Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
buddyd
New Contributor

disable netbios via Fortigate 240D?

Greetings Folks,

We have an active-passive cluster of 240D's, current OS is 5.2.8 build 727. Without going into too much detail, we are trying to use the Fortigate to disable NetBIOS over tcp/ip on Windows machines as we have recently seen a large amount of NBstat.Query errors from the IPS. Tech Support has provided documentation to do this, we have it configured but it seems to be ineffective. The command line (see below) will work if run directly on the Windows device but once converted to hex and added to the FG config, nothing. I have been assured by Fortinet tech support that the syntax/config is correct on the Fortigate.

Anyone else ever successfully do this? Has anyone been able to get this to work?

 

Any help/advice is greatly appreciated.

 

Thank you.

Buddy

 

######################################################

 

wmic /interactive:off nicconfig where TcpipNetbiosOptions=0 call SetTcpipNetbios 2

 

# config vdom

# edit #####FW1

# config system dhcp server

# edit 5

#

config system dhcp server
 
    edit 5
        set status enable
        set lease-time 604800
        set mac-acl-default-action assign
        set forticlient-on-net-status enable
        set dns-service specify
        set wifi-ac1 0.0.0.0
        set wifi-ac2 0.0.0.0
        set wifi-ac3 0.0.0.0
        set ntp-service specify
        set domain ''
        set wins-server1 0.0.0.0
        set wins-server2 0.0.0.0
        set default-gateway 192.168.26.1
        set next-server 0.0.0.0
        set netmask 255.255.254.0
        set interface "Wifi Guest"
            config ip-range
                edit 1
                    set start-ip 192.168.26.2
                    set end-ip 192.168.26.200
                next
            end
--More--                  set timezone-option default
        set tftp-server ''
        set filename ''
        set option1 252 '776d6963202f696e7465726163746976653a6f6666206e6963636f6e6669672077686572652054637069704e657462696f734f7074696f6e733d302063616c6c2053657454637069704e657462696f732032'
        set option2 0
        set option3 0
        set option4 0
        set option5 0
        set option6 0
        set server-type regular
        set conflicted-ip-timeout 1800
        set auto-configuration enable
        set vci-match disable
        set dns-server1 8.8.8.8
        set dns-server2 4.2.2.2
        set dns-server3 0.0.0.0
        set ntp-server1 0.0.0.0
        set ntp-server2 0.0.0.0
        set ntp-server3 0.0.0.0
    next
end
 

 

 

12 REPLIES 12
marsmatt

I used code 43 and 010400000002  which is the the Microsoft Vendor Specific code found here (https://msdn.microsoft.com/en-us/library/cc227276.aspx) to disable netbios. I found another article to help the with the conversion so the fortigate would take it. This was done on my Fortigate 800c.

 

It seems to has worked for me, my Surface Pro 2 once I renewed the lease is showing Netbios over TCP/IP as disabled.

 

Hope it helps 

 

 

buddyd

Thanks marsmatt!

Is the 010400000002 the hex to set the option to:

 

set option1 43 010400000002

 

buddyd
New Contributor

Worked perfectly!!!!

 

Thank you very much, marsmatt!!

 

Labels
Top Kudoed Authors