| Description |
This article describes how to secure the shell access of FortiADC. It has changed the method starting from v7.0. |
| Scope |
FortiADC v7.0 or later. |
| Solution |
In the previous release, it is possible to access the shell with root permission through fnsysctl sh.
fnsysctl sh
/#cd var/log
From v7.0 or later, to access the shell for debugging, it is necessary to enable it through CLI. Below is the example to enable the shell access (Run backend-shell commands) with username=ftnt and password=12345:
config system global set shell-access enable set shell-username ftnt set shell-password 12345 set shell-timeout 200 end
Note: The shell-timeout means the shell access will be disabled automatically after 200 minutes.
Now, it is possible to try to access the shell through a console or SSH.
ssh ftnt@172.23.133.148 X11 forwarding request failed on channel 0 -- WARNING! All configurations should be done through CLI shell. -- You now have full access. ~# whoami ftnt
Note: There will be restrictions on reading/writing some files in the system, and permission denial will happen.
The following commands are accepted:
basename, cat, date, df, dmesg, du, dig, ifconfig, netstat, nslookup, ping, sleep, uname, ps, kill, killall, lspci, df, fdisk, mount, free, lsusb, smartctl, ssh, strace. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.