based two-factor authentication session timeout (30 - 300 sec).
         | 
     ||
| udp_idle_timer
        
        integer
         | 
      
        
        UDP connection session timeout. This command can be useful in managing CPU and memory resources (1 - 86400 seconds (1 day)).
         | 
     ||
| url_filter_affinity
        
        string
         | 
      
        
        URL filter CPU affinity.
         | 
     ||
| url_filter_count
        
        integer
         | 
      
        
        URL filter daemon count.
         | 
     ||
| user_device_store_max_devices
        
        integer
         | 
      
        
        Maximum number of devices allowed in user device store.
         | 
     ||
| user_device_store_max_users
        
        integer
         | 
      
        
        Maximum number of users allowed in user device store.
         | 
     ||
| user_server_cert
        
        string
         | 
      
        
        Certificate to use for https user authentication. Source certificate.local.name.
         | 
     ||
| vdom_admin
        
        string
         | 
      
       
  | 
      
        
        Enable/disable support for multiple virtual domains (VDOMs).
         | 
     |
| vdom_mode
        
        string
         | 
      
       
  | 
      
        
        Enable/disable support for split/multiple virtual domains (VDOMs).
         | 
     |
| vip_arp_range
        
        string
         | 
      
       
  | 
      
        
        Controls the number of ARPs that the FortiGate sends for a Virtual IP (VIP) address range.
         | 
     |
| virtual_server_count
        
        integer
         | 
      
        
        Maximum number of virtual server processes to create. The maximum is the number of CPU cores. This is not available on single-core CPUs.
         | 
     ||
| virtual_server_hardware_acceleration
        
        string
         | 
      
       
  | 
      
        
        Enable/disable virtual server hardware acceleration.
         | 
     |
| wad_affinity
        
        string
         | 
      
        
        Affinity setting for wad (hexadecimal value up to 256 bits in the format of xxxxxxxxxxxxxxxx).
         | 
     ||
| wad_csvc_cs_count
        
        integer
         | 
      
        
        Number of concurrent WAD-cache-service object-cache processes.
         | 
     ||
| wad_csvc_db_count
        
        integer
         | 
      
        
        Number of concurrent WAD-cache-service byte-cache processes.
         | 
     ||
| wad_memory_change_granularity
        
        integer
         | 
      
        
        Minimum percentage change in system memory usage detected by the wad daemon prior to adjusting TCP window size for any active connection.
         | 
     ||
| wad_source_affinity
        
        string
         | 
      
       
  | 
      
        
        Enable/disable dispatching traffic to WAD workers based on source affinity.
         | 
     |
| wad_worker_count
        
        integer
         | 
      
        
        Number of explicit proxy WAN optimization daemon (WAD) processes. By default WAN optimization, explicit proxy, and web caching is handled by all of the CPU cores in a FortiGate unit.
         | 
     ||
| wifi_ca_certificate
        
        string
         | 
      
        
        CA certificate that verifies the WiFi certificate. Source certificate.ca.name.
         | 
     ||
| wifi_certificate
        
        string
         | 
      
        
        Certificate to use for WiFi authentication. Source certificate.local.name.
         | 
     ||
| wimax_4g_usb
        
        string
         | 
      
       
  | 
      
        
        Enable/disable comparability with WiMAX 4G USB devices.
         | 
     |
| wireless_controller
        
        string
         | 
      
       
  | 
      
        
        Enable/disable the wireless controller feature to use the FortiGate unit to manage FortiAPs.
         | 
     |
| wireless_controller_port
        
        integer
         | 
      
        
        Port used for the control channel in wireless controller mode (wireless-mode is ac). The data channel port is the control channel port number plus one (1024 - 49150).
         | 
     ||
| vdom
        
        string
         | 
      Default: 
        "root"
         | 
      
        
        Virtual domain, among those defined previously. A vdom is a virtual instance of the FortiGate that can be configured and used as a different unit.
         | 
     |
Notes
Note
- Legacy fortiosapi has been deprecated, httpapi is the preferred way to run playbooks
 
Examples
- hosts: fortigates
  collections:
    - fortinet.fortios
  connection: httpapi
  vars:
   vdom: "root"
   ansible_httpapi_use_ssl: yes
   ansible_httpapi_validate_certs: no
   ansible_httpapi_port: 443
  tasks:
  - name: Configure global attributes.
    fortios_system_global:
      vdom:  "{{ vdom }}"
      system_global:
        admin_concurrent: "enable"
        admin_console_timeout: "4"
        admin_forticloud_sso_login: "enable"
        admin_hsts_max_age: "6"
        admin_https_pki_required: "enable"
        admin_https_redirect: "enable"
        admin_https_ssl_versions: "tlsv1-0"
        admin_lockout_duration: "10"
        admin_lockout_threshold: "11"
        admin_login_max: "12"
        admin_maintainer: "enable"
        admin_port: "14"
        admin_restrict_local: "enable"
        admin_scp: "enable"
        admin_server_cert: "<your_own_value> (source certificate.local.name)"
        admin_sport: "18"
        admin_ssh_grace_time: "19"
        admin_ssh_password: "enable"
        admin_ssh_port: "21"
        admin_ssh_v1: "enable"
        admin_telnet: "enable"
        admin_telnet_port: "24"
        admintimeout: "25"
        alias: "<your_own_value>"
        allow_traffic_redirect: "enable"
        anti_replay: "disable"
        arp_max_entry: "29"
        asymroute: "enable"
        auth_cert: "<your_own_value> (source certificate.local.name)"
        auth_http_port: "32"
        auth_https_port: "33"
        auth_keepalive: "enable"
        auth_session_limit: "block-new"
        auto_auth_extension_device: "enable"
        autorun_log_fsck: "enable"
        av_affinity: "<your_own_value>"
        av_failopen: "pass"
        av_failopen_session: "enable"
        batch_cmdb: "enable"
        block_session_timer: "42"
        br_fdb_max_entry: "43"
        cert_chain_max: "44"
        cfg_revert_timeout: "45"
        cfg_save: "automatic"
        check_protocol_header: "loose"
        check_reset_range: "strict"
        cli_audit_log: "enable"
        cloud_communication: "enable"
        clt_cert_req: "enable"
        compliance_check: "enable"
        compliance_check_time: "<your_own_value>"
        cpu_use_threshold: "54"
        csr_ca_attribute: "enable"
        daily_restart: "enable"
        default_service_source_port: "<your_own_value>"
        device_identification_active_scan_delay: "58"
        device_idle_timeout: "59"
        dh_params: "1024"
        dnsproxy_worker_count: "61"
        dst: "enable"
        edit_vdom_prompt: "enable"
        endpoint_control_fds_access: "enable"
        endpoint_control_portal_port: "65"
        failtime: "66"
        faz_disk_buffer_size: "67"
        fds_statistics: "enable"
        fds_statistics_period: "69"
        fec_port: "70"
        fgd_alert_subscription: "advisory"
        fortiextender: "enable"
        fortiextender_data_port: "73"
        fortiextender_vlan_mode: "enable"
        fortiipam_integration: "enable"
        fortiservice_port: "76"
        fortitoken_cloud: "enable"
        gui_allow_default_hostname: "enable"
        gui_certificates: "enable"
        gui_custom_language: "enable"
        gui_date_format: "yyyy/MM/dd"
        gui_date_time_source: "system"
        gui_device_latitude: "<your_own_value>"
        gui_device_longitude: "<your_own_value>"
        gui_display_hostname: "enable"
        gui_firmware_upgrade_warning: "enable"
        gui_forticare_registration_setup_warning: "enable"
        gui_fortigate_cloud_sandbox: "enable"
        gui_fortisandbox_cloud: "enable"
        gui_ipv6: "enable"
        gui_lines_per_page: "91"
        gui_local_out: "enable"
        gui_replacement_message_groups: "enable"
        gui_rest_api_cache: "enable"
        gui_theme: "green"
        gui_wireless_opensecurity: "enable"
        honor_df: "enable"
        hostname: "myhostname"
        igmp_state_limit: "99"
        interval: "100"
        ip_src_port_range: "<your_own_value>"
        ips_affinity: "<your_own_value>"
        ipsec_asic_offload: "enable"
        ipsec_ha_seqjump_rate: "104"
        ipsec_hmac_offload: "enable"
        ipsec_soft_dec_async: "enable"
        ipv6_accept_dad: "107"
        ipv6_allow_anycast_probe: "enable"
        ipv6_allow_traffic_redirect: "enable"
        irq_time_accounting: "auto"
        language: "english"
        ldapconntimeout: "112"
        lldp_reception: "enable"
        lldp_transmission: "enable"
        log_ssl_connection: "enable"
        log_uuid: "disable"
        log_uuid_address: "enable"
        log_uuid_policy: "enable"
        login_timestamp: "enable"
        long_vdom_name: "enable"
        management_ip: "<your_own_value>"
        management_port: "122"
        management_vdom: "<your_own_value> (source system.vdom.name)"
        max_dlpstat_memory: "124"
        max_route_cache_size: "125"
        mc_ttl_notchange: "enable"
        memory_use_threshold_extreme: "127"
        memory_use_threshold_green: "128"
        memory_use_threshold_red: "129"
        miglog_affinity: "<your_own_value>"
        miglogd_children: "131"
        multi_factor_authentication: "optional"
        multicast_forward: "enable"
        ndp_max_entry: "134"
        per_user_bal: "enable"
        per_user_bwl: "enable"
        policy_auth_concurrent: "137"
        post_login_banner: "disable"
        pre_login_banner: "enable"
        private_data_encryption: "disable"
        proxy_auth_lifetime: "enable"
        proxy_auth_lifetime_timeout: "142"
        proxy_auth_timeout: "143"
        proxy_cipher_hardware_acceleration: "disable"
        proxy_hardware_acceleration: "disable"
        proxy_kxp_hardware_acceleration: "disable"
        proxy_re_authentication_mode: "session"
        proxy_resource_mode: "enable"
        proxy_worker_count: "149"
        radius_port: "150"
        reboot_upon_config_restore: "enable"
        refresh: "152"
        remoteauthtimeout: "153"
        reset_sessionless_tcp: "enable"
        restart_time: "<your_own_value>"
        revision_backup_on_logout: "enable"
        revision_image_auto_backup: "enable"
        scanunit_count: "158"
        security_rating_result_submission: "enable"
        security_rating_run_on_schedule: "enable"
        send_pmtu_icmp: "enable"
        snat_route_change: "enable"
        special_file_23_support: "disable"
        split_port: "<your_own_value>"
        ssd_trim_date: "165"
        ssd_trim_freq: "never"
        ssd_trim_hour: "167"
        ssd_trim_min: "168"
        ssd_trim_weekday: "sunday"
        ssh_cbc_cipher: "enable"
        ssh_hmac_md5: "enable"
        ssh_kex_sha1: "enable"
        ssh_mac_weak: "enable"
        ssl_min_proto_version: "SSLv3"
        ssl_static_key_ciphers: "enable"
        sslvpn_cipher_hardware_acceleration: "enable"
        sslvpn_ems_sn_check: "enable"
        sslvpn_kxp_hardware_acceleration: "enable"
        sslvpn_max_worker_count: "179"
        sslvpn_plugin_version_check: "enable"
        strict_dirty_session_check: "enable"
        strong_crypto: "enable"
        switch_controller: "disable"
        switch_controller_reserved_network: "<your_own_value>"
        sys_perf_log_interval: "185"
        tcp_halfclose_timer: "186"
        tcp_halfopen_timer: "187"
        tcp_option: "enable"
        tcp_rst_timer: "189"
        tcp_timewait_timer: "190"
        tftp: "enable"
        timezone: "01"
        tp_mc_skip_policy: "enable"
        traffic_priority: "tos"
        traffic_priority_level: "low"
        two_factor_email_expiry: "196"
        two_factor_fac_expiry: "197"
        two_factor_ftk_expiry: "198"
        two_factor_ftm_expiry: "199"
        two_factor_sms_expiry: "200"
        udp_idle_timer: "201"
        url_filter_affinity: "<your_own_value>"
        url_filter_count: "203"
        user_device_store_max_devices: "204"
        user_device_store_max_users: "205"
        user_server_cert: "<your_own_value> (source certificate.local.name)"
        vdom_admin: "enable"
        vdom_mode: "no-vdom"
        vip_arp_range: "unlimited"
        virtual_server_count: "210"
        virtual_server_hardware_acceleration: "disable"
        wad_affinity: "<your_own_value>"
        wad_csvc_cs_count: "213"
        wad_csvc_db_count: "214"
        wad_memory_change_granularity: "215"
        wad_source_affinity: "disable"
        wad_worker_count: "217"
        wifi_ca_certificate: "<your_own_value> (source certificate.ca.name)"
        wifi_certificate: "<your_own_value> (source certificate.local.name)"
        wimax_4g_usb: "enable"
        wireless_controller: "enable"
        wireless_controller_port: "222"
  Return Values
Common return values are documented here, the following are the fields unique to this module:
| Key | Returned | Description | 
|---|---|---|
| build
        
        string
         | 
      always | 
        
        Build number of the fortigate image
         Sample:
        
       
        1547
         | 
     
| http_method
        
        string
         | 
      always | 
        
        Last method used to provision the content into FortiGate
         Sample:
        
       
        PUT
         | 
     
| http_status
        
        string
         | 
      always | 
        
        Last result given by FortiGate on last operation applied
         Sample:
        
       
        200
         | 
     
| mkey
        
        string
         | 
      success | 
        
        Master key (id) used in the last call to FortiGate
         Sample:
        
       
        id
         | 
     
| name
        
        string
         | 
      always | 
        
        Name of the table used to fulfill the request
         Sample:
        
       
        urlfilter
         | 
     
| path
        
        string
         | 
      always | 
        
        Path of the table used to fulfill the request
         Sample:
        
       
        webfilter
         | 
     
| revision
        
        string
         | 
      always | 
        
        Internal revision number
         Sample:
        
       
        17.0.2.10658
         | 
     
| serial
        
        string
         | 
      always | 
        
        Serial number of the unit
         Sample:
        
       
        FGVMEVYYQT3AB5352
         | 
     
| status
        
        string
         | 
      always | 
        
        Indication of the operation's result
         Sample:
        
       
        success
         | 
     
| vdom
        
        string
         | 
      always | 
        
        Virtual domain used
         Sample:
        
       
        root
         | 
     
| version
        
        string
         | 
      always | 
        
        Version of the FortiGate
         Sample:
        
       
        v5.6.3
         | 
     
Authors
- Link Zheng (@chillancezen)
 - Jie Xue (@JieX19)
 - Hongbin Lu (@fgtdev-hblu)
 - Frank Shen (@frankshen01)
 - Miguel Angel Munoz (@mamunozgonzalez)
 - Nicolas Thomas (@thomnico)
 
© 2012–2018 Michael DeHaan
© 2018–2021 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
 https://docs.ansible.com/ansible/latest/collections/fortinet/fortios/fortios_system_global_module.html