# execute system fortisandbox test-connectivityReturn status should be “Reachable” otherwise a TCP connection on dstport 514 can not be established.
# diag debug application quarantine -1Some errors messages which can be revealed:
# diag debug enable
2019-01-07 10:10:42 quar_remote_connect()-745: oftp_connect failed: connect() failed: Connection refused.-> TCP connection to port 514 on the target IP cannot established
2019-01-17 09:54:47 __check_dev_tasks()-788: req-4392648 is deleted: ttl=122389, xfer_retry=0
2019-01-17 09:54:47 quar_put_job_req()-330: Job 4392648 deleted
2019-01-17 09:54:47 __check_dev_tasks()-788: req-4392654 is deleted: ttl=121628, xfer_retry=0
2019-01-17 09:54:47 quar_put_job_req()-330: Job 4392654 deletec
# diag test application quarantined 2Configurations:
Quarantine daemon state:
QUAR mem: mem_used=1273, mem_limit=255915, threshold=191934
dropped(24825 by quard, 3032 by callers)
pending-jobs=61, tot-mem=655, last_ipc_run=17, check_new_req=1
alloc_job_failed=0, job_wrong_type=0, job_wrong_req_len=0, job_invalid_qfd=0
tgz_create_failed=0, tgz_attach_failed=0, qfd_mmap_failed=0, buf_attached=21
xfer-fas:
ips: total=0, handled=0, accepted=0
quar: total=0, handled=0, accepted=0
archive: total=0, handled=0, accepted=0
analytics: total=0, handled=0, accepted=0, local_dups=0
analytics stats: total=0, handled=0, accepted=0
last_rx=0, last_tx=0, error_rx=0, error_tx=0
num_tasks=0, mem_used=0, xfer_status=0
fortisandbox-fsb1:
ips: total=0, handled=0, accepted=0
quar: total=0, handled=0, accepted=0
archive: total=0, handled=0, accepted=0
analytics: total=212704, handled=210956, accepted=428, local_dups=1748
analytics stats: total=3850, handled=3850, accepted=4
last_rx=270494671, last_tx=270494671, error_rx=20, error_tx=0
num_tasks=12, mem_used=47, xfer_status=0
buf_len=0, buf_pos=0
fortisandbox-fsb2:
ips: total=0, handled=0, accepted=0
quar: total=0, handled=0, accepted=0
archive: total=0, handled=0, accepted=0
analytics: total=212436, handled=210599, accepted=422, local_dups=1837
analytics stats: total=3718, handled=3718, accepted=1
last_rx=270494671, last_tx=270494671, error_rx=5, error_tx=0
num_tasks=9, mem_used=105, xfer_status=0
buf_len=0, buf_pos=0
fortisandbox-fsb3:
ips: total=0, handled=0, accepted=0
quar: total=0, handled=0, accepted=0
archive: total=0, handled=0, accepted=0
analytics: total=212328, handled=210456, accepted=422, local_dups=1872
analytics stats: total=3784, handled=3784, accepted=3
last_rx=270494975, last_tx=270494975, error_rx=6, error_tx=0
num_tasks=9, mem_used=8, xfer_status=0
buf_len=0, buf_pos=0
fortisandbox-fsb4:
ips: total=0, handled=0, accepted=0
quar: total=0, handled=0, accepted=0
archive: total=0, handled=0, accepted=0
analytics: total=212019, handled=210221, accepted=436, local_dups=1798
analytics stats: total=3792, handled=3792, accepted=3
last_rx=270494888, last_tx=270494888, error_rx=15, error_tx=0
num_tasks=8, mem_used=164, xfer_status=0
buf_len=0, buf_pos=0
fortisandbox-fsb5:
ips: total=0, handled=0, accepted=0
quar: total=0, handled=0, accepted=0
archive: total=0, handled=0, accepted=0
analytics: total=211689, handled=209945, accepted=409, local_dups=1744
analytics stats: total=3679, handled=3679, accepted=0
last_rx=270495071, last_tx=270495071, error_rx=1, error_tx=0
num_tasks=12, mem_used=197, xfer_status=0
buf_len=0, buf_pos=0
fortisandbox-fsb6:
ips: total=0, handled=0, accepted=0
quar: total=0, handled=0, accepted=0
archive: total=0, handled=0, accepted=0
analytics: total=211954, handled=209958, accepted=364, local_dups=1996
analytics stats: total=3716, handled=3716, accepted=0
last_rx=270494975, last_tx=270494975, error_rx=25, error_tx=0
num_tasks=11, mem_used=480, xfer_status=0
buf_len=0, buf_pos=0
global-faz:
ips: total=0, handled=0, accepted=0
quar: total=0, handled=0, accepted=0
archive: total=0, handled=0, accepted=0
analytics: total=0, handled=0, accepted=0, local_dups=0
analytics stats: total=0, handled=0, accepted=0
last_rx=0, last_tx=0, error_rx=0, error_tx=0
num_tasks=0, mem_used=0, xfer_status=0
# config antivirus profile-> This sends everything to the FortiSandbox, so can impact the performance potentially
edit <myprofile>
set ftgd-analytics everything
set analytics-max-upload 10-> The file size configured here can also impact the performance. Using default value is recommended
set analytics-wl-filetype 1-> This can limit some file type extensions to send only some files extension (.js, .exe) to the FortiSandbox
# showTo check HA:
# hc-settings -l2) Authorized devices
# hc-status –l
# tcpdump -c 1000 port 514 <--------- This will capture 1000 packets4) Process and CPU
# diagnose-sys-top5) CPU, Memory and scanning statistics
# diagnose-syst-perf6) Queue
# pending-jobs show all all
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.