FortiManager-7 6 1-Administration - Guide
FortiManager-7 6 1-Administration - Guide
FortiManager-7 6 1-Administration - Guide
FortiManager 7.6.1
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTIGUARD LABS
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
Change Log 14
Setting up FortiManager 15
Connecting to the GUI 15
FortiManager Setup wizard 16
Activating VM licenses 22
Security considerations 24
Restricting GUI access by trusted host 24
Trusted platform module support 24
Self-encrypting drives 26
Other security considerations 29
GUI overview 29
Panes 32
Color themes 33
Switching between ADOMs 33
Using the right-click menu 34
Using the CLI console 34
Avatars 35
Using the Process Monitor 35
Showing and hiding passwords 36
Google Map integration 37
FortiAnalyzer Features 37
Enable or disable FortiAnalyzer features 38
Initial setup 39
Restarting and shutting down 39
FortiManager Key Concepts 40
Communication through protocols 41
FortiGuard 42
Device Manager 42
FortiAnalyzer features 42
Configuration through Device Manager 43
Direct device database editing 43
Indirect device database editing 43
Model devices 44
Zero-touch and low-touch provisioning 44
ADOMs and devices 45
Global ADOM layer 46
ADOM and policy layer 46
Device Manager layer 46
Operations 46
Install device settings only 47
Quick install (device db) 47
Install policy package 47
Re-install policy 48
Import configuration 48
Change Log
This chapter describes how to connect to the GUI for FortiManager and configure FortiManager. It also provides an
overview of adding devices to FortiManager as well as configuring and monitoring managed device. Some security
considerations are included as well as an introduction to the GUI and instructions for restarting and shutting down
FortiManager units.
After you configure IP addresses and administrator accounts for the FortiManager unit, you
should log in again using the new IP address and your new administrator account.
The FortiManager unit can be configured and managed using the GUI or the CLI. This section will step you through
connecting to the unit via the GUI.
If you are connecting to the GUI for a FortiManager virtual machine (VM) for the first time, you
are required to activate a license. See Activating VM licenses on page 22.
FortiCare step cannot be skipped and must be completed before you can access the FortiManager appliance or
VM.
6. If ADOMs are enabled, the Select an ADOM pane is displayed. Click an ADOM to select it.
The FortiManager home page is displayed.
7. Click a tile to go to that pane. For example, click the Device Manager tile to go to the Device Manager pane.
See also GUI overview on page 29.
If the network interfaces have been configured differently during installation, the URL
and/or permitted administrative access protocols (such as HTTPS) may no longer be in
their default state.
For information on enabling administrative access protocols and configuring IP addresses, see Configuring network
interfaces on page 880.
If the URL is correct and you still cannot access the GUI, you may also need to configure static
routes. For details, see Static routes on page 883.
When the system is busy during a database upgrade or rebuild, you will receive a message in
the GUI log-in pane. The message will include the estimated completion time.
After logging in for the first time, you should create an administrator account for yourself and assign the Super_User
profile to it. Then you should log into the FortiManager unit by using the new administrator account. See Managing
administrator accounts on page 950 for information.
When you log in to FortiManager, the FortiManager Setup wizard is displayed to help you set up FortiManager by
performing the following actions:
l Registering with FortiCare and enabling FortiCare single sign-on
l Specifying the hostname
l Changing your password
l Upgrading firmware (when applicable)
You can choose whether to complete the wizard now or later.
The FortiManager Setup wizard requires that you complete the Register with FortiCare step
before you can access the FortiManager appliance or VM.
When actions are complete, a green checkmark displays beside them in the wizard, and the wizard no longer displays
after you log in to FortiManager.
1. Log in to FortiManager.
The FortiManager Setup dialog box is displayed.
2. Click Begin to start the setup process now.
Alternately, click Later to postpone the setup tasks. Some tasks cannot be postponed.
3. When prompted, register with FortiCare and enable FortiCare single sign-on. You must complete the Register with
FortiCare step before you can access the FortiManager appliance or VM.
When using FortiManager in an air-gapped environment, you must manually import your
Entitlement File. See Licensing in an air-gap environment on page 801.
a. Automatic System Backup is enabled by default. Configure the following to specify your backup settings, or
disable automatic backups.
l In Backup Configuration File to, configure where the backup file will be sent.
l In Backup Frequency, select when the day(s) and time for the backup to be performed.
l In Encryption, set an encryption password.
b. Optionally, enable ADOM Revision and configure the following:
l In Delete Method, select By Days or By Revisions.
l In Max, specify the maximum number of days or revisions to keep. The default value for By Days is 90 and
By Revisions is 120.
10. Complete the setup by clicking Finish.
Activating VM licenses
If you are logging in to a FortiManager VM for the first time by using the GUI, you are required to activate a purchased
license or activate a trial license for the VM.
1. On the management computer, start a supported web browser and browse to https://<ip address> for the
FortiManager VM.
The login dialog box is displayed.
Action Description
Free Trial If a valid license is not associated with the account, you can start a free trial license.
1. Select Free Trial, and click Login with FortiCloud.
2. Use your FortiCloud account credentials to log in, or create a new account.
FortiManager connects to FortiCloud to get the trial license. The system will restart to
apply the trial license.
3. Read and accept the license agreement.
For more information, see the FortiManager VM Trial License Guide.
Upload License 1. Click Browse to upload the license file, or drag it onto the field.
2. Click Upload. After the license file is uploaded, the system will restart to verify it. This
may take a few moments.
Security considerations
You can take steps to prevent unauthorized access and restrict access to the GUI. This section includes the following
information:
l Restricting GUI access by trusted host on page 24
l Trusted platform module support on page 24
l Self-encrypting drives on page 26
l Other security considerations on page 29
To prevent unauthorized access to the GUI you can configure administrator accounts with trusted hosts. With trusted
hosts configured, the administrator user can only log into the GUI when working on a computer with the trusted host as
defined in the administrator account. You can configure up to ten trusted hosts per administrator account. See
Administrators on page 949 for more details.
On supported FortiManager hardware devices, the Trusted Platform Module (TPM) can be used to protect your
password and key against malicious software and phishing attacks. The dedicated module hardens the FortiManager by
generating, storing, and authenticating cryptographic keys.
For more information about which models feature TPM support, see the FortiManager Data Sheet.
By default, the TPM is disabled. To enable it, you must enable private-data-encryption and set the 32
hexadecimal digit master-encryption-password. This encrypts sensitive data on the FortiManager using AES128-CBC.
With the password, TPM generates a 2048-bit primary key to secure the master-encryption-password through RSA-
2048 encryption. The master-encryption-password protects the data. The primary key protects the master-encryption-
password.
The key is never displayed in the configuration file or the system CLI, thereby obscuring the information and leaving the
encrypted information in the TPM.
The TPM module does not encrypt the disk drive of eligible FortiManager.
The primary key binds the encrypted configuration file to a specific FortiManager unit and never leaves the TPM. When
backing up the configuration, the TPM uses the key to encrypt the master-encryption-password in the configuration file.
When restoring a configuration that includes a TPM protected master-encryption-password:
l If TPM is disabled, then the configuration cannot be restored.
l If TPM is enabled but has a different master-encryption-password than the configuration file, then the configuration
cannot be restored.
l If TPM is enabled and the master-encryption-password is the same in the configuration file, then the configuration
can be restored.
For information on backing up and restoring the configuration, see Backing up the system on page 65 and Restoring the
configuration on page 68.
The master-encryption-password is also required when migrating the configuration, regardless if TPM is available on the
other FortiManager model. For more information, see Migrating the configuration on page 69.
Passwords and keys that can be encrypted by the master-encryption-key include:
l Admin password
l Alert email user's password
l BGP and other routing related configurations
l External resource
l FortiGuard proxy password
l FortiToken/FortiToken Mobile’s seed
l HA password
l IPsec pre-shared key
l Link Monitor, server side password
l Local certificate's private key
l Local, LDAP. RADIUS, FSSO, and other user category related passwords
l Modem/PPPoE
l NST password
l NTP Password
l SDN connector, server side password
l SNMP
l Wireless Security related password
In HA configurations, each cluster member must use the same master-encryption-key so that
the HA cluster can form and its members can synchronize their configurations.
The output in the CLI includes ### TPM info, which displays if the TPM is detected (enabled), not detected (disabled),
or not available.
Self-encrypting drives
Auto-lock feature
To protect the disk's contents, assign the SED encryption key after RAID has been setup. The disk's contents are
protected if plugged into a system unless the encryption key is known and the system supports a similar RAID controller.
1. After RAID setup, enter the following command in the FortiManager CLI:
diagnose system disk sed {sed-key}
The key requires 8-32 characters, and it must include upper case, lower case, number, and special character
(excluding '\).
If a foreign SED disk is installed, this disk will be unavailable due to auto-lock feature.
Cryptographic erase
To quickly and securely dispose of disks, you can format the drives from the CLI and then use the auto-lock feature.
Examples
If there are non-SED disks, they are displayed in the output. For example:
diagnose system raid status
Storcli RAID:
RAID Level: Raid-50
RAID Status: OK
RAID Size: 52156GB
File System: ext4 51337GB
SED Encryption: Disabled
Groups: 2
Variable Description
sed-key SED encryption key. 8-32 chars, must include upper case, lower case, number
and special chars (exclude '\).
You can replace disks that supports SED feature, regardless of brand, however it's optimal to use the same specification
of hard drive in the existing array. The new disk will be automatically rebuilt by the system and it will have the same SED
key used by the existing system. This will be transparent for the user.
If an SED-enabled RAID failure occurs, formatting the drives will effectively clear the SED key. Thus, the user can assign
an SED key. For example, see below.
FMG-410G # diagnose system raid status
Storcli RAID:
RAID Level: Raid-50
RAID Status: Failed
RAID Size: 22353GB
File System: ext4 22001GB
SED Encryption: Enabled
Groups: 2
Resetting ...
In situations where SED-enabled disks need to be moved (re-homed) to a new physical chassis, the process will require
additional steps. See below.
1. On the target unit, install the same build as the source unit. Install SED capable drives and setup the RAID similar to
that of the source unit, and then enable SED using the same key as that of the source unit.
2. Shutdown both units and remove the drives from their respective chassis.
3. Move the source drives and install them to the target chassis.
Other security consideration for restricting access to the FortiManager GUI include the following:
l Configure administrator accounts using a complex passphrase for local accounts
l Configure administrator accounts using RADIUS, LDAP, TACACS+, or PKI
l Configure the administrator profile to only allow read/write permission as required and restrict access using read-
only or no permission to settings which are not applicable to that administrator
l Configure the administrator account to only allow access to specific ADOMs as required
l Configure the administrator account to only allow access to specific policy packages as required.
When setting up FortiManager for the first time or after a factory reset, the password cannot be
left blank. You are required to set a password when the admin user tries to log in to
FortiManager from GUI or CLI for the first time. This is applicable to a hardware device as well
as a VM. This is to ensure that administrators do not forget to set a password when setting up
FortiManager for the first time.
After the initial setup, you can set a blank password from System Settings > Administrators.
GUI overview
When you log into the FortiManager GUI, the Dashboard pane is displayed. The Dashboard contains widgets that
provide performance and status information. For more information about the Dashboard, see Dashboard on page 56
Use the navigation menu on the left to open another pane. The available panes vary depending on the privileges of the
current user.
Device Manager Add and manage devices and VDOMs. Create and assign scripts and
provisioning templates. You can also access the SD-WAN monitor and
VPN monitor. See Device Manager on page 81.
Policy & Objects Configure policy packages and objects. See Policy & Objects on page 330.
VPN Manager Configure and manage VPN connections. You can create VPN topologies and
managed/external gateways. See VPN Manager on page 628.
AP Manager Configure and manage FortiAP access points. For more information, see AP
Manager on page 558.
FortiSwitch Manager Configure and manage FortiSwitch devices. See FortiSwitch Manager on page
820.
Extender Manager Configure and manage FortiExtenders. See Extender Manager on page 869.
Log View View logs for managed devices. You can display, download, import, and delete
logs on this page. You can also define custom views and create log groups.
This pane is only available when FortiAnalyzer features are enabled.
Fabric View Configure fabric connectors and view Security Fabric Ratings. See Fabric View
on page 673.
Incidents & Events Configure and view events for logging devices.
This pane is only available when FortiAnalyzer features are enabled.
Reports Generate reports. You can also configure report templates, schedules, and output
profiles, and manage charts and datasets.
FortiGuard Manage communication between devices and the FortiManager using the
FortiGuard protocol. See FortiGuard on page 776.
Management Extensions Enable and use management extension applications that are released and signed
by Fortinet. See Management Extensions on page 1053.
System Settings Configure system settings such as network interfaces, administrators, system
time, server settings, and others. You can also perform maintenance and
firmware operations. See System Settings on page 878.
ADOM If ADOMs are enabled, the required ADOM can be selected from the dropdown
list.
If enabled, ADOMs can also be locked or unlocked.
The ADOMs available from the ADOM menu will vary depending on the privileges
of the current user.
CLI Console Open the CLI console to configure the FortiManager unit using CLI commands
directly from the GUI, without making a separate SSH, or local console
connection to access the CLI.
For more information, see Using the CLI console on page 34.
Note: The CLI Console requires that your web browser support JavaScript.
Online Help Click to open the FortiManager online help dropdown which contains the following
options:
FortiCare Debug Runs the execute tac report CLI command and
Report downloads a local copy of the report.
Notifications Click to display a list of notifications. Select a notification from the list to take
action on the issue.
FortiAI assistant Open the FortiAI Assistant pane. This feature requires a license.
Panes
In general, each pane four primary parts: the banner, toolbar, tree menu, and content pane.
Content pane Contains widgets, lists, configuration options, or other information, depending on
the pane, menu, or options that are selected. Most management tasks are
handled in the content pane.
Color themes
You can choose a color theme for the FortiManager GUI. For example, you can choose a color or image such as jade,
summer, or autumn.
By default, all users are assigned the global color theme. To change the global color theme, see Global administration
settings on page 1023.
1. In the banner, open the dropdown for your account and click Change Profile.
The Change Profile dialog displays.
2. In the Theme Mode field, select Use Own Theme.
3. Enable the High Contrast Theme or select a color them from the list.
When ADOMs are enabled, you can move between ADOMs by selecting an ADOM from the ADOM button in the banner.
You are also prompted to select an ADOM when you log in.
ADOM access is controlled by administrator accounts and the profile assigned to the administrator account. Depending
on your account privileges, you might not have access to all ADOMs. See Managing administrator accounts on page 950
for more information.
To switch ADOMs:
Options are sometimes available using the right-click menu. Right-click an item in the content pane to display the menu
of available options. This menu often includes actions available in the toolbar, as well as some unique actions depending
on the pane and its content.
In the following example on the Device Manager pane, you can right-click a device in the content pane, and select many
options, such as Quick Install (Device DB), Install Wizard, Edit, Run Script, and more.
The CLI console is a terminal window that enables you to configure the FortiManager unit using CLI commands directly
from the GUI, without making a separate SSH, or local console connection to access the CLI.
When using the CLI console, you are logged in with the same administrator account that you used to access the GUI.
You can enter commands by typing them, or you can copy and paste commands into or out of the console.
For more information about using the CLI, see the FortiManager CLI Reference on the Fortinet Documents Library.
The CLI Console requires that your web browser support JavaScript.
To open the CLI console in the GUI, click the CLI Console icon (>_) in the banner.
You can perform the following actions from the top of the CLI Console:
Option Description
Record CLI Commands Begin recording the next commands entered in the console; click again to finish
recording. The commands and outputs from the recording are copied to the
clipboard.
Reconnect Console Reconnect to the console, clearing the previous text in the console and returning
to the initial prompt.
Run CLI Script Drag and drop or select a script file to run in the CLI.
CLI of Current Page (if Go to the commands for the current page of the GUI, if they are available.
available)
Full screen Expand the console to full screen within the GUI.
Avatars
When FortiClient sends logs to FortiManager with FortiAnalyzer features enabled, an avatar for each user can be
displayed in the Source column in the FortiView and Log View panes. FortiManager can display an avatar when
FortiClient is managed by FortiGate or FortiClient EMS with logging to FortiManager enabled.
l When FortiClient Telemetry connects to FortiGate, FortiClient sends logs (including avatars) to FortiGate, and the
logs display in FortiManager under the FortiGate device as a sub-type of security.
The avatar is synchronized from FortiGate to FortiManager by using the FortiOS REST API.
l When FortiClient Telemetry connects to FortiClient EMS, FortiClient sends logs (including avatars) directly to
FortiManager, and logs display in a FortiClient ADOM.
If FortiManager cannot find the defined picture, a generic, gray avatar is displayed.
You can also optionally define an avatar for FortiManager administrators. See
Creating administrators on page 952.
The Process Monitor displays running processes with their CPU and memory usage as well as their disk I/O levels.
Administrators can sort, filter, and terminate processes within the Process Monitor pane.
In some fields, you can show and hide information by clicking the toggle icon.
For example, see the image of the Change Password dialog below. In this example, the Old Password is toggled to show
the password. The other fields are toggled to hide the password.
FortiManager integrates with Google Maps to provide map data for features including but not limited to the following:
l AP Manager's WiFi maps
l VPN Manager's IPsec VPN map view
l SD-WAN Monitors
l Device location in the Device Manager map view
Google Maps integration requires the following access. If this access is not available, map data will not be visible on
FortiManager.
l FortiManager must have access to https://mapserver.fortinet.com to register and retrieve the Google
Map license.
l The administrator PC must have an internet connection and be able to access to the following sites in order for the
browser to be able to download and display the Google Maps and overlay:
l https://maps.google.com
l https://maps.googleapis.com
l https://fonts.googleapis.com
l https://mapserver.fortinet.com
FortiAnalyzer Features
FortiAnalyzer features can be used to view and analyze logs from devices with logging enabled that are managed by the
FortiManager.
When FortiAnalyzer features are enabled by using the System Settings module, logs are stored on FortiManager and
FortiAnalyzer features are configured on the FortiManager device. See Enable or disable FortiAnalyzer features on page
38.
When a FortiAnalyzer is added to the FortiManager, logs are stored on FortiAnalyzer and log storage settings are
configured on the FortiAnalyzer device. Managed devices with logging enabled send logs to the FortiAnalyzer. The
FortiManager remotely accesses logs on the FortiAnalyzer unit and displays the information. See Add FortiAnalyzer or
FortiAnalyzer BigData on page 122.
When FortiAnalyzer features are enabled on FortiManager, the following modules are available:
FortiView Enables FortiView and additional Monitors, including monitoring network traffic,
WiFi security, and system performance. See the FortiAnalyzer Administration
Guide.
Log View View log messages from managed devices with logging enabled. You can view
the traffic log, event log, or security log information. See the FortiAnalyzer
Administration Guide.
Incidents & Events View events from logs that you want to monitor. You can specify what log
messages to display as events by configuring event handlers. See the
FortiAnalyzer Administration Guide.
Reports Generate reports of data from logs. See the FortiAnalyzer Administration Guide.
When FortiAnalyzer features are enabled, the following options are available on the System Settings module:
Dashboard widgets The following widgets can be added to the dashboard: Log Receive Monitor,
Insert Rate vs Receive Rate, Log Insert Lag Time, Receive Rate vs Forwarding
Rate, and Disk I/O.
The License Information widget will include a Logging section. See Dashboard on
page 56.
Logging Topology View the logging topology. See Logging Topology on page 878.
Storage Info View and configure log storage policies. See the FortiAnalyzer Administration
Guide.
This pane is only available when ADOMs are enabled.
Device Log Settings Configure device log file size, log rolling, and scheduled uploads to a server. See
Device logs on page 943.
File Management Configure the automatic deletion of device log files, quarantined files, reports, and
content archive files after a set period of time. See File Management on page 947.
Various other settings and information will be included on the FortiManager when FortiAnalyzer features are enabled.
If FortiAnalyzer features are enabled, you cannot add FortiAnalyzer to FortiManager. Nor can you enable FortiManager
HA.
When FortiAnalyzer is added to FortiManager, FortiAnalyzer features are automatically enabled to support the managed
FortiAnalyzer unit, and cannot be disabled.
Log forwarding, log fetching, and log aggregation are not supported on FortiManager when
FortiAnalyzer features are enabled.
See Add FortiAnalyzer or FortiAnalyzer BigData on page 122 for more information.
1. Go to Dashboard.
2. In the System Information widget, click the FortiAnalyzer Features toggle switch.
The FortiManager will reboot to apply the change.
Initial setup
This topic provides an overview of the tasks that you need to do to get your FortiManager up and running.
To set up FortiManager:
Always use the operation options in the GUI or the CLI commands to reboot and shut down the FortiManager system to
avoid potential configuration problems.
See Restart, shut down, or reset FortiManager on page 79 in System Settings on page 878.
FortiManager is an integrated platform for the centralized management of products in a Fortinet security infrastructure.
FortiManager provides centralized policy-based provisioning and configuration management for FortiGate, FortiWiFi,
FortiAP, and other devices. For a complete list of supported devices, see the FortiManager 7.6.1 Release Notes.
FortiManager recognizes Security Fabric groups of devices and lets you display the Security Fabric topology as well as
view Security Fabric Ratings.
To reduce network delays and to minimize external Internet usage, a FortiManager installation can also act as an on-site
FortiGuard Distribution Server (FDS) for your managed devices and FortiClient agents to download updates to their virus
and attack signatures, and to use the built-in web filtering and email filter services.
You can also optionally enable the FortiAnalyzer features, which enables you to analyze logs for managed devices and
generate reports.
FortiManager scales to manage 10000 or more devices and virtual domains (VDOMs) from a single FortiManager
interface. It is primarily designed for medium to large enterprises and managed security service providers.
Using a FortiManager device as part of an organization’s Fortinet security infrastructure can help minimize both initial
deployment costs and ongoing operating expenses. It allows fast device provisioning, detailed revision tracking, and
thorough auditing.
Inside FortiManager, an object database is shared by several modules, such as Policies & Objects, AP Manager, VPN
Manager, Extender Manager, and FortiSwitch Manager, to provide policy configuration information to FortiGates. Other
modules, such as FortiGuard, Device Manager, and FortiAnalyzer features, use protocols to communicate directly from
FortiManager to FortiGates. This chapter describes how these components in FortiManager work together to manage
FortiGates.
FortiManager contains several modules that are used to configure managed devices. Some modules use their own
protocol to communicate directly with managed devices, and other modules provide information to the Device Manager
module for installation to managed devices.
The following modules use protocols to directly communicate with managed devices and provide configuration
information:
l FortiGuard
l FortiAnalyzer features
l Device Manager
For information about modules that provide information to Device Manager, see Configuration through Device Manager
on page 43.
FortiGuard
FortiManager can act as a local FortiGuard server to provide FortiGuard services, such as AV engines and signatures,
IPS engines and signatures, web filtering lookups, and firmware upgrades to your FortiGates.
FortiManager provides the resources by communicating with the FortiGuard Distribution Network (FDN) on a regular
basis to keep the local services up to date, and providing the information to managed devices through the FortiGuard
module. The FortiGuard module communicates with devices by using the FortiGuard protocol.
The FortiGuard module is often used to keep FortiGates up to date when FortiGates are not permitted to access the
Internet.
For more information, see FortiGuard on page 776.
Device Manager
The Device Manager module contains all devices that are managed by FortiManager. You can create new device
groups, provision and add devices, and install policy packages and device settings. The Device Manager module
communicates with managed devices by using the FortiGate-FortiManager (FGFM) protocol. See Device Manager on
page 81.
FortiAnalyzer features
When FortiAnalyzer features are enabled, the following additional modules become available in FortiManager:
l FortiView
l Log View
l Incidents & Events
l Reports
FortiAnalyzer features include tools for viewing and analyzing log messages, and the feature communicates with
managed devices by using the logging protocol.
For details on each of these modules, see the FortiAnalyzer Administration Guide.
The Device Manager module contains a database for each managed device. Each database contains the entire
configuration of the managed device.
The database is created when the device is added to FortiManager, an FGFM connection is established between the
device and FortiManager, and FortiManager retrieves the configuration from the managed device.
You can edit the database by using the following methods:
l Directly in Device Manager
l Indirectly by using the central management modules to provide changes to Device Manager
This section contains the following topics:
l Direct device database editing on page 43
l Indirect device database editing on page 43
l Model devices on page 44
l Zero-touch and low-touch provisioning on page 44
In Device Manager, you can directly edit the device database. However the changes apply only to the device.
Some device settings can only be changed by directly editing the device database. For example, you can only change
the hostname or the IP address for an interface by editing the device database in Device Manager.
After you change the settings, you must install the changes to the device. When you install the changes, the
configuration in the FortiManager device database is compared to the configuration on the managed device, and the
difference is installed to or removed from the device.
When you use the following central management modules to configure managed devices, the changes affect Device
Manager, and you are indirectly editing the device database:
l Policy & Objects
l AP Manager
l VPN Manager
l FortiSwitch Manager
l Extender Manager
In the central management modules, you can make changes and apply the changes to one or more managed devices.
For example, you can use AP Manager to create settings, and then apply the settings to every FortiGate that manages
an AP.
Each of the central management modules utilizes the Object Database to access shared objects, such as Address
Objects, Security Profiles, and Services.
Any configuration done by using one of the central management modules generates settings that are then "pushed" to
the device database on the next policy package install. This push overwrites the existing configuration in the device's
database for that setting.
After the device database has been updated by the policy package push, an install of the device database takes place in
the same way as if you edited directly.
Model devices
Model devices are used to store configuration for a device that is not yet online and not yet connected to the network.
Once the device is online, connected to the network, and connected to FortiManager, the following process begins:
l FortiManager adds the unregistered FortiGate device.
l The FortiGate device is authorized for management by FortiManager.
l FortiManager checks the version of the Internet Service database on the FortiGate.
If the Internet Service database is lower on the FortiGate, FortiManager requests FortiGate to update its objects.
l After the Internet Service database version is updated on the FortiGate device, FortiManager installs the
configuration to the FortiGate.
If the Internet Service database version is not updated after three minutes, FortiManager still installs the
configuration to the FortiGate.
See also Adding offline model devices on page 96.
FortiManager supports zero-touch provisioning (ZTP) and low-touch provisioning (LTP) of FortiGate devices using
model devices.
A model device is configured for a FortiGate device before it is added to FortiManager. The FortiManager administrator
can apply device configurations and policies to the model device. When the real FortiGate comes online and is
connected to FortiManager, the auto-link process begins, and the device settings and policies are installed on the real
device. Once auto-linking is complete, the real device is configured and connected to FortiManager for central
management, replacing the model device.
How the FortiGate devices discover and connect to the FortiManager determines if it is zero-touch or low-touch
provisioning.
l Zero-touch provisioning: Preconfiguration of FortiGate is not required. FortiGate boots up, obtains connectivity
to the WAN or Internet, and connects to the FortiManager for auto-linking and central management. Example
methods for ZTP include:
l FortiCloud/FortiDeploy: FortiGate boots up and obtains its internet connectivity from a DHCP server,
automatically connects to FortiCloud, and obtains the location of the FortiManager from FortiCloud.
l DHCP Option 240/241: FortiGate boots up and obtains its WAN connectivity from a DHCP server, and the
same DHCP server provides the location of FortiManager using DHCP Option 240/241.
l USB boot method: FortiGate obtains its initial configuration from a USB stick.
l Low-touch provisioning: Some preconfiguration on FortiGate is required before it can discover the FortiManager.
For example, configuring network settings on FortiGate and providing the location of FortiManager.
For ZTP methods where DHCP is used to establish the FortiGate’s network connection,
only FortiGate models that have ports labeled as 'WAN' have the interface IP addressing
mode set to DHCP client and provide the ability to connect with WAN upon boot from
factory-default configuration.
Models that have no explicit labeling of a "WAN" port require manual intervention to enable
DHCP Client mode on the port chosen for WAN connectivity.
Policy packages can include header policies and footer policies. You can create header and footer policies by using the
global ADOM. The global ADOM allows you to create header and footer policies once, and then assign the header and
footer policies to multiple policy packages in one or more ADOMs.
For example, a header policy might block all network traffic to a specific country, and a footer policy might start antivirus
software. Although you have unique policy packages in each ADOM, you might want to assign the same header and
footer policies to all policy packages in all ADOMs.
Following is a visual summary of the process and a description of what occurs in the global ADOM layer, ADOM layer,
and device manager layer.
The ADOM layer is where FortiManager manages individual devices, VDOMs, or groups of devices. It is inside this layer
where policy packages and folders are created, managed, and installed on managed devices. Multiple policy packages
and folders can be created here. The ADOM layer contains one common object database per ADOM, which contains
information such as addresses, services, antivirus and attack definitions, and web filtering and email filter.
The Device Manager layer records information on devices that are centrally managed by FortiManager, such as the
name and type of device, the specific device model, its IP address, the current firmware installed on the unit, the device’s
revision history, and its real-time status.
Operations
This section describes how the different FortiManager operations use the device layer and the ADOM and policy layer to
configure FortiGates.
The Install Wizard includes access to the Install Device Settings (only) operation. The Install Device Settings (only)
operation pushes the device configuration from FortiManager device layer to a FortiGate device.
Before you initiate the installation, you can access an installation preview. If you do not want to
install the changes, you can cancel the operation without modifying anything.
FortiManager compares the configuration information that it has with the current configuration on the FortiGate. It then
pushes the necessary configuration changes to the FortiGate to ensure that the FortiGate is synchronized with
FortiManager.
The install operation can include only device settings or device settings and policy packages. When policy packages are
included, the policies defined in the policy package are inserted into the device database, where they overwrite any
related settings existing in the device database.
For more information, see Install device settings only on page 163.
The Quick Install (Device DB) operation pushes device configuration from the FortiManager device layer to a FortiGate
device. This operation does not have an installation preview, and you cannot cancel this operation.
The quick install operation is useful for zero-touch provisioning or when you are familiar with the changes you are
applying.
If you do not have a policy package assigned to your FortiGate(s), the best way to install a policy package for the first
time is by using the Install Wizard and the Install Policy Package & Device Settings operation. This operation takes
ADOM and policy layer information (from the Policies & Objects module) and installs the settings to the device layer, and
the difference from the device layer is installed to the FortiGate(s).
You can access an installation preview for this operation. If you do not want to install the changes, you can cancel the
operation without modifying anything.
See Installing policy packages and device settings on page 161.
Re-install policy
If you have already a policy package assigned to your FortiGate(s), you can use the Re-install Policy operation. This
operation takes ADOM and policy layer information (from the Policies & Objects module) and installs it to the device
layer and to FortiGate(s). You can access an installation preview for this operation. If you do not want to install the
changes, you can cancel the operation without modifying anything.
For more information, see Reinstall a policy package on page 341.
Import configuration
The Import Configuration operation copies policies and policy-related objects from the device layer into the ADOM and
policy later, creating a policy package that reflects the current configuration of the FortiGate device. The import operation
does not modify the FortiGate configuration.
The imported objects go into the shared object database.
If you are importing an object that already exists in the object database (same object type and name), you have the
following choices:
1. Update the definition for the object in the database.
When you update the definition for an object in the database, it affects all FortiGates that reference the object. All
FortiGates that reference the object go out of sync, and the updated object is considered a pending change. This
action is equivalent to manually updating an object.
2. Keep the definition for the object that is already in the database.
When you keep the definition for an object in the database, all FortiGates that reference the object remain
synchronized. The next time that you install to the FortiGate, the definition for the object from the FortiManager
database is pushed to the device.
After you import policies and objects from FortiGate to FortiManager, you might see some
objects deleted the first time that you install a policy package to the FortiGate. The objects are
on FortiGate because the objects are unused. FortiManager does not need to keep unused
objects. You can always install the objects back to the FortiGate by adding them to a policy
rule.
For more information, see Importing policies and objects on page 157.
Retrieve configuration
The retrieve operation retrieves the FortiGate configuration and stores it in the device database on FortiManager.
The policy package is not updated when you retrieve a FortiGate configuration.
If you make a change locally on the FortiGate, and then retrieve the FortiGate configuration,
the change is stored in the database. However, if a policy also includes the same setting, the
setting from the policy overwrites the setting on the FortiGate the next time that the policy
package is installed.
For more information, see Viewing configuration revision history on page 187.
The auto-retrieve operation is only invoked if the FortiGate fails to initiate an auto-update operation. When FortiManager
detects a change on the FortiGate, it automatically retrieves the full configuration.
The auto-update operation is enabled by default. To disable auto-update and allow the administrator to accept or refuse
updates, use the following CLI commands:
config system admin setting
set auto-update disable
end
When a change is made on the FortiGate, but the change is not initiated by a FortiManager install operation, the
FortiGate automatically sends the configuration changes to FortiManager. If the change from FortiGate is a device level
setting, the policy layer status in FortiManager remains unchanged. If the change from FortiGate is a policy level setting,
the policy layer status in FortiManager might change to Conflict status. It is highly recommended to always modify
settings on FortiManager and not on FortiGate.
Auto-backup
The auto-backup operation is similar to auto-update, but only available when the FortiManager is in backup mode. The
FortiGate device will wait until the FortiGate admin user has logged out before performing the backup.
For more information, see ADOM modes on page 904.
Refresh
FortiManager queries FortiGate to update that FortiGate's current synchronization status. For more information, see
Refreshing a device on page 143.
Revert
The revert operation loads a saved configuration revision into the device database. The revert operation does not affect
the policy package or other modules. As a result, you may need to update the policy package to ensure that the policy
package is aligned with the device database.
After the revert operation completes, complete the following actions to install the changes to the FortiGate:
1. Import the configuration from the managed FortiGate to synchronize the policy package stored in the ADOM
database.
2. Re-install the policy package from FortiManager.
For more information, see Viewing configuration revision history on page 187.
When FortiManager installs changes to managed devices, for example installing Policy Packages and CLI templates to
a FortiGate, it follows a sequence where the configuration is first copied to the device's Device Database on
FortiManager before actual installation to the target device.
This section includes the following:
l FortiManager databases used during installation on page 50
l Sequence for installing changes to managed devices on page 51
l Execution sequence for real devices on page 51
l Execution sequence for model devices on page 52
l Installation example on page 52
The FortiManager has two databases that are used in the process of installing configuration changes to target devices.
l ADOM Database: The FortiManager's ADOM Database includes all ADOM objects including policy objects,
provisioning templates, AP Profiles, FortiSwitch templates, and FortiExtender templates.
l Device (FortiGate) Database: The FortiManager's Device (FortiGate) Database has complete configuration files
for each FortiGate that is managed by the FortiManager.
The diagram below demonstrates the relationship between the ADOM Database, Device Database and target device
(real FortiGate) when installing changes.
l See Execution sequence for real devices on page 51 and Execution sequence for model devices on page 52
The diff between the old and new configuration is installed to the target FortiGate, but not
the original content.
Because of this behavior, some object details (for example, some command lines in a
CLI template) are not directly pushed to the target FortiGate. Instead, FortiManager is
responsible to make sure that the changes identified in the diff are correctly updated on the
real FortiGate.
The templates, packages, and profiles are applied to the Device Database from the ADOM Database in the following
order:
1. System template.
2. Threat weight template.
3. IPsec tunnel template.
4. Static route template.
5. BGP template.
6. NSX-T service template.
7. SD-WAN template.
8. AP Profile
9. FortiSwitch template.
10. FortiExtender template.
11. Policy Package.
12. CLI template.
When installing the changes to a real FortiGate:
l FortiManager compares the Device Database of the target FortiGate with the configuration retrieved from the real
FortiGate device.
l FortiManager generates a diff of the configuration.
l FortiManager installs the difference on the real FortiGate.
Pre-Run CLI/Jinja templates run once on a model device to preconfigure them with required settings, for example to add
interfaces to a FortiGate-VM. Pre-run CLI/Jinja templates are exclusively available to model devices, and can only be
assigned to model devices.
Similar to other Provisioning Templates, the pre-run CLI/Jinja template is only applied to the Device Database on the
FortiManager side, not to the target FortiGate. Once the pre-run CLI/Jinja template has been applied to the Device
Database of a model device, it is automatically unassigned from that model device.
The templates, packages, and profiles are applied to the Device Database from the ADOM Database in the following
order:
1. Pre-run CLI template (Only available on model devices. Pre-run CLI/Jinja templates are always applied to the
Device Database before any other Provisioning Template or Policy Packages.).
2. System template.
3. Threat weight template.
4. IPsec tunnel template.
5. Static route template.
6. BGP template.
7. NSX-T service template.
8. SD-WAN template.
9. AP Profile
10. FortiSwitch template.
11. FortiExtender template.
12. Policy Package.
13. CLI template.
With zero touch provisioning, you only need to assign Provisioning Templates and Policy Packages to model devices
and are not required to perform any of the installation actions (see the note below for best practices and exceptions).
Once the real device comes online, FortiManager copies everything to the Device Database and then installs it on the
real device as part of the auto-link process.
Installation example
The following example demonstrates that during installation to a real FortiGate device, FortiManager does not push the
content of a CLI template to the FortiGate line-by-line. Instead FortiManager identifies the difference between the Device
Database and the FortiGate's current configuration, and is responsible for installing the necessary changes.
1. On the FortiManager, a CLI template is assigned to a FortiGate-60E.
The CLI template contains the following commands:
config firewall policy
delete 1
end
config firewall policy
edit "1"
set action accept
set srcintf "internal1"
set dstintf "internal1"
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
set logtraffic all
next
end
2. The real FortiGate-60E is currently configured with Policy ID 1 as shown below:
config firewall policy
edit 1
set uuid bddc84d8-a64f-51ed-405b-90156f074f85
set srcintf "any"
set dstintf "any"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
set logtraffic all
next
end
3. To install the updated Policy Package to the FortiGate-60E, FortiManager first copies all of the CLI template's
content from the FortiManager's ADOM Database to the Device Database for the FortiGate-60E.
config firewall policy
delete 1
end
config firewall policy
edit "1"
set action accept
set srcintf "internal1"
set dstintf "internal1"
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
set logtraffic all
next
end
4. After the copy process is finished, the FortiGate-60E's device configuration status on FortiManager is shown as
Modified.
5. FortiManager compares the modified FortiGate-60E's Device Database with the real FortiGate-60E's configuration,
and generates a diff of the configuration. The changes identified in the diff are pushed to the real FortiGate-60E.
In this example, the installation log below shows that only Policy ID 1's UUID, source interface, and destination
interface settings are installed on the real FortiGate-60E as those are the differences identified.
Starting log (Run on device)
Start installing
FGT60ETK19025756 $ config firewall policy
FGT60ETK19025756 (policy) $ edit 1
Security Fabric
FortiManager can recognize a Security Fabric group of devices and display all units in the group on the Device Manager
pane, and you can manage the units in the Security Fabric group as if they were a single device. See Adding a Security
Fabric group on page 107.You can also display the security fabric topology (see Displaying Security Fabric topology on
page 142) and view Security Fabric Ratings (see Fabric View on page 673).
Your FortiManager unit records and maintains the history of all configuration changes made over time. Revisions can be
scheduled for deployment or rolled back to a previous configuration when needed.
Centralized management
FortiManager can centrally manage the configurations of multiple devices from a single console. Configurations can then
be built in a central repository and deployed to multiple devices when required.
Administrative domains
FortiManager can segregate management of large deployments by grouping devices into geographic or functional
ADOMs. See Administrative Domains (ADOMs) on page 901.
A FortiGate device can use the FortiManager unit for antivirus, intrusion prevention, web filtering, and email filtering to
optimize performance of rating lookups, and definition and signature downloads. See FortiGuard on page 776.
Firmware management
FortiManager can centrally manage firmware images and schedule managed devices for upgrade using firmware
templates.
Scripting
FortiManager supports CLI or Tcl based scripts to simplify configuration deployments. See Scripts on page 219.
FortiManager can also be used to log traffic from managed devices and generate Structured Query Language (SQL)
based reports. FortiManager also integrates FortiAnalyzer logging and reporting features.
The management tasks for devices in a Fortinet security infrastructure follow a typical life cycle:
l Deployment: An administrator completes configuration of the Fortinet devices in their network after initial
installation.
l Monitoring: The administrator monitors the status and health of devices in the security infrastructure, including
resource monitoring and network usage. External threats to your network infrastructure can be monitored and alerts
generated to advise.
l Maintenance: The administrator performs configuration updates as needed to keep devices up-to-date.
l Upgrading: Virus definitions, attack and data loss prevention signatures, web and email filtering services, and
device firmware images are all kept current to provide continuous protection for devices in the security
infrastructure.
Dashboard
Dashboard contains widgets that provide performance and status information and enable you to configure basic system
settings.
Widget Description
System Information Displays basic information about the FortiManager system, such as up time and
firmware version. You can also enable or disable Administrative Domains and
FortiAnalyzer features. For more information, see System Information widget on
page 58.
From this widget you can manually update the FortiManager firmware to a
different release. For more information, see Updating the system firmware on
page 60.
The widget fields will vary based on how the FortiManager is configured, for
example, if ADOMs are enabled.
System Resources Displays the real-time and historical usage status of the CPU, memory and hard
disk. For more information, see System Resources widget on page 70.
Widget Description
Unit Operation Displays status and connection information for the ports of the FortiManager unit.
It also enables you to shutdown and restart the FortiManager unit or reformat a
hard disk. For more information, see Unit Operation widget on page 74.
Alert Message Console Displays log-based alert messages for both the FortiManager unit and connected
devices. For more information, see Alert Messages Console widget on page 75.
Log Receive Monitor Displays a real-time monitor of logs received. You can view data per device or per
log type. For more information, see Log Receive Monitor widget on page 75.
The Log Receive Monitor widget is available when FortiAnalyzer Features is
enabled.
Insert Rate vs Receive Rate Displays the log insert and receive rates. For more information, see Insert Rate vs
Receive Rate widget on page 76.
The Insert Rate vs Receive Rate widget is available when FortiAnalyzer Features
is enabled.
Log Insert Lag Time Displays how many seconds the database is behind in processing the logs. For
more information, see Log Insert Lag Time widget on page 76.
The Log Insert Lag Time widget is available when FortiAnalyzer Features is
enabled.
Receive Rate vs Forwarding Displays the Receive Rate, which is the rate at which FortiManager is receiving
Rate logs. When log forwarding is configured, the widget also displays the log
forwarding rate for each configured server. For more information, see Receive
Rate vs Forwarding Rate widget on page 77.
The Receive Rate vs Forwarding Rate widget is available when FortiAnalyzer
Features is enabled.
Disk I/O Displays the disk utilization, transaction rate, or throughput as a percentage over
time. For more information, see Disk I/O widget on page 77.
The Disk I/Owidget is available when FortiAnalyzer Features is enabled.
Device widgets For example, widgets such as Connectivity, Device Config Status, and Firmware
Status.
These widgets display summary information for authorized devices.
For more inforamtion, see Device widgets on page 78.
The FortiManager dashboard can be customized. You can select which widgets to display, where they are located on the
page, and whether they are minimized or maximized. It can also be viewed in full screen by selecting the full screen
button on the far right side of the toolbar.
Action Steps
Move a widget Move the widget by clicking and dragging its title bar, then dropping it in its new location
Action Steps
Add a widget Select Toggle Widgets from the toolbar, then select the name widget you need to add.
Delete a widget Click the Close icon in the widget's title bar.
Customize a widget For widgets with an edit icon, you can customize the widget by clicking the Edit icon and
configuring the settings.
Reset the Select Toggle Widgets > Reset to Default from the toolbar. The dashboards will be reset to the
dashboard default view.
The information displayed in the System Information widget is dependent on the FortiManager model and device
settings. The following information is available on this widget:
Host Name The identifying name assigned to this FortiManager unit. Click the edit host name
button to change the host name. For more information, see Changing the host
name on page 59.
Serial Number The serial number of the FortiManager unit. The serial number is unique to the
FortiManager unit and does not change with firmware upgrades. The serial
number is used for identification when connecting to the FortiGuard server.
Platform Type Displays the FortiManager platform type, for example FMGVM64 (virtual
machine).
HA Status Displays if FortiManager unit is in High Availability mode and whether it is the
Primary or Secondary unit in the HA cluster. For more information see High
Availability on page 1036.
System Time The current time on the FortiManager internal clock. Click the edit system time
button to change system time settings. For more information, see Configuring the
system time on page 60.
Firmware Version The version number and build number of the firmware installed on the
FortiManager unit.
You can access the latest firmware version available on FortiGuard from
FortiManager.
Alternately you can manually download the latest firmware from the Customer
Service & Support website at https://support.fortinet.com. Click the update button,
then select the firmware image to load from the local hard disk or network volume.
For more information, see Updating the system firmware on page 60.
System Configuration The date of the last system configuration backup. The following actions are
available:
l Click the backup button to backup the system configuration to a file; see
Backing up the system on page 65.
l Click the restore to restore the configuration from a backup file; see
Restoring the configuration on page 68. You can also migrate the
configuration to a different FortiManager model by using the CLI. See
Migrating the configuration on page 69.
Current Administrators The number of administrators currently logged in. Click the current session list
button to view the session details for all currently logged in administrators.
Up Time The duration of time the FortiManager unit has been running since it was last
started or restarted.
Administrative Domain Displays whether ADOMs are enabled. Toggle the switch to change the
Administrative Domain state. See Enabling and disabling the ADOM feature on
page 903.
FortiAnalyzer Features Displays whether FortiAnalyzer features are enabled. Toggle the switch to
change the FortiAnalyzer features state. FortiAnalyzer Features are not available
on the FortiManager 100C or when FortiManager HA is enabled.
See FortiAnalyzer Features on page 37 for information.
1. Go to Dashboard.
2. In the System Information widget, click the edit host name button next to the Host Name field.
3. In the Host Name box, type a new host name.
The host name may be up to 35 characters in length. It may include US-ASCII letters, numbers, hyphens, and
underscores. Spaces and special characters are not allowed.
4. Click the checkmark to change the host name.
You can either manually set the FortiManager system time or configure the FortiManager unit to automatically keep its
system time correct by synchronizing with a Network Time Protocol (NTP) server.
For many features to work, including scheduling, logging, and SSL-dependent features, the
FortiManager system time must be accurate.
1. Go to Dashboard.
2. In the System Information widget, click the edit system time button next to the System Time field.
3. Configure the following settings to either manually configure the system time, or to automatically synchronize the
FortiManager unit’s clock with an NTP server:
System Time The date and time according to the FortiManager unit’s clock at the time that
this pane was loaded or when you last clicked the Refresh button.
Time Zone Select the time zone in which the FortiManager unit is located and whether or
not the system automatically adjusts for daylight savings time.
Time zone settings can also be for each ADOM. See Creating ADOMs on
page 909.
Update Time By Select Set time to manually set the time, or Synchronize with NTP Server to
automatically synchronize the time.
Select Date Set the date from the calendar or by manually entering it in the format:
YYYY/MM/DD.
Synchronize with NTP Server Automatically synchronize the date and time.
Server Enter the IP address or domain name of an NTP server. Click the plus icon to
add more servers. To find an NTP server that you can use, go to
http://www.ntp.org.
To take advantage of the latest features and fixes, you can update FortiManager firmware. From the Dashboard menu in
FortiManager, you can access firmware images on FortiGuard and update FortiManager. Alternately you can manually
download the firmware image from the Customer Service & Support site, and then upload the image to FortiManager.
For information about upgrading your FortiManager device, see the FortiManager Upgrade Guide, or contact Fortinet
Customer Service & Support.
Back up the configuration and database before changing the firmware of FortiManager.
Changing the firmware to an older or incompatible version may reset the configuration and
database to the default values for that firmware version, resulting in data loss. For information
on backing up the configuration, see Backing up the system on page 65.
Before you can download firmware updates for FortiManager, you must first register your
FortiManager unit with Customer Service & Support. For details, go to
https://support.fortinet.com/ or contact Customer Service & Support.
Installing firmware replaces the current network vulnerability management engine with the
version included with the firmware release that you are installing. After you install the new
firmware, make sure that your vulnerability definitions are up-to-date. For more information,
see FortiGuard on page 776.
After updating FortiManager firmware, you should update the following items in the following order:
1. Update firmware for managed FortiGates.
2. Upgrade the ADOM version.
3. Upgrade the global ADOM version.
1. Go to Dashboard.
2. In the System Information widget, beside Firmware Version, click Upgrade Firmware.
The Firmware Management dialog box opens.
3. Before upgrading your firmware, you can choose to enable or disable Backup Configuration. When this setting is
enabled, you will automatically download a backup copy of your FortiManager configuration when performing a
firmware upgrade.
Type and confirm the password you want to use for encryption. The password can be a maximum of 63 characters.
4. From the FortiGuard Firmware box, select the version of FortiManager for the upgrade, and click OK.
The FortiGuard Firmware box displays the firmware images available for upgrade:
l When FortiManager has a valid contract, all available firmware versions are displayed for upgrading or
downgrading.
l When FortiManager has no valid contract, or the contract is expired, only display the available patch upgrades.
l A green checkmark displays beside the recommended image for FortiManager upgrade.
l If you select an image without a green checkmark, a confirmation dialog box is displayed. Click OK to continue.
.
l FortiManager downloads the firmware image from FortiGuard.
l FortiManager uses the downloaded image to update its firmware, and then restarts.
1. Download the firmware (the .out file) from the Customer Service & Support website, https://support.fortinet.com/.
2. Go to Dashboard.
3. In the System Information widget, in the Firmware Version field, click Upgrade Firmware. The Firmware Upload
dialog box opens.
4. Before upgrading your firmware, you can choose to enable or disable Backup Configuration. When this setting is
enabled, you will automatically download a backup copy of your FortiManager configuration when performing a
firmware upgrade.
Type and confirm the password you want to use for encryption. The password can be a maximum of 63 characters.
5. Drag and drop the file onto the dialog box, or click Browse to locate the firmware package (.out file) that you
downloaded from the Customer Service & Support portal and then click Open.
6. Click OK. Your device will upload the firmware image and you will receive a confirmation message noting that the
upgrade was successful.
Optionally, you can upgrade firmware stored on an FTP or TFTP server using the following
CLI command:
execute restore image {ftp | tftp} <file path to server> <IP of
server> <username on server> <password>
For more information, see the FortiManager CLI Reference.
You can also update FortiManager firmware images by using the FortiGuard module. For more information, see
Firmware images on page 792.
FortiManager 7.6.0 and later firmware images use tags to indicate the following maturity levels:
l The Feature tag indicates that the firmware release includes new features. It can also include bug fixes and
vulnerability patches where applicable.
l The Mature tag indicates that the firmware release includes no new, major features. Mature firmware will contain
bug fixes and vulnerability patches where applicable.
Administrators can use the tags to identify the maturity level of the current firmware in the GUI or CLI.
Administrators can view the maturity level of each firmware image that is available for upgrade on the Firmware
Management dialog box. When upgrading from mature firmware to feature firmware, a warning message is displayed.
1. Go to Dashboard.
2. In the System Information widget, beside Firmware Version, click Upgrade Firmware.
The Firmware Management dialog box opens.
3. From the FortiGuard Firmware box, select the version of FortiManager for the upgrade.
The Firmware Version displays the version with build number and either (Mature) or (Feature).
In this example, the Version field includes .F to indicate that the maturity level is feature:
# get system status
Platform Type : FMG-3000G
Platform Full Name : FortiManager-3000G
Version : vx.x.x0-buildxxxx 240620 (GA.F)
In this example, the Version field includes .M to indicate that the maturity level is mature:
# get system status
Platform Type : FMG-3000G
Fortinet recommends that you back up your FortiManager configuration to your management computer on a regular
basis to ensure that, should the system fail, you can quickly get the system back to its original state with minimal affect to
the network. You should also back up your configuration after making any changes to the FortiManager configuration or
settings that affect connected devices.
If any management extensions are enabled, the backup file includes the configuration for each enabled management
extension.
You can perform backups manually or at scheduled intervals. You can use ADOM Revisions in Policy & Objects to
maintain a revision of your FortiManager configurations in an ADOM. See ADOM revisions on page 498.
Fortinet recommends backing up all configuration settings from your FortiManager unit before upgrading the
FortiManager firmware. See Updating the system firmware on page 60.
An MD5 checksum is automatically generated in the event log when backing up the configuration. You can verify a
backup by comparing the checksum in the log entry with that of the backup file.
1. Go to Dashboard.
2. In the System Information widget, click the backup button next to System Configuration. The Backup System dialog
box opens.
3. Select the Backup Now tab.
4. Enter and confirm the password you want to use for encryption. The password can be a maximum of 63 characters.
The character " \" is used in the FortiManager CLI as an escape character.
If your encryption password contains the \ character, you must either escape it (by adding
an additional \) or use single quotes around the password when referring to it in the CLI.
For example:
l execute backup all-settings ftp 10.0.0.1 backup/backup1.dat
You can configure FortiManager to automatically backup your configuration on a set schedule.
1. Go to Dashboard.
2. In the System Information widget, click the backup button next to System Configuration. The Backup System dialog
box opens.
3. Select the Schedule Backup tab.
4. Enable the Enable Schedule Backup option, and configure the options including the backup location, backup
frequency, and an encryption password.
5. Click OK.
For example, the following configuration uses the FTP protocol to backup the configuration to server 172.20.120.11 in
the /usr/local/backup directory every Monday at 1:00pm.
config system backup all-settings
set status enable
set server 172.20.120.11
set user admin
set directory /usr/local/backup
set week_days monday
set time 13:00:00
set protocol ftp
end
For more information, see the FortiManager CLI Reference Guide on the Fortinet Documents Library.
After performing backups, you can view the backup history to see all backups performed on the FortiManager.
1. Go to Dashboard.
2. In the System Information widget, click the backup button next to System Configuration. The Backup System dialog
box opens.
3. Select the Backup History tab.
The backup history displays the Date & Time, Admin, Size and Status of each backup.
MD5 checksum
You can use secure copy protocol (SCP) with a SSH certificate to back up the FortiManager system configuration.
The following is an example of SSH certificate generation to be used with SCP for configuration backup. This example
uses RSA but can also be applied to ED25519 keys.
edit ssh_cert_1
set certificate "ssh_user_ca-cert.pub"
set private "ssh_user_ca"
end
8. Configure backup of all settings using SCP .
execute backup all-settings scp <server IP> <path and file name> <username> <ssh-cert>
For more information on configuration of backup settings in the FortiManager CLI, see the FortiManager CLI Reference.
You can use the following procedure to restore your FortiManager configuration from a backup file on your management
computer.
If your FortiManager unit is in HA mode, switch to Standalone mode.
If your FortiManager has management extensions enabled, the configuration for the enabled management extension is
restored too.
The restore operation will temporarily disable the communication channel between
FortiManager and all managed devices. This is a safety measure, in case any devices are
being managed by another FortiManager. To re-enable the communication, please go to
System Settings > Advanced > Advanced Settings and disable Offline Mode.
1. Go to Dashboard.
2. In the System Information widget, click the restore button next to System Configuration. The Restore System dialog
box opens.
3. Configure the following settings then select OK.
Choose Backup File Select Browse to find the configuration backup file you want to restore, or drag
and drop the file onto the dialog box.
Overwrite current IP, routing Select the checkbox to overwrite the current IP, routing, and HA settings.
and HA settings
Restore in Offline Mode Informational checkbox. Hover over the help icon for more information.
Migrate from a different Enable this option to migrate the uploaded database from a different version or
platform platform. See Migrating the configuration on page 69.
l When this option is disabled, the default operation of FortiManager is to
You can back up the configuration of one FortiManager and then use the GUI or CLI to migrate the settings to another
FortiManager on the same or different platform or version.
If you encrypted the FortiManager configuration file when you created it, you need the password to decrypt the
configuration file when you migrate the file to another FortiManager model.
When migrating the database from another platform, all configurations except the system
settings are migrated. These system settings must be manually copied from the original
FortiManager model to the other FortiManager model.
If the original FortiManager has databases from FortiGuard (antivirus, antispam, webfilter,
etc.), they will not be included in the configuration file. After migrating, export the packages
from the original FortiManager and import them to the other FortiManager. For example, see
Exporting web filter databases example on page 787 and Importing web filter databases
example on page 788.
The System Resources widget displays the usage status of the CPUs, memory, and hard disk. You can view system
resource information in real-time or historical format, as well as average or individual CPU usage.
On VMs, warning messages are displayed if the amount of memory or the number of CPUs assigned are too low, or if the
allocated hard drive space is less than the licensed amount. These warnings are also shown in the notification list (see
GUI overview on page 29). Clicking on a warning opens the FortiManager VM Install Guide.
To toggle between real-time and historical data, click Edit in the widget toolbar, select Historical or Real-time, edit the
other settings as required, then click OK.
To view individual CPU usage, from the Real-Time display, click on the CPU chart. To go back to the standard view, click
the chart again.
The License Information widget displays the number of devices connected to the FortiManager.
FortiGuard
Server Location The locations of the FortiGuard servers, either global or US only.
Click the edit icon to adjust the location. Changing the server location will cause
the FortiManager to reboot.
Management
Device/VDOMs The total number of devices and VDOMs connected to the FortiManager and
the total number of device and VDOM licenses.
Logging This section is only shown when FortiAnalyzer Features is enabled. For more
information, see FortiAnalyzer Features on page 37.
Device/VDOMs The total number of devices and VDOMs connected to the FortiManager and
the total number of device and VDOM licenses.
GB/Day The gigabytes per day of logs allowed and used for this FortiManager. Click the
show details button to view the GB per day of logs used for the previous 6 days.
FortiManager displays a warning after exceeding the quota for more than 7
days, and it is recommended that you review your daily logging or upgrade your
license to accommodate the extra logs.
The GB/Day log volume can be viewed per ADOM through the CLI using:
diagnose fortilogd logvol-adom <name>.
Update Server
AntiVirus and IPS The IP address and physical location of the Antivirus and IPS update server.
Web and Email Filter The IP address and physical location of the web and email filter update server.
FortiClient Update The IP address and physical location of the FortiClient update server.
Register your device with FortiCloud to receive customer services, such as firmware updates and customer support.
1. Go to Dashboard.
2. In the License Information widget, click Register Now for FortiCloud.
The registration dialog opens.
3. Enter the device details.
4. Click OK. FortiManager connects to FortiCloud and registers the device.
A confirmation message appears at the top of the content pane, and the Status field changes to Registered.
If you have purchased an add-on license and have a FortiCloud account, you can use the License Information widget to
activate an add-on license. You will need the contract registration code to activate the license.
After you enter the contract registration code for the license, FortiManager communicates with FortiCloud to activate the
license.
To add a license:
1. Go to Dashboard.
2. In the License Information widget, beside the VM License option, click the Add License button.
The Add License dialog box is displayed.
License count rules for FortiManager-VM, Cloud (Fortinet, Azure, or AWS), and Hardware:
l VDOM disabled: 1 FortiGate = 1 license.
l VDOM enabled: 1 VDOM = 1 license.
FortiAP, FortiSwitch, and FortiExtender are not included in the license count. For more
information see the Fortinet Product Matrix.
The Unit Operation widget graphically displays the status of each port. The port name indicates its status by its color.
Green indicates the port is connected. Grey indicates there is no connection.
Hover the cursor over the ports to view a pop-up that displays the full name of the interface, the IP address and netmask,
the link status, the speed of the interface, and the amounts of sent and received data.
The Alert Message Console widget displays log-based alert messages for both the FortiManager unit itself and
connected devices.
Alert messages help you track system events on your FortiManager unit such as firmware changes, and network events
such as detected attacks. Each message shows the date and time the event occurred.
Click Edit from the widget toolbar to view the Alert Message Console Settings, where you can adjust the number of
entries that are visible in the widget, and the refresh interval.
To view a complete list of alert messages, click Show More from the widget toolbar. The widget will show the complete
list of alerts. To clear the list, click Delete All Messages. Click Show Less to return to the previous view.
The Log Receive Monitor widget displays the rate at which the FortiManager unit receives logs over time. Log data can
be displayed by either log type or device.
Hover the cursor over a point on the graph to see the exact number of logs that were received at a specific time. Click the
name of a device or log type to add or remove it from the graph. Click Edit in the widget toolbar to modify the widget's
settings.
This widget is only available when the FortiAnalyzer features are manually enabled. For more
information, see FortiAnalyzer Features on page 37.
The Insert Rate vs Receive Rate widget displays the log insert and log receive rates over time.
l Log receive rate: how many logs are being received.
l Log insert rate: how many logs are being actively inserted into the database.
If the log insert rate is higher than the log receive rate, then the database is rebuilding. The lag is the number of logs
waiting to be inserted.
Hover the cursor over a point on the graph to see the exact number of logs that were received and inserted at a specific
time. Click Receive Rate or Insert Rate to remove those data from the graph. Click the edit icon in the widget toolbar to
adjust the time interval shown on the graph and the refresh interval.
This widget is only available when the FortiAnalyzer features are manually enabled. For more
information, see FortiAnalyzer Features on page 37.
The Log Insert Lag Time widget displays how many seconds the database is behind in processing the logs.
Click the edit icon in the widget toolbar to adjust the time interval shown on the graph and the refresh interval (0 to
disable) of the widget.
This widget is only available when the FortiAnalyzer features are manually enabled. For more
information, see FortiAnalyzer Features on page 37.
The Receive Rate vs Forwarding Rate widget displays the rate at which the FortiManager is receiving logs. When log
forwarding is configured, the widget also displays the log forwarding rate for each configured server.
Click the edit icon in the widget toolbar to adjust the time period shown on the graph and the refresh interval, if any, of the
widget.
This widget is only available when the FortiAnalyzer features are manually enabled. For more
information, see FortiAnalyzer Features on page 37.
The Disk I/O widget shows the disk utilization (%), transaction rate (requests/s), or throughput (KB/s), versus time.
Click the edit icon in the widget toolbar to select which chart is displayed, the time period shown on the graph, and the
refresh interval (if any) of the chart.
This widget is only available when the FortiAnalyzer features are manually enabled. For more
information, see FortiAnalyzer Features on page 37.
Device widgets
The following widgets in Dashboard provide a summary of the devices that are added and authorized in the
FortiManager. These widgets link to other panes in the GUI, which provide more detailed information.
Click one of the following widgets to open Device Manager > Device & Groups. For more information, see Device &
Groups on page 82.
l Connectivity
l Device Config Status
l Policy Package Status
l Firmware Status
l FortiGuard License Status
Click the following widget to open Device Manager > Monitors > Asset Identity Center. For more information, see Asset
Identity Center on page 317.
l Hardware Vendor
Click the following widget to open AP Manager > Managed FortiAPs. For more information, see Managed FortiAPs on
page 559.
l FortiAP Status
Click the following widget to open FortiSwitch Manager > Managed FortiSwitches. For more information, see Managed
FortiSwitches on page 821.
l FortiSwitch Status
Click the following widget to open Extender Manager > Managed Extenders. For more information, see Managed
extenders on page 869.
l FortiExtender Status
Always use the operation options in the GUI or the CLI commands to reboot and shut down the FortiManager system to
avoid potential configuration problems.
Restarting FortiManager
1. Go to Dashboard.
2. In the Unit Operation widget, click the Restart button.
3. Enter a message for the event log, then click OK to restart the system.
1. From the CLI, or in the CLI Console menu, enter the following command:
execute reboot
The system will be rebooted.
Do you want to continue? (y/n)
2. Enter y to continue. The FortiManager system will restart.
1. Go to Dashboard.
2. In the Unit Operation widget, click the Shutdown button.
3. Enter a message for the event log, then click OK to shutdown the system.
1. From the CLI, or in the CLI Console menu, enter the following command:
execute shutdown
The system will be halted.
Do you want to continue? (y/n)
2. Enter y to continue. The FortiManager system will shutdown.
1. From the CLI, or in the CLI Console menu, enter the following command:
execute reset {adom-settings | all-except ip | all-settings | all-shutdown}
Variable Description
adom-settings <adom> Reset an ADOM's settings.
<version> <mr> <ostype> l <adom>: The ADOM name.
all-except-ip Reset all settings except the current IP address and route information.
all-settings Reset to factory default settings.
all-shutdown Reset all settings and shutdown.
2. Enter y to continue. The device will reset settings based on the type of reset performed.
For example, execute reset all-settings will reset all FortiManager to factory defaults.
Use the Device Manager pane to add and authorize devices for management by FortiManager. You can also use the
Device Manager pane to create device configuration changes and install device and policy package configuration
changes to managed devices. You can also monitor managed devices from the Device Manger pane.
The Device Manager pane includes the following items in the tree menu:
Device & Groups Add, configure, and view managed and logging devices. Use the toolbar to add
devices, devices groups, and launch the install wizard. See Add devices on page
84. The Device & Groups tab also contains a quick status bar for a selected
device group. See Using the quick status bar on page 134.
Scripts Create new or import scripts. Scripts is disabled by default. You can enable this
advanced configuration option in System Systems > Settings. Select Show Script
to enable on this option in the Device Manager pane. See Scripts on page 219.
Provisioning Templates Configure provisioning templates. For information on system, Threat Weight,
FortiClient, and certificate templates, see Provisioning Templates on page 252.
Firmware Templates Configure templates for upgrading firmware on FortiGates and all access devices,
such as FortiAP, FortiSwitch, and FortiExtender. See Firmware templates on
page 309.
Monitors Monitor traffic for all SD-WAN networks. See SD-WAN Monitor on page 502.
Monitor traffic for all VPN communities. See VPN Monitor on page 316.
Chassis devices Add, configure, and monitor chassis devices. See FortiGate chassis devices on
page 324.
When you select a tree menu item, the toolbar and the content pane change to reflect your selection.
Additional configuration options and short-cuts are available using the right-click content
menu. Right-click different parts of the navigation panes on the GUI page to access these
context menus.
If workspace or workflow is enabled, the ADOM must be locked before changes can be made.
See Locking an ADOM on page 921.
ADOMs
You can organize connected devices into ADOMs to better manage the devices. ADOMs can be organized by:
l Firmware version: group all 7.0 devices into one ADOM, and all 7.2 devices into another.
l Geographic regions: group all devices for a specific geographic region into an ADOM, and devices for a separate
region into another ADOM.
l Administrator users: group devices into separate ADOMs based for specific administrators responsible for the
group of devices.
l Customers: group all devices for one customer into an ADOM, and devices for another customer into another
ADOM.
FortiAnalyzer, FortiCache, FortiClient, FortiDDos, FortiMail, FortiManager, FortiSandbox, FortiWeb, Chassis, and
FortiCarrier devices are automatically placed in their own ADOMs.
Each administrator profile can be customized to provide read-only, read/write, or restrict access to various ADOM
settings. When creating new administrator accounts, you can restrict which ADOMs the administrator can access, for
enhanced control of your administrator users. For more information on ADOM configuration and settings, see
Administrative Domains (ADOMs) on page 901.
For information on adding devices to an ADOM by using the Add Device wizard, see Adding
online devices using Discover mode on page 84.
On the Device Manager pane, use the Device & Group tree menu to access options for adding devices to FortiManager
and authorizing them for management. After the device is managed, you can use the Device & Group pane to monitor
managed devices, install and manage configurations, as well as access the device database for each managed device.
The Device & Group pane includes the following options in the banner:
Add Device Click Add Device to display the Add Device wizard. With the wizard, you can add
an online device, add an offline device, add an HA cluster, and import offline
devices from a CSV file. Zero-touch provisioning is supported. See Add devices
on page 84.
Click the dropdown menu next to Add Device in the toolbar to see additional
options including Add FortiAnalyzer and Device Blueprint. See Add FortiAnalyzer
or FortiAnalyzer BigData on page 122 or Using device blueprints for model
devices on page 115.
You can also add VDOMs to FortiGates. See Add VDOM on page 130.
Device Group Click Device Group to create groups that you can use to organize managed
devices. See Device groups on page 133.
Install Wizard Click Install Wizard to display the Install wizard. With the wizard, you can install
policy packages and device settings to managed devices. Alternately, you can
install only device settings. See Install wizard on page 160.
The default view for the Device Manager > Device & Groups pane is Table View. See Table view on page 134.
Under the banner in Table View is a quick status bar for all managed devices. See Using the quick status bar on page
134.
In Table View, a tree menu of device groups and devices displays on the left side of the pane. Managed devices are
organized into groups. Select a group, such as Managed FortiGates, to hide and display the FortiGates in the group. The
devices in a group are displayed in the left tree menu and in the content pane:
l In the left tree menu, click a device to display the device database. See Displaying the device database on page
174.
l In the content pane, click a device to use options in the toolbar on Table View.
The toolbar for Table View contains the following options:
Edit In the content pane, select a device, and click Edit to edit device information. See
Editing device information on page 138.
Delete In the content pane, select a device, and click Delete to remove the device from
FortiManager management.
Import Configuration In the content pane, select a device, and click Import Configuration to start the
Import Device wizard. See Import Configuration wizard on page 157.
Install In the content pane, select a device, and from the Install menu menu, select one
of the following options:
l Install Wizard
l Re-install Policy
Table View Click the Table View menu to choose the view format for managed devices.
Choose from the following options:
l Table View
l Map View
l Ring View
l Folder View
More In the content pane, select a device, and from the More menu, select one of the
following options:
l Configuration
l Grouping
l Add VDOM
l Run Script
l Remote Access
l Refresh Device
l Firmware Upgrade
l Import/Export
l Add Multiple Devices
l Swap Device
l Enable Auto-link
l Disable Auto-link
l Enable SD-WAN Management
l Disable SD-WAN Management
Full Screen/Exit Full Screen Click to toggle full screen mode for the device table.
Show Charts Click the toggle to enable/disable charts in the Devices & Groups pane. Select the
dropdown to choose which charts are displayed.
Column Settings From the Column Settings menu, select what columns to display for Table View.
You can right-click on a selected managed device to see options in the context menu. The right-click context menu
includes the following additional options.
Policy Package Diff View a diff on the policy package for the selected device.
Edit Variable Mapping Edit the variable mappings for the selected device.
Install VM License Select to open the Install VM License wizard which includes options to install a
BYOL VM license, or install a license from a FortiFlex connector.
See Installing VM licenses on managed devices on page 144.
Add devices
In FortiManager, you must add devices to Device Manager and authorize the devices for management before you can
manage them.
On the managed device, you must also enable Central Management to allow FortiManager to manage the device.
You can use the Add Device wizard to add the following devices:
l Online or offline devices
l Online or offline FortiGate HA clusters
l Security Fabric group
Another method is to import detected devices to FortiManager for management.
You can also configure a device to request management by FortiManager. These devices appear on the Device
Manager pane in the unauthorized device list. For example, you can configure a FortiGate to be managed by
FortiManager, and the FortiGate device is displayed in the unauthorized device list in FortiManager.
The following steps describe how to add an online device by using the Add Device wizard and Discover mode.
For FortiGates, you can use the new authorization method described in this topic with
FortiOS 7.0.0 and later. If FortiGate is running FortiOS 6.4.x and earlier, the wizard
automatically switches to the legacy login. See also Adding online devices using Discover
mode and legacy login on page 96.
For FortiAnalyzer, you cannot use the Add Device wizard to add FortiAnalyzer to
FortiManager. You must use the Add FortiAnalyzer wizard instead. See Add FortiAnalyzer or
FortiAnalyzer BigData on page 122.
Use the Discover option for devices that are currently online and discoverable on your network. When the wizard
completes, the device is added to FortiManager and authorized.
Adding an online device does not result in an immediate connection to the device. Device connection happens only
when you successfully synchronize the device.
FortiManager cannot communicate with FortiGate when offline mode is enabled. Enabling
offline mode prevents FortiManager from discovering devices.
A login window for the device is displayed. If the login window is not displayed, see Security Fabric
authorization on page 93.
c. Type the username and password for the device, and click Login.
An authorization request window for the device is displayed.
After the device discovery process completes, the following page of information is displayed.
Name Type a unique name for the device. The device name cannot contain spaces
or special characters.
System Template System templates can be used to centrally manage certain device-level
options from a central location. If required, assign a system template using the
dropdown menu. Alternatively, you can configure all settings per-device inside
Device Manager. For more information, see Provisioning Templates on page
252.
Override Profile Value After selecting a system template, click to override values in the template.
Add to Device Group Select to add the device to any predefined groups.
Copy Device Dashboard Select a device to copy custom device dashboards from (optional).
For more information about dashboards in the device database, see Device
DB - Dashboard on page 180.
After the wizard completes the checks, you are asked to choose whether to import policies and objects for the
device now or later.
6. Click Import Later to finish adding the device and close the wizard.
If you click Import Now, the wizard continues. The next step in the wizard depends on whether you are importing a
FortiGate VDOM.
If you are importing a FortiGate VDOM, the following page is displayed with import options for the VDOM. Select an
option, and click Next.
If you select Automatically import one VDOM at a time or Automatically Import all VDOMs,
conflict detection for objects will not be performed. If there are conflicting objects between
FortiGate and FortiManager, the objects on FortiManager will be overwritten by the objects
on FortiGate.
For more information, see What to do when an object conflict occurs in the FortiManager
Best Practices guide.
If you are not importing a FortiGate VDOM, the following page is displayed.
9. Click Next.
A detailed summary of the import is shown. Click Download Import Report to download a report of the import. The
report is only available on this page.
10. Click Finish to finish adding the device and close the wizard.
With FortiManager and FortiOS 7.0.0 and later, the Add Device wizard and Discover mode can
use the OAUTH protocol for the authorization step. This topic describes how the authorization
step works when the OATH protocol is used. You are not required to use the new authorization
method, you can choose to use the legacy login method instead, which does not use the
OAUTH protocol.
You can add an online device to FortiManager by using the Add Device wizard and Discover mode. You type in the IP
address of the management port for the FortiGate, and press Next. At this stage of the wizard, the following actions
occur:
1. FortiManager connects to the online FortiGate.
2. A browser popup window is displayed to let you log in to FortiGate as part of the authorization process:
When FortiManager connects to FortiGate, it retrieves the following settings from FortiOS that define the accessible
FQDN or IP address and port for FortiOS:
config system global
set management-ip
set management-port
In FortiOS, you can also view the management IP and management port in the GUI. Go to
Security Fabric > Fabric Connectors > Security Fabric Setup.
FortiManager provides the settings to the browser popup window for connection to FortiGate.
If no FortiOS settings are defined, both FortiManager and the browser popup window use the IP address of the
management port and the default HTTPS port for connection to FortiGate.
If FortiManager cannot access the management IP and/or default HTTPS port for the FortiGate the wizard fails, and you
must specify an accessible management IP on FortiGate before starting the Add Wizard again.
In some cases FortiManager can access FortiGate, but the browser popup window cannot. For example, if FortiGate
uses NAT, FortiManager can access the internal IP address for FortiGate and establish connection. However the
browser popup window cannot access the internal IP address for the FortiGate, and the authentication connection fails.
You can workaround this problem by specifying an accessible management IP address and port on FortiOS.
As an alternate to specifying the accessible management IP and port for FortiOS, you can use the legacy login for the
Add Device wizard with Discover mode. If you are adding a FortiGate running FortiOS 6.4.x and earlier, you must use the
legacy login. See Adding online devices using Discover mode and legacy login on page 96.
This section includes examples of topologies that don't and do require you to specify an accessible management
IP address for FortiOS to enable browser authorization communication:
l Same subnet on page 95
l NAT on page 95
l Non-default port on page 95
Same subnet
You are not required to set specify an accessible management IP address for FortiOS when:
l FortiGate is directly connected to FortiManager.
l FortiGate and FortiManager use the same subnet.
l FortiOS is using the default management HTTPS port.
In this scenario, you can use the Add Device wizard with the IP address of the management port for the FortiGate, and
the browser can access the IP address. Authorization communication proceeds.
NAT
When using NAT, the following scenarios require you to specify an accessible management IP address for FortiOS:
l FortiGate is behind NAT with VIP.
l FortiManager and FortiGate are behind NAT in the same network.
In these cases, specify the FortiOS virtual public IP (VIP) as the accessible management IP address. After configuration,
FortiManager can retrieve the information to enable authentication communication.
Non-default port
The default management HTTPS port for FortiGate is 443. If you are using a custom port, you must specify the custom
port used by FortiGate.
For example, when FortiGate uses HTTPS port 8443 instead of 443, you must use the following command on FortiOS to
configure the non-default port:
config system global
After configuration, FortiManager can retrieve the information to enable authentication communication.
For FortiGates running FortiOS 6.4.x and earlier, the Add device wizard automatically switches to legacy login.
For FortiGates running FortiOS 7.0.0 and later, you can use the legacy login method instead of using the new
authorization method. The legacy login method is useful for certain topologies where the browser popup window used by
the new authorization method cannot connect to online FortiGate devices.
See also Security Fabric authorization on page 93.
IP Address Type the IP address of the management port for the device.
The following steps describe how to add a new, offline device by using the Add Device wizard and Add Model Device
mode for zero-touch provisioning (ZTP).
To confirm that a device model or firmware version is supported by the FortiManager's current
firmware version, run the following CLI command:
diagnose dvm supported-platforms list
The Add Model Device mode is intended for new FortiGate deployments, where no pre-existing configuration on the
FortiGate must be preserved. The configuration associated with the model device overwrites the configuration of the
FortiGate as part of the ZTP process, after FortiManager authorizes the FortiGate and checks the version of the Internet
Service database on the FortiGate. See also Model devices on page 44.
You can configure a model device to automatically complete authorization with FortiManager.
When adding devices to product-specific ADOMs, you can only add that product type to the
ADOM. When adding a non-FortiGate device to the root ADOM, the device will automatically
be added to the product-specific ADOM.
1. If ADOMs are enabled, select the ADOM to which you want to add the device.
2. Go to Device Manager > Device & Groups.
3. Click Add Device. The Add Device wizard displays.
Add Model Device Device will be added using the chosen model type and other explicitly entered
information.
Name Type a descriptive name for the device. This name is displayed in the Device
Name column. Each device must have a unique name; otherwise, the wizard
will fail.
Link Device By The method by which the model device will be linked to the real device. Model
devices can be linked by Serial Number or Pre-Shared Key.
The serial number should be used if it is known. A pre-shared key can be used
if the serial number is not known when you add the model device to
FortiManager.
If using a pre-shared key, the following CLI command needs to be issued from
the FortiGate device when it is installed in the field:
execute central-mgmt register-device <fmg-serial-number>
<preshared-key>
Serial Number or Pre-Shared Type the device serial number or pre-shared key. This field is mandatory.
Key If using a pre-shared key, each device must have a unique pre-shared key.
You can change the pre-shared key after adding the model device.
See Editing device information on page 138.
Device Model Select the device model from the list. If linking by serial number, the serial
number must be entered before selecting a device model.
Port Provisioning Select the number of ports (1-10) to be provisioned for the FortiGate VM
during initialization.
This feature uses the provision_instances_on_vm script in Device
Manager > Provisioning Templates > CLI Templates to configure the selected
number of ports on the device. The script is performed while adding the offline
model into the Device Manager.
This option is only available for FortiGate-VM device models.
Automatically Link to Real Toggle ON to allow the model device to automatically link to the real device.
Device When enabled, the Auto-link Status of the model device will be displayed as
Enabled in FortiManager's Device Manager.
When disabled, the Auto-link Status of the model device will be displayed as
Disabled in FortiManager's Device Manager.
You can edit model devices added to FortiManager to enable or disable the
Automatically Link to Real Device setting.
Enforce Firmware Version Select the check box to enforce the firmware version. The Firmware Version
shows the firmware that will be upgraded or downgraded on the device.
Managed by SD- Enable this setting when onboarding SD-WAN devices, and the device will
WAN Manager automatically be added to the SD-WAN Manager. See SD-WAN Devices on
page 501.
Add to Device Group Select the check box to choose a device group.
Pre-run CLI Templates Select the check box to choose pre-run CLI templates. Pre-run CLI templates
are run before provisioning templates.
Assign Policy Package Select the check box and select a policy package from the drop-down to
assign a particular policy package to the device.
Provisioning Template Click to display the Assign Provisioning Templates dialog box. You can select
one or more individual provisioning templates, or you can select a template
group.
Override Profile Value Click Override Profile Value to display the interface template and override
settings. Overrides must be enabled in the interface template before you can
override settings.
Metadata Variables Edit the metadata variables for the new model device.
See ADOM-level metadata variables on page 479.
Copy Device Dashboard Select a device to copy custom device dashboards from (optional).
For more information about dashboards in the device database, see Device
DB - Dashboard on page 180.
When adding a model device that has been configured with an admin password, you must
import the device's existing configuration or set the password in FortiManager before
pushing new configuration changes to it for the first time.
If the password is not imported or configured in FortiManager, when auto-push occurs, the
installation will fail because the admin password in FortiGate devices cannot be unset
without knowing the existing password.
A configuration file must be associated with the model device to enable FortiManager to
automatically install the configuration to the matching device when the device connects to
FortiManager and is authorized. FortiManager does not retrieve a configuration file from a real
device that matches a model device.
Use the Import Revision function to associate a configuration file with the model device. See
Viewing configuration revision history on page 187.
Following the device auto-link process, FortiManager determines if the following databases must be updated when the
configuration is pushed to the managed device. Each database is checked individually for updates.
l Internet service database
l IPS database
l Application Signature database
This check is performed based on the following criteria:
l If there is no Internet Service/IPS/Application Signature database used in the Policy Package, there will be no
database update performed.
l If the internet Internet Service/IPS/Application Signature database used in the Policy Package is the same version
or an older version than the version on the FortiGate, there will be no database update performed.
l If the internet Internet Service/IPS/Application Signature database used in the Policy Package is newer than the
database version on the FortiGate, a database update is performed.
You can add an offline FortiGate HA cluster by using the Add Model Device method. The process of adding an offline
FortiGate HA cluster is similar to adding a model device using FortiGate serial numbers. See Example: Adding an offline
device by serial number on page 118. You can add the two FortiGate devices as model devices to be part of the HA
cluster.
You can define a device blueprint for an HA cluster and use it to add the model HA cluster. See Using device blueprints
for model devices on page 115.
When adding a FortiGate HA cluster, certain configurations and templates set for the model device will be applied to both
the primary and secondary devices, including:
l The number of provisioned instances
l Pre-run CLI templates
l If you are importing model devices from a CSV file using a device blueprint, any metadata variables that are defined
in the CSV file are also be applied to both the primary and secondary device.
You can also add an operating FortiGate HA cluster. Adding an operating FortiGate HA cluster to the Device Manager
pane is similar to adding a standalone device. Specify the IP address of the primary device. FortiManager handles a
cluster as a single managed device. You cannot use FortiManager to configure high availability (HA) on real FortiGate
devices.
If you are using an HA cluster, you can promote a secondary device to a primary device. Go to
Device Manager > Device & Groups > Managed FortiGate > [HA_Cluster_Name]. The
System:Dashboard pane shows the cluster members under Cluster Members. Click Promote
to promote a secondary device to a primary device.
The FortiGate device with a higher node priority will be considered as the primary device of
the HA cluster.
Both the FortiGate devices to be added to the HA cluster must be on the same firmware
version. If not, the devices will be enforced with the same version as selected in the
Enforce Firmware Version field in the Add Device dialog.
FortiManager adds both the FortiGate devices as model devices and creates an HA cluster. Based on device node
priorities, both the devices will come online and show up in FortiManager one after the other. You can view the
status of the HA cluster and information about each of the nodes of the HA cluster in Device Manager.
You can view the synchronization status of cluster members in Device Manager > Device & Groups, the device
database, or while editing cluster member devices.
These views display information about the HA cluster, including the Synchronization Status and Role of HA members.
The Synchronization Status is displayed as one of the following:
l Synchronized: The FortiGate HA cluster member is in sync.
l Out of Sync: The FortiGate HA cluster member is out of sync.
l Unknown: The FortiGate HA cluster members is offline.
You can edit the HA cluster device information. Use the Edit Device screen to modify the HA cluster information by
modifying the fields IP Address, Admin User, Password.
Model devices can be imported using a CSV file. This can be used to import large numbers of model devices into
FortiManager.
When importing model devices from a CSV file, a device blueprint is used to configure the initial settings. See Using
device blueprints for model devices on page 115.
ADOM-level metadata variables for each device can be specified in the CSV file.
1. If ADOMs are enabled, select the ADOM to which you want to add the device.
2. Go to Device Manager > Device & Groups.
3. Click Add Device.
The Add Device dialog is displayed.
l You can export an example CSV file from the Device Blueprint table.
6. Drag and drop the CSV file into the Upload area, or select the CSV file location on your computer.
The model devices' serial numbers, names, blueprints, and optional metadata variables are displayed in the table.
7. (Optional) From the Copy Device Dashboard dropdown, select a device to copy custom device dashboards from.
For more information about dashboards in the device database, see Device DB - Dashboard on page 180.
8. Review the device list, and click Next to begin importing the devices. Click Finish when the import process is
complete.
The following fields are supported when importing model devices from a CSV file. Configuration of the model devices
can be specified using device blueprints (for example, configuration of assigned Pre-Run CLI Templates and Policy
Packages).
l Cell value: 3
You can configure FortiSOAR devices to use the FortiGuard module in FortiManager for license checks by configuring
FortiManager as the override FortiGuard server.
When FortiSOAR is configured to use FortiManager as the override FortiGuard server, the unit is displayed in
FortiManager on the Device Manager pane in the unauthorized devices list. You can authorize the FortiSOAR device to
a fabric ADOM, and FortiSOAR can communicate with the FortiGuard module for license updates.
1. On each FortiSOAR device, add the FortiManager IP and configured port as the FortiGuard override server.
The devices are displayed as unauthorized devices in FortiManager.
2. In the root ADOM, go to Device Manager > Device & Groups, and click the Unauthorized Devices tree menu. The
content pane displays the unauthorized FortiSOAR devices.
3. If necessary, select the Display Hidden Devices check box to display hidden unauthorized devices.
4. Select the unauthorized device or devices, then click Authorize. The Authorize Device dialog box opens.
5. In the Add the following device(s) to ADOM list, select a fabric ADOM, and click OK.
The device or devices are added to the fabric ADOM and authorized to communicate with FortiGuard.
If FortiSOAR is operating with FortiManager in a closed network without internet access, which is sometimes called an
air-gapped network, you must request a license file from Fortinet support, and upload the file to FortiGuard. See
Requesting account entitlement files on page 805 and Uploading account entitlement files on page 807.
Before you can add a Security Fabric group to FortiManager, you must create the Security Fabric group in FortiOS.
You must add to FortiManager the root FortiGate for the Security Fabric group. All the devices in the Security Fabric
group are automatically added in Unauthorized Devices after you add the root FortiGate.
See also Displaying Security Fabric topology on page 142.
If the FortiManager is behind NAT, adding the root FortiGate will not add all the members of
the Security Fabric Group automatically. If the FortiManager is behind NAT, the only way is to
add each member of the Security Fabric group manually.
Refresh the Security Fabric root after all the members of the group are added to FortiManager. FortiManager retrieves
information about the Security Fabric group via the root FortiGate unit. All units are displayed in a Security Fabric group.
The Security Fabric icon identifies the group, and the group name is the serial number for the root FortiGate in the group.
Within the group, a * at the end of the device name identifies the root FortiGate in the group.
Authorizing devices
You can enable central management by using the operating system for supported units. For example, in FortiOS, you
can enable central management for the FortiGate unit by adding the IP address of the FortiManager unit. When central
management is enabled, the device is displayed on the FortiManager GUI in the root ADOM on the Device Manager
pane in the Unauthorized Devices list.
In FortiManager, you must authorize devices before you can use FortiManager to manage them. FortiManager cannot
manage unauthorized devices.
When ADOMs are enabled, you can assign the device to an ADOM. When authorizing multiple devices at one time, they
are all added to the same ADOM.
By default, FortiManager expects you to use the default admin account with no password. If
the default admin account is no longer usable, or you have changed the password, the device
authorization process fails. If the device authorization fails, delete the device from
FortiManager, and add the device again by using the Add Device wizard, where you can
specify the admin login and password.
To authorize devices:
6. If ADOMs are enabled, select the ADOM in the Add the following device(s) to ADOM list. If ADOMs are disabled,
select root. The default value is None.
If you try to authorize devices having different firmware versions than the selected ADOM
version, the system shows a Version Mismatch Warning confirmation dialog.
If you authorize the devices in spite of the warning, the configuration syntax may not be
fully supported in the selected ADOM.
7. (Optional) In the Assign New Device Name list, type a different name for the device.
8. (Optional) In the Assign Policy Package list, select a policy package.
9. (Optional) In the Assign Provisioning Template list, select a profile.
10. (Optional) In the Assign Dashboard Config list, select a device to copy custom device dashboards from.
For more information about dashboards in the device database, see Device DB - Dashboard on page 180.
11. Click OK to authorize the device or devices.
The device or devices are authorized, and FortiManager can start managing the device or devices.
You can hide unauthorized devices from view, and choose when to view hidden devices. You can authorize or delete
hidden devices.
Type the following command lines to enable or disable unauthorized devices to be authorized with FortiManager.
config system admin setting
set unreg_dev_opt {add_allow_service | add_no_service | ignore}
end
unreg_dev_opt Set the action to take when an unauthorized device connects to FortiManager.
add_allow_service Add unregistered devices and allow service requests.
add_no_service Add unregistered devices but deny service requests.
ignore Ignores unregistered devices.
Using the Import Device List and Export Device List option, you can import or export a large number of devices, ADOMs,
device VDOMs, and device groups. The device list is a compressed text file in JSON format.
You can also use the Export to CSV option to export a device list to CSV format. However, you cannot use the
CSV format to import a device list to FortiManager. You can only import a device list that was exported to JSON format.
Advanced configuration settings such as dynamic interface bindings are not part of
import/export device lists. Use the backup/restore function to backup the FortiManager
configuration.
Proper logging must be implemented when importing a list. If any add or discovery operations
fail, there must be appropriate event logs generated to help you trace what occurred.
6. Click Current ADOM to export the device list from the current ADOM, or click All ADOM to export the device list from
all ADOMs.
A device list in JSON format is exported in a compressed file (device_list.dat).
Configure the management address setting on a FortiManager that is behind a NAT device so the FortiGate can initiate a
connection to the FortiManager. By configuring the management address setting in the CLI, FortiManager knows the
public IP and can configure it on the FortiGate.
When a FortiGate is discovered by a FortiManager that is behind a NAT device, the FortiManager does not automatically
set the IP Address on the FortiGate. This prevents the FortiGate from pointing to the FortiManager's private IP address
and initiating the FortiGate-FortiManager (FGFM) tunnel to the FortiManager.
You can use the CLI to configure the management address when the NAT device in front of the FortiManager has a
static 1:1 NAT rule.
In the FortiManager CLI, enter the following command to define either the management IP address or FQDN.
config systems admin setting
set mgmt-addr <string>
set mgmt-fqdn <string>
Multiple IP addresses or FQDNs can be configured for FortiManager. When multiple addresses are listed, the FortiGate
will attempt to establish the FGFM tunnel using the first IP/FQDN listed, and if it is unreachable will try each subsequent
IP/FQDN until the tunnel is established. Only one address is ever used to establish the FGFM tunnel at a time.
In FortiManager-HA, when listing multiple management addresses, the first address defines the Primary device and the
second address is the Secondary device.
The set mgmt-fqdn command can be used with FQDNs and IP addresses.
2. FortiManager automatically pushes the configuration to FortiGate, and on the FortiGate you can see both
management addresses listed:
FortiManager supports the private data encryption settings on FortiOS. FortiGates with the private-data-
encryption setting enabled can be managed by FortiManager.
When a FortiGate with the private-data-encryption setting enabled is added to FortiManager, FortiManager
requires the FortiGate encryption key to be entered in FortiManager to successfully install device configuration settings
and manage the added FortiGate. To know more about adding devices to FortiManager, see Add devices on page 84.
1. Go to Device Manager > Device & Groups. The Device Manager prompts with a Warning dialog that requires the
FortiGate encryption key to be entered:
2. Enter the correct encryption key into the Private Data Encryption Key field for each of the listed FortiGates. The
Warning dialog lists all the FortiGates for which the respective encryption keys are required.
If the encryption key does not match, the verification fails, and you may try again with the correct key.
Once the added FortiGates are verified, you may start managing the added devices.
Every time you try to install configuration settings to the managed FortiGates, FortiManager checks if the FortiGate
encryption is correct. If the encryption key is incorrect, the added device is disabled for installation.
You may verify devices again from the Device Manager by entering the correct encryption keys for the disabled
FortiGates.
Device blueprints can be used when adding model devices to simplify configuration of certain device settings, including
device groups, configuring pre-run templates, policy packages, provisioning templates, and more.
Once a device blueprint has been created, it can be selected when adding a model device or when importing multiple
model devices from a CSV file. See Adding offline model devices on page 96.
Devices that are assigned the blueprint are automatically configured with the settings specified by the blueprint when
they are added to FortiManager.
As an exmaple, device blueprints can be used to simplify the onboarding of branch devices in an SD-WAN configuration
when using SD-WAN Overlay Templates by configuring the default device group to which the devices are added. See
SD-WAN overlay orchestration on page 511.
1. Go to Device Manager, and select Device Blueprint from the Add Device dropdown menu.
Previously configured blueprints are displayed in the table below and can be edited or deleted.
2. Click Create New to add a new blueprint.
3. Configure the following information for the blueprint:
Device Model Select the model type that the device blueprint will be applied to.
Automatically Link to Real Enable to allow the model device to automatically link to the real device.
Device See Adding offline model devices on page 96.
Add to Device Group Enable to add one or more device groups. All devices assigned this device
blueprint are added to the selected device group(s).
Add to Folder Enable to add the devices to the specified folder in the Device Manager.
Fabric Authorization Template Enable to add a Fabric Authorization Template to the device blueprint, and
then select or create a template from the dropdown menu. See Fabric
authorization templates on page 256.
Pre-Run CLI Template Enable to add a Pre-run CLI Template to the device blueprint, and then
select or create a template from the dropdown menu. See Adding CLI
templates on page 292.
Assign Policy Package Enable to add a Policy Package to the device blueprint, and then select the
Policy Package from the dropdown menu. Devices added with this device
blueprint will be automatically assigned the selected Policy Package. See
Managing policies on page 349.
Provisioning Template Select provisioning templates. You can assign system, IPsec, SD-WAN,
static route, BGP, CLI, and IPS templates, or select a template group. See
Provisioning Templates on page 252.
Heartbeat Interfaces Select the heartbeat interfaces and set their priority.
1. Go to Device Manager, and select Device Blueprint from the Add Device dropdown menu.
2. Select an existing device blueprint from the table. The following actions are available:
a. Edit: You can edit an existing device blueprint. Changes made to existing blueprints only affect new devices
added to FortiManager after the changes have been made; devices previously configured with the blueprint are
not affected.
b. Delete: Delete an existing device blueprint.
When creating a new FortiGate CNF instance in the FortiGate CNF console, you must enable
FortiManager Mode in order to manage the instance in FortiManager. This setting cannot be
changed after the instance is created.
You can only see the FortiGate connection information if the instance was created with
FortiManager Mode enabled.
1. In the FortiGate CNF console, in the Display Primary FortiGate Information field in the Edit CNF form, find the
FortiGate connection details.
2. In FortiManager, go to Device & Groups > Add Device.
3. Click Discover Device.
4. Enter the IP Address of the FortiGate CNF instance.
5. Enable Use Legacy Device Login and enter the User Name and Password, then click Next.
6. Update or enter any required details and click Next.
7. Click Finish. The FortiGate CNF instance is added to FortiManager. There may be a short delay before the device is
available.
8. Import the FG-traffic policy package from the FortiManager instance into FortiManager. Use this policy package to
install policies to the FortiGate CNF instance.
When adding a FortiGate CNF instance, you will only see details of the primary FortiOS node.
Other nodes are not displayed in the Members list on FortiManager.
This section describes how to add a FortiGate model by using the pre-shared key for FortiGate for zero-touch
provisioning (ZTP). You must perform some steps using FortiManager and some steps using FortiOS.
1. If ADOMs are enabled, select the ADOM to which you want to add the device.
2. Go to Device Manager > Device & Groups.
3. Click Add Device. The Add Device wizard displays.
4. Click Add Model Device and type a name for the model device.
5. Beside Link Device By, select Pre-shared Key, and type the pre-shared key from FortiGate.
6. Set the remaining options, and click Next. The device is created in the FortiManager database.
This section describes how to add a FortiGate model device to FortiManager by using the serial number for the FortiGate
for zero-touch provisioning (ZTP). You must perform some steps using FortiManager and some steps using FortiOS.
1. If ADOMs are enabled, select the ADOM to which you want to add the device.
2. Go to Device Manager > Device & Groups.
3. Click Add Device. The Add Device wizard displays.
4. Click Add Model Device and type a name for the model device.
5. Beside Link Device By, select Serial Number and type the serial number for the FortiGate unit.
6. Set the remaining options, and click Next. The device is created in the FortiManager database.
7. Click Finish to exit the wizard.
After the device model is added to FortiManager, you can use FortiManager to configure the model device.
8. In FortiOS GUI, configure the FortiManager IP address.
a. Go to Security Fabric > Fabric Connectors.
b. Under Other Fortinet Products, double-click the FortiManager tile to open it for editing.
c. In the IP address box, type the FortiManager IP address, and click OK.
FortiManager automatically links the model device to the real device, and installs configurations to the device.
This section describes how to add a FortiGate model device to FortiManager by using a device template. You can either
use a site template or a provisioning template to add a model device. You must perform some steps using FortiManager
and some steps using FortiOS.
1. Go to Device Manager > Provisioning Templates > System Templates, and create a new system template.
The Allow Override option allows overriding profile values when using a provisioning
template to add a model device. Use the option while creating a template to override any
profile values later when you add a model device using a provisioning template. If the
option is left unchecked, you cannot override profile values when adding a model device
using a provisioning template.
2. Go to Device Manager > Device & Groups > Add Device. The Add Device dialog appears.
Serial Number Add the serial number of the FortiGate device to be added.
Device Model Select the device model from the drop-down list.
Provisioning Template Click to display the Assign Provisioning Templates dialog box, and
then select the system template you created in Step 1.
To continue without overriding the profile values, proceed with the next steps. To override profile values in the
system template:
a. Click Override Profile Value. The template widget override dialog appears.
b. Select the interface and click Edit. The Edit Action dialog appears.
You can only change the fields that were configured with the Allow Override option
while creating the template. If the option was left unchecked, you cannot override
profile values when adding a model device using a provisioning template.
Adding a FortiAnalyzer or FortiAnalyzer BigData device to FortiManager gives FortiManager visibility into the logs on the
FortiAnalyzer, providing a Single Pane of Glass on FortiManager. It also enables FortiAnalyzer Features, including:
l FortiView
l Log View
l Incidents & Events
l Reports
For information about FortiAnalyzer Features, see FortiAnalyzer Features on page 37. See also Viewing policy rules on
page 130 and View logs related to a policy rule on page 347.
ADOMs disabled
When you add a FortiAnalyzer device to FortiManager with ADOMs disabled, all devices with logging enabled can send
logs to the FortiAnalyzer device. You can add only one FortiAnalyzer device to FortiManager, and the FortiAnalyzer
device limit must be equal to or greater than the number of devices managed by FortiManager.
When you add additional devices with logging enabled to FortiManager, the managed devices can send logs to the
FortiAnalyzer device. The new devices display in the Device Manager pane on FortiAnalyzer unit when FortiManager
synchronizes with the FortiAnalyzer unit.
ADOMs enabled
When you add a FortiAnalyzer device to FortiManager with ADOMs enabled, all devices with logging enabled in the
ADOM can send logs to the FortiAnalyzer device. Following are the guidelines for adding a FortiAnalyzer device to
FortiManager when ADOMs are enabled:
l FortiAnalyzer devices can be added to each ADOM, and the FortiAnalyzer device limit must be equal to or greater
than the number of devices in the ADOM.
l The same FortiAnalyzer device can be added to more than one ADOM.
l The same ADOM name and settings must exist on the FortiAnalyzer device and FortiManager. The wizard
synchronizes these settings for you if there is a mismatch.
l The logging devices in the FortiAnalyzer ADOM and FortiManager ADOM must be the same. The wizard
synchronizes these settings for you.
l When one FortiAnalyzer is added to more than one ADOM, FortiAnalyzer features and visibility in the ADOM are
limited to the logging devices included in the ADOM.
When you add additional devices with logging enabled to an ADOM in FortiManager, the managed devices can send
logs to the FortiAnalyzer device in the ADOM. The new devices display in the Device Manager pane on the FortiAnalyzer
unit when FortiManager synchronizes with the FortiAnalyzer unit.
After you add a FortiAnalyzer device to FortiManager, you can use FortiManager to enable logging for all FortiGates in
the root ADOM (when ADOMs are disabled) or the ADOM (when ADOMs are enabled) by using the log settings in a
system template. See System templates on page 259.
Logs are stored on the FortiAnalyzer device, not the FortiManager device. You configure log storage settings on the
FortiAnalyzer device; you cannot change log storage settings using FortiManager.
When FortiManager manages a FortiAnalyzer unit, all configuration and data is kept on the FortiAnalyzer unit to support
the following FortiAnalyzer features: FortiView, Log View, Incidents & Events, and Reports. FortiManager remotely
accesses the FortiAnalyzer unit to retrieve requested information for FortiAnalyzer features. For example, if you use the
Reports pane in FortiManager to create a report, the report is created on the FortiAnalyzer unit and remotely accessed
by FortiManager.
If the FortiAnalyzer or FortiAnalyzer BigData device is receiving logs from devices that are not managed by
FortiManager, the wizard requires you to add the devices to FortiManager by typing the IP address and login credentials
for each device. Ensure that you have the IP addresses and login credentials for each device before you start the wizard.
The Add FortiAnalyzer option is hidden when you cannot add a FortiAnalyzer unit to the
FortiManager unit. For example, the Add FortiAnalyzer option is hidden if you have already
added a FortiAnalyzer unit to the FortiManager unit (when ADOMs are disabled) or to the
ADOM (when ADOMs are enabled). You also cannot add a FortiAnalyzer unit when you have
enabled FortiAnalyzer features for the FortiManager unit.
FortiManager and FortiAnalyzer must be running 5.6 or later, and the versions must be the
same on both devices.
After completing the wizard, ensure that you enable logging on the devices, so the managed FortiAnalyzer can receive
logs from the devices. You can enable logging by using the log settings in a system template. See System templates on
page 259.
1. Confirm that the FortiAnalyzer device supports the number of devices managed by FortiManager.
l If ADOMs are disabled, ensure that the FortiAnalyzer device limit is equal to or greater than the number of
5. Use the Add New FortiAnalyzer tab to add new FortiAnalyzer devices to FortiManager.
When adding a FortiAnalyzer device that is already being managed on another ADOM in FortiManager, select the
Add Existing FortiAnalyzer option. See Add an existing FortiAnalyzer using the wizard on page 128.
6. Toggle Use legacy device login to ON.
The User Name and Password boxes are displayed.
7. Type the IP address, user name, and password for the device, then click Next.
FortiManager probes the IP address on your network to discover FortiAnalyzer device details, including:
l IP address
l Host name
l Serial number
l Device model
l Firmware version (build)
l High Availability status
l Administrator user name
Name Type a unique name for the device. The device name cannot contain spaces
or special characters (optional).
Status Description
FMG Only The device was located in FortiManager, but not FortiAnalyzer. If you proceed with the
wizard, the device will be added to FortiAnalyzer too.
FAZ Only The device was located in FortiAnalyzer, but not FortiManager. If you proceed with the
wizard, the device will be added to FortiManager too. The login and password for the
device is required to complete the wizard.
Sync The device was located in both FortiAnalyzer and FortiManager without any differences,
and the wizard will synchronize the device between FortiManager and FortiAnalyzer.
Mismatched The device was located in both FortiAnalyzer and FortiManager with some differences,
and the wizard will synchronize the device settings between FortiManager and
FortiAnalyzer to remove the differences.
If the FortiManager ADOM does not exist on the FortiAnalyzer device, a warning is displayed. You can add the
ADOM and devices to FortiAnalyzer by clicking the Synchronize ADOM and Devices button.
9. Click Synchronize ADOM and Devices to continue.
a. If you are synchronizing devices from FortiAnalyzer to FortiManager, type the IP address and login for each
device, and click OK to synchronize the devices.
b. After the devices successfully synchronize, click OK to continue.
The devices, ADOM name, and ADOM version are synchronized between FortiAnalyzer and FortiManager.
The FortiAnalyzer device is displayed on the Device Manager pane as a Managed FortiAnalyzer, and FortiAnalyzer
features are enabled.
1. Confirm that the FortiAnalyzer device supports the number of devices managed by FortiManager.
2. Select the ADOM to which you want to add the device.
3. Go to Device Manager > Device & Groups.
4. Click the Add Device dropdown and select Add FortiAnalyzer. The wizard opens.
5. Click the Add Existing FortiAnalyzer tab, and select the existing FortiAnalyzer from the dropdown.
FortiManager retrieves the device details from the local database.
The following configuration is required in the FortiManager CLI before adding a FortiAnalyzer using a fabric connection:
Under config system interface, the port's allowaccess setting includes fabric.
1. In the FortiAnalyzer, go to System Settings > Fabric Management > Fabric Connectors.
7. In the authorization page, select the ADOM to add the FortiAnalyzer to and click Next.
8. After authorizing, the FortiAnalyzer is added to FortiManager under Device Manager > Device & Groups > Managed
FortiAnalyzer.
Alternatively, you can authorize the FortiAnalyzer from the FortiManager GUI.
When a FortiAnalyzer is managed by a FortiManager, you can view the logs that the FortiAnalyzer unit receives. In the
Log View module, you can also view the policy rules by clicking a policy ID number.
See Add FortiAnalyzer or FortiAnalyzer BigData on page 122.
Add VDOM
You can add a VDOM to a FortiGate by using the content pane or by using the device database. This topic describes
how to use the content pane. For information on using the device database, see Device DB - System Virtual Domain on
page 193.
Two types of VDOM modes available: Split-Task VDOM and Multi VDOM.
The number of VDOMs you can add is dependent on the device model. For more information,
see the Maximum Values Table in the Fortinet Document Library.
Kubernetes Service must be enabled on the server side for AWS, Azure, OCI and, GCP for
Kubernetes to function for the particular cloud platform. Once the service is enabled,
Kubernetes can be configured for the particular cloud platform in FortiManager.
The Split-Task VDOM mode creates two VDOMs automatically: FG-traffic and root. Additional VDOMs cannot be added.
FG-traffic is a regular VDOM and can contain policies, UTM profiles and it will handle the traffic like the no-VDOM mode.
The root VDOM is only for management and it cannot have policies or profiles.
The Multi VDOM mode allows you to create multiple VDOMs as per your license.
Management IP Address 1 / 2 Type the management IP addresses and network masks for the VDOM.
This setting is only available when Operation Mode is Transparent.
Kubernetes Service must be enabled on the server side for AWS, Azure, OCI and, GCP for
Kubernetes to function for the particular cloud platform. Once the service is enabled,
Kubernetes can be configured for the particular cloud platform in FortiManager.
Device groups
When viewing a device group entry from the Managed FortiGate table on Device Manager > Device & Groups, the
device group entry is displayed in an expanded hierarchical view and the device listings within the group entry are
displayed by default.
You can collapse or expand the device group entry in the table. From the toolbar above the table, you can create, edit,
and delete device groups.
The maximum number of device groups that can be created is the same as the maximum
number of devices/VDOMs supported for your VM license or model. See the FortiManager
data sheet on https://www.fortinet.com/ for information about the maximum number of
supported devices/VDOMs for your VM license or device.
When you add devices to FortiManager, devices are displayed in default groups based on the type of device. For
example, all FortiGate devices are displayed in the Managed FortiGate group. You can create custom device groups.
You can create a custom device group and add devices to it.
FortiManager allows nested device groups. For example, you can create Device Group A and
add it under Device Group B.
You can manage device groups from the Device Manager > Device & Groups pane. From the Device Group menu,
select one of the following options:
Option Description
Option Description
Edit Group Edit the selected device group. You cannot edit default device groups.
You must delete all devices from the group before you can delete the group. You must delete
all device groups from an ADOM before you can delete an ADOM.
Table view
On the Device Manager > Device & Groups pane, you can choose Table View from the toolbar to monitor devices. The
Table View displays a list of managed devices in a view that resembles a table.
The table view includes a quick status bar, and you can customize the columns.
This section also includes the following topics:
l Using the quick status bar on page 134
l Viewing managed devices on page 135
l Viewing configuration status on page 136
l Viewing policy package status on page 138
l Editing device information
l Setting values for required meta fields on page 140
l Customizing columns on page 141
l Displaying Security Fabric topology on page 142
l Refreshing a device
l Using device group tree menus on page 143
l Installing VM licenses on managed devices on page 144
You can quickly view the status of devices on the Device Manager pane by using the quick status bar, which contains the
following donut charts:
l Connectivity
l Device Config Status
l Policy Package Status
l FortiAP Status
l FortiSwitch Status
l Firmware Status
l FortiGuard License
By default, the Show Charts toggle is enabled to display the quick status bar. You can select which charts appear in the
quick status bar by selecting them in the Show Charts dropdown. Alternatively, you can hide the quick status bar and all
its charts by disabling the Show Charts toggle.
Mouse over the charts to see more information in a tooltip. Click a section of a chart to filter the charts and the table by
that information. You can apply multiple filters across the charts. Once filtered, a filter icon appears next to the chart title;
click the filter icon to remove the filter.
1. Go to Device Manager > Device & Groups, and select a device group of authorized devices.
The quick status bar is displayed above the table view. If it is not visible, enable the Show Charts toggle.
On the Device Manager pane in Table View, you can view all managed devices and access detailed status information.
You can customize what columns are displayed in Table View. See Customizing columns on page 141.
Device Name The name of the device and its connectivity status.
Managed by SD- Displays if SD-WAN management is enabled or disabled for the device. See
WAN Manager SD-WAN Devices on page 501.
Auto-link Status Displays the auto-link status of model devices as either Enabled or Disabled.
You can change the auto-link status by editing the device or by clicking on the
status in the column and selecting Disable Auto-link or Enable Auto-link.
Config Status Displays the status of the configuration for the managed device. For details,
see Viewing configuration status on page 136.
Host Name The host name for the device (available for managed devices).
Controller Counter The number of each device type controlled by this device, such as FortiAPs
and FortiSwitches.
Firmware Version Displays the version of the firmware currently installed on the managed
device.
If a vulnerability has been identified for the FortiGate firmware, a notification
will display below the firmware version. Click the notification to review the
details, including the IR, Title, Severity, and CVE for the vulnerability.
Alternatively, click the notification in the banner to open the Vulnerable
Devices pane where you can create a firmware template to upgrade the
affected devices. See Creating firmware templates on page 309.
Upgrade Status Displays whether a firmware upgrade is available for the managed device.
Firmware Template Displays the name of the assigned firmware template. The firmware template
specifies what firmware version should be installed on the device.
A status icon indicates whether the device is running the firmware version
specified in the firmware template.
Policy Package Status Displays the status of the policy package for the managed device. For details,
see Viewing policy package status on page 138.
Click on the policy package name to go to view and manage the package. See
Managing policy packages on page 336.
Hover the mouse over the assigned template or group to display and access
an edit option.
Contact Email Displays the email of a contact for the managed device.
Contact Phone Number Displays the phone number of a contact for the managed device.
On the Device Manager pane, you can view the configuration status for managed devices.
For a description of other columns on the Device Manager pane, see Viewing managed devices on page 135.
3. In the tree menu, click the device group name, for example, Managed Devices. The devices in the group are
displayed in the content pane.
The following table identifies the different config statuses.
Modified (recent auto- Yellow triangle Configurations are modified on FortiManager and
updated) configurations modified on the managed device are
auto synced to FortiManager.
A config status in Conflict can be resolved by retrieving the configuration from the managed device or by re-installing
FortiManager's stored configuration:
1. Using the configuration from the Managed Device
a. Go to Device Manager, and select the managed device from the Managed FortiGate tree menu to enter the
device database.
b. On the Dashboard > Summary page, select the revision history icon in the Configuration and Installation
widget.
c. Select the revision from the managed device, and click Retrieve Config. The FortiManager will retrieve the
selected revision from the managed device. See Device DB - configuration management on page 186.
d. Once the configuration has been retrieved, re-import the policy to synchronize the policy package status
between the managed device and FortiManager. See Import Configuration wizard on page 157.
2. Using the configuration from FortiManager:
a. Go to Device Manager, and select the managed device from the devices table.
b. Select Install > Install Wizard > Install Device Settings (Only). See Install device settings only on page 163.
The device settings stored in FortiManager are installed on the managed device.
On the Device Manager pane, you can view the policy package status for managed devices.
For a description of other columns on the Device Manager pane, see Viewing managed devices on page 135.
Use the Edit Device page to edit information about a device. The information and options available on the Edit Device
page depend on the device type, firmware version, and which features are enabled. Some settings are only displayed
when FortiAnalyzer features are enabled.
Pre-Shared Key Enter the model device’s pre-shared key. Select Show Pre-shared Key to see
the key.
This option is only available when editing a model device that was added with
a pre-shared key.
Automatically link to real Select to automatically authorize the device to be managed by FortiManager
device when the device is online.
This option is only available when editing a model device.
Admin User Change the administrator user name for the device.
If the FortiManager serial number is not specified for central management on
FortiGate, the admin user/password specified here is used by FortiManager to
login to the FortiGate. This also includes FortiManager geo-HA failover where
the FortiGate may only have the primary FortiManager IP configured.
Connected Interface Displays the name of the connected interface, if the connection is up.
Meta Fields Displays default and custom meta fields for the device. Optional meta fields
can be left blank, but required meta fields must be defined.
See also Setting values for required meta fields on page 140.
When a required meta field is defined for a device object, a column automatically displays on the Device Manager pane.
The column displays the value for each device. When the required meta field lacks a value, an exclamation mark
displays, indicating that you must set the value.
See also Meta Fields on page 941.
5. Under Meta Fields, complete the options labeled as Required, and click OK.
The value displays on the Device Manager pane.
Customizing columns
You can choose what columns display on the content pane for the Device Manager > Device & Groups pane.
Column settings are not available for all device types. The default columns also vary by device type.
You can filter columns that have a Filter icon. Column filters are not available for all columns.
The columns available in the Column Settings menu depends on features enabled in
FortiManager. When the FortiAnalyzer feature set is disabled, all related settings are hidden in
the GUI.
To customize columns:
The FortiManager Device Manager includes filters that can be applied to columns in the device table. Multiple filters can
be applied simultaneously.
1. Go to Device Manager.
2. Click on the filter icon next to a column header. The Filter dialog option is displayed for the selected column.
l Filter options include Contains, Exact Match, and Not which can be applied to a keyword search.
l Filter suggestions are populated with identified values for the selected column below the search bar.
3. After the filter has been configured, click Apply. The filter icon color changes to indicate that a filter is applied to
that column.
You can remove the filter on a column by clicking the filter icon and then clicking Remove.
For Security Fabric devices, you can display the Security Fabric topology.
Refreshing a device
Refreshing a device refreshes the connection between the selected devices and the FortiManager system. This
operation updates the device status and the FortiGate HA cluster member information.
To refresh a device:
In Table View when Display Device/Group tree view in Device Manager is enabled, the left tree menu displays devices
under device groups, and you can right-click devices and access menu options.
By default, device group tree menu is enabled, and devices are displayed in the following groups in the tree menu:
l Managed FortiGate
l Logging Devices, if FortiAnalyzer Features are enabled
l Unauthorized Devices, if any unauthorized devices are present in the root ADOM
If you have created custom device groups, the custom groups and the devices they contain are displayed in the left tree
menu too. See Device groups on page 133.
The following table identifies what menu options you can access when you right-click a device in the left tree menu:
You can install VM licenses on managed FortiGate and FortiWeb VMs using the FortiManager Device Manager,
enabling management and replacement of license files without having to directly access the VM.
FortiManager retrieves the license information from a provided license file or FortiFlex configuration, and then provides
the license to the managed device. Because the managed device gets the license information directly from
FortiManager, this feature can be used to install licenses on VMs that are operating in an air-gapped environment.
When you are installing VM licenses using a FortiFlex connector, you must first configure the
FortiFlex connector as well as created a Configuration and Flex Entitlement for the device on
FortiFlex. See Creating FortiFlex connectors on page 747 and the FortiFlex documentation.
After a license has been installed onto the device using FortiManager, the device will reboot to complete the installation.
4. Select a managed device from the table, and right-click on it to view the context menu.
5. Select Install VM License.The Install VM License wizard opens.
6. Select FortiFlex Connector, and select the previously configured FortiFlex connector in the dropdown menu.
7. Select a FortiFlex Configuration. Available configurations are pulled automatically from FortiFlex using the selected
connector.
8. Click OK.
After a license has been installed onto the device using FortiManager, the device will reboot to complete the installation.
Ring view
To prevent timeout, ensure Idle Timeout is greater than the widget's Refresh Interval. See Idle
timeout on page 1027 and Settings icon on page 148.
On the Device Manager > Device & Groups pane, you can choose Ring View from the toolbar to monitor devices.
The Ring View dashboard communicates the configuration status between FortiManager and managed devices.
The center of the Ring View dashboard includes a circular chart that automatically rotates to communicate configuration
status about managed devices. You can control what information displays by using the following controls at the top of the
widget:
Playing and Click to start and pause the automatic rotation of the circle chart.
Paused
Zoom in and out Use the Zoom in and Zoom out tools to enlarge and shrink areas of the circle chart. When
zoomed in, use the scroll bar to move across the circle chart.
Rotate Options Specify whether the chart automatically displays information about Next Problematic Device
or One by One.
Settings icon Change the settings of the widget. Widgets have settings applicable to that widget, such as
how many of the top items to display, Time Period, Refresh Interval, and Chart Type.
Overall Device A summary of the status of all devices. The following colors are used to communicate status:
Status l Red indicates action is required now.
Each device is represented by a segment in the circle. Click each segment to display the
following information about the selected device in the middle of the circle:
l Host name
l IP address
l Firmware version
Information about the following statuses of the selected device is also displayed on the right:
l Connectivity status
l Support Contracts
l Licenses
The colored rings in the circle correspond to the status information on the right. The outer ring
in the circle corresponds with the Connectivity status. The second most outer ring
corresponds to the Supports Contracts status, and so on.
Require Action The number of devices that require configuration changes. The number is displayed in a red
box.
Will Soon Require The number of devices that will require configuration changes in the near future. The number
Action is displayed in an orange box.
Total Number of The total number of devices displayed on the dashboard. The number is displayed in a blue
Devices box.
Connectivity Displays the connectivity status for the selected device. Click the Connectivity link to display
the selected device on the Device Manager > Device & Groups pane.
Support Contracts Displays the expiration date of the support contracts for the selected device. Click the Support
Contracts link to display the selected device on the Device Manager > License pane.
Licenses Displays the expiration date of the licenses for the selected device. Click the Licenses link to
display the selected device on the Device Manager > License pane.
Configuration Displays the configuration status for the selected device. Click the Configuration Status link to
Status display the selected device on the Device Manager > Device & Groups pane.
Policy Package Displays the policy package status for the selected device. Click the Policy Package Status
Status link to display the selected device on the Device Manager > Device & Groups pane.
FortiView monitors contain widgets that provide network and security information. Use the controls in the dashboard
toolbar to work with a dashboard.
Time Period Select a time period from the dropdown menu, or set a custom time period.
Dark Mode Enable/disable dark mode. Dark mode shows a black background for the widgets in the
dashboard.
Hide Side-menu or Using the main toolbar, you can hide or show the tree menu on the left. In a typical SOC
Show Side-menu environment, the side menu is hidden and dashboards are displayed in full screen mode.
Use the controls in the widget title bar to work with widgets.
You can add any widget to a custom or predefined dashboard. You can also move, resize, or remove widgets. You
cannot rename or delete a predefined dashboard. To reset a predefined dashboard to its default settings, open the
dashboard and click Edit Layout > Reset Layout.
To create a dashboard:
To add a widget:
1. Select the predefined or custom dashboard where you want to add a widget.
2. Click Add Widget to see a list of available widgets. Select the widget(s) you would like to add.
3. When you have finished adding widgets, click Save Changes to close the Add Widget pane.
Map view
On the Device Manager > Device & Groups pane, you can choose Map View from the toolbar to monitor devices.
The Map View displays the location of managed devices on Google Maps. With Map View you view and configure the
location of FortiGate devices on the map. You can also manage devices directly from Map View.
l Orange - Shows a warning status. The device configuration status or policy package configuration status is Out
On Map View, you can position devices on the map to assign an address to each device. You can also filter the view to
display only devices with unknown locations to help you position those devices on the map.
The small map opens and displays an Enter a location box for the selected device.
4. In the Enter a location box, type the city name, and press Enter.
The device is positioned in the city on the map.
5. On the map, drag the device to the desired location in the city.
6. Select the Show Unpositioned Devices to display only devices with an unknown location and position them.
7. Click Close.
On Map View, you can view device configuration status and policy package status. You can also right-click a device to
display a menu and run various operations.
4. Right-click the device to display a menu of options and run various operations such as Quick Install, Install Wizard,
Import Policy, Re-install Policy, Policy Package Diff, Edit, Refresh Device, Add VDOM, and Run Script.
On Map View, you can filter the display to view only devices with problematic statuses.
Folder view
On the Device Manager > Device & Groups pane, you can choose Folder View from the toolbar to monitor devices. The
Folder View lets you organize devices within a tree menu. In Folder View , you can create, nest, and move folders in the
tree menu. You can also move devices between folders.
In Folder View, you can also view in one pane each managed FortiGate and all access devices connected to the
FortiGate, such as FortiAPs, FortiSwitches, and FortiExtenders. You can view the firmware version installed on each
device, and you can assign a firmware template to the FortiGate that also includes firmware for access devices, such as
FortiAPs, FortiSwitches, and FortiExtenders.
See also Firmware templates on page 309.
Folder View is not available when the ADOM device mode is set to Advanced. See ADOM
device modes on page 904.
3. From the Display Options menu, choose from the following options:
l Fabric View: Indents attached devices, such as FortiSwitch and FortiAP devices, under the FortiGate to which
l Device Type View: Displays the list of devices by device type, such as FortiGate, FortiAP, and FortiSwitch.
Creating folders
To create folders:
4. In the Name box, type a name for the folder, for example, folder1, and click OK.
The new folder is created and visible in the tree menu. Also, the FortiGates in the folder are now displayed in the
content pane.
You can add FortiGates directly to a folder by selecting devices from the Available Entries
list in the Create New Folder dialog.
Nesting folders
1. In the tree menu, right-click the folder you intend to nest, and select Create New Folder.
For instance, right-click the previously created named folder1, and select Create New Folder.
The Create New Folder dialog opens.
In Folder shows that the new folder will be created within folder1.
2. In the Create New Folder dialog, type a name for the folder, for example, nested-folder, and click OK.
The nested-folder is created and displayed in the tree menu under the previously created folder1. Also, the folder
and the FortiGates in the parent folder are displayed in the content pane.
4. In the Edit Folder dialog, select the FortiGate to be moved from the Available Entries list, and click OK.
Alternatively, from the Device & Groups pane, select a FortiGate, drag and drop it on the
folder to which you want to move it.
Moving folders
To move a folder:
4. In the Move Folder dialog, under In Folder, select the destination folder, here folder2.
Click OK.
You can use the Import Configuration wizard to import policies, objects, AP profiles, and FortiSwitch templates from
managed devices to FortiManager.
This section contains the following topics:
l Importing policies and objects on page 157
l Importing AP profiles and FortiSwitch templates on page 159
The import policy wizard helps you import policy packages and objects from managed FortiGates as well as specify per-
device or per-platform mappings for FortiGate interfaces. Default or per-device mapping must exist or the installation will
fail.
After initially importing policies from the device, make all changes related to policies and
objects in Policy & Objects on the FortiManager.
Making changes directly on the FortiGate device will require reimporting policies to
resynchronize the policies and objects.
See ADOM versions on page 916 to determine which ADOM versions can import
configurations from which device firmware versions.
Policy Package Name (Optional) Type a name for the policy package.
Folder (Optional) Select a folder on the dropdown menu. The default storage folder is
root.
Object Selection Select Import only policy dependent objects to import only policy dependent
objects for the device.
Select Import all objects to import all objects for the selected device.
Device Interface Displays the enabled interfaces for the device for which you are importing
policies.
Mapping Type For each enabled device interface, select one of the of the following
options: Per-Device or Per-Platform.
Normalized Interface Displays the name of the normalized interface to which the device interface is
mapped.
Add mapping for all unused Select to automatically create interface maps for unused device interfaces.
device interfaces
9. If object conflicts are detected, choose whether to use the value from FortiGate or FortiManager, and click Next.
The object page searches for dependencies, and reports any conflicts it detects. If conflicts are detected, you must
decide whether to use the FortiGate value or the FortiManager value. If there are conflicts, you can select View
Conflict to view details of each individual conflict. Duplicates will not be imported.
You can click Download Conflict File to save a file of the conflicts to your hard drive.
10. When finished managing object conflicts, click Next.
A list of objects to be imported is displayed.
11. Click Next to start the import process.
When the import process completes, a summary page is displayed.
You can click Download Import Report, and save the report file to your hard drive.
Objects are imported into the common database, and the policies are imported into the selected package.
The import process removes all policies that have FortiManager generated policy IDs,
such as 1073741825, that were previously learned by the FortiManager device. The
FortiGate unit may inherit a policy ID from the global header policy, global footer policy,
policy block, or VPN console.
Importing the FortiClient EMS configuration from FortiGate is not supported. See Creating
FortiClient EMS connectors on page 681.
You can import AP profiles and FortiSwitch templates using the Import configuration wizard. In order to import AP profile
and FortiSwitch templates, central management must be enabled for the chosen ADOM.
8. After the import has successfully completed, imported AP profiles and FortiSwitch templates are visible in
AP Manager > WiFi Profiles > AP Profile and FortiSwitch Manager > FortiSwitch Templates respectively.
Install wizard
l To use the Install Wizard to install policy packages and device settings to one or more FortiGate devices, see
Installing policy packages and device settings on page 161.
l To use the Install Wizard to install device settings only, see Install device settings only on page 163.
l To reinstall a policy package without using the Install Wizard, see Reinstall a policy package on page 341.
If auto-push is enabled, policy packages and device settings will be installed to offline devices
when they come back online. See Creating ADOMs on page 909 for information on enabling
this feature.
FortiManager 7.4.1 and later supports partial installs the JSON API.
You can use the Install Wizard to install policy packages and device settings to one or more FortiGate devices, including
any device-specific settings for the devices associated with that package.
To use the Install Wizard to install policy packages and device settings:
4. Select Install Policy Package & Device Settings and specify the policy package and other parameters. Click Next.
Policy Package Select the policy package from the dropdown list.
Date Click the date field and select the date for the installation in the calendar pop-
up.
Time Select the hour and minute from the dropdown lists.
5. On the next page, select one or more devices or groups to install, and click Next.
The select devices are validated. Validation includes validating the policy and object, the interface, and installation
preparation. Devices with validation errors are skipped for installation. The validation results are displayed.
If enabled, a policy consistency check will be performed and the results will be available (see Perform a policy
consistency check on page 346).
If there are errors in validation, click the link in the error message to see the progress report with the error lines
highlighted.
6. (Optional) Click the Install Preview button to view a preview of the installation. You can view multiple devices at the
same time.
l Click Download to download a text file of the installation preview details.
l Select a device from the Assigned Devices dropdown menu to preview the installation on the chosen device.
7. (Optional) Click the Policy Package Diff button to view the differences between the current policy and the policy in
the device. See also Viewing a policy package diff on page 165.
8. When validation is complete, click Install or Schedule Install (if you selected Schedule Install).
FortiManager displays the status of the installation and then lists the devices onto which the settings were installed
and any errors or warning that occurred during the installation process.
9. Click Finish to close the wizard.
You can use the Install Wizard to install device settings only to one or more FortiGate devices. The Install Wizard
includes a preview feature.
3. Select Install Device Settings (only) and if you want, type a comment. Click Next.
4. In the Device Settings page, select one or more devices to install, and click Next.
5. (Optional) Preview the changes:
a. Click Install Preview.
The Install Preview window is displayed. You have the option to download a text file of the settings.
b. Click Close to return to the installation wizard.
6. Click Install.
FortiManager displays the status of the installation and then lists the devices onto which the settings were installed
and any errors or warning that occurred during the installation process.
You can click the View History and View Log buttons for more information.
7. Click Finish to close the wizard.
Out-of-Sync device
FortiManager is able to detect when the settings were changed on the FortiGate and synchronize back to the related
policy and object settings. This allows you to know when the policy package is out-of-sync with what is installed on the
FortiGate.
When a change is made to the FortiGate, FortiManager displays an out-of-sync dialog box.
Select the View Diff icon to view the changes between the FortiGate and FortiManager.
You can select to accept, revert the modification, or decide later.
When accepting remote changes, all local configurations will be replaced by remote
configurations. When reverting, the FortiGate will be reset to the latest revision.
You can view details of the retrieve device configuration action in the Task Monitor. See Task Monitor on page 936.
You can view the difference between the policy package associated with (or last installed on) the device and the policies
and policy objects in the device.
The connection to the managed device must be up to view the policy package diff.
6. Beside Policy, click the Details link to display details about the policy changes.
7. In the Category row, click the Details link to display details about the specific policy changes.
8. Beside Policy Object, click the Details link to display details about the policy object changes.
9. Click Cancel to close the window.
On the first discovery of a FortiGate unit, the FortiManager system will retrieve the unit's configuration and load it into the
Device Manager. After you make configuration changes and install them, you may see that the FortiManager system
reorders some of the firewall policies in the FortiGate unit’s configuration file.
This behavior is normal for the following reasons:
l The FortiManager system maintains the order of policies in the actual order you see them and manipulate them in
the GUI, whereas the FortiGate unit maintains the policies in a different order (such as order of creation).
l When loading the policy set, the FortiManager system re-organizes the policies according to the logical order as
they are shown in the user interface. In other words, FortiManager will group all policies that are organized within
interface pairs (internal -> external, port1 -> port3, etc.).
The FortiManager system does not move policies within interface pairs. It will only move the configuration elements so
that policies with the same source/destination interface pairs are grouped together.
This behavior would only be seen:
l On the first installation.
l When the unit is first discovered by the FortiManager system. If using the FortiManager system to manage the
FortiGate unit from the start, you will not observe the policy reordering behavior.
Configuring a FortiGate unit using the device database in FortiManager is very similar to configuring FortiGate units
using the FortiOS GUI. You can also save the configuration changes to the configuration repository and install them to
other FortiGate units at the same time.
This document does not provide detailed procedures for configuring FortiGate units. See the FortiGate documentation
for complete information. The most up-to-date FortiGate documentation is also available in the Fortinet Document
Library.
To install the device database:
1. Go to Device Manager > Device & Groups.
2. In the toolbar, select Table View from the dropdown menu.
3. In the tree menu, select a device group.
4. In the content pane, select a device.
5. From the Install menu, select Quick Install (Device DB).
6. When the installation configuration is complete, click Finish.
The configuration changes are saved to the FortiManager device database instead of the FortiManager repository
represented by the Revision History window.
To view the history of the configuration installation, click the View History button in the History
column to open the Install History dialog box. This can be particularly useful if the installation
fails.
You can rename and reapply firewall objects after they are created and applied to a firewall
policy. When you do so, the FortiManager system will: delete all dependencies, delete the
object, recreate a new object with the same value, and recreate the policy to reapply the new
object.
Firmware upgrade
On the Device Manager > Device & Groups pane, you can view the firmware installed on managed devices, and you can
upgrade firmware for managed devices.
This section contains the following topics:
l Viewing installed firmware versions on page 167
l Upgrading firmware on page 167
You can view the installed firmware version for all managed devices in a group.
Upgrading firmware
From the Device Manager pane, you can update firmware for managed devices.
Upgrades can be scheduled to occur at a later date using firmware templates. See Firmware templates on page 309.
When workspace is enabled, you must lock a device (or ADOM) to allow firmware upgrade.
The FortiGate device requires a valid firmware upgrade license. Otherwise a Firmware Upgrade License Not Found
error is displayed.
When Boot to Alternate Partition After Upgrade is selected, the inactive partition will be
upgraded.
FortiGate devices must have a valid Firmware & General Updates (FMWR) contract in order
for firmware updates to be performed through FortiManager. This applies to firmware images
from FortiGuard and images that are manually uploaded to FortiManager.
When a FortiGate device is added to the FortiManager, a 24 hour grace period is provided in
which firmware updates can be applied without a license to allow time for the FMWR contract
information to synchronize from FortiCare. FortiManager expects the managed device to be
on the same FortiCloud account, or have the device serial number added in FortiGuard's auth
list.
Schedule Upgrade View scheduled upgrades. This option is only displayed when selecting one
device. You can selected an entry in the table and click Cancel Schedule to
cancel the scheduled upgrade.
Setup Firmware Upgrade Configure the firmware upgrade method using a firmware template or a
custom firmware upgrade configuration.
Firmware Upgrade History View the firmware upgrade history for the selected device. This option is only
displayed when selecting one device
FortiManager checks the FortiGate disk before upgrading. If the check fails, a message indicates the failure, and the
upgrade is not performed.
If the check passes, the upgrade proceeds.
FortiOS devices cannot be upgraded to a version that is higher than the FortiManager that is
managing them. This rule is applicable only for major and minor versions. For example,
FortiManager 6.2.0 cannot upgrade FortiOS devices to 6.3.0 or 7.0.0. When trying to upgrade
FortiOS devices to a version higher than FortiManager, the upgrade process cannot be
completed and a warning is shown.
When upgrading FortiGate devices to a firmware version that is not part of the upgrade path
(shown by the green check mark), the warning The firmware version is not on firmware
upgrade path of selected devices. Upgrading the image may cause the current syntax to
break. is shown. Click Upgrade to Recommended X.X.X which shows the recommended
version, or Continue to upgrade to the selected version. A warning is also shown when
upgrading FortiGate devices to a custom firmware.
The disk on the FortiGate is checked automatically before upgrade. To enable skip disk check
run the set skip-disk-check from the command line.
The default setting is enable, which will check the FortiGate disk before upgrading FortiOS.
The following diagnose commands are also available for diagnose fwmanager:
l show-dev-disk-check-status: Shows whether a device needs a disk check.
l show-grp-disk-check-status: Shows whether device in a group needs a disk check.
In addition, when you log into FortiOS by using the CLI, you will be informed if you need to run a disk scan, for example:
$ ssh [email protected]
WARNING: File System Check Recommended! Unsafe reboot may have caused inconsistency in
disk drive.
It is strongly recommended that you check file system consistency before proceeding.
Please run 'execute disk scan 17'
Note: The device will reboot and scan during startup. This may take up to an hour
When using FortiManager to upgrade firmware on FortiGate, FortiManager can choose the shortest upgrade path based
on the FortiGate upgrade matrix. In a multi-step firmware upgrade, each upgrade is a subtask. You can also enable the
option to skip all intermediate steps in an upgrade path when available. See Upgrading firmware on page 167.
You can use the FortiManager GUI to review the shortest upgrade path. You can also use the CLI to view and check the
shortest upgrade path for a managed device by using the diagnose fwmanager command.
In this example, the device (ID 210) is on version 7.2.4 and the administrator wants to upgrade it to version 7.4.3. Using
the diagnose fwmanager command, they are able to see the upgrade path in the CLI:
diagnose fwmanager show-dev-upgrade-path 210 7.4.3
Enterprise_Second_Floor(210): ->7.2.4-b1396-F ->7.4.1-b2463-F ->7.4.3-b2573-F
It is recommended to also check that the upgrade path for FortiGate reported by FortiManager
matches the upgrade path reported on the FortiCloud FortiCare portal for FortiGate devices.
1. Configure the firmware upgrade for the device in the Device Manager. See Upgrading firmware on page 167 and
Firmware templates on page 309.
2. When the upgrade begins, each firmware upgrade in the path is listed as a subtask.
When all the subtasks reach a status of 100%, the upgrade completes.
FortiManager retrieves firmware for managed devices from FortiGuard, and you can choose to use the images to
upgrade firmware on managed devices.
1. Configure the firmware upgrade for the device in the Device Manager. See Upgrading firmware on page 167 and
Firmware templates on page 309.
2. When selecting a version to upgrade to, the Device Firmware Upgrade dialog box displays a list of available
firmware releases from FortiGuard.
3. Under Upgrade Options, enable Let Device Download Firmware from FortiGuard.
4. Click OK. When the upgrade process begins, the upgrading device will download the firmware image directly from
FortiGuard.
5. Click Close.
FortiManager maintains a device database for each managed device, and you can access the device database for each
device.
The device database is used to view and monitor information about individual devices. You can also use the device
database to configure individual devices.
This section contains the following topics:
l Displaying the device database on page 174
l Choosing feature visibility for devices on page 175
l Using the CLI console for managed devices on page 177
l Viewing and managing LTE modems on page 178
l Preview the JSON request or CLI script for changes in the device database on page 179
When the FortiAnalyzer feature set is enabled, the All FortiGates device group is replaced with
Managed Devices and Logging Devices. Managed devices include FortiGate devices, which
are managed by FortiManager, but do not send logs. Logging device include FortiGate
devices, which are not managed, but do send logs to FortiManager.
The device database is displayed. By default the Dashboard > Summary pane is displayed.
l Security Monitors
l Network Monitors
Network View network panes including Interfaces, DNS, IPAM, SD-WAN, and Static
Routes.
VPN View VPN panes including IPsec Phase 1 and IPsec Phase 2.
System View system panes including Administrators, Admin Profiles, Settings, SNMP,
and Replacement Messages.
Log & Report View log and report panes including Log Settings.
Feature Visibility By default, some of the menu items are hidden. Click Feature Visibility to choose
what menu items to hide and display. See Choosing feature visibility for devices
on page 175.
For information on configuring FortiGate settings, see the FortiOS Administration Guide.
You can choose what settings to hide and display in the device database, allowing you to hide settings that you don't use
and display settings that you do use.
By setting the global feature visibility options, you are specifying what options to hide and display for all device
databases, and you can customize individual device databases as needed.
When ADOMs are enabled, the global feature visibility applies to all devices in the ADOM, letting you specify different
global feature visibility for each ADOM.
1. Go to the device database. See Displaying the device database on page 174.
The Dashboard for the device database is displayed.
2. In the left pane, click Feature Visibility.
The Feature Visibility dialog box is displayed.
3. Select Global Feature Visibility, and then select the checkboxes for the items you want to display, and clear the
checkboxes for the items you want to hide.
The selections apply to all devices. When ADOMs are enabled, the selections apply to all devices in the ADOM.
Select Check All at the bottom of the window to select all content panels. Select Reset to Default at the bottom of the
window to reset all of the selected panels to the default settings.
4. Click OK.
1. Go to the device database. See Displaying the device database on page 174.
The Dashboard for the device database is displayed.
2. In the left pane, click Feature Visibility.
The Feature Visibility dialog box is displayed.
3. Select Customize, and then select the checkboxes for the items you want to display on the toolbar, and clear the
checkboxes for the items you want to hide from the toolbar.
The selections apply only to the device.
The available options depend on the device model and settings configured for that model.
4. Click OK.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Dashboard > Summary.
3. On the System Information widget, in the Operation line, click Connect to CLI via SSH.
The Connect CLI via SSH dialog box is displayed.
4. In the Admin Name box, type your admin login, and click OK.
The CLI console for the device is displayed.
5. At the prompt, type your password, and press Enter.
You are connected.
You can cut (CTRL+C) and paste (CTRL+V) text from the CLI console. You can also use CTRL+U to remove the
line you are currently typing before pressing ENTER.
6. Click Close to exit.
Using the device database, you can view the LTE monitor and configure LTE modem CLI configurations for managed
FortiGate 3G4G devices.
The LTE Modem widget can be viewed by adding the LTE Modem widget to a device database dashboard. The
LTE Modem widget includes data about SIM slots, data plan usage, data plan limits, plan overage status, and the plan
refresh time.
Detailed configurations to the LTE modem can be performed using the lte-modem CLI configuration window in the
device database.
FortiManager also includes an LTE Modem monitor when managing FortiGate 3G4G devices. See LTE modem
monitors on page 320
Preview the JSON request or CLI script for changes in the device database
You can preview and copy the JSON API requests or CLI script for changes made in the device database.
To preview the JSON request or CLI script for changes in the device database:
Device DB - Dashboard
Each dashboard contains widgets that you can use to monitor information about the device.
You can add widgets to dashboards, create custom dashboards, and copy dashboards to other devices as needed.
l Adding widgets to dashboards on page 180
l Adding WAN Optimization Monitor, Cache Monitor, and Peer Monitor widgets to a dashboard on page 180
l Creating custom system dashboards on page 181
l Copying custom system dashboards on page 182
The Dashboard menu provides access to the following default dashboards:
l Summary dashboard on page 183
l Security Monitors dashboard
l Network Monitors dashboard
1. Go to the device database. See Displaying the device database on page 174.
2. Select a dashboard from the Dashboard dropdown menu.
3. Click Add Widget.
The Add Dashboard Widget pane displays.
4. Click the add icon next to the widgets you want to add to the dashboard, and click Close.
Adding WAN Optimization Monitor, Cache Monitor, and Peer Monitor widgets to a
dashboard
WAN Optimization Monitor, Cache Monitor, and Peer Monitor widgets can be added to a dashboard in the device
database.
WAN Opt. Monitor The Wan Opt. Monitor shows how WAN optimization is reducing the amount of
traffic on the WAN for each WAN optimization protocol by showing the amount of
WAN and LAN traffic.
If WAN optimization is being effective, the amount of WAN traffic should be lower
than the amount of LAN traffic.
Cache Monitor The Cache Monitor shows cache statistics (Hits, Miss, Bypass, and Non-
cachable) in a graph. It also shows the protocol where the cache is made, which
helps to determine the effectiveness of the cache.
Peer Monitor The Peer Monitor lists all of the WAN optimization peers that a FortiGate unit can
perform WAN optimization with.
In the device database, the Dashboard menu contains several dashboards, and each dashboard contains several
widgets. You can create custom dashboards and change the dashboard layout.
1. Go to the device database. See Displaying the device database on page 174.
5. (Optional) Click the settings icon next to the dashboard name to Rename, Remove, or Refresh the dashboard.
You cannot remove the Summary, Resource Usage, and Network Monitors dashboards.
In the device database, you can copy custom dashboards to and from other devices/VDOMs. After copying a dashboard
to or from another device/VDOM, it can be customized further on each device individually.
When copying dashboards to and from other devices/VDOMs, the target device's/VDOM's
current dashboard configurations will be overwritten.
You cannot copy a dashboard to or from devices on different ADOMs.
You can also copy custom dashboards from devices when adding a new device using discover
mode, model devices, CSV file, or when authorizing a device. For example, see Adding online
devices using Discover mode on page 84.
1. Go to the device database to copy the custom dashboard to. See Displaying the device database on page 174.
2. From the settings icon for the Dashboard menu, select Copy From Another Device.
1. Go to the device database to copy the custom dashboard from. See Displaying the device database on page 174.
2. From the settings icon for the Dashboard menu, select Copy To Other Device(s).
The Copy To Device pane is displayed.
3. From the To Device dropdown, select the devices to copy the dashboards to, and click OK.
A message asks you to confirm the action.
4. Click OK.
The custom dashboard is now available on the select device(s)/VDOM(s). The dashboards have the same name
and widgets as configured on the device/VDOM they were copied from.
If copying dashboards to and from VDOMs, the GUI will display VDOM instead of Device in the
options and dialogs. For example, you will see Copy From Another VDOM instead of Copy
From Another Device.
Summary dashboard
The Summary dashboard widgets provide quick access to device information. The following widgets are available:
l System Information
l License Information
l Configuration and Installation
l Summary dashboard (available when the ADOM is in backup mode)
The following table provide a description of these dashboard widgets. Note that not all of the listed options will be
available on every device.
System Information
System Information
Hardware Status The number of CPUs and the amount of RAM for the device.
Operation Mode Displays whether the device is in NAT or Central NAT operation mode.
License Information
FortiCare Support The support contract information and the expiry date. The support contract
includes the following: Registration, Hardware, Firmware, and Support Level e.g.
Enhanced Support, Comprehensive Support.
FortiGuard Services The contract version, issue date and service status. FortiGuard Services includes
the following: Antivirus, Intrusion protection, Web filtering, Email Filtering,
Outbreak Protection, and Industrial Security Service.
Enforce Firmware Version The firmware version enforced on the device. The firmware version is enforced
when FortiGate is connected to the network. Click the Edit icon to select the
firmware version. You can also select the firmware version in the Add Device
screen when adding a model device.
For more information, see Adding offline model devices on page 96.
System Template The system template installed on the device. The system template is installed
when FortiGate is connected to the network. Click the Edit icon to select the
system template. You can also select the system template in the Add Device
screen when adding a model device.
For more information, see Adding offline model devices on page 96.
Policy Package The policy package installed on the device. The policy package is installed when
FortiGate is connected to the network. Click the Edit icon to select the policy
package. You can also select the policy package in the Add Device screen when
adding a model device.
For more information, see Adding offline model devices on page 96.
Database Configuration Select View to display the configuration file of the FortiGate unit.
Total Revisions Displays the total number of configuration revisions and the revision history.
Select Revision History to view device history. Select the revision history icon to
open the Revision Diff menu. You can view the diff from a previous revision or a
specific revision and select the output.
has been changed!: The FortiManager system cannot detect which revision
(in Revision History) is currently running on the device.
l Unable to detect the FortiGate version: Connectivity error!
Installation Tracking
Device Settings l Modified: Some configuration on the device has changed since the latest
Status revision in the FortiManager database. Select Save Now to install and save
the configuration.
l UnModified: All configuration displayed on the device is saved as the latest
revision in the FortiManager database.
Installation Preview Select the icon to display a set of commands that will be used in an actual device
configuration installation in a new window.
Last Installation The FortiManager system sent a configuration to the device at the indicated date
and time.
Scheduled A new configuration will be installed on the device at the indicated date and time.
Installation
Last Script Run Displays the date when the last script was run against the managed device.
Scheduled Script Displays the date when the next script is scheduled to run against the managed
device.
The information presented in the System Information, License Information, and Configuration
and Installation Status widgets will vary depending on the managed device model.
FortiManager maintains a configuration repository to manage device configuration revisions. After modifying device
configurations, you can save them to the FortiManager repository and install the modified configurations to individual
devices or device groups. You can also retrieve the current configuration of a device or revert a device’s configuration to
a previous revision.
This section contains the following topics:
l Checking device configuration status on page 186
l Viewing configuration revision history
l Viewing configuration settings on FortiGate on page 188
l Adding a tag to configuration versions on page 189
l Downloading a configuration file on page 189
l Importing a configuration file on page 189
l Comparing different configuration files on page 190
l Reverting to another configuration file on page 191
In the Device Manager pane, when you select a device, you can view that device’s basic information under the device
dashboard. You can also check if the current configuration file of the device stored in the FortiManager repository is in
sync with the one running on the device.
If you make any configuration changes to a device directly, rather than using the FortiManager system, the configuration
on the device and the configuration saved in the FortiManager repository will be out of sync. In this case, you can re
synchronize with the device by retrieving the configuration from the device and saving it to the FortiManager repository.
You can use the following procedures when checking device configuration status on a FortiGate, FortiCarrier, or
FortiSwitch.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Dashboard > Summary.
3. Locate the Configuration and Installation widget.
The Configuration and Installation Status widget shows the following information:
Configuration
Config Status Displays the synchronization status of the configuration with FortiManager.
l Synchronized: The latest revision is confirmed as running on the device.
Provisioning Displays the name of the selected provisioning templates. Click to add or
Template edit selected provisioning templates.
Revision
Total Revisions Displays the total number of configuration revisions and the revision history.
Click Revision History to view device history. For details, see Viewing
configuration revision history on page 187.
Click Revision Diff to compare revisions. For details, see Comparing different
configuration files on page 190.
Last Installation Displays the last installation’s date, time, revision number, and the person who
did the installation.
Device Click View Full Config to display the database configuration file of the
Configuration DB FortiGate unit.
Click View Diff to display the Device Revision Diff dialog box.
The revision history repository stores all configuration revisions for a device. You can view the version history, view
configuration settings and changes, import files from a local computer, compare different revisions, revert to a previous
revision, and download configuration files to a local computer.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Dashboard > Summary.
3. In the Configuration and Installation widget, click the Revision History icon.
In the Configuration Revision History dialog box is displayed. The toolbar contains the following buttons:
View Install Log View the installation log for the selected revision.
Revision Diff Show only the changes or differences between two versions of a configuration
file. For details, see Comparing different configuration files on page 190.
Retrieve Config View the current configuration running on the device. If there are differences
between the configuration file on the device and the configuration file in the
repository, a new revision is created and assigned a new ID number.
More From the More menu, you can select one of the following:
l Download Factory Default
l Revert
l Delete
l Rename
l Import Revision
l Download Revision
ID The revision number. Double-click an ID to view the configuration file. You can
also click Download to save the configuration file.
Date & Time The time and date when the configuration file was created.
Name A name assigned by the user to make it easier to identify specific configuration
versions. You can rename configuration versions.
Created by The name of the administrator account used to create the configuration file.
Comments Display the comment added to this configuration file when you rename the
revision.
The revision history repository stores all configuration revisions for a device. You can view the version history, view
configuration settings and changes, import files from a local computer, compare different revisions, revert to a previous
revision, and download configuration files to a local computer.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Dashboard > Summary.
3. Locate the Configuration and Installation widget.
4. In the Total Revisions row, click the Revision History button.
The Configuration Revision History dialog box is displayed.
5. Select the revision, and click View Config. The View Configuration pane is displayed.
6. To download the configuration settings, click Download.
7. Click Return when you finish viewing.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Dashboard > Summary.
3. Locate the Configuration and Installation widget.
4. In the Total Revisions row, click the Revision History button.
The Configuration Revision History dialog box is displayed.
5. Right-click the revision, and select Rename.
6. Type a name in the Tag (Name) field.
7. Optionally, type information in the Comments field.
8. Click OK.
You can download a configuration file and a factory default configuration file.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Dashboard > Summary.
3. Locate the Configuration and Installation widget.
4. In the Total Revisions row, click the Revision History button.
The Configuration Revision History dialog box is displayed.
5. Select the revision you want to download.
6. Click View Config > Download.
The Download Revision dialog box is displayed.
7. Select Regular Download or Encrypted Download. If you select Encrypted Download, type a password.
8. Click OK.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Dashboard > Summary.
3. Locate the Configuration and Installation widget.
4. In the Total Revisions row, click the Revision History button.
The Configuration Revision History dialog box is displayed.
5. From the More menu, select Download Factory Default.
You can import a configuration file that is downloaded from the FortiManager repository or
from the FortiGate directly. Encrypted configuration files downloaded from FortiGate are not
supported.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Dashboard > Summary.
3. Locate the Configuration and Installation widget.
4. In the Total Revisions row, click the Revision History button.
The Configuration Revision History dialog box is displayed.
5. Right-click a revision and select Import Revision.
6. Click Browse and locate the revision file, or drag and drop the file onto the dialog box.
7. If the file is encrypted, select File is Encrypted, and type the password.
8. Click OK.
You can compare the changes or differences between two versions of a configuration file by using the Diff function.
The Diff function behaves differently under certain circumstances.
For example, when a device is first added to the FortiManager system, the FortiManager system gets the configuration
file directly from the FortiGate unit and stores it as is. This configuration file is version/ID 1.
If you make changes to the device configuration in Device Manager and select Commit, the new configuration file is
saved as version/ID 2. If you use the Diff icon to view the changes/differences between version/ID 1 and version/ID 2,
you will be shown more changes than you have made.
This happens because the items in the file version/ID 1 are ordered as they are on the FortiGate unit. Configurations of
version/ID 2 are sequenced differently when they are edited and committed in Device Manager. Therefore, when you
compare version/ID 1 and version/ID 2, the Diff function sees every item in the configuration file as changed.
If you take version/ID 2, change an item and commit it, the tag is changed to version/ID 3. If you use Diff with version/ID 2
and version/ID 3, only the changes that you made are shown. This is because version/ID 2 and version/ID 3 have both
been sequenced in the same way in Device Manager.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Dashboard > Summary.
3. Locate the Configuration and Installation widget.
4. In the Total Revisions row, click the Revision History button.
The Configuration Revision History dialog box is displayed.
5. Select a revision, and click Revision Diff in the toolbar.
6. In the Compare Database <name> Against section, select another version for the diff.
7. In the Diff Output section, select Show Full File Diff, Show Diff Only, or Capture Diff to a Script.
Show Full File Diff shows the full configuration file and highlights all configuration differences.
Show Diff Only shows only configuration differences.
Capture Diff to a Script downloads the diff to a script.
8. Click Apply.
If you selected show diff, the configuration differences are displayed in colored highlights. If you selected capture to
a script, the script is saved in your downloads folder.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Dashboard > Summary.
3. Locate the Configuration and Installation widget.
4. In the Total Revisions row, click the Revision History button.
The Configuration Revision History dialog box is displayed.
5. Right-click the revision to which you want to revert, and click Revert.
The system immediately reverts to the selected revision.
You can view interface information about individual devices in the Device Manager tab.
This section also includes information on the following topics:
l Device zones on page 191
l Interface packet capture on page 192
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Network > Interfaces. The Interface pane is displayed.
While viewing the interfaces table, you can toggle full screen mode by clicking Full Screen/Exit Full Screen.
Device zones
When creating a device zone, map the zone to a physical interface. You must also map the zone to a normalized
interface to use the zone in a policy. See also Normalized interfaces on page 465.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Network > Interface. The Interface pane is displayed.
You can perform packet capture on a managed FortiGate's interface through the device database.
3. You can configure the Max Number of Packets and/or Filters, and click OK to start the packet capture.
If Max Number of Packets is not specified, the packet capture will stop after 50000 packets to preserve memory.
Virtual domains (VDOMs) enable you to partition and use your FortiGate unit as if it were multiple units. This section
contains the following topics:
l Enabling virtual domains on page 193
l Viewing virtual domains on page 194
l Creating virtual domains on page 195
l Configuring inter-VDOM routing on page 195
l Deleting a virtual domain on page 196
l Editing resource limits on page 196
For more information about VDOMs, see the FortiOS Administration Guide available in the Fortinet Document Library.
Before you can create virtual domains, you must enable virtual domains on the device.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Dashboard > Summary.
3. In the System Information widget, click the Edit VDOM icon beside VDOM.
The Edit VDOM Configuration dialog box is displayed.
4. In the VDOM Mode box, select Multi VDOM or Split VDOM, and click OK.
5. Create virtual domains. See Creating virtual domains on page 195.
Before you can access the Virtual Domain pane in the device database, you must enable VDOMs for the device.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to System > Virtual Domain. The Virtual Domain pane is displayed.
The Virtual Domain menu may be hidden. See Choosing feature visibility for devices on
page 175.
Delete Select a VDOM, and click Delete to remove it. This function applies to all
virtual domains except the root.
Resource Limits Select a VDOM, and click Resource Limits to configure the resource limit
profile.
Set Management Select a VDOM, and click Set Management to define the VDOM as the root
VDOM also known as the management VDOM.
Name The name of the virtual domain and if it is the management VDOM.
NGFW Mode Displays the Next Generation Firewall setting for the VDOM of Profile-based or
Policy-based.
You must enable virtual domains on the device before you can create virtual domains. See Enabling virtual domains on
page 193.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to System > Virtual Domain.
The Virtual Domain tab may be hidden. See Choosing feature visibility for devices on page
175.
By default, for two virtual domains to communicate it must be through externally connected physical interfaces. Inter-
VDOM routing creates a link with two ends that act as virtual interfaces, internally connecting the two virtual domains.
Before configuring inter-VDOM routing:
l You must have at least two virtual domains configured.
l The virtual domains must all be in NAT mode.
l Each virtual domain to be linked must have at least one interface or subinterface assigned to it.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to System > Interface.
3. Click Create New > VDOM Link. The New VDOM Link pane opens.
Prior to deleting a VDOM, all policies must be removed from the VDOM. To do this, apply and install a blank, or empty,
policy package to the VDOM (see Create new policy packages on page 337). All objects related to the VDOM must also
be removed, such as routes, VPNs, and admin accounts.
To delete a VDOM:
1. Go to the device database. See Displaying the device database on page 174.
2. Go to System > Virtual Domain.
3. Right-click the VDOM, and select Delete.
4. Click OK in the confirmation dialog box to delete the VDOM.
1. Go to the device database. See Displaying the device database on page 174.
2. Go to System > Virtual Domain.
3. Select the VDOM, and click Resource Limits in the toolbar.
4. Edit the settings, and click OK to save the changes.
In the device database, you can use the SD-WAN pane to configure SD-WAN for a device. When you use the device
database to configure SD-WAN, you are using SD-WAN per-device management. For information about SD-WAN
central management, see SD-WAN rules on page 536.
In the device database, the SD-WAN pane lets you:
l Create SD-WAN zones and interface members
l Create IPsec VPN tunnels by using a wizard
l Create performance SLA
l Create SD-WAN rules
l (Optional) Add BGP Neighbors
l Enable packet duplication
Using SD-WAN per-device management consists of the following steps:
1. (Optional) Specify BGP Neighbors that you can select in SD-WAN configurations. See BGP Neighbors on page
203.
2. Configure SD-WAN settings for each device. See SD-WAN per-device management on page 197.
3. Install device settings using the Install Wizard. See Install device settings only on page 163.
4. Monitor SD-WAN networks. See SD-WAN Monitor on page 502.
In the device database, use the SD-WAN pane to configure SD-WAN directly on each device.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Network > SD-WAN.
The SD-WAN pane opens.
Interface Members Zones and interface members can be added, edited, and removed. See SD-
WAN zones and interface members on page 198.
Advanced Options Expand Advanced Options to view and set the options.
Hover the mouse over each advanced option to view a description of the
option.
For each device, you can create SD-WAN zones and interface members. You can select SD-WAN zones as source and
destination interfaces in firewall policies. You cannot select interface members of SD-WAN zones in firewall policies.
The default SD-WAN zone is named virtual-wan-link.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Network > SD-WAN.
The SD-WAN pane opens.
3. In the Interface Members section, click Create New > SD-WAN Zone.
The Create New SD-WAN Zone dialog box is displayed.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Network > SD-WAN.
The SD-WAN pane opens.
3. In the Interface Members section, click Create New > SD-WAN Member.
The Create New SD-WAN Interface Member dialog box is displayed.
For each device, the SD-WAN pane includes access to an IPsec VPN Wizard. You can use the wizard to create IPsec
VPN tunnels and automatically generate interface members for the tunnel.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Network > SD-WAN.
The SD-WAN pane opens.
FQDN Specify the FQDN if Dynamic DNS is selected for Remote Device.
Certificate Name Select the certificate (if Signature was selected as the Authentication
Method)
Peer Certificate CA Select the Peer Certificate CA (if Signature was selected as the
Authentication Method)
Pre-shared Key Select the pre-shared key (if Pre-shared key was selected as the
Authentication Method)
The auto-generated VPN interface is automatically added to the list of SD-WAN interface members.
5. Edit the VPN in Interface Members to configure Gateway IP, Estimated Upstream Bandwidth (Kbps), and Estimated
Downstream Bandwidth (Kbps).
6. Click Apply to save the SD-WAN settings.
Performance SLA
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Network > SD-WAN.
The SD-WAN pane opens.
3. In the Performance SLA section, click Create New.
The Create Performance SLA dialog-box opens
SD-WAN rules
Configure SD-WAN rules for WAN links by specifying the required network parameters.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Network > SD-WAN.
The SD-WAN pane opens.
3. In the SD-WAN Rules section, click Create New.
The Create New SD-WAN Rule dialog-box opens.
4. Configure the options, and click OK to create the new SD-WAN rule.
BGP Neighbors
When configuring SD-WAN per-device, you can add Border Gateway Protocol (BGP) neighbors.
You must create BGP neighbors for FortiGate devices before you can add them to the SD-WAN network. See Device DB
- Network BGP on page 205.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Network > SD-WAN.
The SD-WAN pane opens.
3. In the Neighbor section, click Create New.
The Create New Neighbor dialog box is displayed.
Duplication
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Network > SD-WAN.
3. On the SD-WAN pane for the device, go to the Duplication section, and click Create New.
The Create New SD-WAN Duplication pane opens.
You can create Border Gateway Protocol (BGP) neighbors for FortiGates.
If BGP is hidden, see Choosing feature visibility for devices on page 175.
1. Go to the device database. See Displaying the device database on page 174.
2. In the device database, go to Network > BGP. The BGP pane is displayed.
In the device database, you can access the CLI Configurations menu to configure device settings that are normally
configured via the CLI on the device. You can also use it to access settings that are not available in the FortiManager
GUI.
1. Go to the device database. See Displaying the device database on page 174.
2. Display CLI Configurations in the menu:
a. Click Display Options.
The Display Options dialog box is displayed.
b. Select Customize.
c. Select the CLI Configurations checkbox, and click OK.
The CLI Configurations menu is displayed.
3. Click CLI Configurations.
The options available in the menu will vary from device to device, depending on what feature
set the device supports. The options will also vary depending on the device firmware version.
Device maintenance
Deleting a device
Devices can be deleted in Device Manager. Deleting a device does not delete other management elements associated
with it:
l If the device is a member of a group, the group will remain without the device in it (Device groups on page 133).
l If a template is assigned to the device, the template will remain with no device assignment (Provisioning Templates
on page 252).
l If the device is an installation target for a policy package, the package will remain with that device removed from the
installation targets (Policy package installation targets on page 344).
l If there is a policy in a policy package that only installs on the device that is deleted, the policy will remain but will not
be installed on any devices (see Installing policies to specific devices on page 421).
l If there are VDOMs in other ADOMs, they will be deleted with the device (ADOM device modes on page 904).
To delete a device:
The serial number is verified before each management connection. If you replace a device, you must manually change
the serial number in the FortiManager system.
You can only reinstall a device that has a Retrieve button under the Revision History tab.
When selecting a FortiGate cluster, all cluster members are displayed in the Swap Device
menu.
3. Enter the FortiGate's New Serial Number, and specify the Admin Name and Admin Password, and click OK.
4. On the FortiGate Central Management Settings page, enter the FortiManager IP and click OK.
5. On FortiManager, the device serial number and configuration is pushed to the new device.
When replacing a managed FortiGate cluster member's license on FortiOS, the device is
added as a new cluster member on FortiManager. The cluster member with the old license is
still listed in the Device Manager on FortiManager.
Once you have confirmed that the cluster member with the updated license has been added to
FortiManager, you can manually delete the downed cluster member with the old license from
the device dashboard's HA widget.
To view all devices that are managed by your FortiManager, use the following command:
diagnose dvm device list
The output lists the number of managed devices, device type, OID, device serial number, VDOMs, HA status, IP
address, device name, and the ADOM to which the device belongs.
If the device serial number was entered incorrectly using the Add Model Device wizard, you can replace the serial
number from the CLI only. Use the command:
execute device replace sn <device name> <serial number>
This topic includes the following information for managing devices using HA.
l Configuring model HA cluster members on page 208
l Configuring HA settings on real FortiGate devices on page 209
l FortiManager supports FortiGate auto-scale clusters on page 210
l How FortiGate VDOM exceptions interact with FortiManager on page 212
l Firmware upgrades prevented for FortiGate HA clusters in MVC mode on page 213
For information on adding offline model FortiGate HA clusters, see Adding a FortiGate HA
cluster on page 100.
The HA Status widget in the in the system dashboard allows you to configure model HA cluster members. After the
model HA device is created, its HA configuration can be modified.
You cannot use FortiManager to configure high availability (HA) on real FortiGate devices.
See Configuring HA settings on real FortiGate devices on page 209.
3. In the HA Status widget, under Cluster Members, select a cluster device, and click Edit. The Edit HA Member
<cluster_name> dialog is displayed.
4. Configure the cluster settings.
Host Name Sets the hostname for each member in the cluster.
Priority (0-512) Sets the priority for the cluster member. The cluster member with a higher
number will be considered as the primary device of the HA cluster.
Management Interface Enables a dedicated interface for individual cluster member management.
Reservation
Session Pickup Exposes the connectionless sessions from the primary FortiGate.
Connectionless
5. Click OK.
You cannot use FortiManager to configure high availability (HA) settings on real FortiGate devices. As a result, the HA
Status widget in the device database for real devices is read-only.
FortiManager learns about HA settings from managed FortiGate devices, but does not manage that part of the FortiGate
configuration. To configure HA settings on real FortiGate devices, you can directly modify the FortiGate devices and then
import the configuration to FortiManager. See Import Configuration wizard on page 157.
When HA settings are modified using CLI templates or scripts, the changes will be reflected in the CLI Configurations of
the device database but will not be pushed to the real FortiGate when an install is performed. This includes the Priority
setting which may cause the HA to failover if changed.
FortiManager supports the public cloud functionality to scale-in or scale-out the number of FortiGate-VMs on-demand
using auto-scaling. When an auto-scale event is triggered, the public cloud platform will launch a new FortiGate-VM and
it will appear automatically on FortiManager as an authorized device in the Device Manager. When a scale-in event
occurs, the device will automatically removed from FortiManager.
FortiManager cannot be used to manage the upgrade of Virtual Machine Scale Set
(VMSS) FortiGates in Azure.
As an example, an administrator creates an auto-scale cluster on the public cloud with two FortiGate-VMs which
includes a rule to trigger a scale-out event when the CPU or network utilization exceeds 70% capacity. The scale-out
event increases the number of FortiGate-VMs in the cluster to three so that the additional traffic can be managed.
In the event of a scale-out, the newly added FortiGate device syncs with the Primary FortiGate in the cluster and fetches
the FortiManager configuration. Once the deployment and sync is complete on the new FortiGate, the device is
authorized and added to the existing cluster on the FortiManager.
A separate rule specifies that when the CPU or network utilization is less than 10%, a scale-in event occurs to reduce the
number of FortiGate-VMs back to two. When the scale-in event occurs, the third FortiGate device is automatically
removed from FortiManager.
These changes are reflected on the FortiManager without any manual intervention required.
The amount of time required for FortiManager to add or remove FortiGate devices to or from
the cluster depends upon the time it takes to deploy or terminate the FortiGate-VM on the
cloud, and for the FortiGate clusters to resync.
FortiGate. Once the configuration between the cluster members are in sync, the remaining devices are added
to the FortiManager automatically.
l Alternatively, you can configure the FortiManager Fabric Connector on the Primary FortiGate to add the cluster
to FortiManager.
l You can check the Serial Number, Hostname, HA Status and elastic IP of the FortiGate cluster devices in the
Device Manager.
l Administrators can check the HA mode (i.e. auto-scale) along with cluster members, roles, and the elastic IP in
the device database.
2. When a scale-out event occurs where the number of FortiGate devices in the cluster increases, once the newly
added FortiGate becomes a part of the cluster and syncs its configuration with the cluster's Primary device, it is
added to FortiManager.
On FortiManager, the device is automatically authorized and added to the existing cluster without manual
intervention.
3. When a scale-in event occurs where the number of FortiGate devices in the cluster decreases, once the FortiGate is
removed from the cluster on the cloud and the FGFM expires on the FortiManager, the FortiGate device will be
removed from the cluster on FortiManager.
4. During any scale-in event, if the Primary FortiGate is removed from the cluster on the cloud, then FortiManager will
be able to detect the change and will reflect the state of the new Primary and Secondary devices in the Device
Manager.
In the example image below the Primary FortiGate failed and there was an auto-scale event to replace it. The new
Primary FortiGate is displayed on FortiManager.
In a typical FortiGate HA configuration, when a setting on the Primary FortiGate changes, those changes are
automatically synchronized to the Secondary device.
In order to manually prevent certain settings from synchronizing between the Primary and Secondary devices in the HA
cluster, administrators can configure VDOM exceptions. When a FortiGate's configuration is updated during failover,
settings specified as VDOM exceptions are not changed. FortiManager administrators can still make changes to
VDOM exception objects directly through the device database on FortiManager.
FortiManager treats VDOM exceptions as read-only in the ADOM database. When FortiManager adds the HA cluster,
VDOM exception objects will only be added to firewall policies if the FortiGate has the object created locally, otherwise
the object is not created.
VDOM exceptions can be required when FortiGate HA cluster members are not in the same physical location, subnets,
or availability zones in a cloud environment. For example, you need to prevent management interfaces that have unique
VIPs from being synchronized between cluster devices.
See the FortiGate Administration Guide for a list of settings and resources that can be exempted from synchronization in
an HA cluster.
In the following example, an administrator wants to centrally manage a FortiGate Active-Passive HA cluster (FortiGate-A
and FortiGate-B) with unique VIP objects hosted on AWS using FortiManager.
1. FortiGate-A and FortiGate-B are each configured with unique VIP objects.
2. The administrator configures a VDOM exception for the VIP objects on FortiGate-A.
For example, the administrator sets the following command:
config vdom exception
edit 1
set object firewall.vip
The VDOM exception only needs to be configured on the device that will be Primary in the cluster. The Secondary
device will automatically synchronize the VDOM exception settings when the HA cluster is formed.
3. The administrator forms an HA cluster where FortiGate-A is the Primary and FortiGate-B is the Secondary.
l VIP objects configured on the FortiGate devices are not synchronized between the Primary and Secondary
because of the VDOM exception.
l See the FortiGate/FortiOS Administrator Guide for more information on forming HA clusters.
4. The FortiGate cluster is added to FortiManager for central management.
l FortiManager retrieves the configuration of the FortiGate cluster, and the cluster is displayed as Synchronized.
l The VDOM exception objects (VIP objects in this example) are not synchronized between the cluster devices.
FortiManager imports the configuration from the current Primary (FortiGate-A).
l See Adding a FortiGate HA cluster on page 100 for more information on adding an FortiGate HA cluster to
FortiManager.
5. After failover occurs, FortiGate-B becomes the new Primary, and FortiManager retrieves its configuration with auto-
update.
l FortiGate-B's VIP objects are not synchronized to the FortiManager databases and remain as local objects on
the FortiGate.
l In order to push any configuration changes to the new Primary (FortiGate-B), the administrator must first
manually import its configuration. The VIP object from FortiGate-B will be updated in the device database, and
the ADOM database will contain the VIP objects from FortiGate-A and FortiGate-B.
Additional Resources
FortiManager detects FortiGate HA clusters operating in multi-version cluster (MVC) mode, provides a warning, and
prevents the cluster firmware from being upgraded.
For more information on MVC mode, see the FortiGate Administration Guide.
Example
b. Go to Device Manager > Device & Groups > Managed FortiGate, select the device and click More > Firmware
Upgrade and try to perform a direct upgrade of the firmware. A warning message is displayed denying the
firmware upgrade of the MVC enabled HA cluster.
c. Go to Device Manager > Firmware Templates, and try to assign the device to a firmware template. A warning
message is displayed stating that firmware upgrades for MVC-enabled HA clusters is not allowed.
You can manage FortiAnalyzer HA via FortiManager. FortiManager retrieves the cluster member list and updates the
information whenever it changes, including FortiAnalyzer HA failover or a change in members.
3. From the Add FortiAnalyzer box, add FortiAnalyzer HA to FortiManager DVM by HA cluster's VIP, and click Next.
The FortiAnalyzer HA is discovered with its HA status information. Click Next to continue.
4. In the tree menu, select Managed FortiAnalyzer. The device status icon is shown as the HA cluster and the SN is
shown as the primary SN.
FortiManager DVM gets an update after the failover on FortiAnalyzer in 300 seconds. Here, the previous primary
"FAZ-VMTM20001379" becomes the secondary and the new primary is "FAZ-VMTM20001378".
You can get the HA status update immediately, select the FortiAnalyzer device and either click
Refresh Device from the toolbar, or right-click and select Refresh.
Managed FortiGate devices can retrieve their account level entitlements from FortiCloud directly through the
FortiManager. This allows features controlled by account level entitlements, for example FortiSandbox Cloud
sandboxing, to be enabled without requiring the FortiGate to connect to the internet. This feature requires that
FortiManager has an internet connection.
For example, when FortiGate has an entitlement for FortiSandbox Cloud, the FortiGate can retrieve that entitlement
information directly from FortiManager and then allow the FortiSandbox Cloud settings to be enabled in the Sandbox
Fabric Connector.
1. Verify that the FortiGate has an entitlement for FortiSandbox Cloud on FortiCloud.
You can remotely connect to managed FortiGate devices through the FortiManager Device Manager.
1. Go to System Settings > Admin Profiles and enable the Remote GUI Access option for an Admin Profile.
Remote GUI Access is enabled for the Super_User profile by default. The setting is disabled for newly created
profiles but can be manually enabled.
2. Log in as a user with Remote GUI Access permission.
3. Go to Device Manager > Device & Groups, right-click on a managed FortiGate, and the Remote Access option
appears in the context menu.
4. Click Remote Access. You are redirected to the FortiGate's login page using the following URL:
<FMG IP>:<8082>.
5. Enter your FortiGate login credentials to access the FortiGate.
When configuring the port used for remote access, FortiManager reserved ports cannot be
used. See the FortiManager Ports document for more information.
Scripts
FortiManager scripts enable you to create, execute, and view the results of scripts executed on FortiGate devices, policy
packages, the ADOM database, the global policy package, or the device database. Scripts can also be filtered based on
different device information, such as OS type and platform.
At least one FortiGate device must be configured in the FortiManager system before you can use scripts.
Additional configuration options and short-cuts are available using the right-click menu. Right-
click the mouse on different navigation panes in the GUI page to access these options.
Any scripts that are run on the global database must use complete commands. For example, if
the full command is config system global, do not use conf sys glob.
Before using scripts, ensure the console-output function has been set to standard in the
FortiGate CLI. Otherwise, scripts and other output longer than a screen in length will not
execute or display correctly.
When pushing a script from the FortiManager to the FortiGate with workspace enabled, you
must save the changes in the Policy & Objects tab.
After running a script with configuration changes directly on a FortiGate, you can import the
configuration from the FortiGate to FortiManager in order to bring the script's changes into the
FortiManager database.
Enabling scripts
You must enable scripts to make the Scripts option visible in the GUI.
To enable scripts:
Configuring scripts
To configure, import, export, or run scripts, go to Device Manager > Scripts, or Policy & Objects > Object Configuration >
Advanced > Scripts if you are in the Global Database ADOM. The script list for your current ADOM displays.
The following information is displayed:
Last Modified The date and time the script was last modified.
The following options are available in the toolbar, in the More menu, or in the right-click menu.
Run Script / Run Run the selected script. See Run a script on page 221.
Schedule Script Schedule when the selected script will run. See Schedule a script on page 225.
Create New / New Create a new script. See Add a script on page 221.
Edit Edit the selected script. See Edit a script on page 223.
Delete Delete the selected script. See Delete a script on page 223.
Clone Clone the selected script. See Clone a script on page 223.
Import CLI Script / Import a script from your management computer. See Import a script on page 224.
Import
Export Export the selected script as a .txt file to your management computer. See Export a script
on page 224.
Select All Select all the scripts. This option is only available for Global Database scripts.
Search Enter a search term in the search field to search the scripts.
Run a script
You can select to enable automatic script execution or create a recurring schedule for the script (see Schedule a script
on page 225).
To run a script:
Scripts can also be re-run from the script execution history by selecting the run button. See
Script history on page 231 for information.
The Run Script dialog box will open. This dialog box will vary depending on the script target. You will either be able
to select a device or devices, or a policy package.
3. Select a device group, devices, or a policy package.
4. Click Run Now to run the script.
The progress of the operation will be shown, providing information on its success or failure.
Scripts can also be run directly on a device using the right-click menu in Device Manager >
Device & Groups.
Add a script
1. Go to Device Manager > Scripts, or Policy & Objects > Scripts for the Global Database ADOM.
2. Click Create New > Script, or right-click anywhere in the script list and select New from the menu. The Create Script
dialog box.
3. Enter the required information, then select OK to create the new script.
View Sample Script This option points to the FortiManager online help.
Run Script on Select the script target. This settings will affect the options presented when
you go to run a script. The options include:
l Device Database
For Global Database ADOM scripts, this option is set to Policy Package or
ADOM Database and cannot be changed.
Validate on change When this feature is enabled, scripts are automatically validated when
changes are made. See Validate script syntax on page 226.
Validate device platform Select the device platform to use when validating the script to ensure that the
script syntax will run correctly on the selected platform.
Script Detail Type the script itself, either manually using a keyboard, or by copying and
pasting from another editor.
Revert All Changes Reverts all changes made to the script since to the last point that it was saved.
Advanced Device Filters Select to adjust the advanced filters for the script. The options include:
l Platform (select from the dropdown list)
l Build
l Host name
l SN
These options are not available for Global Database ADOM scripts, or if Run
script on is set to Policy Package or ADOM Database.
Edit a script
All of the same options are available when editing a script as when creating a new script, except the name of the script
cannot be changed.
To edit a script, either double click on the name of the script, or right-click on the script name and select Edit from the
menu. The Edit Script dialog box will open, allowing you to edit the script and its settings.
Clone a script
Cloning a script is useful when multiple scripts that are very similar.
To clone a script:
1. Go to Device Manager > Scripts, or Policy & Objects > Object Configuration > Advanced > Scripts if you are in the
Global Database ADOM.
2. Right-click a script, and select Clone.
The Clone Script pane opens, showing the exact same information as the original, except copy_ is prepended to the
script name.
3. Edit the script and its settings as needed then click OK to create the clone.
Delete a script
1. Go to Device Manager > Scripts, or Policy & Objects > Object Configuration > Advanced > Scripts if you are in the
Global Database ADOM.
2. Select the script to be deleted, or selected multiple scripts by holding down the Ctrl or Shift keys.
3. Right-click anywhere in the script list window, and select Delete.
4. Click OK in the confirmation dialog box to delete the script or scripts.
Export a script
CLI and Tcl scripts can be exported to text files on your local computer.
While FortiManager supports exporting both CLI and Tcl scripts, only CLI scripts can be re-
imported using the FortiManager GUI. To import Tcl scripts, you must do so using the CLI. See
Importing Tcl scripts on page 225.
To export a script:
1. Go to Device Manager > Scripts, or Policy & Objects > Object Configuration > Advanced > Scripts if you are in the
Global Database ADOM.
2. Right-click a script, and select Export Script.
3. If prompted by your web browser, select a location to where save the file, or open the file without saving, then click
OK.
Import a script
CLI scripts can be imported as text files from your local computer using the FortiManager GUI. See Importing CLI scripts
on page 224
Tcl scripts can be imported using the FortiManager CLI using FTP or SCP. See Importing Tcl scripts on page 225
1. Go to Policy & Objects > Object Configuration > Advanced > Scripts.
2. Select Import from the toolbar. The Import Script dialog box opens.
3. Enter a name for the script and, optionally, comments, in the requisite fields.
4. Click Browse... and locate the file to be imported on your local computer.
5. Click Import to import the script.
If the script cannot be read, due to an incorrect file type or other issue, an error message will be displayed and the
import process will be canceled.
Tcl scripts can only be imported using the FortiManager CLI. Importing a Tcl script as a text file using the Import
CLI Script function in the FortiManager GUI will import the script as CLI and it will not function correctly.
To import a Tcl script using the FortiManager CLI, enter the following command to import the script by FTP/SCP:
execute fmscript import {scp | ftp} <server> <finename> <username> <password>
<scriptname> <TCL> <target> <comment> <adom_name> <os_type> <os_version> <platform>
<devicename> <buildno> <hostname> <serial number>
Schedule a script
Scripts and script groups can be scheduled to run at a specific time or on a recurring schedule. This option must be
enabled in the CLI before it is available in the GUI.
Schedules cannot be used on scripts with the target Policy Package or ADOM Database.
1. From the toolbar, open the CLI Console, or connect to the FortiManager with terminal emulation software.
2. Enter the following CLI command:
config system admin setting
set show_schedule_script enable
end
1. Go to Device Manager > Scripts, or Policy & Objects > Object Configuration > Advanced > Scripts if you are in the
Global Database ADOM.
2. Right-click on the script or group and select Schedule Script, or select a script or group then click Schedule Script or
More > Schedule Script in the toolbar. The Schedule Script window opens.
3. Configure the following options, then click OK to create the schedule:
Devices Select the devices that the script will be run on. If required, use the search field
to find the devices in the list.
Enable Automatic execute Select to enable automatic execution of the script or script group after each
after each device install device install. If this is selected, no schedule can be created.
This option is only available is the target is Remote FortiGate Directly (via CLI).
Recurring Select how frequently the script or script group will run:
l One Time- Set the date and time that script or group will run.
l Daily - Set the time that the script or group will run everyday.
l Weekly - Set the day of the week and the time of day that the script or
FortiManager will suggest commands as you type text into the editor. Select a command from the suggestion menu to
auto-complete the command. FortiManager may suggest additional commands to use based on the previously entered
command. For example, if you type conf, FortiManager will suggest the config command. When config is selected,
FortiManager may present additional options related to the config command that can be added (for example,
firewall address).
You can click the Validate option at the bottom of the editor to review for syntax errors.
A FortiManager warning message will appear if there are errors detected, and an error icon will indicate the line(s) in the
editor that include the error. Hover your mouse over the error icon to review the warning details. FortiManager will
present suggested corrections where applicable, and you can click Use Corrected Suggestion to update the command in
line. Once corrections have been made in the editor, you can click Validate again to confirm that there are no longer any
syntax issues.
In order to ensure the validated results align with the device platform the commands will be run on, you must choose the
correct platform from the Validation device platform dropdown in the editor. Validation will use the syntax from the
selected device platform.
You can enable the Validate on change field to automatically validate the syntax when making changes in the editor
CLI scripts can be put into groups so that multiple scripts can be run on a target at the same time.
To manage script groups, go to to Device Manager > Scripts . Script and Script Group entries are displayed in the
content pane.
The following information is displayed:
Last Modified The date and time the group was last modified.
Search Enter a search term in the search field to search the script groups.
Run Script on Select the script target. This settings will affect the options presented when
you go to run a script. The options include:
l Device Database
Members Use the directional arrows to move available scripts to member scripts.
Script syntax
Most script syntax is the same as that used by FortiOS. For information see the FortiOS CLI Reference, available in the
Fortinet Document Library.
Some special syntax is required by the FortiManager to run CLI scripts on devices.
config dynamic_mapping
edit "<dev_name>"-"<vdom_name>"
set subnet x.x.x.x x.x.x.x
next
end
config dynamic_mapping
edit "<dev_name>"-"<vdom_name>"
set startip x.x.x.x
set endip x.x.x.x
next
end
config dynamic_mapping
edit "<dev_name>"-"<vdom_name>"
set extintf "any"
set extip x.x.x.x-x.x.x.x
set mappedip x.x.x.x-x.x.x.x
set arp-reply enable|disable
next
end
end
end
Script history
The execution history of scripts run on specific devices can be viewed from a device’s dashboard. The script log can be
viewed in the Task Monitor. The script execution history table also allows for viewing the script history, and re-running
the script.
Script samples
This section helps familiarize you with FortiManager scripts, provides some script samples, and provides some
troubleshooting tips.
The scripts presented in this section are in an easy to read format that includes:
Do not include \r in your scripts as this will cause the script to not process properly.
CLI scripts
CLI scripts include only FortiOS CLI commands as they are entered at the command line prompt on a FortiGate device.
CLI scripts do not include Tool Command Language (Tcl) commands, and the first line of the script is not “#!” as it is for
Tcl scripts.
CLI scripts are useful for specific tasks such as configuring a routing table, adding new firewall policies, or getting system
information. These example tasks easily apply to any or all FortiGate devices connected to the FortiManager system.
However, the more complex a CLI script becomes the less it can be used with all FortiGate devices - it quickly becomes
tied to one particular device or configuration. One example of this is any script that includes the specific IP address of a
FortiGate device’s interfaces cannot be executed on a different FortiGate device.
Samples of CLI scripts have been included to help get you started writing your own scripts for your network
administration tasks. See CLI script examples on page 232.
Error messages will help you determine the causes of any CLI scripting problems, and fix them. See Error Messages on
page 237.
The troubleshooting tips section provides some suggestions on how to quickly locate and fix problems in your CLI
scripts. See Troubleshooting Tips on page 237.
There are two types of CLI scripts. The first type is getting information from your FortiGate device. The second type is
changing information on your FortiGate device.
l Scripts for getting information on page 232
l Scripts for device configuration on page 235
Getting information remotely is a main function of FortiManager, and CLI scripts allow you to access any information on
your FortiGate devices. Getting information typically involves only one line of script as the following scripts show.
Variations Remove the interface name to see a list that includes all the interfaces on the FortiGate device
including virtual interfaces such as VLANs.
Notes This script does not work when run on a policy package.
If the preceding script is to be run on the FortiGate Directly (via CLI) or run on the device
database for a FortiGate that has VDOMs enabled, the script will have be modified to the
following:
config global
show system interface port1
end
Since running on device database does not yield any useful information, the script should be
run on the FortiGate directly (via CLI).
Example log of script run against the device database:
------- Executing time: 2013-10-15 13:27:32 ------
Starting log (Run on database)
config global
end
Running script on DB success
------- The end of log ----------
Example log of script run on FortiGate Directly (via CLI):
------- Executing time: 2013-10-15 13:52:02 ------
Starting log (Run on device)
FortiGate-VM64 $ config global
FortiGate-VM64 (global) $ show system interface port1
config system interface
edit "port1"
set vdom "root"
set ip 10.2.66.181 255.255.0.0
set allowaccess ping https ssh snmp http fgfm auto-ipsec radius-acct
probe-response capwap
set type physical
set snmp-index 1
next
end
FortiGate-VM64 (global) $ end
------- The end of log ----------
Notes If VDOMs are enabled for the FortiGate, the script must be re-written as follows and run on the
FortiGate Directly (via CLI):
config vdom
edit root
show route static
next
end
Example log of script run on FortiGate Directly (via CLI):
------- Executing time: 2013-10-15 14:24:10 ------
Starting log (Run on device)
FortiGate-VM64 $ config vdom
FortiGate-VM64 (vdom) $ edit root
current vf=root:0
FortiGate-VM64 (root) $ show route static
config router static
edit 1
set device "port1"
set gateway 10.2.0.250
next
end
FortiGate-VM64 (root) $ next
FortiGate-VM64 (vdom) $ end
------- The end of log ----------
Variations Output for this script will vary based on the state of the FortiGate device. The preceding output
is for a FortiGate device that has never been authorized.
For an authorized FortiGate device without a valid license, the output would be similar to:
Locale : english
License : Unknown
Expiration : N/A
Hostname : guard.fortinet.net
Setting FortiGate device information with CLI scripts gives you access to more settings and allows for more granular
control than you may have in the Device Manager. CLI commands also allow access to more advanced options that are
not available in the FortiGate GUI. Scripts that set information require more lines.
Any scripts that you will be running on the global database must include the full CLI commands
and not use short forms for the commands. Short form commands will not run on the global
database.
Create a new admin profile allowing read-only access to policy related areas
Variations This profile is read-only to allow a policy administrator to monitor this device’s configuration
and traffic.
Variations may include enabling other areas as read-only or write permissions based on that
account type’s needs.
You can run a CLI script in the FortiManager Global Database in addition to running it on a FortiGate unit directly.
Compare the following sample scripts:
Variations The command config global footer policy can be replaced with config global
header policy to create a header policy in the Global Database.
Error Messages
Most error messages you will see are regular FortiGate CLI error messages. If you are familiar with the CLI you will likely
recognize them.
Other error messages indicate your script encountered problems while executing, such as:
l command parse error: It was not possible to parse this line of your script into a valid FortiGate CLI command.
Common causes for this are misspelled keywords or an incorrect command format.
l unknown action: Generally this message indicates the previous line of the script was not executed, especially if
the previous line accesses an object such as “config router static”.
l Device XXX failed-1: This usually means there is a problem with the end of the script. XXX is the name of the
FortiGate unit the script is to be executed on. If a script has no end statement or that line has an error in it you may
see this error message. You may also see this message if the FortiGate unit has not been synchronized by
deploying its current configuration.
Troubleshooting Tips
Here are some troubleshooting tips to help locate and fix problems you may experience with your scripts.
l Check the script output. Generally the error messages displayed here will help you locate and fix the problem.
l See the FortiGate CLI Reference for more information on all CLI commands.
l There is a limit to the number of scripts allowed on the FortiManager unit. Try removing an old script before trying to
save your current one.
l As mentioned at the start of this chapter, ensure the console more command is disabled on the FortiGate devices
where scripts execute. Otherwise a condition may occur where both the FortiGate device and the FortiManager
system are waiting for each other to respond until they timeout.
l There should be no punctuation at the start or end of the lines.
l Only whitespace is allowed on the same line as the command. This is useful in lining up end and next commands
for quick and easy debugging of the script.
l Keep your scripts short. They are easier to troubleshoot and it gives you more flexibility. You can easily execute a
number of scripts after each other.
l Use full command names. For example instead of “set host test” use “set hostname test”. This is required for any
scripts that are to be run on the global database.
l Use the number sign (#) to comment out a line you suspect contains an error.
Tcl scripts
Tcl is a dynamic scripting language that extends the functionality of CLI scripting. In FortiManager Tcl scripts, the first
line of the script is “#!” as it is for standard Tcl scripts.
TCL Scripts do not run through the FGFM tunnel like CLI Scripts do. TCL Scripts use SSH to
tunnel through FGFM and they require SSH authentication to do so. If FortiManager does not
use the correct administrative credentials in Device Manager, the TCL script will fail. CLI
scripts use the FGFM tunnel and the FGFM tunnel is authenticated using the FortiManager
and FortiGate serial numbers.
Do not include the exit command that normally ends Tcl scripts; it will prevent the script from
running.
This guide assumes you are familiar with the Tcl language and regular expressions, and instead focuses on how to use
CLI commands in your Tcl scripts. Where you require more information about Tcl commands than this guide contains,
please refer to resources such as the Tcl newsgroup, Tcl reference books, and the official Tcl website at
https://www.tcl.tk.
Tcl scripts can do more than just get and set information. The benefits of Tcl come from:
l variables to store information,
l loops to repeats commands that are slightly different each time
l decisions to compare information from the device
The sample scripts in this section will contain procedures that you can combine to use your scripts. The samples will
each focus on one of four areas:
l Tcl variables
l Tcl loops
l Tcl decisions
l Tcl file IO
To enable Tcl scripting, use the following CLI commands:
config system admin setting
set show_tcl_script enable
end
FortiManager Tcl executes in a controlled environment. You do not have to know the location of the Tcl interpreter or
environment variables to execute your scripts. This also means some of the commands normally found in Tcl are not
used in FortiManager Tcl.
Depending on the CLI commands you use in your Tcl scripts, you may not be able to run some scripts on some versions
of FortiOS as CLI commands change periodically.
Before testing a new script on a FortiGate device, you should backup that device’s
configuration and data to ensure it is not lost if the script does not work as expected.
Tcl variables
Variables allow you to store information from the FortiGate device, and use it later in the script. Arrays allow you to easily
manage information by storing multiple pieces of data under a variable name. The next script uses an array to store the
FortiGate system information.
Script:
#!
proc get_sys_status aname {
upvar $aname a
puts [exec "#This is an example Tcl script to get the system status of the FortiGate\n" "# "
15 ]
set input [exec "get system status\n" "# " 15 ]
# puts $input
set linelist [split $input \n]
# puts $linelist
foreach line $linelist {
if {![regexp {([^:]+):(.*)} $line dummy key value]} continue
switch -regexp -- $key {
Version {
regexp {FortiGate-([^ ]+) ([^,]+),build([\d]+),.*} $value dummy a(platform) a(version)
a(build)
}
Serial-Number {
set a(serial-number) [string trim $value]
}
Hostname {
set a(hostname) [string trim $value]
} }
}
}
get_sys_status status
puts "This machine is a $status(platform) platform."
puts "It is running version $status(version) of FortiOS."
puts "The firmware is build# $status(build)."
puts "S/N: $status(serial-number)"
puts "This machine is called $status(hostname)"
Output:
------- Executing time: 2013-10-21 09:58:06 ------
Starting log (Run on device)
FortiGate-VM64 #
Variations:
Once the information is in the variable array, you can use it as part of commands you send to the FortiGate device or to
make decisions based on the information. For example:
if {$status(version) == 5.0} {
# follow the version 5.0 commands
} elseif {$status(version) == 5.0} {
# follow the version 5.0 commands
}
This script introduces the concept of executing CLI commands within Tcl scripts using the following method:
set input [exec "get system status\n" "# "]
This command executes the CLI command “get system status” and passes the result into the variable called
input. Without the “\n” at the end of the CLI command, the CLI command will not execute to provide output.
In analyzing this script:
l line 1 is the required #! to indicate this is a Tcl script
l lines 2-3 open the procedure declaration
l lines 4-5 puts the output from the CLI command into a Tcl variable as a string, and breaks it up at each return
character into an array of smaller strings
l line 6 starts a loop to go through the array of strings
l line 7 loops if the array element is punctuation or continues if its text
l line 8 takes the output of line 7’s regular expression command and based on a match, performs one of the actions
listed in lines 9 through 17
l lines 9-11 if regular expression matches ‘Version’ then parse the text and store values for the platform, version, and
build number in the named array elements
l line 12-14 if regular expression matches ‘Serial-Number’ then store the value in an array element named that after
trimming the string down to text only
l lines 15-17 is similar to line 12 except the regular expression is matched against ‘Hostname’
l line 17-19 close the switch decision statement, the for each loop, and the procedure
l line 20 calls the procedure with an array name of status
l lines 21-25 output the information stored in the status array
Tcl loops
Even though the last script used a loop, that script’s main purpose was storing information in the array. The next script
uses a loop to create a preset number of users on the FortiGate device, in this case 10 users. The output is only shown
for the first two users due to space considerations.
Script:
#!
proc do_cmd {cmd} {
puts [exec "$cmd\n" "# " 15]
}
set num_users 10
do_cmd "config vdom"
do_cmd "edit root"
do_cmd "config user local"
for {set i 1} {$i <= $num_users} {incr i} {
set name [format "usr%04d" $i]
puts "Adding user: $name"
do_cmd "edit $name"
do_cmd "set status enable"
do_cmd "set type password"
do_cmd "next"
}
do_cmd "end"
do_cmd "end"
Output:
View the log of script running on device:FortiGate-VM64
FortiGate-VM64 (local) #
Adding user: usr0002
edit usr0002
new entry 'usr0002' added
FortiGate-VM64 (usr0002) #
set status enable
FortiGate-VM64 (usr0002) #
set type password
FortiGate-VM64 (usr0002) #
next
Variations:
There are a number of uses for this kind of looping script. One example is to create firewall policies for each interface that
deny all non-HTTPS and non-SSH traffic by default. Another example is a scheduled script to loop through the static
routing table to check that each entry is still reachable, and if not remove it from the table.
This script loops 10 times creating a new user each time whose name is based on the loop counter. The format
command is used to force a four digit number.
In analyzing this script:
l line 1 is the required #! to indicate this is a Tcl script
l lines 2-4 open CLI command wrapper procedure
l line 5 declares the number of users to create
l line 6 gets the FortiGate ready for entering local users
l line 7 opens the for loop that will loop ten times
l line 8 sets the user name based on the incremented loop counter variable
l line 9 is just a comment to the administrator which user is being created
l lines 10-13 create and configure the user, leaving the CLI ready for the next user to be added
l line 14 ends the for loop
l line 15 ends the adding of users in the CLI
l line 16 executes a CLI command to prove the users were added properly
Tcl decisions
Tcl has a number of decision structures that allow you to execute different CLI commands based on what information
you discover.
This script is more complex than the previous scripts as it uses two procedures that read FortiGate information, make a
decision based on that information, and then executes one of the CLI sub-scripts based on that information.
Script:
#!
# need to define procedure do_cmd
# the second parameter of exec should be "# "
# If split one command to multiple lines use "\" to continue
proc do_cmd {cmd} {
puts [exec "$cmd\n" "# "]
}
foreach line [split [exec "show firewall policy\n" "# "] \n] {
if {[regexp {edit[ ]+([0-9]+)} $line match policyid]} {
continue
} elseif {[regexp {set[ ]+(\w+)[ ]+(.*)\r} $line match key value]} {
lappend fw_policy($policyid) "$key $value"
}
}
do_cmd "config firewall policy"
foreach policyid [array names fw_policy] {
if {[lsearch $fw_policy($policyid){diffservcode_forward 000011}] == -1} {
do_cmd "edit $policyid"
do_cmd "set diffserv-forward enable"
do_cmd "set diffservcode-forward 000011"
do_cmd "next"
}
}
do_cmd "end"
Variations:
This type of script is useful for updating long lists of records. For example if the FortiOS version adds new keywords to
user accounts, you can create a script similar to this one to get the list of user accounts and for each one edit it, add the
new information, and move on to the next.
This script uses two decision statements. Both are involved in text matching. The first decision is checking each line of
input for the policy ID and if its not there it skips the line. If it is there, all the policy information is saved to an array for
future use. The second decision searches the array of policy information to see which polices are miss
Example: Get and display state information about the FortiGate device:
Script:
#!
#Run on FortiOS v5.00
#This script will display FortiGate's CPU states,
#Memory states, and Up time
puts [exec "# This is an example Tcl script to get the system performance of the
FortiGate\n" "# " 15 ]
set input [exec "get system status\n" "# " 15]
regexp {Version: *([^ ]+) ([^,]+),build([0-9]+),[0-9]+} $input dummy status(Platform) status
(Version) status(Build)
if {$status(Version) eq "v5.0"} {
puts -nonewline [exec "config global\n" "# " 30]
puts -nonewline [exec "get system performance status\n" "# " 30]
puts -nonewline [exec "end\n" "# " 30]
} else {
puts -nonewline [exec "get system performance\n" "#" 30]
}
Output:
------- Executing time: 2013-10-21 16:21:43 ------
Starting log (Run on device)
FortiGate-VM64 #
config global
FortiGate-VM64 (global) # get system performance status
Average session setup rate: 0 sessions per second in last 1 minute, 0 sessions per second in
last 10 minutes, 0 sessions per second in last 30 minutes
Virus caught: 0 total in 1 minute
IPS attacks blocked: 0 total in 1 minute
Uptime: 6 days, 1 hours, 34 minutes
Script:
#!
#Run on FortiOS v5.00
#This script will configure common global, user group and ntp settings
#if you do not want to set a parameter, comment the
#corresponding set command
#if you want to reset a parameter to it's default
#value, set it an empty string
puts [exec "# This is an example Tcl script to configure global, user group and ntp setting
of FortiGate\n" "# " 15 ]
# global
set sys_global(admintimeout) ""
# user group
set sys_user_group(authtimeout) 20
# ntp
set sys_ntp(source-ip) "0.0.0.0"
set sys_ntp(ntpsync) "enable"
#procedure to execute FortiGate command
proc fgt_cmd cmd {
puts -nonewline [exec "$cmd\n" "# " 30]
}
#config system global---begin
fgt_cmd "config global"
fgt_cmd "config system global"
foreach key [array names sys_global] {
if {$sys_global($key) ne ""} {
fgt_cmd "set $key $sys_global($key)"
} else {
fgt_cmd "unset $key"
}
}
fgt_cmd "end"
fgt_cmd "end"
#config system global---end
if {$sys_user_group($key) ne ""} {
fgt_cmd "set $key $sys_user_group($key)"
} else {
fgt_cmd "unset $key"
}
}
fgt_cmd "end"
fgt_cmd "end"
#config system user group---end
Output:
------- Executing time: 2013-10-22 09:12:57 ------
Starting log (Run on device)
Script:
#!
#Run on FortiOS v5.00
#This script will configure log syslogd setting and
#filter
#key-value pairs for 'config log syslogd setting', no
#value means default value.
set setting_list {{status enable} {csv enable}
{facility alert} {port} {server 1.1.1.2}}
#key-value pairs for 'config log syslogd filter', no
#value means default value.
puts [exec "# This is an example Tcl script to configure log syslogd setting and filter
setting of FortiGate\n" "# " 15 ]
set filter_list {{attack enable} {email enable} {severity} {traffic enable} {virus
disable}
{web enable}}
#set the number of syslogd server, "", "2" or "3"
set syslogd_no "2"
#procedure to execute FortiGate CLI command
proc fgt_cmd cmd {
puts -nonewline [exec "$cmd\n" "# "]
}
#procedure to set a series of key-value pairs
proc set_kv kv_list {
foreach kv $kv_list {
set len [llength $kv]
if {$len == 0} {
continue
} elseif {$len == 1} {
fgt_cmd "unset [lindex $kv 0]"
} else {
fgt_cmd "set [lindex $kv 0] [lindex $kv 1]"
} } }
#configure log syslogd setting---begin
fgt_cmd "config global"
fgt_cmd "config log syslogd$syslogd_no setting"
set_kv $setting_list
fgt_cmd "end"
#configure log syslogd setting---end
#configure log syslogd filter---begin
fgt_cmd "config log syslogd$syslogd_no filter"
set_kv $filter_list
fgt_cmd "end"
#configure log syslogd filter---end
Output:
Starting log (Run on device)
Script:
#!
#This script will configure the FortiGate device to
#communicate with a FortiAnalyzer unit
#Enter the following key-value pairs for 'config
#system fortianalyzer'
set status enable
set enc-algorithm high
#localid will be set as the hostname automatically
#later
puts [exec "# This is an example Tcl script to configure the FortiGate to communicate with a
FortiAnalyzer\n" "# " 15 ]
set server 1.1.1.1
#for fortianalyzer, fortianalyzer2 or
#fortianalyzer3, enter the corresponding value "",
#"2", "3"
set faz_no ""
#keys used for 'config system fortianalyzer', if you
#do not want to change the value of a key, do not put
#it in the list
set key_list {status enc-algorithm localid server }
##procedure to get system status from a FortiGate
proc get_sys_status aname {
upvar $aname a
set input [split [exec "get system status\n" "# "] \n]
foreach line $input {
if {![regexp {([^:]+):(.*)} $line dummy key value]} continue
set a([string trim $key]) [string trim $value]
}
}
#procedure to execute FortiGate command
proc fgt_cmd cmd {
puts -nonewline [exec "$cmd\n" "# "]
}
#set the localid as the FortiGate's hostname
get_sys_status sys_status
set localid $sys_status(Hostname)
#config system fortianalyzer---begin
fgt_cmd "config global"
fgt_cmd "config log fortianalyzer$faz_no setting"
foreach key $key_list {
if [info exists $key] {
fgt_cmd "set $key [set $key]"
} else {
fgt_cmd "unset $key"
}
}
fgt_cmd "end"
fgt_cmd "end"
#config system fortianalyzer---end
Output:
Starting log (Run on device)
FortiGate-VM64 # config global
FortiGate-VM64 (global) # config log fortianalyzer setting
FortiGate-VM64 (setting) # set status enable
FortiGate-VM64 (setting) # set enc-algorithm high
FortiGate-VM64 (setting) # set localid FortiGate-VM64
FortiGate-VM64 (setting) # set server 1.1.1.1
FortiGate-VM64 (setting) # end
FortiGate-VM64 (global) # end
FortiGate-VM64 #
------- The end of log ---------
Example: Create custom IPS signatures and add them to a custom group.
Script:
#!
#Run on FortiOS v5.00
#This script will create custom ips signatures and
#change the settings for the custom ips signatures
puts [exec "# This is an example Tcl script to create custom ips signatures and change the
settings for the custom ips signatures on a FortiGate\n" "# " 15 ]
#Enter custom ips signatures, signature names are the
#names of array elements
set custom_sig(c1) {"F-SBID(--protocol icmp;--icmp_type 10; )"}
set custom_sig(c2) {"F-SBID(--protocol icmp;--icmp_type 0; )"}
#Enter custom ips settings
set custom_rule(c1) {{status enable} {action block} {log enable} {log-packet} {severity
high}}
set custom_rule(c2) {{status enable} {action pass} {log} {log-packet disable} {severity
low}}
#procedure to execute FortiGate command
proc fgt_cmd cmd {
puts -nonewline [exec "$cmd\n" "# "]
}
#procedure to set a series of key-value pairs
proc set_kv kv_list {
foreach kv $kv_list {
set len [llength $kv]
if {$len == 0} {
continue
} elseif {$len == 1} {
fgt_cmd "unset [lindex $kv 0]"
} else {
fgt_cmd "set [lindex $kv 0] [lindex $kv 1]"
}
} }
#config ips custom---begin
fgt_cmd "config vdom"
fgt_cmd "edit root"
Output:
Starting log (Run on device)
FortiGate-VM64 # config vdom
FortiGate-VM64 (vdom) # edit root
current vf=root:0
FortiGate-VM64 (root) # config ips custom
FortiGate-VM64 (custom) # edit c1
set signature "F-SBID(--protocol icmp;--icmp_type 10; )"
FortiGate-VM64 (c1) # set signature "F-SBID(--protocol icmp;--icmp_type 10; )"
FortiGate-VM64 (c1) # next
FortiGate-VM64 (custom) # edit c2
FortiGate-VM64 (c2) # set signature "F-SBID(--protocol icmp;--icmp_type 0; )"
FortiGate-VM64 (c2) # next
FortiGate-VM64 (custom) # end
FortiGate-VM64 (root) # config ips custom
FortiGate-VM64 (custom) # edit c1
FortiGate-VM64 (c1) # set status enable
FortiGate-VM64 (c1) # set action block
FortiGate-VM64 (c1) # set log enable
FortiGate-VM64 (c1) # unset log-packet
FortiGate-VM64 (c1) # set severity high
FortiGate-VM64 (c1) # end
FortiGate-VM64 (root) # config ips custom
FortiGate-VM64 (custom) # edit c2
FortiGate-VM64 (c2) # set status enable
FortiGate-VM64 (c2) # set action pass
FortiGate-VM64 (c2) # unset log
FortiGate-VM64 (c2) # set log-packet disable
FortiGate-VM64 (c2) # set severity low
FortiGate-VM64 (c2) # end
FortiGate-VM64 (root) # end
FortiGate-VM64 #
------- The end of log ----------
Variations:
None.
Tcl file IO
You can write to and read from files using Tcl scripts. For security reasons there is only one directory on the
FortiManager where scripts can access files. For this reason, there is no reason to include the directory in the file name
you are accessing. For example “/var/temp/myfile” or “~/myfile” will cause an error, but “myfile” or “/myfile” is OK.
The Tcl commands that are supported for file IO are: file, open, gets, read, tell, seek, eof, flush, close,
fcopy, fconfigure, and fileevent.
The Tcl file command only supports delete subcommand, and does not support the -force option.
There is 10MB of diskspace allocated for Tcl scripts. An error will be reported if this size is exceeded.
These files will be reset when the following CLI commands are run: exec format, exec reset partition, or exec
reset all. The files will not be reset when the firmware is updated unless otherwise specified.
To write to a file:
Script #!
set somefile [open “tcl_test” w]
puts $somefile "Hello, world!"
close $somefile
Script #!
set otherfile [open “tcl_test” r]
while {[gets $otherfile line] >= 0} {
puts [string length $line]
}
close $otherfile
These two short scripts write a file called tcl_test and then read it back.
Line 3 in both scripts opens the file either for reading (r) or writing (w) and assigns it to a filehandle (somefile or otherfile).
Later in the script when you see these filehandles, its input or output passing to the open file.
When reading from the file, lines 4 and 5 loop through the file line by line until it reaches the end of the file. Each line that
is read is put to the screen.
Both scripts close the file before they exit.
Troubleshooting Tips
This section includes suggestions to help you find and fix problems you may be having with your scripts.
l Make sure the commands you are trying to execute are valid for the version of FortiOS running on your target
FortiGate device.
l You should always use braces when evaluating code that may contain user input, to avoid possible security
breaches. To illustrate the danger, consider this interactive session:
% set userinput {[puts DANGER!]}
[puts DANGER!]
% expr $userinput == 1
DANGER!
0
% expr {$userinput == 1}
0
In the first example, the code contained in the user-supplied input is evaluated, whereas in the second the braces
prevent this potential danger. As a general rule, always surround expressions with braces, whether using expr
directly or some other command that takes an expression.
l A number that includes a leading zero or zeros, such as 0500 or 0011, is interpreted as an octal number, not a
decimal number. So 0500 is actually 320 in decimal, and 0011 is 9 in decimal.
l There is a limit to the number of scripts allowed on the FortiManager unit. Try removing an old script before trying to
save your current one.
l Using the Tcl command “catch” you can add custom error messages in your script to alert you to problems during
the script execution. When catch encounters an error it will return 1, but if there is no error it will return 0. For
example:
if { [catch {open $someFile w} fid] } {
puts stderr "Could not open $someFile for writing\n$fid"
exit 1 ;# error opening the file!
} else {
# put the rest of your script here
}
You can use Tcl script to access FortiManager’s device database or ADOM database (local database). The option to run
a TCL script on remote FortiGate directly (via CLI) should be still used. However, for any portion of a script that needs to
be run on a local database, FortiManager uses a syntax within the TCL script exec_ondb to define it.
Example 1:
Run the Tcl script on an ADOM database for a specify policy package. For example, creating new a policy or object:
Example 2:
Run the Tcl script on the current ADOM database for a specify policy package. For example, creating a new policy and
object:
end
" "# "]
Example 3:
Example 4:
Provisioning Templates
Go to Device Manager > Provisioning Templates to access configuration options for the following templates:
l Template groups on page 253
l Fabric authorization templates on page 256
l System templates
l IPsec tunnel templates on page 264
l Static route templates on page 282
l BGP templates on page 284
l Certificate templates
l Threat Weight templates
Template groups
The Device Manager > Provisioning Templates > Template Group pane allows you to create a template group, and add
templates to the group. Then you can assign the template group to one or more devices or VDOMs or to a device group
rather than assigning individual templates to devices or VDOMs.
You can assign one provisioning template from each of the following template types to a template group. Multiple
AP profiles can be selected.
l System template
l Threat weight template
l IPsec tunnel template
l Static route template
l BGP template
l NSX-T service template
l SD-WAN template
l AP Profile
l FortiSwitch template
l FortiExtender template
l CLI template
l CLI template group
When a template group is assigned to a device or device group, FortiManager ensures the templates in the group are
installed to devices in the correct order. For example, if a template group contains both an IPsec template and an
interface template, FortiManager ensures that the IPsec template is installed to devices before the interface template to
allow the interface template to configure IP addresses on the interfaces created by the IPsec template.
When uninstalling template groups, FortiManager ensures the templates are uninstalled in the correct order too.
Following is an overview of how to use template groups:
1. Create a template group. See Creating template groups on page 253.
2. Assign the template group to one or more devices or to one or more device groups. See Assigning template groups
on page 255.
3. Edit template groups as needed. See Editing template groups on page 255.
You can also delete template groups. See Deleting template groups on page 256.
You can create a template group, and add provisioning templates to it.
7. Click OK.
The template group is created.
You can assign a template group to one or more devices or to a device group.
3. In the Available Entries list, select one or more devices or device groups, and click > to move them to the Selected
Entries list, and then click OK.
The devices and device groups assigned to the template group are shown in the Assign to Device/Device Group
column.
4. Go to Device Manager > Device & Groups, and view the list of devices in Table View.
The Provisioning Templates column displays the name of the assigned template group.
After you create a template group, you can edit it to add or remove templates. You can also edit templates.
added to the template group, and templates without a checkmark are removed from the template group.
l Beside a template type, click the + button to create a new template.
l Expand a template type, select a template, and click the Edit button to edit the template.
5. Click OK.
The Provisioning Templates - <group name> pane closes, and the list of selected provisioning templates is
displayed.
6. Click OK.
The template group changes are saved.
Fabric authorization templates can be used to allow FortiManager to automatically authorize FortiAP, FortiSwitch, and
FortiExtender devices.
Fabric authorization templates can be created by going to Device Manager > Provisioning Templates
> Fabric Authorization Template.
The following options are available:
stage as required.
3. Perform an install on the target FortiGate devices so the Fabric devices are pushed to the targets.
l When the real Fabric devices come online matching the specified prefix, it will replace the device in the Device
Manager. The list is followed from top to bottom until all devices have been replaced by real devices, at which
point additional devices will not be automatically authorized.
l Fabric devices configured by FortiManager are displayed in the Device Manager. You can go to FortiAP
Manager , FortiSwitch Manager, and FortiExtender Manager to view and assign profiles to the devices.
Manager. The list is followed from top to bottom until all devices have been replaced by real devices, at which
point additional devices will not be automatically authorized.
2. Click Create New. The Create New Fabric Authorization Template pane opens.
3. Enter the following information, then click OK to create the certificate template:
FortiAP
Enable Wireless Toggle to enable wireless controllers. Additional settings are available once
Controller this option is selected.
Platform 1 By default, only one wireless controller platform is listed. You can click the add
button at the bottom of the page to add another platform to the template. Click
the trash icon to delete the platform.
Prefix Select the serial number prefix for the selected devices from the dropdown
menu.
FortiSwitch
Enable Switch Toggle to enable switch controllers. Additional settings are available once this
Controller option is selected.
Platform By default, only one switch platform is listed. You can click the add button at
the bottom of the page to add another platform to the template. Click the trash
icon to delete the platform.
Prefix Select the serial number prefix for the selected devices from the dropdown
menu.
FortiExtender
Enable Extender Toggle to enable extender controllers. Additional settings are available once
Controller this option is selected.
Platform 1 By default, only one extender platform is listed. You can click the add button at
the bottom of the page to add another platform to the template. Click the trash
icon to delete the platform.
Prefix Select the serial number prefix for the selected devices from the dropdown
menu.
Extension Type Select the extension type as either WAN Extension or LAN Extension.
System templates
The Device Manager > Provisioning Templates > System Templates pane allows you to create and manage device
profiles. A system template is a subset of a model device configuration. Each device or device group can be linked with a
system template. When linked, the selected settings come from the template and not from the Device Manager
database.
By default, there is one generic default profile defined. System templates are managed in a similar manner to policy
packages. You can use the context menus to create new device profiles. You can configure the settings in each section
or import settings from a specific device.
Fields that support metadata variables are identified with the following magnifying glass icon . See ADOM-level
metadata variables on page 479..
Go to Device Manager > Provisioning Templates > System Templates to configure system templates.
To import settings from a device, click More > Import and select the device.
Enable a section to expose the settings. The following sections and settings are available:
Widget Description
l Sync Interval
l Interface
l Server mode
l Source IP
l Advanced Options
You can select to use the FortiGuard server or specify one or more other servers.
l Authentication
l HTTPS Port
l SSH Port
l SSH v1 compatibility
l Idle Timeout
l Enable SCP
l Host Name
l Time Zone
l Geographic Coordinate
SNMP SNMP v1/v2 and SNMP v3 settings. In the toolbar, you can select to create, edit, or
delete the record.
To create a new SNMP, click Create New and specify the community name, hosts,
queries, traps, and SNMP events.
Widget Description
Replacement Messages You can customize replacement messages. Click Import to select a device and the
objects to import.
FortiGuard Enable Enable Auto Firmware Upgrade to enable FortiGate automatic firmware patch
upgrades. Optionally specify the upgrade schedule.
Enable Enable FortiGuard Security Updates to retrieve updates from FortiGuard
servers or from this FortiManager. You can define multiple servers and specify Update,
Rating, or Updates and Rating. You can also select Include Worldwide FortiGuard
Servers.
Log Settings Select Send Logs to FortiAnalyzer Cloud, Send Logs to FortiAnalyzer/FortiManager,
and/or Send Logs to Syslog.
If selected, enter the requisite information for the option.
Interface Zone and interface settings. In the toolbar, you can select to create, edit, or delete the
record.
By default the Interface widget is hidden. From the Toggle Widgets menu, select
Interface to display the Interface widget.
To create a new interface, click Create New and specify an action and identify what
models will receive the action.
You can create, edit, or delete templates. Select System Templates in the tree to display the Create New, Edit, Delete,
and Import options in the content pane. You can also select the devices or device groups to be associated with the
template by selecting Assign to Devices/Groups.
You must assign an interface template to devices when Required is enabled for device object meta fields.
A value must be defined for each device for the required meta fields before you can assign an interface template to the
device.
See also Meta Fields on page 941.
After you create an interface action, you can preview the interface action per model or device.
In the following example, the selected platform does not have the same type of port, and an error is displayed.
In the following example, the selected device has the same type of port.
IPsec templates are used to standardize IPsec tunnel configurations for consistency and scalability. Templates may be
applied to one or more individual devices, or device groups. ADOM-level metadata variables are used to facilitate the
templates being assigned to multiple FortiGates, and the tunnel interfaces may be mapped to normalized interfaces to
be used in firewall policies and SD-WAN configuration.
This topic includes the following sections:
l Recommended IPsec templates on page 265.
l Creating new IPsec VPN templates on page 267
l Assigning IPsec VPN templates on page 269.
l Installing IPsec VPN configuration on page 269.
l Verifying IPsec template configuration status on page 270.
l Verifying IPsec VPN tunnel status on page 270.
FortiManager includes recommended IPsec templates that come preconfigured with FortiManager best practices
recommendations for use within your environment. These templates can be used to simplify deployment of SD-WAN
interconnected sites or to create IPsec VPN for FortiGate devices.
Once a new IPsec template has been created from a recommended template, it can be edited, deleted, and/or cloned.
ADOM-level metadata variables can be used when configuring a recommended template's required fields to ensure that
fields like Local ID are unique when the template is assigned to multiple devices. See ADOM-level metadata variables on
page 479.
The following IPsec recommended templates are available.
HUB_IPSec_Recommended This template was created for use with the SD-WAN provisioning template. The
wizard prompts for input expected for HUB IPsec tunnels used by the SD-WAN
template. The template assumes dialup clients by selecting Dynamic for Remote
Devices.
Branch_IPSec_Recommended Fortinet's recommended template for IPSec branch device configurations. The
wizard prompts for the remote gateway (HUB) and requests a local ID to facilitate
multiple tunnels for use in SD-WAN.
IPSec_Fortinet_ Fortinet's recommended template for IPSec configurations. Unlike the HUB and
Recommended Branch templates above, this template does not make assumptions about the
function of the assigned device/group.
Any field with a magnifying glass indicates that a metadata variable may be used. See
ADOM-level metadata variables on page 479.
6. (Optional) Once a template has been created, it can be added to a template group. SeeTemplate groups on page
253
7. Assign the new template (or template group) to one or more managed devices or device groups.
8. Install the changes.
Enable ADVPN Optionally, toggle this setting to enable Auto Discovery VPN (ADVPN).
Outgoing Interface Enter the outgoing interface. This is the physical port that the branch devices
will connect to.
Outgoing Interface Enter the outgoing interface. This is the physical port that the branch devices
will use to connect to the HUB.
Local ID Enter a Local ID. This is used by the HUB to identify the connecting device.
Remote Gateway Enter the IP address of the HUB interface that the Branch will connect to.
Outgoing Interface Enter the outgoing interface. This is the physical port that the branch devices
will connect to.
Remote Gateway Enter the IP address of the destination device’s interface that the assigned
FortiGates will connect to.
If you prefer to input all the settings required for a VPN tunnel, you may create a new IPsec VPN template as follows.
Any field with a magnifying glass indicates that an ADOM-level metadata variable may be
used. See ADOM-level metadata variables on page 479.
Setting Value/Description
Routing Automatic: Static routes to remote subnet will be created. See Remote Subnet on
page 268.
Manual: Routes will not automatically created.
Remote Device IP Address: Select when you know the IP address of the VPN tunnel destination.
Dynamic DNS: Select when you will provide a FQDN for the VPN tunnel
destination.
Dynamic: Select when the remote device will be dial-up clients where their IP
address may vary or cannot be determined at the time of configuration.
Remote Gateway (IP Enter the IP address of the VPN tunnel destination. Only available when IP Address
Address) is selected.
Remote Gateway Enter the FQDN of the VPN tunnel destination. Only available when Dynamic DNS
(FQDN) is selected.
IPv4 Start IP Enter the first usable IP address assigned to connecting dial-up devices.
IPv4 End IP Enter the last usable IP address assigned to connecting dial-up devices.
IPv4 Netmask Define the netmask for the IP addresses assigned to connecting dial-up devices.
Outgoing Interface Define the interface used to establish the VPN tunnel.
Local ID If there are several dialup IPsec VPN tunnels configured on the same interface,
specify a Local ID for the dial-up client’s peer ID to match.
Network Overlay Toggle on to provide a network ID. Distinct network overlay IDs are required to
establish multiple IPsec VPN tunnels between the same two FortiGate IP
addresses.
Remote Subnet Enter one or more remote subnets, with netmask. This field is available when
Automatic routing is selected. This subnet is used to generate a static route.
Proposal Define the cipher suites offered when negotiating the VPN tunnel settings.
FEC Health Check If FEC is to be used, this health check server allows the FortiGate to assess the link
quality and adaptively increase redundancy levels as the link quality or throughput
changes.
Authentication Method Pre-shared Key: Alphanumeric key used for device authentication.
Signature: Select a certificate to be used for authentication, including the Peer
Certificate CA.
Setting Value/Description
Tunnel Interface Setup Configure the IP or remote IP for the tunnel to use in the IPsec template.
Phase 2 Interface Click Create New to define the parameters for the phase 2 interface.
5. Click OK to save the settings. The IPsec template is created and ready to be assigned to devices.
After the IPsec template is assigned to devices, it still must be installed to push the configuration to the devices.
If a template is assigned but not installed, a Caution icon displays before the template name in the IPsec Template
column. You must install the IPsec VPN configuration and firewall policies to the devices for the IPsec template to push
through all the settings.
4. Click Install > Install Wizard from the toolbar. The Install Wizard dialog appears.
5. Continue with the policy installation on the appropriate devices.
6. Click Finish. The firewall policies are installed and the IPsec VPN configurations are pushed to the devices.
A green checkmark next to the template name in the IPsec Template column indicates that the template is synchronized.
A yellow triangle caution icon indicates that the template is modified.
When you un-assign an IPsec template from a device, FortiManager modifies the configuration for the affected devices.
When you install the modified configuration to devices, FortiManager automatically uninstalls the configuration (phase1
and phase2 interfaces) generated by the IPsec template from the devices.
FortiManager does not remove dependencies, such as routing, policies, and normalized
interfaces. You must manually remove those dependencies. For example, if the VPN tunnel is
being used in a policy, you must edit the policy to manually remove the VPN tunnel interface
from the source or destination interface.
6. Install the modified device configuration to remove the IPsec template configuration from the device.
You can view the changes in the Install Log. For example, the Install Log for the device named vlan171_0091 shows
that FortiManager removed phase1 and phase2 interface settings.
The following example demonstrates the IPsec template features with the following assumptions:
l All three FortiGates are added in FortiManager without prior configuration.
l The branch FortiGates are added to a Branches device group. See Adding custom device groups on page 133.
l The below topology outlines the connected networks for each FortiGate.
Once configured, the overlay will look like the following topology.
Field Value
IPv4 Start IP and IPv4 End IP specify the range of IP addresses that connecting branches
will use for their IPsec tunnel IP. These IP addresses can be adjusted to fit your needs.
The current scheme only scales to 100 branches.
4. Click OK to save.
5. Edit the newly created template, then edit the VPN1 tunnel.
a. Change Routing from Manual to Automatic
i. Under Remote Subnet, enter 172.16.0.0/255.255.0.0.
b. Set the Tunnel Interface Setup to:
l IP: 10.0.0.101/32.
l Remote IP: 10.0.0.254/24.
These settings configure the HQ FortiGate’s IPsec interface. The same can be done for the branch FortiGates.
However, this example uses mode-config to assign addresses using the IPv4 range shown in the image above.
6. Click OK to save.
Field Value
Local ID Branch$(branch_id)
4. Click OK to save.
5. Edit the newly created template, then edit the HUB1-VPN1 tunnel.
6. Change Routing from Manual to Automatic
7. Under Remote Subnet, enter 172.16.0.0/255.255.255.0.
8. Click OK to save.
1. In Device Manager > Provisioning Tempates > IPsec Tunnel Templates, Right click ACME_BRANCH and click Assign
to Devices/Groups.
2. Select Branches and move it to Selected Entries, then click OK.
3. Repeat the same procedure to assign the HUB device group to ACME_HUB.
In order to establish an IPsec tunnel between the FortiGate devices, define policies to permit the traffic. When you install
the policy package, the device settings (including provisioning templates) are installed at the same time.
c. Click OK to save.
4. Enter a Change Note and click OK to save.
1. In Policy Packages, select the Branches policy package and click Create New.
2. Set the following values:
Field Value
Name Branch to HQ
Action Accept
3. Click OK to save.
1. In Policy Packages, select the HUB policy package and click Create New.
2. Set the following values:
Field Value
Name Branches to HQ
Action Accept
3. Click OK to save.
FortiManager can only install one policy package at a time, so install each policy package in turn. The IPsec tunnel
template configuration will be installed along with the policy package.
For more information about installing policies and policy packages, see Install a policy package on page 340.
1. Go to Device Manager > Device & Groups. The list of Managed FortiGate devices is displayed.
2. Verify that Config Status, Policy Package Status, and Provisioning Templates all display a green checkmark to
indicate that the configuration is synchronized between FortiManager and FortiGate.
The devices are missing in this image due to the WAN IP addresses used. Because they
are not public addresses (TEST-NET-2 and TEST-NET-3 are used, see RFC 5737),
FortiManager cannot place them on the map.
You can provision static routes to FortiGate devices by using a static route template.
When creating static routes for IPv4 and subnets, you can use meta field variables for objects of type device VDOM. See
Meta Fields on page 941.
b. In the toolbar, click Create New. The Create New Static Route pane is displayed.
You can use meta field variables created for an object type of Device VDOM when creating IPv4 static routes
for subnets. In the following example, variable $(vdom-ip) is used:
Type Select the type of static route. Choose between IPv4 and IPv6.
Destination Select the destination for the route. Choose between Subnet, Internet Service,
and Internet Service Custom.
When you select Type of IPv4 and Destination of Subnet, you can use a meta
field variable for the subnet. The input format is $(meta_field_name).
If not using a meta field variable, specify the subnet.
BGP templates
FortiManager includes Border Gateway Protocol (BGP) templates allowing you to provision BGP settings across
multiple FortiGate devices.
BGP templates support the use of Device VDOM meta variables in the following places: router
prefix-list, router-id, neighbor-range ( prefix ), router-map ( match-ip-address ), neighbor, and
network ( prefix ).
Neighbor Group The BGP neighbor group feature allows a large number of neighbors to be
configured automatically based on a range of neighbors' source addresses.
Click Create New to add a BGP neighbor group.
IPv4 Redistribute Enable Connected, RIP, OSPF, Static, and ISIS for IPv4 redistribute.
IPv6 Redistribute Enable Connected, RIP, OSPF, Static, and ISIS for IPv6 redistribute.
Best Path Selection Expand to see options for best path selection.
When configuring a BGP Neighbor or Neighbor Group, routing objects can be created and
edited inline under IPv4 Filtering and IPv6 Filtering. You can configure the following:
l Route Map
l Access List
l Prefix List
l AS Path List
l Community List
5. Click OK.
FortiManager includes recommended BGP templates that come preconfigured with FortiManager best practices
recommendations for use within your environment. These templates can be used to simplify deployment of SD-WAN
interconnected sites.
Once a new BGP template has been created from a recommended template, it can be edited, deleted, and/or cloned.
Meta fields can be used when configuring a recommended template's required fields to ensure that fields like Router
ID are unique when the template is assigned to multiple devices. See Meta Fields on page 941.
The following BGP recommended templates are available.
Enable ADVPN Optionally, toggle this setting to enable Auto Discovery VPN (ADVPN).
Router ID Enter the router ID. The router ID is the unique IP address used to identify the
hub device.
Neighbor Enter the neighbor IP and Remote AS. The neighbor IP is the IP address used
while peering as a neighbor.
Neighbor Range Enter the neighbor range Prefix. This is the network range that branch devices
use to connect to the hub.
Enable ADVPN Optionally, toggle this setting to enable Auto Discovery VPN (ADVPN).
Router ID Enter the router ID. The router ID is the unique IP address used to identify the
branch device.
Certificate templates
The certificate templates menu allows you to create certificate templates for an external certificate authority (CA) or the
local FortiManager CA.
FortiManager includes a certificate authority server for each ADOM. When you create an ADOM, the private and public
key pair is created for the ADOM. The key pair is automatically used when you use FortiManager to define IPsec VPNs
or SSL-VPNs for a device.
When you add a device to an IPsec VPN or SSL-VPN topology with a certificate template that uses the FortiManager
CA, the local FortiManager CA is automatically used. No request for a pre-shared key (PSK) is generated. When the
IPsec VPN or SSL-VPN topology is installed to the device, the following process completes automatically:
l The FortiGate device generates a certificate signing request (CSR) file.
l FortiManager signs the CSR file and installs the CSR file on the FortiGate device.
l The CA certificate with public key is installed on the FortiGate device.
Edit Edit a certificate template. Right-click a certificate template, and select Edit.
Delete Delete a certificate template. Right-click a certificate template, and select Delete.
Type Specify whether the certificate uses an external or local certificate authority
(CA).
When you select External, you must specify details about online SCEP
enrollment.
When you select Local, you are using the FortiManager CA server.
Optional Information Optionally, type the organization unit, organization, locality (city), province or
state, country or region, and email address.
Key Type RSA is the default key type. This field cannot be edited.
Key Size Select the key size from the dropdown list: 512 bit, 1024 bit, 1536 bit, or 2048
bit.
Online SCEP Enrollment These options are only available when the certificate type is External.
CA Server URL Type the server URL for the external CA.
User or client behavior can sometimes increase the risk of being attacked or becoming infected. For example, if one of
your network clients receives email viruses on a daily basis while no other clients receive these attachments, extra
measures may be required to protect that client, or a discussion with the user about this issue may be warranted.
Before you can decide on a course of action, you need to know the problem is occurring. Threat weight can provide this
information by tracking client behavior and reporting on activities that you determine are risky or worth tracking.
Threat weight profiles can be created, edited, and assigned to devices. When Threat Weight Tracking is enabled, the
Log Allowed Traffic setting is enabled on all policies.
1. Select a threat weight profile and click Edit. The Edit Threat Weightpane opens.
2. Adjust the threat levels as needed, then click OK to save your changes:
Reset Reset all the threat level definition values to their defaults.
Application Protection Adjust the tracking levels for the different application types that can be tracked.
Intrusion Protection Adjust the tracking levels for the different attack types that can be tracked.
Malware Protection Adjust the tracking levels for the malware or botnet connections that can be
detected.
Packet Based Inspection Adjust the tracking levels for failed connection attempts and traffic blocked by
firewall policies.
Web Activity Adjust the tracking levels for various types of web activity.
Risk Level Values Adjust the values for the four risk levels.
CLI templates
You can create CLI templates and assign them to devices. You can also create CLI template groups of multiple CLI
scripts, and assign the CLI template group to devices, instead of assigning individual scripts to devices.
Go to Device Manager > Provisioning Templates > CLI Templates to view entries in the content pane.
Members Used for CLI template groups. Displays the CLI scripts that are members of the CLI template
group.
The following options are available in the toolbar, in the More menu, or in the right-click menu.
Create New Create Pre-Run CLI Templates or CLI Templates. See Adding CLI templates on page 292.
You can also create a CLI template group. See CLI template groups on page 296.
Edit Edit the selected template or template group. See Editing CLI templates on page 293.
Delete Delete the selected template or template group. See Deleting CLI templates on page 293.
Assign to Assign the selected template or template group to a managed device or device group. See
Device/Group Assigning CLI templates to managed devices on page 293.
More Select a template or template group, and click the More menu to access additional options
including Clone, Validate, Import CLI Template, and Export CLI Template.
Clone Clone the selected CLI template or template group. See Cloning CLI templates on page
294.
Validate Validate the selected CLI template. Template validation is used to determine if your
template is producing the correct output based on the meta variables used. See Validating
CLI templates on page 295.
Import CLI Import a template or template group from your management computer. See Importing CLI
Template templates on page 294.
Export CLI Export a template or template group. See Exporting CLI templates on page 295.
Template
Search Enter a search term in the search field to search a template or template group.
CLI templates can be put into groups so that multiple templates may be assigned to managed devices at the same time.
See CLI template groups on page 296.
CLI templates do not support execute and diagnose commands. CLI templates will only
work with device and device VDOM meta fields.
Pre-run CLI templates are intended for model devices and zero-touch provisioning. Pre-run
CLI templates are run before provisioning templates.
Type Select the template type from one of the following options:
l CLI Script
l Jinja Script
Script details Type the script itself, either manually using a keyboard, or by copying and
pasting from another editor.
4. Click OK.
The CLI template is created and displayed under it's appropriate category. For example, if you created a pre-run
CLI template, it displays under the Pre-Run CLI Template category.
You can edit CLI templates to change script details. You cannot change the name of the template or the type of template.
To edit a template:
3. In the Available Entries list, select devices or device groups, and click > to move those entries to the Selected
Entries list.
When a device is missing meta variables required by the script, an X icon is displayed next to the device's name,
and you are not able to install the script to the device. You can hover your mouse over the icon to see which meta
variables are not set.
4. Click OK.
To import a template:
Cloning a template is useful when there is a need for multiple templates that are very similar.
To clone a template:
To export a template:
FortiManager will suggest commands as you type text into the editor. Select a command from the suggestion menu to
auto-complete the command. FortiManager may suggest additional commands to use based on the previously entered
command. For example, if you type conf, FortiManager will suggest the config command. When config is selected,
FortiManager may present additional options related to the config command that can be added (for example,
firewall address).
You can click the Validate option at the bottom of the editor to review for syntax errors.
A FortiManager warning message will appear if there are errors detected, and an error icon will indicate the line(s) in the
editor that include the error. Hover your mouse over the error icon to review the warning details. FortiManager will
present suggested corrections where applicable, and you can click Use Corrected Suggestion to update the command in
line. Once corrections have been made in the editor, you can click Validate again to confirm that there are no longer any
syntax issues.
In order to ensure the validated results align with the device platform the commands will be run on, you must choose the
correct platform from the Validation device platform dropdown in the editor. Validation will use the syntax from the
selected device platform.
You can enable the Validate on change field to automatically validate the syntax when making changes in the editor
Template validation can be used to determine if your template is producing the correct output based on the metadata
variables used in the template. For more information on meta variables, see ADOM-level metadata variables on page
479
l Click Show Missing Variable Devices Only to filter by devices that are missing variable values.
l Click Preview Script to view the script that will be installed to the selected device.
CLI templates can be put into groups so that multiple templates may be assigned to managed devices at the same time.
Go to Device Manager > Provisioning Templates and click on CLI Templates from the tree menu to view the CLI
Template and CLI Template Group entries in the content pane.
The information displayed and options available for CLI Template Group entries are the same as for CLI Template
entries.
Template Group Name Type a unique name for the template group.
Members Click the + button to select templates or other template groups from the list,
and click OK to add the selected entries as members.
4. Click OK.
provision_interfaces_on_vm This predefined CLI template allows you to configure the number of ports that are
created upon initialization of a FortiGate-VM.
split_hardware_switch_ports_ This predefined CLI template allows you to configure splitting hardware switch
40_80_100 ports for FortiGate 40F, 80E, 100E, and 100F models.
split_hardware_switch_ports_ This predefined CLI template allows you to configure splitting hardware switch
60_90 ports for FortiGate 60F and 90E models.
These templates can be applied when adding offline model devices in the device manager by configuring Port
Provisioning for FortiGate-VMs or Split Switch Ports for eligible FortiGate hardware devices. See Adding offline model
devices on page 96.
You can use FortiManager variables in Jinja script to retrieve data from the FortiManager Device Database.
The following FortiManager variables are supported:
When viewing the Install Preview for the CLI Template, the variable DVMDB.name is replaced with the Name value
for the selected device.
A user is setting up a FGT-VM64 model device on FortiManager. When setting up a FortiGate-VM, the user needs to
execute a script to create the physical interfaces, however, when deploying a FortiGate hardware platform, generating
physical interfaces is not necessary. Previously, the user needed to create a separate device group for their FortiGate-
VM devices and then runs a script to create the physical interfaces for VM devices inside the device group.
Using Jinja, the same CLI template can be applied to ANY new devices (hardware or VM-based) by using a script with
FortiManager variables to determine the platform of the device and using an "if" statement to ensure that the script runs
only on FortiGate-VM devices.
Example script:
Previewing the script on a device shows how the variables are applied.
Example script:
os_type: {{DVMDB.os_type}}
{%- endif %}
Example 3: View the interface attributes for each physical interface on a device
Example script:
NSX-T Service templates allow you to manage multiple FortiGate VMs running on NSX-T by automatically applying
VDOM, policy, and configuration settings to each VM that belongs on the same registered service.
There are two main use cases for this feature:
1. You need to deploy an additional VM in NSX-T.
When a new VM is authorized in FortiManager, it has no configuration or policy. Using the NSX-T template,
FortiManager automatically creates the VDOMs, links them to a policy package, and configures the service
profile/VDOM association, log settings, etc.
2. You need to change the existing configuration, for example adding a VDOM.
FortiManager applies the same change to all VMs from the same service where the template is applied.
NSX-T templates can be created, cloned, deleted, and assigned in Device Manager > Provisioning Templates > NSX-
T Service Template.
1. When editing an NSX-T service template, click Create New under the VDOMs section.
The Create New VDOM pane opens.
2. Enter a name for the VDOM, and select a Policy Package from the dropdown which will be applied to the template.
3. The Virtual Wire Pair will be automatically filled based on the VDOM name.
4. Dynamic interface mapping is mandatory to create a VDOM. Select the interface name and click Edit to configure
the dynamic interface mapping for internal and external interfaces.
The dynamic interface dropdown will only show normalized interfaces that have a default
mapping. The default mapping name must be the same as the name of the interface on the
Edit Interface page.
You can create new interfaces using the + icon in the dropdown.
In order for a device to show up in the list it must meet the following conditions.
1. The VDOM feature must be enabled on the FortiGate.
2. The FortiGate platform type must match the one selected in the template.
3. The NSX-T Service name should match with devices.
5. Once the template has been assigned to the device, you can install the changes using the Install Wizard at the top
of the page.
FortiManager includes the ability to preview CLI configuration changes for provisioning templates.
You can view the CLI preview for all provisioning template types, including: Template Groups, IPsec Tunnel Templates,
SD-WAN Templates, BGP Templates, SD-WAN Overlay Templates, System Templates, Static Route Templates,
CLI Templates, and Threat Weight Templates.
When a provisioning template includes CLI changes for multiple devices, you can select the device in the Device
dropdown when previewing the CLI configuration. You can view the preview for both real and model devices.
If metadata variables are included in the template, the metadata variable names and not their resolved values are
displayed in the preview.
2. Right-click on a template, and choose Preview CLI Configuration. The Preview CLI Configuration window is
displayed with the CLI configuration for the selected template.
3. When the provisioning template includes multiple devices, you can select a device from the Device dropdown. The
CLI preview for the selected device is displayed in the content pane.
4. In the Preview CLI Configuration window, you can search in the CLI using the search bar, and you can download the
CLI preview by clicking the Download button.
Firmware templates
Firmware templates define what firmware version should be installed on FortiGates and all access devices, such as
FortiAP, FortiSwitch, and FortiExtender. You can assign the templates to one or more devices.
After the template is assigned to a device, the device is required to have the specified version installed. You can use the
Firmware Template column on the Device Manager > Device & Groups pane to view the status of the device with the
firmware version specified in the assigned template.
The template can include a schedule to automatically start the firmware upgrades, or you can manually initiate firmware
upgrades.
Following is an overview of how to use firmware templates:
1. Create a firmware template for one or more products. See Creating firmware templates on page 309.
2. Assign the firmware template to one or more devices. See Assigning firmware templates to devices on page 312.
Firmware templates with a schedule will automatically start the firmware upgrades on assigned devices at the
scheduled day and time.
For firmware templates without a schedule, you can manually initiate the firmware upgrades on assigned devices
when you are ready. See Upgrading devices now on page 314.
3. Preview the upgrade. See Previewing upgrades on page 313.
4. View upgrade history. See Reviewing upgrade history on page 313.
5. View the firmware upgrade report. See Viewing the firmware upgrade report on page 314.
6. Monitor device adherence to the firmware template by using the Firmware Template column on the Device Manager
> Device & Groups pane in Table View.
You can also edit and delete firmware templates. See Editing firmware templates on page 312 and Deleting firmware
templates on page 312.
FortiGate devices must have a valid Firmware & General Updates (FMWR) contract in order
for firmware updates to be performed through FortiManager. This applies to firmware images
from FortiGuard and images that are manually uploaded to FortiManager.
When a FortiGate device is added to the FortiManager, a 24 hour grace period is provided in
which firmware updates can be applied without a license to allow time for the FMWR contract
information to synchronize from FortiCare. FortiManager expects the managed device to be
on the same FortiCloud account, or have the device serial number added in FortiGuard's auth
list.
With firmware templates, you can specify what firmware to install on FortiGate and the following associated access
device: FortiAP, FortiSwitch, and FortiExtender.
Firmware images for FortiExtender are not available on FortiGuard. Before you can select a
firmware image for FortiExtender in a firmware template, you must download the firmware
image from the Customer Service & Support site, and import the image to FortiManager by
using the FortiGuard module. See Firmware images on page 792.
You can schedule when to automatically start the firmware upgrades. Alternately, you can create a firmware template
without a schedule, and manually initiate the firmware upgrade when you are ready.
You can also specify what type of upgrade path to use.
Schedule Type Specify whether to schedule the upgrade by selecting one of the following
options:
l None: Select to have no schedule.
l Once: Select to schedule the upgrade to occur once.
l Daily: Select to schedule the upgrade to occur daily.
l Weekly: Select to schedule the upgrade to occur weekly.
Let Device Download Select to have the device download the firmware from FortiGuard for the
Firmware from FortiGuard upgrade.
Clear to have the device download the firmware from FortiManager.
Only upgrade FortiGate When enabled, if any HA secondary node is down, the firmware upgrade will
Clusters with all members up be skipped for the HA cluster.
You must assign firmware templates to one or more devices to use the templates.
3. In the Available Entries list, select one or more devices, and click > to move the devices to the Selected Entries List.
The firmware template will be applied to devices in the Selected Entries List.
4. Click OK.
The firmware template is assigned to the devices in the Selected Entries List.
Previewing upgrades
After assigning templates to one or more devices, you can preview the upgrade changes.
To preview upgrades:
After using a firmware template, you can review the upgrade history for the template.
You can manually initiate a firmware template upgrade to upgrade assigned devices right now.
In FortiManager, you can view the firmware upgrade report to see information about the firmware upgrade.
1. After the firmware upgrade template has finished running, go to Device Manager > Firmware Templates.
2. Open the firmware upgrade report dialog using one of the following methods:
a. Right-click on a firmware template, and select Upgrade Reports.
b. Select a firmware template, and click More > Upgrade Reports.
3. Select an entry from the table, and click View Report Details to view the report for the selected device.
Upgrade Steps The upgrade path applied by the firmware upgrade template. Click to expand
and view the summary and CLI changes.
CLI Changes The CLI changes implemented with the upgraded version.
System Health Check Reports the results of the following system health checks from the FortiGate:
l get system status
1. After the device's firmware is updated, go to Device Manager and right-click on the upgraded device.
2. Click Upgrade Firmware.
3. Under the Firmware Upgrade History header, select an entry and click View Report Details.
Monitors
VPN Monitor
You can use the VPN Monitor to view IPsec VPN tunnel information when the IPsec VPN is configured with VPN
manager, IPsec templates, or created directly on FortiOS. For additional VPN monitoring options, see VPN Manager on
page 628.
1. Go to Device Manager > Monitors > VPN Monitor.The map view of traffic for all IPsec tunnels is displayed.
l When the green lines are animated, there is traffic flowing through the VPN tunnel.
l You can hover your mouse over a green line to view the VPN tunnel name and source port information.
3. To view a single device's IPsec VPN tunnel information, change All to Others in the toolbar menu, and select a
device from the dropdown.
4. To view a device group's IPsec VPN tunnel information, change All to Others in the toolbar menu, and select a
device group from the dropdown.
5. To view IPsec VPN tunnel information in a table, select the Show Table option from the toolbar and the table will be
displayed under the map.
At the top of the table is a toolbar with the following options:
Bring Tunnel Up Select a device in the table with a status of Down, and click Bring Tunnel Up.
Bring Tunnel Down Select a device in the table with a status of Up, and click Bring Tunnel Down.
You can filter the VPN monitor table view. For example, you can use the greater than (>) or
less than (<) signs on the incoming/outgoing bandwidth columns.
You can use the Asset Identity Center for a central view of all devices detected by each FortiGate in the current ADOM.
Asset Identity Center includes charts for FortiAP, FortiSwitch, and WiFi SSID.
Hardware Vendor Displays the distribution of hardware vendors for detected devices.
3. Click Column Settings in the toolbar to change which columns are displayed in the table.
4. Click Tools in the toolbar to access additional options. The following actions are available.
l Create MAC Address
l Create IP Address
l Export to CSV
IoT Devices
The device table also includes IoT devices if they are collected by your FortiOS device. This requires an IoT Detection
Service license. For more information, see IoT detection service in the FortiOS Administration Guide.
IoT devices are indicated by a cloud icon ( ) in the Device column. Mouse over the IoT device in the table to view
detailed information.
Vulnerabilities affecting IoT devices are indicated in the IoT Vulnerabilities column. When vulnerabilities are present, you
can click View Vulnerabilities to view detailed information about the detected vulnerabilities.
AI Analysis
The AI Analysis monitor can be enabled in Device Manager > Monitors to redirect to the FortiAIOps management
extension.
Once the
download has finished, the AI Analysis monitor link is no longer grayed out.
4. Click AI Analysis and you are redirected to the FortiAIOps management extension.
The LTE Modem monitor can be viewed in Device Manager > Monitors when the FortiManager is managing a FortiGate
3G4G device in the ADOM.
1. If using ADOMs, ensure you are in an ADOM with a managed 3G4G FortiGate.
2. Go to Device Manager > Monitors > LTE Modem. The LTE Modem monitor displays a table with LTE signal
information and data usage displayed.
FortiMeter
FortiMeter allows you turn FortiOS-VMs and FortiWebOS-VMs on and off as needed, paying only for the volume and
consumption of traffic that you use. These VMs are also sometimes called pay-as-you-go VMs.
You must meet the following requirements to use metered VMs:
l You must have a FortiMeter license.
l The FortiMeter license must be linked with the FortiManager unit by using FortiCare.
FortiOS VMs
FortiWeb VMs
FortiManager supports FortiWeb devices as logging devices. FortiWeb VMs are billed monthly based on usage.
The VM deployment packages are included with firmware images on the Customer Service & Support site, and have the
following format: FWB_OS1-vXxx-buildXXXX-FORTINET.out. In FortiManager, the VM will be listed as a FBV0X.
Overview
If connectivity between the VM and FortiManager is lost, FortiManager will invalidate the VM
instance after fifteen days. If the VM reconnects before fifteen days have elapsed, it will
automatically synchronize with the FortiManager database.
Points
Points can be purchased in packages of 1000 or 10000 from the FortiMeter product information page on FortiCare using
the Add Licenses button.
Points are used based on the type of service and the volume of traffic sent to FortiGuard.
VOLUME (1TB) FW 4
For prepaid FortiOS VMs, after the point balance has become negative, VMs can continue to be used for up to 15 days
before the account is frozen or more points are purchased to restore a positive point balance.
With a negative point balance, the FortiMeter status will show the number of days until it is frozen, or FREZ when it is
already frozen. FortiMeter will be unfrozen when a positive point balance is restored.
For FortiOS VM HA clusters, only the primary unit sends traffic to FortiMeter.
You must authorize all metered VMs in FortiManager before you can use them.
FortiOS VMs must be authorized for central management by FortiManager before they can be authorized for metering.
See Add devices on page 84.
1. Ensure that the VM is authorized for central management by FortiManager. See Add devices on page 84.
2. Ensure you are in the correct ADOM.
3. Go to Device Manager > VM Meter.
4. Select a device then click Authorize in the toolbar, right-click on a device then select Authorize, or double-click on a
device. The Authorize Device(s) dialog box opens.
An unauthorized device can use firewall services for up to 48 hours.
5. Select the License Type:
Trial Maximum of two devices can have a trial license at any one time.
No traffic data are sent to FortiGuard, so no points are used.
Can be used for up to 30 days.
FortiWeb VMs must be authorized for central management by FortiManager before they can be authorized for metering.
See Authorizing devices on page 108.
1. Ensure that the FortiWeb VM is authorized for central management by FortiManager. See Add devices on page 84.
2. In the FortiWeb ADOM, go to Device Manager > VM Meter.
3. Select a device then click Authorize in the toolbar, right-click on a device then select Authorize, or double-click on a
device. The Authorize Device(s) dialog box opens.
4. On the Authorize Device pane, confirm the devices name and serial number.
The License Type is Regular - points are used based on the volume of traffic. The Services - Security, Antivirus, IP
Reputation - cannot be deselected.
5. Click OK to authorize the device.
Monitoring VMs
Go to Device Manager > VM Meter. For prepaid licenses (FortiOS VMs only), your total remaining point balance is
shown in the toolbar. For postpaid licenses, the total points used and the billing period are shown.
You can also view details about the individual VMs, including: the device name and serial number, number of virtual
CPUs, amount of RAM, service level, license status, volume of traffic used today, and more.
Select FortiManager systems can work with the Shelf Manager to manage FortiGate 5050, 5060, 5140, and 5140B
chassis. The Shelf Manager runs on the Shelf Management Mezzanine hardware platform included with the FortiGate
5050, 5060, 5140, and 5140B chassis. You can install up to five FortiGate 5000 series blades in the five slots of the
FortiGate 5050 ATCA chassis and up to 14 FortiGate 5000 series blades in the 14 slots of the FortiGate 5140 ATCA
chassis. For more information on FortiGate 5000 series including Chassis and Shelf manager, see the Fortinet
Document Library.
You need to enable chassis management before you can work with the Shelf Manager through the FortiManager
system.
1. Go to System Settings > Advanced > Advanced Settings. See Miscellaneous Settings on page 947 for more
information.
2. Under Advanced Settings, select Chassis Management.
3. Set the Chassis Update Interval, from 4 to 1440 minutes.
4. Click Apply.
To add a chassis:
Chassis Type Select the chassis type: Chassis 5050, 5060, 5140 or 5140B.
IP Address Type the IP address of the Shelf Manager running on the chassis.
Authentication Type Select Anonymous, MD5, or Password from the dropdown list.
Chassis Slot Assignment You cannot assign FortiGate-5000 series blades to the slot until after the
chassis has been added.
To edit a chassis and assign FortiGate 5000 series blade to the slots:
5. Click OK.
You can select a chassis from the chassis list in the content pane, and view the status of the FortiGate blades in the
slots, power entry module (PEM), fan tray (FortiGate-5140 only), Shelf Manager, and shelf alarm panel (SAP).
In the Device Manager tab, select the Blades under the chassis whose blade information you would like to view.
The following is displayed:
l The FortiGate 5140 and 5140B chassis contains fourteen slots numbered 1
to 14.
Extension Card If there is an extension card installed in the blade, this column displays an arrow
you can select to expand the display. The expanded display shows details about
the extension card as well as the blade.
Slot Info Indicates whether the slot contains a node card (for example, a FortiGate 5001SX
blade) or a switch card (for example, a FortiSwitch 5003 blade) or is empty.
State Indicates whether the card in the slot is installed or running, or if the slot is empty.
Temperature Sensors Indicates if the temperature sensors for the blade in each slot are detecting a
temperature within an acceptable range.
l OK: All monitored temperatures are within acceptable ranges.
Current Sensors Indicates if the current sensors for the blade in each slot are detecting a current
within an acceptable range.
l OK: All monitored currents are within acceptable ranges.
Voltage Sensors Indicates if the voltage sensors for the blade in each slot are detecting a voltage
within an acceptable range.
l OK: All monitored voltages are within acceptable ranges.
Power Allocated Indicates the amount of power allocated to each blade in the slot.
Action Select Activate to turn the state of a blade from Installed into Running.
Select Deactivate to turn the state of a blade from Running into Installed.
Edit Select to view the detailed information on the voltage and temperature of a slot,
including sensors, status, and state. You can also edit some voltage and
temperature values.
1. Go to [chassis name] > Blades and, in the content pane, select the Edit icon of a slot.
The detailed information on the voltage and temperature of the slot including sensors, status, and state is displayed.
2. Select the Edit icon of a voltage or temperature sensor.
3. For a voltage sensor, you can modify the Upper Non-critical, Upper Critical, Lower Non-critical, and Lower Critical
values.
4. For a temperature sensor, you can modify the Upper Non-critical and Upper Critical values.
5. Select OK.
You can view the status of the PEMs by going to [chassis name] > PEM. The FortiGate 5140 chassis displays more PEM
information than the FortiGate 5050.
The following is displayed:
Temperature State Indicates whether the temperature of the PEM is in the acceptable range.
l OK: The temperature is within acceptable range.
Feed -48V Number of PEM fuses. There are four pairs per PEM.
Maximum External Current Maximum external current for each pair of fuses.
Maximum Internal Current Maximum internal current for each pair of fuses.
Go to [chassis name] > Fan Tray to view the chassis fan tray status.
The following is displayed:
Fan Tray The order numbers of the fan trays in the chassis.
Go to [chassis name] > Shelf Manager to view the shelf manager status.
The following is displayed:
Shelf Manager The order numbers of the shelf managers in the chassis.
Voltage Sensors Lists the voltage sensors for the shelf manager.
State Indicates if the voltage sensors for the shelf manager are detecting a voltage
within an acceptable range.
l OK: All monitored voltages are within acceptable ranges.
You can view the shelf alarm panel (SAP) status for a chassis. The shelf alarm panel helps you monitor the temperature
and state of various sensors in the chassis.
Go to [chassis name] > SAP to view the chassis SAP status.
The following is displayed:
Telco Alarm Telco form-c relay connections for minor, major and critical power faults provided
by the external dry relay Telco alarm interface (48VDC).
State Indicates if the temperature sensors for the SAP are detecting a temperature
below the set threshold.
Policy & Objects enables you to centrally manage and configure the devices that are managed by the FortiManager unit.
This includes the basic network settings to connect the device to the corporate network, antivirus definitions, intrusion
protection signatures, access rules, and managing and updating firmware for the devices.
All changes related to policies and objects should be made on the FortiManager device, and not on the managed
devices.
If the administrator account you logged on with does not have the appropriate permissions,
you will not be able to edit or delete settings, or apply any changes. Instead you are limited to
browsing. To modify these settings, see Administrator profiles on page 981.
If Display Policy & Objects in Classic Dual Pane is enabled, the Policy Packages and Object
Configurations tabs will be shown on the same pane, with Object Configurations on the lower
half of the screen. If Dock to Right is enabled, you can open the Objects window by clicking the
expand icon on the right side of the screen. See Feature visibility on page 335.
If workspace is enabled, the ADOM must be locked before changes can be made. See
Locking an ADOM on page 921.
If workflow is enabled, the ADOM must be locked and a session must be started before
changes can be made. See Workflow mode on page 999.
The following sections are available in the tree menu in Policy & Objects:
User & Authentication Click to view and configure user and authentication objects.
Security Fabric Click to view and configure Fortinet Security Fabric objects.
Advanced Click to view and configure advanced objects including metadata variables and
CLI configurations.
If Display Policy & Objects in Dual Pane is enabled, all sections are shown on the same pane.
The following options are available in Policy Packages:
Policy Package Click to access the policy package menu. The menu options are the same as the
right-click menu options.
Install Wizard Click to access the Install Wizard. You can start the Install Wizard where you can
install policy packages and device settings. You can also re-install a policy by
clicking the dropdown arrow and choosing Re-install Policy.
ADOM Revisions Click to create, edit, delete, restore, lock, and unlock ADOM Revisions.
Tools Click to select one of the following tools from the menu: Find Unused Objects,
Find Duplicate Objects, Find Unused Policies, Refresh Hit Counts, Feature
Visibility, or Object Selection Pane.
Create New Create a new policy. See Creating policies on page 350.
Section Create a new policy section. You can apply colors to policy sections to help
differentiate your different policies in the table. See Managing policies on page
349.
Policy Lookup Perform a policy lookup. See Policy Lookup on page 432
Collapse/Expand All Collapse or expand all the categories in the policy list.
View Mode Toggle between the By Sequence and Interface Pair View display modes. See
Managing policies on page 349.
Search The tree menu can be searched and sorted using the search field and sorting
button at the top of the menu.
Column Settings Select which columns are displayed in the policy table.
Install Wizard Click to access the Install Wizard. You can start the Install Wizard where you can
install policy packages and device settings. You can also re-install a policy by
clicking the dropdown arrow and choosing Re-install Policy.
ADOM Revisions Click to create, edit, delete, restore, lock, and unlock ADOM Revisions.
Tools Click to select one of the following tools from the menu: Find Unused Objects,
Find Duplicate Objects, Find Unused Policies, Refresh Hit Counts, Feature
Visibility, or Object Selection Pane.
Create New Create a new object. See Creating objects on page 454.
Column Settings Select which columns are displayed in the objects table.
If workspace is enabled, you can select to lock and edit the policy package in the right-click menu. You do not need to
lock the ADOM first. The policy package lock status is displayed in the toolbar.
The following options are available:
Sessions Click to display the sessions list where you can save, submit, or discard changes
made during the session.
About policies
FortiManager provides administrators the ability to customize policies within their organization as they see fit. Typically,
administrators may want to customize access and policies based on factors such as geography, specific security
requirements, or legal requirements.
Within a single ADOM, administrators can create multiple policy packages. FortiManager provides you the ability to
customize policy packages per device or VDOM within a specific ADOM, or to apply a single policy package for all
devices within an ADOM. These policy packages can be targeted at a single device, multiple devices, all devices, a
single VDOM, multiple VDOMs, or all devices within a single ADOM. By defining the scope of a policy package, an
administrator can modify or edit the policies within that package and keep other policy packages unchanged.
FortiManager can help simplify provisioning of new devices, ADOMs, or VDOMs by allowing you to copy or clone
existing policy packages.
Policy theory
Security policies control all traffic attempting to pass through a unit between interfaces, zones, and VLAN subinterfaces.
Security policies are instructions that units use to decide connection acceptance and packet processing for traffic
attempting to pass through. When the firewall receives a connection packet, it analyzes the packet’s source address,
destination address, and service (by port number), and attempts to locate a security policy matching the packet.
Security policies can contain many instructions for the unit to follow when it receives matching packets. Some
instructions are required, such as whether to drop or accept and process the packets, while other instructions, such as
logging and authentication, are optional.
Policy instructions may include Network Address Translation (NAT), or Port Address Translation (PAT), or they can use
virtual IPs or IP pools to translate source and destination IP addresses and port numbers.
Policy instructions may also include Security Profiles, which can specify application-layer inspection and other protocol-
specific protection and logging, as well as IPS inspection at the transport layer.
You configure security policies to define which sessions will match the policy and what actions the device will perform
with packets from matching sessions.
Sessions are matched to a security policy by considering these features of both the packet and policy:
l Policy Type and Subtype
l Incoming Interface
l Source Address
l Outgoing Interface
l Destination Address
l Schedule and time of the session’s initiation
l Service and the packet’s port numbers.
If the initial packet matches the security policy, the device performs the configured action and any other configured
options on all packets in the session.
Packet handling actions can be ACCEPT, DENY, IPSEC, or SSL-VPN.
l ACCEPT policy actions permit communication sessions, and may optionally include other packet processing
instructions, such as requiring authentication to use the policy, or specifying one or more Security Profiles to apply
features such as virus scanning to packets in the session. An ACCEPT policy can also apply interface-mode IPsec
VPN traffic if either the selected source or destination interface is an IPsec virtual interface.
l DENY policy actions block communication sessions, and you can optionally log the denied traffic. If no security
policy matches the traffic, the packets are dropped, therefore it is not required to configure a DENY security policy in
the last position to block the unauthorized traffic. A DENY security policy is needed when it is required to log the
denied traffic, also called “violation traffic”.
l IPSEC and SSL VPN policy actions apply a tunnel mode IPsec VPN or SSL VPN tunnel, respectively, and may
optionally apply NAT and allow traffic for one or both directions. If permitted by the firewall encryption policy, a
tunnel may be initiated automatically whenever a packet matching the policy arrives on the specified network
interface, destined for the local private network.
Create security policies based on traffic flow. For example, in a policy for POP3, where the email server is outside of the
internal network, traffic should be from an internal interface to an external interface rather than the other way around. It is
typically the user on the network requesting email content from the email server and thus the originator of the open
connection is on the internal port, not the external one of the email server. This is also important to remember when
viewing log messages, as the source and destination of the packets can seem backwards.
Global policies and objects function in a similar fashion to local policies and objects, but are applied universally to all
ADOMs and VDOMs inside your FortiManager installation. This allows users in a carrier, service provider, or large
enterprise to support complex installations that may require their customers to pass traffic through their own network.
For example, a carrier or host may allow customers to transit traffic through their network, but do not want their customer
to have the ability to access the carrier’s internal network or resources. Creating global policy header and footer
packages to effectively surround a customer’s policy packages can help maintain security.
Global policy packages must be assigned to ADOMs to be used. When configuring global policies, a block of space in
the policy table is reserved for Local Domain Policies. All of the policies in an ADOM’s policy table are inserted into this
block when the global policy is assigned to an ADOM.
You can specify which policy packages to assign the global policy to when assigning policy packages to an ADOM. Each
policy package can only have one global policy package assigned to it, but multiple global policy packages can be used
in an ADOM. See Assign a global policy package on page 339.
Policy Blocks can be used within Global Policy packages. See Using Policy Blocks on page 435.
Feature visibility options for policies and objects can be configured in Policy & Objects > Tools > Feature Visibility.
Global policies and objects are not supported on all FortiManager platforms. Please review the
products’ data sheets to determine support.
The use of local Policy Blocks simplifies the process for upgrading your ADOMs and can be
considered as an alternative to Global Policy Packages. For more information, see Using
Policy Blocks versus Global Policy Packages on page 443 and Migrating global policies to
policy blocks on page 447.
Policy workflow
An administrator will typically carry out two main functions with their devices through FortiManager: provisioning new
devices or VDOMs on the network and managing the day-to-day operations of managed devices and VDOMs.
There are multiple steps to provision a new device or VDOM to be managed by the FortiManager unit:
1. In the Device Manager pane, create a new VDOM or add a new device.
2. Assign a system template to the provisioned device (optional).
3. In the Policy & Objects pane, configure any dynamic objects you wish to assign to the new VDOM or device.
4. Determine how a policy will be defined for the new device: does the new device or VDOM have a new policy
package unique to itself, or will the device or VDOM use a package that is implemented elsewhere?
5. Run the Install Wizard to install any objects and policies for the new device, or create a new policy package.
6. If the new device uses an existing policy package, modify the installation targets of that package to include the new
device.
An administrator will often have to modify various objects for the devices they are responsible for managing. A typical set
of tasks to manage an already provisioned device will include:
1. Adding, deleting, or editing various objects, such as firewall information, security profiles, user access rights,
antivirus signatures, etc.
2. Adding, deleting, or editing all of the policy packages or individual policies within a policy package. This can include
changing the order of operation, adding new policies, or modifying information or access permissions in the policy
package.
3. Installing updates to devices.
Feature visibility
The policy and objects that are displayed on the Policy & Objects pane can be customized, and Policy Packages and
object configurations can be displayed on a single pane.
To adjust the policies and objects that are displayed, go to Tools > Feature Visibility.
You can turn the options on or off (visible or hidden). To turn on an option, select the checkbox beside the option name.
To turn off an option, clear the checkbox beside the option name. You can turn on all of the options in a category by
selecting the checkbox beside the category name. For example, you can turn on all firewall objects by selecting the
checkbox beside Firewall Objects. You can also turn on all of the categories by clicking the Check All button at the
bottom of the window.
Various feature visibility options are enabled by default and cannot be turned off.
Once turned on, you can configure the corresponding options from the appropriate location on the Policy & Objects >
Object Configurations pane.
Reset all of the options by clicking the Reset to Default button at the bottom of the screen, or reset only the options in a
category by clicking the Reset to Default button beside the category name.
1. Go to System Settings > Advanced > Misc Settings and enable Display Policy & Objects in Classic Dual Pane, or go
to Policy & Objects > Tools and select Classic Dual Pane.
The Policy & Objects pane will now display both the Policy Packages and Object Configuration tree menu panes at
the same time.
Policy packages can be created and edited, and then assigned to specific devices in the ADOM. Folders can be created
for the policy packages to aid in the organization and management of the packages.
Not all policy and object options are enabled by default. To configure the enabled options, go
to Policy & Objects > Tools > Feature Visibility and select your required options.
All of the options available from the Policy Packages menu can also be accessed by right-
clicking anywhere in the policy tree menu.
FortiManager shows the last opened Policy Package for easy navigation. After opening a
Policy Package, log off and log on in the same browser. Navigate to Policy and Objects in the
same ADOM. The last opened Policy Package is shown.
4. Configure the following details, then click OK to create the policy package.
Central NAT Select the Central NAT check box to enable Central SNAT and Central DNAT
policy types.
SSL/SSH Inspection Select an SSL/SSH inspection type from the dropdown list.
This option is only available for version 5.6 and later ADOMs when NGFW
Mode is Policy-based.
Consolidated Firewall Mode Toggle the Consolidated Firewall Mode button to ON to create a consolidated
IPv4 and IPv6 policy. By default, the button is turned to OFF.
Policy Offload Level Select the policy offload level. When configuring hyperscale policies, select
Full Offload.
In Folder Optionally, click the In Folder button to select a folder for the package.
The Consolidated Firewall Mode option is not available in the Global Database.
After turning the Consolidated Firewall Mode option to ON, and creating a consolidated IPv4
and IPv6 policy, turning the Consolidated Firewall Mode to OFF will make the consolidated
IPv4 and IPv6 policy inaccessible. To access the consolidated IPv4 and IPv6 policy, you must
keep the Consolidated Firewall Mode option ON.
You can create new policy package folders within existing folders to help you better organize your policy packages.
Policy packages and policy package folders can be edited and moved as required. You can also review the revision
history to troubleshoot issues.
Changes made to a policy package are displayed in the Revision History table at the bottom of the page. To view the
history, select a revision in the table and click View Diff, or double-click the revision. You can also access the table by
right-clicking a policy in the tree menu and selecting Policy Revision.
Deselecting Central NAT does not delete Central SNAT or Central DNAT entries.
Global policy packages can be assigned or installed to all policies in an ADOM or to specific policies packages within an
ADOM.
Only ADOMs of the same version as the global database or the next higher major release are presented as options for
assignment. Each policy package can only have one global policy package assigned to it, but multiple global policy
packages can be used in an ADOM.
l Specify Policy Packages to Exclude: Assigns the global policy package to all except the specified policy
packages.
l Specify Policy Packages to Include: Assigns the global policy package to only the specified policy
packages.
c. Click OK to save your changes.
5. Select an ADOM in the Assignment table, and click Assign Selected from the content toolbar.
The Assign dialog box opens.
6. Select whether you want to assign only used objects or all objects, and if policies will be automatically installed to
ADOM devices.
7. Click OK to assign the global policy package to the selected ADOMs.
The ADOM Policy Packages column in the Assignment table displays if the global policy package is assigned to all
policy packages or a partial number of policy packages in the ADOM.
In the Assignment pane you can also edit the ADOM list, delete ADOMs from the list, and
assign and unassign ADOMs.
When installing a policy package, objects that are referenced in the policy will be installed to the target device. Default or
per-device mapping must exist or the installation will fail.
Some objects that are not directly referenced in the policy will also be installed to the target
device, such as FSSO polling objects, address and profile groups, and CA certificates.
Some objects that are not referenced will be removed from the FortiGate. This may be
particularly noticeable when installing a policy package for the first time after adding a device
to FortiManager.
If you anticipate needing those objects in the future, make sure those objects are present in
Policy & Objects before proceeding with the installation. To ensure that those objects are
present in Policy & Objects you can use the Add ALL Objects option when importing a policy.
Policies within a policy package can be configured to install only on specified target devices.
See Installing policies to specific devices on page 421.
1. Ensure you are in the ADOM that contains the policy package.
2. Go to Policy & Objects > Policy Packages.
3. Click Install > Install Wizard from the toolbar or right-click a policy and select Install Wizard. The Install Wizard
opens.
4. Follow the steps in the install wizard to install the policy package. You can select to install policy package and
device settings or install the interface policy only.
For more information on the install wizard, see Installing policy packages and device settings on page 161. For
more information on editing the installation targets, see Policy package installation targets on page 344.
You can reinstall a policy package in Policy & Objects or Device Manager.
l Go to Device Manager, and select devices or VDOMs. You can select more than one device at a time.
4. (Optional) View policy consistency check results (see Perform a policy consistency check on page 346).
a. Click the Policy Check Result button.
b. Click the Close button to close the page and return to the wizard.
5. (Optional) View a preview of the installation. You can preview multiple devices at the same.
a. Click the Install Preview button.
After data is gathered, the Install Preview page is displayed.
b. Click the Details links to view details about the changes to the policy, specific policies, and policy objects.
c. Click Close to close the page and return to the wizard.
7. Click Next.
8. Click Install.
The policy package is reinstalled to the target devices.
In FortiManager you can create, edit, and delete install schedules for policy packages. The Schedule Install menu option
has been added to the Install wizard when selecting to install policy package and device settings. You can specify the
date and time to install the latest policy package changes.
Select the clock icon which is displayed beside the policy package name to create an install schedule. Select this icon to
edit or cancel the schedule. When a scheduled install has been configured and is active, hover the mouse over the icon
to view the scheduled date and time.
1. Ensure you are in the ADOM that contains the policy package.
2. Go to Policy & Objects > Policy Packages.
3. From the Install menu, select Install Wizard. The Install Wizard opens.
4. Select Schedule Install, and set the install schedule date and time.
5. Select Next. In the device selection screen, edit the installation targets as required.
6. Select Next. In the interface validation screen, edit the interface mapping as required.
7. Select Schedule Install to continue to the policy and object validation screen. In the ready to install screen you can
copy the log and download the preview text file.
1. Ensure you are in the ADOM that contains the policy package.
2. Go to Policy & Objects > Policy Packages.
3. Click the clock icon next to the policy package name in the Policy Package tree. The Edit Install Schedule dialog box
is displayed.
4. Select Cancel Schedule to cancel the install schedule, then select OK in the confirmation dialog box to cancel the
schedule. Otherwise, edit the install schedule as required and select OK to save your changes.
The Installation Targets pane allows you to view the installation target, config status, policy package status, and
schedule install status, as well as edit installation targets for policy package installs.
To view installation targets, go to Policy & Objects > Policy Packages. In the tree menu for the policy package, select
Installation Targets.
The following information is displayed:
Config Status See the table below for config status details.
Policy Package Status See the table below for policy package status details.
The following table identifies the different available policy package statuses.
Unknown with policy package Gray question mark Configurations of the managed device
name are retrieved on FortiManager after
being imported/installed.
When importing a device with agentless FSSO configured (that is, the device polls the AD
servers), the status of all policy packages that reference user fsso-polling is Modified. This is
because FortiManager sends all fsso-polling objects to all devices that are using agentless
FSSO.
Add Select to add installation targets (device/group) for the policy package selected.
Select the add icon beside Device/Group to select devices.
Delete Select to delete the selected entries from the installation target for the policy
package selected.
Install Select an entry in the table and, from the Install menu, select Install Wizard or Re-
install Policy.
Search Use the search field to search installation targets. Entering text in the search field
will highlight matches.
The policy check tool allows you to check all policy packages within an ADOM to ensure consistency and eliminate
conflicts that may prevent your devices from passing traffic. This allows you to optimize your policy sets and potentially
reduce the size of your databases.
The check will verify:
l Object duplication: two objects that have identical definitions
l Object shadowing: a higher priority object completely encompasses another object of the same type
l Object overlap: one object partially overlaps another object of the same type
l Object orphaning: an object has been defined but has not been used anywhere.
The policy check uses an algorithm to evaluate policy objects, based on the following attributes:
l The source and destination interface policy objects
l The source and destination address policy objects
l The service and schedule policy objects.
A policy consistency check can be automatically performed during every install. When doing
the install, only modified or added policies are checked, decreasing the performance impact
when compared to a full consistency check.
This function can be enabled when editing the ADOM (see Editing an ADOM on page 913).
5. (Optional) Click the Export to PDF icon next to the Policy Package Consistency Check to download a copy of the
consistency check.
6. (Optional) Click the Export to CSV or Export to PDF icons next to the Policy Hit Count Report to download a
copy of the hit count report.
After you add a FortiAnalyzer device to FortiManager by using the Add FortiAnalyzer wizard, you can view the logs that it
receives. In the Policy & Objects pane, you can view logs related to the UUID for a policy rule. You can also use the
You can find and replace objects used in multiple policies and policy packages. Some objects can be replaced with
multiple objects.
5. Select the checkbox for the entries that include the object you want to replace.
6. In the Replace with box, select one or more objects to use instead.
7. Click Replace.
The objects are replaced, and the results are displayed.
8. (Optional) Click Export to PDF to download a PDF summary of what objects were replaced.
Managing policies
Policies in policy packages can be created and managed by selecting an ADOM, and then selecting the policy package
whose policies you are configuring.
For some policy types, sections can be added to the policy list to help organize your policies, and the policies can be
listed in sequence, or by interface pairs. When creating a section, you can optionally assign the section title a color to
help better organize your policies.
On the Policy & Objects > Policy Packages pane, the tree menu lists the policy packages and the policies in each policy
package. The policies that are displayed for each policy package are controlled by the feature visibility. See Feature
visibility on page 335 for more information.
Various options are also available from column specific right-click menus, for more information see Column options on
page 427.
If workspace or workflow is enabled, the ADOM must be locked before changes can be made.
See Locking an ADOM on page 921.
Not all policy and object options are enabled by default. To configure the enabled options, from
the Tools menu, select Feature Visibility.
Section view will be disabled if one or more policies are using the Any interface, or if one or
more policies are configured with multiple source or destination interfaces.
Creating policies
Policy creation varies depending on the type of policy that is being created. See the following section that corresponds to
the type of policy you are creating for specific instructions on creating that type of policy.
To insert a policy:
1. Select a policy.
2. From the Create New menu or the right-click menu, select Insert Above, Insert Empty Above, Insert Below, or Insert
Empty Below. By default, new policies will be inserted at the bottom of the list.
l Insert Above and Insert Below insert a copy of the selected policy.
l Insert Empty Above and Insert Empty Below insert a new policy with all values set to empty or "none". Not all
policy types support these options.
The name of the admin who creates the policy will be displayed in the Created field along with
the timestamp.
When FortiManager has a managed FortiAnalyzer device, administrators can create new policies based on Policy Hit
traffic in FortiView using the policy creation wizard. This feature is only available when FortiAnalyzer is added to
FortiManager as a managed device; it is not supported on a FortiManager with FortiAnalyzer features enabled.
1. Add a managed FortiAnalyzer to FortiManager. See Add FortiAnalyzer or FortiAnalyzer BigData on page 122
2. Go to FortiView > Traffic > Policy Hits.
3. Create a new policy from the Policy Hits table or from the Log View drilldown view, after which the policy creation
wizard opens.
a. Policy Hits table: Right-click on a policy hit in the table, and click Create Policy.
b. Log View drilldown: Double click on a log in the Policy Hits table to drilldown to Log View, and click Create
Policy.
4. In the wizard, you can explore policy elements using text filters and Group By categorization.
5. Select one or more entries in the log table, and click Create.
6. In the Add Policies & Policy Template dialog, configure your policy options, and then click Next:
Add Policies By Select one of the following options for adding the policy:
l Create New Policy Block: Policies are added to a new Policy Block. When
this option is selected, you must enter a name for the Policy Block or use
the default name provided.
l Add to Existing Policy Block: Policies are added to an existing Policy
Block. Select the existing Policy Block from the Policy Block dropdown
menu.
l Insert Before Package Policy: Policies are inserted above the policy that it
originated from.
Policy Block Visibility The Policy Block feature must be enabled in Policy & Objects > Feature
Visibility in order to manage Policy Blocks in the GUI.
This field is displayed when the Add Policies By setting is configured to Create
New Policy Block or Add to Existing Policy Block, and the Policy Block feature
visibility is not enabled in the ADOM.
Enable this setting to enable Policy Block feature visibility for the current
ADOM. Disable this setting (default) to leave Policy Block visibility disabled.
Use Interface From Select where the Incoming Interface and Outgoing Interface are from:
l Traffic Log
l Policy
l Custom
Update Template Manually update the policy template by clicking Open Edit Page.
7. In the Preview Objects dialog, review the objects that will be used by the policy, and then click Next. Objects will be
automatically created if FortiManager cannot find a match in the current ADOM.
8. In the Preview Policies dialog, review the policies that will be created, and then click Next.
9. Click Next to generate the policies. The results of the policy creation wizard are displayed.
1. Go to Log View.
2. Click a policy ID number in the Policy ID column.
A new window opens displaying logs filtered by the selected policy UUID.
This section describes how to create a new firewall policy. The firewall policy is the axis around which most features of
the FortiGate firewall revolve. Many settings in the firewall end up relating to or being associated with the firewall policies
and the traffic that they govern. Any traffic going through a FortiGate unit has to be associated with a policy. These
policies are essentially discrete compartmentalized sets of instructions that control the traffic flow going through the
firewall. These instructions control where the traffic goes, how it is processed, if it is processed, and even whether or not
it is allowed to pass through the FortiGate.
See Firewall policy in the FortiOS Administration Guide for more information.
The firewall policy option is visible only if the NGFW Mode is selected as Profile-based in the
policy package.
Option Description
ID Enter a unique number as the policy ID, or use the default (0) to automatically
assign a policy ID. Policy IDs can be up to a maximum of 9 digits in length.
Once a policy ID has been configured it cannot be changed.
Name Enter a unique name for the policy. Each policy must have a unique name.
Outgoing Interface Select outgoing interfaces in the same manner as Incoming Interface.
Source Select the source address, address groups, virtual IPs, virtual IP groups, user,
user groups, and FSSO groups.
IP/MAC Based Access Use security posture tags to allow access based on the IP/MAC address of a
Control device.
Destination Select the destination address, address groups, virtual IPs, virtual IP groups,
and services.
Action Select an action for the policy to take: DENY, ACCEPT, or IPSEC.
Deny options
Customize Messages Select or create a message to be displayed when traffic is blocked by this
policy.
This option is only available when Block Notification is on.
Accept options
Proxy HTTP(S) Traffic Select whether to redirect HTTP(S) traffic to matching transparent web proxy
policy.
This option is only available when the inspection mode is set to Proxy-based.
IP Pool Configuration If NAT is selected, select Use Outgoing Interface Address or Use Dynamic IP
Pool.
IPv4 Pool Name If NAT64 is selected or NAT and Use Dynamic IP Pool are selected, select or
create an IPv4 pool.
IPv6 Pool Name If NAT46 is selected or NAT and Use Dynamic IP Pool are selected, select or
create an IPv6 pool.
Preserve Source Port If NAT is on, select whether to preserve the source port.
Customize Messages Select or create a disclaimer message to be displayed when traffic is allowed
by this policy.
This option is only available when Display Disclaimer is on.
Security Profiles Select whether to apply security profiles to this policy, then select the security
profiles.
SSL/SSH Inspection Select one of the following options for SSL/SSH Inspection:
l certificate-inspection
l custom-deep-inspection
l deep-inspection
l no-inspection
IPSEC options
IPSEC options
Security Profiles Select whether to apply security profiles to this policy, then select the security
profiles.
SSL/SSH Inspection Select one of the following options for SSL/SSH Inspection:
l certificate-inspection
l custom-deep-inspection
l deep-inspection
l no-inspection
Advanced
WCCP Turn Web Cache Communication Protocol (WCCP) web caching on or off.
Exempt from Captive Portal Select whether this traffic is exempt from any captive portals.
Comments Add a description of the policy, such as its purpose, or the changes that have
been made to it.
Revisions
Change Note Add a description of the changes being made to the policy. This field is
required.
6. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a
disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the
bottom of the list, but above the implicit policy.
Advanced options
auth-cert Select the HTTPS server certificate for policy authentication. none
cgn-session-quota Set the allowed concurrent sessions available for a source 16777215
IP address.
custom-log-fields Select custom fields to append to log messages for this policy. none
delay-tcp-npu-session Enable or disable TCP NPU session delay to guarantee packet order disable
of 3-way handshake.
diffserv-copy Enable or disable copying of the DSCP values from the original disable
direction to the reply direction.
diffserv-forward Enable or disable application of the differentiated services code point disable
(DSCP) value to the DSCP field of forward (original) traffic. If
enabled, also configure diffservcode-forward.
diffserv-reverse Enable or disable application of the DSCP value to the DSCP field of disable
reverse (reply) traffic. If enabled, also configure diffservcode-
rev.
diffservcode-forward Enter the DSCP value that the FortiGate unit will apply to the field of 000000
originating (forward) packets. The value is 6 bits binary. The valid
range is 000000-111111.
diffservcode-rev Enter the DSCP value that the FortiGate unit will apply to the field of 000000
reply (reverse) packets. The value is 6 bits binary. The valid range is
000000-111111.
fec Enable or disable forward error correction (FEC) on traffic matching disable
this policy on a FEC device.
firewall-session-dirty Select how to handle sessions if the configuration of this firewall check-all
policy changes.
geoip-match Select whether to match the address based on the physical or physical-location
registered location.
internet-service-negate Enable to negate the internet service set in the policy. disable
internet-service-src- Enable to negate the source internet service set in this policy. disable
negate
internet-service6 Enable or disable the use of IPv6 internet services for this policy. If disable
enabled, the destination address and service set in the policy are not
used.
internet-service6- Enable to negate the source IPv6 internet service set in this policy. disable
negate
internet-service6-src Enable or disable use of the IPv6 internet services in the source for disable
this policy. If enabled, the source address is not used.
match-vip Enable or disable matching of packets that have had their destination disable
address changed by a VIP.
match-vip-only Enable or disable matching only those packets that have had their disable
destination addresses change by a VIP.
natip Set the source NAT IP address for inbound traffic. 0.0.0.0/0.0.0.0
outbound Enable or disable application of the differentiated services code point disable
(DSCP) value to the DSCP field of forward (original) traffic.
permit-any-host Enable or disable accepting UDP packets from any host. disable
permit-stun-host Enable or disable accepting UDP packets from any session traversal disable
utilities for NAT (STUN) host.
radius-mac-auth- Enable or disable MAC authentication bypass. The bypassed MAC disable
bypass address must be received from the RADIUS server.
redirect-url Set the URL to which users are redirected after seeing and accepting none
the disclaimer or authenticating.
reputation-direction Set the destination of the initial traffic for reputation to take effect. destination
reputation-direction6 Set the destination of the initial traffic for IPv6 reputation to take destination
effect.
rtp-addr If this is an RTP NAT policy, set the address names. none
schedule-timeout Enable or disable ending current sessions when the schedule object disable
times out. Disable allows sessions to end from inactivity.
service-negate Enable or disable negation of the service set in the policy. disable
session-ttl Enter a value for the session time-to-live (TTL) from 300 to 604800, 0
or type 0 for no limitation.
ssh-filter-profile Select an SSH filter profile from the drop-down list. None
tcp-session-without- Enable or disable creation of a TCP session without the SYN flag. disable
syn
timeout-send-rst Enable or disable the sending of RST packets when TCP sessions disable
expire
tos Enter the type of service (TOS) value used for comparison. 0
tos-mask Enter the bit mask for TOS. Non-zero bit positions are used for 0
comparison while zero bit positions are ignored.
uuid Enter the universally unique identifier (UUID). This value is 00000000-0000-
automatically assigned but can be manually reset. 0000-0000-
000000000000
vlan-cos-fwd Select the VLAN forward direction user priority. The available values 255
are:
l 255 (passthrough)
l 0 (lowest) - 7 (highest)
vlan-cos-rev Select the VLAN reverse direction user priority. The available values 255
are:
l 255 (passthrough)
l 0 (lowest) - 7 (highest)
wanopt-passive-opt Select WAN optimization passive mode options. This option decides default
what IP address will be used to connect server (IPv4 only).
webcache-https Enable or disable the web cache for HTTPS (IPv4 only). none
This section describes how to create a new SSL inspection and authentication policy. This policy type is essentially a
firewall policy for policy-based policy packages.
See NGFW policy in the FortiOS Administration Guide for more information.
The SSL Inspection & Authentication policy option is visible only if the NGFW Mode is selected
as Policy-based in the policy package.
Option Description
ID Enter a unique number as the policy ID, or use the default (0) to automatically
assign a policy ID. Policy IDs can be up to a maximum of 9 digits in length.
Once a policy ID has been configured it cannot be changed.
Name Enter a unique name for the policy. Each policy must have a unique name.
Outgoing Interface Select outgoing interfaces in the same manner as Incoming Interface.
Source Select the source address, address groups, virtual IPs, virtual IP groups, user,
user groups, and FSSO groups.
Destination Select the destination address, address groups, virtual IPs, virtual IP groups,
and services.
SSL/SSH Inspection Select one of the following options for SSL/SSH Inspection:certificate-
inspectioncustom-deep-inspectiondeep-inspectionno-inspection
Comments Add a description of the policy, such as its purpose, or the changes that have
been made to it.
Change Note Add a description of the changes being made to the policy. This field is
required.
6. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a
disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the
bottom of the list, but above the implicit policy.
Advanced options
auth-cert Select the HTTPS server certificate for policy authentication. none
cgn-session-quota Set the allowed concurrent sessions available for a source 16777215
IP address.
custom-log-fields Select custom fields to append to log messages for this policy. none
delay-tcp-npu-session Enable or disable TCP NPU session delay to guarantee packet order disable
of 3-way handshake.
diffserv-copy Enable or disable copying of the DSCP values from the original disable
direction to the reply direction.
diffserv-forward Enable or disable application of the differentiated services code point disable
(DSCP) value to the DSCP field of forward (original) traffic. If
enabled, also configure diffservcode-forward.
diffserv-reverse Enable or disable application of the DSCP value to the DSCP field of disable
reverse (reply) traffic. If enabled, also configure diffservcode-
rev.
diffservcode-forward Enter the DSCP value that the FortiGate unit will apply to the field of 000000
originating (forward) packets. The value is 6 bits binary. The valid
range is 000000-111111.
diffservcode-rev Enter the DSCP value that the FortiGate unit will apply to the field of 000000
reply (reverse) packets. The value is 6 bits binary. The valid range is
000000-111111.
fec Enable or disable forward error correction (FEC) on traffic matching disable
this policy on a FEC device.
firewall-session-dirty Select how to handle sessions if the configuration of this firewall check-all
policy changes.
geoip-match Select whether to match the address based on the physical or physical-location
registered location.
internet-service-negate Enable to negate the internet service set in the policy. disable
internet-service-src- Enable to negate the source internet service set in this policy. disable
negate
internet-service6 Enable or disable the use of IPv6 internet services for this policy. If disable
enabled, the destination address and service set in the policy are not
used.
internet-service6- Enable to negate the source IPv6 internet service set in this policy. disable
negate
internet-service6-src Enable or disable use of the IPv6 internet services in the source for disable
this policy. If enabled, the source address is not used.
match-vip Enable or disable matching of packets that have had their destination disable
address changed by a VIP.
match-vip-only Enable or disable matching only those packets that have had their disable
destination addresses change by a VIP.
natip Set the source NAT IP address for inbound traffic. 0.0.0.0/0.0.0.0
outbound Enable or disable application of the differentiated services code point disable
(DSCP) value to the DSCP field of forward (original) traffic.
permit-any-host Enable or disable accepting UDP packets from any host. disable
permit-stun-host Enable or disable accepting UDP packets from any session traversal disable
utilities for NAT (STUN) host.
radius-mac-auth- Enable or disable MAC authentication bypass. The bypassed MAC disable
bypass address must be received from the RADIUS server.
redirect-url Set the URL to which users are redirected after seeing and accepting none
the disclaimer or authenticating.
reputation-direction Set the destination of the initial traffic for reputation to take effect. destination
reputation-direction6 Set the destination of the initial traffic for IPv6 reputation to take destination
effect.
rtp-addr If this is an RTP NAT policy, set the address names. none
schedule-timeout Enable or disable ending current sessions when the schedule object disable
times out. Disable allows sessions to end from inactivity.
service-negate Enable or disable negation of the service set in the policy. disable
session-ttl Enter a value for the session time-to-live (TTL) from 300 to 604800, 0
or type 0 for no limitation.
ssh-filter-profile Select an SSH filter profile from the drop-down list. None
tcp-session-without- Enable or disable creation of a TCP session without the SYN flag. disable
syn
timeout-send-rst Enable or disable the sending of RST packets when TCP sessions disable
expire
tos Enter the type of service (TOS) value used for comparison. 0
tos-mask Enter the bit mask for TOS. Non-zero bit positions are used for 0
comparison while zero bit positions are ignored.
uuid Enter the universally unique identifier (UUID). This value is 00000000-0000-
automatically assigned but can be manually reset. 0000-0000-
000000000000
vlan-cos-fwd Select the VLAN forward direction user priority. The available values 255
are:
l 255 (passthrough)
l 0 (lowest) - 7 (highest)
vlan-cos-rev Select the VLAN reverse direction user priority. The available values 255
are:
l 255 (passthrough)
l 0 (lowest) - 7 (highest)
wanopt-passive-opt Select WAN optimization passive mode options. This option decides default
what IP address will be used to connect server (IPv4 only).
webcache-https Enable or disable the web cache for HTTPS (IPv4 only). none
This section describes how to create a new security policy. A security policy consists of rules related to proxy, antivirus,
IPS, email, and DLP sensor.
See NGFW policy in the FortiOS Administration Guide for more information.
The security policy option is visible only if the NGFW Mode is selected as Policy-based in the
policy package.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
ID Enter a unique number as the policy ID, or use the default (0) to automatically
assign a policy ID. Policy IDs can be up to a maximum of 9 digits in length.
Once a policy ID has been configured it cannot be changed.
Name Enter a unique name for the policy. Each policy must have a unique name.
Policy Mode Select the mode for this policy: Standard or Learn Mode. Learn mode allows
and logs all traffic between the specified interfaces. Use learn mode with
FortiAnalyzer to understand traffic patterns and design policy changes.
See Learn mode in security policies in NGFW mode in the FortiOS
Administration Guide for more information.
Outgoing Interface Select outgoing interfaces in the same manner as the incoming interfaces.
Source Select the source address, address groups, virtual IPs, virtual IP groups, user,
user groups, and FSSO groups.
Destination Select the destination address, address groups, virtual IPs, virtual IP groups,
and services.
Service Select the service. Select App Default or Specify. If Specify is selected, select
the Service.
Log Traffic When the Action is DENY, select Log Violation Traffic to log violation traffic.
When the Action is ACCEPT, select one of the following options:
l No Log
Protocol Options Select protocol options profiles for handling protocol-specific traffic.
This option is available when the Action is ACCEPT.
l IPS Profile
l Email Filter
Comments Add a description of the policy, such as its purpose, or the changes that have
been made to it.
Change Note Add a description of the changes being made to the policy. This field is
required.
6. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a
disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the
bottom of the list, but above the implicit policy.
Advanced options
comments Add a description of the policy, such as its purpose, or the changes none
that have been made to it. A comment added here will overwrite the
comment added in the above Comments field.
dstaddr-negate Enable to negate the values set in IPv4 Destination Address and disable
IPv6 Destination Address.
global-label Set the label for the policy to be displayed when the GUI is in Global none
View mode.
internet-service-negate When enabled, Internet services match against any Internet service disable
except the selected Internet service.
internet-service-src- Enables or disables the use of Internet Services in source for this disable
negate policy. If enabled, internet-service-src specifies what the
service must NOT be.
internet-service6 Enable or disable the use of IPv6 internet services for this policy. If disable
enabled, the destination address and service set in the policy are not
used.
internet-service6- Enable to negate the source IPv6 internet service set in this policy. disable
negate
internet-service6-src Enable or disable use of the IPv6 internet services in the source for disable
this policy. If enabled, the source address is not used.
sctp-filter-profile Select an existing stream control transmission protocol (SCTP) filter none
profile.
send-deny-packet Enable or disable sending a reply packet when a session is denied or disable
blocked by this policy.
srcaddr-negate Enable or disable negation of the IPv4 Source Address or IPv6 disable
Source Address address.
uuid Enter the universally unique identifier (UUID). This value is 00000000-0000-
automatically assigned but can be manually reset. 0000-0000-
000000000000
This section describes how to create virtual wire pair policies. Before you can create a policy, you must create a virtual
wire pair. See Configuring virtual wire pairs on page 710.
You can create a firewall virtual wire pair policy in a policy package that is set to Profile-based. If the policy package is set
to Policy-based, see Create a new security virtual wire pair policy on page 387.
See Virtual wire pair in the FortiOS Administration Guide for more information about virtual wire pairs and virtual wire pair
policies.
VWP policies are also supported in Policy Blocks. See Creating Virtual Wire Pair Policy in Policy Blocks on page 439.
The security virtual wire pair policy is visible only if the NGFW Mode is selected as Policy-
based in the policy package.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
Option Description
ID Enter a unique number as the policy ID, or use the default (0) to automatically
assign a policy ID. Policy IDs can be up to a maximum of 9 digits in length.
Once a policy ID has been configured it cannot be changed.
Name Enter a unique name for the policy. Each policy must have a unique name.
IP/MAC Based Access Use security posture tags to allow access based on the IP/MAC address of a
Control device.
Virtual Wire Pair Interface Select one or more virtual wire pair interfaces. This field is required.
Option Description
New objects can be created by clicking the Create New icon in the Object
Selector frame. See Creating objects on page 454 for more information.
Virtual Wire Pair Select an arrow to indicate the flow of traffic between the ports in the selected
Virtual Wire Pair Interface.
Source Select the source address, address groups, virtual IPs, virtual IP groups, user,
user groups, and FSSO groups.
Destination Select the destination address, address groups, virtual IPs, virtual IP groups,
and services.
Deny options
Accept options
IP Pool Configuration If NAT is selected, select Use Outgoing Interface Address or Use Dynamic IP
Pool.
Use Outgoing Interface Address is disabled in a firewall virtual pair policy.
IPv4 Pool Name If NAT64 is selected or NAT and Use Dynamic IP Pool are selected, select or
create an IPv4 pool.
IPv6 Pool Name If NAT46 is selected or NAT and Use Dynamic IP Pool are selected, select or
create an IPv6 pool.
Preserve Source Port If NAT is on, select whether to preserve the source port.
SSL/SSH Inspection Select one of the following options for SSL/SSH Inspection:certificate-
inspectioncustom-deep-inspectiondeep-inspectionno-inspection
Accept options
Log Allowed Traffic Select one of the following options:No LogLog Security EventsLog All
SessionsIf logging is on, select whether to capture packets.Select whether to
generate logs when the session starts.
Advanced
WCCP Turn Web Cache Communication Protocol (WCCP) web caching on or off.
Exempt from Captive Portal Select whether this traffic is exempt from any captive portals.
Comments Add a description of the policy, such as its purpose, or the changes that have
been made to it.
Revision
Change Note Add a description of the changes being made to the policy. This field is
required.
6. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a
disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the
bottom of the list, but above the implicit policy.
Advanced options
auth-cert Select the HTTPS server certificate for policy authentication. none
cgn-session-quota Set the allowed concurrent sessions available for a source 16777215
IP address.
custom-log-fields Select custom fields to append to log messages for this policy. none
delay-tcp-npu-session Enable or disable TCP NPU session delay to guarantee packet order disable
of 3-way handshake.
diffserv-copy Enable or disable copying of the DSCP values from the original disable
direction to the reply direction.
diffserv-forward Enable or disable application of the differentiated services code point disable
(DSCP) value to the DSCP field of forward (original) traffic. If
enabled, also configure diffservcode-forward.
diffserv-reverse Enable or disable application of the DSCP value to the DSCP field of disable
reverse (reply) traffic. If enabled, also configure diffservcode-
rev.
diffservcode-forward Enter the DSCP value that the FortiGate unit will apply to the field of 000000
originating (forward) packets. The value is 6 bits binary. The valid
range is 000000-111111.
diffservcode-rev Enter the DSCP value that the FortiGate unit will apply to the field of 000000
reply (reverse) packets. The value is 6 bits binary. The valid range is
000000-111111.
fec Enable or disable forward error correction (FEC) on traffic matching disable
this policy on a FEC device.
firewall-session-dirty Select how to handle sessions if the configuration of this firewall check-all
policy changes.
geoip-match Select whether to match the address based on the physical or physical-location
registered location.
internet-service-negate Enable to negate the internet service set in the policy. disable
internet-service-src- Enable to negate the source internet service set in this policy. disable
negate
internet-service6 Enable or disable the use of IPv6 internet services for this policy. If disable
enabled, the destination address and service set in the policy are not
used.
internet-service6- Enable to negate the source IPv6 internet service set in this policy. disable
negate
internet-service6-src Enable or disable use of the IPv6 internet services in the source for disable
this policy. If enabled, the source address is not used.
match-vip Enable or disable matching of packets that have had their destination disable
address changed by a VIP.
match-vip-only Enable or disable matching only those packets that have had their disable
destination addresses change by a VIP.
natip Set the source NAT IP address for inbound traffic. 0.0.0.0/0.0.0.0
outbound Enable or disable application of the differentiated services code point enable
(DSCP) value to the DSCP field of forward (original) traffic.
permit-any-host Enable or disable accepting UDP packets from any host. disable
permit-stun-host Enable or disable accepting UDP packets from any session traversal disable
utilities for NAT (STUN) host.
radius-mac-auth- Enable or disable MAC authentication bypass. The bypassed MAC disable
bypass address must be received from the RADIUS server.
redirect-url Set the URL to which users are redirected after seeing and accepting none
the disclaimer or authenticating.
reputation-direction Set the destination of the initial traffic for reputation to take effect. destination
reputation-direction6 Set the destination of the initial traffic for IPv6 reputation to take destination
effect.
rtp-addr If this is an RTP NAT policy, set the address names. none
schedule-timeout Enable or disable ending current sessions when the schedule object disable
times out. Disable allows sessions to end from inactivity.
service-negate Enable or disable negation of the service set in the policy. disable
session-ttl Enter a value for the session time-to-live (TTL) from 300 to 604800, 0
or type 0 for no limitation.
ssh-filter-profile Select an SSH filter profile from the drop-down list. None
tcp-session-without- Enable or disable creation of a TCP session without the SYN flag. disable
syn
timeout-send-rst Enable or disable the sending of RST packets when TCP sessions disable
expire
tos Enter the type of service (TOS) value used for comparison. 0
tos-mask Enter the bit mask for TOS. Non-zero bit positions are used for 0
comparison while zero bit positions are ignored.
uuid Enter the universally unique identifier (UUID). This value is 00000000-0000-
automatically assigned but can be manually reset. 0000-0000-
000000000000
vlan-cos-fwd Select the VLAN forward direction user priority. The available values 255
are:
l 255 (passthrough)
l 0 (lowest) - 7 (highest)
vlan-cos-rev Select the VLAN reverse direction user priority. The available values 255
are:
l 255 (passthrough)
l 0 (lowest) - 7 (highest)
wanopt-passive-opt Select WAN optimization passive mode options. This option decides default
what IP address will be used to connect server (IPv4 only).
webcache-https Enable or disable the web cache for HTTPS (IPv4 only). none
Create a new virtual wire pair SSL inspection and authentication policy
This section describes how to create a new virtual wire pair SSL inspection and authentication policy. This policy type is
essentially a firewall virtual wire pair policy for policy-based policy packages.
See NGFW policy in the FortiOS Administration Guide for more information.
The Virtual Wire Pair SSL Inspection & Authentication policy option is visible only if the NGFW
Mode is selected as Policy-based in the policy package.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
To create a new virtual wire pair SSL inspection and authentication policy:
Option Description
ID Enter a unique number as the policy ID, or use the default (0) to automatically
assign a policy ID. Policy IDs can be up to a maximum of 9 digits in length.
Once a policy ID has been configured it cannot be changed.
Name Enter a unique name for the policy. Each policy must have a unique name.
Virtual Wire Pair Interface Select one or more virtual wire pair interfaces. This field is required.
New objects can be created by clicking the Create New icon in the Object
Selector frame. See Creating objects on page 454 for more information.
Option Description
Virtual Wire Pair Select an arrow to indicate the flow of traffic between the ports in the selected
Virtual Wire Pair Interface.
Source Select the source address, address groups, virtual IPs, virtual IP groups, user,
user groups, and FSSO groups.
Destination Select the destination address, address groups, virtual IPs, virtual IP groups,
and services.
SSL/SSH Inspection Select one of the following options for SSL/SSH Inspection:certificate-
inspectioncustom-deep-inspectiondeep-inspectionno-inspection
Comments Add a description of the policy, such as its purpose, or the changes that have
been made to it.
Change Note Add a description of the changes being made to the policy. This field is
required.
6. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a
disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the
bottom of the list, but above the implicit policy.
Advanced options
auth-cert Select the HTTPS server certificate for policy authentication. none
cgn-session-quota Set the allowed concurrent sessions available for a source 16777215
IP address.
custom-log-fields Select custom fields to append to log messages for this policy. none
delay-tcp-npu-session Enable or disable TCP NPU session delay to guarantee packet order disable
of 3-way handshake.
diffserv-copy Enable or disable copying of the DSCP values from the original disable
direction to the reply direction.
diffserv-forward Enable or disable application of the differentiated services code point disable
(DSCP) value to the DSCP field of forward (original) traffic. If
enabled, also configure diffservcode-forward.
diffserv-reverse Enable or disable application of the DSCP value to the DSCP field of disable
reverse (reply) traffic. If enabled, also configure diffservcode-
rev.
diffservcode-forward Enter the DSCP value that the FortiGate unit will apply to the field of 000000
originating (forward) packets. The value is 6 bits binary. The valid
range is 000000-111111.
diffservcode-rev Enter the DSCP value that the FortiGate unit will apply to the field of 000000
reply (reverse) packets. The value is 6 bits binary. The valid range is
000000-111111.
fec Enable or disable forward error correction (FEC) on traffic matching disable
this policy on a FEC device.
firewall-session-dirty Select how to handle sessions if the configuration of this firewall check-all
policy changes.
geoip-match Select whether to match the address based on the physical or physical-location
registered location.
internet-service-negate Enable to negate the internet service set in the policy. disable
internet-service-src- Enable to negate the source internet service set in this policy. disable
negate
internet-service6 Enable or disable the use of IPv6 internet services for this policy. If disable
enabled, the destination address and service set in the policy are not
used.
internet-service6- Enable to negate the source IPv6 internet service set in this policy. disable
negate
internet-service6-src Enable or disable use of the IPv6 internet services in the source for disable
this policy. If enabled, the source address is not used.
match-vip Enable or disable matching of packets that have had their destination disable
address changed by a VIP.
match-vip-only Enable or disable matching only those packets that have had their disable
destination addresses change by a VIP.
natip Set the source NAT IP address for inbound traffic. 0.0.0.0/0.0.0.0
outbound Enable or disable application of the differentiated services code point enable
(DSCP) value to the DSCP field of forward (original) traffic.
permit-any-host Enable or disable accepting UDP packets from any host. disable
permit-stun-host Enable or disable accepting UDP packets from any session traversal disable
utilities for NAT (STUN) host.
radius-mac-auth- Enable or disable MAC authentication bypass. The bypassed MAC disable
bypass address must be received from the RADIUS server.
redirect-url Set the URL to which users are redirected after seeing and accepting none
the disclaimer or authenticating.
reputation-direction Set the destination of the initial traffic for reputation to take effect. destination
reputation-direction6 Set the destination of the initial traffic for IPv6 reputation to take destination
effect.
rtp-addr If this is an RTP NAT policy, set the address names. none
schedule-timeout Enable or disable ending current sessions when the schedule object disable
times out. Disable allows sessions to end from inactivity.
service-negate Enable or disable negation of the service set in the policy. disable
session-ttl Enter a value for the session time-to-live (TTL) from 300 to 604800, 0
or type 0 for no limitation.
ssh-filter-profile Select an SSH filter profile from the drop-down list. None
tcp-session-without- Enable or disable creation of a TCP session without the SYN flag. disable
syn
timeout-send-rst Enable or disable the sending of RST packets when TCP sessions disable
expire
tos Enter the type of service (TOS) value used for comparison. 0
tos-mask Enter the bit mask for TOS. Non-zero bit positions are used for 0
comparison while zero bit positions are ignored.
uuid Enter the universally unique identifier (UUID). This value is 00000000-0000-
automatically assigned but can be manually reset. 0000-0000-
000000000000
vlan-cos-fwd Select the VLAN forward direction user priority. The available values 255
are:
l 255 (passthrough)
l 0 (lowest) - 7 (highest)
vlan-cos-rev Select the VLAN reverse direction user priority. The available values 255
are:
l 255 (passthrough)
l 0 (lowest) - 7 (highest)
wanopt-passive-opt Select WAN optimization passive mode options. This option decides default
what IP address will be used to connect server (IPv4 only).
webcache-https Enable or disable the web cache for HTTPS (IPv4 only). none
This section describes how to create virtual wire pair policies. Before you can create a policy, you must create a virtual
wire pair. See Configuring virtual wire pairs on page 710.
You can create a security virtual wire pair policy in a policy package that is set to Policy-based. If the policy package is
set to Profile-based, see Create a new firewall virtual wire pair policy on page 374.
See Virtual wire pair in the FortiOS Administration Guide for more information about virtual wire pairs and virtual wire pair
policies.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
Option Description
ID Enter a unique number as the policy ID, or use the default (0) to automatically
assign a policy ID. Policy IDs can be up to a maximum of 9 digits in length.
Once a policy ID has been configured it cannot be changed.
Option Description
Name Enter a unique name for the policy. Each policy must have a unique name.
Virtual Wire Pair Interface Select one or more virtual wire pair interfaces. This field is required..
Virtual Wire Pair Select an arrow to indicate the flow of traffic between the ports in the selected
Virtual Wire Pair Interface.
Source Select the source address, address groups, virtual IPs, virtual IP groups, user,
user groups, and FSSO groups.
Destination Select the destination address, address groups, virtual IPs, virtual IP groups,
and services.
Service Select the service. Select App Default or Specify. If Specify is selected, select
the Service.
Log Traffic When the Action is DENY, select Log Violation Traffic to log violation traffic.
When the Action is ACCEPT, select one of the following options:
l No Log
Protocol Options Select protocol options profiles for handling protocol-specific traffic.
This option is available when the Action is ACCEPT.
l IPS Profile
l Email Filter
Comments Add a description of the policy, such as its purpose, or the changes that have
been made to it.
Change Note Add a description of the changes being made to the policy. This field is
required.
6. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a
disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the
bottom of the list, but above the implicit policy.
Advanced options
comments Add a description of the policy, such as its purpose, or the changes none
that have been made to it. A comment added here will overwrite the
comment added in the above Comments field.
dstaddr-negate Enable to negate the values set in IPv4 Destination Address and disable
IPv6 Destination Address.
global-label Set the label for the policy to be displayed when the GUI is in Global none
View mode.
internet-service-negate When enabled, Internet services match against any Internet service disable
except the selected Internet service.
internet-service-src- Enables or disables the use of Internet Services in source for this disable
negate policy. If enabled, internet-service-src specifies what the
service must NOT be.
internet-service6 Enable or disable the use of IPv6 internet services for this policy. If disable
enabled, the destination address and service set in the policy are not
used.
internet-service6- Enable to negate the source IPv6 internet service set in this policy. disable
negate
internet-service6-src Enable or disable use of the IPv6 internet services in the source for disable
this policy. If enabled, the source address is not used.
sctp-filter-profile Select an existing stream control transmission protocol (SCTP) filter none
profile.
send-deny-packet Enable or disable sending a reply packet when a session is denied or disable
blocked by this policy.
srcaddr-negate Enable or disable negation of the IPv4 Source Address or IPv6 disable
Source Address address.
uuid Enter the universally unique identifier (UUID). This value is 00000000-0000-
automatically assigned but can be manually reset. 0000-0000-
000000000000
This section describes how to create web, FTP, WAN optimization (WANOpt), and ZTNA proxy policies.
Proxy policies are also supported in Policy Blocks. See Creating Proxy Policies in Policy Blocks on page 438.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
In earlier versions, ZTNA rules were special proxy policies that controlled access to the ZTNA
servers, and they could be configured from the Policy & Objects > Policy Packages > ZTNA
Rules. However, on this version and above, ZTNA rules are now configured as a proxy policy
by selecting the ZTNA proxy type in Policy & Objects > Policy Pagackages > Proxy Policy.
Option Description
Name Enter a unique name for the policy. Each policy must have a unique name.
Explicit Proxy Type Select the explicit proxy type: Explicit Web, Transparent Web, FTP, or WAN
Optimize.
Outgoing Interface Select outgoing interfaces in the same manner as Incoming Interface.
Source Select source aaddresses, address groups, virtual IPs, and virtual IP groups.
Security Posture Tag For ZTNA proxy policies, select the security posture tags and tag groups. See
Zero Trust Network Access (ZTNA) objects on page 493.
This option is only available when the proxy type is set to ZTNA.
Destination Select destination addresses, address groups, virtual IPs, and virtual IP
groups.
ZTNA Server For ZTNA proxy policies, select a ZTNA server. See Configuring a ZTNA
server on page 495.
This option is only available when the proxy type is set to ZTNA.
Service Select services and service groups from the object selector pane.
Action Select an action for the policy to take: Deny, Accept, or Redirect.
Redirect is only available when the proxy type is set to Explicit Web or
Transparent Web.
Display Disclaimer Set the Display Disclaimer: Disable, By Domain, By Policy, or By User.
Option Description
l Web Filter Profile (not available when the proxy type is set to FTP)
l Application Control (not available when the proxy type is set to FTP)
l IPS Profile (not available when the proxy type is set to FTP)
l Web Application Firewall (not available when the proxy type is set to FTP)
SSL/SSH Inspection Select one of the following options for SSL/SSH Inspection:certificate-
inspectioncustom-deep-inspectiondeep-inspectionno-inspection
This option is not available when the Security Profiles Profile Type is set to
Use Security Profile Group.
Comments Add a description of the policy, such as its purpose, or the changes that have
been made to it.
Change Note Add a description of the changes being made to the policy. This field is
required.
5. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a
disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the
bottom of the list, but above the implicit policy.
Advanced options
global-label Enter the label for the policy to be displayed when the GUI is in none
Global View mode.
label Set the label for the policy to be displayed in the VDOM. none
sctp-filter-profile Select an existing stream control transmission protocol (SCTP) filter none
profile.
session-ttl Session TTL for sessions accepted by this policy (300 - 6040800 0
seconds, 0 = use system default).
transparent Enable or disable using the IP address of the client to connect to the disable
server.
uuid Enter the universally unique identifier (UUID). This value is 00000000-0000-
automatically assigned but can be manually reset. 0000-0000-
000000000000
ztna-tags-match-logic Set the logic used for matching security posture tags. The available or
options are and and or.
Central SNAT (source NAT) enables you to define and control (with more granularity) the address translation performed
by the FortiGate unit. With the NAT table, you can define the rules which dictate the source address or address group
and which IP pool the destination address uses.
While similar in functionality to IP pools, where a single address is translated to an alternate address from a range of IP
addresses, with IP pools there is no control over the translated port. When using the IP pool for source NAT, you can
define a fixed port to guarantee the source port number is unchanged. If no fixed port is defined, the port translation is
randomly chosen by the FortiGate unit. With the central NAT table, you have full control over both the IP address and
port translation.
The FortiGate unit reads the NAT rules in a top-down methodology, until it hits a matching rule for the incoming address.
This enables you to create multiple NAT policies that dictate which IP pool is used based on the source address. The
NAT policies can be rearranged within the policy list as well. NAT policies are applied to network traffic after a security
policy.
If NGFW mode is policy-based, then it is assumed that central NAT (specifically SNAT) is enabled implicitly.
See Central SNAT in the FortiOS Administration Guide for more information about central SNAT.
Central NAT must be enabled when creating or editing the policy package for this option to be
available in the tree menu. See Create new policy packages on page 337.
Central SNAT must also be enabled in Feature Visibility for the option to be visible in the tree
menu. On the Policy & Objects tab, from the Tools menu, select Feature Visibility. In the Policy
section, select the Central SNAT check box to display this option.
Option Description
Outgoing Interface Select outgoing interfaces in the same manner as Incoming Interface.
Source Address Select source addresses, address groups, virtual IPs, and virtual IP groups.
Destination Address Select destination addresses, address groups, virtual IPs, and virtual IP
groups.
NAT Select to enable NAT.If enabled, select NAT, NAT46, or NAT64. If Type is set
to IPv4, NAT64 is not available. If Type is set to IPv6, NAT46 is not available.
Option Description
IP Pool Configuration If NAT is selected, select Use Outgoing Interface Address or Use Dynamic IP
Pool.
Protocol Select the protocol: ANY, TCP, UDP, SCTP, or Specify. If Specify is selected,
specify the protocol number.
This option is only available when NAT is selected.
Explicit Port Mapping Enable or disable port mapping, then set the Original Source Port to match.
Choose an original source port from one to 65535. The NAT'd port will be
chosen by the FortiGate based on the IP Pool configuration.
Explicit port mapping cannot apply to some protocols which do not use ports,
such as ICMP. When enabling a NAT policy which uses Explicit port mapping,
always consider that ICMP traffic will not match this policy.
When using IP Pools, only the Overload type IP Pool allows Explicit port
mapping. When Explicit port mapping is applied, you must define an original
source port range and a translated sort port range. The source port will map
one to one with the translated port.
See Dynamic SNAT in the FortiOS Administration Guide for more information
about how each IP pool type works.
Comments Add a description of the policy, such as its purpose, or the changes that have
been made to it.
Advanced Options Configure advanced options, see Advanced options below.For more
information on advanced option, see the FortiOS CLI Reference.
Change Note Add a description of the changes being made to the policy. This field is
required.
6. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a
disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the
bottom of the list, but above the implicit policy.
Advanced options
uuid Enter the universally unique identifier (UUID). This value is 00000000-0000-
automatically assigned but can be manually reset. 0000-0000-
000000000000
Destination NAT (DNAT) is typically applied to traffic from the Internet that is going to be directed to a server on a
network behind the FortiGate device. The actual address of the internal network is hidden. When a request is received,
FortiGate checks the NAT table and determines if the destination IP address for incoming traffic must be changed using
DNAT.
DNAT must take place before routing so that the unit can route packets to the correct destination.
DNAT policies can be created, or imported from Virtual IP (VIP) objects. Virtual servers can also be imported from
ADOM objects to DNAT policies. DNAT policies are automatically added to the Virtual IP (VIP) object table (Firewall
Objects > Virtual IPs) when they are created.
VIPs can be edited from either the DNAT or VIP object tables by double-clicking on the VIP, right-clicking on the VIP and
selecting Edit, or selecting the VIP and clicking Edit in the toolbar. The network type cannot be changed. DNAT policies
can also be copied, pasted, cloned, and moved using the right-click or Edit menus.
Deleting a DNAT policy does not delete the corresponding VIP object, and a VIP object cannot be deleted if it is in the
DNAT table.
DNAT policies support overlapping IP address ranges; VIPs do not. DNAT policies do not support VIP groups.
See Destination NAT in the FortiOS Administration Guide for more information.
Central NAT must be enabled when creating or editing the policy package for this option to be
available in the tree menu. See Create new policy packages on page 337.
Central DNAT must be enabled in Feature Visibility as well for the option to be visible in the
tree menu. On the Policy & Objects tab, from the Tools menu, select Feature Visibility. In the
Policy section, select the Central DNAT check box to display this option.
Option Description
Name Enter a unique name for the policy. Each policy must have a unique name.
Comments Add a description of the policy, such as its purpose, or the changes that have
been made to it.
Color Select a color. This color will be used to indentify this DNAT in the fabric view.
Type Select the network type: Static NAT, DNS Translation, FQDN, or Load
balance.
This option is only available when Configure Default Value is enabled.
Option Description
External IP Address/Range Enter the start and end external IP addresses in the fields. If there is only one
address, enter it in both fields.
This option is only available when Configure Default Value is enabled and the
network type is not FQDN.
Source Address If Optional Filters is enabled, add source IP, range, or subnet filters. Multiple
filters can be added using the Add icon.
Services If Optional Filters is enabled, enable or disable and then select services.
Port Forwarding Enable or disable port forwarding and then configure the ports to map.
This option is only available when Configure Default Value is enabled.
Protocol If Port Forwarding is enabled, select the protocol: TCP, UDP, SCTP, or ICMP.
ICMP is not available for IPv6 policies.
External Service Port If Port Forwarding is enabled, enter the external service port.
This option is not available when Protocol is ICMP.
Map to [IPv4/IPv6] Port If Port Forwarding is enabled, enter the map to port.
This option is not available when Protocol is ICMP.
Enable ARP Reply Select to enable address resolution protocol (ARP) reply.
This option is only available when Configure Default Value is enabled.
Add To Groups Select the groups to which the virtual IP should be added.
Option Description
If multiple imported VIP objects have the same name but different details, the
object type will become Dynamic Virtual IP, and the per-device mappings will
be listed here.
Mappings can also be manually added, edited, and deleted as needed.
Change Note Add a description of the changes being made to the policy. This field is
required.
6. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a
disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the
bottom of the list, but above the implicit policy.
Advanced options
dns-mapping-ttl Enter time-to-live for DNS response, from 0 to 604 800. Set to to 0 to 0
use the DNS server's response time.
This option is not available for IPv6 policies.
http-cookie-age Set the time in minutes that client web browsers should keep a 60
cookie. Set to 0 for no time limit.
http-cookie-domain Enter the domain name to which cookie persistence should apply. none
http-cookie-domain- Enable or disable use of the HTTP cookie domain from the host disable
from-host field in HTTP.
http-cookie-generation Set the generation of HTTP cookies to be accepted. The exact value 0
is not important, only that it is different from any generation that has
already been used. Changing this value invalidates all existing
cookies.
http-cookie-share Configure to control the sharing of cookies across virtual servers. same-ip
Using same-ip means that any cookie generated by one virtual
server can be used by another virtual server in the same virtual
domain.
Disable stops cookie sharing between virtual servers.
http-ip-header For HTTP multiplexing, enable or disable to add teh original client disable
IP address in the X-Forwarded-For HTTP header.
http-ip-header-name For HTTP multiplexing, enter a custom HTTP header name. The none
original client IP address is added to this header. If empty, X-
Forwarded-For is used.
https-cookie-secure Enable or disable verification that HTTPS cookies are secure. disable
id Enter a unique number as the policy ID, or use the default (0) to 0
automatically assign a policy ID. Policy IDs can be up to a maximum
of 9 digits in length. Once a policy ID has been configured it cannot
be changed.
ldbd-method Select the method used to distribute sessions to real servers. static
monitor Select the health check monitor to use when polling to determine a none
virtual server's connectivity status.
nat-source-vip Enable or disable forcing the source NAT mapped IP to the external disable
IP for all traffic.
outlook-web-access Enable to add the Front-End-Https header for Microsoft Outlook disable
Web Access.
persistence Configure the method used to ensure that clients connect to the none
same server every time they make a request that is part of the same
session.
portmapping-type Select the port mapping type, either 1-to-1 or m-to-n (many to 1-to-1
many).
This option is not available for IPv6 policies.
server-type Select the protocol to be load balanced by the virtual server (also none
called the server load balance virtual IP).
ssl-accept-ffdhe-groups Enable or disable using the FFDHE cipher suite for SSL key enable
exchange.
ssl-algorithm Set the permitted encryption algorithms for SSL sessions according high
to encryption strength:
l high: permit only high encryption algorithms: AES or 3DES.
ssl-client-session-state- Set the maximum number of SSL session states to keep between 1000
max the client and FortiGate, from 0 to 100000.
ssl-client-session-state- Set the number of minutes to keep the SSL session states between 30
timeout the client and FortiGate, from 1 to 14400.
ssl-client-session-state- Select the method to use to expire SSL sessions between the client both
type and FortiGate.
l both: expire SSL session states when either ssl-client-
session-state-max or ssl-client-session-state-
timeout is exceeded, regardless of which occurs first.
l count: expire SSL session states when ssl-client-
session-state-max is exceeded.
l disable: expire all SSL session states.
ssl-dh-bits Select the number of bits used in the Diffie-Hellman exchange for 2048
RSA encryption of the SSL connection: 768, 1024, 1536, 2048,
3072, or 4096.
ssl-hpkp-age Set the number of seconds that the client should honor the HPKP 5184000
setting (60 - 157680000).
ssl-hpkp-backup Select the certificate used to generate the backup HPKP pin from. none
ssl-hpkp-include- Enable or disable indicating that the HPKP header applies to all disable
subdomains subdomains.
ssl-hpkp-primary Select the certificate used to generate the primary HPKP pin from. none
ssl-hpkp-report-uri Set the URL to report HPKP violations to (maximum size = 255). none
ssl-hsts-age Set the number of seconds that the client should honour the HSTS 5184000
setting (60 - 157680000).
ssl-hsts-include- Enable or disable indicating that the HSTS header applies to all disable
subdomains subdomains.
ssl-http-location- Enable to replace HTTP with HTTPS in the reply’s Location disable
conversion HTTP header field.
ssl-http-match-host Enable or disable HTTP host matching for location conversion. disable
ssl-max-version Select the highest version of SSL/TLS to allow in SSL sessions: tls-1.3
ssl-3.0, tls-1.0, tls-1.1, tls-1.2, or tls-1.3.
ssl-min-version Select the lowest version of SSL/TLS to allow in SSL sessions: ssl- tls-1.1
3.0, tls-1.0, tls-1.1, tls-1.2, or tls-1.3.
ssl-mode Select the method to use for SSL offloading between the client and half
FortiGate (half) or from the client to FortiGate and from FortiGate
to the server (full).
ssl-pfs Select the cipher suites that can be used for SSL perfect forward require
secrecy (PFS):
l allow: allow use of any cipher suite so PFS may or may not be
applied.
l require: allow only Diffie-Hellman cipher suites, so PFS is
applied.
This setting applies to both client and server sessions.
ssl-send-empty-frags Enable or disable sending empty fragments to avoid CBC IV attacks enable
(SSL 3.0 and TLS 1.0 only).
This setting may need to be disabled for compatibility with older
systems.
ssl-server-algorithm Set the permitted encryption algorithms for SSL server sessions client
according to encryption strength:
l high: permit only high encryption algorithms: AES or 3DES.
ssl-server-max-version Select the highest version of SSL/TLS to allow in SSL server client
sessions: client, ssl-3.0, tls-1.0, tls-1.1, tls-1.2, or
tls-1.3.
ssl-server-min-version Select the lowest version of SSL/TLS to allow in SSL server client
sessions: client, ssl-3.0, tls-1.0, tls-1.1, tls-1.2, or
tls-1.3.
ssl-server-session- Set the maximum number of FortiGate to server SSL session states 100
state-max to keep, from 0 to 100000.
ssl-server-session- Set the number of minutes to keep FortiGate to server SSL session 60
state-timeout states, from 1 to 14400.
ssl-server-session- Select the method to use to expire FortiGate to server SSL sessions: both
state-type l both: expire SSL session states when either ssl-client-
session-state-max or ssl-client-session-state-
timeout is exceeded, regardless of which occurs first.
l count: expire SSL session states when ssl-client-
session-state-max is exceeded.
l disable: expire all SSL session states.
session-state-timeout is exceeded.
uuid Enter the universally unique identifier (UUID). This value is 00000000-0000-
automatically assigned but can be manually reset. 0000-0000-
000000000000
weblogic-server Enable or disable adding an HTTP header to indicate SSL offloading disable
for a WebLogic server.
websphere-server Enable or disable adding an HTTP header to indicate SSL offloading disable
for a WebSphere server.
See DoS policy in the FortiOS Administration Guide for more information.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
Option Description
Name Enter a unique name for the policy. Each policy must have a unique name.
Source Address Select source addresses, address groups, virtual IPs, and virtual IP groups.
Destination Address Select destination addresses, address groups, virtual IPs, and virtual IP
groups.
Advanced Options Add a description of the policy, such as its purpose, or the changes that have
> comments been made to it. A comment added here will overwrite the comment added in
the above Comments field.
Change Note Add a description of the changes being made to the policy. This field is
required.
L3 Anomalies
ip_src_session If the number of concurrent IP connections from one source 5000 concurrent sessions.
IP address exceeds the configured threshold value, the
action is executed.
ip_dst_session If the number of concurrent IP connections to one destination 5000 concurrent sessions.
IP address exceeds the configured threshold value, the
action is executed.
L4 Anomalies
tcp_syn_flood If the SYN packet rate of new TCP connections, including 2000 packets per second.
retransmission, to one destination IP address exceeds the
configured threshold value, the action is executed.
An additional Proxy action is available for this anomaly
type. The anomalous traffic will be buffered and scanned
when the complete file is downloaded.
The Proxy action is only available on these platforms:
FGC_3000D, FGC_3100D, FGC_3200D, FGC3700D,
FGC3700DX, FGC_5001D, FGT_1500D, FGT_3000D,
FGT_3100D, FGT_3200D, FGT3700D, FGT3700DX, and
FGT_5001D.
tcp_port_scan If the SYN packet rate of new TCP connections, including 1000 packets per second.
retransmission, from one source IP address exceeds the
configured threshold value, the action is executed.
tcp_src_session If the number of concurrent TCP connections from one 5000 concurrent sessions.
source IP address exceeds the configured threshold value,
the action is executed.
tcp_dst_session If the number of concurrent TCP connections to one 5000 concurrent sessions.
destination IP address exceeds the configured threshold
value, the action is executed.
udp_flood If the UDP traffic to one destination IP address exceeds the 2000 packets per second.
configured threshold value, the action is executed.
udp_scan If the UDP sessions setup rate originating from one source 2000 sessions per second.
IP address exceeds the configured threshold value, the
action is executed.
udp_src_session If the number of concurrent UDP connections from one 5000 concurrent sessions.
source IP address exceeds the configured threshold value,
the action is executed.
L4 Anomalies
udp_dst_session If the number of concurrent UDP connections to one 5000 concurrent sessions.
destination IP address exceeds the configured threshold
value, the action is executed.
icmp_flood If the number of ICMP packets sent to one destination IP 250 packets per second.
address exceeds the configured threshold value, the action
is executed.
icmp_sweep If the ICMP sessions setup rate originating from one source 100 sessions per second.
IP address exceeds the configured threshold value, the
action is executed.
icmp_src_ If the number of concurrent ICMP connections from one 300 concurrent sessions.
session source IP address exceeds the configured threshold value,
the action is executed.
icmp_dst_ If the number of concurrent ICMP connections to one 1000 concurrent sessions.
session destination IP address exceeds the configured threshold
value, the action is executed.
sctp_flood If the number of SCTP packets sent to one destination IP 2000 packets per second.
address exceeds the configured threshold value, the action
is executed.
sctp_scan If the number of SCTP sessions originating from one 1000 packets per second.
source IP address exceeds the configured threshold value,
the action is executed.
sctp_src_ If the number of concurrent SCTP connections from one 5000 concurrent sessions.
session source IP address exceeds the configured threshold value,
the action is executed.
sctp_dst_ If the number of concurrent SCTP connections to one 5000 concurrent sessions.
session destination IP address exceeds the configured threshold
value, the action is executed.
6. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a
disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the
bottom of the list, but above the implicit policy.
The section describes how to create new IPv4 and IPv6 interface policies.
See Interface policies in the FortiOS Administration Guide for more information.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
Option Description
Source > Address Select source addresses, address groups, virtual IPs, and virtual IP groups.
Destination > Address Select destination addresses, address groups, virtual IPs, and virtual IP
groups.
Log Traffic Select the traffic to log: No Log, Log Security Events, or Log All Sessions.
AntiVirus Profile Enable or disable, and then select, the antivirus profile.
Web Filter Profile Enable or disable, and then select, the web filter profile.
Application Control Enable or disable, and then select, the application control profile.
IPS Profile Enable or disable, and then select the IPS profile.
Email Filter Profile Enable or disable, and then select, the email filter profile.
Change Note Add a description of the changes being made to the policy. This field is
required.
6. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a
disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the
bottom of the list, but above the implicit policy.
Advanced options
comments Add a description of the policy, such as its purpose, or the changes that none
have been made to it.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
Option Description
Name Enter a unique name for the policy. Each policy must have a unique name.
Outgoing Interface Select outgoing interfaces in the same manner as Incoming Interface.
Source NAT Enable or disable source NAT, then enter the source NAT IP Address.
This option is only available when Action is Accept.
Protocol Option Select a protocol option: ANY, ICMP, IGMP, TCP, UDP, OSFP, or Others.
Option Description
Port Range Set the port range. This option is only available when Protocol Option is TCP
or UDP.
Protocol Number Enter the protocol number, from 1 to 256. This option is only available when
Protocol Option is Others.
Change Note Add a description of the changes being made to the policy. This field is
required.
6. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a
disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the
bottom of the list, but above the implicit policy.
Advanced options
comments Add a description of the policy, such as its purpose, or the changes none
that have been made to it. A comment added here will overwrite the
comment added in the above Comments field.
uuid Enter the universally unique identifier (UUID). This value is 00000000-0000-
automatically assigned but can be manually reset. 0000-0000-
000000000000
traffic-shaper Select the traffic shaper to apply to traffic forwarded by the multicast none
policy.
This option is only available in an IPv4 multicast policy.
The section describes how to create new IPv4 and IPv6 local-in policies to control inbound traffic that is going to a
FortiGate interface.
See Local-in policy in the FortiOS Administration Guide for more information.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
Option Description
Source Select souce addresses, address groups, virtual IPs, and virtual IP groups.
Address
Destination Select destination addresses, address groups, virtual IPs, and virtual IP groups.
Address
HA Enable to dedicate the interface as an HA management interface. This option is only available
Management for IPv4 policies.
Interface Only
Change Note Add a description of the changes being made to the policy. This field is required.
6. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a
disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the
bottom of the list, but above the implicit policy.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
Option Description
Name Enter a unique name for the policy. Each policy must have a unique name.
Comments Add a description of the policy, such as its purpose, or the changes that
have been made to it.
If Traffic Matches:
Source Internet Service Enable or disable source internet service, then select services.
This option is only available when the IP Version is IPv4.
Source Address Select source addresses, address groups, virtual IPs, and virtual IP
groups.
This option is only available when Source Internet Service is off.
Destination Internet Service Turn destination internet service on or off, then select services.
Destination Address Select destination addresses, address groups, virtual IPs, and virtual IP
groups.
This option is only available when Destination Internet Service is off.
Type of Service Mask Specify the hexidecimal mask to be matched against the ToS.
Then:
Action Select the action to take if traffic matches: Apply Shaper or Assign Group.
Option Description
Shared Shaper Select a shared traffic shaper. This option is only available when Action is
set to Apply Shaper.
Reverse Shaper Select a reverse traffic shaper. This option is only available when Action is
set to Apply Shaper.
Per-IP Shaper Select s per-IP traffic shaper. This option is only available when Action is
set to Apply Shaper.
Traffic Shaping Class ID Select the shaping class to which this traffic should be assigned. This
option is only available when Action is set to Assign Group.
Change Note Add a description of the changes being made to the policy. This field is
required.
6. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a
disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the
bottom of the list, but above the implicit policy.
Advanced options
uuid Enter the universally unique identifier (UUID). This value is 00000000-0000-
automatically assigned but can be manually reset. 0000-0000-
000000000000
The authentication rule defines the sources and destination that require authentication and what authentication
scheme is applied.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
Option Description
Name Enter a unique name for the policy. Each policy must have a unique name.
Source Address Select source addresses, address groups, virtual IPs, and virtual IP groups.
SSO Authentication Scheme Select or create a new authentication scheme for single sign-on.
Comments Add a description of the policy, such as its purpose, or the changes that have
been made to it.
Change Note Add a description of the changes being made to the policy. This field is
required.
6. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a
disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the
bottom of the list, but above the implicit policy.
Advanced options
dstaddr Select an IPv4 destination address. Required for web proxy none
authentication.
dstaddr6 Select an IPv6 destination address. Required for web proxy none
authentication.
web-portal Enable or disable the web portal for proxy transparent policy disable
In FortiManager, you can create hyperscale policies by configuring the policy package's policy offload level to Full
Offload. For more information on hyperscale firewalls, see the FortiGate Administration Guide.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
When configuring a Hyperscale Policy, there are fields to define IPv4 and IPv6 source
addresses and destination addresses.
6. Click OK to create the policy. By default, policies will be added to the bottom of the list.
This section describes how to create a new FortiSwitch network access control (NAC) policy.
You can create a NAC policy that matches devices with the specified criteria, devices belonging to a specified user
group, or devices with a specified FortiClient EMS tag. Devices that match the policy are assigned to a specific VLAN or
have port-specific settings applied to them.
For more information about NAC, see FortiSwitch network access control in the FortiSwitch Administration Guide.
NAC policies can be created whether the FortiSwitch is in central management mode or per-device management mode,
and the changes are saved to the FortiGate database.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
Option Description
Name Enter a unique name for the policy. Each policy must have a unique name.
This field is required.
FortiLink Interface Use the search field to find and select the FortiLink interface.
Description Add a description of the policy, such as its purpose, or the changes that have
been made to it.
Device Patterns
Category Select Device, User, EMS Tag or Vulnerability. Vulnerability is only available in
7.4 and later ADOMs.
For Device pattern fields, you can use the wildcard * character when entering
the value to be matched.
MAC Address Enable or disable matching a MAC address, then enter a MAC address.
Only available if Category is Device.
Hardware Vendor Enable or disable matching a hardware vendor, then enter a hardware vendor
name.
Only available if Category is Device.
Device Family Enable or disable matching a device family, then enter a device family name.
Only available if Category is Device.
Type Enable or disable matching a device type, then enter a device type.
Option Description
Operating System Enable or disable matching an operating system, then enter an operating
system.
Only available if Category is Device.
Assign VLAN Enable to select a VLAN interface for the switch controller action.
Assign device to dynamic Enable to use a dynamic firewall address for matching a device, then select
address the address. For more information, see To create a dynamic firewall address
for the NAC policy.
Assign VLAN Enable to select a VLAN interface for the wireless controller action.
Revision
Change Note Add a description of the changes being made to the policy. This field is
required.
6. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled,
a disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to
the bottom of the list, but above the implicit policy.
FortiProxy firewall policies are only available in FortiProxy ADOMs. See FortiProxy ADOMs on
page 902.
For more information on configuring a FortiProxy firewall policy, see the FortiProxy
Administration Guide on the Fortinet Document Library.
Type Select the policy type from Explicit, Transparent, FTP, SSH Tunnel,
SSH Proxy, and Wanopt.
Incoming Interface Select the incoming interface(s) from the object selector pane.
Outgoing Interface Select the outgoing interface(s) from the object selector pane.
Service Click the plus icon to add services to the policy, and then add services from the
service selector pane.
Action Select a policy action. Available actions include Accept, Deny, Redirect, and
Isolate.
Depending on which option is selected, additional settings are available. For
more information, see the FortiProxy Administration Guide on the Fortinet
Document Library.
Enable Policy Matching Pass Check the box to enable policy matching pass through.
Through
6. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a
disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the
bottom of the list, but above the implicit policy.
Proxy auto-configuration (PAC) policies are only available in FortiProxy ADOMs. See
FortiProxy ADOMs on page 902.
For more information on configuring a PAC policy, see the FortiProxy Administration Guide on
the Fortinet Document Library.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
7. Click OK to create the policy. You can select to enable or disable the policy in the right-click menu. When disabled, a
disabled icon will be displayed in the Seq.# column to the left of the number. By default, policies will be added to the
bottom of the list, but above the implicit policy.
Editing policies
Policies can be edited in a variety of different way, often directly on the policy list.
The name of the admin who last modified the policy will be displayed in the Last Modified field
along with the timestamp.
To edit a policy:
Select a policy and select Edit from the Edit menu, or double-click on a policy, to open the Edit Policy pane.
You can also edit a policy inline using the object pane (either the Object Selector frame or the Object Configurations
pane when dual pane is enabled), the right-click menu, and by dragging and dropping objects. See Using the object
selector on page 420 and Drag and dropping objects on page 420.
The right-click menu changes based on the cell or object that is clicked on. When available, selecting Add Object(s)
opens the Add Object(s) dialog box, where one or more objects can be selected to add to the policy, or new objects can
be created and then added. Selecting Remove Object(s) removes the object from the policy.
To clone a policy:
Select a policy, and from the Edit menu, select Clone. The Clone Policy dialog box opens with all of the settings of the
original policy. Edit the settings as required and select OK to create the clone.
Select a policy, and from the Edit menu, select Clone Reverse. Alternatively, you can also select Clone Reverse from the
right-click context menu.
The policy is cloned with the Incoming Interface and Outgoing Interface switched with each other. The Source and
Destination are also switched with each other.
The policy is cloned without a name. Click the Name for the policy and specify a name.
A policy cloned using the Clone Reverse option is disabled for security. The administrator can
enable the policy after reviewing the settings.
When NAT is enabled for a policy, Clone Reverse is disabled.
You can copy, cut, and paste policies. Select a policy, and from the Edit menu, select Cut or Copy. When pasting a
copied or cut policy, you can insert it above or below the currently selected policy.
You can also copy, cut, and paste objects within a policy. Select an object in a cell, or select multiple objects using the
control key, then right-click and select Copy or Cut. Copied or cut objects can only be pasted into appropriate cells; an
address cannot be pasted into a service cell for example.
A copied or cut policy or object can be pasted multiple times without having to be recopied.
To delete a policy:
You can delete a policy. Select a policy, and select Delete. When deleting a policy, you will see the Confirm Deletion
pane which displays information about the selected policies to be deleted. Click OK to confirm the deletion.
To add a section:
You can use sections to help organize your policy list. Policies can also be appended to sections.
Select a policy, and from the Section menu, click Add. Type a section name, and click OK to add a section to the
currently selected policy.
The Object Selector frame opens when a cell in the policy list is selected.
The Object Selector frame is only available when Display Policy & Objects in Dual Pane is
disabled. See Feature visibility on page 335.
Create New Click the create new dropdown list, then select the object type to make a new
object. See Creating objects on page 454.
Collapse / Expand All Expand or collapse all of the object groups shown in the pane.
Dock to bottom / right Move the Object Selector frame to the bottom or right side of the content pane.
Objects can be added or removed from the selected cell by clicking on them, and then selecting OK to apply the change
and close the Object Selection pane.
Objects can also be dragged and dropped from the pane to applicable, highlighted cells in the policy list.
Right-click on an object in the pane to Edit or Clone the object, and to see where it is used. See Edit an object on page
457 and Clone an object on page 459.
On the Policy & Objects > Policy Packages pane, objects can be dragged and dropped from the object pane, and can
also be dragged from one cell to another, without removing the object from the original cell.
One or more objects can be dragged at the same time. When dragging a single object, a box beside the pointer will
display the name of the object being dragged. When dragging multiple objects, the box beside the pointer will show a
count of the number of objects that are being dragged. To select multiple objects, click them while holding the control key
on your keyboard.
The cells or columns that the object or objects can be dropped into will be highlighted in the policy package pane. After
dropping the object or objects into a cell or column, the object will immediately appear in the cell as part of the policy, or
in all the cells of that column.
Policies can be configured to install only to specific installation targets within the policy package. This allows a single
policy package to be applied to multiple different types of devices. For example, FortiGate and FortiWiFi devices can
share the same policy, even though FortiGate devices do not have WiFi interfaces.
1. Ensure you are in the ADOM that contains the policy package.
2. Go to Policy & Objects > Policy Packages.
3. In the tree menu, select the policy package
4. Select Column Settings > Install On from the content pane toolbar.
5. Click Installation Targets in the Install On column of the policy that will be applied to specific devices.
6. In the Object Selector frame, select the devices that the policy will be installed on (see Policy package installation
targets on page 344), then click OK.
The policy will now be installed only on the selected installation targets, and not the other devices to which the policy
package is assigned.
Various policy details can be configured directly from the policy tables, such as the policy schedule, service, action,
security profiles, and logging.
5. Locate the schedule object, then drag and drop the object onto the cell in the Schedule column for the policy that
you want to change.
Show in service list Select to display the object in the services list.
Protocol Type Select the protocol from the dropdown list. Select one of the following:
TCP/UDP/SCTP, ICMP, ICMP6, or IP.
Advanced Options For more information on advanced option, see the FortiOS CLI Reference.
l strict: If the FortiGate unit receives an ICMP error packet that contains
Color Click the icon to select a custom, colored icon to display next to the service
name.
tcp-halfclose-timer Type how many seconds the FortiGate unit should wait to close a session after
one peer has sent a FIN packet but the other has not responded.The valid
range is from 1 to 86400 seconds. Type 0 to use the global setting defined in
system global.
This is available when Protocol is TCP/UDP/SCTP.
tcp-halfopen-timer Type how many seconds the FortiGate unit should wait to close a session after
one peer has sent an open session packet but the other has not responded.
The valid range is from 1 to 86400 seconds. Type 0 to use the global setting
defined in system global.
This is available when Protocol is TCP/UDP/SCTP.
tcp-timewait-timer Set the length of the TCP TIME-WAIT state in seconds.As described in RFC
793, the “...TIME-WAIT state represents waiting for enough time to pass to be
sure the remote TCP received the acknowledgment of its connection
termination request.”
Reducing the length of the TIME-WAIT state means the FortiGate unit can
close terminated sessions faster, which means that more new sessions can be
opened before the session limit is reached.
The valid range is 0 to 300 seconds. A value of 0 sets the TCP TIME-WAIT to
0 seconds. Type 0 to use the global setting defined in system global.
This is available when Protocol is TCP/UDP/SCTP.
udp-idle-timer Type the number of seconds before an idle UDP connection times out.The
valid range is from 1 to 86400 seconds.
The policy action must be Accept to add security profiles to the policy.
When a policy is created or edited, the history of the change is saved as a revision. You can view a policy's revisions in
the Revision History table when editing the policy.
Select a revision from the table and then click Revert to revert the policy to the selected revision.
The example below demonstrates how you can revert a policy to a previous version.
3. Edit the policy again, and review the Revision History log. You can see that revisions were added when the policy
was created and edited.
The policy is reverted to the previous state. In this example, the policy is reverted to use the Deny action and the
GTP service is removed.
A new revision is added to the table to log the change with the note "Reverted to revision #".
Viewing policies
Column options
The visible columns can be adjusted, where applicable, using the Column Settings menu in the content pane toolbar.
The columns and columns filters available are dependent on the policy and the ADOM firmware version.
Click and drag an applicable column to move it to another location in the table.
Go to Policy & Objects > Policy Packages, and use the search box to search or filter policies for matching rules or
objects.
When searching for a VIP object defined as an IP range by the first or last IP in that range,
search results will return the VIP object in the search results using either Simple and Strict
search.
Simple search
The default Simple Search will highlight text that matches the string entered in the search field, including "all" objects.
For example, when searching for an IP address in a firewall policy, simple search will show results that include the IP
address exactly, as well as highlight the fields configured with "all" objects.
Strict search
You can enable Strict Search to display only results that match the exact search entered, excluding "all". Strict Search
can be toggled on and off by clicking on the icon next to the search field.
Column Filters
1. Hover your mouse over a column header and select the filter icon . For example, in the From header.
The Filter dialog appears.
2. In the Filter dialog, you can use the Contains, Exact Match and NOT options along with filter values to configure
your filter.
Suggested filter values appear in the Suggestions field. Multiple values can be OR'd together using ",".
3. Click Apply to apply the filter. Multiple column filters can be configured and applied simultaneously. When a column
filter is applied, the filter icon appears in green .
Select the filter icon and click Remove to remove a filter.
You can use FortiManager to view FortiGate policy hit counters. When you run a policy check on a policy package or
select the Find Unused Policies option from the Tools dropdown for a policy package, FortiManager shows hit count
information for unused policies with zero hit count.
The Find Unused Policies option is unavailable when classic dual pane is enabled. To disable
classic dual pane, go to System Settings > Advanced > Advanced Settings, and set the
Display Policy & Object in Classic Dual Pane option to Disable.
In FortiManager, the policy hit counts are aggregated across all managed FortiGate units for the policy.
You can add policy hit count information to a policy package pane by enabling it in the Column Settings dropdown. The
hit count is collected from managed FortiGate units when either the Refresh Now button in the Hit Counts column header
or Refresh Hit Counts in the Tools dropdown is clicked.
The hit count information is excluded from the FortiManager event log, but it's included in the debug log for
troubleshooting purposes.
To view the hit count information for unused policies using the Find Unused Policies option:
4. In the tree menu, select the policy package, and expand the policy table of your choice in the content pane to see
the hit count information for the unused policies only.
5. To view all the policies and their hit count information, select No Filter from the Show Unused Policy field.
To view hit count information for unused policies in the Policy Check Report:
FortiManager can be configured to save the Last Used timestamp value which allows it to retain the timestamp if the hit
count is reset on the managed device. This feature is disabled by default.
When enabled, FortiManager discards any Last Used values that it receives from managed devices that are blank or
older than the currently stored value. Non-blank values that are more recent than the stored value will be updated and
displayed.
Use the Unused polices report to view and delete unused policies.
You may filter the unused policies report by date range to find policies that have not been used within a particular date
range.
.
The Unused Policies window opens.
4. If needed, click the Refresh button to retrieve the hitcount data from the FortiGate. Wait for the process to finish.
1. In the Unused Policies window, select a Policy from the Policy table.
2. Click Enable/Disable in the toolbar.
3. Enter a Change Note, and click OK.
The selected Policy will be enabled/disabled. Disabled policies are indicated with an icon in the Unused Policies
window and the Policy table after the page has been refreshed.
1. In the Show Unused Policy dropdown menu, select the date range within which the report should be filtered.
Any policies that have not been used within this date range are displayed. For example, to find policies that have not
been used in the last 60 days, select "in Last 60 Days" from the dropdown menu.
Policy Lookup
Policy Lookup allows you to search for policies on a FortiGate device or a VDOM based on certain parameters.
5. Select or specify the values for the following fields and click OK to search for a policy.
Device/VDOM Select the FortiGate device or the VDOM from the drop-down.
Destination Specify the destination IP address or a Fully Qualified Domain Name (FQDN).
The Policy Lookup feature is available only for IPv4 and IPv6 policies.
FortiManager must be in sync with the FortiGate devices or VDOMs either by installing or
importing the policy. If FortiManager is not in sync with the FortiGate devices, a message will
be shown that the device is out of sync. You can still perform the policy lookup, but the results
may not be accurate.
The policy screenshot function allows you to copy a selection of policies within the Policy Package as an image.
To use this function in a Firefox browser, you must update the Firefox configuration by toggling the
dom.events.asyncClipboard.clipboardItem to true.
You can preview and copy the JSON API requests or CLI script changes for a policy.
Policy Blocks are created to store multiple policies. Policy Blocks can be appended to a Policy Package. When creating
a Policy Package, the administrator does not need to add one policy at a time. By appending a Policy Block to a Policy
Package, the administrator can ensure that all policies in the Policy Block are added to the policy package together.
Policy Blocks are supported for the following types:
l Firewall Policies
l Proxy Policies
l Firewall Virtual Wire Pair Policies
Policy Blocks can be used within the Global Database ADOM and appended to global header
and footer poilicies, and then assigned to an ADOM's policies. With Policy Blocks, you can use
policies across multiple Global Policy Packages. See Global policy packages on page 333.
You must enable Policy Blocks before you can use them. On the Policy & Objects pane, from
the Tools menu, select Feature Visibility, and then select the Policy Block checkbox to display
the option.
4. Configure the following details, then click OK to create the Policy Block.
Central NAT Toggle Central NAT to ON to enable Central SNAT and Central DNAT policy
types.
This option is not available in the Global Database ADOM.
Policy Offload Level Select the policy offload level. Available options include Disable, Default,
DoS Offload, or Full Offload.
You can edit Policy Blocks from within the Policy Blocks section or from within a Policy Package.
Policy Blocks must be enabled in Policy & Object's Feature Visibility before they can be created and edited in an ADOM.
1. Go to Policy & Objects > Policy Packages > Policy Blocks or select the Policy Block from within a Policy Package to
which it is appended.
2. Double click on a Policy Block or select it from the table and click Edit.
3. Edit the details of the Policy Block, and click OK.
A reminder message is displayed that changes to the Policy Block will be reflected in all Policy Packages which are
using the Policy Block.
4. (Optional) Click on Where Policy Block is Used to see all Policy Packages to which the Policy Block is assigned.
Policies can be added to a Policy Block in two ways. Create a new policy within a Policy Block or append an existing
policy from a Policy Package to a Policy Block.
For information on creating a Proxy Policy in Policy Blocks, see Creating Proxy Policies in
Policy Blocks on page 438
Once a policy is copied from an existing Policy Package (source) to a Policy Block
(destination), it becomes an independent policy with no link to the original policy. Modifying
or deleting the original policy will not affect the policy in the Policy Block.
l Create New: The selected policies will be added to a new policy block.
1. Go to Policy & Objects, and enable Policy Block and Proxy Policy under Feature Visibility. Both features must be
enabled. See Feature visibility on page 335.
2. Create the Proxy Policy in a Policy Block:
a. Go to Policy & Objects > Policy Packages, and select a Policy Block in the tree menu.
For information on creating a new Policy Block, see Creating Policy Blocks on page 436.
b. Select Proxy Policy under the Policy Block.
c. Configure the details of the Proxy Policy, and click OK. For more information, see Create a new proxy policy on
page 390.
3. Append the Policy Block to the Policy Package. See Appending a Policy Block to a Policy Package on page 439.
4. Install the Policy Package to your device. See Installing Policy Blocks to target devices on page 440.
FortiManager Policy Blocks support Firewall Virtual Wire Pair (VWP) Policies.
1. Go to Policy & Objects, and enable Policy Block and Virtual Wire Pair Policy under Feature Visibility. Both features
must be enabled. See Feature visibility on page 335.
2. Create the VWP Policy in a Policy Block:
a. Go to Policy & Objects > Policy Packages, and select a Policy Block in the tree menu.
For information on creating a new Policy Block, see Creating Policy Blocks on page 436.
b. Select Firewall Virtual Wire Pair Policy under the Policy Block.
c. Configure the details of the VWP Policy, and click OK. For more information, see Create a new firewall virtual
wire pair policy on page 374.
3. Append the Policy Block to the Policy Package. See Appending a Policy Block to a Policy Package on page 439.
4. Install the Policy Package to your device. See Installing Policy Blocks to target devices on page 440.
Once a Policy Block is created, it can be appended to a Policy Package. After appending the Policy Block to a Policy
Package, assigning installation targets and installing the Policy Package to the installation targets, all the policies in the
Policy Block are installed to the target.
After a Policy Block is appended to a Policy Package, you can add or remove policies from the
Policy Block. You need to append the Policy Block to the Policy Package only once. It is not
required to append the Policy Block to the Policy Package again after adding or removing
policies from the Policy Block.
5. Select the Policy Block from the drop-down and click OK.
Deleting a Policy Block after it is appended to a Policy Package will automatically remove the
Policy Block (and the included policies) from the Policy Package.
c. Select the target device(s) for installation. You can select any installation targets, including ones not assigned
to the Policy Package's installation targets.
5. Click Apply, and install the Policy Block using Installation Targets. In the example below, Policy a1, a4, and a5 are
installed.
The use of Policy Blocks over Global Policy Packages simplifies the process of upgrading your ADOMs in order to use
policy features or objects introduced in later versions.
To upgrade a Global Database ADOM with Global Header and Footer policies, all of the local ADOMs that the Global
Policy Package is assigned to must first be upgraded to the same version or one version higher than the desired Global
Database ADOM version.
For example, to upgrade the Global Database ADOM to version 7.0, all of the local ADOMs and their managed devices
making use of the Global Policy Package must be on version 7.0 or 7.2 before upgrading the Global Database ADOM.
For more information, see Global database version on page 919.
In cases where some of the local ADOMs cannot be upgraded to a later version (for example, they include FortiGate
devices that are unsupported on later versions), the Global Database ADOM would not be able to be upgraded.
Policy Blocks store multiple policies so they can be appended to a local Policy Package together to simplify the
administration of a large number of policies. Because local Policy Blocks are configured per-ADOM, you only need to
update the local ADOM where the Policy Blocks are stored. This means you don't need to worry about other ADOMs
which may not be upgradable.
Policy Blocks are also supported in the Global Database ADOM, however, using Global Policy Blocks introduces the
same upgrade limitations that exist when using Global Header and Footer Policies.
Example of upgrading the Global Database ADOM with Global Policy Packages:
1. Upgrade each local ADOM and its managed devices to the same or higher version as the desired Global Database
ADOM version.
2. Upgrade the Global Database ADOM version.
3. Edit the Global Header and Footer policies
4. Re-assign the policies to the relevant ADOMs and then install the changes to your managed devices.
1. Upgrade your local ADOM and its managed devices to the desired version.
2. Edit the policies included in the Policy Block as desired.
3. Install the changes to your managed devices.
To limit who is able to edit Policy Blocks, you can enable role-based access control settings for Policy and Objects in the
desired ADOM. See Controlling access to Policy Blocks on page 444
Direct migration of Global Header and Footer policies to local policy blocks is not currently supported. To migrate Global
Header and Footer policies from the Global Database ADOM into local policy blocks, you must manually recreate the
policies in the local ADOM and then group them into a Policy Block. See Creating policies on page 350 and Creating
Policy Blocks on page 436
FortiManager supports role-based access control (RBAC) for Policy Packages and objects. In order to configure read-
only access to Policy Blocks using profiles, an administrator profile must be created with Read-Only permissions for
Policy Packages & Objects. This permission level limits the administrator to read-only permissions for all FortiManager
policy and object configuration, including Policy Blocks.
For more information on configuring an administrator profile, see Creating administrator profiles on page 985 and
Permissions on page 982.
You can restrict an individual administrator's access to specific Policy Blocks, and the administrator will only be able to
edit, move, and delete those Policy Blocks.
The administrator will be able to view unspecified Policy Blocks in Policy & Objects and in Policy Packages, but will not
be able to access, edit, move, or delete them.
unspecified Policy Blocks exist and can see them in Policy Packages, but they cannot be edited, moved, or
deleted.
Only Policy Blocks in ADOMs to which the Administrator has access are displayed in
the Specify list.
1. In an ADOM , two Policy Blocks have been configured: PB1 and PB2.
2. An new administrator is configured with permissions to allow management for two Policy Packages and Policy
Block PB1.
3. In Policy & Objects > Policy Packages, the administrator can see the Policy Packages and both Policy Blocks, but
only has edit/move/delete permissions for PB1.
4. The administrator can see that Policy Block PB2 exists in the Policy Package, but cannot edit, add, or remove it.
Existing global policies can be migrated to local policy blocks using the CLI to get the configuration and using
FortiManager scripts to recreate the policies in a local ADOM.
In the example below, the global policy package contains 20 firewall header and footer policies. These policies are
assigned to a local ADOM and installed to FortiGate devices.
1. Get the header and footer policy configuration from the Global Database ADOM.
a. Open the FortiManager CLI terminal and enter the following command to get the header policy configurations:
execute fmpolicy print-adom-package Global 1 <package ID> 1474 all
b. Copy the output from the script.
c. Repeat these steps for the footer policy using the following command:
execute fmpolicy print-adom-package Global 1 <package ID> 1476 all
2. Save the policy configuration into FortiManager scripts in the local ADOM.
a. In the local ADOM, go to Device Manager > Scripts and click Create New > Script.
b. Paste the contents from the CLI output from the previous step into a separate header and footer script.
c. In the pasted Script Details, change the Policy ID to 0 and change the script's first line from 'config global
header policy' to 'config firewall policy' and save the changes, otherwise the local ADOM will not
recognize when the script is run using global syntax and gives an error.
d. For Run script on select Policy Package or ADOM Database.
3. Unassign the global policy package. This removes the global configuration from the local ADOM so that you can re-
create the policies as policy blocks using the configured script.
a. In the Global Database ADOM, go to Policy & Objects > Policy Packages.
b. Select the policy package and click Action > Unassign.
4. Import the objects used by the Global policy package into the local ADOM.
a. In the local ADOM, go to Device Manager > Device & Groups.
b. Select the managed FortiGate and choose Import Configuration > Import all objects.
b. Append Top-Policy Block to the top of the policy package and Bottom-Policy Block at the bottom.
7. In the local ADOM, go to Policy & Objects > Policy Packages > Firewall Policy.
The local policy package has the global policies added through the policy block after running the scripts.
8. Install the policy package to the managed FortiGate devices to remove the global policy and re-create the policy
with thew new local policy blocks.
On FortiGate, the policies re-created through the Top-Policy Block and Bottom-Policy Block are shown in sequence,
and the migration from the global policy package to policy blocks is complete.
All objects within an ADOM are managed by a single database unique to that ADOM. Objects inside that database can
include items such as addresses, services, intrusion protection definitions, antivirus signatures, web filtering profiles, etc.
For more information on the ADOM database, see the ADOM and policy layer on page 46.
Some objects include the option to enable dynamic mapping to map a single logical object to a unique definition based
on the device or platform. When this feature is enabled, a table is displayed within the object configuration pane which
lists the dynamic mapping information. See Dynamic mapping on page 474.
When making changes to an object within the object database, changes are reflected immediately within the policy table
in the GUI; no copying to the database is required. If partial install is enabled, the edited object can be pushed to all the
devices that currently use it. Installing objects on page 460
Not all objects are enabled by default. Some features must be enabled before they are visible
in the GUI. See Feature visibility on page 335.
Some objects can only be configured using the CLI Configurations menu. See CLI
configurations on page 478
Objects and dynamic objects are managed from the tree menu under Policy & Objects (or on the bottom half of the
screen when dual pane is enabled). The available objects vary, depending on the specific ADOM selected.
Objects are used to define policies, and policies are assembled into policy packages that you can install on devices.
Policy packages are managed under Policy Packages in Policy & Objects (on the top half of the screen when dual pane
is enabled).
When you view a policy in a policy package, you can edit the policy by dragging objects from other columns, policies, or
the object selector frame and dropping the objects in cells in the policy. For more information see Drag and dropping
objects on page 420.
On the object configuration panes, you can see whether an object is used in the Used column,
and you can right-click on an object to find out where the object is used (Where Used) or to add
the object to a group (Grouping).
Creating objects
Some object configurations allow you to add the object to a group. This options are not
available for all objects.
4. Enter the required information, then click OK to create the new object.
A change note is required when creating or editing objects.
If you create Security Profiles that include Application Signature or Custom IPS Signature with
the same ID for multiple VDOMs, FortiManager will automatically change the ID. For example,
multiple VDOMs in a FortiGate device having the same Custom IPS Signature will have
different IDs assigned by FortiManager while installing the policy. The Custom IPS Signature
name will remain the same, but the ID will be different for each VDOM.
The automatic change of ID affects the attack_id in Custom IPS Signature and attack_id
or vuln_id in Application Signature. The change in ID may occur even when importing a
policy from FortiGate device and re-installing the policy.
You can view the modified ID in the Install Wizard by clicking Install Preview. Alternatively, you
can also go to Device Manager > [FortiGate_Name] > CLI Configurations> ips or Device
Manager > [FortiGate_Name] > CLI Configurations> application to view the modified ID for
the particular VDOM.
If you create an object in the Global Database, and assign the object to a regular ADOM, you
cannot delete the object from the Global Database. You must unassign the object from the
regular ADOM before deleting it from the Global Database.
4. In the Color field, click Change to select a new color code for the object.
5. Click OK.
3. Select an existing object from the table, and click More > Change Color in the toolbar.
4. Select a color code, and click OK.
If a color code is not selected while creating an object, black is assigned as the default color.
Create an IPv6 address template with predefined parameters. The template can then be applied when creating a new
IPv6 address.
4. Select or specify the values for the following and click OK:
Subnet Segments There can only be six subnet segments. These can either be predefined or
user created subnet segments.
Select one of the following predefined subnet segments:
l country
l state
l city
l site
l lan
l vlan
Create New To create a new segment, you must delete one of the existing predefined
segments if you already have six subnet segments. Click Create New. Specify
the Segment Name, Bits, and toggle Exclusive to Enable or Disable. Click OK.
Edit Segment Click Edit Segment. Edit the Segment Name, Bits, and toggle Exclusive to
Enable or Disable. Click OK.
Edit Values for Segment Click Edit values for Segment. Click + to add a row. Specify the Name, select
the Format, and specify the Value. Click OK.
The administrator can only define 6 segments and each segment can have a maximum of 16
bits. The administrator can toggle Exclusive to Enable to only choose from the predefined
segments.
The length of the IPv6 address prefix must be greater than 1 bit.
Managing objects
Once an object has been created, you can manage it in various ways:
l Edit an object on page 457
l Remove an object on page 458
l Clone an object on page 459
l Promote an object to Global Database on page 459
l Installing objects on page 460
l Export IPS and Application Control signatures to CSV file format on page 461
Edit an object
After editing an object in the object database, the changes are immediately reflected within the policy table in the GUI; no
copying to the database is required. If partial install is enabled, the edited object can be manually pushed to all devices
currently using that object, see Installing objects on page 460.
Changes made to an object are displayed in the Revision History table at the bottom of the page. To view the history,
select a revision in the table and click View Diff, or double-click the revision.
To edit an object:
Objects can also be edited directly from the policy list and Object Selector frame by right-
clicking on the object and selecting Edit.
When an object is added to a policy package and assigned to an ADOM, the object is available
in all devices that are part of the ADOM. If the object is renamed on a device locally,
FortiManager automatically syncs the object to the ADOM and applies the change to all
devices in the ADOM.
To revert a change:
Remove an object
To delete an object:
You can delete objects referenced by a policy or other objects. When deleting a used object, a dialog appears allowing
you to view where the object is being used.
l Click Where Used to see where the object is being used.
l Click Delete Anyway to delete the object.
You can configure whether forced deletion of used objects is allowed using the following CLI command:
config system admin setting
set objects-force-deletion {enable | disable}
This setting is enabled by default, allowing administrators to force the deletion of used objects. Disabling this setting
prevents the deletion of used objects.
Clone an object
If a new object that you are creating is similar to a previously created object, the new object can be created by cloning the
previous object.
To clone an object:
Existing or newly created ADOM-level objects can be promoted to the Global Database.
To promote an object:
4. If you want to rename the object, specify a new name in the New Name field. Leave the New Name field blank to
keep the original name for the object.
5. Click Promote.
Installing objects
Objects can be manually installed to all devices that are currently using that object. Partial install must be enabled in the
CLI for this option to be available.
l If you attempt to install an object that is not used in a policy, the device list displays No
record found.
l If you attempt to install an object with invalid configuration, Install Preview displays the
configuration errors.
l In Install Preview, metadata variables used in objects display the real value.
l Administrators with a restricted profile can use Install Preview for partial installs.
After an object is installed to a device, policy packages will be flagged as modified until the
next time the packages are installed.
You can export Intrusion Prevention signatures (IPS) and Application Control signatures to a file CSV format.
Viewing objects
Once an object has been created, you can use the FortiManager GUI to find objects in the following ways:
Search objects
The search objects tool allows you to search objects based on keywords.
Select View > Icon View to view the objects as icons. Select View > Table View to view the
objects in a table format.
Object search can be done using a persistent search menu which is available when viewing policies, and the search
extends to all object types.
3. From the search results, you can see which objects are configurable to which policy fields.
4. You can assign objects from the search panel to a policy by dragging and dropping the object into the corresponding
column. FortiManager only supports the drag-and-drop object feature when the object is placed in the column of the
came category.
The Used column on the Object Configurations pane will also show you if an object is used or
not.
Duplicate objects have the same definition, but different names. You can find duplicate objects and review them. You
then have the option to merge duplicate objects into one object.
You can preview and copy the JSON API requests or CLI script changes for an object.
Normalized interfaces
A normalized interface defines mapping rules. In mapping rules, interfaces are mapped per-device and/or per platform.
You can have both per-device and per-platform mappings in a normalized interface. When the normalized interface is
used in a policy, the per-device mappings have higher priority than per-platform mappings. The first match is used.
Default normalized interfaces are created when ADOMs are created. Default normalized interfaces contain a number of
per-platform mapping rules for all FortiGate models. For example, port1 is mapped to port1, and WAN is mapped to
WAN in default per-platform mapping rules. Default per-platform mapping rules allow you to install policies to FortiGates
without first creating custom mapping rules.
You can map normalized interface names to different physical interface names on different FortiGate models. For
example, you can map a normalized interface named LAN to port1 on one FortiGate and to port2 on another FortiGate.
You can delete default normalized interfaces and create new normalized interfaces. You can also delete per-platform
mappings in a default normalized interface.
Zones are created using Device Manager, and you can map zones to normalized interfaces. See also Device zones on
page 191.
You can also select normalized interfaces when you create virtual wire pairs.
This section contains the following topics:
l Viewing normalized interfaces on page 465
l Viewing normalized interfaces mapped to devices and platforms on page 466
l Viewing where normalized interfaces are used on page 467
l Configuring normalized interface per-platform mapping rules on page 468
l Configuring normalized interface per-platform mapping rules on page 468
l Deleting per-platform mapping rules on page 470
l Deleting default normalized interfaces on page 470
l Creating normalized interfaces on page 470
l Creating virtual wire pairs on page 472
l Modify existing interface-zone mapping on page 472
You can view all normalized interfaces and their mapping rules. You can also collapse or expand all mapping rules and
mapped interface/zones for normalized interfaces.
For each managed FortiGate device or platform, you can view the number of normalized interfaces mapped to it.
The Where <normalized interface name> is used window displays. The name of the policy package that uses the
selected normalized interface is identified.
3. Click Close.
4. Configure the options, and click OK. The mapping rule is saved.
The Mapped Interface Name fields supports metadata variables. See ADOM-level
metadata variables on page 479.
This field does not currently support the metadata variable selection window, but you can
enter the variable manually using the following format: $(variable_name).
After creating an interface on the FortiManager, an interface mapping must be created so that the new interface can be
used when creating policies. To do this, create a new dynamic interface with per-device mapping.
A number of normalized interfaces are created by default when an ADOM is created. You can edit default normalized
interfaces to delete per-platform mapping rules.
You can delete the default normalized interfaces that are automatically created when ADOMs are created.
If you want to use a physical interface name in a per-platform mapping rule in a normalized interface, you must first
delete the default per-platform mapping rule from the default per-platform interface. Otherwise the dynamic-interface
default mapping has been used error is displayed, and you cannot create the normalized interface.
b. In the Model list, select the model for which you created the zone.
c. In the Device Interface Name box, type the name of the interface.
d. Click OK.
5. Add a per-device mapping.
a. Click Create New under Per-Device Mapping.
The Create new Per-Device Mapping dialog box is displayed.
b. In the Mapped Device list, select the model for which you created the zone.
c. In the Device Interface list, select the zone.
d. Click OK.
6. Click OK.
When using wildcards, a "." (period) represents a single alpha-numeric character, similar
to regex = [a-zA-Z0-9].
An "*" (asterisk) represents zero or more characters regex =.*
You select normalized interfaces when you create virtual wire pairs.
Interfaces mapped to a zone locally on FortiGate devices are not visible in Device Manager on FortiManager. It is
recommended to create objects in FortiManager instead of creating it on FortiGate devices locally. If an interface is
already mapped to a zone in FortiGate, it must be unmapped first. A zone must be created in FortiManager, added to a
policy and installed to FortiGate. For convenience and ease of use, it is better to manage Object Configuration and
Interface Mapping from FortiManager.
After a Virtual IP is created, it must be mapped to interfaces. If per-device mapping is used, the
mapping will be visible immediately in Device Manager > [ Device_Name] > Interface.
Dynamic mapping
Some objects support per-device and/or per-platform dynamic mapping allowing you to set object configurations for
specific devices or platforms.
In the GUI, when the Per-Device Mapping or Per-Platform Mapping options are available, you can expand the option and
click Create New to configure the dynamic mapping.
When using dynamic mapping, the devices or platforms specified will receive the configurations specified in the dynamic
mapping rule. Devices or platforms which do not match the dynamic mapping will receive the default configuration set for
the object.
For more information about configuring normalized interfaces with dynamic mapping, see Normalized interfaces on page
465.
To configure a dynamic mapping using the CLI, the configuration for the mapping must be defined for the object using
the dynamic_mapping (per-device mapping) and/or platform_mapping(per-platform mapping) command when available.
CLI scripts must be run on a policy package instead of the device database. For information on running CLI scripts, see
Scripts on page 219
Default mapping is only used when there is no per-device mapping for a particular device. You
must have either a per-device mapping or a default mapping in a policy package. Otherwise,
the policy package installation will fail.
When you import a policy package, a per-device mapping is usually added when the object is
already used by a FortiGate.
The following are a few example objects configured with dynamic mapping in the CLI:
config platform_mapping
edit "FortiGate-40F"
set intf-zone "ddd"
next
end
next
end
Dynamic device objects can be mapped to FortiGate devices using per-device mapping.
When an object is added to a policy package and assigned to an ADOM, the object is available
in all devices that are part of the ADOM. If the object is renamed on a device locally,
FortiManager automatically syncs the object to the ADOM.
Create a dynamic local certificate to sync with devices using per-device mapping.
3. Click Create New. The Create New Dynamic Local Certificate pane opens.
4. Select or specify the values for the following and click OK:
Per-Device Mapping Toggle Per-Device Mapping to ON. Click Create New. Select the Mapped
Device and VPN Local Certificate. Click OK.
You can find example deployment scenarios using dynamic local certificates in the FortiManager Examples Guide
including the following scenarios:
l Configuring FortiManager to deploy certificates for admin GUI access
l Configuring FortiManager to deploy certificates for deep inspection
l Configuring FortiManager and FortiAuthenticator for SCEP certificate deployment
3. Click Create New. The Create New Dynamic VPN Tunnel pane opens.
4. Select or specify the values for the following and click OK:
Per-Device Mapping Toggle Per-Device Mapping to ON. Click Create New. Select the Mapped
Device and VPN Tunnel. Click OK.
CLI configurations
FortiManager includes the ability to configure objects that are available only via the FortiOS command line interface, as
well as settings that are not available in the FortiManager GUI using the CLI Configurations menu.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
When this feature is enabled, you can find the CLI Configurations menu by going to Policy & Objects > Advanced and
clicking on the CLI Configurations tab.
In the CLI Configurations pane, you can use the search bar to quickly search for objects, and then configure or edit
object details using the FortiManager GUI.
For example:
ADOM-level metadata variables can be used as variables for certain fields in the following places:
l Scripts
l Templates
l Firewall address objects
l IP pools
l VIPs
l FortiAP SSIDs
l FortiSwitch VLAN configurations
l FortiClient EMS and FortiClient EMS Cloud connectors
l Normalized interfaces
l Firewall address groups
Fields that support metadata variables are identified with a metadata variable icon .
Typing $ into an object's field where metadata variables are supported will display the available metadata variables for
selection.
You can configure ADOM-level metadata variables in Policy & Objects > Advanced > Metadata Variables. Metadata
variables created this way are only available in the ADOMs in which they were created.
Metadata variables can also be created in the Global Database ADOM. When creating ADOM-level metadata variables
in the Global Database, you can configure per-ADOM mapping to assign specific values to all devices within an ADOM.
Using the More option in the toolbar, you can clone, group, import, and export metadata variables, as well as see where
they are being used.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
Default Value Set the default value for the variable. The default value is used whenever a
per-device mapping is unavailable.
Per-ADOM Mapping This setting is only available in the Global Database ADOM.
Toggle ON to enable per-ADOM mapping. When enabled, click Create New to
map an ADOM to a Value. This value will be applied to all devices in the
selected ADOM.
Per-Device Mapping This setting is not available in the Global Database ADOM.
Toggle ON to enable per-device mapping. When enabled, you can configure
specific value for each device by clicking Create New beneath Per-Device
Mapping and specifying the Mapped Device and Value.
When $ is typed into a supported text field, available metadata variables are displayed for
selection. You can click the add button to create a new metadata variable.
For example, when creating a firewall address, you can use a metadata variable in the IP/Netmask field.
FortiToken configuration
Alternatively, you may import FortiTokens from a FortiGate using the following methods:
l Import FortiTokens like any other objects. See Importing policies and objects on page
157. Use Import all objects to import FortiTokens that are not yet assigned to a user.
l Import FortiTokens from a FortiGate using a text file as follows:
a. Create a text file containing the FortiToken serial numbers, one per line.
Note: these FortiTokens must already be registered on an attached FortiGate.
b. In FortiManager, go to Policy & Objects > User & Authentication > FortiTokens >
Import and upload the text file.
l Upload a FortiToken seed file (.ftk) through Policy & Objects > User & Authentication
> FortiTokens > Import.
Hardware FortiTokens may be added directly to FortiManager and then distributed to
FortiGates.
For more information about adding hardware tokens, see Setting up FortiToken Hardware
in the FortiToken Comprehensive Guide.
When your setup requires that FortiToken is added to multiple managed FortiGate devices,
FortiAuthenticator can be used in your configuration to manage two-factor authentication
across devices. See FortiAuthenticator in the Fortinet Document Library.
FSSO user groups can be retrieved directly from FSSO, from an LDAP server, via a remote FortiGate device, or by
polling the active directory server. Groups can also be entered manually.
When user groups are retrieved from an LDAP server, the information is cached on FortiManager for 24 hours by default.
After the time expires, the information is deleted from the cache. You can change the default setting by using the
config system global command with the ldap-cache-timeout variable. For more information, see the
FortiManager CLI Reference.
The FortiGate device configuration must be synchronized or retrieving the FSSO user groups
will fail. See Checking device configuration status on page 186.
10. After the groups have been imported, click Finish. The imported groups will be listed in the User Groups field.
11. Click OK. The groups can now be used in user groups, which can then be used in policies.
You must rerun the wizard to update the group list. It is not automatically updated.
VIP mapping
Normally, Virtual IP (VIP) objects map to a single interface, or ANY, just as with FortiOS. In the special case where the
interface that the VIP is bound to belongs to a zone, FortiManager handles importing and installing the object in a unique
way.
When importing a policy package, the VIP is bound to the zone instead of the interface. If per-device mapping is enabled
for the VIP, FortiManager automatically adds dynamic mapping for that device that maps the VIP to the specific
interface. To use the VIP on another FortiGate, you can add an interface mapping entry for the other FortiGate. The zone
acts as filter, limiting the interfaces that can be selected. That is, you can only select an external interface that is a
member of the selected zone.
FortiManager binds the VIP to a zone because it needs to know which policies the VIP could be applied to. FortiGate
devices use different logic because they already know the zone membership.
In FortiOS, VIPs can only by bound to an interface, and not a zone. Consequently, if there is no matching per-device
mapping, FortiManager will convert the binding to ANY when installing configuration changes to FortiGate. Depending
on the circumstance, this can be avoided by:
l Leaving per-device mapping enabled on the VIP at the ADOM, and letting FortiManager add the required per-
device mappings.
l If you are configuring FortiManager to start using the VIP on other FortiGates, adding the per-device mappings
manually.
Shaping profiles
Create a new shaping profile to manage traffic. After the profile is created, you can assign it to an interface.
4. Select or specify the values for the following and click OK:
Additional Shaping Groups Click Create New. Specify the Shaping Group, Guaranteed Bandwidth(%),
Maximum Bandwidth(%) and Priority. Click OK.
5. Assign the shaping profile to an interface. See Assigning a shaping profile on page 487.
After shaping profiles are defined, they can be assigned to each ADOM interface you want to
do traffic shaping for egress. The shaping profile can be set as default as well as in dynamic
mapping. Any changes to the shaping profile is applied to the FortiGate devices dynamically.
To display this option, go to Device Manager > Device & Groups. From the dashboard toolbar,
select Display Options, and then select the Interface checkbox.
You can view the Traffic Shaping widget in the Device Manager.
To view traffic shaping information, you must enable traffic shaping history. Traffic shaping
history can be enabled in the CLI using the following commands:
config system admin setting
set traffic-shaping-history enable
end
Intrusion Prevention (IPS), detects and blocks network-based attacks. You can configure IPS sensors based on IPS
signatures, IPS filters, outgoing connections to botnet sites, and rate-based signatures. FortiManager includes nine
preloaded IPS sensors:
l all_default
l all_default_pass
l default
l high_security
l protect_client
l protect_email_server
l protect_http_server
l sniffer-profile
l wifi-default
You can customize these sensors, or you can create your own and apply it to a firewall policy.
Add Filter
Default Action, Default Status, and Vulnerability Type are only available in 7.2 ADOMs
and later.
Hold-time
The hold-time option allows you to set the amount of time that signatures are held after a FortiGuard IPS signature
update per VDOM. During the holding period, the signature's mode is monitor. The new signatures are enabled after the
CVE pattern
The CVE pattern option allows you to filter IPS signatures based on CVE IDs or with a CVE wildcard, ensuring that any
signatures tagged with that CVE are automatically included.
Use the IPS Signatures monitor page to see where a signature is used, create a new IPS profile, or add the signature to
an existing profile.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
To view the IPS Signatures page as a Restricted Administrator, see Intrusion prevention
signatures on page 968.
Right-click a signature in the page to view where the signature is used, or add it to a new or existing IPS profile.
1. Right-click a signature, and select Where Used. The Where <signature_name> is used window displays.
2. (Optional) Select a signature in the list, and click Edit to modify the signature.
3. (Optional) Select a signature in the list, and click View to display the signature details.
1. Right-click a signature, and select Add to IPS Profile. The Add to IPS Profile dialog is displayed.
2. Click Create New IPS Profile.
3. In the Profile Name field, type a name for the profile.
4. From the Action dropdown, select the profile action.
5. (Optional) In the Comments field, describe the IPS profile.
6. (Optional) Click Signatures to add more signatures to the profile.
7. Click OK.
1. Right-click a signature, and select Add to IPS Profile. The Add to IPS Profile dialog is displayed.
2. Click Profile(s) to select the profiles, and then click OK.
3. In the Profile Name field, type a name for the profile.
4. From the Action dropdown, select the profile action.
5. (Optional) Click Signatures to add more signatures to the profile.
6. Click OK.
To view IPS Signature Information page, click the IPS signature name. The following information is displayed:
Section Description
Summary Describes the threats and vulnerabilities detected by the IPS signature.
Affected Products Displays the products that are vulnerable to the attack.
Analysis Provides specific details about how the vulnerability can be exploited.
To view information about the signature ID in FortiGuard, click the ID link in the ID column.
FortiManager includes default addresses for RFC1918 addresses spaces which are commonly used when setting up
firewall objects and policies in FortiManager. RFC1918 default addresses are included in an address group for ease of
use in your policies.
To view default RFC1918 addresses and address groups, go to Policy & Objects > Firewall Objects > Addresses.
The following default RFC1918 address objects are available under Address:
l RFC1918-10 with IP/Netmask: 10.0.0.0/255.0.0.0
l RFC1918-172 with IP/Netmask: 172.16.0.0/255.240.0.0
l RFC1918-192 with IP/Netmask: 192.168.0.0/255.255.0.0
The following default RFC1918 address group containing the three address objects is available under Address Group:
l RFC1918-GRP
Zero Trust Network Access (ZTNA) objects (security posture tags, tag groups, and geographic IP objects) and
ZTNA servers can be configured in FortiManager.
For more information on configuring ZTNA, see the FortiGate Administration Guide.
Security Posture Tag displays the security posture tags synchronized to FortiGate from FortiClient EMS or FortiClient
EMS Cloud. You can dynamically synchronize security posture tags using a FortiClient EMS connector.
Security posture tags can be edited, cloned and deleted from this dashboard.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
Once a security posture tag has been configured, you can select the object in a proxy policy with the ZTNA proxy
type. See Create a new proxy policy on page 390.
1. Go to Policy & Objects > Firewall Objects > Addresses, click Create New, and select Address.
The Create New Address window opens.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
Once a security posture tag group has been configured, you can select the object in a proxy policy with the
ZTNA proxy type. See Create a new proxy policy on page 390.
1. Go to Policy & Objects > Firewall Objects > Security Posture Tag, and click Create New.
The Create New Security Posture Tag Group window opens.
l Geographic IP
> Addresses as a Firewall Address with the Type set as Geography. See Creating ZTNA geographic IP objects
on page 494.
5. Click OK to save the group.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
To configure a ZTNA server, define the access proxy VIP and the real servers that clients will connect to. The access
proxy VIP is the FortiGate ZTNA gateway that clients make HTTPS connections to. The service/server mappings define
the virtual host matching rules and the real server mappings of the HTTPS requests.
Once a ZTNA server has been configured, you can select the object in a proxy policy with the ZTNA proxy type. See
Create a new proxy policy on page 390.
1. Go to Policy & Objects > Firewall Objects > ZTNA Server, and click Create New.
2. Enter a name for the server.
3. Select an External Interface, enter the External IP address, and select the External Port that the clients will connect
to.
4. Select the Default Certificate. Clients will be presented with this certificate when they connect to the access proxy
VIP.
5. Add a server mapping, and a server.
6. Click OK to save your changes.
Content analysis objects are only available in FortiProxy ADOMs. See FortiProxy ADOMs on
page 902.
Content analysis objects can be enabled in FortiProxy ADOMs using the Feature Visibility menu in the the Tools
dropdown. Content analysis objects include the following types:
l ICAP profile on page 496
l ICAP remote server on page 497
l ICAP load balancing on page 497
For more information, see the FortiProxy Administration Guide on the Fortinet Document Library.
ICAP profile
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
Content analysis objects are only available in FortiProxy ADOMs. See FortiProxy ADOMs on
page 902.
1. Go to Policy & Objects > Content Analysis > ICAP Profile, and click Create New.
The Create New ICAP Profile window appears.
Enable Streaming Media Enable to allow streaming media to ignore offloading to the ICAP server.
Bypass
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
Content analysis objects are only available in FortiProxy ADOMs. See FortiProxy ADOMs on
page 902.
1. Go to Policy & Objects > Content Analysis > ICAP Remote Server, and click Create New.
The Create New ICAP Remote Server window appears.
2. Enter the following information:
Plain ICAP Connection and Select whether the ICAP connection is plain or secure. Only one setting can be
Secure ICAP Connection enabled at a time.
You must enable the visibility of this feature in Policy & Objects before it can be configured. To
toggle feature visibility, go to Policy & Objects > Tools > Feature Visibility, and add or remove a
checkmark for the corresponding feature.
Content analysis objects are only available in FortiProxy ADOMs. See FortiProxy ADOMs on
page 902.
1. Go to Policy & Objects > Content Analysis > ICAP Load Balancing, and click Create New.
The Create New ICAP Load Balancing window appears.
2. Enter the following information:
Method Select the load balancing method from Weighted, Least Session, or Active
Passive.
Remote Server Click to add a remote server. You can select a remote server from the
dropdown menu and then apply weighting to the selected servers.
ADOM revisions
ADOM revision history allows you to maintain a revision of the policy packages, objects, and VPN console settings in an
ADOM. Revisions can be automatically deleted based on given variables, and individual revisions can be locked to
prevent them being automatically deleted.
To configure ADOM revisions, go to Policy & Objects, and click ADOM Revisions.
This page displays the following:
Name The name of the ADOM revision. This field is user-defined when creating the
ADOM revision.
A lock icon will be displayed beside the ADOM revision name when you have
selected Lock this revision from auto deletion.
Comment Optional comments typed in the Description field when the ADOM revision was
created.
Edit Right-click on a revision in the table and select Edit in the menu to edit the ADOM
revision.
Delete Right-click on a revision in the table and select Delete in the menu to delete the
ADOM revision.
When Lock this revision from auto deletion is selected, you are not able to delete
the ADOM revision.
View Revision Diff Right-click on a revision in the table and select View Revision Diff in the menu.
The Summary page will be displayed. This page shows the revision differences
between the selected revision and the current database.
Restore Right-click on a revision in the table and select Restore in the menu to restore the
ADOM revision. Restoring a revision will revert policy packages, objects and VPN
console to the selected version. Select OK to continue.
More > Lock Revision Right-click on a revision in the table and select Lock from the More menu to lock
this revision from auto deletion.
More > Unlock Revision Right-click on a revision in the table and select Unlock from the More menu to
unlock this revision. When the ADOM revision is in an unlocked state, auto
deletion will occur in accordance with your auto deletion settings.
Settings Select to configure the automatic deletion settings for ADOM revisions.
Close Select to close the ADOM Revision dialog box and return to the Policy & Objects
tab.
1. Go to Policy & Objects, and click ADOM Revisions. The ADOM Revision dialog box opens.
2. Click Create New. The Create New Revision dialog box opens.
3. Type a name for the revisions in the Name field.
4. Optionally, type a description of the revision in the Description field.
5. To prevent the revision from being automatically deleted, select Lock this revision from auto deletion.
6. Click OK to create the new ADOM revision.
3. Select one of the two available options for automatic deletion of revisions:
4. Keep last x revisions: Only keep the entered numbered of revisions, deleting the oldest revision when a new
revision is created.
5. Delete revisions older than x days: Delete all revisions that are older than the entered number of days.
6. Click OK to apply the changes.
l Edit the revision, and select or clear the Lock this revision from auto deletion checkbox in the Edit ADOM
This page displays all Global Policy, Policy Package, and ADOM Level Object changes between the revision
selected and the current database.
3. Select [Details] to view all details on the changes made to policies and objects.
4. Select CLI Diff to view the CLI changes between revisions.
5. You can select to download this information as a CSV file to your management computer.
6. Click Close to return to the ADOM Revisions window.
SD-WAN Manager
SD-WAN Network
The SD-WAN Manager > Network section includes panes to view SD-WAN devices and access to SD-WAN monitors.
SD-WAN Devices
You can view and manage SD-WAN devices in SD-WAN Manager > Devices.
FortiGate devices must be added to SD-WAN Manager before they can be used in SD-WAN overlay templates. Once
SD-WAN management is enabled for a device, the device can no longer be managed through the Device Manager, and
all device management is instead performed in SD-WAN Manager > Network > Devices.
The SD-WAN Manager Devices dashboard functions similarly to the FortiManager Device Manager. For more
information on using features included in the SD-WAN Manager Devices dashboard, see Device Manager on page 81.
1. Go to SD-WAN Manager > Network >Devices or Device Manager > Devices & Groups.
2. Click Add Device > Add Model Device.
3. Enable the Managed by SD-WAN Manager toggle.
4. Configure the remaining settings as required. See Adding offline model devices on page 96.
5. Click Next. The device is created in the FortiManager database.
6. Click Finish to exit the wizard.
1. Go to SD-WAN Manager > Network > Devices or Device Manager > Device & Groups.
2. Select the FortiGate device(s) to be removed from SD-WAN management in the table.
3. From the toolbar, click More > Disable SD-WAN Management.
l A message is displayed to confirm that the device has been removed from SD-WAN management.
l The selected devices are removed from the SD-WAN Manager > Network > Devices dashboard and can now
be managed in the Device Manager.
SD-WAN Monitor
You can use the SD-WAN Manager > Network > Monitors pane to monitor SD-WAN networks on FortiGate devices.
You can use the devices dropdown menu to select All Devices or an SD-WAN device group to filter the results displayed
in the monitor.
The following information is included in the SD-WAN Monitor:
SD-WAN Monitor Template The Template View monitor grants visibility for devices that have been
View provisioned using the selected SD-WAN template. See SD-WAN monitor
template view on page 503.
Devices by Link Status Displays devices by All Interfaces Up, Some Interfaces Down, and All Interfaces
Down.
Devices by SLA Status Displays devices by All SLA Met, Some SLA Breached, and All SLA Breached.
Rules Status Displays the rules status as In Effect, Attention Needed, and Out of Service.
Application Status Displays the application status as In Effect, Attention Needed, and Out of Service.
Application Status - Word Displays a word cloud of applications and their status (In Effect, Attention
Cloud Needed, and Out of Service).
Top Devices by Bandwidth Displays the top devices by bandwidth usage (upload and download).
SDWAN Monitor Table View View SD-WAN device information in a table. See SD-WAN monitor table view on
page 504.
SDWAN Monitor Map View View SD-WAN devices on a map. See SD-WAN monitor map view on page 505.
The following features are also available through the SD-WAN Monitor.
When viewing the SD-WAN monitor, you can configure the dashboard by clicking Edit in the
toolbar and dragging and resizing widgets. Click Toggle Widget to hide or display widgets on
the Monitor pane.
The SDWAN Monitor Template View section grants visibility for devices that have been provisioned using the selected
SD-WAN template.
You can use the dropdown in the toolbar to select different SD-WAN templates so that the related devices are displayed
on the map.
1. Go to the SD-WAN Manager > Network > Monitorpane. The SDWAN Monitor Template View section is displayed on
the monitor pane.
l SD-WAN devices provisioned using the currently selected SD-WAN template are displayed on the map.
l Only devices provisioned using the selected SD-WAN template are displayed. You can change the selected
SD-WAN template by clicking the dropdown in the toolbar and selecting a new template.
l Devices on the map are identified with icons as either a HUB (star icon) or spoke device (device icon).
2. Hovering your mouse over a device on the map displays the following information:
l Device name and whether it is a HUB or spoke.
l Down underlays.
3. The map shows lines connecting the HUB and spoke devices.
The line color depends on if the tunnel is up (green) or down (red). Device color is based off of the following logic:
a. If the SD-WAN health checks are defined on the device (usually a spoke):
l Green: All health checks pass.
b. When no SD-WAN health checks are defined on the device (usually a HUB):
l Green: All underlays are up.
You can monitor SD-WAN devices and interfaces in the Table View section.
Link Mode Displays the link status, speed, and duplex. Speed and duplex information is
only available for physical interfaces.
Errors (TX/RX) Displays the number of errors that have occurred during transmission (TX) and
receiving (RX).
Applications Add or remove the Applications from the Services Settings dropdown. The
data is shown for the selected applications. The applications are specified in
SD-WAN Rules > Destination type > Internet Service in FortiGate.
Automatic Refresh FortiManager extracts the data from FortiGate devices based on the refresh
settings. Select the automatic refresh interval from Every 5 Minutes to Every
30 Minutes.
When a single device is specified, additional realtime refresh options from
Every 30 Seconds to Every 3 Minutes are available.
You can select Manual Refresh to refresh the data manually.
Hover over a service for a device that is shown in red. A pop-up shows the parameters that
have failed the SLA criteria.
3. (Optional) Click the Filters dropdown to view options to Show Unhealthy Devices Only and/or Show Unhealthy
Interfaces Only.
2. (Optional) Click the Filters dropdown to view options to Show Unhealthy Devices Only and/or Show Unhealthy
Interfaces Only.
3. Click a device to display its details on the right pane.
Select Show Unhealthy Devices only to show only the devices that do not meet the
Performance SLA criteria.
In order to see the port bandwidth usage, you must configure the estimated bandwidth on the
interface used by SD-WAN.
2. You can view realtime information for a specific device by selecting Every 30 Seconds, Every 1 Minute, or Every 3
Minutes from the Automatic Refresh dropdown menu. Only data from the past ten minutes is displayed when
realtime refresh options are selected.
3. Hover over the charts to view additional details.
4. The SD-WAN Rules widget includes the following features:
l Rule statuses are indicated by color. Red interfaces indicate that the interface is down and the rule is inactive.
l Active (referred to as selected) interfaces are identified with check mark icon in the SD-WAN Rules table. You
can see why an interface is selected by hovering your mouse over the interface.
l View interface statistics, including SLAs tied to that interface, upstream and downstream bandwidth, IP
addresses, link speed, and more.
FortiManager provides an option to collect and store SD-WAN Monitor data. Go to SD-WAN > Monitor > Table View to
view the following drill-down data:
l Click each FortiGate device to view graphs of its details.
l Click each application to view graphs of its details.
By default, SD-WAN Monitoring History is disabled. When this feature is disabled, data for only the last 10 minutes is
displayed. You can refresh to view the data directly from FortiGate devices. No historical data is stored in FortiManager
when this feature is disabled.
You can enable the SD-WAN Monitoring history using the following command line:
config system admin setting
set sdwan-monitor-history enable
When this feature is enabled, you can view the SD-WAN Monitoring history in the following ways:
l SD-WAN Monitoring data can be viewed for the past 5 minutes, 30 minutes, 1 hour, 4 hours, 12 hours, 1 day, 1
week, N hours, N days, N weeks, or custom.
l By default, SD-WAN Monitoring history is stored in FortiManager for 180 days. You can configure this setting in the
CLI. See Configuring monitoring history storage on page 509.
You can configure SD-WAN monitoring history using the following commands in the CLI.
l rtm-max-monitor-by-days: Maximum RTM monitor (sd-wan, traffic shaping, etc) history by days (1-180).
l rtm-temp-file-limit: Set the RTM monitor temp file limit by hours. A lower value will reduce disk usage, but
may cause data loss (1 -120).
These commands are only available when SD-WAN monitoring history is enabled.
For example:
config system admin setting
set sdwan-monitor-history enable
set rtm-max-monitor-by-days <1-180>
set rtm-temp-file-limit <1-120>
SD-WAN monitoring history should be enabled when you need to view historical SD-WAN data from FortiGate devices
beyond the default 10 minutes that is kept when the feature is disabled.
Because SD-WAN monitoring history can consume a large amount of disk storage when FortiManager receives data
from many FortiGate devices, it should only be enabled when there is adequate disk resources available to support the
feature. In FortiManager 7.2.2 and later, you can configure the monitoring history storage settings in the FortiManager
CLI to reduce disk usage. See Configuring monitoring history storage on page 509. In earlier versions of FortiManager it
is recommended that you monitor your disk usage while the SD-WAN history feature is enabled.
Furthermore, it's important to take into account the tunnel limitation of the central management unit. In order to ensure
smooth performance of the system and stable connections for all the devices being managed, we highly recommend
disabling data-intensive monitoring features like SD-WAN historical monitoring. By applying an add-on license to the
central management unit, you can expand its support for devices beyond the default management tunnel limit. It's worth
noting, though, that even with this enhancement, simultaneous management of all live tunnels may not be completely
seamless. While the SD-WAN historical monitoring feature is designed to effectively handle live tunnels, it can put a
strain on system resources.
If FortiManager is unable to process the data as it arrives due to the number of FortiGate devices, data that is held and
unprocessed for more than two days will be dropped, and you may see gaps in the SD-WAN history.
In 6.4.8, 7.0.1 and earlier releases, FortiManager's SD-WAN API calls to FortiGate can
consume a lot of memory when there are many FortiGate devices, causing FortiManager to
enter conserve mode. If you encounter this issue in these versions it is recommended to
disable SD-WAN History or to upgrade to a later version of FortiManager.
FortiManager devices with the FortiGuard SD-WAN Underlay Bandwidth and Quality Monitoring Service subscription
have the ability to execute a speed test on-demand from the SD-WAN Monitor page. The speed test can be executed on
interfaces that have the WAN role.
1. Speed tests can be performed from the SD-WAN Manager > Network > Monitor page through one of the following
methods:
a. Select a device from the SDWAN Monitor Table View and click Execute Speed Test.
b. Hover your mouse over the interface of a device in the SDWAN Monitor Map View and click Execute Speed
Test.
2. For devices with a valid license and an interface configured with the WAN role, the Execute Speed Test option is
displayed for the interface.
l If there is a valid route to the cloud server, you will get measured bandwidth when executing the speed test.
lIf there is not a valid route to the cloud server, you will see an error message when executing the speed test.
l You can perform the speed test up to 10 times per day. Attempts to perform additional speed tests will present
an error message.
l For devices without a valid license, or for devices with a valid license but without an interface configured to the
SD-WAN Templates
You can view FortiManager templates used for SD-WAN configuration under SD-WAN Manager > Templates.
This section includes the following templates.
Template Groups Create and assign template groups for use in SD-WAN configurations. You can
assign the template group to one or more devices or VDOMs or to a device group.
For more information, see Template groups on page 253.
IPsec Tunnel IPsec templates are used to standardize IPsec tunnel configurations for
consistency and scalability. Templates may be applied to one or more individual
devices, or device groups. ADOM-level metadata variables are used to facilitate
the templates being assigned to multiple FortiGates, and the tunnel interfaces
may be mapped to normalized interfaces to be used in SD-WAN configurations.
For more information, see IPsec tunnel templates on page 264.
BGP FortiManager includes Border Gateway Protocol (BGP) templates allowing you to
provision BGP settings across multiple FortiGate devices.
For more information, see BGP templates on page 284.
Static Route You can provision static routes to FortiGate devices by using a static route
template.
For more information, see Static route templates on page 282
CLI You can create CLI templates and assign them to devices. You can also create
CLI template groups of multiple CLI scripts, and assign the CLI template group to
devices, instead of assigning individual scripts to devices.
For more information, see CLI templates on page 291.
Most SD-WAN deployments require complex overlay configurations for datacenter or cloud connectivity. The SD-WAN
overlay template includes a wizard to automate and simplify the process using Fortinet's recommended IPsec and
BGP templates.
Note that the overlay template does not provide any SD-WAN intelligence. Please configure
an SD-WAN template to complete the SD-WAN configuration. The overlay template also
assumes connectivity between the HUB and branch in order to build the overlay tunnels. This
can be accomplished in a variety of ways, such as static routes, dynamic routing protocol
(BGP) or through a DHCP provided static route.
When the SD-WAN overlay template has been configured, it generates the necessary IPsec, BGP and CLI provisioning
templates that are required for the creation of your SD-WAN overlays. These provisioning templates are automatically
assigned to the SD-WAN branch and hub devices identified in the template's wizard. Provisioning templates created by
the SD-WAN overlay template are also automatically organized into template groups for each hub and branch
configuration. See Template groups on page 253.
To deploy the SD-WAN overlays in your environment, you can install the branch and hub provisioning templates to your
devices using the FortiManager Device Manager. See Using the SD-WAN overlay template on page 513.
By default, the branch_id metadata variable is created by the template and each SD-WAN branch device must be
configured with a unique branch ID value. When Automatic Branch ID Assignment setting is enabled in the wizard, the
branch ID is automatically applied to devices in the branch device group. See Automatic Branch ID Assignment on page
517.
Additional meta variables can be created for use in the template's text fields to further improve deployment scalability.
See ADOM-level metadata variables on page 479.
You can configure a new SD-WAN Overlay Template by going to SD-WAN Manager > Overlay Orchestration.
Column Settings Configure which columns are displayed in the SD-WAN overlay template table.
Before creating the SD-WAN overlay template, the following prerequisites and network planning steps should be
completed:
Prerequisites
l Import the FortiGate devices that will make up the hub and branch devices into FortiManager. See Add devices on
page 84.
l Configure the ISP links and other interfaces on your imported devices.
l Create one or more device groups for your branch devices. See Device groups on page 133
Network planning
l Allocate the overlay network address space. By default, the template uses 10.10.0.0/16.
l Allocate the loopback IP address space. By default, the template uses 172.16.0.0/16.
l Select an AS number for BGP for the new SD-WAN overlay region. By default, the template uses 65000.
For more information, see SD-WAN overlay template IP network design on page 531
Note that the overlay template does not provide any SD-WAN intelligence. Please configure
an SD-WAN template to complete the SD-WAN configuration. The overlay template also
assumes connectivity between the HUB and branch in order to build the overlay tunnels. This
can be accomplished in a variety of ways, such as static routes, dynamic routing protocol
(BGP) or through a DHCP provided static route.
1. Pre-configure your network and SD-WAN devices. See Template prerequisites and network planning on page 512.
2. Create an SD-WAN overlay template. See Configuring an SD-WAN overlay template on page 513.
3. Assign metadata variables to devices.
l The branch_id variable is automatically created by the template, and each branch device must be assigned a
unique value. When Automatic Branch ID Assignment setting is enabled in the wizard, the branch ID is
automatically applied to devices in the branch device group. See Automatic Branch ID Assignment on page
517.
l Additional custom metadata variables can be used if required. See ADOM-level metadata variables on page
479.
4. Configure the SD-WAN rules to include the newly created overlays by creating or editing an SD-WAN template. See
SD-WAN rules on page 542 and SD-WAN rules on page 536.
5. Create the Policy Package for your branch and hub devices. See Managing policy packages on page 336.
6. Install the changes to SD-WAN devices using the Install Wizard. See Install wizard on page 160
7. (Optional) Edit the SD-WAN overlay template. See Editing the SD-WAN overlay template on page 522.
8. (Optional) Add new branch devices. See Onboarding new branch devices on page 522.
The SD-WAN overlay template wizard guides you through deployment of SD-WAN overlays in your network. After the
configuration of the template is finished, multiple provisioning templates are generated for use in your SD-
WAN environment.
The SD-WAN overlay template wizard can be run again to re-generate the provisioning
templates later if required. See Editing the SD-WAN overlay template on page 522.
Select New Topology Select a topology type based on your environment. Topologies include the
following:
l Single HUB
l Multi HUB
The options presented in the wizard change based on the topology selected.
These fields are preconfigured with settings that will work in many situations, but
you may need to adjust these to match your own networking environment. They
should match the addresses you identified when considering the SD-
WAN overlay template prerequisites. SeeTemplate prerequisites and network
planning on page 512 .
BGP on Optionally, you can enable this setting to configure BGP on loopback where SD-
Loopback WAN devices peer with each other using a loopback address instead of a
BGP peer per overlay tunnel.
With BGP on loopback, there is only ever one BGP peer from the SD-
WAN device to the HUB, regardless of how many overlays exist. This setting
greatly reduces the number of routes advertised throughout the network.
Auto-Discovery Optionally, you can toggle this setting ON to enable Auto Discovery VPN
VPN (ADVPN).
Segmentation Optionally, you can toggle this setting ON to enable traffic segmentation over a
Over Single single overlay using BGP routing, virtual routing and forwarding (VRF), and
Overlay VPNv4. When this option is selected, all VPN tunnels are configured with vpn-
id-ipip encapsulation and the template generates a BGP configuration
specific for VPNv4, VFRs, and PE/CE.
5. For the Role Assignment, configure the following settings and click Next.
Topology Optionally, you can change the topology type that you selected on the previous
screen.
l Single HUB: One standalone hub.
l Dual HUB (Primary & Secondary): One primary and one secondary hub.
l Dual HUB (Primary & Primary): Two primary hubs.
l Multiple HUBs: Multi-hub deployment which supports 3 or 4 hubs.
HUB Number When the Multiple HUBs topology is selected, you must choose the number of
hubs to include in the configuration(3 or 4).
HUB Select the SD-WAN hub devices or VDOMs. The number of hubs required
depend on the topology selected.
Hub devices/VDOMs must be added to FortiManager before creating the SD-
WAN overlay template.
When the Multiple HUBs topology is selected, you must also specify the Cost for
each hub. The Cost applied to each hub is used for the SD-WAN interface cost.
The Cost field supports metadata variables.
Branch
Device Group Select the device group containing your SD-WAN branch devices.
Assignment Devices included in this device group are configured as SD-WAN branch
devices as a part of this template.
Additional devices can be added to the selected device group later to receive the
SD-WAN branch configuration when performing an installation on that device.
This simplifies the onboarding of new branch devices. See Onboarding new
branch devices on page 522.
You can configure additional device groups by clicking the add (+) icon. Adding
additional device groups can allow you to group devices based on WAN link
types and numbers.
Automatic Enable to automatically assign a branch ID to each device in the branch device
Branch group. This will also apply to devices added to the branch device group in the
ID Assignment future, as well as those added to the device group using a zero-touch
provisioning device blueprint.
Branch ID values are between one and the maximum number allowed by the
subnet. For example, the default 10.10.0.0/255.255.0.0 overlay network uses
the /19 subnet when your setup includes 5 - 8 overlays. The maximum allowed
branch IDs in this range is 8190 based on the maximum number of number of
usable IPs/FortiGates supported per overlay. See SD-WAN overlay template IP
network design on page 531.
When this setting is not enabled, you must manually configure the branch ID for
each branch device.
6. For the Network Configuration, configure the following settings and click Next.
HUB Configure the network settings for each hub in your configuration. The
number and types of hubs present depend on the topology you selected.
WAN Underlay Type the interfaces for each WAN underlay. You can add additional
WAN underlays by clicking the add icon.
For each WAN underlay, you can optionally enable the following settings:
Network 1. Configure network advertisement for the hub. Network advertisement can be
Advertisement set to one of the following:
l Connected: Type the network interface to advertise. Additional interfaces
Branch Route Maps Optionally, move the toggle to the ON position to enable branch maps, and
then select the corresponding route map. You can create a new route map by
clicking the add icon, or select one of the default route maps.
See also Using preconfigured route maps for self-healing with BGP on page
522.
Branch Configure the network settings for the branch devices in your configuration. If
multiple device groups have been added to the template then you must
specify the following for each device group.
WAN Underlay Type the interfaces for the SD-WAN branch WAN underlay. You can add
additional WAN underlays by clicking the add icon.
For each WAN underlay, you can optionally enable the following settings:
l Private Link: No overlays will be created on private links.
Network Configure network advertisement for the branch. Network advertisement can
Advertisement be set to one of the following:
l Connected: Type the network interface to advertise. Additional
interfaces can be added by clicking the add icon.
l Static: Type the network prefix to advertise. Additional network
prefixes can be added by clicking the add icon.
Advanced Expand to view advanced settings, including configuration of route maps for
hub overlays. You can apply the route map settings to all hub overlays or
specify them individually.
See also Using preconfigured route maps for self-healing with BGP on page
522.
7. For the Template Options, configure the following settings and click Next.
Add Overlay Objects to SD- Toggle this setting ON to automatically add the overlay objects configured by
WAN Template this template to a new or existing SD-WAN template.
Select an existing SD-WAN template or click the add icon to create a new SD-
WAN template. See SD-WAN rules on page 536.
Add Overlay Interfaces and You can toggle this setting ON to add overlay interfaces and zones.
Zones
Add Healthcheck Servers for You can toggle this setting ON to add health check servers for each hub as
Each HUB as Performance performance SLAs.
SLA
Normalize Interfaces Enable this setting to automatically normalize the SD-WAN zones created by
the template.
The template creates the following normalized interfaces:
l HUB-Lo with the following per-device mapping:
Add Health Check Firewall Enable this setting to automatically create health check firewall policies and
Policy to HUB/Branch Policy policy blocks for HUBs and branches. When enabled, you must select a new
Package or existing policy package. Based on the selection, firewall policies and policy
blocks are created to allow SLA health checks to each device loopback.
Add Default Route to SD- Static Route Templates are integrated with the SD-WAN Overlay Template to
WAN Zones in Static Route deliver routing configuration to each Branch location. You can choose a new or
Template previously configured Static Route Template.
8. The summary window displays a summary of the SD-WAN overlay configurations that will be created by this
template. When you click Finish, multiple provisioning templates are created based on the information you provided.
The templates are automatically assigned to the devices specified by the wizard.
9. Once complete, you can continue to deploy the SD-WAN provisioning templates in your environment. See Using
the SD-WAN overlay template on page 513.
Preconfigured route maps are available for selection in the SD-WAN overlay template to take advantage of SD-
WAN self-healing using BGP.
FortiManager includes the following preconfigured route maps:
l Hubs: RM-VPN-Priority.
l Branches: Priority_1, Priority_2, Priority_3, Priority_4, and Priority_999 (used as a catch all).
Hubs are automatically configured with five communities, with a corresponding route map matched to each community.
Each route map will advertise a given community based on the SD-WAN overlay template AS. Based on the advertised
community from the branch, the priority value will determine the preferred routing. For example, the priority_1 route is
preferred over priority_2.
When editing an existing SD-WAN overlay template, the provisioning templates that were generated by the SD-
WAN overlay template previously are updated. These updated provisioning templates can then be reinstalled to
applicable SD-WAN branch and hub devices.
You can also directly edit the provisioning templates generated by the SD-WAN overlay template (for example, BGP and
IPsec templates), but further edits to the SD-WAN overlay template may overwrite those changes. For example, you can
change the Local AS setting in the BGP hub template, but when the SD-WAN overlay template is run again, the field is
updated with the value specified by the SD-WAN overlay template. Fields not included by the SD-WAN overlay template,
such as descriptions, are not affected.
The SD-WAN overlay template uses one or more device groups to determine which devices receive the SD-
WAN provisioning templates.
When a new device is added to a device group specified in the SD-WAN overlay template, the SD-WAN provisioning
templates are automatically assigned to the device, and you can install the changes using the Install Wizard.
Branch onboarding can be further simplified with the use of device blueprints and metadata variables:
l Device blueprints can be used when adding model devices to FortiManager to simplify configuration of device
settings, including device groups, configuring pre-run templates, policy packages, provisioning templates, and
more. See Using device blueprints for model devices on page 115.
l Metadata variables can be used as variables in provisioning templates. The branch_id variable is automatically
created by the template and each branch device must be assigned a unique value. A branch ID value can be
automatically assigned to devices in the SD-WAN branch device group when the Automatic Branch ID Assignment
setting is enabled in the SD-WAN overlay template wizard. See ADOM-level metadata variables on page 479.
When onboarding multiple new branch devices, you can import devices from a CSV file using device blueprints.
Metadata fields including the branch_id variable can be specified directly in the CSV file. See Import model devices
from a CSV file on page 104.
1. Add the new FortiGate model device to FortiManager using the Device Manager.
Optionally, you can configure a device blueprint to simplify device onboarding. See Using device blueprints for
model devices on page 115.
2. Assign the FortiGate device to the template's branch device group.
The branch provisioning templates are automatically assigned to the device.
3. Specify the metadata variables used by the SD-WAN overlay template. By default, the branch_id metadata
variable must be specified. When Automatic Branch ID Assignment setting is enabled in the wizard, the branch ID is
automatically applied to devices in the branch device group. See Automatic Branch ID Assignment on page 517.
4. Assign policy package for the branch device, and then install the changes using the Install Wizard. See Install
wizard on page 160.
The SD-WAN overlay wizard automatically creates templates and objects required for deployment of SD-WAN in your
environment. Generated templates and objects are assigned to the hub(s) specified by the template, and branch devices
are identified by membership in the specified device group. See Configuring an SD-WAN overlay template on page 513.
The following template and objects are created by the SD-WAN overlay template wizard:
l IPsec templates
l BGP templates
l SD-WAN template configuration
l CLI templates
l Templates groups
l Metadata variables
The SD-WAN overlay template wizard also configures the SD-WAN overlay network. The default overlay network used
by the wizard is 10.10.0.0, but this can be configured for your environment. The number of subnets created from the
overlay network depends on the number of overlays and hubs that are configured.
Below details the various templates and associated components that are defined in dual-hub and single-hub deployment
scenarios. These templates are generated with two WAN underlays per HUB and branch device group.
l Single-hub deployments on page 524
l Dual-hub deployments on page 526
l Multi-hub deployments on page 528
Single-hub deployments
The following IPsec templates are created for configuration of IPsec in your SD-
WAN environment:
IPsec Templates l BRANCH_IPsec: The IPsec template for IPsec tunnels for branch devices. This
template includes the following IPsec tunnels to allow connection from branch devices to
the hubs through VPN1 and VPN2: HUB1-VPN1 and HUB1-VPN2.
l HUB1_IPsec: The IPsec template created for the hub. This template includes the IPsec
tunnels VPN1 and VPN2 to allow secure communication from the hub to branch devices.
The following BGP templates are created for configuration of BGP in your SD-WAN
environment:
l BRANCH_BGP:The BGP template generated for your SD-WAN branch devices. This
BGP Templates
template uses the branch_id metadata variable to configure the Router ID for each
branch device.
l HUB1_BGP: The BGP template created for the hub.
The following SD-WAN zones/members and health check servers are configured for the SD-
WAN template specified in the wizard.
l SD-WAN Zone/Interface Member:
ID Interface
SD-WAN Template
configurations WAN1 port1
WAN2 port2
HUB1-VPN1
HUB1
HUB1-VPN2
These settings are only applied when the Add Overlay Objects to SD-
WAN Template option is enabled in the wizard.
The following CLI templates are created to configure the device interfaces and BGP router ID.
l BRANCH_CLI: Configure the interface and BGP router id for branch devices. This
template uses metadata variables to configure unique values for each branch device.
CLI Templates
This template is added to the BRANCH_CLIGRP template group.
l HUB1_CLI: Configure the HUB1-Lo interface on the hub device. This template is added
A template group is created for hub and branch devices. These template groups include the
provisioning templates created by the SD-WAN overlay template wizard for that device.
l HUB1: Includes provisioning templates for the hub 1 device.
branch device must be assigned a unique value. The branch_id metadata variable is
Metadata Variables used in branch provisioning templates to configure certain settings, such as the BGP
router ID. When Automatic Branch ID Assignment setting is enabled in the wizard, the
branch ID is automatically applied to devices in the branch device group. See Automatic
Branch ID Assignment on page 517.
When normalized interfaces is enabled in the template, the following normalized interfaces
are created:
Normalized l HUB-Lo with the following per-device mapping: HUB1-Lo for HUB1.
l Normalized interfaces for VPN IPsec tunnel templates created by the wizard are added
Dual-hub deployments
The following IPsec templates are created for configuration of IPsec in your SD-
WAN environment:
l BRANCH_IPsec: The IPsec template for IPsec tunnels for branch devices. This
template includes the following IPsec tunnels to allow connection from branch
IPsec Templates devices to the hubs through VPN1 and VPN2: HUB1-VPN1, HUB1-VPN2, HUB2-
VPN1, and HUB2-VPN2.
l HUB1_IPsec: The IPsec template created for hub 1. This template includes the
IPsec tunnels VPN1 and VPN2 to allow secure communication from hub 1 to
branch devices.
l HUB2_IPsec: The IPsec template created for hub 2. This template includes the
IPsec tunnels VPN1 and VPN2 to allow secure communication from hub 2 to
branch devices.
The following BGP templates are created for configuration of BGP in your SD-WAN
environment:
l BRANCH_BGP:The BGP template generated for your SD-WAN branch devices.
BGP Templates This template uses the branch_id metadata variable to configure the Router ID for
each branch device.
l HUB1_BGP: The BGP template created for hub 1.
The following SD-WAN zones/members and health check servers are configured for the
SD-WAN template specified in the wizard.
l SD-WAN Zone/Interface Member:
ID Interface
WAN1 port1
WAN2 port2
HUB1-VPN1
SD-WAN Template HUB1
configurations HUB1-VPN2
HUB2-VPN1
HUB2
HUB2-VPN2
These settings are only applied when the Add Overlay Objects to
SD-WAN Template option is enabled in the wizard.
The following CLI templates are created to configure the device interfaces and
BGP router ID.
l BRANCH_CLI: Configure the interface and BGP router id for branch devices. This
template uses metadata variables to configure unique values for each branch
CLI Templates device. This template is added to the BRANCH_CLIGRP template group.
l HUB1_CLI: Configure the HUB1-Lo interface on the hub 1 device. This template is
A template group is created for hub and branch devices. These template groups include
the provisioning templates created by the SD-WAN overlay template wizard for that
device.
l HUB1: Includes provisioning templates for the hub 1 device.
automatically applied to all devices included in the branch device group specified in
the wizard.
For information about onboarding new branch devices using template groups, see
Onboarding new branch devices on page 522
Metadata Variables Each branch device must be assigned a unique value. The branch_id metadata
variable is used in branch provisioning templates to configure certain settings, such
as the BGP router ID. When Automatic Branch ID Assignment setting is enabled in
the wizard, the branch ID is automatically applied to devices in the branch device
group. See Automatic Branch ID Assignment on page 517.
Multi-hub deployments
Multi-hub deployments will generate objects based on if you have selected 3 or 4 HUBs. The example below is based on
a 4 HUB topology.
The following IPsec templates are created for configuration of IPsec in your SD-
WAN environment:
l BRANCH_IPsec: The IPsec template for IPsec tunnels for branch devices. This
template includes the following IPsec tunnels to allow connection from branch
devices to the hubs through VPN1 and VPN2:
l HUB1-VPN1 and HUB1-VPN2,
l HUB2-VPN1 and HUB2-VPN2.
l HUB3-VPN1 and HUB3-VPN2
l HUB4-VPN1 and HUB4-VPN2
IPsec Templates l HUB1_IPsec: The IPsec template created for hub 1. This template includes the
IPsec tunnels VPN1 and VPN2 to allow secure communication from hub 1 to
branch devices.
l HUB2_IPsec: The IPsec template created for hub 2. This template includes the
IPsec tunnels VPN1 and VPN2 to allow secure communication from hub 2 to
branch devices.
l HUB3_IPsec: The IPsec template created for hub 3. This template includes the
IPsec tunnels VPN1 and VPN2 to allow secure communication from hub 3 to
branch devices.
l HUB4_IPsec: The IPsec template created for hub 4. This template includes the
IPsec tunnels VPN1 and VPN2 to allow secure communication from hub 4 to
branch devices.
The following BGP templates are created for configuration of BGP in your SD-WAN
environment:
l BRANCH_BGP:The BGP template generated for your SD-WAN branch devices.
This template uses the branch_id metadata variable to configure the Router ID for
BGP Templates each branch device.
l HUB1_BGP: The BGP template created for hub 1.
l HUB2_BGP: The BGP template created for hub 2.
l HUB3_BGP: The BGP template created for hub 3.
l HUB4_BGP: The BGP template created for hub 4.
The following SD-WAN zones/members and health check servers are configured for the
SD-WAN template specified in the wizard.
l SD-WAN Zone/Interface Member:
ID Interface
SD-WAN Template
configurations WAN1 port1
WAN2 port2
HUB1-VPN1
HUB1
HUB1-VPN2
ID Interface
HUB2-VPN1
HUB2
HUB2-VPN2
HUB3-VPN1
HUB3
HUB3-VPN2
HUB4-VPN1
HUB4
HUB4-VPN2
These settings are only applied when the Add Overlay Objects to
SD-WAN Template option is enabled in the wizard.
The following CLI templates are created to configure the device interfaces and
BGP router ID.
l BRANCH_CLI: Configure the interface and BGP router id for branch devices. This
template uses metadata variables to configure unique values for each branch
device. This template is added to the BRANCH_CLIGRP template group.
l HUB1_CLI: Configure the HUB1-Lo interface on the hub 1 device. This template is
CLI Templates added to the HUB1_CLIGRP template group.
l HUB2_CLI: Configure the HUB2-Lo interface on the hub 2 device. This template is
added to the HUB2_CLIGRP template group.
l HUB3_CLI: Configure the HUB3-Lo interface on the hub 3 device. This template is
added to the HUB3_CLIGRP template group.
l HUB4_CLI: Configure the HUB4-Lo interface on the hub 4 device. This template is
added to the HUB4_CLIGRP template group.
A template group is created for hub and branch devices. These template groups include
the provisioning templates created by the SD-WAN overlay template wizard for that
device.
l HUB1: Includes provisioning templates for the hub 1 device.
Metadata Variables ADOM-level metadata variables are used as variables in scripts and templates.
The SD-WAN overlay template creates the overlay IP network and subnets for your SD-WAN environment. The wizard
uses the default range of 10.10.0.0/16, but this network range can be customized in the SD-WAN overlay template
wizard under Region Settings > Advanced.
The overlay network is used to define the VPN tunnel interfaces for hubs and spokes, and is subnetted so that each
overlay network is unique and distinct. The number of subnets created is determined based on the number of physical
underlay ports that are identified in the Network Configuration section of the wizard. Each configured underlay requires
one overlay subnet.
By default, each topology has a minimum of four subnets per hub (i.e. single-hub topologies have a minimum of four
subnets and dual-hub topologies have a minimum of eight subnets). When more than four underlays are configured, the
overlay network is further subnetted into the nearest power of two. For example, configuring five physical underlays in
the wizard for a single-hub topology results in the creation of eight overlay subnets, with only the first five being used.
The table below shows an example of the subnet ranges that are created based on the number of underlay ports
configured in the wizard using the default 10.10.0.0/16 network.
Number of
Overlay Subnet
Number of Underlays Overlay's Usable IPs FortiGates per
Address
Overlay
In dual-hub topologies, overlay subnets are assigned so that hub 1 receives the first half and
hub 2 receives the second. The colors in the table above for "5 - 8 underlays" is an example of
how the overlays are assigned when there are two hubs: Blue = Hub 1. Red = Hub 2.
It may be necessary to adjust the default overlay network to something larger than
10.10.0.0/16 if you have a large number of overlays and/or branches. For example, if you
have a dual-hub topology with 18 total overlays, each overlay can only support 2046
FortiGates. If you have 2100 branches, you will need to supply a larger overlay network such
as 10.0.0.0/8.
Examples
The wizard includes topologies for single-hub, dual-hub (primary & secondary), dual-hub (primary & primary), and multi-
hub (3 or 4 hubs). Here you can find an example of how the IP overlay network is designed in a dual-hub (primary &
secondary) and single-hub topology using the default overlay network.
In dual-hub topologies, overlay subnets are assigned so that hub 1 receives the first half and hub 2 receives the second.
In this example, four underlays (two for the primary hub and two for the secondary hub) are configured in the default
dual-hub (primary & secondary) topology.
The topology diagram below demonstrates how the overlay subnets are applied in this dual-hub scenario:
Single-hub
In single-hub topologies, at least four overlay networks are created by the wizard. If more than four WAN underlays are
configured, the overlay network will be further subnetted to allow for additional overlay subnets to be created.
In this example, two physical WAN underlays are configured in this single-hub topology.
SD-WAN rules
You can use SD-WAN templates to configure SD-WAN rules for one or more devices. When you assign SD-WAN
templates to a device, you are using SD-WAN central management.
If you want to use SD-WAN per-device management, do not assign SD-WAN templates to devices, and see Device DB -
Network SD-WAN on page 197.
SD-WAN templates help you do the following:
l Deploy a single SD-WAN template from FortiManager across multiple FortiGate devices.
l Perform a zero-touch deployment without manual configuration locally at the FortiGate devices.
l Roll out a uniform SD-WAN configuration across your network.
l Eliminate errors in SD-WAN configuration across multiple FortiGate devices since the SD-WAN template is applied
centrally from FortiManager.
l Monitor network Performance SLA across multiple FortiGate devices centrally from FortiManager.
l Monitor the performance of your SD-WAN with multiple views.
If you are implementing overlays (IPsec tunnels) in your SD-WAN solution, you may consider
SD-WAN Overlay Templates to automate and simplify the process using Fortinet's
recommended IPsec and BGP templates. See SD-WAN overlay orchestration on page 511.
The SD-WAN template takes effect on the FortiGate device only after it is installed using the
Install Wizard. After installing the SD-WAN template on the FortiGate device, changing
settings in SD-WAN, Performance SLA, or SD-WAN Rules locally on the FortiGate device will
result in the SD-WAN template on the FortiManager being out of sync with the FortiGate
device. You must configure the same settings on the FortiManager SD-WAN template, and
install it again by using the Install Wizard to be in sync with the settings on the FortiGate.
Some FortiGate model devices include a default policy to allow initial management access to
the device using a specified interface.
As SD-WAN members may not use interfaces that are referenced directly in firewall policies,
you must remove this reference by deleting the policy before installing the SD-WAN template.
This can be done manually through the CLI or GUI, or by installing a new policy package to the
device that does not contain the default policy.
SD-WAN templates
You can create SD-WAN templates, and assign the templates to one or more devices.
3. Click Create New in the content pane toolbar. The Create New SD-WAN Template page opens.
l Device - select the FortiGate device from where to select the SD-WAN template.
A prefix Import is automatically added to SD-WAN templates that are imported from the
FortiGate devices.
When creating an SD-WAN template, you can create SD-WAN zones and add interface members. Normalized
interfaces are not supported for SD-WAN templates. You must bind the interface members by name to physical
interfaces or VPN interfaces.
You can select SD-WAN zones as source and destination interfaces in firewall policies. You cannot select interface
members of SD-WAN zones in firewall policies.
The default SD-WAN zone is named virtual-wan-link.
You can use metadata variables for fields identified with the metadata variable icon . The following example shows
the Interface Member option and the Gateway IP option with meta fields:
This topic describes how to create SD-WAN interface members, create SD-WAN zones and add interface members, and
how to edit and delete interface members.
4. Enter the following information, then click OK to create the new WAN interface:
Sequence Number Type a number to identify the sequence of the interface in the SD-WAN zone.
SD-WAN Zone Select the SD-WAN zone for the interface member.
Gateway IP The default gateway for this interface. Usually the default gateway of the
Internet service provider that this interface is connected to.
You can use meta fields for Gateway IP.
Status Toggle On to enable the interface member. Toggle Off to disable the interface
member.
Installation Target Click the box to specify installation targets for the SD-WAN member.
Interface Members Click the box to select interface members for the zone.
SD-WAN rules
Configure SD-WAN rules for WAN links by specifying the required network parameters. The SD-WAN rules are applied
to the FortiGate device when the SD-WAN template is applied.
4. In the SD-WAN Rules toolbar, click Create New. The Create New SD-WAN Rule dialog-box opens.
5. Enter the following information, then click OK to create the new SD-WAN rule:
Source
User Group Add one or more users or user groups from the dropdown.
Destination
Address Select addresses or address groups from the dropdown list. You can click the add
icon to create new entries.
Port Range Enter the port range. This option is only available when the protocol is TCP or UDP.
Type of Specify the type of service and bit mask. This option is only available when the
Service protocol is Specify.
Internet Select internet services, internet service groups, custom internet services, or custom
Service internet service groups from the dropdown list. You can click the add icon to create
new entries.
Application Select applications, application categories, and application groups from the
dropdown list. You can click the add icon to create application groups.
Outgoing Interface
Strategy Select one of the following to specify how the traffic flows through the outgoing
interface:
l Manual to specify what outgoing interface members to use.
l Best Quality to identify outgoing interface members and have traffic flow based
on quality status.
l Lowest Cost (SLA) to identify outgoing interface members and have traffic flow
Interface For the selected strategy, specify what interfaces you would like to be used. The top
Preference of the list is the highest priority, if SLA targets are met.
Zone Select the zone preference. This option is only available when Strategy is Lowest
Preference Cost (SLA) or Maximize Bandwidth (SLA).
Measured Select the SLA measurement for the selected strategy. This option is only available
SLA when Strategy is Best Quality.
Required Select the required SLA target. This option is only available when Strategy is Lowest
SLA Target Cost (SLA) or Maximize Bandwidth (SLA).
Performance SLA
Create a Performance SLA in FortiManager that can be used to monitor the SD-WAN performance in FortiGate devices.
If all links meet the SLA criteria, the FortiGate uses the first link, even if that link isn’t the best quality. If at any time, the
link in use doesn’t meet the SLA criteria, and the next link in the configuration meets the SLA criteria, the FortiGate
changes to that link. If the next link doesn’t meet the SLA criteria, the FortiGate uses the next link in the configuration if it
meets the SLA criteria, and so on.
4. In the Performance SLA toolbar, click Create New. The Create Performance SLA dialog-box opens
5. Enter the following information, and click OK to create the performance SLA:
Probe Mode Set the mode that determines how to detect the server:
l Active: the probes are sent actively (default).
mimics a real user, and the probes return accurate application level
performance statistics.
l Passive: the traffic measures health without probes.
Enable Probe Packets Set Enable probe packets to enable or disable sending probe packets.
l TCP ECHO
l UDP ECHO
l HTTP
l TWAMP
l DNS
l TCP Connect
l FTP
Server Click Add (+), and type the IP address of the health-check server.
Participants Select available interface members or select All SD-WAN Members. The
interfaces must already be added to the template.
Embedded Measure Health Enable/disable embedding SLA information in ICMP probes (default =
disable).
Redistribute SLA ID Set the SLA entry (ID) that will be applied to the IKE routes (0 - 31, default = 0).
Installation Target Click the box to specify installation targets for the performance SLA.
SLA Targets Click Add Target to add a new SLA. Enable and enter the Latency Threshold
(in milliseconds), Jitter Threshold (in milliseconds), Packet Loss Threshold (in
percent), Priority IN-SLA, and Priority OUT-SLA, then click OK to create the
SLA.
SLAs can also be edited and deleted as required.
Link Status
Interval Status check interval, or the time between attempting to connect to the server,
in seconds (1 - 3600, default = 1).
Failure Before Specify the number of failures before the link becomes inactive (1 - 10, default
Inactive = 5).
Restore Link After Specify the number of successful responses received before server is
considered recovered (1 - 10, default = 5).
Action When Inactive Specify what happens with the WAN link becomes inactive.
Update Static Select to update the static route when the WAN link becomes inactive.
Route
Cascade Select to cascade interfaces when the WAN link becomes inactive.
Interfaces
Neighbors
You can create SD-WAN rules that include Border Gateway Protocol (BGP) neighbors.
You must create BGP neighbors for FortiGate devices before you can add them to SD-WAN templates.
Performance SLA Click the list, and select the performance SLA.
6. Click OK.
Duplication
You can assign SD-WAN templates to FortiGate devices. The network parameters specified in the SD-WAN template
are used to measure the performance of the WAN link on the FortiGate device.
4. In the Available Entries list, select a FortiGate, and click > to move the FortiGate to the Selected Entries list.
5. Click OK.
This topic includes an example of migrating your SD-WAN Orchestrator configuration into SD-WAN templates. As a part
of this migration, the FortiManager and managed FortiGate devices are all upgraded to version 7.0 or later.
The SD-WAN network used in this example is based on the solution described in the Planning your network topic
included in the FortiManager 6.4 SD-WAN Orchestrator Administration Guide.
l The ADOM is on version 6.4 ADOM.
l The FortiGate devices are on version 6.4.
l There are two regions, and each region has one hub and two branches.
In the example used in this topic, region one includes hub1, branch11, and branch12, and region two includes hub2,
branch21, and branch 22.
3. Upgrade the ADOM to version 7.0. For more information, seeUpgrading an ADOM on page 922.
a. Go to System Settings > All ADOMs.
b. Select the ADOM and click More > Upgrade.
c. Click OK.
4. Go to Device Manager > Provisioning Templates > SD-WAN Templates, and import the SD-WAN configuration from
hub devices (e.g. hub1 and hub2).
When comparing the SD-WAN templates imported from hub1 and hub2, there are a number of differences. As a
result of these differences, and the templates cannot be combined into a singular template for hubs. An example of
the differences between imported templates include:
l In Interface Members > Underlay, there are different gateways.
l In SD-WAN Rules, there is a different Destination, Criteria, and Member order which is not supported by meta
variables.
5. Assign the imported hub1 SD-WAN template to the hub1 device, and the imported hub2 SD-WAN template to the
hub 2 device.
6. Go to Device Manager > Provisioning Templates > SD-WAN Templates, and import the SD-WAN templates from
branch devices (e.g. branch11, branch12, branch21, and branch22). When comparing the SD-WAN templates
imported from branch devices, there are a number of differences. An example of the differences between imported
templates include:
l In Interface Members > overlay_edge2hub, there are different interface members.
l In SD-WAN Rules, there is a different Criteria and Member order which is not supported by meta variables.
7. Assign the imported branch SD-WAN template to each branch device from which it was imported. For example:
l Assign the template imported from branch11 to the branch11 device.
8. (Optional) Continue to upgrade FortiManager to the latest available versions following the recommended upgrade
path. For example, upgrade to FortiManager 7.2.4 and then to 7.4.2. See the FortiManager documentation for more
information on upgrade paths and the latest available versions.
The AP Manager pane allows you to manage FortiAP access points that are controlled by FortiGate devices and are
managed by FortiManager. FortiAP devices must be added to a FortiGate and cannot be directly added to FortiManager
as a standalone device.
You can use AP Manager for the following modes of management:
Central management of When central management is enabled, you can view, create, edit, and import
managed access points profiles. These profiles share a common database and can be applied to any
device, regardless of which FortiGate controller it is connected to.
Central management mode is recommended when you need to create common
profiles to share between different FortiAP devices, for example in environments
where you have many AP devices and managing the settings for each device
individually is not practical.
Configuration of AP settings is completed in the AP Manager. When an install
occurs, only necessary configurations (configurations that are directly referenced
in a profile assigned to the AP) are installed to the managing FortiGate.
Per-device management of When per-device management is enabled, you can change settings for each
managed access points managed access point. All FortiAP devices and WiFi profiles are managed at the
device level with no shared objects.
Per-device management mode is recommended when you want to manage each
FortiAP configuration individually.
Configuration of AP settings is completed in the AP Manager. When an install
occurs, all configurations for the AP are synchronized to the managing FortiGate.
For more information on wireless configuration scenarios and settings, see the FortiWiFi and
FortiAP Configuration Guide.
Managed FortiAPs Displays unauthorized and authorized FortiAP devices. You can view, authorize, and edit
on page 559 authorized FortiAP devices.
WiFi Maps on page View the locations of FortiAP devices on Google Maps. You can create a floor map, add an
578 image of a floor map, and place the FortiAP devices on the map.
SSIDs View and create SSIDs. SSIDs are profiles that can be applied to multiple controllers. (Central
management only)
Operational View and create operational profiles including FortiAP profiles, QoS profiles,
Profiles FortiAP configuration profiles, and ARRP profiles. (Central management only)
Connectivity View and create connectivity profiles including MPSK profiles, Bonjour profiles, and Bluetooth
Profiles profiles. (Central management only)
Protection Profiles View and create protection profiles including WIDS profiles and L3 firewall profiles. (Central
management only)
WiFi Settings View and configure WiFi settings. (Central management only)
Managed FortiAPs
The Managed FortiAPs pane allows you to manage FortiAP devices that are controlled by FortiGate devices and are
managed by the FortiManager.
FortiAP devices are grouped based on the controller that they are connected to. The devices can also be further divided
into groups within a controller.
FortiAP devices can be managed centrally, or per-device (see Creating ADOMs on page 909). In per-device mode, all
WiFi profiles (SSIDs, AP profiles, and others), as well as managed FortiAP devices, are managed at the device level –
there are no shared objects.
Additional configuration options and short-cuts are available using the right-click content
menu. Right-click on the mouse on different parts of the navigation panes on the GUI page to
access these context menus.
If workspace or workflow is enabled, the ADOM must be locked before changes can be made.
See Locking an ADOM on page 921.
You can quickly view the status of devices on the Managed FortiAPs pane with the quick status bar, which contains the
following charts:
l Status
l 2.4 GHz Radio Channel Utilization
l 5 GHz Radio Channel Utilization
You can click each status in the legend to display in the content pane only the devices referenced in the quick status.
Use the Show Charts dropdown and toggle to show or hide charts. From the dropdown, select or de-select checkboxes
to show or hide the respective chart.
Managing APs
FortiAP devices can be managed from the content pane below the quick status bar. To view the managed FortiGates go
to AP Manager > Devices & Groups > Managed FortiGates (#).
The following options are available from the toolbar and right-click menu:
More
Assign Profile Assign a profile from the list to the AP. Only applicable profiles will be listed. See
Assigning profiles to FortiAP devices on page 623.
Grouping Add the AP to a new or existing group. The APs must be the same model to be
grouped. See FortiAP groups on page 568.
Deauthorize Deauthorize an AP. See Authorizing and deauthorizing FortiAP devices on page
569.
This option is also available in the toolbar by selecting More.
Replace Replace a FortiAP device. Selecting this option allows you to enter a new
FortiAP Serial Number for the selected device. See Replacing APs on page 576.
Diagnostics and View the device Summary, Performance, Clients, Interfering SSIDs, and
Tools Spectrum Analysis.
View the clients connected to the AP. See Connected clients on page 572.
View the spectrum analysis for managed APs. See Spectrum analysis for
managed APs on page 573.
View Rogue APs View the Rogue APs. See Rogue APs on page 570.
View Health View the AP status, clients counts, and wireless interference. See Health Monitor
Monitor on page 575.
LED Blink Start LED blink on the selected FortiAP for the specified period of time.
This option is only available in the right-click menu.
Show on Google Map Show the selected AP on Google Map. See Google map on page 578.
This option is only available in the right-click menu.
Show on Floor Map Show the selected AP on the floor map. See Floor map on page 579.
This option is only available in the right-click menu.
AP/Radio/Group Change the Managed FortiAPs view. The following views are available: AP,
Radio, or Group.
Search Enter a search string into the search field to search the AP list.
Column Settings Click to select which columns to display or select Reset to Default to display the
default columns.
Channel The wireless radio channels that the access point uses.
Model
Channel Utlization
Join Time The date and time that the FortiAP joined.
1. From theCreate New dropdown, select Managed AP. The Add FortiAP dialog box opens.
FortiGate Select the FortiGate that the AP will be added to from the dropdown list. If you
have already selected a FortiGate in the tree menu, this field will contain that
FortiGate.
FortiAP Profile Select an AP profile to apply to the device from the dropdown list. See FortiAP
profiles on page 593.
FortiAP Configuration Profile Select a FortiAP configuration profile to apply to the device from the dropdown
list.
Enforce Firmware Version Toggle ON to enforce a firmware version and select the firmware version from
the drop-down menu. Toggle OFF to disable this feature.
FortiAP model devices can be added using wildcard serial numbers. The wildcard SN
format is: PREFIX****000001
l PREFIX: The first 6 digits of the device's serial number. The prefix must be valid.
1. In the tree menu, go to Managed FortiAPs, and select the FortiGate that contains the FortiAP device to be edited.
Alternatively, you can select a device in a group, see FortiAP groups on page 568.
2. Locate the FortiAP device in the list in the content pane, or refine the list by selecting an option from the quick status
bar.
3. Either select the FortiAP and click Edit from the toolbar, double-click on the FortiAP, or right-click on the FortiAP and
select Edit. The Edit Managed AP window opens.
4. Edit the following options, then click Apply to apply your changes:
Serial Number The device’s serial number. This field cannot be edited.
Connected Via The method by which the device is connected to the controller.
Current The AP's current firmware version. Select Upgrade to upgrade the
firmware to a newer version if you have one available.
FortiAP Profile Select a profile from the dropdown list (see FortiAP profiles on page 593)
Bonjour Profile Select a profile from the dropdown list (see Bonjour profiles on page 604)
Override Radio Override the selected AP profile's settings for this managed FortiAP.
Band If applicable, select the wireless band, and select the wireless protocol
from the dropdown list. The available options depend on the selected
platform.
In two radio devices, both radios cannot use the same band.
SSIDs Manually choose the SSIDs that APs using this profile will carry, or let
them be selected automatically. For more information on Tunnel, Bridge,
and Manual settings, see FortiAP profiles on page 593.
Advanced Options Configure advanced options. For information, see the FortiOS CLI
Reference.
https://help.fortinet.com/cli/fos60hlp/60/index.htm.
1. Go to Managed FortiAPs, and select the FortiGate that contains the FortiAP device to be deleted.
2. Locate the FortiAP device in the content pane, or refine the list by selecting an option from the quick status bar.
3. Either select the FortiAP and click Delete from the toolbar, or right-click the FortiAP and select Delete.
4. Click OK in the confirmation dialog box to delete the AP.
5. Perform an install to apply the changes to the managed FortiGate. See Install wizard on page 160.
A FortiAP device cannot be deleted if it is currently being used. For example, if a firewall profile
has been assigned to it.
1. Go to Managed FortiAPs, and select the FortiGate that contains the FortiAP device to be upgraded. Alternatively,
you can select a device in a group, see FortiAP groups on page 568.
2. Select two or more FortiAP devices of the same model in the content pane.
3. Right-click the selected FortiAP devices and select Upgrade.
The Upgrade Firmware dialog box is displayed.
4. Select the firmware version for upgrade, and click Upgrade Now.
Before upgrading FortiAP, go to FortiGuard > Firmware Images > Product: FortiAP and click
the download icon to manually download the firmware images.
1. Configure a CSV file with the following fields as column headers, and enter the corresponding information for each
FortiAP to be imported in the cells below:
Header Cell
FortiGate The name of the FortiGate to which the FortiAP will be assigned.
VDOM name (Optional) If VDOMs are enabled on the FortiGate, specify the VDOM to which
the FortiAP will be assigned. If VDOMs are disabled, leave this field blank, and
the default root VDOM will be applied automatically.
For example:
2. Go to AP Manager > Managed FortiAPs, and select More > Import from CSV from the toolbar.
3. Browse to the CSV file location, or drag and drop the file into the Upload field. The results are displayed in the import
results window.
l Successfully imported fields are indicated with a checkmark icon.
l Fields with errors are indicated with an error icon. Hover your mouse over the error icon or the FortiAP's check
box to view details about the error. Fields can be directly edited from the import results window. FortiAPs with
errors will not be imported if you continue the import process.
l Export All Devices: In per-device mode only, enable this toggle to include all managed FortiGate's
FortiAPs in the CSV file.
FortiAP groups
FortiAP devices can be organized into groups. A FortiAP can only belong to one group.
FortiGate Select the FortiGate under which the group will be created.
FortiAPs Select FortiAPs to add to the group. Only FortiAPs in the selected FortiGate of the
selected platform will be available for selection.
To edit a group:
To delete a group:
Device summary
The Device Summary tab in Diagnostics and Tools displays the FortiAP serial number, status, version as well other
information about the device. The General Health view in the summary tab displays key health statisics for the device,
such as CPU Usage, Memory Usage, Connection Uptime, and Temprature.
Changes can be installed using the Install Wizard in the toolbar. See Install wizard on page 160.
Rogue APs
You can use Rogue AP detection to scan for and identify unauthorized wireless access points in the area. Detected APs
are displayed in the View Rogue APs table where you can view details about the AP, including the SSID and network
status. Rogue APs connected to your wired network can be identified using the On-Wire column in the table.
For more information about Rogue AP detection, see the FortiAP/FortiWiFi Configuration Guide.
Suppress AP Suppress the selected APs. This will prevent users from connecting to the AP.
When suppression is activated against an AP, the controller sends
deauthentication messages to the rogue AP’s clients posing as the rogue AP,
and also sends deauthentication messages to the rogue AP posing as its
clients.
Before enabling this feature, verify that operation of Rogue Suppression is
compliant with the applicable laws and regulations of your region.
Column Settings Click to select which columns to display or select Reset to Default to display
the default columns.
SSID The wireless service set identifier (SSID) or network name for the wireless
interface.
Channel The wireless radio channel that the access point uses.
Detected By The name or serial number of the AP unit that detected the signal.
On-Wire A green up-arrow indicates a suspected rogue, based on the on-wire detection
technique. An orange down-arrow indicates AP is not a suspected rogue.
First Seen How long ago this AP was first detected. This column is not visible by default.
Last Seen How long ago this AP was last detected. This column is not visible by default.
Rate The data rate in, bps. This column is not visible by default.
FortiManager can authorize unknown APs that are connected to a managed FortiGate.
1. Enable JSON API access to Read-Write. See To enable read-write JSON API access.
You must enable JSON API access to Read-Write to authorize unknown FortiAP devices.
4. Select the unknown FortiAP devices and either click More > Authorize from the toolbar, or right-click and select
Authorize. Allow a few moments for the APs to authorize.
5. Select the APs and click More > Refresh.
The APs are now online and displayed.
Connected clients
In the Diagnostics and Tools pane, the Clients tab displays detailed information about the health of individual WiFi
connections.
FortiAP The name of the FortiAP unit that the client connected to.
Signal Strength/Noise The signal-to-noise ratio in dBs calculated from signal strength and noise
level.
Association Time How long the client has been connected to this access point.
Idle Time The amount of time that the client has been idle.
Rate The connection rate between the WiFi client and the AP.
Name The name of the FortiGate device that the FortiAP is attached to.
Spectrum analysis scans managed APs for channel conditions and sources of interference which can potentially impact
efficiency.
1. Enable JSON API access to Read-Write. See To enable read-write JSON API access.
2. Create a new WiFi profile or modify an existing WiFi profile, by setting the Radio mode to Dedicated Monitor. See
FortiAP profiles on page 593.
3. Assign the profile to the managed AP. See Assigning profiles to FortiAP devices on page 623.
4. Use the Install Wizard to install the changes to FortiGate. See Install device settings only on page 163.
4. In the Diagnostics and Tools pane, click the Spectrum Analysis tab.
The following information is displayed:
Chart Description
Signal Interference A spectrogram of 60 samples of noise levels for different channels at specific
Spectrogram time intervals.
Duty Cycle The extent of a non-WiFi device/neighbouring AP is interfering with the signal.
Duty Cycle Spectrogram A spectrogram of 60 duty samples for each channel over a period of time
Detected Interference The detected interference Type, Frequency, and Last Detected date.
Clients Monitor
The Clients Monitor displays detailed information about connected clients and the health of individual WiFi connections .
FortiAP The serial number of the FortiAP unit that the client connected to.
Signal Strength/Noise The signal-to-noise ratio in dBs calculated from signal strength and noise
level.
Association Time How long the client has been connected to this access point.
Idle Time The amount of time that the client has been idle.
Rate The connection rate between the WiFi client and the AP.
Health Monitor
The Health Monitor is a collection of widgets that provide an overview of the AP status, clients counts, and wireless
interference.
6. (Optional) Click the column heading in a table to sort the data in ascending or descending order.
The following widgets are displayed:
Widget Description
Client Count Over Time A graph of the number of connected clients over the specified
time period: 1 hour, 1 day, or 30 days.
This widget is only available when the All FortiAPs group is
selected in the tree menu.
Top Client Count Per-AP (2.4 GHz or 5 Lists the number of clients in the 2.4GHz and 5GHz band for each
GHz Band) FortiAP. Also includes columns for the channel and bandwidth of
the AP.
Top Wireless Interference (2.4 GHz or 5 Lists the number of interfering APs in the 2.4GHz and 5GHz band
GHz Band) for each FortiAP. Also includes columns for the channel and the
number of MAC Errors for each AP.
Login Failures Information Lists the time of a log in failure, the SSID involved, the Host
Name/MAC, and the User Name.
Replacing APs
FortiAP devices can be replaced from the AP Manager > Device & Groups pane.
4. When the device's status is Unauthorized, right-click on the same FortiAP device and click Replace.
After the FortiAP has been replaced successfully, refresh the page and the new FortiAP is displayed.
6. Authorize the FortiAP device, then connect the FortiAP to the FortiGate.
7. Power on the FortiAP device. After a few minutes, the FortiAP is displayed as Online.
You can view the replacement serial number in the Replacement Serial Number column in the Managed
FortiSwitches table.
You can preview and copy the JSON API requests or CLI script changes for Managed FortiAPs and
FortiAP configurations.
To preview the JSON request or CLI script when editing a FortiAP configuration:
l Click Show modified changes only to toggle between viewing the full JSON API request or modified changes
only.
l Click Copy to clipboard to copy the JSON API request to your clipboard.
3. Click the CLI Scripttab to view the CLI script.
l Click Copy to clipboard to copy the CLI script to your clipboard.
WiFi Maps
The WiFi Map pane in AP Manager displays the global and local locations of your FortiAP devices.
There are two types of maps in WiFi Maps:
l Google Map: Shows all of the FortiGate devices on an interactive world map. See Google map on page 578.
l Floor Map: Allows you to create a customized map of your building, add an image of the floor layout, and place
FortiAP devices on the map. See Floor map on page 579
Google map
Google Map shows all of the FortiGate devices on an interactive world map. Each FortiGate is designated by a map pin
in its geographic location on the map. The number of APs connected to the FortiGate is listed in the pin.
Google Map After selecting a FortiGate in the map, the following information is displayed for
its FortiAPs. AP status information is obtained from JSON response and from
AP monitoring data obtained from FortiGate.
Show on Floor Map Click the menu icon next to the AP Name, and click Show on Floor Map, to
view AP's physical location. See Floor map on page 579.
Floor map
Floor Map allows you to create a customized map of your building, add an image of the floor layout, and place FortiAP
devices on the map.
l Floor Index: Enter a numeric value. Floors are sorted from highest to lowest based on the Floor Index.
l Floor Map - Upload a file by dragging and dropping onto the field, or click Browse to select an image of your
floor map.
Floor map images can be uploaded in the following file types: PNG, JPG, GIF and
BMP.
6. Click Finish. The map is added to AP Manager > Map View > Floor Map.
1. Click Floor Map > [Map Name] > [Floor Map name].
2. In the toolbar, click Edit Mode to list the FortiAP devices in the Positioning APs pane.
3. Drag and drop the FortiAP devices from the Positioning APs pane to the image of the floor map.
4. In the toolbar click, Save.
5. Click Save and Return.
The FortiAP devices are added to the floor map.
l IP Address
l Usage
l State
l Rogue APs
When using AP Manager with central management enabled, you can configure the following profiles and settings:
Operation profiles
FortiAP Configuration
Profiles
Connectivity profiles
MPSK profiles See the FortiAP/FortiWiFi documentation on the Fortinet Document Library.
Protection profiles
The following steps provide an overview of using central management for AP management:
1. Enable central management of access points. See Enabling FortiAP central management on page 582.
2. Create and assign profiles to FortiAP devices. SeeFortiAP profiles on page 593 andAssigning profiles to FortiAP
devices on page 623.
3. Install your changes. See Installing changes to FortiAP devices on page 570.
When central management is enabled, you can create templates for a variety of FortiAP configurations, and assign
templates to multiple managed access points.
SSIDs
You can use the AP Manager to create and manage SSIDs and SSID groups.
Create New Create a new SSID (see Creating SSIDs on page 584) or SSID group.
1. In the toolbar, click Create New > SSID Group. The Create New SSID Group windows opens.
2. In the Name field, enter a name for the group.
3. (Optional) In the Comment field, enter a brief description of the group
4. (Optional) In the Members field, add SSIDs to the group .
5. Click OK to create the SSID group.
To import an SSID:
Creating SSIDs
In central management mode, the SSIDs are profiles that can be applied to multiple controllers. SSID profiles can be
created for different traffic modes, including Tunnel, Bridge, or Mesh. The settings available in the GUI change
depending on which traffic mode is selected.
For more information on SSID settings, see the FortiWiFi and FortiAP Configuration Guide on the Fortinet Document
Library.
When you create SSID profiles, you can select a QoS profile and/or an L3 firewall profile.
FortiManager includes Fortinet recommended factory default SSID profiles that you can
activate and use in your environment. See Using Fortinet recommended profiles on page 624.
3. Enter the following information, then click OK to create the new tunnel to wireless controller SSID:
Address These options are only available when Traffic Mode is Tunnel.
Network Size Select the network size. IPAM will allocate an IP subnet with the
selected size.
This setting is only available when the IPAM Address Mode is selected.
IP/Network Mask Enter the IP address and netmask for the SSID.
This setting is only available when the Manual Address Mode is
selected.
Administrative Access
DNS Server Choose the DNS server as Same as System DNS, Same as Interface
IP, or Specify to configure the DNS server.
Lease Time Set the lease time. Disabling the lease time will result in clients having
an unlimited lease time.
Network
WiFi Settings
SSID Type the wireless service set identifier (SSID), or network name, for this
wireless interface. Users who want to use the wireless network must
configure their computers with this network name.
Client Limit The maximum number of clients that can simultaneously connect to the
AP (0 - 4294967295, default = 0, meaning no limitation).
standard.
l AES: Advanced Encryption Standard, commonly used with the
Osen OWE
Only WPA and WPA2 Personal modes are available when the traffic
mode is Mesh.
Passphrase When Pre-shared Key Mode is set to Single, enter the pre-shared key
for the SSID.
This option is only available when the security mode includes WPA or
WPA2 personal.
Client Limit per Radio The maximum number of clients that can simultaneously connect to
each radio (0 - 4294967295, default = 0, meaning no limitation).
This option is only available when Local Standalone is enabled.
Default Client Limit Per Enable/disable a maximum number of clients that can simultaneously
Key connect using each pre-shared key, then enter the maximum number.
This option is only available when the Multiple Pre-Shared Keys is
enabled.
Authentication Portal Select Local or External. If External is selected, enter the URL of the
portal.
This option is only available when the portal type includes
authentication.
User Groups Select the user group to add from the dropdown list. Select the plus
symbol to add multiple groups.
This option is only available when the portal type includes
authentication.
Exempt Sources Select exempt sources to add from the dropdown list.
This option is only available when the portal type includes
authentication.
Exempt Destinations Select exempt destinations to add from the dropdown list.
This option is only available when the portal type includes
authentication.
Exempt Services Select exempt services to add from the dropdown list.
This option is only available when the portal type includes
authentication.
Customize Portal Select to allow for customized portal messages. Portal messages
Messages cannot be customized until after the interface has been created.
This option is only available when the portal type includes disclaimer,
email collection, or CMCC without MAC authentication.
Redirect after Captive Select Original Request or Specific URL. If Specific URL is selected,
Portal enter the redirect URL.
This option is only available when the security mode includes captive
portal.
Authentication Select the authentication method for the SSID, either Local or RADIUS
Server, then select the requisite server or group from the dropdown list.
This option is only available when the security mode is includes WPA or
WPA2 enterprise.
Schedule Select a schedule to control the availability of the SSID. For information
on creating a schedule object, see Creating objects on page 454.
Access Control List Select an access control list profile from the drop-down list. See L3
firewall profiles on page 613.
Block Intra-SSID Traffic Enable/disable blocking communication between clients of the same AP
(default = disable).
Filter Clients by MAC Enable/disable using a RADIUS server to filter clients be MAC address,
Address then select the server from the drop-down list. See RADIUS servers on
page 1015 for information on adding a RADIUS server.
VLAN Pooling Enable/disable VLAN pooling, allowing you to group multiple wireless
controller VLANs into VLAN pools. These pools are used to load-
balance sessions evenly across multiple VLANs.
l Managed AP Group: Select devices to include in the group.
l Round Robin
l Hash
QoS Profile Select a QoS profile from the dropdown list. See QoS profiles on page
601.
L3 Firewall Profile Select a L3 firewall profile from the dropdown list. See L3 firewall profiles
on page 613.
Advanced Options Configure advanced options. For information, see the FortiOS CLI
Reference.
Per-Device Mapping Enable per-device mapping to override the SSID profile settings for
selected devices. See Adding SSID per-device mapping on page 589.
If you select WPA Enterprise, WPA Only Enterprise, or WPA2 Only Enterprise, you can add a
different RADIUS server using per-device mapping. See Adding SSID per-device mapping on
page 589.
Mapped DHCP Server Set the DHCP Server to ON if you want to map a DHCP Server to this device.
Address Range Configure address ranges for DHCP. Click Create to create a new range.
Ranges can also be edited and deleted as required.
This option is only available when DHCP Server is ON and Mode is Server.
Default Gateway Configure the default gateway: Same as Interface IP, or Specify. If set to
Specify, enter the gateway IP address in the field.
This option is only available when DHCP Server is ON and Mode is Server.
DNS Server Configure the DNS server: Same as System DNS, Same as Interface IP, or
Specify.
This option is only available when DHCP Server is ON and Mode is Server.
NTP Server Configure the NTP server: Local, Same as System NTP, or Specify. If set to
Specify, enter the NTP server IP address in the field.
This option is only available when DHCP Server is ON and Mode is Server.
Time Zone Configure the timezone: Disable, Same as System, or Specify. If set to
Specify, select the timezone from the dropdown list.
This option is only available when DHCP Server is ON and Mode is Server.
Additional DHCP In the Lease Time field, enter the lease time, in seconds (default = 604800 (7
Options days)).
Add DHCP options to the table. For details, see Adding additional DHCP
options on page 591. Options can also be edited and deleted as required.
This option is only available when DHCP Server is ON and Mode is Server.
MAC Reservation Select the action to take with unknown MAC addresses: assign or block.
+ Access Control Add MAC address actions to the table. For details, see Adding a MAC address
reservation on page 592. Reservations can also be edited and deleted as
required.
This option is only available when DHCP Server is ON and Mode is Server.
You can configure the Option Code, Type, and Hexadecimal Value in SSID profiles when DHCP Server is enabled.
5. In the Options toolbar, click Create New. The Create New Options dialog opens.
6. Configure the additional DHCP options.
7. Click OK.
You can reserve a MAC address in SSID profiles when DHCP Server is enabled.
4. In the IPAddress Assignment Rules toolbar, click Create New. The Create New IP Address Assignment Rule dialog
opens.
5. Configure IP Address Assignment Rule.
6. Click OK.
FortiAP profiles
FortiAP profiles define radio settings for FortiAP models. The profile specifies details such as the operating mode of the
device, SSIDs, and transmit power. Custom AP profiles can be created as needed for new devices.
You can assign AP profiles to FortiAP devices in the Managed FortiAPs menu. See Assigning profiles to FortiAP devices
on page 623.
Click View All Profiles to display all FortiAP profiles configured in the ADOM in the FortiAP Profiles table, including
custom AP profiles.
FortiManager includes Fortinet recommended factory default FortiAP profiles that you can
activate and use in your environment. See Using Fortinet recommended profiles on page 624.
The following options are available in the toolbar and right-click menu:
Platform Select the platform that the profile will apply to from the dropdown list.
Indoor / Outdoor Select Default (Indoor), Indoor, or Outdoor. The selection can affect the
available channels due to regulatory rules.
Country / Region Select the country or region from the drop-down list.
FortiAP Configuration Profile Optionally, enable the toggle to select a FortiAP configuration profile.
AP Login Password Set, leave unchanged (default), or empty the AP login password.
Administrative Access Allow management access to the managed AP via telnet, http, https,
and/or ssh.
Client Load Balancing Select the client load balancing methods to use: Frequency Handoff and/or
AP Handoff.
Bluetooth Profile If available for the platform, select a profile from the list or click the plus (+)
to create a new Bluetooth profile.
See Bluetooth profiles on page 606.
Radio 1 & 2 Configure the radio settings. The Radio 2 settings will only appear if the
selected platform has two radios.
Mode = WIDS Profile Select a WIDS profile from the dropdown list. See WIDS profiles on page
Access 609.
Point
ARRP Profile Select an Automatic Radio Resource Provisioning (ARRP) profile. See
ARRP profiles on page 616.
This option is only available if Radio Resource Provision is enabled.
Band Select the wireless protocol from the dropdown list. The available bands
depend on the selected platform.
In two radio devices, both radios cannot use the same band.
Channel Plan Select Three Channels or Four Channels to select predefined channels.
Select Custom to specify custom channels.
Channels Available when Channel Plan is set to Custom. Select the channel or
channels to include. The available channels depend on the selected
platform and band.
Transmit Power Select Percent or dBm to specify the minimum and maximum power levels
Mode by percent or dBm.
Select Auto to specify a range of dBm and allow the level to be
automatically set within the range.
Transmit Power If Transmit Power Mode is Percent or dBm, specify the percentage or dBm
of the total available power.
If Transmit Power Mode is Auto, enter the power low and high values in
dBm.
SSIDs Choose the SSID profiles that APs using this profile will broadcast. You
can select Tunnel or Bridge to choose them automatically, or Manual to
select the SSIDs manually.
l Tunnel: Available tunnel-mode SSIDs are automatically assigned to
this radio.
l Bridge: Available bridge-mode SSIDs are automatically assigned to
this radio.
l Manual: Manually select which available SSIDs and SSID groups to
assign to this radio.
Mode = WIDS Profile Select a WIDS profile from the dropdown list. See WIDS profiles on page
Dedicated 609.
Monitor
Security Type Select Open, WPA/WPA2 Personal, or WPA/WPA2 Enterprise for the WiFi
network.
Test Type Select ping or Iperf for the SAM test type.
Test Server Type Select ip or fqdn for the SAM server type.
Test Server Enter the SAM IP address or the FQDN according to the Test Server Type.
Iperf Protocol Select UDP or TCP for the Iperf test protocol.
Report Interval Enter the SAM report interval in seconds (60-864000, default = 0). Enter 0
(seconds) for a one-time report.
LAN Configuration
Port ESL Mode Select Offline, NAT to WAN, Bridge to WAN, or Bridge to SSID.
Port ESL SSID Available when Port ESL Mode is set to Bridge to SSID. Select the SSID.
WAN Port Mode Enable/disable using a WAN port as a LAN port. Select wan-lan or wan-
only (default = wan-only).
APC FQDN Enter the FQDN of the ESL SES-imagotag Access Point Controller (APC).
FortiPresence
RTLS controller Enter the realtime location services (RTLS) controller server IP address.
server IP
Locate WiFi clients when not Enable/disable locating WiFi client when they are not connected.
connected
Advanced Options Expand to display and set the advanced options. Hover the mouse over
the i icon to view a tooltip of each advanced option.
For more information, refer to the FortiOS CLI Reference.
You can edit, delete, clone and import existing profiles, as well as see where the profile is being used.
To edit a profile:
To delete profiles:
To clone a profile:
To import a profile:
AP profiles can also be imported through the Device Manager. See Importing AP profiles and
FortiSwitch templates on page 159.
QoS profiles
You can create, edit, and import QoS profiles, or view where a profile is used. When you create SSID profiles, you can
select a QoS profile.
4. Enter the following information, and click OK to create the QoS profile:
Max Uplink Speed (VAPs) The maximum uplink speed (VAPs), in Kbps (0 - 2097152, default = 0).
Max Downlink Speed (VAPs) The maximum downlink speed (VAPs), in Kbps (0 - 2097152, default = 0).
Max Uplink Speed (Clients) The maximum uplink speed (Clients), in Kbps (0 - 2097152, default = 0).
Max Downlink Speed The maximum downlink speed (Clients), in Kbps (0 - 2097152, default = 0).
(Clients)
U-APSD Power Save Mode Enable/disable WMM Unscheduled Automatic Power Save Delivery (U-
APSD) power save mode (default = enable).
This option is only available if Wi-Fi MultiMedia is enabled.
Call Admission Control Enable/disable WMM call admission control (default = disable).
This option is only available if Wi-Fi MultiMedia is enabled.
Call Capacity The maximum number of VoWLAN phones allowed (0 - 60, default = 10).
This option is only available if Call Admission Control is enabled.
DSCP Mapping Enable/disable differentiated Services Code Point (DSCP) mapping (default =
disable).
Voice Access DSCP mapping for voice access category (default = 48, 56).
This option is only available if DSCP Mapping is enabled.
Video Access DSCP mapping for video access category (default = 32, 40).
This option is only available if DSCP Mapping is enabled.
Best Effort Access DSCP mapping for best effort access category (default = 0, 24).
This option is only available if DSCP Mapping is enabled.
You can edit, delete, clone and import existing profiles, as well as see where the profile is being used.
To edit a profile:
To delete profiles:
To clone a profile:
To import a profile:
Bonjour profiles
You can create, edit, and import Bonjour profiles, or view where a profile is used.
4. Enter the following information, and then click OK to create the Bonjour profile:
l From VLAN: The VLAN ID that the Bonjour service will be advertised from
You can edit, delete, clone and import existing profiles, as well as see where the profile is being used.
To edit a profile:
To delete profiles:
To clone a profile:
To import a profile:
Bluetooth profiles
You can create, edit, and import Bluetooth profiles, or view where a profile is used. When you create AP profiles, you can
select a Bluetooh profile.
4. Enter the following information, and click OK to create the Bluetooth profile:
iBeacon UUID The iBeacon Universally Unique Identifier (UUID) is automatically assigned,
but can be manually reset (63 characters).
Beacon Interval The beacon interval, in milliseconds (40 - 3500, default = 100).
Advanced Options Enter the eddystone encoded URL hexadecimal string size (54 characters) in
the eddystone-url-encode-hex field.
You can edit, delete, clone and import existing profiles, as well as see where the profile is being used.
To edit a profile:
To delete profiles:
To clone a profile:
To import a profile:
WIDS profiles
The WIDS monitors wireless traffic for a wide range of security threats by detecting and reporting on possible intrusion
attempts. When an attack is detected, a log message is recorded. When you create AP profiles, you can select a WIDS
profile.
Where Used Displays the ADOM where the profile is used as well as the Policy
Package/Block.
4. Enter the following information, and click OK to create the WIDS profile:
Sensor Mode
Disable Enable/disable background scanning during the specified time. Specify the
Background Scan days of week, and the start and end times.
During Specified
Time
Intrusion Type The intrusion types that can be detected. See Intrusion types on page 612.
Threshold If applicable, enter a threshold for reporting the intrusion, in seconds except
where specified.
Interval (Seconds) If applicable, enter the interval for reporting the intrusion, in seconds.
Advanced Options
ap-bgscan- Listening time on a scanning channel, in milliseconds (10 - 1000, default = 20).
duration
ap-bgscan-idle Waiting time for channel inactivity before scanning this channel, in
milliseconds (0 - 1000, default = 0).
ap-bgscan-intv Period of time between scanning two channels, in seconds (1 - 600, default =
1).
ap-bgscan-report- Period of time between background scan reports, in seconds (15 - 600, default
intv = 30).
ap-fgscan-report- Period of time between foreground scan reports, in seconds (15 - 600, default
intv = 15).
deauth-unknown- Threshold value per second to deauthenticate unknown sources for DoS
src-thresh attacks, in seconds (0 - 65535, 0 = no limit, default = 10).
You can edit, delete, clone and import existing profiles, as well as see where the profile is being used.
To edit a profile:
To delete profiles:
To clone a profile:
To import a profile:
2. From the FortiGate dropdown, select a device. The list will include all of the devices in the current ADOM.
3. From the Profiles dropdown, select a profile.
4. Click OK.
Intrusion types
Asleap Attack ASLEAP is a tool used to perform attacks against LEAP authentication.
Association Frame Flooding A Denial of Service attack using association requests. The default detection
threshold is 30 requests in 10 seconds.
Authentication Frame A Denial of Service attack using association requests. The default detection
Flooding threshold is 30 requests in 10 seconds.
EAPOL Packet Flooding Extensible Authentication Protocol over LAN (EAPOL) packets are used in WPA
(to AP) and WPA2 authentication. Flooding the AP with these packets can be a denial of
service attack.
Several types of EAPOL packets can be detected:
l EAPOL-FAIL
l EAPOL-LOGOFF
l EAPOL-START
l EAPOL-SUCC
Invalid MAC OUI Some attackers use randomly-generated MAC addresses. The first three bytes of
the MAC address are the Organizationally Unique Identifier (OUI), administered
by IEEE. Invalid OUIs are logged.
Long Duration Attack To share radio bandwidth, WiFi devices reserve channels for brief periods of time.
Excessively long reservation periods can be used as a denial of service attack.
You can set a threshold between 1000 and 32 767 microseconds. The default is
8200µ.
Null SSID Probe Response When a wireless client sends out a probe request, the attacker sends a response
with a null SSID. This causes many wireless cards and devices to stop
responding.
Premature EAPOL Packet Extensible Authentication Protocol over LAN (EAPOL) packets are used in WPA
Flooding (to client) and WPA2 authentication. Flooding the client with these packets can be a denial
of service attack.
Two types of EAPOL packets can be detected:
l EAPOL-FAIL
l EAPOL-SUCC
Spoofed Deauthentication Spoofed de-authentication frames form the basis for most denial of service
attacks.
Weak WEP IV Detection A primary means of cracking WEP keys is by capturing 802.11 frames over an
extended period of time and searching for patterns of WEP initialization vectors
(IVs) that are known to be weak. WIDS detects known weak WEP IVs in on-air
traffic.
Wireless Bridge WiFi frames with both the FromDS and ToDS fields set indicate a wireless bridge.
This will also detect a wireless bridge that you intentionally configured in your
network.
L3 firewall profiles
Layer 3 firewall rules provide granular access control of client traffic in your wireless network. An L3 firewall profile allows
or denies traffic between wireless clients based on the configured source and destination IP addresses/ports and
specific protocols. The L3 firewall profile must be assigned to an SSID profile.
Where Used View where the selected access control list is used.
Import Import access control lists from a connected FortiGate (toolbar only).
Layer3 IPv4 Rules Click Create New to define access control rules for IPv4 addresses in layer 3.
Select the following, then click OK:
l Rule ID: Enter an ID for the rule.
Layer 3 IPv6 Rules Click Create New to define access control rules for IPv6 addresses in layer 3.
Select the following, then click OK:
l Rule ID: Enter an ID for the rule.
To edit a profile:
To delete profiles:
To clone a profile:
To import a profile:
ARRP profiles
A default Automatic Radio Resource Provisioning (ARRP) profile named arrp-default is available. You can also create
custom ARRP profiles. These ARRP profiles can be assigned in AP profiles. See FortiAP profiles on page 593
4. Enter the following information, and click OK to create the ARRP profile:
Selection Period Period in seconds to measure average channel load, noise floor, spectral
RSSI (0 to 65535, default = 3600).
Monitor Period Period in seconds to measure average transmit retries and receive errors (0 to
65535, default = 300).
Weight Managed AP Weight in DARRP channel score calculation for managed APs (0 to 65535,
default = 50).
Weight Rogue AP Weight in DARRP channel score calculation for rogue APs (0 to 2000, default
= 10).
Weight Noise Floor Weight in DARRP channel score calculation for noise floor (0 to 2000, default
= 40).
Weight Channel Load Weight in DARRP channel score calculation for channel load (0 to 2000,
default = 20).
Weight Spectral RSSI Weight in DARRP channel score calculation for spectral RSSI (0 to 2000,
default = 40).
Weight Weather Channel Weight in DARRP channel score calculation for weather channel (0 to 2000,
default = 1000).
Weight DFS Channel Weight in DARRP channel score calculation for DFS channel (0 to 2000,
default = 500).
Threshold Noise Floor Threshold in dBm to reject channel in DARRP channel selection phase 1 due
to noise floor (default = -85).
Threshold Channel Load Threshold in percentage to reject channel in DARRP channel selection phase
1 due to channel load (0 to 100, default = 60).
Threshold Spectral RSSI Threshold in dBm to reject channel in DARRP channel selection phase 1 due
to spectral RSSI (default = -65).
Threshold TX Retries Threshold in percentage for transmit retries to trigger channel reselection in
DARRP monitor stage (0 to 1000, default = 300).
Threshold RX Errors Threshold in percentage for receive errors to trigger channel reselection in
DARRP monitor stage (0 to 100, default = 50).
Include Weather Channel Enable/disable use of weather channel in DARRP channel selection phase 1
(default = disable).
Include DFS Channel Enable/disable use of DFS channel in DARRP channel selection phase 1
(default = disable).
Advanced Options Expand to display and set the advanced options. Hover the mouse over the i
icon to view a tooltip of each advanced option.
For more information, refer to the FortiOS CLI Reference.
You can edit, delete, clone and import existing profiles, as well as see where the profile is being used.
To edit a profile:
To delete profiles:
To clone a profile:
To import a profile:
WiFi settings
You can create a profile of WiFi settings. After you create the profile, assign the profile to devices, and install the
changes to devices. You can assign WiFi settings profiles to FortiGate VDOMs.
Assign to Device/Group Assign the selected WiFi settings profile to one or more devices.
5. Enter the following information, and click OK to create the WiFi settings profile:
Duplicate SSID Enable/disable allowing Virtual Access Points (VAPs) to use the same SSID
name in the same VDOM (default = disable).
DARRP Optimize Enter the time for running Dynamic Automatic Radio Resource Provisioning
(DARRP) (0 to 86400, default = 86400).
Advanced Options Expand to display and set the advanced options. Hover the mouse over the i
icon to view a tooltip of each advanced option.
For more information, refer to the FortiOS CLI Reference.
Contact Info Enter the contact information for the contact information for the SNMP
(maximum 31 characters).
Trap High Enter CPU usage when trap is sent (10 to 100, default = 80).
CPU threshold
Trap High MEM Enter the memory usage when trap is sent (10 to 100, default = 80).
threshold
To edit a profile:
To delete profiles:
To clone a profile:
To import a profile:
You use the AP Manager pane to assign AP profiles to FortiAP devices. Use the Install Wizard to install profiles to
FortiAP devices when you install a configuration to the FortiGate that controls the FortiAP device.
For more information about creating and managing AP profiles, see FortiAP profiles on page 593.
FortiManager includes factory default SSID and FortiAP profiles recommended by Fortinet.
The Fortinet recommended profiles are based on Fortinet security best practices, and they are created based on the
most relevant network topologies Fortinet sees with customer implementation. The configuration is validated by Fortinet
field engineers and security experts.
The following Fortinet recommended FortiAP profiles and SSIDs are available:
AP Profiles SSIDs
l Basic_Data_Fortinet_Default l Enterprise_Fortinet_Default
l High_Throughput_Data_Dual5GHz_Fortinet_ l Guest_Fortinet_Default
Default l IoT_Fortinet_Default
l High_Throughput_Data_Fortinet_Default l Voice_Fortinet_Default
l RTLS_Presence_Fortinet_Default
l Voice_Enterprise_Fortinet_Default
You can use recommended templates by activating them from the AP Manager > Operation Profiles > FortiAP Profiles
and AP Manager > SSIDsmenu in FortiManager and then configuring them to meet your requirements.
This topic includes the following information:
l Fortinet recommended SSID profiles on page 624
l Fortinet recommended FortiAP profiles on page 626
2. Right click on a recommended SSID and click View to view its details.
4. Enter a name for the SSID and configure the remaining settings as needed.
5. Assign the SSID to an AP profile, and then assign the AP profile to a FortiAP.
1. Go to AP Manager > Operation Profiles > FortiAP Profiles to view the default FortiAP profiles.
2. Right click on a recommended AP profile and click View to view its details.
3. Right-click on a recommended profile and click Activate.
When per-device management is enabled, you can configure changes on each managed access point.
The following steps provide an overview of using per-device access point management:
1. Enable per-device management. See Enabling FortiAP per-device management on page 626.
2. Configure profiles for each managed access point. See Creating profiles on page 627.
3. Install changes to managed access points. See Installing changes to FortiAP devices on page 570.
When per-device management is enabled, you can configure changes on each managed FortiAP.
3. Beside Central Management, clear the FortiAP checkbox, and click OK.
Central management is disabled, and per-device management is enabled for AP Manager.
Creating profiles
To create profiles:
Use the VPN Manager pane to enable and use central VPN management. You can view and configure IPsec VPN and
SSL-VPN settings that you can install to one or more devices.
After you use VPN Manager to configure VPN for FortiGates in the ADOM, it is not recommended to move the FortiGate
devices to another ADOMs because the VPN settings are for the specific ADOM.
Additional configuration options and short-cuts are available using the right-click content
menu. Right-click the mouse on different parts of the navigation panes on the GUI page to
access these context menus.
The VPN Manager pane includes the following in the tree menu:
IPsec VPN Communities Displays all of defined IPsec VPN communities and associated devices for the
selected ADOM. You can create, monitor, and manage VPN settings. See IPsec
VPN Communities on page 644
IPsec VPN Map Displays an IPsec VPN map by topology view or traffic view. See Using Map View
on page 659.
SSL-VPN Setting View and manage SSL VPN settings. See SSL VPN settings on page 661.
SSL VPN Portals View and create SSL VPN portal profiles. See SSL VPN portals on page 664
SSL VPN Monitor View the SSL VPN monitor. See SSL VPN monitor on page 670
Overview
When central VPN management is enabled, you can use the VPN Manager pane to configure IPsec VPN settings that
you can install to one or more devices. The settings are stored as objects in the objects database. You can then select
the objects in policies for policy packages on the Policy & Objects pane. You install the IPsec VPN settings to one or
more devices by installing the policy package to the devices.
You must enable central VPN management to access the settings on the VPN Manager >
IPsec VPN Communities pane. However, you can access the settings on the SSL-VPN panes
without enabling central VPN management. See Enabling central VPN management on page
629.
You can also configure VPN settings directly on a FortiGate by using Device Manager, and the configuration is stored in
the device database. When you create a VPN configuration by using VPN Manager, FortiManager copies the VPN
configuration from the objects database to the device database before installing the configuration to FortiGates. In
addition, FortiManager checks for differences between the configuration in the device database and the configuration on
FortiGate. If any differences are found, FortiManager only installs the configuration differences to FortiGate. This
process helps avoid conflicts.
If you are using both Device Manager and VPN Manager to configure VPN settings, you
should avoid using Device Manager to modify the settings created by VPN Manager, because
when installing a policy package again, the settings from VPN Manager will override the
previous changes to those settings from Device Manager. Device Manager should only be
used to create or modify VPN configurations that are not created by VPN Manager.
1. Enable central VPN management. See Enabling central VPN management on page 629.
2. Create a VPN community, sometimes called a VPN topology. See Creating IPsec VPN communities on page 645.
3. Create a managed gateway. See Creating managed gateways on page 653.
1. Create custom profiles. See Creating SSL VPN portal profiles on page 664.
Alternately, you can skip this step, and use the default portal profiles.
2. Add an SSL VPN to a device, and select a portal profile. See Creating SSL VPNs on page 662.
1. Plan the VPN security policies. See VPN security policies on page 671.
2. In a policy package, create VPN security policies, and select the VPN settings. See Creating policies on page 350.
3. Edit the installation targets for the policy package to add all of the devices onto which you want to install the policy
defined VPN settings. See Policy package installation targets on page 344.
4. Install the policy package to the devices. See Install a policy package on page 340.
You can enable centralized VPN management from the VPN Manager > IPsec VPN pane.
You can also enable centralized VPN management by editing an ADOM. When ADOMs are disabled, you can enable
centralized VPN management by using the Dashboard pane.
Regardless of how you enable centralized VPN management, you use the VPN Manager module for centralized VPN
management.
1. Go to Dashboard.
2. In the System Information widget, in the VPN Management Mode field, select Change VPN Management Mode.
The Change VPN Management Mode dialog box is displayed.
3. Click OK.
DDNS support
When Dynamic DNS (DDNS) is enabled on FortiGates, VPN Manager supports DDNS. First VPN Manager searches for
the interface IP for IPsec Phase2. If no IP is found, then VPN Manager searches for DDNS.
You can use FortiManager and the CLI Configurations menu to enable DDNS on each FortiGate device. The CLI
Configurations menu is available in the Device Manager pane. See Device DB - CLI Configurations on page 205.
With the CLI Configurations menu, you can use the config system ddns command to enable DDNS on a per-device
basis. The selected monitoring interface must be the interface that supports your tunnel, for example:
config system ddns
edit 1
set ddns-server FortiGuardDDNS
set ddns-domain "<HOST1>.fortiddns.com"
set monitor-interface "port14"
next
end
You can also use the CLI Configurations menu to configure DDNS on multiple FortiGate interfaces. Once configured,
you can use FortiManager to view all the DDNS entries, but you cannot edit the entries.
Following is an example of how to configure DDNS on multiple FortiGates by using the CLI Configurations menu:
config system ddns
edit 1
set ddns-server FortiGuardDDNS
set ddns-domain "<HOST1>.fortiddns.com"
set use-public-ip enable
set monitor-interface "wan"
next
edit 2
set ddns-server FortiGuardDDNS
set ddns-domain "<HOST2>.fortiddns.com"
set use-public-ip disable
set monitor-interface "wwan"
next
end
Multiple DDNS entries are useful when using SDWAN and multiple broadband links.
FortiManager VPN Setup Wizard supports device groups, allowing you to optimize a large number of firewalls as spokes
in a VPN community.
When a device group is used in a VPN topology, FortiManager resolves the device group to individual members, and
then applies the same logic to generate Phase1/Phase2 information. Keep the following restrictions in mind:
l VPN Manager only supports the use of device groups for the following hub and spoke topologies: star and dialup.
l VPN manager only supports the use of device groups for devices in the spoke role.
This document provide a sample configuration of hub and spoke (star topology) with VPN Manager and a device group.
Create protected subnet firewall addresses for hub and spoke devices. VPN Manager can use the protected subnet
firewall address to create static routes on FortiGate units to allow traffic destined for the remote protected network to
pass through the VPN tunnel.
3. Create a protected subnet firewall address for the hub FortiGate, and click OK.
1. Go to VPN Manager > IPsec VPN Communities, and click Create New.
The VPN Topology Setup Wizard opens.
2. In the Name box, type a name, such as star.
3. Under Choose VPN Topology, select Star, and click Next.
1. Go to VPN Manager > IPsec VPN Communities, and click the community that you created.
The community opens in the content pane.
2. Click Create New > Managed Gateway.
The VPN Gateway Setup Wizard opens for the community.
3. Set the Protected Network options, and then click Next:
a. Beside Protected Subnet, click Click here to select, and select the protected subnet.
1. Go to VPN Manager > IPsec VPN Communities, and click the community that you created.
The community opens in the content page.
2. Click Create New > Managed Gateway.
The VPN Gateway Setup Wizard opens for the community.
Create firewall policies for hub and spoke FortiGates, and then install the configurations by using the Install Wizard.
4. Select Install Policy Package & Device Settings, and then click Next.
You can remove a spoke member from a VPN community by removing the device from the device group, and then
installing the configuration change to the FortiGates.
The Install Preview page shows that FortiManager will delete related configurations on the spoke FortiGate named
vlan181_0085.
You can add a spoke member to a VPN community by adding the device to the device group, and then installing the
configuration change to the FortiGates.
3. Execute Policy package installation to push VPN config to HUB and newly added spoke devices.
For example, the Install Preview page shows that FortiManager will install IPsec VPN configuration to the new
spoke member. In this example, the new spoke member is named BranchOffice6.
IPsec VPN
In the VPN Management > IPsec VPN Communities pane, you can create and monitor full-meshed, star, and dial-up
IPsec VPN communities. IPsec VPN communities are also sometimes called VPN topologies.
Select All Communities from the dropdown in the toolbar to view the community list or select a specific community for the
details page for that community.
Install Wizard Launch the Install Wizard to install IPsec VPN settings to devices.
Create New Create a new VPN community. See Creating IPsec VPN communities on page
645
Edit Edit the selected VPN community. See Editing an IPsec VPN community on page
652.
Delete Delete the selected VPN community or communities. See Deleting VPN
communities on page 653.
Column Settings Configure which columns are displayed, or click Reset to Default to reset the
display to the default columns.
Configure Gateways Go to the gateway list for the community. This option is only available from the
right-click menu. See IPsec VPN gateways on page 653.
Add Managed Gateway Start the VPN Gateway Setup Wizard. This option is only available from the right-
click menu. See Creating managed gateways on page 653.
You can create one or more IPsec VPN communities. An IPsec VPN community is also sometimes called a VPN
topology. A VPN Topology Setup Wizard is available to help you set up topologies.
After you create the IPsec VPN community, you can create the VPN gateway. See IPsec VPN gateways on page 653.
1. Go to VPN Manager > IPsec VPN Communities and click the All Communities.
2. Click Create New in the content pane toolbar.
The VPN Topology Setup Wizard is displayed.
l Dial up: Some gateways, often mobile users, have dynamic IP addresses and contact the gateway to establish
a tunnel.
6. Click Next.
For descriptions of the options in the wizard, see VPN community settings on page 647.
The following table describes the options available in the VPN Topology Setup Wizard and on the Edit VPN Community
page.
Encryption Define the IKE Profile. Configure IKE Phase 1 and IKE Phase 2 settings.
three keys.
l AES128: A 128-bit block Cipher Block Chaining (CBC) algorithm that
key.
l DES: Digital Encryption Standard, a 64-bit block algorithm that uses
a 56-bit key.
l SEED: A 16-round Feistel network with 128-bit blocks and a 128-bit
key.
Select either of the following authentication message digests to check the
authenticity of messages during phase 1 negotiations:
l MD5: Message Digest 5, the hash algorithm developed by RSA Data
Security.
l SHA1: Secure Hash Algorithm 1, which produces a 160-bit message
digest.
l SHA256: Secure Hash Algorithm 2, which produces a 256-bit
message digest.
l SHA384: Secure Hash Algorithm 3, which produces a 384-bit
message digest.
l SHA512: Secure Hash Algorithm 3, which produces a 512-bit
message digest.
Note: If the encryption is GCM or CHACHA20POLY1305, the
authentication options are PRFSHA1, PRFSHA256, PRFSHA384, and
PRFSHA512.
To specify more combinations, use the Add button beside any of the table
rows.
Network Overlay When network overlay is enabled, FOS allows the creation of VPN IPsec
Phase 1 interfaces with the same remote gateway and interface.
You can specify the VPN gateway network ID in the Network Overlay
ID field.
This setting is only available if the IKE version is set to 2.
three keys.
l AES128: A 128-bit block Cipher Block Chaining (CBC) algorithm that
key.
l DES: Digital Encryption Standard, a 64-bit block algorithm that uses
a 56-bit key.
l NULL: Do not use an encryption algorithm.
key.
Select either of the following authentication message digests to check the
authenticity of messages during phase 1 negotiations:
l NULL: Do not use a message digest.
Security.
l SHA1: Secure Hash Algorithm 1, which produces a 160-bit message
digest.
l SHA256: Secure Hash Algorithm 2, which produces a 256-bit
message digest.
l SHA384: Secure Hash Algorithm 3, which produces a 384-bit
message digest.
l SHA512: Secure Hash Algorithm 3, which produces a 512-bit
message digest.
Note: If the encryption is GCM or CHACHA20POLY1305, no
authentication options can be selected.
To specify more combinations, use the Add button beside any of the table
rows.
VPN Zone Select to create VPN zones. When enabled, you can select to create
default or custom zones. When disabled, no VPN zones are created.
Create Default Zones Select to have default zones created for you.
Diffie Hellman Select one or more of the following Diffie-Hellman (DH) groups: 1, 2, 5,
Group(s) 14, 15, 16, 17, 18, 19, 20, 21, 27, 28, 29, 30, 31.
At least one of the DH group settings on the remote peer or client must
match one the selections on the FortiGate unit. Failure to match one or
more DH groups will result in failed negotiations.
Only one DH group is allowed for static and dynamic DNS gateways in
aggressive mode.
Key Life Type the time (in seconds) that must pass before the IKE encryption key
expires. When the key expires, a new key is generated without
interrupting service. The keylife can be from 120 to 172800 seconds.
Dead Peer Select this checkbox to reestablish VPN tunnels on idle connections and
Detection clean up dead IKE peers if required. You can use this option to receive
notification whenever a tunnel goes up or down, or to keep the tunnel
connection open when no traffic is being generated inside the tunnel. For
example, in scenarios where a dialup client or dynamic DNS peer
connects from an IP address that changes periodically, traffic may be
suspended while the IP address changes.
Diffie Hellman Select one or more of the following Diffie-Hellman (DH) groups: 1, 2, 5,
Group(s) 14, 15, 16, 17, 18, 19, 20, 21, 27, 28, 29, 30, 31.
At least one of the DH group settings on the remote peer or client must
match one the selections on the FortiGate unit. Failure to match one or
more DH groups will result in failed negotiations.
Only one DH group is allowed for static and dynamic DNS gateways in
aggressive mode.
Replay detection Select to enable or disable replay detection. Replay attacks occur when
an unauthorized party intercepts a series of IPsec packets and replays
them back into the tunnel.
Key Life Select the PFS key life. Select Second, Kbytes, or Both from the
dropdown list and type the value in the text field.
NAT Traversal Select the checkbox if a NAT device exists between the local FortiGate
unit and the VPN peer or client. The local FortiGate unit and the VPN peer
or client must have the same NAT traversal setting (both selected or both
cleared) to connect reliably.
Keep-alive Frequency If NAT traversal is enabled or forced, type a keep-alive frequency setting
(10-900 seconds).
Advanced-Options For more information on advanced options, see the FortiOS CLI
Reference.
loccalid-type Select the local ID type from the dropdown list. Select one of:
l address: IP Address
The VPN community information pane includes a quick status bar showing the community settings and the list of
gateways in the community. Gateways can also be managed from this pane. See IPsec VPN gateways on page 653 for
information.
2. Select All Communities from the dropdown to return to the VPN community list.
To edit a VPN community, you must be logged in as an administrator with sufficient privileges. The community name and
topology cannot be edited.
For descriptions of the settings, see VPN community settings on page 647.
To delete a VPN community or communities, you must be logged in as an administrator with sufficient privileges.
A VPN gateway functions as one end of a VPN tunnel. It receives incoming IPsec packets, decrypts the encapsulated
data packets, then passes the data packets to the local network. It also encrypts, encapsulates, and sends the IPsec
data packets to the gateway at the other end of the VPN tunnel.
The IP address of a VPN gateway is usually the IP address of the network interface that connects to the Internet. You
can also define a secondary IP address for the interface, and use that address as the local VPN gateway address, so
that your existing setup is not affected by the VPN settings.
Once you have created the IPsec VPN topology, you can create managed and external gateways.
Go to VPN Manager > IPsec VPN Communities, then right-click a community to configure or add managed gateways for
the selected community.
When Configure Gateways is selected for a community from the right-click menu, the following options are available.
Create New Create a new managed or external gateway. See Creating managed gateways on
page 653 and Creating external gateways on page 658 for more information.
Edit Edit the selected gateway. See Editing an IPsec VPN gateway on page 659.
Delete Delete the selected gateway or gateways. See Deleting VPN gateways on page
659.
Column Settings Configure which columns are displayed, or click Reset to Default to reset the
display to the default columns.
The settings available when creating a managed gateway depend on the VPN topology type, and how the gateway is
configured.
Managed gateways are managed by FortiManager in the current ADOM. Devices in a different ADOM can be treated as
external gateways. VPN configuration must be handled manually by the administrator in that ADOM. See Creating
external gateways on page 658.
3. Proceed through the five pages of the wizard, filling in the following values as required, then click OK to create the
managed gateway.
Default VPN Interface Select the interface to use for this gateway from the drop-down list.
Hub-to-Hub Interface Select the interface to use for hub to hub communication. This is required if
there are multiple hubs.
This option is only available for star and dial up topologies with the role set to
Hub.
Routing Select the routing method: Manual (via Device Manager), or Automatic.
Summary Network(s) Select the network from the dropdown list and select the priority. Click the add
icon to add more entries.
This option is only available for star and dial up topologies with the role set to
Hub.
l Accept this peer ID: Enter the peer ID in the text field
l Accept peer group: Select a peer group from the drop-down list
XAUTH Type Select the XAUTH type: Disable, PAP Server, CHAP Server, or AUTO Server.
This option is only available for dial up topologies.
User Group Select the authentication user group from the dropdown list.
This field is available when XAUTH Type is set to PAP Server, CHAP Server,
or AUTO Server.
When the FortiGate unit is configured as an XAuth server, enter the user
group to authenticate remote VPN peers. The user group can contain local
users, LDAP servers, and RADIUS servers. The user group must be added to
the FortiGate configuration before the group name can be cross referenced.
Add Route Select to enable or disable adding a route for this gateway.
This option is only available for dial up topologies.
DNS Server #1 to #3 Enter the DNS server IP addresses to provide IKE Configuration Method to
clients.
This option is only available for dial up topologies with the role set to Hub and
either Enable IKE Configuration Method turned on, or DNS Service is set to
Specify.
WINS Server #1 and #2 Enter the WINS server IP addresses to provide IKE Configuration Method to
clients.
This option is only available for dial up topologies with the role set to Hub and
Enable IKE Configuration Method turned on.
IPv4 Split include Select the address or address group from the dropdown list.
This option is only available for dial up topologies with the role set to Hub and
Enable IKE Configuration Method turned on.
Exclusive IP Range Enter the start and end IP addresses of the exclusive IP address range. Click
the add icon to add more entries.
This option is only available for dial up topologies with the role set to Hub and
either Enable IKE Configuration Method and Enable IP Assignment turned on,
or Enable IKE Configuration Method turned off.
DNS Service Select Use System DNS setting to use the system's DNS settings, or Specify
to specify DNS servers #1 to #3.
This option is only available for dial up topologies with the role set to Hub and
Enable IKE Configuration Method turned off.
DHCP Server IP Range Enter the start and end IP addresses of the DHCP server range. Click the add
icon to add more entries.
This option is only available for dial up topologies with the role set to Hub and
Enable IKE Configuration Method turned off.
Advanced Options
authusr Enter the XAuth client user name for the FortiGate.
route-overlap Select the route overlap method from the dropdown list: allow, use-new, or
use-old.
vpn-interface- Set the VPN gateway interface priority. The default value is 1.
priority
4.
5. Configure the following settings, then click OK to create the external gateway:
Create Phase2 per Protected Toggle the switch to On to create a phase2 per protected subnet pair.
Subnet Pair
Routing Select the routing method: Manual (via Device Manager, or Automatic.
This option is only available for full meshed and star topologies.
l Accept this peer ID: Enter the peer ID in the text field
When you configure the ID on your end, it is your local ID. When the remote
end connects to you, they see it as your peer ID. If you are debugging a VPN
connection, the local ID is part of the VPN negotiations. You can use it to help
troubleshoot connection problems.
The default configuration is to accept all local IDs (peer IDs). If your local ID is
set, the remote end of the tunnel must be configured to accept your ID.
This option is only available for dial up topologies.
Protected Subnet Select a protected subnet from the list. You can add multiple subnets.
To edit a VPN gateway, you must be logged in as an administrator with sufficient privileges. The gateway role and device
(if applicable) cannot be edited.
To delete a VPN gateway or gateways, you must be logged in as an administrator with sufficient privileges.
The IPsec VPN Map pane shows IPsec VPN connections on an interactive world map (Google Maps). Select a specific
community from the tree menu to show only that community's tunnels.
Hovering the cursor over a connection will highlight the connection and show the gateway, ADOM, and city names for
each end of the tunnel.
Topology View The topology view shows the configured VPN gateways. See IPsec VPN
gateways on page 653.
Traffic View The traffic view shows network traffic through the tunnels between protected
subnets.
Show Table Select to show the connection table on the bottom of the pane. In the topology
view, this option is only available when a specific community is selected.
l The topology table shows the VPN gateway list and toolbar, with a column
added for location. See Managing VPN gateways on page 653 for
information.
l The traffic table shows the same information and options as the Monitor tab.
You can filter the VPN monitor table view. For example, you
can use the greater than (>) or less than (<) signs on the
incoming/outgoing bandwidth columns.
Show Tunnel Down Only Select to show only tunnels that are currently down.
This option is only available on the traffic view.
Refresh Click to refresh the map view, or click the down arrow and select a refresh rate
from the dropdown menu.
If necessary, the location of a device can be manually configured when editing the device; see
Editing device information on page 138.
Go to VPN Manager > IPsec VPN Communities, right-click a community and click Monitor.
SSL VPN
You can use the VPN Manager > SSL-VPN pane to create and monitor Secure Sockets Layer (SSL) VPNs. You can also
create and manage SSL VPN portal profiles.
SSL VPN includes the following topics:
l SSL VPN settings on page 661
l SSL VPN portals on page 664
l SSL VPN monitor on page 670
Go to VPN Manager > SSL VPN Settings to manage SSL VPN settings.
The following options are available:
Install Wizard Launch the Install Wizard to install SSL VPN settings to devices.
Create New Create a new SSL VPN with the Create SSL VPN Settings pane. See Creating
SSL VPNs on page 662.
Edit Edit the selected VPN. This option is also available from the right-click menu. See
Editing SSL VPNs on page 663.
Delete Delete the selected VPN or VPNs. This option is also available from the right-click
menu. See Deleting SSL VPNs on page 663.
Column Settings Configure which columns are displayed, or click Reset to Default to reset the
display to the default columns.
To create SSL VPNs, you must be logged in as an administrator with sufficient privileges. Multiple VPNs can be created.
To add SSL-VPN:
Listen on Define the interface the FortiGate will use to listen for SSL VPN tunnel
Interface(s) requests. This is generally your external interface.
Restrict Access Allow access from any hosts, or limit access to specific hosts. If limiting
access, select the hosts that have access in the Hosts field.
Idle Logout Select to enable idle timeout. When enabled, enter the amount of time that
the connection can remain inactive before timing out in theInactive For
field, in seconds(10 - 28800, default = 300).
This setting applies to the SSL VPN session. The interface does not time
out when web application sessions or tunnels are up.
Server Certificate Select the signed server certificate to use for authentication. Alternately,
select a certificate template that is configured to use the FortiManager CA.
See Certificate templates on page 288.
Require Client Select to use group certificates for authenticating remote clients. When the
Certificate remote client initiates a connection, the FortiGate unit prompts the client for
its client-side certificate as part of the authentication process. For
information on using PKI to provide client certificate authentication, see the
Authentication Guide.
Tunnel Mode Client Settings Specify tunnel mode client settings. These settings determine how tunnel
mode clients are assigned IP addresses.
DNS Server Select to use the same DNS as the client system, or to specify DNS
servers. Enter up to two DNS servers to be provided for the use of clients.
Specify WINS Select to specify WINS servers. Enter up to two WINS servers to be
Servers provided for the use of clients.
Authentication/Portal Mapping Select the users and groups that can access the tunnel.
Note: the default portal cannot be empty.
Create New Create a new authentication/portal mapping entry. Select the Users,
Groups, Realm, and Portal, then click OK.
Advanced Options Configure advanced SSL VPN options. For information, see the FortiOS
CLI Reference.
To edit an SSL VPN, you must be logged in as an administrator with sufficient privileges. The device cannot be edited.
To delete an SSL VPN or VPNs, you must be logged in as an administrator with sufficient privileges.
The SSL VPN portal enables remote users to access internal network resources through a secure channel using a web
browser. FortiGate administrators can configure login privileges for system users as well as the network resources that
are available to the users.
There are three pre-defined default portal profiles:
l Full-access
l Tunnel-access
l Web-access
Each portal type includes similar configuration options. You can also create custom portal profiles.
To manage portal profiles, go to VPN Manager > SSL VPN Portals.
To create SSL VPN portal profiles, you must be logged in as an administrator with sufficient privileges. Multiple profiles
can be created.
Limit Users to One SSL VPN Set the SSL VPN tunnel so that each user can only be logged in to the tunnel
Connection at a Time one time per user log in. Once they are logged in to the portal, they cannot go
to another system and log in with the same credentials until they log out of the
first connection.
Tunnel Mode Select to configure and enable tunnel mode access. These settings determine
how tunnel mode clients are assigned IPv4 addresses.
Routing Address If you enable split tunneling, you are required to set the address that your
Override corporate network is using. Traffic intended for the routing address will not be
split from the tunnel.
Source IP Pools Select an IPv4 pool for users to acquire an IP address when connecting to the
portal. There is always a default pool available if you do not create your own.
IPv6 Tunnel Mode Select to configure and enable tunnel mode access. These settings determine
how tunnel mode clients are assigned IPv6 addresses.
IPv6 Routing If you enable split tunneling, you are required to set the address that your
Address Override corporate network is using. Traffic intended for the routing address will not be
split from the tunnel.
Source IPv6 Pools Select an IPv6 pool for users to acquire an IP address when connecting to the
portal. There is always a default pool available if you do not create your own.
Tunnel Mode Client Options These options affect how the FortiClient application behaves when connected
to the FortiGate VPN tunnel. When enabled, a checkbox for the corresponding
option appears on the VPN log in screen in FortiClient, and is disabled by
default.
Allow client to The user's password is stored on the user’s computer and will automatically
save password populate each time they connect to the VPN.
Allow client to When the FortiClient application is launched, for example after a reboot or
connect system start up, FortiClient will automatically attempt to connect to the VPN
automatically tunnel.
Allow client to The FortiClient connection will not shut down. When not selected, during
keep connections periods of inactivity, FortiClient will attempt to stay connected every three
alive minutes for a maximum of 10 minutes.
Landing page Select Default or Custom. When Custom is selected, you can specify the
landing page URL and Logout URL.
Portal Message The text header that appears on the top of the web portal.
Theme A color styling specifically for the web portal: blue, green, mariner, melongene,
or red.
Show Session Display the Session Information widget on the portal page. The widget
Information displays the log in name of the user, the amount of time the user has been
logged in, and the inbound and outbound traffic statistics.
Show Connection Display the Connection Launcher widget on the portal page. Use the widget to
Launcher connect to an internal network resource without adding a bookmark to the
bookmark list. You select the type of resource and specify the URL or IP
address of the host computer.
Show Login Include user log in history on the web portal, then specify the number of history
History entries.
Download Method Select the method to use for downloading FortiClient from the SSL VPN portal.
Choose between Direct and SSL-VPN Proxy.
This option is only available when Enable FortiClient Download is On.
Customize Select to specify a custom location to use for downloading FortiClient. You can
Download specify a location for FortiClient (Windows) and FortiClient (Mac). Type the
Location URL in the Windows box and/or Mac box.
This option is only available when Enable FortiClient Download is On.
Advanced Options Configure advanced options. For information, see the FortiOS CLI Reference.
Predefined bookmarks
Bookmarks are used as links to specific resources on the network. When a bookmark is selected from a bookmark list, a
window opens with the requested web page. RDP and VNC open a window that requires a browser plug-in. FTP
replaces the bookmark page with an HTML file-browser.
A web bookmark can include log in credentials to automatically log the SSL VPN user into the web site. When the
administrator configures bookmarks, the web site credentials must be the same as the user’s SSL VPN credentials.
Users configuring their own bookmarks can specify alternative credentials for the web site.
Predefined bookmarks can be added to portal profiles when creating or editing a profile.
Type Select the bookmark type: CITRIX, FTP, HTTP/HTTPS, Port Forward, RDP,
SMB, SSH, Telnet, or VNC.
URL Enter the bookmark URL. This option is only available when Type is Citrix, or
HTTP/HTTPS.
Keyboard Layout Select the keyboard layout: German (QWERTZ), English (US), Unknown,
French (AZERTY), Italian, or Swedish.
This option is only available when Type is RDP.
Security Select the security type: Allow the server to choose the type of security,
Network Level Authentication, Standard RDP encryption, or TLS encryption.
This option is only available when Type is RDP.
Single Sign-on Select the SSO setting for links that require authentication: Disabled,
Automatic, or Static.
If Static is selected, click the add icon, then enter the Name and Value to add
SSO Form Data. Multiple fields can be added. Click Remove to remove a field.
When including a link using SSO use the entire URL, not just the IP address.
This option is only available when Type is Citrix, FTP, HTTP/HTTPS, RDP, or
SMB.
The Static option is only available when Type is Citrix, HTTP/HTTPS, or RDP.
To edit a bookmark:
To delete a bookmark:
To edit a portal profile, you must be logged in as an administrator with sufficient privileges. The device cannot be edited.
To delete a portal profile or profiles, you must be logged in as an administrator with sufficient privileges.
SSL VPNs can be monitored by going to VPN Manager > SSL VPN Monitor.
The following information is shown:
Once you have defined the IP source and destination addresses, the phase 1 authentication parameters, and the phase
2 parameters, you must define the VPN security policies.
FortiGate unit VPNs can be policy-based or route-based. There is little difference between the two types. In both cases,
you specify phase 1 and phase 2 settings. However there is a difference in implementation. A route-based VPN creates
a virtual IPsec network interface that applies encryption or decryption as needed to any traffic that it carries. That is why
route-based VPNs are also known as interface-based VPNs. A policy-based VPN is implemented through a special
security policy that applies the encryption you specified in the phase 1 and phase 2 settings.
An IPsec security policy enables the transmission and reception of encrypted packets, specifies the permitted direction
of VPN traffic, and selects the VPN tunnel. In most cases, only a single policy is needed to control both inbound and
outbound IP traffic through a VPN tunnel.
For a route-based VPN, you create two security policies between the virtual IPsec interface and the interface that
connects to the private network. In one policy, the virtual interface is the source. In the other policy, the virtual interface is
the destination. The Action for both policies is Accept. This creates bidirectional policies that ensure traffic will flow in
both directions over the VPN.
For a policy-based VPN, one security policy enables communication in both directions. You must select IPSEC as the
Action and then select the VPN tunnel dynamic object you have mapped to the phase 1 settings. You can then enable
inbound and outbound traffic as needed within that policy, or create multiple policies of this type to handle different types
of traffic differently. For example HTTPS traffic may not require the same level of scanning as FTP traffic.
A VPN tunnel has two end points. These end points may be VPN peers, such as two FortiGate gateways. Encrypted
packets are transmitted between the end points. At each end of the VPN tunnel, a VPN peer intercepts encrypted
packets, decrypts the packets, and forwards the decrypted IP packets to the intended destination.
You need to define firewall addresses for the private networks behind each peer. You will use these addresses as the
source or destination address depending on the security policy.
In general:
l In a gateway-to-gateway, hub-and-spoke, dynamic DNS, redundant-tunnel, or transparent configuration, you need
to define a policy address for the private IP address of the network behind the remote VPN peer.
l In a peer-to-peer configuration, you need to define a policy address for the private IP address of a server or host
behind the remote VPN peer.
Security policies allow IP traffic to pass between interfaces on a FortiGate unit. You can limit communication to particular
traffic by specifying source and destination addresses. Then only traffic from those addresses will be allowed.
Policy-based and route-based VPNs require different security policies.
A policy-based VPN requires an IPsec security policy. You specify the interface to the private network, the interface to
the remote peer and the VPN tunnel. A single policy can enable traffic inbound, outbound, or in both directions.
A route-based VPN requires an Accept security policy for each direction. As source and destination interfaces, you
specify the interface to the private network and the virtual IPsec interface of the VPN. The IPsec interface is the
destination interface for the outbound policy and the source interface for the inbound policy. One security policy must be
configured for each direction of each VPN interface.
If the security policy that grants the VPN connection is limited to certain services, DHCP must be included, otherwise the
client will not be able to retrieve a lease from the FortiGate’s (IPsec) DHCP server because the DHCP request (coming
out of the tunnel) will be blocked.
Before you define the IPsec policy, you must:
l Define the IP source and destination addresses.
l Specify the phase 1 authentication parameters.
l Specify the phase 2 parameters.
l Create a VPN Tunnel dynamic object (policy-based VPNs only).
You must define at least one IPsec policy for each VPN tunnel. If the same remote server or client requires access to
more than one network behind a local FortiGate unit, the FortiGate unit must be configured with an IPsec policy for each
network. Multiple policies may be required to configure redundant connections to a remote destination or control access
to different services at different times.
To ensure a secure connection, the FortiGate unit must evaluate IPSEC policies before ACCEPT and DENY security
policies. Because the FortiGate unit reads policies starting at the top of the list, you must move all IPsec policies to the
top of the list. When you define multiple IPsec policies for the same tunnel, you must reorder the IPsec policies that apply
to the tunnel so that specific constraints can be evaluated before general constraints.
When you define a route-based VPN, you create a virtual IPsec interface on the physical interface that connects to the
remote peer. You create ordinary Accept security policies to enable traffic between the IPsec interface and the interface
that connects to the private network. This makes configuration simpler than for policy-based VPNs, which require IPsec
security policies.
See Managing policies on page 349 for information on creating policies on your FortiManager.
The Fabric View module enables you to view Security Fabric Ratings of configurations for FortiGate Security Fabric
groups as well as create fabric connectors. The Fabric View tab is available in version 6.0 ADOMs and later.
This section contains the following topics:
l Security Fabric Topology on page 673
l Physical Topology on page 674
l Logical Topology on page 675
l Filter Topology Views on page 676
l Search Topology Views on page 677
l Security Rating on page 677
l Fabric Connectors on page 681
You can see the Security Fabric topology in the FortiManager GUI, in the Fabric View menu. You can choose the
Physical Topology or Logical Topology views. In both topology views, you can hover over device icons and use filtering
and sorting options to see more information about devices and your organization's network. Go to Fabric View and select
the Fabric group to see the whole topology for that Fabric group.
Upstream
The Upstream dropdown in the Physical and Logical Topology views allows you to receive destination data from the
following options in the drop-down menu: Internet, Owner, IP Address, and Country/Region. These options are available
in the Physical Topology and the Logical Topology view, when you select Device Traffic in the menu in the top right
corner.
When you set the upstream to Owner, the destination hosts are simplified to a donut chart. This chart shows the
percentage division between Internal hosts (with private IP addresses) and Internet hosts. To see which color represents
each host, hover over either color. To zoom in on the total number of hosts, click on the donut graph.
Switch stacking
FortiAP and FortiSwitch links are enhanced in the Security Fabric’s Logical and Topological views to show Link
Aggregation Groups for the Inter-switch Link (ISL-LAG). This makes it easier to identify which links are physical links and
which links are ISL-LAG. To quickly understand connectivity when you look at multiple link connections, ISL-LAG is
identified with a thicker single line. To identify ISL-LAG groups with more than two links, you can also look at the port
endpoint circles as references.
Physical Topology
The physical topology view shows the devices in the Security Fabric and the devices they are connected to. You can
also select whether or not to view access layer devices in this topology. To see the physical topology, in FortiManager
GUI, select Fabric View > Physical Topology.
From the dropdown list beside the search bar, select one of the following views:
l Device Traffic: organize devices by traffic.
l Device Count: organize devices by the number of devices connected to it.
l Device Operating System: organize devices by operating system.
l Device Hardware Vendor: organize devices by hardware vendor.
l Risk: only include devices that have endpoints with medium, high, or critical risk values of the specified type: All,
Compromised Host, Vulnerability, or Threat Score.
l No Devices: do not show endpoints.
The physical topology view displays your network as a chart of interconnected devices. These devices are grouped
based on the upstream device they are connected to. You can click a device in the topology to view additional
information.
The following fields are displayed in when viewing device information:
l FortiGate: hostname, serial number, model, version, and management IP.
l FortiAnalyzer: hostname, version, IP address, and model.
l FortiSwitch: label, serial number, and version.
l Device: name, IP address, hostname, MAC, interfaces, online interfaces, hardware type, hardware vendor, OS, and
user.
Security Fabric Rating recommendations are also shown in the topology, beside the icon of the device the
recommendations apply to. Click the icon to view the rating report.
Logical Topology
The Logical Topology view is similar to the Physical Topology view, but it shows the network interfaces, logical or
physical, that are used to connect devices in the Security Fabric.
To see the Logical Topology, in FortiManager GUI, select Fabric View > Logical Topology.
The Logical Topology view displays your network as a chart of network connection endpoints. These devices are
grouped based on the upstream device interface they are connected to.
You can hover over the icon for each device to see information, such as serial number, hostname, and firmware version.
You can also see each FortiGate interface that has upstream and downstream devices connected to it.
Security Fabric Rating recommendations are also shown in the topology, beside the icon of the device the
recommendations apply to.
You can use filters to narrow down the data on the topology views to find specific information.
In the dropdown menu to the right of the Search field, select one of the following:
l Device Traffic
l Device Count
l Device Operating System
l Device Hardware Vendor
l Risk
l No Devices
To sort the topology by metrics, in the Metrics dropdown menu, select one of the following:
l Bytes (Sent/Received)
l Packets (Sent/Received)
l Bandwidth
l Sessions
The search bar, located above the Physical and Logical Topology views, can help you easily find what you're looking for
in the network topology and quickly resolve security issues. The search highlights devices that match your search
criteria, and grays out devices that don't match.
l For FortiGate you can search for device information including IP address, model, serial number, and version.
l For FortiAnalyzer you can search for device information including IP address, version, and model.
l For FortiSwitch you can search by serial number.
l For Other Devices, you can search by IP address, hostname, and MAC address.
Security Rating
The Fabric View > Security Rating pane displays Security Fabric Ratings of configurations for FortiGate Security Fabric
groups or a single FortiGate device (version 7.0 and later).
The security rating on FortiManager is based on the security rating reports from FortiGate. If security rating reports are
unavailable from FortiGate devices, the report on FortiManager will not include its data.
You can view the results for multiple FortiGate Security Fabric groups by choosing a group in the Select a
CSF dropdown menu.
Click Run Now to run the Security Rating report at any time directly from FortiManager.
The Security Rating pane is separated into three major scorecards: Security Posture, Fabric Coverage, and
Optimization, which provide an executive summary of the three largest areas of security focus in the Security Fabric.
The scorecards show an overall letter grade and breakdown of the performance in sub-categories. Clicking a scorecard
drills down to a detailed report of itemized results and compliance recommendations. The point score represents the net
score for all passed and failed items in that area.
The report includes the security controls that were tested against, linking to specific FSBP or PCI compliance policies.
Click the FSBP and PCI buttons to reference the corresponding standard. Users can search or filter the report results.
To exit the detailed report view, click the scorecard title to return to the summary view.
For more information about security ratings, and details about each of the checks that are performed, go to Security Best
Practices & Security Rating Feature.
Security rating licenses are required to run security rating checks across all the devices in the
Security Fabric. It also allows ratings scores to be submitted to and received from FortiGuard
for ranking networks by percentile.
See https://www.fortinet.com/support/support-services/fortiguard-security-
subscriptions/security-rating.html for information.
The Security Rating summary is displayed when FortiManager is managing FortiGate units that have Security Fabric
enabled and are part of a Security Fabric group.
You can view Security Fabric Ratings of configurations for all FortiGate units in a Security Fabric Group or for individual
FortiGate units in a Security Fabric group.
l Security Fabric Rating results are displayed in the content pane for the selected Security Fabric group.
l Click one of the scorecards, for example Security Posture, to view the detailed report.
l In the detailed report view, you can view results by expanding the Failed, Exempt, and Passed categories.
l In the detailed report view, select All to view results for all devices in the group, or select individual Fabric
devices or device categories to filter results by the selection.
The Security Fabric score is calculated when a security rating check is run, based on the severity level of the checks that
are passed or failed. A higher scores represents a more secure network. Points are added for passed checks and
removed for failed checks.
Critical 50
High 25
Medium 10
Low 5
To calculate the number of points awarded to a device for a passed check, the following equation is used:
The secure FortiGate multiplier is determined using logarithms and the number of FortiGate devices in the Security
Fabric.
For example, if there are four FortiGate devices in the Security Fabric that all pass the compatible firmware check, the
score for each FortiGate device is calculated with the following equation:
50
× 1.292 = 16.15 points
4
All of the FortiGate devices in the Security Fabric must pass the check in order to receive the points. If any one of the
FortiGate devices fails a check, the devices that passed are not awarded any points. For the device that failed the check,
the following equation is used to calculated the number of points that are lost:
For example, if the check finds two critical FortiClient vulnerabilities, the score is calculated with the following equation:
Scores are not affected by checks that do not apply to your network. For example, if there are no FortiAP devices in the
Security Fabric, no points will be added or subtracted for the FortiAP firmware version check.
Fabric Connectors
You can use FortiManager to create the following types of fabric connectors:
l Core Network Security on page 681
You can use the Fabric Connectors tab to create the following types of core network security fabric connectors:
l Creating FortiClient EMS connectors on page 681
You can configure a FortiClient EMS connector on FortiManager to retrieve or generate EMS tag addresses from a
FortiClient EMS or FortiClient EMS Cloud server.
When a FortiClient EMS connector is configured, FortiManager automatically registers the FortiGate on FortiClient EMS,
allowing FortiGate to retrieve dynamic object details from FortiClient EMS. Once the FortiClient EMS connector has
been created, you can configure a ZTNA server and use the security posture tags in policies. See Zero Trust Network
Access (ZTNA) objects on page 493 and Configuring a ZTNA server on page 495.
Fields that support metadata variables are identified with the following magnifying glass icon . See ADOM-level
metadata variables on page 479..
FortiClient EMS connectors can also be configured from Policy & Objects > Security Fabric
> Endpoint/Identity.
In order for the FortiClient EMS connector to import dynamic object details from FortiClient
EMS, FortiClient EMS and FortiOS must be on version 7.0.3 or later.
IP/Domain name Enter the IP or domain name for the FortiClient EMS.
HTTPS port Enter the HTTPS port for the FortiClient EMS.
EMS Threat Feed Toggle ON to allow FortiManager to pull FortiClient malware hash from
FortiClient EMS.
Synchronize firewall Toggle ON to automatically create and synchronize firewall addresses for all
addresses EMS tags.
Multi Site Enable to retrieve EMS tags with site information when multiple sites are
configured on FortiClient EMS.
Advanced Options Click to open and configure advanced options for the FortiClient
EMS connector.
The source-ip field supports metadata variables. See ADOM-level
metadata variables on page 479.
EMS Threat Feed Toggle ON to allow FortiManager to pull FortiClient malware hash from
FortiClient EMS.
Synchronize firewall Toggle ON to automatically create and synchronize firewall addresses for all
addresses EMS tags.
Multi Site Enable to retrieve EMS tags with site information when multiple sites are
configured on FortiClient EMS.
Advanced Options Click to open and configure advanced options for the FortiClient EMS Cloud
connector.
The source-ip field supports metadata variables. See ADOM-level
metadata variables on page 479.
1. Go to Fabric View > Fabric > Fabric Connectors, and edit the configured FortiClient EMS connector.
2. Click Apply & Refresh.
Any changes on the EMS server are dynamically populated on the FortiManager.
3. Go to Policy & Objects > Firewall Objects > Security Posture Tag.
You can see imported IP and MAC tags available on the page. See Viewing security posture tags on page 493.
To use security posture tags imported from the EMS server in a policy:
1. Configure the proxy policy and object settings on FortiManager as required. See Create a new proxy policy on page
390.
2. Install the ZTNA policy to FortiGate using the Device Manager Install Wizard.
While performing the installation to FortiGate, FortiManager also installs the digital fingerprint from the EMS server,
removing the requirement to authorize the FortiGate on the EMS server.
3. Confirm that FortiGate is authorized on the EMS server:
a. Log in on the FortiGate, and go to Security Fabric > Fabric Connectors > FortiClient EMS.
b. Confirm the server details installed on the FortiGate are correct and that the status displays as Connected.
External Connectors
You can use FortiManager to create the following types of external connectors:
l Public and private SDN
l Threat Feeds
l Endpoint/Identity
You can create multiple fabric connectors of the same type in FortiManager.
Fabric connectors to SDNs provide integration and orchestration of Fortinet products with SDN solutions. Fabric
Connectors ensure that any changes in the SDN environment are automatically updated in your network. There is no
need to manually reconfigure addresses and policies whenever changes to the cloud environment occur.
SDN Connectors can be configured on FortiManager to create dynamic firewall address objects that can be installed to
managed FortiGate devices.
You can use the Fabric > External Connectors pane to create public and private SDN fabric connectors for the following
products:
l Public SDN
l Creating AWS fabric connectors on page 686
l Using FortiManager as a SDN proxy for AWS connectors on page 710
l Creating Microsoft Azure fabric connectors on page 688
l Creating Google Cloud Platform connector on page 705
l Creating Oracle Cloud Infrastructure (OCI) connector on page 698
l Creating AliCloud Service connector on page 703
l Creating IBM Cloud connector on page 706
l Private SDN
l Creating Kubernetes connector on page 701
l Creating VMWare ESXi connector on page 699
l Creating VMware NSX fabric connectors on page 690
l Creating OpenStack (Horizon) connector on page 696
l Creating ACI fabric connectors on page 684
l Creating Nuage fabric connectors on page 692
l Create Nutanix fabric connectors on page 694
Once an SDN connector has been created, you can import address names from the products to the fabric connectors to
automatically create dynamic firewall address objects that you can use in policies. Alternatively, you can manually create
dynamic firewall address objects.
l Importing address names to fabric connectors on page 708
l Configuring dynamic firewall addresses for fabric connectors on page 709
With FortiManager, you can create a fabric connector for Application Centric Infrastructure (ACI), and then import
address names from ACI to automatically create dynamic objects that you can use in policies. When you install the
policies to one or more FortiGate units, FortiGate uses the information to communicate either with the Fortinet
SDN Connector or directly with ACI and dynamically populate the objects with IP addresses.
The Cisco ACI fabric connector supports IPv4 and IPv6 addresses.
When you create a fabric connector for ACI, you are specifying how FortiGate can communicate with ACI.
Requirements:
l FortiGate is managed by FortiManager.
l The managed FortiGate unit is configured to work with Application Centric Infrastructure (ACI).
1. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
2. Under Private SDN, select Application Centric Infrastructure. The Application Centric Infrastructure screen is
displayed.
Status Toggle On to enable the fabric connector object. Toggle OFF to disable the
fabric connector object.
User Name Type the user name for Fortinet SDN Connector.
1. Import address names or manually create the dynamic firewall address for the SDN connector. See Importing
address names to fabric connectors on page 708 and Configuring dynamic firewall addresses for fabric connectors
on page 709.
You can import SDN objects by filter or by endpoint group (EPG).
2. In the policy package in which you will be creating the new policy, create a firewall policy and include the dynamic
firewall address objects for the SDN connector. See Create a new firewall policy on page 356.
3. Install the policy package to FortiGate. See Install a policy package on page 340.
FortiGate communicates with the SDN to dynamically populate the firewall address objects with IP addresses.
With FortiManager, you can create a fabric connector for Amazon Web Services (AWS), and then import address names
from AWS to automatically create dynamic objects that you can use in policies. When you install the policies to one or
more FortiGate units, FortiGate uses the information to communicate with AWS and dynamically populate the objects
with IP addresses.
When you create a fabric connector for AWS, you are specifying how FortiGate can communicate directly with AWS.
Requirements:
l FortiGate is managed by FortiManager.
l The managed FortiGate unit is configured to work with AWS.
1. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
2. Under Public SDN, select Amazon Web Services. The Amazon Web Services screen is displayed.
Status Toggle On to enable the fabric connector object. Toggle OFF to disable the
fabric connector object.
Update Interval (s) Specify how often in seconds that the dynamic firewall objects should be
updated.
Secret Access key Type the secret access key from AWS.
1. Import address names or manually create the dynamic firewall address for the SDN connector. See Importing
address names to fabric connectors on page 708 and Configuring dynamic firewall addresses for fabric connectors
on page 709.
2. In the policy package in which you will be creating the new policy, create a firewall policy and include the dynamic
firewall address objects for the SDN connector. See Create a new firewall policy on page 356.
3. Install the policy package to FortiGate. See Install a policy package on page 340.
FortiGate communicates with the SDN to dynamically populate the firewall address objects with IP addresses.
With FortiManager, you can create a fabric connector for Microsoft Azure, and then import address names from
Microsoft Azure to automatically create dynamic objects that you can use in policies. When you install the policies to one
or more FortiGate units, FortiGate uses the information to communicate with Microsoft Azure and dynamically populate
the objects with IP addresses.
When you create a fabric connector for Microsoft Azure, you are specifying how FortiGate can communicate directly with
Microsoft Azure.
Requirements:
l FortiGate is managed by FortiManager.
l The managed FortiGate unit is configured to work with Microsoft Azure.
1. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
2. Under Public SDN, select Microsoft Azure. The Microsoft Azure screen is displayed.
Status Toggle On to enable the fabric connector object. Toggle OFF to disable the
fabric connector object.
Update Interval (s) Specify how often in seconds that the dynamic firewall objects should be
updated.
Directory ID Enter the directory ID for your Azure AD tenant with Azure AD.
Application ID Enter the application ID for your Azure application with Azure AD.
Client Secret Enter the application secret created for your Azure application with Azure AD.
Resource Path Optionally, enable the resource path to configure the Subscribiption ID and
Resource Group.
1. Import address names or manually create the dynamic firewall address for the SDN connector. See Importing
address names to fabric connectors on page 708 and Configuring dynamic firewall addresses for fabric connectors
on page 709.
2. In the policy package in which you will be creating the new policy, create a firewall policy and include the dynamic
firewall address objects for the SDN connector. See Create a new firewall policy on page 356.
3. Install the policy package to FortiGate. See Install a policy package on page 340.
FortiGate communicates with the SDN to dynamically populate the firewall address objects with IP addresses.
With FortiManager, you can create a fabric connector for VMware NSX, and then import address names from
VMware NSX to automatically create dynamic objects that you can use in policies. When you install the policies to one or
more FortiGate units, FortiGate uses the information to communicate with VMware NSX and dynamically populate the
objects with IP addresses.
When you create a fabric connector for VMware NSX, you are specifying how FortiGate can communicate directly with
VMware NSX.
If ADOMs are enabled, you can create one fabric connector per ADOM.
Requirements:
l FortiGate unit or FortiGate VMX Service Manager is managed by FortiManager.
l The managed FortiGate or FortiGate VMX Service Manager is configured to work with VMware NSX .
l IPv4 virtual wire pair policy
FortiGate or FortiGate VMX Service Manager requires the use of an IPv4 virtual wire pair policy.
1. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
2. Under Private SDN, select VMware NSX-V. The VMware NSX-V screen is displayed.
Status Toggle On to enable the fabric connector object. Toggle OFF to disable the
fabric connector object.
Update Interval (s) Specify how often in seconds that the dynamic firewall objects should be
updated.
VMX The VMX options identify settings used by the FortiGate VMX Service
Manager to communicate with the REST API for NSX Manager.
Service Name Type the name of the FortiGate VMX service defined on NSX Manager.
Image Location Type the location of the FortiGate VMX deployment template used by NSX
Manager to deploy the FortiGate VMX service.
REST API The REST API options specify how the FortiGate VMX Service Manager
communicates with the REST API for NSX Manager.
Port Type the port used by the FortiGate VMX Service Manager to communicate
with NSX Manager.
Interface Select the interface used by the FortiGate VMX Service Manager to
communicate with NSX Manager. Choose between MGMT and Sync.
Password Type the password that FortiGate VMX Service Manager uses with the REST
API to communicate with NSX Manager.
Note: This is not the admin password for FortiGate VMX Service Manager.
1. Import address names or manually create the dynamic firewall address for the SDN connector. See Importing
address names to fabric connectors on page 708 and Configuring dynamic firewall addresses for fabric connectors
on page 709.
2. Create a virtual wire pair. See Creating virtual wire pairs on page 472.
3. In the policy package in which you will be creating the new policy, create a firewall policy and include the dynamic
firewall address objects for the SDN connector. See Create a new firewall policy on page 356.
4. Install the policy package to FortiGate. See Install a policy package on page 340.
FortiGate communicates with the SDN to dynamically populate the firewall address objects with IP addresses.
With FortiManager, you can create a fabric connector for Nuage Virtualized Service Platform, and then import address
names from Nuage to automatically create dynamic objects that you can use in policies. When you install the policies to
one or more FortiGate units, FortiGate uses the information to communicate with Nuage Virtualized Service Platform
and dynamically populate the objects with IP addresses.
When you create a fabric connector for Nuage Virtualized Service Platform, you are specifying how FortiGate can
communicate directly with Nuage.
Requirements:
l FortiGate is managed by FortiManager.
l The managed FortiGate unit is configured to work with Nuage Virtualized Service Platform.
1. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
2. Under Private SDN, select Nuage Virtualized Service Platform. The Nuage Virtualized Service Platform screen is
displayed.
Status Toggle On to enable the fabric connector object. Toggle OFF to disable the
fabric connector object.
1. Import address names or manually create the dynamic firewall address for the SDN connector. See Importing
address names to fabric connectors on page 708 and Configuring dynamic firewall addresses for fabric connectors
on page 709.
2. In the policy package in which you will be creating the new policy, create a firewall policy and include the dynamic
firewall address objects for the SDN connector. See Create a new firewall policy on page 356.
3. Install the policy package to FortiGate. See Install a policy package on page 340.
FortiGate communicates with the SDN to dynamically populate the firewall address objects with IP addresses.
You can create Nutanix fabric connectors in FortiManager, and then import address names from Nutanix to
automatically create dynamic objects that you can use in policies. When you install the policies to one or more FortiGate
units, FortiGate uses the information to communicate with Nutanix and dynamically populate the objects with
IP addresses.
When you create a fabric connector for Nutanix, you are specifying how FortiGate can communicate with Nutanix.
Requirements:
l FortiManager version 7.0 ADOM or later
l FortiGate is managed by FortiManager.
l The managed FortiGate unit is configured to work with Nutanix.
l Supported with ISE 3.1.0 and 3.2.0.
1. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
Status Toggle On to enable the fabric connector object. Toggle OFF to disable the fabric
connector object.
Update Interval(s) Specify how often in seconds that the dynamic firewall objects should be updated.
Port Select Use Default or Specify and enter the desired port.
1. Import address names or manually create the dynamic firewall address for the SDN connector. See Importing
address names to fabric connectors on page 708 and Configuring dynamic firewall addresses for fabric connectors
on page 709.
2. In the policy package in which you will be creating the new policy, create a firewall policy and include the dynamic
firewall address objects for the SDN connector. See Create a new firewall policy on page 356.
3. Install the policy package to FortiGate. See Install a policy package on page 340.
FortiGate communicates with the SDN to dynamically populate the firewall address objects with IP addresses.
With FortiManager, you can create a fabric connector for Horizon (OpenStack), and then import address names from
Horizon (OpenStack) to automatically create dynamic objects that you can use in policies. When you install the policies
to one or more FortiGate units, FortiGate uses the information to communicate with Horizon (OpenStack) and
dynamically populate the objects with IP addresses.
When you create a fabric connector for Horizon (OpenStack), you are specifying how FortiGate can communicate with
Horizon (OpenStack).
Requirements:
l FortiGate is managed by FortiManager.
l The managed FortiGate unit is configured to work with Horizon (OpenStack).
1. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
2. Under Private SDN, select OpenStack. The OpenStack (Horizon) screen is displayed.
Status Toggle On to enable the fabric connector object. Toggle OFF to disable the
fabric connector object.
1. Import address names or manually create the dynamic firewall address for the SDN connector. See Importing
address names to fabric connectors on page 708 and Configuring dynamic firewall addresses for fabric connectors
on page 709.
2. In the policy package in which you will be creating the new policy, create a firewall policy and include the dynamic
firewall address objects for the SDN connector. See Create a new firewall policy on page 356.
3. Install the policy package to FortiGate. See Install a policy package on page 340.
FortiGate communicates with the SDN to dynamically populate the firewall address objects with IP addresses.
With FortiManager, you can create a fabric connector for Oracle Cloud Infrastructure (OCI), and then import address
names from OCI to automatically create dynamic objects that you can use in policies. When you install the policies to
one or more FortiGate units, FortiGate uses the information to communicate with OCI and dynamically populate the
objects with IP addresses.
When you create a fabric connector for OCI. you are specifying how FortiGate can communicate with OCI.
Requirements:
l FortiGate is managed by FortiManager.
l The managed FortiGate unit is configured to work with OCI.
1. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
2. Under Public SDN, select Oracle Cloud Infrastructure. The Oracle Cloud Infrastructure (OCI) screen is displayed.
Status Toggle On to enable the fabric connector object. Toggle OFF to disable the
fabric connector object.
Server Region Select the OCI Server Region from the drop-down.
System Certificate for Select the system certificate for the connection.
Connection
1. Import address names or manually create the dynamic firewall address for the SDN connector. See Importing
address names to fabric connectors on page 708 and Configuring dynamic firewall addresses for fabric connectors
on page 709.
2. In the policy package in which you will be creating the new policy, create a firewall policy and include the dynamic
firewall address objects for the SDN connector. See Create a new firewall policy on page 356.
3. Install the policy package to FortiGate. See Install a policy package on page 340.
FortiGate communicates with the SDN to dynamically populate the firewall address objects with IP addresses.
With FortiManager, you can create a fabric connector for VMWare ESXi, and then import address names from VMWare
ESXi to automatically create dynamic objects that you can use in policies. When you install the policies to one or more
FortiGate units, FortiGate uses the information to communicate with VMWare ESXi and dynamically populate the
objects with IP addresses.
When you create a fabric connector for VMWare ESXi, you are specifying how FortiGate can communicate directly with
VMWare ESXi.
Requirements:
l FortiGate is managed by FortiManager.
l The managed FortiGate unit is configured to work with VMWare ESXi.
1. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
2. Under Private SDN, select VMWare ESXi. The VMWare ESXi screen is displayed.
Status Toggle On to enable the fabric connector object. Toggle OFF to disable the
fabric connector object.
1. Import address names or manually create the dynamic firewall address for the SDN connector. See Importing
address names to fabric connectors on page 708 and Configuring dynamic firewall addresses for fabric connectors
on page 709.
2. In the policy package in which you will be creating the new policy, create a firewall policy and include the dynamic
firewall address objects for the SDN connector. See Create a new firewall policy on page 356.
3. Install the policy package to FortiGate. See Install a policy package on page 340.
FortiGate communicates with the SDN to dynamically populate the firewall address objects with IP addresses.
With FortiManager, you can create a fabric connector for Kubernetes, and then import address names from Kubernetes
to automatically create dynamic objects that you can use in policies. When you install the policies to one or more
FortiGate units, FortiGate uses the information to communicate with Kubernetes and dynamically populate the objects
with IP addresses.
When you create a fabric connector for Kubernetes, you are specifying how FortiGate can communicate directly with
Kubernetes.
Requirements:
l FortiGate is managed by FortiManager.
l The managed FortiGate unit is configured to work with Kubernetes.
1. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
Status Toggle On to enable the fabric connector object. Toggle OFF to disable the
fabric connector object.
1. Import address names or manually create the dynamic firewall address for the SDN connector. See Importing
address names to fabric connectors on page 708 and Configuring dynamic firewall addresses for fabric connectors
on page 709.
2. In the policy package in which you will be creating the new policy, create a firewall policy and include the dynamic
firewall address objects for the SDN connector. See Create a new firewall policy on page 356.
3. Install the policy package to FortiGate. See Install a policy package on page 340.
FortiGate communicates with the SDN to dynamically populate the firewall address objects with IP addresses.
Kubernetes Service must be enabled on the server side for AWS, Azure, OCI and, GCP for
Kubernetes to function for the particular cloud platform. Once the service is enabled,
Kubernetes can be configured for the particular cloud platform on FortiManager.
With FortiManager, you can create a fabric connector for AliCloud Service, and then import address names from
AliCloud Service to automatically create dynamic objects that you can use in policies. When you install the policies to
one or more FortiGate units, FortiGate uses the information to communicate with AliCloud Service and dynamically
populate the objects with IP addresses.
When you create a fabric connector for AliCloud Service, you are specifying how FortiGate can communicate directly
with AliCloud Service.
Requirements:
l FortiGate is managed by FortiManager.
l The managed FortiGate unit is configured to work with AliCloud Service.
1. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
2. Under Public SDN, select AliCloud. The Alibaba Cloud screen is displayed.
Status Toggle On to enable the fabric connector object. Toggle OFF to disable the
fabric connector object.
1. Import address names or manually create the dynamic firewall address for the SDN connector. See Importing
address names to fabric connectors on page 708 and Configuring dynamic firewall addresses for fabric connectors
on page 709.
2. In the policy package in which you will be creating the new policy, create a firewall policy and include the dynamic
firewall address objects for the SDN connector. See Create a new firewall policy on page 356.
3. Install the policy package to FortiGate. See Install a policy package on page 340.
FortiGate communicates with the SDN to dynamically populate the firewall address objects with IP addresses.
With FortiManager, you can create a fabric connector for Google Cloud Platform (GCP), and then import address names
from GCP to automatically create dynamic objects that you can use in policies. When you install the policies to one or
more FortiGate units, FortiGate uses the information to communicate with GCP and dynamically populate the objects
with IP addresses.
When you create a fabric connector for GCP, you are specifying how FortiGate can communicate directly with GCP.
Requirements:
1. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
2. Under Public SDN, select Google Cloud Platform. The Google Cloud Platform screen is displayed.
Status Toggle On to enable the fabric connector object. Toggle OFF to disable the
fabric connector object.
Projects Select Simple or Advanced. When Advanced is selected, you can add
GCP Projects.
Service Account Email Specify the Service Account Email for GCP.
1. Import address names or manually create the dynamic firewall address for the SDN connector. See Importing
address names to fabric connectors on page 708 and Configuring dynamic firewall addresses for fabric connectors
on page 709.
2. In the policy package in which you will be creating the new policy, create a firewall policy and include the dynamic
firewall address objects for the SDN connector. See Create a new firewall policy on page 356.
3. Install the policy package to FortiGate. See Install a policy package on page 340.
FortiGate communicates with the SDN to dynamically populate the firewall address objects with IP addresses.
With FortiManager, you can create a fabric connector for IBM Cloud, and then import address names from IBM Cloud to
automatically create dynamic objects that you can use in policies. When you install the policies to one or more FortiGate
units, FortiGate uses the information to communicate with IBM Cloud and dynamically populate the objects with
IP addresses.
When you create a fabric connector for IBM Cloud, you are specifying how FortiGate can communicate directly with IBM
Cloud.
Requirements:
l FortiGate is managed by FortiManager.
l The managed FortiGate unit is configured to work with IBM Cloud.
1. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
2. Under Private SDN, select IBM Cloud. The IBM Cloud screen is displayed.
Status Toggle On to enable the fabric connector object. Toggle OFF to disable the
fabric connector object.
Update Interval(s) Specify how often in seconds that the dynamic firewall objects should be
updated.
Region Select your IBM Cloud region from the dropdown list.
1. Import address names or create a dynamic firewall address for the IBM Cloud connector.
See Importing address names to fabric connectors on page 708 and Configuring dynamic firewall addresses for
fabric connectors on page 709.
2. In the policy package in which you will be creating the new policy, create a firewall policy and include the dynamic
firewall address objects for IBM Cloud. See Create a new firewall policy on page 356.
3. Install the policy package to FortiGate. See Install a policy package on page 340.
FortiGate communicates with IBM Cloud to dynamically populate the firewall address objects with IP addresses.
After you configure a fabric connector, you can import address names from products, such as ACI, to the fabric
connector, and dynamic firewall address objects are automatically created.
When you are importing address names, you must add filters to display the correct instances before importing address
names.
You can manually create dynamic firewall address objects for SDN fabric connectors. See
Configuring dynamic firewall addresses for fabric connectors on page 709.
3. If your connect supports both IPv4 and IPv6, you can select the Address Type.
4. Create a filter to select the correct instances:
a. Click Add Filter.
The Filter Generator dialog box is displayed.
b. Click Add Filter, and select a filter. A filtered list of instances is displayed.
c. Click OK. The Import SDN Connector dialog box is displayed, and it contains the filter. You can add additional
filters, or edit and delete filters.
d. (Optional) Repeat this procedure to add additional filters.
5. Select the filters, and click Import.
The address names are imported and converted to dynamic firewall address objects that are displayed on the
Firewall Objects > Addresses pane. The name of the dynamic firewall address uses the following naming
convention: <SDN Type>-<random identifier>. Use the Details column and the instance ID to identify the
object.
You can import SDN objects from ACI connectors by endpoint group (EGP). In order to import SDN objects from
ACI connectors by EPG, you must have configured your ACI connector with the Type: Direct Connection. See Creating
ACI fabric connectors on page 684.
You can create dynamic firewall objects that can be dynamically populated when FortiGate communicates with the SDN
platform.
SDN Select a fabric connector that supports IPv6 addresses. For example, Cisco
ACI.
Before you create a virtual wire pair policy, you must create a virtual wire pair.
Wildcard VLAN Toggle ON to enable wildcard VLANs for the virtual wire pair. When enabled,
all VLAN-tagged traffic can pass through the virtual wire pair, if allowed by the
virtual wire pair firewall policies.
Toggle OFF to disable wildcard VLANs for the virtual wire pair.
Each FortiGate configured with an AWS fabric connector makes a separate connection request to the AWS server.
Having a high volume of devices may result in many simultaneous connections to AWS. For example, having 100
FortiGate devices with AWS connectors results in 100 separate connections to the AWS server.
To improve efficiency and security in these cases, FortiManager can be configured to work as a proxy between the
FortiGate devices and AWS. When configured as a proxy, FortiManager will make all requests to the AWS server. The
FortiGate devices do not need to be managed by FortiManager to use it as a proxy.
This setting can only be configured in the CLI.
When using FortiManager as a proxy to AWS, you must have an admin user on FortiManager
with read-write permissions for JSON API Access. It is recommended that you also increase
the login-max setting in Advanced Options to allow for the maximum number of logins (256) for
the user since this FortiManager will receive login requests from each FortiGate when making
requests to the AWS server.
On FortiManager, you can manage the sdnproxy daemon with the following commands:
l Restart the sdnproxy daemon: diagnose test application sdnproxyd <interger>
l Show debug logs: diagnose debug application sdnproxy <debug level (0 - 8)>
Each FortiGate configured with a GCP fabric connector makes a separate connection request to the GCP server. Having
a high volume of devices may result in many simultaneous connections to GCP. For example, having 100 FortiGate
devices with GCP connectors results in 100 separate connections to the GCP server.
To improve efficiency and security in these cases, FortiManager can be configured to work as a proxy between the
FortiGate devices and GCP. When configured as a proxy, FortiManager will make all requests to the GCP server. The
FortiGate devices do not need to be managed by FortiManager to use it as a proxy.
This setting can only be configured in the CLI.
When using FortiManager as a proxy to GCP, you must have an admin user on FortiManager
with read-write permissions for JSON API Access. It is recommended that you also increase
the login-max setting in Advanced Options to allow for the maximum number of logins (256) for
the user since this FortiManager will receive login requests from each FortiGate when making
requests to the GCP server.
On FortiManager, you can manage the sdnproxy daemon with the following commands:
l Restart the sdnproxy daemon: diagnose test application sdnproxyd <interger>
l Show debug logs: diagnose debug application sdnproxy <debug level (0 - 8)>
Each FortiGate configured with an Azure fabric connector makes a separate connection request to the Azure server.
Having a high volume of devices may result in many simultaneous connections to Azure. For example, having 100
FortiGate devices with Azure connectors results in 100 separate connections to the Azure server.
To improve efficiency and security in these cases, FortiManager can be configured to work as a proxy between the
FortiGate devices and Azure . When configured as a proxy, FortiManager will make all requests to the Azure server. The
FortiGate devices do not need to be managed by FortiManager to use it as a proxy.
This setting can only be configured in the CLI.
When using FortiManager as a proxy to Azure, you must have an admin user on FortiManager
with read-write permissions for JSON API Access. It is recommended that you also increase
the login-max setting in Advanced Options to allow for the maximum number of logins (256) for
the user since this FortiManager will receive login requests from each FortiGate when making
requests to the Azure server.
2. On each FortiGate, configure the SDN connector to use the FortiManager proxy object.
config system sdn-connector
edit <connector name>
set proxy <sdn-proxy name>
set use-metadata-iam disable
set access-key <access>
set secret-key <secret>
set region <region>
next
end
On FortiManager, you can manage the sdnproxy daemon with the following commands:
l Restart the sdnproxy daemon: diagnose test application sdnproxyd <interger>
l Show debug logs: diagnose debug application sdnproxy <debug level (0 - 8)>
Threat Feeds
You can use the Fabric View > External Connectors pane to create the following types of threat feed connectors:
l FortiGuard Category Threat Feed
l IP Address Threat Feed
l Domain Name Threat Feed
l Malware Hash Threat Feed
l MAC Address Threat Feed
Threat feed connectors dynamically import an external block list. The block list is a text file that contains a list of either
addresses or domains and resides on an HTTP server. You use block lists to deny access to source or destination IP
addresses in web filter and DNS filter profiles, SSL inspection exemptions, and as sources or destinations in proxy
policies.
This section contains the following topic:
l Creating threat feed connectors on page 713
You can create threat feed connectors for FortiGuard categories, firewall IP addresses, domain names, and malware
hashes.
1. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
2. Under Threat Feeds, select FortiGuard Category, IP Address, Domain Name, or Malware Hash, and click Next.
3. Configure the following options, and then click OK:
URI of external resource Type the link to an external text file. The path must start with http://,
https://, or fmg://, for example, http://example.com/url.
HTTP Basic Authentication Toggle On to enable basic HTTP authentication, and type a username and
password.
Toggle Off to disable basic HTTP authentication.
Category ID Type the category ID. The ID is between 192 and 221.
Available only when Type displays Domain List.
Status Toggle On to enable the fabric connector object. Toggle OFF to disable the
fabric connector object.
Endpoint/Identity
You can use the Fabric > External Connectors pane to create the following types of Endpoint/Identity connectors:
l Poll Active Directory Server
l Fortinet Single Sign-On (FSSO) Agent
l RADIUS Single Sign-On Agent
l User pxGrid
l User ClearPass
l VMware NSX-T
l VMware vCenter
l Symantec Endpoint Protection
l Exchange Server
l JSON API Connector
SSO connectors integrate single sign-on (SSO) authentication in networks. SSO allows users to enter their credentials
once and have those credentials reused when they access other network resources through FortiGate.
This section contains the following topics:
l Creating Active Directory connectors on page 715
l Creating FSSO connectors on page 715
l Creating RADIUS connectors on page 716
l Creating Cisco pxGrid connectors on page 717
l Creating ClearPass connectors on page 722
You can create SSO/identity connectors for Active Directory servers. This connector configures polling of Active
Directory servers for FSSO.
1. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
2. Under Endpoint/Identity, select Poll Active Directory Server.
3. Configure the following options, and click OK:
Server Name/IP Type the name or IP address for the Active Directory server.
Local User Type the user name required to log into the Active Directory server.
Password Type the password required to log into the Active Directory server.
Enable Polling Toggle On to enable polling of the Active Directory server. Toggle OFF to
disable this feature.
LDAP Server Select the LDAP server name from the list. The LDAP server name is used in
LDAP connection strings.
You can create SSO/identity connectors for Fortinet single sign-on (FSSO) agents.
FSSO is the authentication protocol by which users can transparently authenticate to FortiGate, FortiClient EMS,
FortiAuthenticator, and FortiCache devices.
1. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
2. Under Endpoint/Identity, select Fortinet Single Sign-on Agent.
3. Configure the following options, and click OK:
Type Select the FSSO connector type as either Active Directory / FortiAuthenticator
or FortiNAC.
FSSO Agent Complete the IP/Name, Password, and Port options for each unit that will act
as an SSO agent.
User Group Source Specify whether to get FSSO groups from a Collector Agents, Via FortiGate, or
Local.
User Groups Displays imported FSSO groups from the selected source.
This field is only displayed when the User Group Source is Collector Agents or
Via FortiGate.
LDAP Server Select the LDAP server. You can create a new LDAP server by clicking the
add icon, or choose an existing LDAP server from the dropdown list.
This field is only displayed when the User Group Source is Local.
Proactively Retrieve from (Optional) Toggle this field On to proactively retrieve from the LDAP server.
LDAP
Select LDAP Groups Select the LDAP groups by choosing Remote Server or Manually Specify.
When Manually Specify is selected, you can add each LDAP group in the
Group Name field.
This field is only displayed when the User Group Source is Local.
Per-Device Mapping (Optional) Toggle On to set per-device mappings between FortiGate units and
FSSO agents, and then create the mappings. Toggle OFF to disable this
feature.
Advanced Options Expand to view and configure advanced options for Fortinet single sign-on
agents. For details, see the FortiOS CLI Reference.
When you have an FSSO polling server configured on the FortiManager fabric connector,
FortiManager will import and install all fsso-polling objects to managed FortiGate devices in
the ADOM, including to devices that do not have references to the polling objects in their
policies. user adgrp objects are also imported and installed if any fsso-polling objects are
copied.
You can create an SSO/identity connector for RADIUS single sign-on (RSSO) agents. Only one RADIUS connector can
exist at one time.
1. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
2. Under Endpoint/Identity, select RADIUS Single Sign-On Agent.
3. Configure the following options, and click OK:
Use RADIUS Shared Secret Toggle On to enable the use of a RADIUS shared secret between collector
agent and RADIUS server, and then enter the shared secret. Toggle OFF to
disable this feature.
Send RADIUS Responses Toggle On to send RADIUS response packets after receiving start and stop
records. Toggle OFF to disable this feature.
Advanced Options Expand to view and configure advanced options for RADIUS single sign-on
agents. For details, see the FortiOS CLI Reference.
Cisco pxGrid for FortiManager centralizes the updates from pxGrid for all FortiGate devices, and leverages the efficient
FSSO protocol to apply dynamic policy updates to FortiGate.
You can create multiple Cisco pxGrid connectors per ADOM.
Requirements:
l FortiManager version 6.0 ADOM or later.
l FortiGate is managed by FortiManager.
l The managed FortiGate unit is configured to work with Cisco pxGrid.
l The Cisco ISE server is configured, and the certificate is downloaded.
When the pxGrid connector is created, FortiManager will only process events with state
"Started" or "Disconnected". All other Session Statuses possible on ISE, such as
"Authenticated", are ignored by FortiManager.
Additionally, a Security Group must be defined. See steps below. Users with null a Security
Group are ignored by FortiManager.
1. Create a Security Group: Go to ISE > Work Centers > TrustSec > Components > Security Groups. Click Add.
2. Create a User Identity Group: Go to ISE > Administration > Identity Management > Groups > User Identity Groups.
Click Add.
3. Create a user and add it to User Identity Group: Go to ISE > Administration > Identity Management > Identities. Click
Add.
4. Match the Security Group with User Identity Group in the policy: Go to ISE > Work Centers >TrustSec >
Components > Policy Sets. Right-click and go to Authorization policy > Basic_Authenticatied _Access and click Edit
to match the Security Group with the User Identity Group.
5. Generate the pxGrid certificate and download it to the local computer: Go to ISE > Administration > pxGrid Services
> Certificate and select Generate pxGrid Certificates.
6. See log for current users: Go to ISE > Operations > RADIUS > Live Logs.
7. See live sessions of current users: Go to ISE > Operations > RADIUS > Live Sessions.
To configure FortiManager:
1. Go to System Settings > Certificates, and click Create New/Import > Certificate. Import the downloaded certificate.
2. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
Status Toggle On to enable the fabric connector object. Toggle OFF to disable the
fabric connector object.
You must approve the pending FortiManager in Cisco ISE by going to Administrator
> pxGrid Services > Clients and selecting and approving the FortiManager.
You can enable Automatically Approve New Accounts in Administrator > pxGrid Services
> Settings to automatically approve new certificate-based accounts but you must manually
approve any existing FortiManager devices that are pending approval before the feature
can be enabled.
For more information about client approval, see the Cisco ISE documentation.
10. Go to Fabric View > External Connectors. Click Monitor to see the users currently logged in.
12. On the FortiGate command line, use the diagnose debug authd fsso list to monitor the current user list.
ClearPass Policy Manager (CCPM) is a network access system that can send information about authenticated users to
third party systems, such as a FortiGate or FortiManager. ClearPass connector for FortiManager centralizes updates
from ClearPass for all FortiGate devices and leverages the efficient FSSO protocol to apply dynamic policy updates to
FortiGate.
You can create multiple ClearPass connectors per ADOM.
Requirements:
l FortiManager version 6.0 or later ADOM
l FortiGate is managed by FortiManager and configured to work with ClearPass
l JSON API is exposed, allowing ClearPass to call it
To configure ClearPass:
d. Click Save.
3. Create local users:
a. Go to Configuration > Identity > Local Users.
b. Click Add.
c. Configure the following:
l Set User ID to test1.
l Set Name to testUser1.
l Set Password to qa1234.
l Select Enable.
l Set Role to mytest1.
d. Click Add.
4. Add an Ubuntu simulator:
a. Go to Configuration > Network > Devices.
b. Click Add.
c. Configure the following settings:
l Set Name to Ubuntu_test.
l Set IP or Subnet Address to 10.3.113.61.
l Set RADIUS Shared Secret to qa1234.
l Set Vendor Name to Unix.
d. Click Add.
5. Configure FortiManager to get packets from ClearPass:
6. Create a profile:
a. Go to Configuration > Enforcement > Profiles.
b. Click Add.
c. On the Profile tab, configure the following:
l Set Template to Session Notification Management.
l Set Name to FortiManager Login and Logout.
l Set Description to FortiManager - Initial SSO integration testing.
l Set Type to Post_Authentication.
e. Click Save.
7. Create a policy:
a. Go to Configuration > Enforcement > Policies.
b. Click Add.
c. On the Enforcement tab, configure the following:
l Set Name to FortiManager testing.
l Set Enforcement Type to RADIUS.
l Set Default Profile to Allow Access Profile.
e. Click Save.
8. Create services:
a. Go to Configuration > Services.
b. Click Add.
c. On the Service tab, configure the following:
f. Click Save.
g. Click Add again to add another service.
h. On the Service tab, configure the following:
l Set Name to AuthN user for Fortimanager Testing.
l Set Description to Authorization service for AirGroup device access.
l Set Type to RADIUS Enforcement ( Generic ).
l Set Status to Enabled.
l Create the following service rule:
k. Click Save.
9. Configure the administrator the FortiManager fabric connector uses to access CPPM APIs:
a. Go to Administration > Admin Users.
b. Click Add.
c. Configure the following:
l Set User ID to admin.
l Set Name to admin.
l Set Password to qa987654.
l In Verify Password enter the password again.
l Select Enable User.
l Set Privilege Level to API Administrator.
d. Click Save.
10. Create an API Client:
e. Click Save.
To configure FortiManager:
1. Log in to FortiManager.
2. Run the following CLI command:
config system admin user
edit admin
set rpc-permit read-write
next
end
3. Go to Fabric View > External Connectors, and click Create New. The Create New Fabric Connector wizard is
displayed.
6. Click OK.
7. Get the role and user from ClearPass:
a. Go to Policy & Objects > Security Fabric > Endpoint/Identity.
b. Edit the ClearPass connector and click Apply & Refresh.
FortiManager retrieves the roles and users from ClearPass. Users with green icons are currently logged in.
FortiManager supports VMware NSX-T connectors. After configuration is complete, FortiManager can retrieve groups
from VMware NSX-T manager and store them as dynamic firewall address objects, and a FortiGate that is deployed by
the registered VMware NSX-T service can connect to FortiManager to receive dynamic objects for VMware NSX-T.
Following is an overview of the steps required to set up a VMware NSX-T connector:
1. Enabling read-write JSON API access on page 737
2. Creating a fabric connector for VMware NSX-T on page 738
3. Configure registered services on page 739
4. Configure the NSX-T Manager on page 740
5. Use the groups in a FortiManager policy on page 743
A VMware NSX-T connector requires read-write access to the FortiManager JSON API.
The JSON API registers a service with VMware NSX-T manager and retrieves object updates from VMware NSX-T
manager.
3. From the JSON API Access dropdown, select Read-Write, and click OK.
The FortiManager will log you out to activate the settings.
NSX-T connectors can also be created from Fabric View > Fabric > External Connectors in
FortiManager.
4. Configure the following parameters for the new NSX-T connector, and click OK.
FortiManager Configurations
3. Name Enter the service name to register to NSX-T's partner service catalog.
License Type Select the license type as either License File or FortiFlex.
FortiFlex When using FortiFlex, select a previously configured FortiFlex Connector from
which to obtain the license. See Creating FortiFlex connectors on page 747.
l License type
When upgrading, make sure to mark the change as upgrade by enabling the Upgrade toggle. This marks the
change on the NSX-T Manager. Once a deployment spec is set as Upgrade, users can upgrade a service
deployment using the NSX-T Manager GUI.
1. In the NSX-T Manager, go to Inventory > Groups, and click ADD GROUP.
2. Enter a name, and click Set Members.
3. Select the IP Addresses tab, and add the IP addresses to add as members of this group.
4. Save your changes, and repeat these steps until you have created all of the groups that you require.
11. Select the profile you just created, and click ADD.
12. Save your changes.
13. Go to Service Chain Management > E-W Network Introspection or N-S Network Introspection, and click on Add
Policy.
14. Click on the policy name, and you can change it if required.
1. Select the policy you created in the previous step, and click ADD RULE.
2. Configure the parameters as follows:
a. Name: Redir-Rule.
b. Source: Any (Groups needs to be selected).
c. Destination: Any (Groups needs to be selected).
d. Services: Any.
e. Applied To: DFW.
f. Action: Redirect.
This rule will redirect all traffic to the FortiGate instance. You can be more granular by selecting any combination of
Sources, Destinations, Services, or Applied To for specific groups. If specific groups are selected, only they will be
associated with the Service Manager and show up on FortiManager.
3. Click PUBLISH to apply the changes.
NSX-T currently only supports North-South Introspection once the service is deployed.
These groups and their members are automatically synchronized between FortiManager
and NSX-T Manager. As soon as you add a VM/IP to a group that the Redir-Rule applies to
on NSX-T Manager, it will be synchronized.
5. You can have the FortiManager create Firewall Addresses or create your own. Go to Firewall Objects > Addresses,
and click Create New > Address.
6. Configure the parameters, and click OK.
a. Address Name: Enter a name.
b. Type: Dynamic.
c. Sub Type: FSSO.
d. FSSO Group: nsx_NSXT-Manager_Default/groups/<group name>
Migrating FortiGates that are part of the NSX-T connector to a new ADOM
Because the NSX-T configuration is not ADOM specific, migrating FortiGates to a different ADOM will not cause them to
lose their configurations. The connector will continue to update IPs and address groups from the previously created
policies for the FortiGates on the new ADOM.
It is recommended you import the Policy Package into the new ADOM after the migration is complete.
If you want to migrate the NSX-T connector to a new ADOM, you must follow these the process below.
You can create SDN connectors for VMware vCentre to allow FortiGate to retrieve dynamic addresses from VMware
vCenter via FortiManager.
Following is an overview of how to configure an SDN connector for VMware vCenter:
1. Create an SDN connector for VMware vCenter. See Creating SDN connectors for VMware vCenter on page 744.
2. Create a dynamic address object that references the SDN connector for VMware vCenter. See Creating dynamic
addresses on page 746.
3. Create a firewall policy. See Creating firewall policies on page 746.
4. Install the changes to FortiGate. See Installing changes to FortiGate on page 746.
FortiGate can retrieve dynamic addresses from VMware vCenter via FortiManager.
This example assumes that VMware vCenter is already set up.
You can configure a FortiFlex connector to allow FortiManager to assign licenses to managed FortiGate devices through
the device manager. See Installing VM licenses on managed devices on page 144.
API User Enter the username for your FortiFlex API user.
API Password Enter the password for your FortiFlex API user.
You can configure a JSON API connector to allow FortiManager to add users, get users and FSSO groups, and delete
data.
1. Go to Fabric View > External Connectors and click Create New > JSON API connector.
You can also configure this connector at Policy & Objects > Security Fabric > Endpoint/Identity.
Tags Enter tags for the JSON API connector. You can add additional tags by
clicking the plus icon beneath the text field.
3. The tags that you created in the connector can now be used in a policy as the FSSO group (adgrp).
Once the policy with the FSSO group(s) are installed on a FortiGate, you can use the JSON API to operate the
connector to add users, get FSSO groups, get users, or delete users.
Cloud Orchestration
FortiManager supports the ability to orchestrate the deployment of FortiGate autoscaling groups (ASG) on Amazon Web
Services (AWS). This allows administrators to use FortiManager as a single-pane to deploy all resources required to
implement FortiGate ASG in the public cloud.
You can deploy cloud orchestration on FortiManager for the following deployment types:
l FortiGate ASG on AWS for existing virtual private clouds.
l FortiGate ASG on AWS for new virtual private clouds.
l FortiGate ASG on AWS for new virtual private clouds with a transit gateway (TGW).
1. Configure a cloud connector to connect to the AWS server. See Creating cloud connectors on page 750.
2. Configure a cloud deployment template to configure the VPC and FortiGate ASG settings. See Creating cloud
deployment templates on page 750.
3. Create a new cloud orchestration and deploy it to the public cloud. See Deploying cloud orchestration on page 753.
Once created, cloud connectors, deployment templates, and cloud orchestrations can be cloned, edited and deleted.
In order to use cloud orchestration with FortiManager, you must first configure a corresponding cloud orchestration
connector to connect to the AWS server. After the cloud connector is created, you can select it from within a cloud
orchestration configuration.
Use Metadata IAM When this setting is enabled, FortiManager will use the IAM information
provided in metadata to access the cloud service, and you do not need to
provide the Access Key ID or Secret Access Key for the cloud service.
This setting is disabled by default.
Access Key ID Enter your access key ID created from the AWS IAM console.
Secret Access Key Enter your secret access key created from the AWS IAM console.
Cloud orchestration uses cloud deployment templates to specify the VPC and FortiGate ASG settings.
You can configure the following types of cloud deployment templates:
You can view a tooltip with information about each configurable setting in the GUI.
When configuring a cloud deployment template which includes any BYOL VMs, you must
manually upload your BYOL license file(s) to AWS in the following location before deploying
the cloud orchestration: <S3Bucket>/assets/license-files/fortigate/ where <S3Bucket> is the
default bucket created in each region, or the bucket specified in the Cloud Orchestration
Template under Advanced Options > Misc > S3 Bucket Name.
Once you have configured a cloud connector to access the public cloud server and a deployment template to configure
the deployment settings, you can create a cloud orchestration. Once the orchestration profile is created, you can deploy
the cloud orchestration to the AWS public cloud to automatically create the FortiGate ASG and optional FortiAnalyzer-
VM.
Connector Choose a previously configured Cloud Orchestration Connector or click the plus icon to
configure a new connector.
Deployment Choose a previously configured Deployment Template or click the plus icon to configure a
Template new template.
3. Once the CloudFormation process is complete, you can see the cloud orchestration Status as Deployed on
FortiManager.
1. In Cloud Orchestration, right-click on a cloud orchestration and click Undeploy/Delete from Cloud.
The cloud orchestration is undeployed in AWS CloudFormation.
1. In Cloud Orchestration, right-click on a cloud orchestration and click Query Status from Cloud.
The Getting Status Information from Cloud window opens.
2. The Status of the selected cloud orchestration is updated.
FortiAI
FortiAI is a generative AI security assistant that uses FortiGuard lab's high-fidelity security data and is continuously
monitored and improved by FortiGuard Security experts. Administrators can use the FortiAI Assistant to answer
questions and get help with configurations using FortiAI's advanced natural language processing capabilities.
The FortiAI assistant can be used to help with queries and configurations relating to scripts, VPN, and IoT device
analysis. See Using FortiAI on page 756.
FortiAI can be accessed from the following areas in the FortiManager GUI:
l The FortiAI icon in the banner from any page in the GUI.
l The FortiAI module in the FortiManager tree menu.
In order to use FortiAI, FortiManager must have a valid FortiAI license. FortiAI license information can be viewed in
Dashboard in the License Information widget. See the FortiManager Datasheet and FortiAI tokens on page 759 for more
information about licensing.
When licensed, FortiAI can be accessed by up to a maximum of three local administrators on the FortiManager. You can
configure which administrators can use the FortiAI service using the FortiManager CLI. See Enabling administrator
access to FortiAI on page 755.
FortiAI licenses allow up to 3 local administrators to access the FortiAI assistant on all platforms. FortiAI capabilities can
only be enabled for local administrators.
3. Set the FortiAI User field to the ON position, and click OK to save the changes.
When attempting to enable FortiAI access on more than three administrators or on a non-local user, an error
message is displayed.
1. In the FortiManager CLI, use the following commands to enable or disable this feature for an admin:
config system admin user
edit <administrator>
set fortiai {disable | enable}
Using FortiAI
The FortiAI assistant can be used to navigate the GUI and perform actions. It can also be used to answer questions and
query data.
The FortiAI assistant is operated using prompts. You can use natural language to request actions or information from the
FortiAI assistant. If you enter a prompt that the FortiAI assistant does not understand, it will ask for more details to clarify
your request. Responses from the FortiAI assistant may also include suggestions and requests for you to consider. For
example, after responding to a query for information, the FortiAI assistant may ask if you would like help performing a
related action.
The FortiAI assistant's responses can include text, images, widgets, and data retrieved directly from your FortiManager
environment. Some widgets provided by the assistant can include actions for the administrator to simplify the
configuration and management of their environment. For example, the FortiAI assistant can help quarantine IoT devices.
If you log out, close, or reload your session, you will not be able to continue your current thread
with the FortiAI assistant. For example, you will not be able to reference a chart the FortiAI
assistant in the current thread after reloading.
The FortiAI assistant can be used to help with queries and configurations for the following:
Script Assistant Use the Script Assistant to generate CLI and Jinja scripts based on the
administrator input.
VPN Assistant Use the VPN Assistant to help write scripts to provision VPN topologies and check
or diagnose the VPN tunnel status.
IoT Device Analysis Use IoT Device Analysis to gather information and perform actions for IoT
devices. The assistant can help with the following:
Provide
Inform you about the prerequisites needed for detect IoT
Prerequisite
devices through FortiGate devices.
Information
IoT Device
Gather information on IoT devices reported by FortiGates,
Detect and
pinpoint and analyze vulnerable devices detected, and
Vulnerability
offer detailed insights into these vulnerabilities.
Analysis
Quarantine
Quarantine devices specified by the user.
Device
The above examples use full sentences. However, in general, using more text means using
more tokens. To more efficiently use tokens, keep your prompts concise.
For more information about tokens, see FortiAI tokens on page 759.
Section Description
Toolbar Click an icon to perform the related action or open the related dialog.
Download Chat Download the current chat thread in HTML or PNG format.
History
Section Description
Thread Displays your prompts and the FortiAI assistant’s responses for the current
thread.
At the bottom of responses from the FortiAI assistant, click the help icon to display
the function callback results.
Prompt Enter a prompt for the FortiAI assistant, and then click send. Alternatively, you can
click the microphone icon to speak a prompt for the FortiAI assistant.
When available, suggested prompts display above the text box. You can click
these suggestions to prompt the FortiAI assistant.
Monthly token usage Displays the percentage of monthly tokens used for the current month. For more
information, see FortiAI tokens on page 759.
FortiManager and FortiAI protects your data by masking private information such as IP addresses before it is sent to the
FortiAI large language model (LLM) for processing. In this topic you can find a list of protected data as well as the
process FortiManager follows to protect your data.
Protected data
The following list of data is considered private and will be masked on FortiManager before it is sent to the FortiAI LLM.
See How private data is protected on page 759.
l IoT devices' MAC addresses, vendors, and hostnames
l The FortiGate device name on FortiManager
l The "root" keyword
l VDOM names
l IPv4 and IPv6 addresses
l MAC addresses
Private data included in images such as topologies that are uploaded to FortiAI will not be
masked when the image is sent to the LLM for processing. When uploading an image to
FortiAI, FortiManager will present a warning message that the administrator can use to confirm
or cancel the upload before it is sent to the LLM for processing.
1. The FortiAI assistant identifies information in a query that matches the list of protected data.
2. FortiManager masks the private data, and the masked data is returned to the FortiAI assistant.
3. The FortiAI assistant creates a one-to-one mapping between the masked and unmasked data.
4. The FortiAI assistant sends the masked data to the LLM where the request is processed.
5. When the result is returned, FortiAI receives the masked data from the LLM, and a reverse mapping is performed.
6. The private data is returned to the user unmasked in the assistant's response.
FortiAI tokens
When FortiManager is licensed for FortiAI, the license will include a monthly entitlement for tokens that is shared by all
FortiAI users.
Tokens are used in large language models (LLMs) to process text and quantify usage. Tokens usage is calculated using
the following guidelines:
l When you use the FortiAI assistant, the text in both the prompt (input) and the response (output) is processed as
tokens.
l While there is not a one-to-one relationship between words or characters and tokens, in general, more text in the
query and response means using more tokens.
l Because the FortiAI assistant uses session history to inform it's responses, queries that are a part of a long session
will use more tokens than new conversations.
Best practices
To ensure you are using your monthly allocation of tokens effectively, consider implementing best practices for FortiAI
users. For example:
l Make your prompts concise and specific. In terms of token usage, the prompt "Can you please help me create a
firewall address for 10.0.0.1 and another one for the domain awesome-domain.com?" is less effective than "Create
firewall addresses for 10.0.0.1 and awesome-domain.com".
l Use filters in your prompts to receive concise and specific responses. For example, say that you want to create a
site-to-site VPN based on an uploaded topology image.
l Use words that relate to functions existing in FortiManager. For example, using "quarantine device" concisely tells
the FortiAI assistant what action is required.
l Reference details in the existing thread when possible. This reduces redundancy and allows you to be concise and
specific as you build upon previous prompts. However, note that the FortiAI assistant will not remember previous
threads.
The monthly token usage is displayed at the bottom of the FortiAI pane in FortiManager. Mouse over the Monthly token
usage % to view the following in a tooltip:
l Current Chat Session Token Usage
l Current Monthly Token Usage
l Total Monthly Entitled Tokens
The following are some example prompts that can be used to interact with the FortiAI assistant.
l Example 1: Performing IoT device analysis on page 760
l Example 2: Using the script assistant to create a script on page 766
l Example 3: Using the VPN assistant to configure site-to-site VPN on page 768
l Example 4: Using the VPN assistant to check and diagnose the VPN tunnel on page 772
1. Open the FortiAI assistant, and select the IoT Device Analysis assistant.
2. Ask FortiAI to tell you what you need to do in order to detect IoT devices for FortiGates.
l The FortiAI assistant will provide you with a list of prerequisites that must be met for IoT device detection.
3. Ask FortiAI to help you perform the prerequisite checks on your FortiGates.
l The FortiAI assistant provides you with a widget where you can select devices on which to perform the
prerequisite check. You can select devices or device groups, and click Confirm to perform the prerequisite
check.
l Once the check is completed, the FortiAI assistant will display the results of the check.
4. Ask FortiAI to provide you with more IoT information on your FortiGates.
l The FortiAI assistant provides a widget to get the IoT device status from your FortiGates. You can select one or
more FortiGates and click Confirm to proceed with the task. IoT device data is displayed for the selected
FortiGates.
5. Ask the FortiAI assistant to generate a pie chart based on the results.
l The FortiAI assistant will generate a pie chart graph based on the IoT device data collected from the previous
prompt.
7. Ask the FortiAI assistant to quarantine the device with MAC address 80:81:82:83:84:85 on FortiGate-AI-1.
l The FortiAI assistant will ask you to confirm the quarantine of the specified device. Click Confirm to quarantine
the device.
l The FortiAI agent creates a script that creates two firewall addresses: one for the IP 10.2.2.1 and one for the
FQDN awesome-service.com.
l Click Save Script to edit the generated response as a new script, with the script name and comments
automatically created. The script is saved to Device Manager > Scripts.
l Click Save CLI Template to save the generated script to Device Manager > Provisioning Templates > CLI
Template.
a. Select upload an image, and FortiAI will provide a widget where you can upload an image of your topology. The
maximum size of this file is 5MB.
i. FortiAI will prompt you with a summary of the network that you can review and confirm.
b. Select Select Devices, and FortiAI will provide a widget where you can select the devices, WAN, and
LAN interface, as well as actions to add or delete items in the list.
Example 4: Using the VPN assistant to check and diagnose the VPN tunnel
b. FortiAI reports the status of the tunnel based on the selected device.
a. FortiAI will prompt you to select a device. Choose a device, and click Confirm.
c. The AI assistant provides a summary of detected potential VPN issues. Ask the AI assistant to help resolve the
detected issues. Once completed, install the changes to the affected devices and check the VPN status again
to confirm that the issues are resolved.
The FortiGuard Distribution Network (FDN) provides FortiGuard services for your FortiManager system and its managed
devices and FortiClient agents. The FDN is a world-wide network of FortiGuard Distribution Servers (FDS), which update
the FortiGuard services on your FortiManager system on a regular basis so that your FortiManager system is protected
against the latest threats.
FortiManager VM with a trial license does not support FortiGuard subscriptions and cannot act
as a local FDS.
To see a list of which updates are available per platform when FortiManager is acting as a
local FDS, see the FortiManager Release Notes.
Before you can use your FortiManager system as a local FDS, you must:
l Register your devices with Fortinet Customer Service & Support and enable the FortiGuard service licenses. See
your device documentation for more information on registering your products.
l If the FortiManager system’s Unregistered Device Options do not allow service to unauthorized devices, add your
devices to the device list, or change the option to allow service to unauthorized devices. For more information, see
the FortiManager CLI Reference.
For information about FDN service connection attempt handling or adding devices, see Device Manager on page
81.
l Enable and configure the FortiManager system’s built-in FDS. For more information, see Configuring network
interfaces on page 880.
l Connect the FortiManager system to the FDN.
The FortiManager system must retrieve service update packages from the FDN before it can redistribute them to
devices and FortiClient agents on the device list. For more information, see Connecting the built-in FDS to the FDN
on page 798.
l Configure each device or FortiClient endpoint to use the FortiManager system’s built-in FDS as their override
server. You can do this when adding a FortiGate system. For more information, see Add devices on page 84.
FortiGuard Management also includes firmware revision management. To view and configure firmware options, go to
FortiGuard > Firmware Images. You can download these images from the Customer Service & Support portal to install
on your managed devices or on the FortiManager system.
This section contains the following topics:
l Device licenses on page 777
l Package management on page 779
l Query services on page 786
l Firmware images
l Settings
l Configuring devices to use the built-in FDS
l Configuring FortiGuard services
l Logging events related to FortiGuard services
l Restoring the URL or antispam database
For information on current security threats, virus and spam sample submission, and
FortiGuard service updates available through the FDN, including antivirus, IPS, web filtering,
and email filtering, see the FortiGuard Center website, https://fortiguard.com.
Device licenses
On the FortiGuard > Device Licenses pane, you can view the status of all licenses for each managed device. This
section includes the following topics:
l View licensing status on page 777
1. Go to FortiGuard > Device Licenses. This page displays the following columns of information:
The following toolbar is displayed:
Refresh Select the refresh icon to refresh the information displayed on this page.
Push Update Push a license update to the selected device in the group.
Show License Expired Toggle to hide and display only devices with an expired license.
Devices / Show All Devices
Check License Click to check expiry dates for licenses. The Check License dialog box is
displayed. Select the FortiGuard license types that you want FortiManager to
check expiry dates for and provide warnings when it is expired or approaching
expiry date.
The FortiGuard Subscription status is updated based on the selection in the
Check License screen. If a license is expiring in 30 days, its license status is in
orange (warning). If a license is expired already, the status is in red (error).
Export Click to export the device list, device update details, and license details to an
Excel, CSV, or PDF format. A file in the selected format is downloaded to the
management computer.
Column Settings Click to choose what columns to display on the Device Licenses page.
Search Use the search field to find a specific device in the table.
Device Name The device name or host name. You can change the order that devices are
listed by clicking the column title.
ADOM The name of the ADOM that contains the device. You can change the order
that ADOMs are listed by clicking the column title.
Support Contract License status of the support contract. Hover over the license status to display
expiration details about the following support contracts: hardware, firmware,
enhanced support, and comprehensive support. License status can include:
l N/A: No support contract
l 24/7: Support contract level that provides support 24 hours per day and 7
l Expires in <time>
l Expired
l Unknown
Service Status License status of antivirus and IPS service. FortiManager calculates the status
based on the FortiGate's last update request.
Hover the mouse over the cell to display details about the service status.
Licenses status can include:
l Update Available
l Up to Date
l Expired
l Unknown
Virtual Domains Number of virtual domains. Click the cart icon to go to the Fortinet support site
(https://support.fortinet.com)
Package management
When FortiManager is acting as a local FDS, antivirus and IPS signature packages are managed in FortiGuard >
Packages. Packages received from FortiGuard and the service status of managed devices are listed in Receive Status
and Service Status, respectively.
Receive status
To view packages received from FortiGuard, go to FortiGuard > Packages > Receive Status. This page lists received
packages, grouped by platform.
The following information is displayed:
Show Used Object Only Clear to show all package information. Select to show only relevant package
information.
Export Select a package, and click Export. The package is compressed and downloaded
to your management computer. You can import the package into another
FortiManager.
Import Click Import to select a package exported from another FortiManager and import it
into this FortiManager.
Search Use the search field to find a specific object in the table.
Product The name of the product supported by the package, such as FortiGate.
Click the Filter icon to display the filter options. When a filter is active, the Filter
icon is green. When the Filter icon is gray, no filter is applied.
Click the Filter icon to display the filter options. When a filter is active, the Filter
icon is green. When the Filter icon is gray, no filter is applied.
Service Entitlement The name of the service entitlement that includes the package support.
To Be Deployed Version The package version that is to be deployed. By default, the latest version is
deployed. Select Change to change the version.
When you export a package, only one version is exported. The To Be Deployed
Version identifies what version is exported. See also Exporting packages
example on page 783.
Update History Click the icon to view the package update history.
Deployed version
To change the to be deployed version of a received packaged, click Change in the To Be Deployed Version column for
the package.
The Change Version dialog box is displayed, allowing you to select an available version from the dropdown list.
Update history
When you click the Update History button for a package, the Update History pane is displayed for the package.
It shows the update times, the events that occurred, the statuses of the updates, and the versions downloaded.
Service status
To view service statuses, go to FortiGuard > Packages > Service Status. The service status information can be
displayed by installed package name or by device name.
The following options are available in the toolbar:
Push Pending Select the device or devices in the list, then click Push Pending in the toolbar to
push pending updates to the device or devices.
Push All Pending Select Push All Pending in the toolbar to push pending updates to all of the
devices in the list.
Column Settings Select which fields are included in the service status table.
Display Options Displays the available display options including Show Pending Device Only and
Group by ADOMs.
This option is only available while viewing service status By Device.
By ADOM Displays the service status information for all devices in the selected ADOM(s).
By default, this is set to All ADOMs.
Search Use the search field to find a specific device or package in the table.
When you click the By Device button in the toolbar, the Service Status page displays a list of all the managed FortiGate
devices, their last update time, and their status.
You can pushing pending updates to the devices, either individually or all at the same time. You can refresh the list by
clicking Refresh in the toolbar.
Status The service update status. A device's status can be one of the following:
l Up to Date: The latest package has been received by the FortiGate unit.
l Never Updated: The FortiGate unit has never requested or received the
package.
l Pending: The FortiGate unit has an older version of the package due to an
acceptable reason (such as the scheduled update time having not come yet).
Hover the mouse over a pending icon to view the package to be installed.
l Problem: The FortiGate unit missed the scheduled query, or did not correctly
receive the latest package.
l Unknown: The FortiGate unit’s status is not currently known.
Last Update Time The date and time of the last update.
When you click the By Package button, the Service Status page shows a list of all the installed packages, the applicable
firmware version, the package version, and the progress on package installation to devices. You can drill-down to view
the installed device list.
The content pane displays the following information:
Applicable Firmware Version The firmware version of the device for which the installed package is created.
Installed Devices The package installation progress for the devices. Click the <number> of
<number> link to view the installed device list.
3. In the Installed Devices column, click the <number> of <number> link for the installed package.
Device details are displayed.
IoT packages
You can enable download of packages for the Internet of Things (IoT) service by using the CLI. Following is a summary
of how FortiManager handles the IoT packages:
1. FortiManager downloads packages from FortiGuard.
2. FortiManager merges the downloaded packages into Run Database.
3. FortiManager provides the query service.
Downloads of IoT packages from FortiGuard to FortiManager are currently supported only
when Anycast is enabled on FortiManager.
In FortiManager 7.4.1 and later, the IoT query services must be enabled separately using the
FortiManager CLI.
See Enabling IoT query services on page 791.
Several databases are used for IoT packages. Use the diagnose fmupdate fgd-dbver command to view the
following databases for IoT packages:
l iots: IoT single MAC database
object ID: 00000000IOTS0000
Contains IoT info with entry of a single MAC. Considered a delta object because each version contains parts of
data, and FortiManager merges all valid data, which is the same as the URL query service.
l iotr: IoT range MAC database
object ID: 00000000IOTR0000
Contains IoT info with entry of a MAC range. Considered a regular object, and FortiManager uses only the latest
version.
l iotm: IoT mapping database
object ID: 00000000IOTR0000
Regular object used to map the info data to strings in tag-length-value (TLV) format.
end
2. Enable the IoT query service:
config fmupdate service
set query-iot enable
end
3. Configure downloading of IoT packages:
config fmupdate web-spam fgd-setting
set iot-log nofilequery
set iot-preload enable
set restrict-iots-dbver <string>
end
You can export one or more packages from FortiManager to a compressed file, so you can import the packages into
another FortiManager. This is useful when you want to add packages to a FortiManager operating in a closed network.
You can specify what version of the package to export.
To export packages:
b. In the Change to Version box, select the version to deploy, and click OK.
The To Be Deployed column displays the selected version.
4. Select one or more packages, and click Export.
The Confirm dialog box is displayed.
5. Click OK.
The progress of the process is displayed with the object is compressed and downloaded to your management
computer.
You can import packages that you exported from another FortiManager.
To import packages:
3. Drag and drop the exported package onto the dialog box.
The dialog box updates.
4. Click OK.
A confirmation dialog box is displayed.
5. Click OK.
The progress of the process is displayed while the object is imported to FortiManager.
6. Click Close.
Query services
Query Services shows when managed devices query FortiManager acting as a local FDS. It displays when managed
devices receive updates from the server, the update version, the size of the update, and the update history. It also has
graphs showing the number of queries from all the managed FortiGate units made to FortiManager.
Receive status
The view the received packages, go to FortiGuard > Query Services > Receive Status.
The following information is displayed:
Export Select a package, and click Export. The package is compressed and downloaded
to your management computer. You can import the package into another
FortiManager.
Import Click Import to select a package exported from another FortiManager and import it
into this FortiManager.
Search Use the search field to find a specific entry in the table.
Update history
When you click the Update History button for a package, the Update History pane is displayed for the package.
It shows the update times, the events that occurred, the statuses of the updates, and the versions downloaded.
Query status
Go to FortiGuard > Query Services > Query Status to view graphs that show:
l The number of queries made from all managed devices to the FortiManager unit over a user selected time period
l The top ten unrated sites
l The top ten devices for a user selected time period
The following information is displayed:
Top 10 Unrated Sites Displays the top 10 unrated sites and the number of events.
Hover the cursor over a row to see the exact number of queries.
You can export one or more web filter databases from FortiManager to a compressed file, so you can import the web
filter database into another FortiManager. This is useful when you want to add a web filter database to a FortiManager
operating in a closed network.
3. Click OK.
The progress of the process is displayed while the object is compressed and downloaded to your management
computer.
You can import web filter databases that you exported from another FortiManager.
3. Drag and drop the exported package onto the dialog box.
The dialog box updates.
4. Click OK.
A confirmation dialog box is displayed.
5. Click OK.
The progress of the process is displayed while the object is imported to FortiManager.
6. Click Close.
FortiManagers connected to FDS have the option to download delta packages from FortiGuard when exporting
FortiGuard packages.
When the package is imported into the upstream FortiManager, the upstream FortiManager can provide the delta
package update to downstream FortiManagers instead of the entire merged package, saving bandwidth.
1. On the online FortiManager, go to FortiGuard > Query Services > Receive Status, and Export the FortiGuard
package.
A dialog appears with the option to enable or disable delta package downloads.
2. Enable the Download Delta Data toggle. When enabled, the merged FortiGuard package will be downloaded with
delta packages.
3. On the upstream FortiManager, go to FortiGuard > Query Services > Receive Status and Import the package with
the delta packages. The download history shows the imported delta packages.
4. The downstream FortiManager can pull delta packages from the upstream FortiManager instead of getting the
entire merged package, saving bandwidth.
In FortiManager 7.4.1 and later, the IoT Query, IoT Vulnerability Query, and IoT Collection Query services must be
enabled or disabled separately using the following FortiManager CLI commands:
Command Description
query-iot Enable/disable IOT query service (default = disable).
query-iot-collection Enable/disable IOT collection query service (default = disable).
query-iot-vulnerability Enable/disable IOT vulnerability query service (default = disable).
Firmware images
Go to FortiGuard > Firmware Images to manage the firmware images stored on the FortiManager device. You can import
firmware images for FortiGate, FortiAnalyzer, FortiManager, FortiAP, FortiExtender, FortiSwitch, and FortiProxy.
You can download only those images that are needed from the FDS systems, and customize which firmware images are
available for deployment.
FortiGate devices must have a valid Firmware & General Updates (FMWR) contract in order
for firmware updates to be performed through FortiManager. This applies to firmware images
from FortiGuard and images that are manually uploaded to FortiManager.
When a FortiGate device is added to the FortiManager, a 24 hour grace period is provided in
which firmware updates can be applied without a license to allow time for the FMWR contract
information to synchronize from FortiCare. FortiManager expects the managed device to be
on the same FortiCloud account, or have the device serial number added in FortiGuard's auth
list.
Models From the dropdown list, select All to show all the available models on the
FortiGuard server, or select Managed to show only the models that are currently
being managed by the FortiManager device.
Search Use the search field to find a specific entry in the table.
Model The device model number that the firmware is applicable to.
Latest Version (Release The latest version of the firmware that is available.
Date/Time)
Preferred Version The firmware version that you would like to use on the device. Click Change to
open the Change Version dialog box, then select the desired version from the
dropdown list and select OK to change the preferred version.
Status The status of the image, that is, from where it is available.
Release Notes A link to a copy of the release for the firmware image that has been downloaded.
Download/Delete Download the firmware image from the FDS if it is available. If the firmware
images has already been downloaded, then delete the firmware image from the
FortiManager device.
For information about upgrading your FortiManager device, see the FortiManager Release Notes or contact Fortinet
Customer Service & Support.
1. Go to FortiGuard > Firmware Images, and click Import Images in the toolbar.
2. Select a device in the list, and click Import in the toolbar. The Firmware Upload dialog box, opens.
3. Click Browse to browse to the desired firmware image file, or drag and drop the file onto the dialog box.
4. Click OK to import the firmware image.
Firmware images can be downloaded from the Fortinet Customer Service & Support site at
https://support.fortinet.com/ (support account required).
1. Go to FortiGuard > Firmware Images, and click Import Images in the toolbar.
2. Select the firmware images you would like to delete.
3. Click Delete in the toolbar. A confirmation dialog box appears.
4. Click OK to delete the firmware images.
External resources
FortiManager allows external resources to be uploaded in order to support FortiManager hosted resources for threat
feeds.
After external resources are uploaded to FortiManager, they can be used in threat feeds using the following format as the
URI of the resource: fmg://<filename>.
For example, if you have uploaded a resource called exresource1.txt to FortiManager, the URI would be
fmg://exresource1.txt.
For more information on threat feeds, see Threat Feeds on page 713.
1. In the external resource file list, select a file and do one of the following:
a. Click Edit in the toolbar.
b. Right-click and select Edit from the context menu.
2. The content of the file is displayed and can be edited directly in the Content pane.
3. Click OK to save changes to the external resource.
If the Threat Feeds tab is not visible, it must first be enabled in Tools > Feature Visibility.
You can also create Threat Feeds in Fabric View > External Connectors.
Settings
FortiGuard > Settings provides a central location for configuring and enabling your FortiManager system’s built-in FDS
as an FDN override server.
By default, this option is enabled. After configuring FortiGuard and configuring your devices to use the FortiManager
system as their FortiGuard server, you can view overall and per device statistics on FortiGuard service benefits.
To operate in a closed network, disable communication with the FortiGuard server. See Operating as an FDS in a closed
network on page 799.
Enable Communication with When toggled OFF, you must manually upload packages, databases, and
FortiGuard Server licenses to your FortiManager. See Operating as an FDS in a closed network on
page 799.
Communication with Select Servers Located in the US Only to limit communication to FortiGuard
FortiGuard Server servers located in the USA. Select Global Servers to communicate with servers
anywhere.
Enable Antivirus and IPS Toggle ON to enable antivirus and intrusion protection service.
Service When on, select what versions of FortiGate, FortiMail, FortiSandbox, FortiClient,
FortiDeceptor, FortiTester, and FortiNDR to download updates for.
Enable Web Filter and Service Toggle ON to enable web filter services. When uploaded to FortiManager, the
Web Filter database version is displayed.
Enable Email Filter Service Toggle ON to enable email filter services. When uploaded to FortiManager, the
Email Filter databases versions are displayed.
Server Override Mode Select Strict (Access Override Server Only) or Loose (Allow Access Other
Servers) override mode.
FortiGuard Antivirus and IPS Configure antivirus and IPS settings. See FortiGuard antivirus and IPS settings on
Settings page 796.
FortiGuard Web Filter and Configure web and email filter settings. See FortiGuard web and email filter
Email Filter Settings settings on page 797.
Override FortiGuard Server Configure web and email filter settings. See Override FortiGuard server (Local
(Local FortiManager) FortiManager) on page 798.
Download Prioritization Configure the download priority by product or package. See Download
prioritization on page 807.
In this section you can enable settings for FortiGuard Antivirus and IPS settings.
Use Override Server Address Configure to override the default built-in FDS so that you can use a port or specific
for FortiClient FDN server. Select the add icon to add additional override servers, up to a
maximum of ten. Select the delete icon to remove entries.
To override the default server for updating FortiClient device’s FortiGuard
services, see Overriding default IP addresses and ports on page 815.
Use Override Server Address Configure to override the default built-in FDS so that you can use a port or specific
for FortiGate/FortiMail FDN server. Select the add icon to add additional override servers, up to a
maximum of ten. Select the delete icon to remove entries.
To override the default server for updating FortiGate/FortiMail device’s FortiGuard
services, see Overriding default IP addresses and ports on page 815.
Allow Push Update Configure to allow urgent or critical updates to be pushed directly to the
FortiManager system when they become available on the FDN. The FortiManager
system immediately downloads these updates.
To enable push updates, see Enabling push updates on page 813.
Scheduled Regular Updates Configure when packages are updated without manually initiating an update
request.
In this section you can enable settings for FortiGuard Web Filter and Email Filter.
Connection to FortiGuard Configure connections for overriding the default built-in FDS or web proxy server
Distribution Server(s) for web filter and email filter settings.
To override an FDS server for web filter and email filter services, see Overriding
default IP addresses and ports on page 815.
To enable web filter and email filter service updates using a web proxy server, see
Enabling updates through a web proxy on page 814.
Use Override Server Address Configure to override the default built-in FDS so that you can use a port or specific
for FortiClient FDN server. Select the add icon to add additional override servers, up to a
maximum of ten. Select the delete icon to remove entries.
Use Override Server Address Configure to override the default built-in FDS so that you can use a port or specific
for FortiGate/FortiMail FDN server. Select the add icon to add additional override servers, up to a
maximum of ten. Select the delete icon to remove entries.
To override the default server for updating FortiGate device’s FortiGuard
services, see Overriding default IP addresses and ports on page 815.
Log Settings Configure logging of FortiGuard server update, web filtering, email filter, and
antivirus query events.
l Log FortiGuard Server Update Events: enable or disable
l FortiGuard Web Filtering: Choose from Log URL disabled, Log non-URL
Configure and enable alternate FortiManager FDS devices, rather than using the local FortiManager system. You can
set up as many alternate FDS locations, and select what services are used. The following settings are available:
Additional number of Private Select the add icon to add a private FortiGuard server. Select the delete icon to
FortiGuard Servers (Excluding remove entries.
This One) When adding a private server, you must type its IP address and time zone.
Enable Antivirus and IPS When one or more private FortiGuard servers are configured, update antivirus and
Update Service for Private IPS through this private server instead of using the default FDN.
Server This option is available only when a private server has been configured.
Enable Web Filter and Email When one or more private FortiGuard servers are configured, update the web filter
Filter Update Service for and email filter through this private server instead of using the default FDN.
Private Server This option is available only when a private server has been configured.
Allow FortiGates to Access When one or more private FortiGuard servers are configured, managed FortiGate
Public FortiGuard Servers units will go to those private servers for FortiGuard updates. Enable this feature to
When Private Servers allow those FortiGate units to then try to access the public FDN servers if the
Unavailable private servers are unreachable.
This option is available only when a private server has been configured.
The FortiManager system’s network interface settings can restrict which network interfaces
provide FDN services. For more information, see Configuring network interfaces on page 880.
When you enable the built-in FDS and initiate an update either manually or by a schedule, the FortiManager system
attempts to connect to the FDN.
If all connection attempts to the server list fail, the connection status will be Disconnected.
If the connection status remains Disconnected, you may need to configure the FortiManager system’s connection to the
FDN by:
l overriding the default IP address and/or port
l configuring a connection through a web proxy.
After establishing a connection with the FDN, the built-in FDS can receive FortiGuard service update packages, such as
antivirus engines and signatures or web filtering database updates, from the FDN.
If the built-in FDS is unable to connect, you may need to enable the selected services on a
network interface. For more information, see Configuring network interfaces on page 880.
If you still cannot connect to the FDN, check routes, DNS, and any intermediary firewalls or
NAT devices for policies that block necessary FDN ports and protocols.
The FortiManager can be operated as a local FDS server when it is in a closed network with no internet connectivity.
Without a connection to a FortiGuard server, update packages and licenses must be manually downloaded from
support, and then uploaded to the FortiManager.
As databases can be large, we recommend uploading them using the CLI. See Uploading
packages with the CLI on page 800.
Go to FortiGuard > Settings to configure FortiManager as a local FDS server and to upload update packages and
license.
Enable Communication with Toggle OFF to disable communication with the FortiGuard servers.
FortiGuard Servers
Enable Antivirus and IPS Toggle ON to enable antivirus and intrusion protection service.
Service When on, select what versions of FortiGate, FortiClient, FortiAnalyzer, and
FortiMail to download updates for.
Enable Web Filter Services Toggle ON to enable web filter services. When uploaded to FortiManager, the
Web Filter database is displayed.
Enable Email Filter Services Toggle ON to enable email filter services. When uploaded to FortiManager, the
Email Filter database is displayed.
Packages and Database Select to upload antivirus and IPS packages, web filter databases, and email filter
databases. Browse for the file you downloaded from the Customer Service &
Support portal on your management computer, or drag and drop the file onto the
dialog box.
Click OK to upload the package to FortiManager.
As the database can be large, uploading with the CLI is recommended. See
Uploading packages with the CLI on page 800.
Service License Select to import the FortiGate or FortiSOAR license. Browse for the file on your
management computer, or drag and drop the file onto the dialog box.
Click OK to upload the package to FortiManager.
A license file can be obtained from support by requesting your account
entitlement for the device. See Requesting account entitlement files on page 805.
AntiVirus/IPS Packages Select to upload the FortiClient AntiVirus/IPS packages. Browse for the file you
downloaded from the Customer Service & Support portal on your management
computer, or drag and drop the file onto the dialog box.
Click OK to upload the package to FortiManager.
Packages and licenses can be uploaded using the CLI. This should be used when the packages being uploaded are
large, like database packages.
1. If not already done, disable communications with the FortiGuard server and enable a closed network with the
following CLI commands:
config fmupdate publicnetwork
set status disable
end
When performing the initial setup of FortiManager, you are required to register your FortiManager to FortiCare, which
typically requires internet access. While operating in a closed network or air-gap environment, you must complete this
step by uploading the entitlements file through the FortiManager GUI or CLI.
When internet access is restricted by a web proxy, you can establish a connection to
FortiGuard for the FortiCare registration information or status by configuring a web proxy. See
Enabling updates through a web proxy on page 814.
1. In FortiManager, disable access to the public FortiGuard Distribution Servers (FDS) using the following
CLI commands:
config fmupdate publicnetwork
set status disable
end
2. Connect to the FortiManager GUI, and on the FortiManager login screen, click Upload License.
3. Click Browse to select your FortiManager license or drag-and-drop the license file, and click Upload.
The license file will be applied, and the FortiManager will be restarted in order to verify the license.
4. Sign in to FortiManager.
The FortiManager Setup Wizard is displayed.
In order to access your FortiManager, it must be registered to FortiCare in the FortiManager Setup Wizard.
5. On FortiCloud, create a ticket for your FortiManager entitlements file, and Fortinet Customer Service will provide
you with the file.
6. You can upload your entitlement file either through the setup wizard or through the FortiManager CLI.
a. Onboarding wizard:
i. Select Import the Entitlement File in the FortiManager Setup wizard.
ii. Drag and drop the entitlement file into the import area, or click Add Files to select the file location.
The <port> variable is only required when connecting to a remote SCP host. The
<directory>, <username>, and <password> variables are only required for
logging into a FTP server or SCP host to download the file. For more information,
see the FortiManager CLI Reference.
For example:
execute fmupdate ftp import license entitlement-file 172.10.1.10 /pub/place
user1 password1
This operation will replace the current package!
Do you want to continue? (y/n)y
When FortiManager is operating in a closed network, you can request account entitlement files from Fortinet Customer
Service & Support for devices, and then upload the files to the FortiGuard module. This allows devices in the closed
network to check licenses.
You can request an entitlement file from Fortinet Customer Service & Support by creating a support ticket.
For example, you can request an account entitlement file for FortiSOAR units, and then upload the license file to the
FortiGuard panel. See Uploading account entitlement files on page 807.
3. In the Specify Request Ticket Type list, expand Customer Service, and click Submit Ticket.
The wizard moves to the 2 Basic Info page, where you can specify ticket information.
4. On the Specify Ticket Information page, complete the following options, and click Next.
a. In the Serial Number box, add the serial number for the device for which you want an entitlement file.
b. In the Subject box, type Entitlement file.
c. In the Category list, select Contract/License.
The wizard moves to the 3 Comment page, where you can add a comment.
5. In the Add Comment box, request the entitlement file, and click Next.
The request is complete.
6. Monitor your email to receive the entitlement file, and download it to your computer.
After receiving an account entitlement file from Fortinet support, you can upload the file to the FortiGuard module when
FortiManager is configured to operate in a closed network.
1. Ensure that you received the account entitlement file from Fortinet support. See Requesting account entitlement
files on page 805.
2. Ensure that FortiManager is configured to work in a closed network. See Operating as an FDS in a closed network
on page 799.
3. Go to FortiGuard > Settings.
4. Ensure that Enable Communication with FortiGuard Server is toggled OFF.
5. Under Upload Options for FortiGate/FortiMail, click Upload beside Service License.
Although the option is labeled for FortiGate or FortiMail, you can use this option for other types of devices, such as
FortiSOAR.
The Service License Upload dialog box is displayed.
6. Drop the account entitlement file on the dialog box, and click OK.
The license information is uploaded.
Download prioritization
When FortiManager is acting as a local FDS, you can prioritize downloads from FortiGuard to FortiManager by product
and version and/or package.
Go to FortiGuard > Settings > Download Prioritization to enable download prioritization. The following settings are
available:
Enable by Product Toggle ON to enable download prioritization by product and version. See Product
download prioritization on page 808.
Enable by Package Toggle ON to enable download prioritization by package. See Package download
prioritization on page 809.
Before you can specify a priority list, you must enable products and versions for prioritization.
You can add products and versions to the download prioritization list, and then specify the download priority for the
selected products and versions. Top priority is number 1.
When FortiManager downloads packages for products from FDN, it downloads packages based on the priority first,
starting at priority number 1.
1. Go to FortiGuard > Settings > Download Prioritization, and toggle Enable by Product to ON.
2. Add products to the priority list:
a. In the toolbar, click Create New.
The Create Download Prioritization dialog box is displayed.
b. Beside Products, click the box, and select one or more products and versions, and click OK.
The selected products are displayed in the product list.
c. Click OK.
The products are displayed in the priority list.
You can add packages the download prioritization list, and then specify the download priority for the selected packages.
Top priority is number 1.
When FortiManager downloads packages from FortiGuard, it downloads packages based on the priority list, starting at
priority number 1.
1. Go to FortiGuard > Settings > Download Prioritization, and toggle Enable by Package to ON.
2. Add packages to the priority list:
a. In the toolbar, click Create New.
The Create Download Prioritization dialog box is displayed.
b. Beside Packages, click the box, and select one or more packages, and click OK.
The selected packages are displayed in the packages list.
c. Click OK.
The packages are displayed in the priority list.
b. Beside To #, select Before or After, and click the box to use the up and down arrows to position the selected
packages in the priority list.
c. Click OK.
The packages are moved, and the updated priority list is displayed.
You can remove packages from the priority list. Select one or more packages, and click Delete.
4. (Optional) Add products and versions to the priority list. See Product download prioritization on page 808.
You can enable Anycast to optimize the routing performance to FortiGuard servers. Relying on Fortinet DNS servers,
FortiManager obtains a single IP address for the domain name of each FortiGuard service. BGP routing optimization is
transparent to FortiManager. The domain name of each FortiGuard service is the common name in that service's
certificate. The certificate is signed by a third-party intermediate CA. The FortiGuard server uses the Online Certificate
Status Protocol (OCSP) stapling technique, enabling FortiManager to always validate the FortiGuard server certificate
efficiently.
When Anycast is enabled, FortiManager only completes the TLS handshake with a FortiGuard server that provides a
good OCSP status for its certificate. Any other status will result in a failed SSL connection. OCSP stapling is reflected on
the signature interval (currently, 24 hours), and good means that the certificate is not revoked at that timestamp. The
FortiGuard servers query the CA's OCSP responder every four hours and update its OCSP status. If the FortiGuard
server is unable to reach the OCSP responder, it keeps the last known OCSP status for seven days. This cached OCSP
status is immediately sent out when a client connection request is made, which optimizes the response time.
After enabling and configuring the FortiManager system’s built-in FDS, you can configure devices to use the built-in FDS
by providing the FortiManager system’s IP address and configured port as their override server.
Devices are not required to be authorized by FortiManager in Device Manager to use the built-in FDS for FortiGuard
updates and services.
Some settings must be first configured on FortiManager before it can act as the FDS. After configuring FortiManager
settings, the procedures for configuring devices to use the built-in FDS vary by device type. See the documentation
available for your device for more information.
l FortiGate Updates and/or Web Filtering is enabled on the management interface used by devices connecting to
FortiManager for FDS services. See Service Access in Configuring network interfaces on page 880.
l The types of FDN services that you want to provide through your FortiManager system’s built-in FDS are enabled as
needed in FortiGuard settings. See Connecting the built-in FDS to the FDN on page 798 and Settings on page 794.
If you are connecting a device to a FortiManager system’s built-in FDS, some types of
updates, such as antivirus engine updates, require you to enable SSH and HTTPS
Administrative Access on the network interface which will receive push updates. See Network
on page 879 for details.
Related information:
The built-in FDS replies to FortiGuard update and query connections from devices authorized for central management
by FortiManager. If the FortiManager is configured to allow connections from unauthorized devices, unauthorized
devices can also connect.
For example, you might choose to manage a FortiGate unit’s firmware and configuration locally (from its GUI), but use
the FortiManager system when the FortiGate unit requests FortiGuard antivirus and IPS updates. In this case, the
FortiManager system considers the FortiGate unit to be an unauthorized device, and must decide how to handle the
connection attempt. The FortiManager system will handle the connection attempt based on how it is configured.
Connection attempt handling is only configurable via the CLI.
1. From the toolbar, open the CLI Console, or connect to the FortiManager with terminal emulation software.
2. To configure the system to add unauthorized devices and allow service requests, enter the following command:
config system admin setting
set unreg_dev_opt add_allow_service
end
3. To configure the system to add unauthorized devices but deny service requests, enter the following command:
config system admin setting
set unreg_dev_opt add_no_service
end
By default, FortiManager connects to the public FDN to download security feature updates, including databases and
engines for security feature updates such as Antivirus and IPS. Your FortiManager can be configured to use a second,
local FortiManager for FDS updates.
FortiGuard Management provides a central location for configuring how the FortiManager system accesses the FDN and
FDS, including push updates. The following procedures explain how to configure FortiGuard services and configuring
override and web proxy servers, if applicable.
If you need to host a custom URL list that are rated by the FortiGate unit, you can import a list using the CLI.
l Enabling push updates
l Enabling updates through a web proxy
l Overriding default IP addresses and ports
l Scheduling updates
l Accessing public FortiGuard web and email filter servers
When an urgent or critical FortiGuard antivirus or IPS signature update becomes available, the FDN can push update
notifications to the FortiManager system’s built-in FDS. The FortiManager system then immediately downloads the
update.
To use push updates, you must enable both the built-in FDS and push updates. Push update notifications will be ignored
if the FortiManager system is not configured to receive them. If TCP port 443 downloads must occur through a web
proxy, you must also configure the web proxy connection. See Enabling updates through a web proxy on page 814.
If push updates must occur through a firewall or NAT device, you may also need to override the default push IP address
and port.
For example, overriding the push IP address can be useful when the FortiManager system has a private IP address, and
push connections to a FortiManager system must traverse NAT. Normally, when push updates are enabled, the
FortiManager system sends its IP address to the FDN; this IP address is used by the FDN as the destination for push
messages; however, if the FortiManager system is on a private network, this IP address may be a private IP address,
which is not routable from the FDN – causing push updates to fail.
To enable push through NAT, type a push IP address override, replacing the default IP address with an IP address of
your choice, such as the NAT device’s external or virtual IP address. This causes the FDN to send push packets to the
override IP address, rather than the FortiManager system’s private IP address. The NAT device can then forward the
connection to the FortiManager system’s private IP address.
The built-in FDS may not receive push updates if the external IP address of any intermediary
NAT device is dynamic (such as an IP address from PPPoE or DHCP). When the NAT
device’s external IP address changes, the FortiManager system’s push IP address
configuration becomes out-of-date.
port forwarding.
l Port is the external port on the NAT device for which you will configure port forwarding.
5. Click Apply.
6. If you performed step 4, also configure the device to direct that IP address and/or port to the FortiManager system.
l If you entered a virtual IP address, configure the virtual IP address and port forwarding, and use static NAT
mapping.
l If you entered a port number, configure port forwarding; the destination port must be UDP port 9443, the
If the FortiManager system’s built-in FDS must connect to the FDN through a web (HTTP or HTTPS) proxy, you can
specify the IP address and port of the proxy server.
If the proxy requires authentication, you can also specify a user name and password.
FortiManager can only have one proxy server configuration.
To enable updates to the FortiManager system through a proxy using the GUI:
Proxy Mode Select the proxy mode. FortiManager supports web proxy using Tunnel or
Proxy mode:
l Tunnel mode (default) uses port TCP/443.
Address Enter the address and port of the proxy server. The default port is 1080.
User Name If authentication is required by the proxy server, provide a user name.
4. Click Apply.
For more information about the variables, see the FortiManager CLI Reference.
The FortiManager device’s built-in FDS connects to the FDN servers using default IP addresses and ports. You can
override these defaults if you want to use a port or specific FDN server that differs from the default.
Both the built-in FDS and devices use certain protocols and ports to successfully request and receive updates from the
FDN or override server. Any intermediary proxies or firewalls must allow these protocols and ports, or the connection will
fail.
After connecting to the FDS, you can verify connection status on the FortiGuard Management page. For more
information about connection status, see Connecting the built-in FDS to the FDN on page 798.
Scheduling updates
Keeping the built-in FDS up-to-date is important to provide current FortiGuard update packages and rating lookups to
requesting devices. This is especially true as new viruses, malware, and spam sources pop-up frequently. By
configuring a scheduled update, you are guaranteed to have a recent version of database updates.
A FortiManager system acting as an FDS synchronizes its local copies of FortiGuard update packages with the FDN
when:
l you manually initiate an update request by selecting Update Now
l it is scheduled to poll or update its local copies of update packages
l if push updates are enabled, it receives an update notification from the FDN.
If the network is interrupted when the FortiManager system is downloading a large file, it downloads all files again when
the network resumes.
If you have formatted your FortiManager system’s hard disk, polling and lookups will fail until
you restore the URL and email filter databases. For more information, see Restoring the URL
or antispam database on page 819.
You can configure FortiManager to allow the managed FortiGate units to access public FortiGuard web filter or email
filter network servers in the event local FortiGuard web filter or email filter server URL lookups fail. You can specify
private servers where the FortiGate units can send URL queries.
if you want the updates to come from public servers in case the private servers are unavailable.
7. Click Apply.
Logging events from the FortiManager system’s built-in FDS requires that you also enable
local event logging.
You can track FortiGuard antivirus and IPS updates to both the FortiManager system’s built-in FDS and any authorized
FortiGate or FortiMail devices that use the FortiManager system’s FDS.
You can track FortiGuard web filtering and email filtering lookup and non-events occurring on any authorized FortiGate
or FortiMail device that use FortiManager system’s FDS.
Before you can view lookup and non-event records, you must enable logging for FortiGuard web filtering or email filter
events.
Log Settings
Log FortiGuard Server Enable or disable logging of FortiGuard server update events.
Update Events
FortiGuard Web Filtering
Log URL disabled Disable URL logging.
Log non-URL events Logs only non-URL events.
Log all URL lookups Logs all URL lookups (queries) sent to the FortiManager system’s built-in
FDS by FortiGate devices.
FortiGuard Anti-spam
Log Spam disabled Disable spam logging.
Log non-spam events Logs email rated as non-spam.
Log all Spam lookups Logs all spam lookups (queries) sent to the FortiManager system’s built-in
FDS by FortiGate devices.
FortiGuard Anti-virus Query
Log Virus disabled Disable virus logging.
Log non-virus events Logs only non-virus events.
Log all Virus lookups Logs all virus queries sent to the FortiManager system’s built-in FDS by
FortiGate devices.
Formatting the hard disk or partition on FortiManager 3000 units and higher deletes the URL and antispam databases
required to provide FortiGuard email filter and web filtering services through the built-in FDS. The databases will re-
initialize when the built-in FDS is next scheduled to synchronize them with FDN.
Before formatting the hard disk or partition, you can back up the URL and antispam database using the CLI, which
encrypts the file. You can also back up licenses as well. The databases can be restored by importing them using the CLI.
If you have created a custom URL database, you can also back up or restore this customized database (for FortiGate
units).
The FortiSwitch Manager pane allows you to manage FortiSwitch devices that are controlled by FortiGate devices that
are managed by FortiManager. FortiSwitch devices must be added to a FortiGate and cannot be directly added to
FortiManager as a standalone device.
You can use FortiSwitch Manager for the following modes of management:
Central management of When central management is enabled, you can view, create, edit, and import
managed switches profiles. These profiles share a common database and can be applied to any
device.
Central management mode is recommended when you need to create common
profiles to share between different FortiSwitch devices, for example in
environments where you have many FortiSwitches and managing the settings for
each device individually is not practical.
Configuration of FortiSwitch settings is completed in the FortiSwitch Manager.
When an install occurs, only necessary configurations (configurations that are
directly referenced in a profile assigned to the FortiSwitch) are installed.
Per-device management of When per-device management is enabled, you can change settings for each
managed switches managed switch. All FortiSwitch devices are managed at the device level with no
shared objects.
Per-device management mode is recommended when you want to manage each
FortiSwitch configuration individually.
Configuration of FortiSwitch settings is completed in the FortiSwitch Manager.
When an install occurs, all configurations for the FortiSwitch are synchronized to
the managing FortiGate.
The panes available in the FortiSwitch Manager tree menu depend on whether you have central management or per-
device management enabled.
When central management is enabled, the FortiSwitch Manager pane includes the following in the tree menu:
Managed Displays unauthorized and authorized FortiSwitch devices. You can view, authorize, and edit
FortiSwitches on authorized switches, as well as apply templates to switches.
page 821
FortiSwitch View, create, and edit FortiSwitch templates, VLANs, security policies, and custom commands.
Templates Templates can also be imported.
LLDP Profiles Configure LLDP profiles. See Creating LLDP profiles on page 859.
QoS Configure QoS Policies, Egress Queue Policies, IP Precedence/DSCP, and 802.1p. See
Creating QoS policies on page 860.
When per-device management is enabled, the FortiSwitch Manager module includes the following in the tree menu:
Managed Displays unauthorized and authorized FortiSwitch devices. You can view, authorize, and edit
FortiSwitches authorized switches as well as configure ports for each managed switch.
on page 821 View, create, and edit VLANs, Port Policies, NAC Policies, LLDP Policies, QoS, and Custom
Commands.
Use the CLI to configure switches in the CLI Configurations tab.
Managed FortiSwitches
Go to FortiSwitch Manager > Manged FortiSwitches and select a FortiGate to access managed FortiSwitches. Managed
switches are organized by their FortiGate controller.
Additional configuration options and short-cuts are available using the right-click content
menu. Right-click on the mouse on different parts of the navigation panes on the GUI page to
access these context menus.
If workspace or workflow is enabled, the ADOM must be locked before changes can be made.
See Locking an ADOM on page 921.
You can quickly view the status of devices on the Managed Switches pane by using the quick status bar, which contains
the following information:
l Status Chart
l Platform Chart
Use the Show Charts dropdown and toggle to show or hide charts. From the dropdown, select or de-select the
checkboxes for Status and Platform to show or hide the respective chart.
3. In the tree menu, select a FortiGate or Managed FortiGate. The devices for the group are displayed in the content
pane, and the quick status bar updates.
4. Mouse over the charts to see more information about the data in a tooltip.
5. Click items in the legend to filter the devices displayed on the content pane. For example, if Offline is available in the
legend, click Offline to display only devices that are currently offline.
You can click multiple items in the legend to apply multiple filters. A filter icon appears next to the chart title when
it is being used to filter the Managed Switches pane.
6. To remove the filters, click the chart title with the filter icon.
Managing FortiSwitches
FortiSwitch devices can be managed from the content pane below the quick status bar on the FortiSwitch Manager >
Managed FortiSwitches pane when Managed FortiSwitch is selected.
The following options are available from the toolbar and right-click menu:
Create New From the dropdown, add a FortiSwitch device using the model device wizard or
add a new FortiSwitch group.
For adding FortiSwitch devices, see Using zero-touch deployment for
FortiSwitch on page 831.
For adding FortiSwitch groups, see Creating a FortiSwitch group on page 832.
Assign Template Available when central management is enabled for FortiSwitch Manager.
Assign a template to the FortiSwitch. Only applicable templates will be listed.
See Assigning templates to FortiSwitch devices on page 857.
Packet Capture Performs packet capture on the selected device. When performing packet
capture, a filter can be created by clicking Create New, and then run by clicking
Start Capture. You can also configure a schedule for the packet capture. See
Configuring FortiSwitch packet captures on page 829.
More Select More from the toolbar to view additional options. These options are also
available from the right-click menu.
View Ports Available when per-device management is enabled for FortiSwitch Manager.
View and configure ports for the selected FortiSwitch. See Configuring a port
on a single FortiSwitch on page 866.
Replace Replace a FortiSwitch device. Selecting this option allows you to enter a new
FortiSwitch Serial Number for the selected device. See Replacing switches on
page 826.
Register View the registration status and/or register the FortiSwitch to a FortiCloud
account.
Diagnostics View additional diagnostic and tool information, including device summary and
and Tools cable tests.
See Diagnostics and tools on page 834.
See Run a cable test on FortiSwitch ports from FortiManager on page 836.
LED Blink Start LED blink on the selected FortiSwitch for the specified period of time.
This option is only available in the right-click menu.
Show Charts Toggle between hiding and showing the charts in the quick status bar. Click the
dropdown to toggle a specific chart in the quick status bar. See Quick status
bar on page 822.
Search Enter a search string into the search field to search the switch list.
This option is only available in the toolbar.
Column Settings Click to select which columns to display or select Reset to Default to display
the default columns.
This option is only available in the toolbar.
Join Time The date and time that the switch joined.
Editing switches
FortiSwitch devices can be edited from the FortiSwitch Manager > Managed FortiSwitches pane.
1. In the tree menu, select the FortiGate that contains the FortiSwitch device to be edited, or select Managed FortiGate
to list all of the switches.
2. In the content pane, select the switch and click Edit from the toolbar, or right-click on the switch and select Edit. The
Edit Managed FortiSwitch window opens.
The following example is of FortiSwitch Manager with central management enabled.
3. Edit the following options, then click Apply to apply your changes.
Serial Number The device’s serial number. This field cannot be edited.
Custom Command Entry Available when per-device management is enabled for FortiSwitch Manager.
Click Create New to create a new custom command entry that will be applied
to the FortiSwitch. See Creating custom commands on page 862.
Join Time The date and time that the switch joined.
Enforce Firmware Version Toggle the switch to the On position to enable enforced firmware versioning.
Deleting switches
FortiSwitch devices can be deleted from the FortiSwitch Manager > Managed FortiSwitches pane.
1. In the tree menu, select the FortiGate that contains the switch or switches to be deleted, or select Managed
FortiGate to list all of the switches.
2. In the content pane, select the switch or switches, and click Delete from the toolbar, or right-click and select Delete.
3. Click OK in the confirmation dialog box to delete the switch or switches.
4. Perform an install to apply the changes to the managed FortiGate. See Install wizard on page 160.
Replacing switches
FortiSwitch devices can be replaced from the FortiSwitch Manager > Managed FortiSwitches pane.
After the operation is complete, refresh the FortiSwitch list. The new FortiSwitch serial number is displayed and the
original template is kept.
1. Configure a CSV file with the following fields as column headers, and enter the corresponding information for each
FortiSwitch to be imported in the cells below:
Header Cell
FortiGate The name of the FortiGate to which the FortiSwitch will be assigned.
FortiLink The FortiLink interface used to allow the FortiGate to manage the FortiSwitch.
Header Cell
VDOM Name (Optional) If VDOMs are enabled on the FortiGate, specify the VDOM to which
the FortiSwitch will be assigned. If VDOMs are disabled, leave this field blank,
and the default root VDOM will be applied automatically.
For example:
2. Go to FortiSwitch Manager > Managed FortiSwitches, and select More > Import from CSV from the toolbar.
3. Browse to the CSV file location, or drag and drop the file into the Upload field. The results are displayed in the import
results window.
l Successfully imported fields are indicated with a checkmark icon.
l Fields with errors are indicated with an error icon. Hover your mouse over the error icon or the FortiSwitch's
check box to view details about the error. Fields can be directly edited from the import results window.
FortiSwitches with errors will not be imported if you continue the import process.
7. You can view, edit, delete and run the configured filter in the Packet Capture window.
l Select the packet capture filter, and click Start Capture. After the packet capture is run, you can download the
results by clicking Save as PCAP.
l If a schedule is configured, the schedule is displayed in the Scheduled Packet Capture field. You can download
the results by clicking the capture in the Captures field, or see the results in FortiManager by clicking View.
FortiSwitch devices can be authorized and deauthorized from the Managed FortiSwitches pane, or from the Edit
Managed FortiSwitch pane (see Editing switches on page 824).
1. In the tree menu, select a FortiGate that contains the unauthorized FortiSwitch devices, or select Managed
FortiGate to list all of the switches.
2. In the legend for the Status chart, click Unauthorized. The unauthorized FortiSwitch devices are displayed in the
content pane.
3. Select the switches and either click Authorize in the toolbar, or right-click and select Authorize.
4. Select OK in the confirmation dialog box to authorize the selected devices.
1. In the tree menu, select a FortiGate that contains the FortiSwitch devices to be deauthorized.
2. Select the FortiSwitch devices and either click Deauthorize in the toolbar, or right-click and select Deauthorize.
3. Select OK in the confirmation dialog box to deauthorize the selected devices.
You can use FortiManager to upgrade firmware for FortiSwitch units. By default, FortiManager retrieves the firmware
from FortiGuard.
You can also optionally import special firmware images for FortiSwitch to the FortiGuard module, and then use them to
upgrade FortiSwitch units.
Configure FortiSwitch on FortiManager using its serial number and deploy FortiSwitch devices across the network using
zero touch deployment. After configuring FortiSwitch on FortiManager, you can deploy remote FortiSwitch devices by
just plugging them into remote FortiGate devices.
Requirements:
l FortiManager version 5.6 ADOM or later.
l FortiGate is managed by FortiManager.
l The managed FortiGate unit is configured to work with FortiSwitch.
l The FortiSwitch serial number is available.
Device Interface Select the port where the FortiSwitch will be connected.
Enforce Firmware Version Toggle ON to enforce a firmware version and select the firmware version from
the drop-down menu. Toggle OFF to disable this feature.
FortiSwitch model devices can be added using wildcard serial numbers. The wildcard SN
format is: PREFIX****000001
l PREFIX: The first 6 digits of the device's serial number. The prefix must be valid.
page 857.
l For FortiSwitch Manager with per-device management enabled, see Configuring a port on a single FortiSwitch
on page 866.
Because this is a model device, FortiManager saves the changes to the FortiGate database.
6. Connect FortiSwitch to FortiGate.
The FortiSwitch settings are deployed to FortiSwitch. You can view the progress on the notification toolbar in
FortiManager.
You can also use the Zero Touch Deployment process to deploy FortiGate devices. For more
information, see Adding offline model devices on page 96.
You can configure FortiSwitch groups to manage from the Group view in the FortiSwitch Manager pane.
Option Description
On the FortiSwitch Manager pane, you can use the Install Wizard to install changes to managed FortiSwitch devices.
Alternately you can install changes when you install a configuration to the FortiGate that manages the switch.
3. In the content pane, select the switch, and click Install Wizard.
The Install Wizard is displayed.
The Diagnostics and Tools form reports the general health of the FortiSwitch unit, displays details about the FortiSwitch
unit, and allows you to run diagnostic tests.
You can perform the following tasks from the Diagnostics and Tools form:
l Authorize or deauthorize the FortiSwitch
l Upgrade the firmware running on the switch
l Restart the FortiSwitch unit
l Register the FortiSwitch unit
l Run a Cable Test
l Start and Stop an LED Blink
l Packet Capture: Packet capture is only available when traffic sniffing is configured for the device in the FortiGate's
CLI. See Performing a packet capture on page 836.
When you have multiple FortiSwitch units and need to locate a specific switch, you can flash all port LEDs on and off for
a specified number of minutes.
For the 5xx switches, LED Blink flashes only the SFP port LEDs, instead of all the port LEDs.
The FortiSwitch cable test is only available on ADOM 6.4 and later.
5. In the Cable Test pane, select the FortiSwitch ports you want to test, and click Diagnose.
Once the cable test is run, the results are displayed
Monitors
The FortiSwitch Manager > Managed FortiSwitches pane includes both a graphical representation and a port status or
faceplates view of the connected FortiSwitch devices. You can see a block-style topology view or a faceplates view
similar to FortiOS for selected devices. This gives you the visibility of the managed FortiSwitch status, connection
topology, and MC-LAG status among others.
Go to FortiSwitch Manager > Managed FortiSwitches. From the List/Group/Topology dropdown, select Topology to
display a block-style topology representation of the connected FortiSwitch devices. Use the search box to find a specific
device or filter the view, and hover over connections or ports to get more information.
Go to FortiSwitch Manager > Managed FortiSwitches and click Faceplates from the More menu in the toolbar to see a
port status or faceplate view of the connected FortiSwitch devices. Use the search box to find a specific device or filter
the view, and hover over connections or ports to get more information.
Hovering the cursor over a port group will open a pop-up showing the type of port in the group. Hovering the cursor over
a port will open a pop-up showing information about the port, including:
Peer Device The device that this switch is connected to. The current port, as well as the port
that it is connected to on the connected, and the connection between the two
devices, will be highlighted.
This item is only displayed when the port is connected to another FortiSwitch
device.
Speed The speed of the port, such as 1000Mbps/Full Duplex. The value is 0Mbps if the
link is down.
You can preview and copy the JSON API requests or CLI script changes for FortiSwitch Manager configurations.
To preview the JSON request or CLI script when editing a FortiSwitch configuration:
When central management is enabled, you can create templates for a variety of switch configurations, and assign
templates to multiple managed switches. The following steps provide an overview of using centralized FortiSwitch
management to configure and install templates:
1. Enable central management of switches. See Enabling FortiSwitch central management on page 840.
2. Create FortiSwitch VLANs. See FortiSwitch VLANs on page 847.
3. Create or import FortiSwitch templates. See FortiSwitch Templates on page 840.
4. Assign templates to FortiSwitch devices. See Assigning templates to FortiSwitch devices on page 857.
5. Install the templates to the devices. See Installing changes to managed switches on page 833.
When central management is enabled, you can create templates for a variety of switch configurations, and assign
templates to multiple managed switches.
FortiSwitch Templates
The FortiSwitch Manager > FortiSwitch Templates pane is available when central management is enabled. You can use
the FortiSwitch Templates pane to create and manage FortiSwitch templates, VLANs, security policies, LLDP profiles,
QoS policies, and custom commands that can be assembled into templates, and then the template assigned to
FortiSwitch devices.
You can also import templates from FortiSwitch devices, and then apply the template to other FortiSwitch devices of the
same model. See Importing AP profiles and FortiSwitch templates on page 159.
FortiSwitch templates define VLAN and PoE assignments for a FortiSwitch platform.
The following options are available in the toolbar and right-click menu:
Create New Create a new FortiSwitch template. See Creating FortiSwitch templates on
page 841.
Search Enter a search string into the search field to search the template list.
To edit a template:
To delete templates:
When creating a new FortiSwitch template, the platform must be selected before configuring VLAN assignments.
3. Enter the following information, then click OK to create the new template.
Platforms Select the platform that the template will apply to from the dropdown list.
Switch VLAN Assignments Configure VLAN assignments. A platform must be selected before VLAN
assignments can be configured.
Right-clicking on a physical port or trunk group displays a context menu with
options to edit, delete, and modify the selection(s). Using the context menu,
you can also configure Native VLAN, Allowed VLAN, Security Policy,
QoS Policy, and LLDP profiles while multiple ports are selected.
Create Create a physical port or trunk group. See Creating ports and trunk groups on
page 843.
Column Settings Select which columns are visible or hidden in the Switch VLAN Assignments
table.
Full Screen/Exit Click to enter/exit fullscreen mode for the VLAN assignment table.
Full Screen
1. On the Create New FortiSwitch Template pane, click Create in the Switch VLAN Assignments toolbar. The Add
VLAN Assignment dialog box opens.
2. Select physical as the type.
3. Configure the following settings:
4. Port Name Enter the name of the port.
Access Mode Select the access mode from dynamic, nac, or normal.
Port Policy Select the dynamic port policy from the available port policy objects. See FortiSwitch
dynamic port policies on page 852.
This setting is only available when the access mode is dynamic.
Native VLAN Select the native VLAN from the available VLAN objects. See FortiSwitch VLANs on
page 847.
This setting is only available when the access mode is normal.
Allowed VLAN Select the allowed VLAN from the available VLAN objects. See FortiSwitch VLANs on
page 847.
Security Policy Select the security policies from the available switch controller security policies. See
Viewing FortiSwitch security policies on page 854.
DHCP Blocking Enable or disable DHCP blocking for the port or trunk.
If the port is in a trunk, then DHCP blocking can only be enabled for the trunk, and not
the individual ports.
Edge Port Enable or disable Edge Port for the port or trunk.
If the port is in a trunk, then STP can only be enabled for the trunk, and not the individual
ports.
STP BPDU Guard Enable or disable STP BPDU Guard for the port or trunk.
If the port is in a trunk, then STP BPDU Guard can only be enabled for the trunk, and not
the individual ports.
STP Root Guard Enable or disable STP Root Guard for the port or trunk.
If the port is in a trunk, then STP Root Guard can only be enabled for the trunk, and not
the individual ports.
POE Right-click to enable or disable PoE for the port where applicable.
1. On the Create New FortiSwitch Template pane, click Create in the Switch VLAN Assignments toolbar. The Add
VLAN Assignment dialog box opens.
2. Select trunk as the type.
3. Enter a name for the trunk group in the Trunk Name field.
4. In the Members field, select all the ports that will be in the group from the dropdown list.
5. Select the mode: lacp-active (active link aggregation), lacp-passive (passive link aggregation), or static.
6. Click OK to create the trunk group.
FortiSwitch templates can be imported from connected devices, and then applied to other FortiSwitch devices of the
same model.
FortiSwitch templates can also be imported through the Device Manager. See Importing AP
profiles and FortiSwitch templates on page 159.
FortiSwitch templates using split ports can be imported into FortiManager. Before adding the FortiSwitch to FortiGate,
the administrator must enable split ports through phy-mode on the FortiSwitch. Once the FortiSwitch has been
authorized on the FortiGate, the FortiGate can be added to FortiManager, and the template can be imported.
1. On the FortiSwitch, enable split ports using phy-mode. See FortiSwitch documentation on the Fortinet Document
Library.
2. Authorize the FortiSwitch device on FortiGate, and add the FortiGate device to FortiManager. See Add devices on
page 84.
3. Import the FortiSwitch template using the Import feature in FortiSwitch Manager > FortiSwitch Templates. See
Importing FortiSwitch templates on page 844.
4. Once the import is complete, edit the imported template.
To view FortiSwitch split ports, select View Ports from the Managed Switches menu. The split port configuration is
retained and is visible in the list of Switch VLAN Assignments. See Managing FortiSwitches on page 822.
Administrators can edit the split ports, and changes can be installed to the FortiGate when the template is assigned
to a managed FortiSwitch.
When per-device FortiSwitch management is enabled, users can edit split ports in the Ports Configuration page.
See Configuring a port on a single FortiSwitch on page 866.
FortiSwitch VLANs
3. Enter the following information, then click OK to add the new VLAN.
Role Select the role for the interface: DMZ, LAN, UNDEFINED, or
WAN.
Address
Network Select the network size. IPAM will allocate an IP subnet with the
Size selected size.
This setting is only available when the IPAM Addressing Mode is
selected.
IPv6 Addressing mode Select the IPv6 addressing mode: Manual or DHCP.
Restrict Access
IPv6 Administrative Access Select the allowed administrative service protocols from:
CAPWAP, FGFM, HTTP, HTTPS, PING, SNMP, SSH, and
TELNET.
Address Range Configure address ranges for DHCP. Click Create to create a
new range. Ranges can also be edited and deleted as required.
This option is only available when DHCP Server is ON and Mode
is Server.
Default Gateway Configure the default gateway: Same as Interface IP, or Specify.
If set to Specify, enter the gateway IP address in the field.
This option is only available when DHCP Server is ON and Mode
is Server.
DNS Server Configure the DNS server: Same as System DNS, Same as
Interface IP, or Specify.
This option is only available when DHCP Server is ON and Mode
is Server.
NTP Server Configure the NTP server: Local, Same as System NTP, or
Specify. If set to Specify, enter the NTP server IP address in the
field.
This option is only available when DHCP Server is ON and Mode
is Server.
Additional DHCP In the Lease Time field, enter the lease time, in seconds. Default:
Options 604800 seconds (7 days).
Add DHCP options to the table. See To add additional DHCP
options: on page 851 for details. Options can also be edited and
deleted as required.
This option is only available when DHCP Server is ON and Mode
is Server.
MAC Reservation Select the action to take with unknown MAC addresses: assign
+ Access Control or block.
Add MAC address actions to the table. See To add a MAC
address reservation: on page 851 for details. Reservations can
also be edited and deleted as required.
This option is only available when DHCP Server is ON and Mode
is Server.
Networked Devices These options are only available when Role is DMZ, LAN, or
UNDEFINED.
Admission Control These options are only available when Role is LAN or
UNDEFINED.
Exempt Sources Select sources that are exempt from the available firewall
addresses.
This option is only available when Security Mode is CAPTIVE-
PORTAL.
Exempt Select destinations that are exempt from the available firewall
Destinations addresses.
This option is only available when Security Mode is CAPTIVE-
PORTAL.
Exempt Services Select services that are exempt from the available firewall
services.
This option is only available when Security mode is CAPTIVE-
PORTAL.
Miscellaneous
Status
Advanced Options
1. Click Create in the Additional DHCP Options table toolbar. The Additional DHCP Options dialog box opens.
1. Click Create in the MAC Reservation + Access Control table toolbar. The MAC Reservation + Access Control dialog
box opens.
1. Click Create New in the Secondary IP address table toolbar. A dialog box opens.
2. Enter the IP address and netmask in the IP/Network Mask field.
3. Select the allowed administrative service protocols from: CAPWAP, DNP, FGFM, FTM, HTTP, HTTPS, PING,
PROBE-RESPONSE, RADIUS-ACCT, SNMP, SSH, and TELNET.
4. Click OK to add the address.
1. Click Create New in the Per-Device Mapping table toolbar. The Per-Device Mapping dialog box opens.
2. Select the device to be mapped from the Mapped Device drop-down list.
3. Enter the VLAN ID.
4. Enter the mapped IP address and netmask in the Mapped IP/Netmask field.
5. If required, enable DHCP Server and configure the options (options are the same as when creating a new VLAN
definition).
6. Click OK to add the device mapping.
Name Enter a unique name for the dynamic port policy rule.
Device Patterns
MAC Address Enable or disable matching a MAC address, then enter a MAC address.
Host Enable or disable matching a host address, then enter a host address.
Hardware Vendor Enable or disable matching a hardware vendor, then enter a hardware vendor
name.
Device Family Enable or disable matching a device family, then enter a device family name.
Type Enable or disable matching a device type, then enter a device type.
LLDP Profile Enable to select an LLDP profile for the switch controller action.
QoS Policy Enable to select a QoS policy for the switch controller action.
802.1X Policy Enable to select an 802.1X policy for the switch controller action.
VLAN Policy Enable to select a QoS policy for the switch controller action.
3. Enter the following information, then click OK to create the new security policy.
User groups Select the user groups that the security policy will apply to.
Guest VLAN Enable a guest VLAN, and select the VLAN from the available VLAN objects.
See FortiSwitch VLANs on page 847.
Guest authentication delay Set the guest authentication delay, in seconds (1 - 900, default = 30).
second(s)
Authentication fail VLAN Enable an authentication failure VLAN, and select the VLAN from the available
VLAN objects. See FortiSwitch VLANs on page 847.
This option is not available when Security mode is MAC-based.
3.
The following options are available in the toolbar and right-click menu:
Create New Create a new FortiSwitch security policy. See FortiSwitch security policies on
page 853.
Column Settings Select which columns are hidden or displayed in the security policy table.
Search Enter a search string into the search field to search the policy list.
1. Either double-click a policy, right-click a policy and select Edit, or select a policy then click Edit in the toolbar. The
Edit Security Policies pane opens. The name cannot be edited.
2. Edit the settings as required, then click OK to apply your changes.
Custom commands
When creating or editing a new FortiSwitch template, you can include custom commands in the template. After the
template has been assigned to the FortiSwitch, use the Install Wizard to install the custom command entry to the
FortiGate.
3. Enter the following information, then click OK to create the new custom command.
You can now install the custom command using the Install Wizard. See Installing changes to managed switches on
page 833.
FortiLink settings
4. Go to FortiSwitch Manager > FortiSwitch Profiles > VDOM Settings, and edit a FortiGate's mapped FortiLink. Assign
the FortiLink Settings template to a FortiGate in the NAC Settings field.
5. Install the FortiLink Settings template to FortiGate using the Install Wizard.
When central management is enabled for FortiSwitch Manager, you can assign templates to switches. For more
information about creating and managing FortiSwitch templates, see FortiSwitch Templates on page 840.
To assign a templates:
Only templates that apply to the specific device model will be available for selection.
Templates can also be applied when editing a device. See Editing switches on page 824.
When per-device management is enabled, you can configure changes on each managed switch. The following steps
provide an overview of using per-device FortiSwitch management:
When per-device management is enabled, you can configure changes on each managed switch.
4.
Creating VLANs
To create VLANs:
1. Go to FortiSwitch Manager > Managed FortiSwitches, and select VLAN from the tab.
2. In the tree menu, select a FortiGate.
3. Click Create New.
4. The Create New VLAN Interface pane opens.
5. Edit the options, and click OK.
The changes are saved to the FortiGate database.
1. Go to FortiSwitch Manager > Managed FortiSwitches, and select NAC Policy from the tab.
2. In the tree menu, select a FortiGate.
The NAC policies are displayed.
3. Click Create New.
The Create New NAC Policies pane opens.
4. Set the options, and click OK. See Create a new NAC policy on page 413 for more information.
1. Go to FortiSwitch Manager > Managed FortiSwitches, and select Security Policy from the Port Policies tab.
2. In the tree menu, select a FortiGate.
The security policies are displayed.
3. Click Create New.
The Create New Security Policies pane opens.
4. Edit the options, and click OK.
The changes are saved to the FortiGate database.
1. Go to FortiSwitch Manager > Managed FortiSwitches, and select LLDP Profile from the tab.
2. In the tree menu, select a FortiGate.
The VLAN profiles are displayed.
You can set the following types of QoS policies for each managed switch:
l QoS policies
l QoS egress queue policies
l QoS IP precedence/DSCP policies
l QoS 802.1 policies
1. Go to FortiSwitch Manager > Managed FortiSwitches, and select QoS Policies from the QoS tab.
2. In the tree menu, select a FortiGate.
3. Click Create New.
The Create New QoS Policy pane opens.
1. Go to FortiSwitch Manager > Managed FortiSwitches, and select Egress Queue Policies from the QoS tab.
2. In the tree menu, select a FortiGate.
The QoS egress queued policies are displayed in the content pane.
3. Click Create New.
The Create New Egress Queue Policy pane opens.
1. Go to FortiSwitch Manager > Managed FortiSwitches, and select IP Precedence/DSCP from the QoS tab.
2. In the tree menu, select a FortiGate.
The QoS IP precedence/DSCP policies are displayed in the content pane.
3. Click Create New.
The Create New QoS IP precedence/DSCP pane opens.
1. Go to FortiSwitch Manager > Managed FortiSwitches, and select 802.1P from the QoS tab.
2. In the tree menu, select a FortiGate.
The QoS 802.1p policies are displayed in the content pane.
3. Click Create New.
The Create New 802.1 pane opens.
When per-device management is enabled, FortiSwitch custom commands can be created and edited in the Custom
Commands tab. Once created, the custom command can be added to one or more managed FortiSwitch. Once
selected, use the Install Wizard to deploy the changes to FortiGate.
1. Go to FortiSwitch Manager > Managed FortiSwitches and select the Custom Commands tab.
2. In the content pane, click Create New in the toolbar. The Create New Custom Command window opens.
3. Enter the following information, then click OK to create the new custom command.
You can now add the custom command to one or more managed FortiSwitch device.
1. Go to FortiSwitch Manager > Managed FortiSwitches and select a FortiGate, then edit a managed FortiSwitch.
2. In the Edit Manged FortiSwitch pane, select Create New under Custom Command Entry.
3. Enter a name for the command entry and select your previously configured custom command. Click OK, and save
your changes to the managed FortiSwitch.
You can now install the custom command using the Install Wizard. See Installing changes to managed switches on
page 833.
a. Click OK.
6. You can now install the changes using the Install Wizard. See Installing changes to managed switches on page 833.
CLI Configurations
You can use the CLI for per-device configuration to access settings that might not yet be available in the GUI.
1. Go to FortiSwitch Manager > Managed FortiSwitches, and select the CLI Configurations tab.
2. In the tree menu, select a FortiGate.
The commands are displayed in the content pane.
3. Use the tree menu to navigate between the commands.
The options display in the content pane.
When per-device management is enabled, you can use the FortiSwitch Manager pane to configure ports for each
managed switch.
Right-click each port to modify POE, DHCP Blocking, IGMP Snooping, IGMP Snooping, STP,
Loop Guard, Edge Port, STP BPDU Guard, and STP Root Guard directly from the context-
menu.
For FortiGate's with VDOM enabled, you can export FortiSwitch ports to another VDOM when operating in per-device
management mode.
To export ports to another VDOM, FortiSwitch Central Management must be disabled in the ADOM, and a Multi-VDOM
enabled FortiGate with assigned FortiSwitch must be added to FortiManager.
1. Disable FortiSwitch Central Management. See Enabling per-device management on page 858.
2. Add a Multi-VDOM enabled FortiGate with assigned FortiSwitch to FortiManager.
3. Go to FortiSwitch Manager > Managed FortiSwitches, right-click on a FortiSwitch, and select Ports Configuration.
4. Edit a port to enter the Edit VLAN Assignment pane, and choose the new VDOM in the Export To field.
5. After the port is exported, users can edit the port's configuration in the chosen VDOM.
6. After the settings are configured, the changes can be installed to the FortiGate.
Extender Manager
The Extender Manager module allows you to manage connected FortiExtenders. You can use the Extender Manager to
create custom templates, SIM profiles, and data plans for up to two modems.
This section contains the following topics:
l Managed extenders on page 869
l Extender profiles on page 872
l Data plans on page 874
Managed extenders
Use the Managed Extenders pane to configure modems, associate data plans with a device, and authorize devices.
To view managed FortiExtender devices, go to Extender Manager > Managed Extenders.
LTE modems built into FortiGate 3G4G models will appear as managed devices in the tree
menu. For example, FortiGate-xxx-3G4G.
To view the modem's RSSI score and connection details, select the device and click View
Details.
Name The name of the FortiGate device that is managing the FortiExtender.
RSSI The Received Signal Strength Indicator status, either Excellent, Good, or Poor.
RSRP The Reference Signal Received Power status, either Excellent, Good, or Poor.
RSRQ The Reference Signal Received Quality status, either Excellent, Good, or Poor.
ENSI IMEI The FortiExtender electronic serial number (ESN) and international mobile
equipment identity (IMEI).
Refresh Select a FortiExtender in the list, right-click, and select Refresh in the menu to
refresh the information displayed.
Edit Select a FortiExtender in the list, right-click, and select Edit in the menu to edit the
FortiExtender modem settings, PPP authentication, general, GSM/LTE, and
CDMA settings.
View Details Select a FortiExtender in the list, right-click, and select View Details in the menu to
view the system status, modem status, and data usage.
Upgrade Select a FortiExtender in the list, right-click, and select Upgrade in the menu to
upgrade the FortiExtender firmware.
Authorize Select a FortiExtender in the list, right-click, and select Authorize in the menu to
authorize the unit for management.
Deauthorize Select a FortiExtender in the list, right-click, and select Deauthorize in the menu to
deauthorize the unit for management.
Restart Select a FortiExtender in the list, right-click, and select Restart in the menu to
restart the unit.
You can use the Extender Manager to create new model devices, authorize devices, assign templates, and upgrade a
device.
FortiGate Click the dropdown and select a device from the list.
FortiExtender Profile Click the dropdown and select a template from the list.
4. Click OK.
FortiExtender model devices can be added using wildcard serial numbers. The wildcard
SN format is: PREFIX**********
l PREFIX: The first 6 digits of the device's serial number. The prefix must be valid.
To edit a FortiExtender:
To authorize a device:
To deauthorize a device:
3. In the Managed Extender pane, select a device, and do one of the following.
l In the toolbar, click Deauthorize.
l Right-click the device, and select Deauthorize from the menu.
4. Click OK.
To restart a device:
To upgrade a device:
Extender profiles
Extender Manager profiles allow you to configure a FortiExtender device settings remotely. To configure the device
settings, create a SIM profile and dataplan and then assign them to a profile template. After the template is configured,
you can assign it to a device.
This section contains the following topics:
l FortiExtender profiles on page 872
l Using Fortinet recommended extender profiles on page 876
FortiExtender profiles
You can create custom FortiExtender profiles, assign a profile to a device, and view where a profile is used.
4. Click the FortiExtenders field, and select a device(s) from the list.
5. Click OK.
4. Click OK.
Data plans
The Data Plan pane allows you to create a new data plan profile and view where is plan is used.
d. Configure the other settings as needed (Connectivity, Billing Details, and Smart Switch Threshold.
5. Click OK.
To install the data plan on a device, click Install Wizard.
3. Click Close.
1. The recommended Extender Profile is shown in Extender Manager > Extender Profiles on the FortiExtender Profile
tab.
2. An extender profile can be created by activating the recommended FortiExtender profile.
a. Right-click on the recommended FortiExtender profile and click Activate.
b. Choose a model for the template.
c. Enter a name for the FortiExtender profile and configure the remaining settings as needed.
3. The created extender profile can be assigned to an extender, then the user can deploy the settings.
a. Right-click on a managed FortiExtender and click Assign Profiles.
b. Select the configured FortiExtender Profile, and click OK.
Preview the JSON API or CLI script for Extender Manager configurations
You can preview and copy the JSON API requests or CLI script changes for Extender Manager configurations.
To preview the JSON request or CLI script when editing a Extender Manager configuration:
System Settings allows you to manage system options for your FortiManager device.
Additional configuration options and short-cuts are available using the right-click menu. Right-
click the mouse on different navigation panes on the GUI page to access these options.
Logging Topology
The System Settings > Advanced > Logging Topology pane shows the physical topology of devices in the Security
Fabric. Click, hold, and drag to adjust the view in the content pane, and double-click or use the scroll wheel to change the
zoom.
The visualization can be filtered to show only FortiAnalyzer devices or all devices by device count or traffic.
Hovering the cursor over a device in the visualization will show information about the device, such as the IP address and
device name. Right-click on a device and select View Related Logs to go to the Log View pane, filtered for that device.
This pane is only available when the FortiAnalyzer features are manually enabled. For more
information, see FortiAnalyzer Features on page 37.
Network
The network settings are used to configure ports for the FortiManager unit. You should also specify what port and
methods that an administrators can use to access the FortiManager unit. If required, static routes can be configured.
The default port for FortiManager units is port 1. It can be used to configure one IP address for the FortiManager unit, or
multiple ports can be configured with multiple IP addresses for improved security.
You can configure administrative access in IPv4 or IPv6 and include settings for HTTPS, HTTP, PING, SSH, SNMP, and
Web Service.
You can prevent unauthorized access to the GUI by creating administrator accounts with trusted hosts. With trusted
hosts configured, the administrator can only log in to the GUI when working on a computer with the trusted host as
defined in the administrator account. For more information, see Trusted hosts on page 949 and Managing administrator
accounts on page 950.
Fortinet devices can be connected to any of the FortiManager unit's interfaces. The DNS servers must be on the
networks to which the FortiManager unit connects, and should have two different IP addresses.
If the FortiManager unit is operating as part of an HA cluster, it is recommended to configure interfaces dedicated for the
HA connection / synchronization. However, it is possible to use the same interfaces for both HA and device
management. The HA interface will have /HA appended to its name.
The following port configuration is recommended:
l Use port 1 for device log traffic, and disable unneeded services on it, such as SSH, Web Service, and so on.
l Use a second port for administrator access, and enable HTTPS, Web Service, and SSH for this port. Leave other
services disabled.
To configure port 1:
1. Go to System Settings > Network.The Interface pane is displayed at the top of the page.
2. In the Interface pane, double-click Port1. The Edit System Interface pane is displayed.
3. Configure the following settings for port1, then click OK to apply your changes.
Administrative Access Select the allowed administrative service protocols from: HTTPS, HTTP,
PING, SSH, SNMP, Web Service, and FortiManager Fabric.
For information on FortiManager Fabric, see Fabric Management on page
928.
IPv6 Administrative Access Select the allowed IPv6 administrative service protocols from: HTTPS, HTTP,
PING, SSH, SNMP, Web Service, and FortiManager Fabric.
Service Access Select the Fortinet services that are allowed access on this interface. These
include FortiGate Updates and Web Filtering. Service access is not enabled
on any port by default.
Specify the Bind to IP Address:
l The IP address specified in Bind to IP Address address should be a
1. Go to System Settings > Network. The Interface pane is displayed at the top of the page.
2. In the Interface pane, double-click on a port, right-click on a port then select Edit from the pop-up menu, or select a
port then click Edit in the toolbar. The Edit System Interface pane is displayed.
3. Configure the settings as required.
4. Click OK to apply your changes.
The port name, default gateway, and DNS servers cannot be changed from the Edit System
Interface pane. The port can be given an alias if needed.
Disabling ports
To disable a port:
Administrative access defines the protocols that can be used to connect to the FortiManager through an interface. The
available options are: HTTPS, HTTP, PING, SSH, SNMP, and Web Service.
1. Go to System Settings > Network and click All Interfaces. The interface list opens.
2. Double-click on a port, right-click on a port then select Edit from the pop-up menu, or select a port then click Edit in
the toolbar. The Edit System Interface pane is displayed.
3. Select one or more access protocols for the interface for Administrative Access and IPv6 Administrator Access, as
required.
4. Click OK to apply your changes.
Static routes
Static routes can be managed from the routing tables for IPv4 and IPv6 routes. The routing tables can be accessed by
going to System Settings > Network.
1. From the network routing table, click Create New in the toolbar. The Create New Network Route pane opens.
2. Select the IP Type as either IPv4 or IPv6.
3. Enter the destination IP address and netmask, or IPv6 prefix, and gateway in the requisite fields.
4. Select the network interface that connects to the gateway from the dropdown list. Ports, aggregate links, and VLANs
are available.
5. Click OK to create the new static route.
1. From the network routing table: double-click on a route, right-click on a route then select Edit from the pop-up menu,
or select a route then click Edit in the toolbar. The Edit Network Route pane opens.
2. Edit the configuration as required. The route ID cannot be changed.
3. Click OK to apply your changes.
1. From the newtork routing table, right-click on a route then select Delete from the pop-up menu, or select a route or
routes then click Delete in the toolbar.
2. Click OK in the confirmation dialog box to delete the selected route or routes.
Packet capture
Packets can be captured on configured interfaces by going to System > Network > Packet Capture.
The following information is available:
Interface The name of the configured interface for which packets can be captured.
For information on configuring an interface, see Configuring network interfaces on
page 880.
Maximum Packet Count The maximum number of packets that can be captured on a sniffer.
Actions Allows you to start and stop the capturing process, and download the most
recently captured packets.
To start capturing packets on an interface, select the Start capturing button in the Actions column for that interface. The
Progress column changes to Running, and the Stop capturing and Download buttons become available in the Actions
column.
1. From the Packet Capture table, click Create New in the toolbar. The Create New Sniffer pane opens.
2. Configure the following options:
Max. Packets to Save Enter the maximum number of packets to capture, between 1-10000. The
default is 4000 packets.
Include IPv6 Packets Select to include IPv6 packets when capturing packets.
Include Non-IP Packets Select to include non-IP packets when capturing packets.
Enable Filters You can filter the packet by Host(s), Port(s), VLAN(s), and Protocol.
3. Click OK.
1. In the Actions column, click the Download button for the interface whose captured packets you want to download.
If no packets have been captured for that interface, click the Start capturing button.
2. When prompted, save the packet file (sniffer_[interface].pcap) to your management computer.
The file can then be opened using packet analyzer software.
1. From the Packet Capture table, click Edit in the toolbar. The Edit Sniffer pane opens.
2. Configure the packet sniffer options
3. Click OK.
Aggregate links
Link aggregation enables you to bind two or more physical interfaces together to form an aggregated (combined) link.
This new link has the bandwidth of all the links combined. If a link in the group fails, traffic is transferred automatically to
the remaining interfaces.
You must enter a minimum value of 2 for the aggregate links to work.
VLAN interfaces
You can configure a VLAN interface in FortiManager by going to System Settings > Network.
SNMP
Enable the SNMP agent on the FortiManager device so it can send traps to and receive queries from the computer that is
designated as its SNMP manager. This allows for monitoring the FortiManager with an SNMP manager.
SNMP has two parts - the SNMP agent that is sending traps, and the SNMP manager that monitors those traps. The
SNMP communities on monitored FortiGate devices are hard coded and configured by the FortiManager system - they
are not user configurable.
The FortiManager SNMP implementation is read-only — SNMP v1, v2c, and v3 compliant SNMP manager applications,
such as those on your local computer, have read-only access to FortiManager system information and can receive
FortiManager system traps.
SNMP agent
The SNMP agent sends SNMP traps originating on the FortiManager system to an external monitoring SNMP manager
defined in a SNMP community. Typically an SNMP manager is an application on a local computer that can read the
SNMP traps and generate reports or graphs from them.
The SNMP manager can monitor the FortiManager system to determine if it is operating properly, or if there are any
critical events occurring. The description, location, and contact information for this FortiManager system will be part of
the information an SNMP manager will have — this information is useful if the SNMP manager is monitoring many
devices, and it will enable faster responses when the FortiManager system requires attention.
Go to System Settings > Network and scroll to the SNMP section to configure the SNMP agent.
SNMP Agent Select to enable the SNMP agent. When this is enabled, it sends FortiManager
SNMP traps.
Description Optionally, type a description of this FortiManager system to help uniquely identify
this unit.
Location Optionally, type the location of this FortiManager system to help find it in the event
it requires attention.
Contact Optionally, type the contact information for the person in charge of this
FortiManager system.
SNMP v1/2c The list of SNMP v1/v2c communities added to the FortiManager configuration.
Create New Select Create New to add a new SNMP community. If SNMP agent is not
selected, this control will not be visible.
For more information, see SNMP v1/v2c communities on page 887.
Queries The status of SNMP queries for each SNMP community. The enabled icon
indicates that at least one query is enabled. The disabled icon indicates that all
queries are disabled.
Traps The status of SNMP traps for each SNMP community. The enabled icon indicates
that at least one trap is enabled. The disabled icon indicates that all traps are
disabled.
Create New Select Create New to add a new SNMP user. If SNMP agent is not selected, this
control will not be visible.
For more information, see SNMP v3 users on page 890.
Notification Hosts The notification host or hosts assigned to the SNMPv3 user.
Queries The status of SNMP queries for each SNMP user. The enabled icon indicates
queries are enabled. The disabled icon indicates they are disabled.
An SNMP community is a grouping of equipment for network administration purposes. You must configure your
FortiManager to belong to at least one SNMP community so that community’s SNMP managers can query the
These SNMP communities do not refer to the FortiGate devices the FortiManager system is
managing.
Each community can have a different configuration for SNMP traps and can be configured to monitor different events.
You can add the IP addresses of up to eight hosts to each community. Hosts can receive SNMP device traps and
information.
Name Enter a name to identify the SNMP community. This name cannot be edited
later.
Hosts The list of hosts that can use the settings in this SNMP community to monitor
the FortiManager system.
When you create a new SNMP community, there are no host entries. Select
Add to create a new entry that broadcasts the SNMP traps and information to
the network connected to the specified interface.
Interface Select the interface that connects to the network where this SNMP manager
is located from the dropdown list. This must be done if the SNMP manager is
on the Internet or behind a router.
Delete Click the delete icon to remove this SNMP manager entry.
Add Select to add another entry to the Hosts list. Up to eight SNMP manager
entries can be added for a single community.
Queries Enter the port number (161 by default) the FortiManager system uses to send
v1 and v2c queries to the FortiManager in this community. Enable queries for
each SNMP version that the FortiManager system uses.
Traps Enter the Remote port number (162 by default) the FortiManager system
uses to send v1 and v2c traps to the FortiManager in this community. Enable
traps for each SNMP version that the FortiManager system uses.
SNMP Event Enable the events that will cause SNMP traps to be sent to the community.
l Interface IP changed
l Log disk space low
l CPU Overuse
l Memory Low
l System Restart
l CPU usage exclude NICE threshold
l HA Failover
l RAID Event (only available for devices that support RAID)
l Power Supply Failed (only available on supported hardware devices)
l Fan Speed Out of Range
l Temperature Out of Range
l Voltage Out of Range
FortiAnalyzer feature set SNMP events:
l High licensed device quota
l High licensed log GB/day
l Log Alert
l Log Rate
l Data Rate
SNMP v3 users
The FortiManager SNMP v3 implementation includes support for queries, traps, authentication, and privacy. SNMP v3
users can be created, edited, and deleted as required.
Security Level The security level of the user. Select one of the following:
l No Authentication, No Privacy
l Authentication, No Privacy: Select the Authentication Algorithm (MD5,
SHA, SHA224, SHA256, SHA384, SHA512) and enter the password.
l Authentication, Privacy: Select the Authentication Algorithm (MD5, SHA,
SHA224, SHA256, SHA384, SHA512), the Private Algorithm (AES,
AES256, AES256CISCO, DES), and enter the passwords.
Queries Select to enable queries then enter the port number. The default port is 161.
Notification Hosts The IP address or addresses of the host. Click the add icon to add multiple IP
addresses.
SNMP Event Enable the events that will cause SNMP traps to be sent to the SNMP
manager.
l Interface IP changed
l Log disk space low
l CPU Overuse
l Memory Low
l System Restart
l CPU usage exclude NICE threshold
l HA Failover
l RAID Event (only available for devices that support RAID)
l Power Supply Failed (only available on supported hardware devices)
l Fan Speed Out of Range
l Temperature Out of Range
l Voltage Out of Range
FortiAnalyzer feature set SNMP events:
l High licensed device quota
l High licensed log GB/day
l Log Alert
l Log Rate
l Log Data Rate
SNMP MIBs
The Fortinet and FortiManager MIBs, along with the two RFC MIBs, can be obtained from Customer Service & Support
(https://support.fortinet.com). You can download the FORTINET-FORTIMANAGER-FORTIANALYZER-MIB.mib MIB file
in the firmware image file folder. The FORTINET-CORE-MIB.mib file is located in the main FortiManager 5.00 file folder.
RFC support for SNMP v3 includes Architecture for SNMP Frameworks (RFC 3411), and partial support of User-based
Security Model (RFC 3414).
To be able to communicate with the SNMP agent, you must include all of these MIBs into your SNMP manager.
Generally your SNMP manager will be an application on your local computer. Your SNMP manager might already
include standard and private MIBs in a compiled database that is ready to use. You must add the Fortinet and
FortiManager proprietary MIBs to this database.
FORTINET-CORE-MIB.mib The proprietary Fortinet MIB includes all system configuration information and
trap information that is common to all Fortinet products.
Your SNMP manager requires this information to monitor Fortinet unit
configuration settings and receive traps from the Fortinet SNMP agent.
FORTINET-FORTIMANAGER- The proprietary FortiManager MIB includes system information and trap
MIB.mib information for FortiManager units.
RFC-1213 (MIB II) The Fortinet SNMP agent supports MIB II groups with the following exceptions.
l No support for the EGP group from MIB II (RFC 1213, section 3.11 and 6.10).
accurately capture all Fortinet traffic activity. More accurate information can
be obtained from the information reported by the Fortinet MIB.
RFC-2665 (Ethernet-like MIB) The Fortinet SNMP agent supports Ethernet-like MIB information with the
following exception.
No support for the dot3Tests and dot3Errors groups.
SNMP traps
Fortinet devices share SNMP traps, but each type of device also has traps specific to that device type. For example
FortiManager units have FortiManager specific SNMP traps. To receive Fortinet device SNMP traps, you must load and
compile the FORTINET-CORE-MIB into your SNMP manager.
Traps sent include the trap message as well as the unit serial number (fnSysSerial) and host name (sysName). The Trap
Message column includes the message that is included with the trap, as well as the SNMP MIB field name to help locate
the information about the trap.
High Licensed Log fmTrapLicGbDayThreshold Indicates that the used log has exceeded the licensed
GB/day GB/Day.
lic-gbday
Log Alert fmTrapLogAlert Trap is sent when a log based alert has been triggered.
log-alert Alert description included in trap.
CPU usage fmTrapCpuThresholdExcludeNice Indicates that the CPU usage excluding nice processes
exclude NICE has exceeded the threshold.
threshold This threshold can be set in the CLI using the following
cpu-high- commands:
exclude-nice config system snmp sysinfo
set trap-cpu-high-exclude-nice-
threshold <percentage value>
end
High licensed fmTrapLicDevQuotaThreshold Indicates that the used device quota has exceeded the
device quota licensed device quota.
lic-dev-quota
Log Data Rate fmTrapLogDataRateThreshold Indicates that the incoming log data rate has exceeded
log-data-rate the threshold.
The peak data rate is calculated using the peak log rate
x 512 bytes (average log size).
Log Rate fmTrapLogRateThreshold Indicates that the incoming log rate has exceeded the
log-rate threshold.
To determine the peak log rate, use the following
CLI command: get system loglimits
System Restart fmTrapPowerStateChange Trap is sent when there is a change in the status of the
sys_reboot power supply, if present.
CPU Overuse fnTrapCpuThreshold Indicates that the CPU usage has exceeded the
cpu_high configured threshold.
This threshold can be set in the CLI using the following
commands:
config system snmp sysinfo
set trap-high-cpu-threshold
<percentage value>
end
Memory Low fnTrapMemThreshold Indicates memory usage has exceeded the configured
mem_low threshold.
This threshold can be set in the CLI using the following
commands:
config system snmp sysinfo
set trap-low-memory-threshold
<percentage value>
end
Log Disk Space fnTrapLogDiskThreshold Log disk usage has exceeded the configured threshold.
Low Only available on devices with log disks.
disk_low
The Fortinet MIB contains fields reporting current Fortinet unit status information. The below tables list the names of the
MIB fields and describe the status information available for each one. You can view more details about the information
available from all Fortinet MIB fields by compiling the fortinet.3.00.mib file into your SNMP manager and browsing
the Fortinet MIB fields.
Administrator accounts:
Custom messages:
fmTrapHASwitch The FortiManager HA cluster has been re-arranged. A new primary has been
selected and asserted.
RAID Management
RAID helps to divide data storage over multiple disks, providing increased data reliability. For FortiManager devices
containing multiple hard disks, you can configure the RAID array for capacity, performance, and/or availability.
The RAID Management tree menu is only available on FortiManager devices that support
RAID.
FortiManager units with multiple hard drives can support the following RAID levels:
See the FortiManager datasheet to determine your devices supported RAID levels.
Linear RAID
A Linear RAID array combines all hard disks into one large virtual disk. The total space available in this option is the
capacity of all disks used. There is very little performance change when using this RAID format. If any of the drives fails,
the entire set of drives is unusable until the faulty drive is replaced. All data will be lost.
RAID 0
A RAID 0 array is also referred to as striping. The FortiManager unit writes information evenly across all hard disks. The
total space available is that of all the disks in the RAID array. There is no redundancy available. If any single drive fails,
the data on that drive cannot be recovered. This RAID level is beneficial because it provides better performance, since
the FortiManager unit can distribute disk writing across multiple disks.
l Minimum number of drives: 2
l Data protection: No protection
RAID 1
A RAID 1 array is also referred to as mirroring. The FortiManager unit writes information to one hard disk, and writes a
copy (a mirror image) of all information to all other hard disks. The total disk space available is that of only one hard disk,
as the others are solely used for mirroring. This provides redundant data storage with no single point of failure. Should
any of the hard disks fail, there are backup hard disks available.
l Minimum number of drives: 2
l Data protection: Single-drive failure
One write or two reads are possible per mirrored pair. RAID 1 offers redundancy of data. A re-
build is not required in the event of a drive failure. This is the simplest RAID storage design
with the highest disk overhead.
RAID 1s
A RAID 1 with hot spare array uses one of the hard disks as a hot spare (a stand-by disk for the RAID). If a hard disk fails,
within a minute of the failure the hot spare is substituted for the failed drive, integrating it into the RAID array and
rebuilding the RAID’s data. When you replace the failed hard disk, the new hard disk is used as the new hot spare. The
total disk space available is the total number of disks minus two.
RAID 5
A RAID 5 array employs striping with a parity check. Similar to RAID 0, the FortiManager unit writes information evenly
across all drives but additional parity blocks are written on the same stripes. The parity block is staggered for each stripe.
The total disk space is the total number of disks in the array, minus one disk for parity storage. For example, with four
hard disks, the total capacity available is actually the total for three hard disks. RAID 5 performance is typically better
with reading than with writing, although performance is degraded when one disk has failed or is missing. With RAID 5,
one disk can fail without the loss of data. If a drive fails, it can be replaced and the FortiManager unit will restore the data
on the new disk by using reference information from the parity volume.
l Minimum number of drives: 3
l Data protection: Single-drive failure
RAID 5s
A RAID 5 with hot spare array uses one of the hard disks as a hot spare (a stand-by disk for the RAID). If a hard disk fails,
within a minute of the failure, the hot spare is substituted for the failed drive, integrating it into the RAID array, and
rebuilding the RAID’s data. When you replace the failed hard disk, the new hard disk is used as the new hot spare. The
total disk space available is the total number of disks minus two.
RAID 6
A RAID 6 array is the same as a RAID 5 array with an additional parity block. It uses block-level striping with two parity
blocks distributed across all member disks.
l Minimum number of drives: 4
l Data protection: Up to two disk failures.
RAID 6s
A RAID 6 with hot spare array is the same as a RAID 5 with hot spare array with an additional parity block.
RAID 10
RAID 10 (or 1+0), includes nested RAID levels 1 and 0, or a stripe (RAID 0) of mirrors (RAID 1). The total disk space
available is the total number of disks in the array (a minimum of 4) divided by 2, for example:
l 2 RAID 1 arrays of two disks each,
l 3 RAID 1 arrays of two disks each,
RAID 50
RAID 50 (or 5+0) includes nested RAID levels 5 and 0, or a stripe (RAID 0) and stripe with parity (RAID 5). The total disk
space available is the total number of disks minus the number of RAID 5 sub-arrays. RAID 50 provides increased
performance and also ensures no data loss for the same reasons as RAID 5. One drive in each RAID 5 array can fail
without the loss of data.
l Minimum number of drives: 6
l Data protection: Up to one disk failure in each sub-array.
Higher fault tolerance than RAID 5 and higher efficiency than RAID 0.
RAID 50 is only available on models with 9 or more disks. By default, two groups are used
unless otherwise configured via the CLI. Use the diagnose system raid status CLI
command to view your current RAID level, status, size, groups, and hard disk drive
information.
RAID 60
A RAID 60 (6+ 0) array combines the straight, block-level striping of RAID 0 with the distributed double parity of RAID 6.
l Minimum number of drives: 8
l Data protection: Up to two disk failures in each sub-array.
High read data transaction rate, medium write data transaction rate, and slightly lower
performance than RAID 50.
To view the RAID status, go to System Settings > RAID Management. The RAID Management pane displays the RAID
level, status, and disk space usage. It also shows the status, size, and model of each disk in the RAID array.
The Alert Message Console widget, located in Dashboard, provides detailed information about
RAID array failures. For more information see Alert Messages Console widget on page 75.
Graphic Displays the position and status of each disk in the RAID array. Hover the cursor
over each disk to view details.
Disk Space Usage Displays the total size of the disk space, how much disk space is used, and how
much disk space is free.
Disk Management Shows information about each disk in the RAID array.
Disk Status Displays the status of each disk in the RAID array.
l Ready: The hard drive is functioning normally.
l Rebuilding: The FortiManager unit is writing data to a newly added hard drive
in order to restore the hard drive to an optimal state. The FortiManager unit is
not fully fault tolerant until rebuilding is complete.
l Initializing: The FortiManager unit is writing to all the hard drives in the device
in order to make the array fault tolerant.
l Verifying: The FortiManager unit is ensuring that the parity data of a
redundant drive is valid.
l Degraded: The hard drive is no longer being used by the RAID controller.
l Inoperable: One or more drives are missing from the FortiManager unit. The
drive is no longer available to the operating system. Data on an inoperable
drive cannot be accessed.
Use command line to check if your device uses hardware or software RAID.
l Software RAID - this output shows that the device uses software RAID.
If a hard disk on a FortiManager unit fails, it must be replaced. On FortiManager devices that support hardware RAID, the
hard disk can be replaced while the unit is still running - known as hot swapping. On FortiManager units with software
RAID, the device must be shutdown prior to exchanging the hard disk.
To identify which hard disk failed, read the relevant log message in the Alert Message Console widget. See Alert
Messages Console widget on page 75.
Electrostatic discharge (ESD) can damage FortiManager equipment. Only perform the
procedures described in this document from an ESD workstation. If no such station is
available, you can provide some ESD protection by wearing an anti-static wrist or ankle strap
and attaching it to an ESD connector or to a metal part of a FortiManager chassis.
When replacing a hard disk, you need to first verify that the new disk is the same size as those
supplied by Fortinet and has at least the same capacity as the old one in the FortiManager
unit. Installing a smaller hard disk will affect the RAID setup and may cause data loss. Due to
possible differences in sector layout between disks, the only way to guarantee that two disks
have the same size is to use the same brand and model.
The size provided by the hard drive manufacturer for a given disk model is only an
approximation. The exact size is determined by the number of sectors present on the disk.
Some FortiManager units have space to add more hard disks to increase your storage capacity.
Fortinet recommends you use the same disks as those supplied by Fortinet. Disks of other
brands will not be supported by Fortinet. For information on purchasing extra hard disks,
contact your Fortinet reseller.
Administrative domains (ADOMs) enable administrators to manage only those devices that they are specifically
assigned, based on the ADOMs to which they have access. When the ADOM mode is advanced, FortiGate devices with
multiple VDOMs can be divided among multiple ADOMs.
Administrator accounts can be tied to one or more ADOMs, or denied access to specific ADOMs. When a particular
administrator logs in, they see only those devices or VDOMs that have been enabled for their account. Super user
administrator accounts, such as the admin account, can see and maintain all ADOMs and the devices within them.
When FortiAnalyzer features are enabled, each ADOM specifies how long to store and how much disk space to use for
its logs. You can monitor disk utilization for each ADOM and adjust storage settings for logs as needed.
The maximum number of ADOMs you can add depends on the FortiManager system model. Please refer to the
FortiManager data sheet for more information.
By default, ADOMs are disabled. Enabling and configuring ADOMs can only be done by administrators with the Super_
User profile. See Administrators on page 949.
Non-FortiGate devices, except for FortiAnalyzer devices, are automatically located in specific
ADOMs for their device type. They cannot be moved to other ADOMs.
One FortiAnalyzer device can be added to each ADOM. For more information, see Add
FortiAnalyzer or FortiAnalyzer BigData on page 122.
Root ADOM
The root ADOM type is FortiGate.When ADOMs are disabled, only the root ADOM is visible. When ADOMs are enabled,
other default ADOMs are visible too.
Unauthorized devices display in the root ADOM.
See also Default device type ADOMs on page 901.
When ADOMs are enabled, FortiManager includes default ADOMs for specific types of devices. When you add one or
more of these devices to FortiManager, the devices are automatically added to the appropriate ADOM, and the ADOM
becomes selectable. When a default ADOM contains no devices, the ADOM is not selectable.
For example, when you add a FortiClient EMS device to the FortiManager, the FortiClient EMS device is automatically
added to the default FortiClient ADOM. After the FortiClient ADOM contains a FortiClient EMS device, the FortiClient
ADOM is selectable when you log into FortiManager or when you switch between ADOMs.
You can view all of the ADOMs, including default ADOMs without devices, on the System Settings > ADOMs pane.
ADOM types
When ADOMs are enabled, you can create ADOMs and select a type. The type of ADOM determines what types of
devices you can add to the ADOM. FortiManager supports the following types of ADOMs:
Fabric You can add FortiGate and other types of devices from a Security Fabric to an
ADOM with Fabric type selected.
FortiGate You can add only FortiGate devices to an ADOM with FortiGate type selected.
FortiCarrier You can add only FortiCarrier devices to an ADOM with FortiCarrier type
selected.
FortiFirewall You can add only FortiFirewall devices to an ADOM with FortiFirewall type
selected.
FortiFirewallCarrier You can add only FortiFirewall Carrier devices to an ADOM with
FortiFirewallCarrier type selected.
FortiProxy You can only add FortiProxy devices to an ADOM with FortiProxy type selected.
See FortiProxy ADOMs on page 902.
FortiProxy ADOMs
You can create FortiProxy ADOMs to centrally manage FortiProxy devices using FortiManager. See Creating ADOMs
on page 909.
The following FortiManager modules are available in FortiProxy ADOMs:
Device Manager on page 81 Use the Device Manager pane to create device configuration changes and install
device and policy package configuration changes to managed devices. You can
also monitor managed FortiProxy devices from the Device Manger pane.
Using the device database, you can configure managed FortiProxy devices.
For more information, see Device Manager on page 81.
Policy & Objects on page 330 Configure policies and objects for FortiProxy devices, including:
l Create a new FortiProxy firewall policy on page 416
VPN Manager on page 628 Use the VPN Manager pane to enable and use central VPN management. You
can view and configure IPsec VPN and SSL-VPN settings that you can install to
one or more devices.
For more information, see VPN Manager on page 628.
Fabric View on page 673 The Fabric View module enables you to view and create fabric connectors.
For more information, see Fabric View on page 673.
FortiGuard on page 776 View and manage FortiGuard services for FortiProxy devices.
For more information, see FortiGuard on page 776.
You can organize devices into ADOMs to allow you to better manage these devices. Devices can be organized by
whatever method you deem appropriate, for example:
l Firmware version: group all devices with the same firmware version into an ADOM.
l Geographic regions: group all devices for a specific geographic region into an ADOM, and devices for a different
region into another ADOM.
l Administrative users: group devices into separate ADOMs based for specific administrators responsible for the
group of devices.
l Customers: group all devices for one customer into an ADOM, and devices for another customer into another
ADOM.
By default, ADOMs are disabled. Enabling and configuring ADOMs can only be done by super user administrators.
When ADOMs are enabled, the Device Manager, Policy & Objects, AP Manager, and VPN Manager panes are
displayed per ADOM. If FortiAnalyzer features are enabled, the FortiView, Log View, Incidents & Events, and Reports
panes are also displayed per ADOM. You select the ADOM you need to work in when you log into the FortiManager unit.
Switching between ADOMs on page 33.
ADOMs must be enabled to support FortiMail and FortiWeb logging and reporting. When a
FortiMail or FortiWeb device is authorized, the device is added to the respective default ADOM
and is visible in the left-hand tree menu.
FortiGate and FortiCarrier devices cannot be grouped into the same ADOM. FortiCarrier
devices are added to a specific default FortiCarrier ADOM.
1. Remove all the devices from all non-root ADOMs. That is, add all devices to the root ADOM.
2. Delete all non-root ADOMs. See Deleting ADOMs on page 913.
Only after removing all the non-root ADOMs can ADOMs be disabled.
3. Go to Dashboard.
4. In the System Information widget, toggle the Administrative Domain switch to OFF.
You will be automatically logged out of the FortiManager and returned to the log in screen.
The ADOMs feature cannot be disabled if ADOMs are still configured and have managed
devices in them.
ADOM deployment can have two device modes: Normal (default) and Advanced.
l In Normal mode, you cannot assign different FortiGate VDOMs to different ADOMs. The FortiGate unit can only be
added to a single ADOM.
l In Advanced mode, you can assign a VDOM from a single device to a different ADOM. This allows you to analyze
data for individual VDOMs, but will result in more complicated management scenarios. It is recommended only for
advanced users.
FortiManager does not support splitting FortiGate VDOMs between multiple ADOMs in
different ADOM modes (normal/backup).
To change from Advanced mode back to Normal mode, you must ensure no FortiGate VDOMs are assigned to an
ADOM.
While in Workspace mode with Advanced ADOM mode enabled, changes made to a managed
device's database in the Device Manager are automatically saved and applied, and the Save
button is not selectable.
ADOM modes
When creating an ADOM in Normal Mode, the ADOM is considered Read/Write, where you are able to make changes to
the ADOM and managed devices from the FortiManager. FortiGate units in the ADOM will query their own configuration
every 5 seconds. If there has been a configuration change, the FortiGate unit will send a diff revision on the change to
the FortiManager using the FGFM protocol.
When creating an ADOM in Backup Mode, the ADOM is considered Read Only, where you cannot make changes to the
ADOM and managed devices from FortiManager. Changes are made via scripts, which are run on the managed device,
or through the device’s GUI or CLI directly. Revisions are sent to the FortiManager when specific conditions are met:
l Configuration change and session timeout
l Configuration change and log out
l Configuration change and reboot
l Manual configuration backup from the managed device.
When you add a device to an ADOM in backup mode, you can import firewall address and service objects to
FortiManager, and FortiManager stores the objects in the Device Manager database. You can view the objects on the
Policy & Objects pane. Although you can view the objects on the Policy & Objects pane, the objects are not stored in the
central database. This lets you maintain a repository of objects used by all devices in the backup ADOM that is separate
from the central database.
All devices that are added to the ADOM will only have their configuration backed up. Configuration changes cannot be
made to the devices in a backup ADOM. You can push any existing revisions to managed devices. You can still monitor
and review the revision history for these devices, and scripting is still allowed for pushing scripts directly to FortiGate
units.
You can create an ADOM with backup mode enabled, and then add devices to the ADOM.
When an ADOM is in backup mode, the following panes are available:
l Device Manager
l Policy & Objects
l FortiGuard
l FortiView
l System Settings
Devices Select a device. Alternately, you can add a device to the ADOM later by using
the Add Device wizard.
You can use the Add Device wizard to add FortiGate devices to an ADOM in backup mode. The wizard also lets you
import Firewall address and service objects. Policies are not imported. All imported objects are stored in the device
database. They are not stored in the central (ADOM) database, which is used to store objects used in policies.
Alternately, you can import objects after adding devices by using the Import Configuration button on the Device Manager
pane. Objects imported using this method are stored in the ADOM database.
Objects must be manually imported into the FortiManager backup ADOM. They are not automatically synchronized to
FortiManager when they are created, edited or deleted on the FortiGate.
Objects created on FortiManager can also be imported into the FortiGate. See Managing synchronization of
FortiManager objects on FortiGate on page 907.
1. Go to Device Manager > Device & Groups, and click Add Device.
2. Follow the Add Device wizard, until the Import button is displayed.
3. Click Import to import firewall address and service objects to the Device Manager database.
The objects are imported into the Device Manager database.
Alternately you can import the objects after you add the device.
4. Go to the Policy & Objects pane to view the objects.
You can also create, edit, and delete objects.
1. In the FortiGate GUI, click the Central Management icon in the toolbar.
New Objects stored on the FortiManager backup ADOM that are not available locally.
To import new objects to the local FortiGate, select them and click Import or Import All.
Local Only Local objects that have not been imported to the FortiManager backup ADOM.
To import local objects to FortiManager, use the FortiManager Import Configuration
wizard. See Importing FortiGate objects on page 906.
When an ADOM is in backup mode, you can view information about read-only policies
5. In the dashboard toolbar, click CLI Configurations > CLI Configurations to view information about policies. The
policies are read-only.
Managing ADOMs
The ADOMs feature must be enabled before ADOMs can be created or configured. See Enabling and disabling the
ADOM feature on page 903.
To create and manage ADOMs, go to System Settings > ADOMs.
Create New Create a new ADOM. See Creating ADOMs on page 909.
Edit Edit the selected ADOM. This option is also available from the right-click menu.
See Editing an ADOM on page 913.
Delete Delete the selected ADOM or ADOMs. You cannot delete default ADOMs. This
option is also available from the right-click menu. See Deleting ADOMs on page
913.
Enter ADOM Switch to the selected ADOM. This option is also available from the right-click
menu.
Disable ADOM Disable the selected ADOM. This option is also available from the right-click
menu.
More Select Expand Devices to expand all of the ADOMs to show the devices in each
ADOM.
Firmware Version The firmware version of the ADOM. Devices in the ADOM should have the same
firmware version.
See ADOM versions on page 916 for more information.
Central Management Whether or not central management for VPN, FortiAP, or FortiSwitch is enabled
for the ADOM.
Devices The number of devices and VDOMs that the ADOM contains.
The device list can be expanded or by clicking the triangle.
Creating ADOMs
ADOMs must be enabled, and you must be logged in as a super user administrator to create a new ADOM.
Consider the following when creating ADOMs:
l The maximum number of ADOMs that can be created depends on the FortiManager model. For more information,
see the FortiManager data sheet at https://www.fortinet.com/products/management/fortimanager.html.
l You must use an administrator account that is assigned the Super_User administrative profile.
l You can add a device to only one ADOM. You cannot add a device to multiple ADOMs.
l You cannot add FortiGate and FortiCarrier devices to the same ADOM. FortiCarrier devices are added to a specific,
default FortiCarrier ADOM.
l You can add one or more VDOMs from a FortiGate device to one ADOM. If you want to add individual VDOMs from
a FortiGate device to different ADOMs, you must first enable advanced device mode. See ADOM device modes on
page 904.
l When FortiAnalyzer features are enabled, you can configure how an ADOM handles log files from its devices. For
example, you can configure how much disk space an ADOM can use for logs, and then monitor how much of the
allotted disk space is used. You can also specify how long to keep logs indexed in the SQL database and how long
to keep logs stored in a compressed format.
To create an ADOM:
1. Ensure that ADOMs are enabled. See Enabling and disabling the ADOM feature on page 903.
2. Go to System Settings > ADOMs.
3. Click Create New in the toolbar. The Create New ADOM pane is displayed.
Name Type a name that allows you to distinguish this ADOM from your other
ADOMs. ADOM names must be unique.
Type Select Fabric, FortiCarrier, FortiFirewall, FortiFirewall Carrier, FortiGate, or
FortiProxy from the dropdown menu. The ADOM type cannot be edited.
Other device types are added to their respective default ADOM when
authorized for central management with FortiManager.
Time Zone Select the time zone for the ADOM.
The selected time zone is used by all modules in the ADOM (for example,
Policy & Objects and System Settings) except in the Event Log which uses the
system time zone regardless of the selected ADOM.
When FortiAnalyzer features are enabled, this time zone will be used when
displaying data in Log View and FortiView. When FortiManager is managing a
FortiAnalyzer, each FortiAnalyzer ADOM synchronizes its time zone from the
corresponding FortiManager ADOM.
The Default time zone is the time zone set for the FortiManager. For more
information, see Configuring the system time on page 60.
Version Select the version of the devices in the ADOM. The ADOM version cannot be
edited.
Devices Add a device or devices with the selected versions to the ADOM. The search
field can be used to find specific devices. See Assigning devices to an ADOM
on page 912.
Mode Select Normal mode if you want to manage and configure the connected
devices from the FortiManager GUI. Select Backup mode if you want to
backup the configurations to the FortiManager, but configure each device
locally.
See ADOM modes on page 904 for more information.
Central Management Select the VPN checkbox to enable central VPN management.
Alert and Delete Specify at what data usage percentage an alert messages will be generated
When Usage and logs will be automatically deleted. The oldest Archive log files or Analytics
Reaches database tables are deleted first.
To assign devices to an ADOM you must be logged in as a super user administrator. Devices cannot be assigned to
multiple ADOMs.
To assign VDOMs to an ADOM you must be logged in as a super user administrator and the ADOM mode must be
Advanced (see ADOM device modes on page 904). VDOMs cannot be assigned to multiple ADOMs.
Super user administrators can create other administrators and either assign ADOMs to their account or exclude them
from specific ADOMs, constraining them to configurations and data that apply only to devices in the ADOMs they can
access.
By default, when ADOMs are enabled, existing administrator accounts other than admin are
assigned to the root domain, which contains all devices in the device list. For more information
about creating other ADOMs, see Creating ADOMs on page 909.
1. Log in as a super user administrator. Other types of administrators cannot configure administrator accounts when
ADOMs are enabled.
2. Go to System Settings > Administrators.
3. Double-click on an administrator, right-click on an administrator and then select the Edit from the menu, or select the
administrator then click Edit in the toolbar. The Edit Administrator pane opens.
4. Edit the Administrative Domain field as required, either assigning or excluding specific ADOMs.
5. Select OK to apply your changes.
Editing an ADOM
To edit an ADOM you must be logged in as a super user administrator. The ADOM type and version cannot be edited.
For the default ADOMs, the name cannot be edited.
To edit an ADOM:
Deleting ADOMs
To delete an ADOM, you must be logged in as a super-user administrator (see Administrator profiles on page 981), such
as the admin administrator.
Prior to deleting an ADOM:
l All devices must be removed from the ADOM. Devices can be moved to another ADOM, or to the root ADOM. See
Assigning devices to an ADOM on page 912.
To delete an ADOM:
From the System Settings > ADOMs pane, you can check the status of all devices in all ADOMs. You can check the
status of the following criteria for all devices in all ADOMs:
l Device connection is down.
l Device configuration status is not synchronized.
l Device policy package status is not synchronized.
You can also choose whether to exclude model devices from the health check.
When the health check status is displayed, you can view what ADOMs contain problematic devices, and go directly to
the Device Manager pane in the ADOM with problematic devices. You can also return to the ADOM Health Check dialog
box, and continue checking ADOM statuses.
3. In the Health Check Criteria section, select what items to check, and click Check Now.
The results of the check are displayed. In the following example, Warning ADOMs <number> is selected, and the
list of ADOMs with warnings are displayed. The root ADOM has a warning.
4. Under Warning ADOMs <number>, click the ADOM name to display the Device Manager pane, and view details
about the warning.
The Device Manager pane is displayed for the ADOM with the warning. The ADOM Health Check button remains at
the bottom of the pane.
5. At the bottom-right of the Device Manager pane, click the ADOM Health Check button to return to the ADOM Health
Check dialog box, and continue checking ADOMs.
The ADOM Health Check dialog box is displayed.
6. Click All ADOMs <number>.
A summary of all ADOMs is displayed. In the following example, a warning status (orange triangle) displays beside
the root ADOM, and a synchronized status (green checkmark) displays beside the 64 ADOM.
ADOM versions
Each ADOM created on FortiManager has its own version. The version of an ADOM refers to the specific FortiOS
version that the ADOM’s central database is aligned with. For example, a version 7.6 ADOM uses FortiOS 7.6 syntax,
and its Policy & Objects are based on FortiOS 7.6.
The ADOM version defines the features, configuration options, and policies that are available within that ADOM:
Firmware compatibility The ADOM version aligns with a specific FortiOS firmware version (for example,
7.2, 7.4, and 7.6), ensuring that devices running a compatible FortiOS version can
be managed within that ADOM.
This is important because different FortiOS versions may have different features,
commands, or configurations, so the ADOM version must match to enable proper
management.
FortiOS feature set Each FortiOS version may introduce new features, security policies, or
configuration settings. By setting the ADOM to a specific version, you define the
feature set available to that ADOM, limiting the options to those compatible with
the selected FortiOS version.
Version control Using versioned ADOMs allows for consistent policy and configuration
management across devices within the same ADOM, ensuring they all operate
within the same FortiOS environment.
FortiOS device allocation Only devices running a FortiOS version compatible with the ADOM’s version can
be assigned to that ADOM, helping avoid misconfigurations or conflicts. See
FortiOS version support by ADOM version on page 918.
ADOM version upgrades ADOMs can be upgraded to support newer FortiOS versions, allowing you to
adopt the latest features and improvements as devices in that ADOM are
upgraded.
When planning upgrades, it’s essential to ensure that the FortiManager version
supports the desired ADOM versions and that those ADOM versions are
compatible with the FortiOS versions on your devices. See Upgrading an ADOM
on page 922 and Understanding the relationships between versions on page 918.
Some ADOM versions can also manage FortiGate devices that are on earlier or later firmware versions. For example, in
7.6.1, the 7.4 ADOM can manage FortiGate devices on firmware versions 7.4.x and 7.2.x.
Fig 1: Supported FortiOS versions for each FortiManager 7.6.1 ADOM version
When the ADOM is managing devices on earlier or later firmware versions, it does not include the exact FortiOS syntax
for those versions, and instead uses a “downgrade” and “upgrade” mechanism to adapt to different versions of FortiOS
syntax as needed.
For example:
Configuration upgrade If you install policies to a device with a higher FortiOS version than the ADOM
version, FortiManager will leverage its upgrade capability.
Automatic upgrade of CLI syntax is handled as follows:
1. New CLI syntax that exists in the higher FortiGate version but not in the
ADOM's version is not used.
2. Modified CLI syntax is upgraded to the higher version's CLI syntax and used.
3. Deleted CLI syntax is not installed to the higher version FortiGate.
Configuration downgrade If you install policies to a device with a lower FortiOS version, FortiManager will
leverage its downgrade capability.
Automatic downgrade of CLI syntax is handled as follows:
1. New CLI syntax that does not exist in the previous version is discarded
during downgrade and isn't used.
2. Modified CLI syntax is reverted to the previous version's CLI syntax and
used.
3. Deleted CLI syntax is converted to the previous version's CLI syntax and
uses the default values from that version.
The upgrade and downgrade process is performed on a best-effort basis. If FortiManager supports the necessary
downgrade or upgrade capabilities for the target FortiOS versions, then the ADOM can manage devices with those
versions. See FortiOS version support by ADOM version on page 918.
While some ADOM versions can manage multiple FortiOS versions, it’s generally
recommended to minimize version discrepancies to avoid potential compatibility issues.
It is not recommended to permanently leave devices on earlier or later firmware versions
within the ADOM due to the restrictions the ADOM may have by not sharing the exact
FortiOS syntax. For example, you cannot use features from higher firmware version, such as
templates that reference syntax from the higher version.
The table below outlines the FortiOS versions that can be managed by each ADOM version in FortiManager 7.6.1,
including the ability to install and import configurations to and from FortiGate devices on that version.
ADOM version support can change between each release as additional support is added so it is recommended that you
view the table below for your specific FortiManager version to see the firmware versions that are supported by each
ADOM version.
7.6.x ü ü X X X X
7.4.x X X ü ü ü ü
7.2.x X X ü ü ü ü
The versions that each ADOM is able to support is also based on the FortiManager firmware
version's overall compatibility with other products. For example:
l In FortiManager 7.4.5, the 7.2 ADOM can include devices on FortiOS 7.0.x.
l In FortiManager 7.6.1, the 7.2 ADOM can not include FortiOS 7.0.x devices because
FortiManager 7.6.1 is not compatible with FortiOS 7.0.x.
For information on devices supported by your FortiManager firmware version, see the
FortiManager Release Notes.
New ADOM versions introduced to FortiManager will initially only support FortiOS on matching
firmware versions. Additional upgrade/downgrade configuration support is typically added
within one or two patch versions.
When using ADOMs in FortiManager, there are three different versions to be aware of:
1. FortiManager version: This is the software version of the FortiManager system itself, which determines the overall
capabilities and the range of ADOM versions available.
2. ADOM version: An ADOM in FortiManager is a logical partition that allows for the separate management of devices
and policies. Each ADOM is assigned to a specific version, which aligns with a particular FortiOS syntax version.
This alignment ensures that the features and configurations within the ADOM are compatible with the devices it
manages.
3. FortiOS version: This is the firmware version running on Fortinet devices, such as FortiGate firewalls. The
FortiOS version dictates the features and configurations available on the device.
By understanding the way these versions interact, you can effectively manage your Fortinet environment, ensuring
compatibility and optimal performance across the FortiManager, ADOMs, and FortiOS versions.
l A single FortiManager instance can support multiple ADOMs, each potentially set to different versions.
l The range of ADOM versions that FortiManager can support depends on its own version. For example,
FortiManager 7.6.1 can support ADOM versions 7.6, 7.4 and 7.2.
l An ADOM's version determines which FortiOS versions it can manage. For instance, in FortiManager 7.6.1 an
ADOM set to version 7.4 can manage devices running FortiOS 7.4 and 7.2.
l This compatibility ensures that configurations and policies within the ADOM are appropriate for the device's
firmware.
The global database ADOM version support matches that of local ADOMs of the same version. See ADOM versions on
page 916.
The global database is reset when the database version is edited. The database is not reset when the global database
ADOM is upgraded using the Upgrade command.
The global database ADOM should only be upgraded after all the ADOMs that are using a
global policy package have been upgraded to a supported version. See ADOM versions on
page 916.
Concurrent ADOM access is controlled by enabling or disabling the workspace function. Concurrent access is enabled
by default. To prevent multiple administrators from making changes to the FortiManager database at the same time and
causing conflicts, the workspace function must be enabled.
When workspace mode is enabled, concurrent ADOM access is disabled. An administrator must lock the ADOM before
they can make device-level changes to it, and only one administrator can hold the lock at a time, while other
administrators have read-only access. Optionally, ADOM lock override can be enabled, allowing an administrator to
unlock an ADOM that is locked by another administrator. See Locking an ADOM on page 921
When workspace is disabled, concurrent ADOM access is enabled, and multiple administrators can log in and make
changes to the same ADOM at the same time.
Workspace mode can be applied per ADOM or on all ADOMS. See Enable workspace mode
on page 990.
After changing the workflow mode, your session will end and you will be required to log back in
to the FortiManager.
To disable workspace mode, and enable concurrent ADOM access in the CLI:
Locking an ADOM
If workspace is enabled, you must lock an ADOM prior to performing device-level changes to it, such as upgrading
firmware for a device.
The padlock icon, shown next to the ADOM name on the banner and in the All ADOMs list, will turn green when you lock
an ADOM. If it is red, it means that another administrator has locked the ADOM.
Optionally, ADOM lock override can be enabled, allowing an administrator to unlock an ADOM that has been locked by
another administrator and discard all of their unsaved changes.
For more information about workspace mode, see Workspace on page 989.
To lock an ADOM:
l Ensure that you are in the specific ADOM that you will be editing (top right corner of the GUI), then click the lock icon
from the banner.
l Or, go to System Settings > ADOMs, right-click on an ADOM, and select Lock from the right-click menu.
The ADOM will now be locked, allowing you to make changes to it and preventing other administrators from making
changes unless lock override is enabled. The lock icon will turn into a green locked padlock. For other administrators
To unlock an ADOM:
l Ensure you have saved any changes you may have made to the ADOM then select Unlock ADOM from the banner.
l Or, go to System Settings > ADOMs, right-click on an ADOM, and select Lock from the right-click menu.
If there are unsaved changes to the ADOM, a dialog box will give you the option of saving or discarding your changes
before unlocking the ADOM. The ADOM will now be unlocked, allowing any administrator to lock the ADOM and make
changes.
Upgrading an ADOM
Before upgrading your ADOM, it is recommended to backup your configuration and/or take a
VM snapshot so that you can roll back changes if required.
See Creating a snapshot of VM instances and Backing up the system on page 65.
To upgrade an ADOM:
Multiple ADOMs of the same version can be upgraded at the same time in FortiManager. For example you can
simultaneously update multiple 7.2 ADOMs to 7.4 but cannot upgrade a 6.4 and 7.2 ADOM at the same time.
FortiManager is able to manage devices on mixed firmware versions in an ADOM. See ADOM versions on page 916.
Global Database
The Global Database contains object configurations, policy packages, and header and footer sensor configuration for
IPS.
traffic shaping header and footer policies. For more information, see Creating policy packages on page 927.
l Header/Footer IPS: Header/Footer IPS allows you to configure header and footer sensors for use in
IPS policies. For more information, see Header/Footer IPS on page 924.
l Object Configurations: You can view or create objects from the Normalized Interface, Firewall Objects,
Security Profiles, User & Authentication, Security Fabric, Advanced, and Scripts menus. For more information,
see Creating object configurations on page 923.
You can create new object configurations before including them in policy packages. Alternatively, you can also create
policy packages using existing object configurations.
FortiManager supports FortiGate global objects. FortiGate global objects are identified with the prefix “g-“.
When a FortiGate configuration using FortiGate global objects is imported into FortiManager, the global objects are
added to the FortiManager as ADOM-level objects.
If FortiGate global objects (g-) are referenced in a FortiManager policy package, they are installed to the FortiGate
Global VDOM and are usable in other VDOMs.
Below is a list of FortiGate global objects supported by FortiManager:
l system replacemsg-group
l system external-resource
l webfilter profile
l firewall wildcard-fqdn custom
l ips sensor
l sctp-filter profile
l application list
l dlp data-type
l dlp dictionary
l dlp sensor
l dlp profile
l webfilter search-engine
l antivirus profile
l file-filter profile
l wireless-controller utm-profile
l firewall ssh local-key
l firewall ssh local-ca
l threat feeds
For more information, see the FortiGate Administration Guide.
Header/Footer IPS
You can create new IPS headers and footers for use in Intrusion Prevention object configuration. When a
IPS header/footer is created and assigned to an ADOM, all new and existing Intrusion Prevention objects in that ADOM
will include the header and footer.
The Header/Footer IPS table includes the following features in the toolbar:
Assign/Un-assign Assign the IPS header/footer to one or more ADOMs. ADOMs will not appear in
the Assign/Un-assign list unless they have first been specified using
ADOM Assignment.
When the IPS header/footer is assigned to an ADOM, all new and existing
Intrusion Prevention objects within this ADOM are updated to include the
IPS headers and footers.
Column Settings Configure which columns are displayed in the Header/Footer IPS table.
IPS Signatures and Filters Click Create new, and select Header IPS or Footer IPS to create new
IPS signatures and filters.
Filters When creating filters, the following settings are available: Action (Allow,
Monitor, Block, Reset, Default, Quarantine), Packet Logging, Status, and
Filter. Click the edit filter icon to create a new filter.
For information on hold-time and CVE filter options, see Intrusion prevention
hold-time and CVE filtering on page 970.
Signatures When selecting signatures, the following settings are available: Action (Allow,
Monitor, Block, Reset, Default, Quarantine), Packet Logging, Status, Rate-
based Setting, Exempt IPs, and Signatures. Click Add Signature to select a
new signature.
Revision Enter a change note for any changes made to the IPS header/footer sensor.
Previous changes are displayed under Revision History.
3. From the ADOM selector, choose one or more ADOMs, and click OK.
In the Header/Footer IPS table, the header/footer displays that it is not yet applied to the ADOM(s) in the Assign to
ADOM column.
4. Click Assign/Un-assign in the toolbar, select the ADOM where the IPS header/footer will be assigned, and click OK.
In the Header/Footer IPS table, the header/footer displays that it is applied to the selected ADOM.
5. Navigate to the ADOM where the IPS header/footer was installed, and go to Policy & Objects > Security Profiles
> Intrusion Prevention.
All new and existing Intrusion Prevention objects within this ADOM include the IPS headers and footers that were
The use of local Policy Blocks simplifies the process for upgrading your ADOMs and can be
considered as an alternative to Global Policy Packages. For more information, see Using
Policy Blocks versus Global Policy Packages on page 443.
Once a global policy package is created, you can assign it to an ADOM or to specific policy packages within an ADOM.
This allows the administrator for the ADOM to deploy the policy package to all devices within the ADOM.
See Assign a global policy package on page 339.
You can install all policy packages which have been modified by the global policy package assignment.
See Installing policy packages and device settings on page 161
Fabric Management
In System Settings > Fabric Management, you can create and manage a Fabric of FortiManagers.
Use the FortiManager Fabric tab to create or join a Fabric of FortiManager. For more information, see the Fabric of
FortiManager Deployment Guide.
Certificates
The FortiManager generates a certificate request based on the information you entered to identify the FortiManager unit.
After you generate a certificate request, you can download the request to a management computer and then forward the
request to a CA.
Local certificates are issued for a specific server, or website. Generally they are very specific, and often for an internal
enterprise network.
CA root certificates are similar to local certificates, however they apply to a broader range of addresses or to an entire
company.
The CRL is a list of certificates that have been revoked and are no longer usable. This list includes expired, stolen, or
otherwise compromised certificates. If your certificate is on this list, it will not be accepted. CRLs are maintained by the
CA that issues the certificates and include the date and time when the next CRL will be issued, as well as a sequence
number to help ensure you have the most current versions.
Local certificates
The FortiManager unit generates a certificate request based on the information you enter to identify the FortiManager
unit. After you generate a certificate request, you can download the request to a computer that has management access
to the FortiManager unit and then forward the request to a CA.
The certificate window also enables you to export certificates for authentication, importing, and viewing.
The FortiManager has one default local certificate: Fortinet_Local.
You can manage local certificates from the System Settings > Certificates page. Some options are available in the
toolbar and some are also available in the right-click menu.
Optional Information
Organization Unit The name of the department. You can enter a series of OUs up to a maximum
(OU) of 5. To add or remove an OU, use the plus (+) or minus (-) icons.
Locality (L) Name of the city or town where the device is installed.
State/Province Name of the state or province where the FortiGate unit is installed.
(ST)
Country (C) Select the country where the unit is installed from the dropdown list.
Subject Optionally, enter one or more alternative names for which the certificate is also
Alternative Name valid. Separate names with a comma.
A name can be:
l e-mail address
l IP address
l URI
l DNS name (alternatives to the Common Name)
l directory name (alternatives to the Distinguished Name)
You must precede the name with the name type. Examples:
l IP:1.1.1.1
l email:[email protected]
l email:[email protected]
l URI:http://my.url.here/
Key Size Select the key size from the dropdown list: 512 Bit, 1024 Bit, 1536 Bit, or 2048
Bit. This option is only available when the key type is RSA.
Curve Name Select the curve name from the dropdown list: secp256r1 (default),
secp384r1, or secp521r1. This option is only available when the key type is
Elliptic Curve.
Type Select the certificate type from the dropdown list: Local Certificate, PKCS #12
Certificate, or Certificate.
Certificate File Click Browse... and locate the certificate file on the management computer, or
drag and drop the file onto the dialog box.
Key File Click Browse... and locate the key file on the management computer, or drag
and drop the file onto the dialog box.
This option is only available when Type is Certificate.
When an object is added to a policy package and assigned to an ADOM, the object is available
in all devices that are part of the ADOM. If the object is renamed on a device locally,
FortiManager automatically syncs the renamed object to the ADOM.
CA certificates
The FortiManager has one default CA certificate, Fortinet_CA. In this sub-menu you can delete, import, view, and
download certificates.
Importing CA certificates
To import a CA certificate:
page opens.
4. Click OK to return to the CA certificates list.
Downloading CA certificates
To download a CA certificate:
Deleting CA certificates
When you apply for a signed personal or group certificate to install on remote clients, you can obtain the corresponding
root certificate and Certificate Revocation List (CRL) from the issuing CA.
The CRL is a list of certificates that have been revoked and are no longer usable. This list includes expired, stolen, or
otherwise compromised certificates. If your certificate is on this list, it will not be accepted. CRLs are maintained by the
CA that issues the certificates and includes the date and time when the next CRL will be issued as well as a sequence
number to help ensure you have the most current version of the CRL.
When you receive the signed personal or group certificate, install the signed certificate on the remote client(s) according
to the browser documentation. Install the corresponding root certificate (and CRL) from the issuing CA on the
FortiManager unit according to the procedures given below.
Importing a CRL
To import a CRL:
Viewing a CRL
To view a CRL:
Deleting a CRL
Event Log
The Event Log pane provides an audit log of actions made by users on FortiManager. It allows you to view log messages
that are stored in memory or on the internal hard disk drive. You can use filters to search the messages and download
the messages to the management computer.
See the FortiManager Log Message Reference, available from the Fortinet Document Library, for more information
about the log messages.
The event log includes logs for modify, request, and response API calls.
You can disable or enable JSON API request and response logging in the FortiManager CLI:
config system global
set jsonapi-log {all | disable | request | response}
all - logging for both jsonapi request & response.
disable - disable jsonapi logging for both request & response.
request - logging for jsonapi request only.
response - logging for jsonapi response only.
Go to System Settings > Event Log to view the local log list.
Last... Select the amount of time to show from the available options, or select a custom
time span or any time.
Add Filter Filter the event log list based on the log level, user, sub type, or message. See
Event log filtering on page 936.
Download Download the event logs in either CSV or the normal format to the management
computer.
Raw Log / Formatted Log Click on Raw Log to view the logs in their raw state.
Click Formatted Log to view them in the formatted into a table.
Back Click the back icon to return to the regular view from the historical view.
View View the selected log file. This option is also available from the right-click menu,
or by double-clicking on the log file.
This option is only available when viewing historical event logs.
Delete Delete the selected log file. This option is also available from the right-click menu.
This option is only available when viewing historical event logs.
Clear Clear the selected file of logs. This option is also available from the right-click
menu.
This option is only available when viewing historical event logs.
l FDS Upload Log: Select the device from the dropdown list.
l FDS Download Log: Select the service (FDS or FCT) from the Service
dropdown list, select the event type (All Event, Push Update, Poll Update, or
Manual Update) from the Event dropdown list, and then click Go to browse
the logs.
This option is only available when viewing historical logs.
Pagination Browse the pages of logs and adjust the number of logs that are shown per page.
Date/Time The date and time that the log file was generated.
Level The severity level of the message. For a description of severity levels, see the Log
Message Reference.
Sub Type The event log subtype. For a description of the subtypes for event logs, see the
Log Message Reference.
Performed On Entity affected by the change or operation. For example, when you log out of the
FortiManager GUI, the operation is performed on the local FortiManager GUI.
Message Log message details. A Session ID is added to each log message. The username
of the administrator is added to log messages wherever applicable for better
traceability.
The event log can be filtered using the Add Filter box in the toolbar.
l Text Mode: Click the Switch to Text Mode icon at the right end of the Add Filter box to switch to text mode. In
Task Monitor
Use the task monitor to view the status of the tasks you have performed.
Go to System Settings > Task Monitor to view the task monitor. The task list size can also be configured; see
Miscellaneous Settings on page 947.
To filter the information in the monitor, enter a text string in the search field.
Group Error Devices Create a group of the failed devices, allowing for re-installations to be done only
on the failed devices.
View Task Detail View the task Index, Name, Status, Time Used, and History, in a new window.
Click the icons in the History column to view the following information:
l History
To filter the information in the task details, enter a text string in the search field.
This can be useful when troubleshooting warnings and errors.
Show Status Select which tasks to view from the dropdown list, based on their status. The
available options are: All, Pending, Running, Canceling, Canceled , Done, Error,
Aborting, Aborted, and Warning.
Column Settings Select the columns you want to display from the dropdown.
Description The nature of the task. Double-click the task to display the specific actions taken
under this task.
Mail Server
A mail server allows the FortiManager to sent email messages, such as notifications when reports are run or specific
events occur. Mail servers can be added, edited, deleted, and tested.
Go to System Settings > Advanced > Mail Server to configure SMTP mail server settings.
If an existing mail server is in use, the delete icon is removed and the mail server entry cannot
be deleted.
3. Configure the following settings and then select OK to create the mail server.
SMTP Server Port Enter the SMTP server port number. The default port is 25.
Email Account Enter an email account. This option is only accessible when authentication is
enabled.
Password Enter the email account password. This option is only accessible when
authentication is enabled.
Syslog Server
Go to System Settings > Advanced > Syslog Server to configure syslog server settings. Syslog servers can be added,
edited, deleted, and tested.
After adding a syslog server, you must also enable FortiManager to send local logs to the syslog server. See Send local
logs to syslog server on page 941.
If an existing syslog server is in use, the delete icon is removed and the server entry cannot be
deleted.
3. Configure the following settings and then select OK to create the syslog server.
IP address (or FQDN) Enter the IP address or FQDN of the syslog server.
FortiManager supports IPv4 and IPv6 addresses.
Syslog Server Port Enter the syslog server port number. The default port is 514.
Reliable Connection Enable or disable a reliable connection with the syslog server. The default is
disable.
After adding a syslog server to FortiManager, the next step is to enable FortiManager to send local logs to the syslog
server. See Syslog Server on page 939.
You can only enable these settings by using the CLI.
config system locallog syslogd setting
set severity information
set status enable
set syslog-name <syslog server name>
end
Meta Fields
Meta fields allow administrators to add additional attributes to objects and administrators. You can make meta fields
required or optional.
When meta fields are required, administrators must supply additional information when they create an associated object.
For example, if you create a required meta field for a device object, administrators must define a value for that meta field
for all devices.
Go to System Settings > Advanced > Meta Fields to configure meta fields. Meta fields can be added, edited, and deleted.
Meta fields cannot be used as variables in scripts or provisioning templates. Instead, you can
use ADOM-level metadata variables which can be created in Policy & Objects. See ADOM-
level metadata variables on page 479.
Select Expand All or Collapse All from the toolbar or right-click menu to view all or none of the
meta fields under each object.
Object The object this metadata field applies to: Administrative Domain, Central NAT,
Device, Device Group, Device VDOM, Firewall Address, Firewall Address
Group, Firewall Policy, Firewall Service, Firewall Service Group, or System
Administrator.
Length Select the maximum number of characters allowed for the field from the
dropdown list: 20, 50, or 255.
Importance Select Required to make the field compulsory; otherwise, select Optional.
5. Click OK.
The meta field is created.
Device logs
The FortiManager allows you to log system events to disk. You can control device log file size and the use of the
FortiManager unit’s disk space by configuring log rolling and scheduled uploads to a server.
As the FortiManager unit receives new log items, it performs the following tasks:
l Verifies whether the log file has exceeded its file size limit.
l Checks to see if it is time to roll the log file if the file size is not exceeded.
When a current log file (tlog.log) reaches its maximum size, or reaches the scheduled time, the FortiManager unit
rolls the active log file by renaming the file. The file name will be in the form of xlog.N.log (for example,
tlog.1252929496.log), where x is a letter indicating the log type and N is a unique number corresponding to the time
the first log entry was received. The file modification time will match the time when the last log was received in the log file.
Once the current log file is rolled into a numbered log file, it will not be changed. New logs will be stored in the new
current log called tlog.log. If log uploading is enabled, once logs are uploaded to the remote server or downloaded via
the GUI, they are in the following format:
FG3K6A3406600001-tlog.1252929496.log-2017-09-29-08-03-54.zst
If you have enabled log uploading, you can choose to automatically delete the rolled log file after uploading, thereby
freeing the amount of disk space used by rolled log files. If the log upload fails, such as when the FTP server is
unavailable, the logs are uploaded during the next scheduled upload.
Log rolling and uploading can be enabled and configured using the GUI or CLI.
This pane is only available when the FortiAnalyzer features are manually enabled. For more
information, see FortiAnalyzer Features on page 37.
Go to System Settings > Advanced > Device Log Setting to configure device log settings.
Roll log file when size exceeds Enter the log file size, from 10 to 500MB. Default: 200MB.
Roll log files at scheduled time Select to roll logs daily or weekly.
l Daily: select the hour and minute value in the dropdown lists.
l Weekly: select the day, hour, and minute value in the dropdown
lists.
Upload logs using a standard file Select to upload logs and configure the following settings.
transfer protocol
User Name Enter the username used to connect to the upload server.
Remote Directory Enter the remote directory on the upload server where the log will be
uploaded.
Upload Log Files Select to upload log files when they are rolled according to settings
selected under Roll Logs, or daily at a specific hour.
Upload rolled files in Select to compress the logs before uploading. This will result in smaller
compressed file format logs and faster upload times.
Delete files after Select to remove device log files from the FortiManager system after
uploading they have been uploaded to the Upload Server.
Send the local event logs to Select to send local event logs to another FortiAnalyzer or FortiManager
FortiAnalyzer / FortiManager device.
Severity Level Select the minimum log severity level from the dropdown list. This
option is only available when Upload Option is Realtime.
Secure connection Select to use a secure connection for log transmission. This option is
only available when Reliable log transmission is selected.
Peer Certificate CN Enter the certificate common name of syslog server. Null means no
certificate CN for the syslog server.
This option is only available when Reliable log transmission is enabled.
Log rolling and uploading can be enabled and configured using the CLI. For more information, see the FortiManager CLI
Reference.
Use the following CLI commands to enable or disable log file uploads.
Use the following CLI commands to specify the size, in MB, at which a log file is rolled.
Use the following CLI commands to configure rolling logs on a set schedule, or never.
File Management
FortiManager allows you to configure automatic deletion of device log files, quarantined files, reports, and content
archive files after a set period of time.
Go to System Settings > Advanced > File Management to configure file management settings.
Device log files older than Select to enable automatic deletion of compressed log files.
Enter a value in the text field, select the time period (Days, Weeks, or Months),
and choose a time of day.
Reports older than Select to enable automatic deletion of reports of data from compressed log files.
Enter a value in the text field, select the time period, and choose a time of day.
Content archive files older Select to enable automatic deletion of IPS and DP archives from Archive logs.
than Enter a value in the text field, select the time period, and choose a time of day.
Quarantined files older than Select to enable automatic deletion of compressed log files of quarantined files.
Enter a value in the text field, select the time period, and choose a time of day.
The time period you select determines how often the item is checked. If you select Months, then the item is checked
once per month. If you select Weeks, then the item is checked once per week, and so on. For example, if you specify
Device log files older than 3 Months, then on July 1, the logs for April, May, and June are kept and the logs for March and
older are deleted.
This pane is only available when the FortiAnalyzer features are manually enabled. For more
information, see FortiAnalyzer Features on page 37.
Miscellaneous Settings
Go to System Settings > Advanced > Misc Settings to view and configure advanced settings and download WSDL files.
Configure the following settings and then select Apply:
Offline Mode Enabling Offline Mode shuts down the protocol used to communicate with
managed devices. This allows you to configure, or troubleshoot, the FortiManager
without affecting managed devices.The FortiManager cannot automatically
connect to a FortiGate if offline mode is enabled.
Download WSDL file Select the required WSDL functions then click the Download button to download
the WSDL file to your management computer.
When selecting Legacy Operations, no other options can be selected.
Web services is a standards-based, platform independent, access method for
other hardware and software APIs. The file itself defines the format of commands
the FortiManager will accept as well as the responses to expect. Using the WSDL
file, third-party or custom applications can communicate with the FortiManager
unit and operate it or retrieve information, just as an administrator can from the
GUI or CLI.
Chassis Management Enable chassis management, then enter the chassis update interval, from 4 to
1440 minutes. Default: 15 minutes.
Configuration Changes Select to either automatically accept changes (default) or to prompt the
Received from FortiGate administrator to accept the changes.
Task List Size Set a limit on the size of the task list. Default: 2000.
Allow Install Interface Policy Select to manage and install only interface based policies, instead of all device
Only and policy configuration.
Display Device/Group tree Enable to display devices and groups within a single tree menu and include Add
view in Device Manager Device and Install Wizard commands in the right-click menu.
Display Policy & Objects in Enable to display both the Policy Packages and Object Configurations tabs on a
Dual Pane single pane in the Policy & Objects module. See Feature visibility on page 335.
Use Web Proxy If the FortiManager system’s built-in FDS must connect to the FDN through a web
(HTTP or HTTPS) proxy, you can specify the IP address and port of the proxy
server.
See Enabling updates through a web proxy on page 814.
The System Settings administrator menus enable you to configure administrator accounts, access profiles, remote
authentication servers, and adjust global administrative settings for the FortiManager unit.
Administrator accounts are used to control access to the FortiManager unit. Local and remote authentication is
supported, as well as two-factor authentication. Administrator profiles define different types of administrators and the
level of access they have to the FortiManager unit, as well as its authorized devices.
If you use ServiceNow apps for FortiManager, we recommend creating an account to use for integration with the app.
This account does not need to be a Super_User account and you don't need to set trusted hosts for this account.
Global administration settings, such as the GUI language and password policies, can be configured on the Admin
Settings pane. See Global administration settings on page 1023 for more information.
In workflow mode, approval matrices can be create and managed on the Approval Matrix pane. See Workflow approval
on page 1002 for more information.
This section contains the following topics:
l Trusted hosts on page 949
l Monitoring administrators on page 950
l Disconnecting administrators on page 950
l Managing administrator accounts on page 950
l Administrator profiles on page 981
l Authentication on page 1010
l Global administration settings on page 1023
l Multi-factor authentication on page 1029
Trusted hosts
Setting trusted hosts for all of your administrators increases the security of your network by further restricting
administrative permissions. In addition to knowing the password, an administrator must connect only through the subnet
or subnets you specify. You can even restrict an administrator to a single IP address if you define only one trusted host
IP address with a netmask of 255.255.255.255.
When you set trusted hosts for all administrators, the FortiManager unit does not respond to administrative access
attempts and cannot be pinged from any other hosts. This provides the highest security. If you leave even one
administrator unrestricted, the unit accepts administrative access attempts on any interface that has administrative
access enabled, potentially exposing the unit to attempts to gain unauthorized access.
The trusted hosts you define apply to both the GUI and to the CLI when accessed through SSH. CLI access through the
console connector is not affected.
If you set trusted hosts and want to use the Console Access feature of the GUI, you must also
set 127.0.0.1/255.255.255.255 as a trusted host.
Monitoring administrators
The Admin Session List lets you view a list of administrators currently logged in to the FortiManager unit.
1. Go to Dashboard.
2. In the System Information widget, in the Current Administrators field, click the Current Session List button. The
Admin Session List opens in the widget.
The following information is available:
User Name The name of the administrator account. Your session is indicated by (current).
IP Address The IP address where the administrator is logging in from. This field also displays the
logon type (GUI, jsconsole, or SSH).
Start Time The date and time the administrator logged in.
Time Out (mins) The maximum duration of the session in minutes (1 to 480 minutes).
Disconnecting administrators
Administrators can be disconnected from the FortiManager unit from the Admin Session List.
To disconnect administrators:
1. Go to Dashboard.
2. In the System Information widget, in the Current Administrators field, click the Current Session List button. The
Admin Session List opens in the widget.
3. Select the administrator or administrators you need to disconnect.
4. Click Delete in the toolbar, or right-click and select Delete.
The selected administrators will be automatically disconnected from the FortiManager device.
Go to System Settings > Administrators to view the list of administrators and manage administrator accounts.
Only administrators with the Super_User profile can see the complete administrators list. If you do not have certain
viewing permissions, you will not see the administrator list. When ADOMs are enabled, administrators can only access
the ADOMs they have permission to access.
Create New Create a new administrator. See Creating administrators on page 952.
Edit Edit the selected administrator. See Editing administrators on page 957.
Change Password Change the selected administrator's password. This option is only available from
the right-click menu. See Editing administrators on page 957.
Profile The profile applied to the administrator. See Administrator profiles on page 981
If a profile is applied per-ADOM for the administrator, they are listed as
ADOM:profile.
JSON API Access The administrators read/write privileges for JSON API.
Comments Comments about the administrator account. This column is hidden by default.
Trusted IPv4 Hosts The IPv4 trusted host(s) associated with the administrator. See Trusted hosts on
page 949.
Trusted IPv6 Hosts The IPv6 trusted host(s) associated with the administrator. See Trusted hosts on
page 949. This column is hidden by default.
Contact Email The contact email associated with the administrator. This column is hidden by
default.
Contact Phone The contact phone number associated with the administrator. This column is
hidden by default.
FortiAI User Indicates if the user has access to use the FortiAI assistant. This feature is only
available with a valid FortiAI license. See FortiAI on page 755.
Creating administrators
To create a new administrator account, you must be logged in as a super user administrator.
You need the following information to create an account:
l Which authentication method the administrator will use to log in to the FortiManager unit. Local, remote, and Public
Key Infrastructure (PKI) authentication methods are supported.
l What administrator profile the account will be assigned, or what system privileges the account requires.
l If ADOMs are enabled, which ADOMs the administrator will require access to.
l If using trusted hosts, the trusted host addresses and network masks.
For remote or PKI authentication, the authentication must be configured before you create the
administrator. See Authentication on page 1010 for details.
3. Configure the following settings, and then click OK to create the new administrator.
User Name Enter the name of the administrator will use to log in.
Comments Optionally, enter a description of the administrator, such as their role, location,
or the reason for their account.
Admin Type Select the type of authentication the administrator will use when logging into
the FortiManager unit. One of: LOCAL, RADIUS, LDAP, TACACS+, PKI,
Group, or SSO. See Authentication on page 1010 for more information.
Server or Group Select the RADIUS server, LDAP server, TACACS+ server, or group, as
required.
The server must be configured prior to creating the new administrator.
This option is not available if the Admin Type is LOCAL or PKI.
Match all users on remote Select this option to automatically add all users from a LDAP server specified
server in Admin>Remote Authentication Server. All users specified in the
Distinguished Name field in the LDAP server will be added as FortiManager
users with the selected Admin Profile.
Select this option when the Admin Type is SSO to create one SAML SSO
wildcard admin user to match all users on the identity provider (IdP) server.
This FortiManager must be configured as a service provider (SP), added to the
IdP, and have the same user profile and ADOM names as the IdP. If this is
done, the user is assigned the same profile and ADOMs when logging in as an
SSO user on this SP. See SAML admin authentication on page 1018.
If this option is not selected, the User Name specified must exactly match the
LDAP user specified on the LDAP server.
This option is not available if the Admin Type is LOCAL or PKI.
If the Admin Type is PKI, this option is only available when Require two-factor
authentication is selected.
Force this administrator to Force the administrator to change their password the next time that they log in
change password upon next to the FortiManager.
log on. This option is only available if Password Policy is enabled in Admin Settings.
See Password policy on page 1026.
FortiToken Cloud Enable or disable multi-factor authentication with FortiToken Cloud, then
select the token delivery method from the following options:
l FortiToken Mobile: Use the FortiToken Mobile app to get tokens. The
Administrative Domain Choose the ADOMs this administrator will be able to access.
l All ADOMs: The administrator can access all the ADOMs.
l All ADOMs except specified ones: The administrator cannot access the
selected ADOMs.
l Specify: The administrator can access the selected ADOMs. Specifying
the ADOM shows the Specify Device Group to Access check box. Select
the Specify Device Group to Access check box and select the Device
Group this administrator is allowed to access. The newly created
administrator will only be able to access the devices within the Device
Group and sub-groups.
If the Admin Profile is Super_User, then this setting is All ADOMs.
This field is available only if ADOMs are enabled. See Administrative Domains
(ADOMs) on page 901.
Admin Profile Select an administrator profile from the list. The profile selected determines
the administrator’s access to the FortiManager unit’s features. See
Administrator profiles on page 981.
If the Administrative Domain is Specify, you can select Single or Per-ADOM.
l Single (default): Select one admin profile to apply for all ADOMs the
Policy Package Choose the policy packages this administrator will have access to.
l All Packages: The administrator can access all the packages.
folder. If you specify a policy package folder, the administrator can access
JSON API Access Select the permission for JSON API Access. Select Read-Write, Read, or
None. The default is None.
Web Filter Profile Select the web filter profiles that the restricted administrator will be able to edit.
This option is only available when the Admin Profile is set to a Restricted
Admin profile. Security profiles can be configured by going to Policy & Objects
> Object Configuration. See Managing objects and dynamic objects on page
453.
IPS Sensor Select the IPS profiles that the restricted administrator will be able to edit.
This option is only available when the Admin Profile is set to a Restricted
Admin profile. Security profiles can be configured by going to Policy & Objects
> Object Configuration. See Managing objects and dynamic objects on page
453.
Application Sensor Select the application control profiles that the restricted administrator will be
able to edit.
This option is only available when the Admin Profile is set to a Restricted
Admin profile. Security profiles can be configured by going to Policy & Objects
> Object Configuration. See Managing objects and dynamic objects on page
453.
Theme Mode Select Use Global Theme to apply a theme to all administrator accounts.
Select Use Own Theme to allow administrators to select their own theme.
Trusted Hosts Optionally, turn on trusted hosts, then enter their IP addresses and netmasks.
Up to ten IPv4 and ten IPv6 hosts can be added.
See Trusted hosts on page 949 for more information.
FortiAI User When FortiManager has a valid FortiAI license, you can enable this field to
enable access to the FortiAI assistant for this user.
Meta Fields Optionally, enter the new administrator's email address and phone number.
The email address is also used for workflow session approval notifications, if
enabled. See Workflow mode on page 999.
Advanced options
fingerprint Specify the user certificate fingerprint based on MD5, SHA-1, or SHA- -
256 hash function.
This option is only available if the Admin Type is PKI.
Editing administrators
To edit an administrator, you must be logged in as a super user administrator. The administrator's name cannot be
edited. An administrator's password can be changed using the right-click menu, if the password is not a wildcard.
To edit an administrator:
The current administrator's password can also be changed from the admin menu in the GUI
banner. See GUI overview on page 29 for information.
Deleting administrators
FortiManager administrator accounts can be configured to use the RPC Permit (JSON API Access) and Trusted Hosts
attributes that are defined by an administrator profile.
When an administrator has been configured to use the attributes from the profile, the attributes can no longer be
changed by editing the administrator account.
This feature can only be configured from the FortiManager CLI.
For more information, see the FortiManager CLI Reference Guide on the Fortinet Document Library.
To use RPC Permit and Trusted Host administrator attributes from a profile:
Restricted administrators
Restricted administrator accounts are used to delegate management of Web Filter, IPS, and Application Control profiles,
and then install those objects to their assigned ADOM.
Workspace mode is supported for restricted administrators. See Workspace mode for
restricted administrators on page 980.
When a restricted administrators logs in to the FortiManager, they enter the Restricted Admin Mode. This mode consists
of a simplified GUI where they can make changes to the profiles that they have access to, and then install those changes
using the Install command in the toolbar, to their designated ADOM.
1. Create an administrator profile with the Type set to Restricted Admin and the required permissions selected. See
Creating administrator profiles on page 985.
2. Create a new administrator and select the restricted administrator profile for the Admin Profile, then select the
specific ADOMs and profiles that the administrator can manage. See Creating administrators on page 952
Starting in FortiManager 7.0.3, you can select multiple ADOMs with restricted administrator
profiles when creating or editing an administrator account.
Restricted administrators can create new custom signatures for Intrusion Prevention and
Application Control.
See Intrusion prevention restricted administrator on page 964 and Application control
restricted administrator on page 977.
To create a profile:
To clone an existing profile, right-click the profile in the content pane, and select Clone.
To edit a profile:
l https-replacemsg: enable/disable
l replacemsg-group: select a group from the list
l web-filter-activex-log: enable/disable
l web-filter-command-block-log: enable/disable
l web-filter-cookie-removal-log: enable/disable
l web-filter-js-log: enable/disable
l web-filter-jscript-log: enable/disable
l web-filter-referer-log: enable/disable
l web-filter-unknown-log: enable/disable
l web-filter-vbs-log: enable/disable
l wisp: enable/disable
l wisp-algorithm: auto-learning, primary-secondary, or round-robin
Groups that can Select groups that can override blocked categories.
override
Profile can switch Select profiles that the user can switch to.
to
Switch applies to Select what the switch applies to: ask, browser, ip, user, or user-group.
Select URL filters from the dropdown list, and/or create and manage filters in the
table.
Block malicious URLs Select to block URLs that FortiSandbox deems malicious.
discovered by FortiSandbox
Web Content Filter Select to apply web content filters. Click Add to add filters to the table. Edit and
delete filters as required.
Allow Websites When a Rating Select to allow access to websites if a rating error occurs.
Error Occurs
Rate URLs by Domain and IP Select to rate URLs by both their domain and IP address.
Address
Block HTTP Redirects by Select to block HTTP redirects based on the site's rating.
Rating This option is only available if Inspection Mode is Proxy.
Rate Images by URL (Blocked Select to rate images based on the URL.
images will be replaced with This option is only available if Inspection Mode is Proxy.
blanks)
Restrict Google account Select to restrict Google account usage to specific domains. Click Add to add the
usage to specific domains domains to the table.
This option is only available if Inspection Mode is Proxy.
Provide Details for Blocked Select to receive details about blocked HTTP errors.
HTTP 4xx and 5xx Errors This option is only available if Inspection Mode is Proxy.
HTTP POST Action: Block Select to set the HTTP POST action to block.
This option is only available if Inspection Mode is Proxy.
Remove Java Applet Filter Select to remove the Java applet filter.
This option is only available if Inspection Mode is Proxy.
An Intrusion Prevention System (IPS) can be used to detect and block network-based attacks. In FortiManager, a
restricted administrator profile can be created to allow an administrator to configure IPS settings without interfering with
FortiManager's networking capabilities and functions.
Restricted administrators can create new profiles and signatures, add signatures and filters to a profile, and define the
action (Allow, Monitor, Block, Reset, Default, Quarantine) that will occur for detected signatures. They are also able to
view IPS diagnostics, FortiGuard package status, licenses and services, and create IPS templates.
Restricted administrator profiles can be used when migrating from a standalone IPS system to give the IPS administrator
granular control over what IPS profiles and signatures to deploy.
Optionally, restricted administrator profiles can be configured with permissions to install changes to managed FortiGate
devices. See Installing profiles as a restricted administrator on page 979.
For firewall administrators, read-write access to IPS related objects can be configured in each administrator profile using
the CLI. For more information, see ips-objects in Permissions on page 982.
1. Go to System Settings > Admin Profiles, and create an administrator profile with the Type set to Restricted Admin
and the permissions set as Intrusion Prevention. See Creating administrator profiles on page 985.
2. Optionally, toggle Allow to Install if you want this administrator to be able to install changes to FortiGate devices.
ADOMs.
For more information about restricted administrator profiles, see Restricted administrators
on page 959.
Intrusion prevention profiles can be used to manage IPS filters and signatures, block malicious URLs, and configure
Botnet C&C scanning.
Profiles can be installed to the FortiGate devices included in ADOMs that are assigned to the restricted administrator
account. The administrator can select which devices to install changes to, giving them the ability to test signatures and
filters on a subset of devices before installing the changes to all managed devices.
You can see where each profile in the Profile table is being used by enabling Used in the Column Settings.
Intrusion prevention profiles include the revision history of changes made to the profile. Using the revision history you
can compare two previous versions of the profile, and if needed, revert to a previous revision.
IPS Signatures and Click Create New and select the Type as either Filter or Signature to add IPS
Filters signatures and filters to the table. The table list can be filtered to simplify adding
them. You can quickly edit an existing signature or filter by double-clicking it in the
list.
Filters When creating filters, the following settings are available: Action (Allow, Monitor,
Block, Reset, Default, Quarantine), Packet Logging, Status, and Filter. Click the edit
filter icon to create a new filter.
For information on hold-time and CVE filter options, see Intrusion prevention hold-
time and CVE filtering on page 970.
Signatures When selecting signatures, the following settings are available: Action (Allow,
Monitor, Block, Reset, Default, Quarantine), Packet Logging, Status, Rate-based
Setting, Exempt IPs, and Signatures. Click Add Signature to select a new signature.
Botnet C&C Enable Botnet C&C to scan outgoing connections to botnet sites. Botnet C&C can
be set to Block, Disable, or Monitor.
Revision Enter a change note that includes details about the change made to the IPS profile.
To clone an existing profile, right-click the profile in the content pane, and select Clone.
As a restricted administrator, you can view and create IPS signatures by going to Intrusion Prevention > IP Signatures in
the FortiManager tree menu.
Configured IPS signatures can be added to an IPS profile and installed to devices.
For additional information on managing IPS signatures and viewing signature details, see
Intrusion prevention signatures on page 490 in Policy & Objects.
IPS Diagnostics are available to IPS restricted administrators in Intrusion Prevention > IPS Diagnostics. The
IPS Diagnostics page displays a list of devices in the ADOM with the following information:
CPU% (IPS) The CPU used by IPS processes as a percentage for the device.
MEM% (IPS) The memory used by IPS processes as a percentage for the device.
The hold-time option allows you to set the amount of time that signatures are held after a FortiGuard IPS signature
update per VDOM. During the holding period, the signature's mode is monitor. The new signatures are enabled after the
hold-time to avoid false positives.
The hold-time can be from 0 days and 0 hours (default) up to 7 days, in the format ##d##h.
This setting is configured for each FortiGate device and cannot be configured by restricted
administrators.
For more information on configuring hold-time, see Intrusion prevention filtering options on page 489 in Policy & Objects.
The CVE pattern option allows you to filter IPS signatures based on CVE IDs or with a CVE wildcard, ensuring that any
signatures tagged with that CVE are automatically included.
For more information on configuring CVE filters, see Intrusion prevention filtering options on page 489 in Policy
& Objects.
Intrusion prevention restricted administrators can view FortiGuard packages at Intrusion Prevention > FortiGuard
Package. IPS restricted administrators can only see IPS packages from FortiGuard.
Each FortiGuard package name includes a link to the package details on the FortiGuard website. Click on a package
name to view detailed information about the package, including the changes that happened with the latest versions.
4. (Optional) Enter the checksum value obtained when exporting the package to verify the file's integrity.
5. Click OK.
Intrusion prevention restricted administrators can view the IPS License and FortiGuard Service Status for managed
devices at Intrusion Prevention > License and Services. You can refresh the information in this pane by right clicking on a
list in the table and clicking Refresh.
The Feature Visibility dropdown in the toolbar includes settings to Show Pending Device Only and Group By ADOMs.
Restricted administrators can push pending updates for managed FortiGate units by selecting the device in the table and
clicking Push Pending.
The License and Services table includes the following information:
IPS License The status of the IPS license for the FortiGate device. Valid licenses include a
green checkmark icon and display the expiration date of the license.
FortiGuard Service Status The status of the FortiGuard service for the FortiGate device. The status includes
only IPS related objects.
IPS administrators can use IPS templates to modify and assign IPS objects to devices. Once a template has been
created, it can be assigned to a device or device group in the ADOM.
IPS templates can be created, edited, deleted and cloned.
1. Log in as an Administrator, and go to Device Manager > Provisioning Templates > IPS Templates.
Alternatively, if you are using a IPS restricted administrator profile, go to Intrusion Prevention > IPS Templates.
2. Click Create New to create a new IPS template.
The Create IPS Template wizard opens.
3. Enter a name and optional description for the template, and click OK.
The template is created and you can now edit the IPS template details.
4. Enable and configure one or more of the following IPS objects: IPS Global (global settings), System IPS (VDOM-
based), and IPS Settings (VDOM-based).
When copying the IPS template to a device VDOM, if the target is "root" or "mgmt", only
the IPS Global are coppied.
1. Log in as an Administrator, and go to Device Manager > Provisioning Templates > IPS Templates.
Alternatively, if you are using a IPS restricted administrator profile, go to Intrusion Prevention > IPS Templates.
2. Select a IPS template from the table, and click Assign to Device/Group in the toolbar.
3. In the Available Entries pane, double-click a device to add it to the Selected Entries pane, and click OK.
Restricted IPS admins can manage the IPS headers and footers and perform IPS installations in the Global Database
ADOM.
For more information, see Global Database on page 923 and Header/Footer IPS on page 924.
Database ADOM.
l When assigning IPS headers and footers, you can select the option to Automatically Install Used IPS Profiles to
ADOM Devices.
FortiManager includes IPS specific administrator profile permissions that can be used to determine an administrator's
ability to view and manage IPS objects and IPS attributes within policies.
The following IPS permissions can be applied to an administrator profile. See Administrator profiles on page 981.
Permission Description
IPS Objects Determines an administrator's ability to view and manage IPS objects.
ips-object
Policy IPS Attributes Determines the administrator's ability to manage IPS attributes (IPS and
policy-ips-attrs SSL/SSH Inspection) in Policies.
For more information on configuring administrator profile permissions, see Permissions on page 982.
1. Create a new admin profile with Read Only permissions for IPS Objects and Edit Policy IPS Attributes, and assign
the admin profile to a firewall administrator.
The firewall administrators will have the following permissions for IPS objects and attributes:
l The firewall admin can create and update Policies, but cannot set or change IPS sensors and SSH/SSL
2. Create a new restricted IPS administrator using the default IPSadmin admin profile.
The IPS administrator will have the following permissions for IPS objects and attributes:
l The IPS admin can set and change IPS sensors and SSH/SSL inspection profiles in Policies after the Firewall
Policies.
l The IPS admin can select individual IPS sensors or SSH/SSL inspection profiles to install to devices.
next
end
Application control sensors specify what action to take with network traffic generated by a large number of applications.
To create a profile:
To clone an existing profile, right-click the profile in the content pane, and select Clone.
To edit a profile:
3. In the content pane select a profile, and take one of the following actions:
l In the toolbar, click Edit.
Categories Select the action to take for each of the available categories: Allow, Monitor,
Block, Traffic Shaping, Quarantine, or Reset.
Application Overrides Click Add Signatures to add application override signatures to the table. The
signatures list can be filtered to simplify adding them.
Right-click on a signature to change the action (Allow, Monitor, Block, Traffic
Shaping, Quarantine, or Reset).
Filter Overrides Click Add Filter to add filter overrides to the table. The filters list can be
searched and filtered to simplify adding them.
Right-click on an override to change the action (Allow, Monitor, Block, Traffic
Shaping, Quarantine, or Reset).
Allow and Log DNS Traffic Select to allow and log DNS traffic.
Replacement Messages for Select to enable replacement messages for HTTP based applications.
HTTP-based Applications
Restricted administrators can install the profiles they can access to their designated devices. Administrators can also
view where a profile is used.
Restricted administrators must have Allow to Install enabled to install a profile. See Creating
administrator profiles on page 985.
To install a profile:
Use this option to install a modified profile to specified devices, such as a test environment.
5. Click Install Preview to view the CLI script that will be installed on the selected devices.
Click Download to download a copy of the install preview.
6. Click Next to begin installation to the selected device(s).
7. Click Close.
Workspace mode is supported for restricted administrators. For more information on Workspace mode, see Workspace
on page 989.
When Workspace mode is enabled on an ADOM (or all ADOMs), a lock icon appears next to the ADOM name for the
restricted administrator.
Clicking the lock icon will allow restricted administrators to create, edit, and delete profiles. Once changes have been
completed, the administrator can click the unlock icon. Clicking the lock icon as a restricted administrator does not lock
the whole ADOM, and IPS, Web Filter, and Application Control objects can still be edited by other local and restricted
administrators.
When a local administrator locks an ADOM, the entire ADOM is locked, and restricted administrators will have read-only
access permissions to the ADOM until it is unlocked. The lock icon and ADOM name is displayed in red to indicate the
ADOM is locked.
Restricted administrators with read-only access permissions will not see the lock icon when
Workspace mode is enabled.
Workflow mode is not supported for restricted administrators. See Workflow mode on page
999.
Administrator profiles
Administrator profiles are used to control administrator access privileges to devices or system features. Profiles are
assigned to administrator accounts when an administrator is created. The profile controls access to both the
FortiManager GUI and CLI.
There are the following predefined system profiles:
Restricted_User Restricted user profiles have no system privileges enabled, and have read-only
access for all device privileges.
Standard_User Standard user profiles have no system privileges enabled, and have read/write
access for all device privileges.
Super_User Super user profiles have all system and device privileges enabled. It cannot be
edited.
Package_User Package user profile have read/write policy and objects privileges enabled, and
have read-only access for system and other privileges.
Password_Change_User Password change user profiles can only change passwords using the CLI or API
and have no access to the FortiManager GUI or other features.
These profiles cannot be deleted, but standard and restricted profiles can be edited. New profiles can also be created as
required. Only super user administrators can manage administrator profiles. Package user administrators can view the
profile list.
Go to System Settings > Admin Profiles to view and manage administrator profiles.
Create New Create a new administrator profile. See Creating administrator profiles on page
985.
Edit Edit the selected profile. See Editing administrator profiles on page 988.
Clone Clone the selected profile. See Cloning administrator profiles on page 988.
Delete Delete the selected profile or profiles. See Deleting administrator profiles on page
988.
Type The profile type: System Admin, Restricted Admin, or ADOM Scoped Admin.
Description A description of the system and device access permissions allowed for the
selected profile.
Permissions
The below table lists the default permissions for the Super_User, Standard_User, Restricted_User and Package_User
administrator profiles.
When Read-Write is selected, the user can view and make changes to the FortiManager system. When Read-Only is
selected, the user can only view information. When None is selected, the user can neither view or make changes to the
FortiManager system.
The FortiView setting is only available in the GUI when FortiAnalyzer features are disabled.
The Log View/FortiView, Incidents & Events, Create & Update Incidents, Triage Event,
Reports, and Run Report settings are only available in the GUI when FortiAnalyzer features
are enabled. See FortiAnalyzer Features on page 37.
The Remote GUI Access toggle can be enabled to grant administrators with the specified Admin Profile the ability to
remotely access managed FortiGate devices. By default, this setting is enabled for the Super_User profile and is
disabled when creating a new profile. See Remotely access a managed FortiGate on page 218.
To create a new administrator profile, you must be logged in to an account with sufficient privileges, or as a super user
administrator.
Description Optionally, enter a description for this profile. While not a requirement,
a description can help to know what the profiles is for, or the levels it is
set to.
Type Select the type of profile: System Admin, Restricted Admin, or ADOM
Scoped Admin.
The ADOM Scoped Admin profile limits administrators to managing
administrators within their own ADOM. When ADOM Scoped Admin is
selected, you must set the System Settings permission to None if the
administrators should not have access to global settings.
Permissions Select None, Read Only, or Read-Write access for the categories as
required.
This option is only available when Type is System Admin.
This option is not available when Type is Restricted.
Masked Data Fields Select the fields to mask: Destination Name, Source IP, Destination IP,
User, Source Name, Email, Message, and/or Source MAC.
Data Mask Key Enter the data masking encryption key. You need the Data Mask Key
to see the original data.
Data Unmasked Time(0- Enter the number of days the user assigned to this profile can see all
365 Days) logs without masking.
The logs are masked if the time period in the Log View toolbar is
greater than the number of days in the Data Masked Time field.
To edit an administrator profile, you must be logged in to an account with sufficient privileges, or as a super user
administrator. The profile's name cannot be edited. The Super_User profile cannot be edited, and the predefined profiles
cannot be deleted.
To edit an administrator:
To clone an administrator profile, you must be logged in to an account with sufficient privileges, or as a super user
administrator.
To edit an administrator:
To delete a profile or profiles, you must be logged in to an account with sufficient privileges, or as a super user
administrator. The predefined profiles cannot be deleted.
Workspace mode enables locking ADOMs, devices, or policy packages so that an administrator can prevent other
administrators from making changes to the elements that they are working in.
In workspace mode, ADOMs, or individual devices or policy packages must be locked before policy, object, or device
changes can be made. Multiple administrators can lock devices and policy packages within a single, unlocked ADOM at
the same time. When an individual device or policy package is locked, other administrators can only lock the ADOM that
contains the locked device or policy package by disconnecting the administrator that locked it.
In workflow mode, only the entire ADOM can be locked. The ADOM must be locked before changes can be made, and a
workflow session must be started before policy changes can be made. See Workflow mode on page 999.
In both modes, the ADOM must be locked before changes can be made in AP Manager, FortiClient Manager, VPN
Manager, and FortiSwitch Manager, and some settings in System Settings.
Workspace mode can be applied per ADOM or on all ADOMS. See Enable workspace mode
on page 990.
4. Click OK. Your session ends, and the FortiManager login screen is displayed.
A green padlock icon indicates that the current administrator locked the element. A red
padlock icon indicates that another administrator locked the element.
Workspace mode
Workspace mode is used to control the creation, configuration, and installation of devices, policies, and objects. It helps
to ensure that only one administrator can make changes to an element at one time.
When workspace mode is enabled, individual devices and policy packages can be locked, as well as entire ADOMs.
When an individual device or policy package is locked, other administrators can only lock the ADOM that contains the
locked device or policy package by disconnecting the administrator that locked it and thus breaking the lock.
Devices and policy packages can only be added if the entire ADOM is locked.
Individual devices cannot be locked if ADOMs are in advanced mode (ADOM device modes
on page 904).
The entire ADOM must be locked to create a script, but the script can be run directly on a
device when only the device is locked. See Run a script on page 221.
After changing the workspace mode, your session will end, and you will be required to log back
into the FortiManager.
3. Click Apply. Your session ends, and the FortiManager login screen is displayed.
When workspace mode is enabled, Device Manager and Policy & Objects are read-only. You
must lock the ADOM, a device, or a policy package before you can make any changes.
4. Click Apply. Your session ends, and the FortiManager login screen is displayed.
5. Log in to FortiManager, and go to System Settings > ADOMs. Ensure you are in the correct ADOM.
6. Double-click an ADOM, or right-click the ADOM and select Edit. The Edit ADOM page is displayed.
7. In the Workspace Mode area, click Workspace.
8. Click OK. Your session ends, and the FortiManager login screen is displayed.
After the Per-ADOM setting is enabled, you can update the workspace setting in the GUI.
In workspace mode, an ADOM must be locked before you can make changes to it or add devices, policy packages, or
objects.
When an ADOM is locked, other administrators are unable to make changes to devices, policies, and objects in that
ADOM until you either unlock the ADOM, or log out of the FortiManager.
Policy packages and devices can also be locked individually. See Locking a device on page
994 and Locking a policy package on page 995.
Locking an ADOM automatically removes locks on devices and policy packages that you have
locked within that ADOM.
If you have unsaved changes, a confirmation dialog box will give you the option to save or
discard them.
If another administrator has locked devices or policy packages within the ADOM, you will be
given the option of forcibly disconnecting them, thus removing the locks, before you can lock
the ADOM.
All elements are unlocked when you log out of the FortiManager. If you have unsaved
changes, a confirmation dialog box will give you the option to save or discard your changes.
Locking a device
In workspace mode, a device must be locked before changes can be made to it. You can lock a device by locking the
ADOM that the device is in or by locking the individual device.
Other administrators will be unable to make changes to that device until you unlock it, log out of the FortiManager, or
they forcibly disconnect you when they are locking the ADOM that the device is in.
Individual device locks will be removed if you lock the ADOM that the device is in.
Individual devices cannot be locked if ADOMs are in advanced mode (ADOM device modes
on page 904).
To unlock a device:
All devices are unlocked when you log out of the FortiManager. If you have unsaved changes,
a confirmation dialog box will give you the option to save or discard them.
In workspace mode, a policy package must be locked before changes can be made to it. You can lock a policy package
by locking the ADOM that the policy package is in or by locking the individual policy package.
Other administrators will be unable to make changes to that policy package until you unlock it, log out of the
FortiManager, or they forcibly disconnect you when they are locking the ADOM that the package is in.
Individual device locks will be removed if you lock the ADOM that the package is in.
All policy packages are unlocked when you log out of the FortiManager. If you have unsaved
changes, a confirmation dialog box will give you the option to save or discard them.
In workspace mode, administrators can lock individual policies, except for policies used by policy blocks. You cannot
lock an individual policy when the policy is used in a policy block.
If you want to modify a policy, you don't need to lock the entire policy package. Once you lock a policy, a padlock icon
appears beside the policy. Others are now unable to modify your policy or lock the policy package where the locked
policy is in, and unable to lock the ADOM.
You cannot lock an individual policy when the policy it is used in a policy block.
If you move your cursor to the padlock icon, you can see who locked the policy and the time at
which it was locked.
To lock a policy:
A green padlock icon next to the sequence number of the policy indicates that the current
administrator locked the policy. A red padlock icon indicates that another administrator locked
the policy.
Sequence lock:
If you add two or more policies, a sequence lock appears at the top. The sequence lock ensures that the order of the
policies is managed by one administrator at any given time, other administrators see a red padlock icon at the top.
Once you save your changes, the sequence lock disappears allowing other administrators to change the order of the
policies.
If an administrator sets up a sequence lock, other administrators can neither create a new
policy nor insert a policy. They can however, edit an existing policy.
In Workspace mode, when you lock an ADOM, all objects in that ADOM are locked, and other administrators are
prevented from modifying any objects within the ADOM.
1. Lock a Policy Package or individual Policy. See Locking a policy package on page 995 and Locking an individual
policy on page 995
2. Go to Policy & Objects and locate the object you want to modify.
3. Right-click on the object in the table, and select Lock.
The object is now locked. Other administrators will see a red lock icon next to the object indicating that it cannot be
edited.
4. Complete and save your changes to the object.
5. Right-click on the object in the table, and select Unlock.
In Workspace mode, administrators can lock an individual Policy Blocks in order to perform create, edit, or delete
operations. This allows the administrator to perform these operations in Workspace Mode without needing to lock the
entire ADOM.
1. When Workspace Mode is enabled, right-click on a Policy Block, and click Lock.
2. When a Policy Block is locked, the Save button is highlighted after changes have been made to the Policy Block.
3. Click Save to save your changes.
l If the Policy Block is inserted into a Policy Package, the same user can't lock the Policy Package and the Policy
Block at the same time.
For example, the Policy Block "Policy-Block" is inserted into the package "default". The
administrator can only lock either "Policy-Block" or "default". If they attempt to lock
both, they will get the error: "Lock conflict with other types of locks".
Workflow mode is used to control the creation, configuration, and installation of policies and objects. It helps to ensure all
changes are reviewed and approved before they are applied.
When workflow mode is enabled, the ADOM must be locked and a session must be started before policy or object
changes can be made in an ADOM. Workflow approvals must be configured for an ADOM before any sessions can be
started in it.
Once the required changes have been made, the session can either be discarded and the changes deleted, or it can be
submitted for approval. The session can also be saved and continued later, but no new sessions can be created until the
saved session has been submitted or discarded.
If one approver from each approval group approves the changes, then another email message is sent, and the changes
are implemented. If any of the approvers reject the changes, then the session can be repaired and resubmitted as a new
session, or discarded. When a session is discarded, all later sessions are also discarded. After multiple sessions have
been approved, a previous session can be reverted to, undoing all the later sessions.
The changes made in a session can be viewed at any time from the session list in the ADOM by selecting View Diff. The
ADOM does not have to be locked to view the differences.
Workflow mode can be enabled per ADOM or in all ADOMs at the same time.
After changing the workspace mode, your session will end, and you will be required to log back
in to the FortiManager.
8. (Optional) from the Mail Server dropdown, select the mail server.
9. Click OK. Your session ends, and the FortiManager login screen is displayed.
When workflow mode is enabled, Device Manager and Policy & Objects become read-only.
You must lock the ADOM to create a new workflow session.
Once per-adom is enabled, you can configure the workflow setting in the GUI.
Workflow approval
Workflow approval matrices specify which users must approve or reject policy changes for each ADOM.
Up to eight approval groups can be added to an approval matrix. One user from each approval group must approve the
changes before they are accepted. An approval email will automatically be sent to each member of each approval group
when a change request is made.
Email notifications are automatically sent to each approver, as well as other administrators as required. A mail server
must be configured, see Mail Server on page 938, and each administrator must have a contact email address
configured, see Managing administrator accounts on page 950.
1. Go to System Settings > Advanced > Workspace and ensure Mode is set to Workflow (ALL ADOMs).
2. Click Create New.
Approval Group Select to add approvers to the approval group. Select the add icon to create a
new approval group. Select the delete icon to remove an approval group.
At least one approver from each group must approve the change for it to be
adopted.
Send an Email Notification to Select to add administrators to send email notifications to.
Mail Server Select the mail server from the dropdown list.
A mail server must already be configured. See Mail Server on page 938.
Administrators use workflow sessions to make changes to policies and objects. The session is then submitted for review
and approval or rejection by the administrators defined in the ADOMs workflow approval matrix.
Administrators with the appropriate permissions will be able to approve or reject any pending requests. When viewing
the session list, they can choose any pending sessions, and click the approve or reject buttons. They can also add a
comment to the response. A notification will then be sent to the administrator that submitted the session and all of the
approvers.
You cannot prevent administrators from approving their own workflow sessions.
If the session was approved, no further action is required. If the session was rejected, the administrator will need to either
repair or discard the session.
The Global Database ADOM includes the Assignment option, for assigning the global policy package to an ADOM.
Assignments can only be created and edited when a session is in progress. After a global database session is approved,
the policy package can be assigned to the configured ADOM. A new session will be created on the assigned ADOM and
automatically submitted; it must be approved for the changes to take effect.
A session can be discarded at any time before it is approved.
After multiple sessions have been submitted or approved, a previously approved session can be reverted to, undoing all
the later sessions. This creates a new session at the top of the session list that is automatically submitted for approval.
A workflow approval matrix must be configure for the ADOM to which the session applies
before a workflow session can be started. See Workflow approval on page 1002.
A workflow session must be started before changes can be made to the policies and objects. A session can be saved
and continued at a later time, discarded, or submitted for approval.
6. Enter a name for session, add a comment describing the session, then click OK to start the session. You can now
make the required changes to the policy packages and objects. See Policy & Objects on page 330.
Saved sessions
A new session cannot be started until the in-progress or saved session has either been
submitted for approval or discarded.
While currently working in a session, click Save in the toolbar. After saving the session, the ADOM will remain locked,
and you can continue to edit it.
A session diff can be viewed prior to submitting the session for approval.
1. While currently working in a session, ensure that the session has been saved. See Saved sessions on page 1004.
2. Click Sessions > View Diff. The Revisions Diff dialog box opens.
3. Select Details to view specific changes within a policy package or the policy objects.
Discarding a session
A session can be discarded at any time before it is approved. A session cannot be recovered after it is discarded.
When a session is discarded, all sessions after it in the session list will also be discarded.
Submitting a session
When all the required changes have been made, the session can be submitted for approval. A session must be open to
be submitted for approval.
When the session is submitted, email messages are sent to all of the approvers and other administrators defined in the
approval matrix (see Workflow approval on page 1002), and the ADOM is automatically unlocked.
Comments Enter a comment describing the changes that have been made in this session.
Attach configuration change Select to attach configuration change details to the email message.
details
Sessions can be approved or rejected by the members of the approval groups either directly from the email message
that is generated when the session is submitted, or from the session list. Sessions must be approved in order they were
submitted. A session that has been rejected must be repaired or discarded before the next session can be approved.
When a session is approved or rejected, new email messages are sent out.
1. If the configuration changes HTML file is attached to the email message, open the file to review the changes.
2. Select Approve this request or Reject this request to approve or reject the request. You can also Select Login
FortiManager to process this request to log in to the FortiManager and approve or reject the session from the
session list.
A web page will open showing the basic information, approval matrix, and session log for the session, highlighting if
the session was approved or rejected. A new email message will also be sent containing the same information.
When a session is rejected, it can be repaired to correct the problems with it.
Reverting a session
A session can be reverted to after other sessions have been submitted or approved. If this session is approved, it will
undo all the changes made by later sessions, though those sessions must be approved before the reverting session can
be approved. You can still revert to any of those sessions without losing their changes.
When a session is reverted, a new session is created and automatically submitted for approval.
To revert a session:
To view the session list, In Policy & Objects, go to Sessions > Session List. Different options will be available depending
on the various states of the sessions (in progress, approved, etc.). When an ADOM is unlocked, only the comments and
View Diff command are available.
Approve Approve the selected session. Enter comments in the Approve Session dialog box as
required. See Approving or rejecting a session on page 1006.
Reject Reject the selected session. Enter comments in the Reject Session dialog box as
required. A rejected session must be repaired before the next session in the list can be
approved. See Approving or rejecting a session on page 1006.
Discard Discard the selected session. If a session is discarded, all later sessions are also
discarded.
Repair Repair the selected rejected session. A new session will be created and added to the
top of the session list with the changes from the rejected session so they can be
repaired as needed. See Repairing a rejected session on page 1007.
Revert Revert back to the selected session, undoing all the changes made by later sessions. A
new session will be created, added to the top of the session list, and automatically
submitted for approval. See Reverting a session on page 1007.
View Diff View the changes that were made prior to approving or rejecting the session. Select
Details to view specific changes within a policy package.
Date Submitted The date and time the session was submitted for approval.
Approved/... The number of approval groups that have approved the session out of the number of
groups that have to approve the session. Hover the cursor over the table cell to view the
group members.
Comments The comments for the session. All the comments are shown on the right of the dialog
box for the selected session. Session approvers can also add comments to the selected
session without having to approve or reject the session.
Create New Session Select to create a new workflow session. This option is not available when a session
has been saved or is already in progress.
Continue Session in Select to continue a session that was previously saved or is already in progress. This
Progress option is only available when a session is in progress or saved.
Continue Without Select to continue without starting a new session. When a new session is not started, all
Session policy and objects are read-only.
You can optionally configure Workspace mode to include the Install and Unlock option when performing an installation.
This setting is helpful for ensuring that ADOMs do not remain locked after the administrator has completed their work.
This setting can only be configured in the CLI after workspace mode has been enabled.
Authentication
The FortiManager system supports authentication of administrators locally, remotely with RADIUS, LDAP, or TACACS+
servers, and using PKI. Remote authentication servers can also be added to authentication groups that administrators
can use for authentication.
To use PKI authentication, you must configure the authentication before you create the administrator accounts. See
Public Key Infrastructure on page 1010 for more information.
To use remote authentication servers, you must configure the appropriate server entries in the FortiManager unit for
each authentication server in your network. New LDAP remote authentication servers can be added and linked to all
ADOMs or specific ADOMs. See LDAP servers on page 1013, RADIUS servers on page 1015, TACACS+ servers on
page 1017, and Remote authentication server groups on page 1017 for more information.
Public Key Infrastructure (PKI) authentication uses X.509 certificate authentication library that takes a list of peers, peer
groups, and user groups and returns authentication successful or denied notifications. Administrators only need a valid
X.509 certificate for successful authentication; no username or password is necessary.
To use PKI authentication for an administrator, you must configure the authentication before you create the administrator
accounts. You will also need the following certificates:
l an X.509 certificate for the FortiManager administrator (administrator certificate)
l an X.509 certificate from the Certificate Authority (CA) which has signed the administrator’s certificate (CA
Certificate)
For more information on the CSR generation process, see Local certificates on page 929.
1. In Mozilla Firefox, go to Options > Advanced > Certificates > View Certificates > Import.
2. Select the file admin_fortinet.com.p12 and enter the password used in the previous step.
PKI authentication must be enabled via the FortiManager CLI with the following commands:
config system global
set clt-cert-req enable
end
When connecting to the FortiManager GUI, you must use HTTPS when using PKI certificate
authentication.
The FortiManager system supports remote authentication of administrators using LDAP, RADIUS, and TACACS+
remote servers. To use this feature, you must configure the appropriate server entries for each authentication server in
your network, see LDAP servers on page 1013, RADIUS servers on page 1015, and TACACS+ servers on page 1017
for more information.
Remote authentication servers can be added, edited, deleted, and added to authentication groups (CLI only).
Go to System Settings > Remote Authentication Server to manage remote authentication servers.
Create New Add an LDAP, RADIUS, or TACACS+ remote authentication server. See LDAP
servers on page 1013, RADIUS servers on page 1015, and TACACS+ servers on
page 1017.
Edit Edit the selected remote authentication server. See Editing remote authentication
servers on page 1012.
Delete Delete the selected remote authentication server or servers. See Deleting remote
authentication servers on page 1013.
ADOM The administrative domain(s) which are linked to the remote authentication
server.
To edit a remote authentication server, you must be logged in to an account with sufficient privileges, or as a super user
administrator. The server's name cannot be edited.
To delete a remote authentication server or servers, you must be logged in to an account with sufficient privileges, or as
a super user administrator.
LDAP servers
Lightweight Directory Access Protocol (LDAP) is an Internet protocol used to maintain authentication data that may
include departments, people, groups of people, passwords, email addresses, and printers. LDAP consists of a data-
representation scheme, a set of defined operations, and a request/response network.
If you have configured LDAP support and an administrator is required to authenticate using an LDAP server, the
FortiManager unit sends the administrator’s credentials to the LDAP server for authentication. If the LDAP server can
authenticate the administrator, they are successfully authenticated with the FortiManager unit. If the LDAP server cannot
authenticate the administrator, the FortiManager unit refuses the connection.
FortiManager.
l Apply the principle of least privilege. For the LDAP regular bind operation, do not use
credentials that provide full administrative access to the Windows server when using
credentials.
To use an LDAP server to authenticate administrators, you must configure the server before configuring the
administrator accounts that will use it.
3. Configure the following settings, and then click OK to add the LDAP server.
Server Name/IP Enter the IP address or fully qualified domain name of the LDAP server.
Port Enter the port for LDAP traffic. The default port is 389.
Common Name Identifier The common name identifier for the LDAP server. Most LDAP servers use cn.
However, some servers use other common name identifiers such as UID.
Distinguished Name The distinguished name is used to look up entries on the LDAP server.
The distinguished name reflects the hierarchy of LDAP database object
classes above the common name identifier. Clicking the query distinguished
name icon will query the LDAP server for the name and open the LDAP
Distinguished Name Query window to display the results.
Bind Type Select the type of binding for LDAP authentication: Simple, Anonymous, or
Regular.
User DN When the Bind Type is set to Regular, enter the user DN.
Password When the Bind Type is set to Regular, enter the password.
Secure Connection Select to use a secure LDAP server connection for authentication.
Certificate When Secure Connection is enabled, select the certificate from the dropdown
list.
Administrative Domain Choose the ADOMs that this server will be linked to for reporting: All ADOMs
(default), or Specify for specific ADOMs.
Advanced Options
memberof-attr Specify the value for this attribute. This value must match the attribute of the
group in LDAP Server. All users part of the LDAP group with the attribute
matching the memberof-attr will inherit the administrative permissions
specified for this group.
RADIUS servers
Remote Authentication Dial-in User (RADIUS) is a user authentication and network-usage accounting system. When
users connect to a server they type a user name and password. This information is passed to a RADIUS server, which
authenticates the user and authorizes access to the network.
You can create or edit RADIUS server entries in the server list to support authentication of administrators. When an
administrator account’s type is set to RADIUS, the FortiManager unit uses the RADIUS server to verify the administrator
password at log on. The password is not stored on the FortiManager unit.
To use a RADIUS server to authenticate administrators, you must configure the server before configuring the
administrator accounts that will use it.
3. Configure the following settings, and then click OK to add the RADIUS server.
Server Name/IP Enter the IP address or fully qualified domain name of the RADIUS server.
Port Enter the port for RADIUS traffic. The default port is 1812. Some RADIUS
servers use port 1645.
Server Secret Enter the RADIUS server secret. Click the eye icon to Show or Hide the server
secret.
Test Connectivity Click Test Connectivity to test the connectivity with the RADIUS server. Shows
success or failure.
Test User Credentials Click Test User Credentials to test the user credentials. Shows success or
failure.
Secondary Server Name/IP Enter the IP address or fully qualified domain name of the secondary RADIUS
server.
Authentication Type Select the authentication type the RADIUS server requires. If you select the
default ANY, FortiManager tries all authentication types.
Advanced Options
nas-ip Specify the IP address for the Network Attached Storage (NAS).
Terminal Access Controller Access-Control System (TACACS+) is a remote authentication protocol that provides
access control for routers, network access servers, and other network computing devices via one or more centralized
servers. It allows a client to accept a user name and password and send a query to a TACACS authentication server.
The server host determines whether to accept or deny the request and sends a response back that allows or denies
network access to the user. The default TCP port for a TACACS+ server is 49.
If you have configured TACACS+ support and an administrator is required to authenticate using a TACACS+ server, the
FortiManager unit contacts the TACACS+ server for authentication. If the TACACS+ server can authenticate the
administrator, they are successfully authenticated with the FortiManager unit. If the TACACS+ server cannot
authenticate the administrator, the connection is refused by the FortiManager unit.
To use a TACACS+ server to authenticate administrators, you must configure the server before configuring the
administrator accounts that will use it.
3. Configure the following settings, and then click OK to add the TACACS+ server.
Server Name/IP Enter the IP address or fully qualified domain name of the TACACS+ server.
Port Enter the port for TACACS+ traffic. The default port is 49.
Server Key Enter the key to access the TACACS+ server. The server key can be a
maximum of 16 characters in length.
Authentication Type Select the authentication type the TACACS+ server requires. If you select the
default ANY, FortiManager tries all authentication types.
Remote authentication server groups can be used to extend wildcard administrator access. Normally, a wildcard
administrator can only be created for a single server. If multiple servers of different types are grouped, a wildcard
administrator can be applied to all of the servers in the group.
Multiple servers of the same type can be grouped to act as backups - if one server fails, the administrator can still be
authenticated by another server in the group.
To use a server group to authenticate administrators, you must configure the group before configuring the administrator
accounts that will use it.
To delete a group:
SAML can be enabled across devices, enabling smooth movement between devices for the administrator. FortiManager
can play the role of the identity provider (IdP) or the service provider (SP) when an external identity provider is available.
Devices configured to the IdP can be accessed through the Quick Access menu which appears in the top-right corner of
the main menu. The current device is indicated with an asterisk (currently only supported between FAZ/FMG).
Logging into an SP device will redirect you to the IdP login page. By default, it is a Fortinet login page. After successful
authentication, you can access other SP devices from within the same browser without additional authentication.
The admin user must be created on both the IdP and SP, otherwise you will see an error
message stating that the admin doesn't exist.
Alternatively, you can configure the ADOM and profile names in the SP to match the IdP.
When this is done, you can create one SAML SSO wildcard admin user on the SP to match all
users on the IdP server.
When accessing FortiGate from the Quick Access menu, if FGT is set up to use the default
login page with SSO options, you must select the via Single Sign-On button to be
automatically authenticated.
IdP Prefix Copy the IdP prefix. This will be required when configuring your service
providers.
SAML Attributes SAML attributes can be added to a service provider to specify ADOM and/or
profile names.
FortiManager acting as IdP supports the following SAML attributes:
l Type: Username, Attribute: username
FortiManager service provider are signed. A valid SP certificate is required to enable this option.
l Require Assertions Signed from IdP: Enable this setting to require that all assertions received from the IdP are
signed.
5. Configure the IdP Settings:
a. Select the IdP type as Fortinet or Custom.
b. Enter the IdP Address and the Prefix that you obtained while configuring the IdP device.
c. Select the IdP certificate. If this is a first-time set up, you can import the IdP certificate that you downloaded
while configuring the IdP device.
6. Confirm that the information is correct and select Apply.
7. Repeat the steps for each FAZ/FMG that is to be set as a service provider.
The following SAML attributes are accepted by FortiManager SAML service provider.
profilename The Profile assigned to the user. If a matching profile exists on the FortiManager, it will be
assigned to the user. This attribute is optional.
Example:
<Attribute Name="profilename">
<AttributeValue>SSOPROFILE</AttributeValue>
</Attribute>
adoms The ADOM(s) to which the user will have access. Multiple ADOMs can be specified in the
SAML assertion if supported by the IdP. This attribute is optional.
Example:
<Attribute Name="adoms">
<AttributeValue>ADOM1</AttributeValue>
<AttributeValue>ADOM2</AttributeValue>
</Attribute>
You can use the following command in the CLI to verify the correct adoption of the SAML attributes by FortiManager.
diagnose system admin-session list
For example:
diagnose system admin-session list
*** entry 0 ***
session_id: 57410 (seq: 0)
username: user1
admin template: SSO
from: SSO(192.168.50.188) (type 7)
profile: SSOPROFILE
adom: adom1
session length: 3 (seconds)
When FortiManager is registered to FortiCloud, you can enable login to FortiManager using your FortiCloud
SSO account.
By default, only the FortiCloud account ID which the FortiManager is registered to can be used to log into FortiManager.
Additional SSO users can be configured as IAM users in FortiCloud. See IAM user account login on page 1022.
1. Before enabling this feature, FortiManager must be registered to FortiCloud, and a FortiCloud account must be
configured.
You can check your FortiCloud registration status in Dashboard in the License Information widget.
2. Go to System Settings > SAML SSO, and enable Allow admins to login with FortiCloud.
4. Click Login with FortiCloud. Enter your login credentials from FortiCloud and click LOGIN.
FortiCloud supports the creation of additional users called IAM users. Once created, you can use the IAM user account
to sign in to FortiManager.
1. In FortiCloud, create one or more additional IAM user accounts. See Identity and Access Management (IAM).
The IAM users must have the following portal included in their Permission Profile:
l FortiOS SSO
l Access = enabled
l Access Type = Admin
2. In FortiManager, enable Allow admins to login with FortiCloud in System Settings > SAML SSO.
3. Sign out of FortiManager, return to the FortiManager sign on page, and click Login with FortiCloud.
4. At the bottom of the FortiCloud login portal, click Sign in as IAM user.
The administration settings page provides options for configuring global settings for administrator access to the
FortiManager device. Settings include:
l Ports for HTTPS and HTTP administrative access
To improve security, you can change the default port configurations for administrative connections to the
FortiManager. When connecting to the FortiManager unit when the port has changed, the port must be included,
such as https://<ip_address>:<port>. For example, if you are connecting to the FortiManager unit using
port 8080, the URL would be https://192.168.1.99:8080. When you change to the default port number for
HTTP, HTTPS, or SSH, ensure that the port number is unique.
l Idle timeout settings
By default, the GUI disconnects administrative sessions if no activity occurs for five minutes. This prevents
someone from using the GUI if the management computer is left unattended.
l GUI language
The language the GUI uses. For best results, you should select the language used by the management computer.
Only super user administrators can access and configure the administration settings. The
settings are global and apply to all administrators of the FortiManager unit.
2. Configure the following settings as needed, then click Apply to save your changes to all administrator accounts:
Administration Settings
HTTP Port Enter the TCP port to be used for administrative HTTP access. Default: 80.
Select Redirect to HTTPS to redirect HTTP traffic to HTTPS.
HTTPS Port Enter the TCP port to be used for administrative HTTPS access. Default: 443.
Idle Timeout Enter the number of seconds an administrative connection can be idle before
the administrator must log in again, from 60 to 28800 (eight hours). See Idle
timeout on page 1027 for more information.
Idle Timeout (API) Enter the number of seconds an administrative connection to the API can be
idle before the administrator must log in again, from 1 to 28800 (eight hours).
Default: 900.
Access Remote Enter the port used to remotely connect to managed FortiGate devices. The
GUI via Port default port used is 8082.
See Remotely access a managed FortiGate on page 218.
View Settings
Language Select a language from the dropdown list. See GUI language on page 1027
for more information.
High Contrast Toggle ON to enable a high contrast dark theme in order to make the
Theme FortiManager GUI more accessible, and to aid people with visual disability in
using the FortiManager GUI.
Other Themes Select a theme for the GUI. The selected theme is not applied until you click
Apply, allowing to you to sample different themes. Default: Jade.
Password Policy Click to enable administrator password policies. See Password policy on page
1026 and Password lockout and retry attempts on page 1026 for more
information.
Minimum Length Select the minimum length for a password, from 8 to 32 characters. Default: 8.
Admin Password Select the number of days a password is valid for, after which it must be
Expires after changed.
Enforce Password Enable to set the number of unique new passwords that must be used before
History an old password can be reused, from 1 to 20.
Authorization Port If a non-default port is used for the management port of FortiManager, specify
the custom port.
You can enable and configure password policy for the FortiManager.
When a password policy is enabled, only the current password is remembered for each user in
password reuse history.
Minimum Length Specify the minimum number of characters that a password must be, from 8 to 32.
Default: 8.
Must Contain Specify the types of characters a password must contain: uppercase and lowercase
letters, numbers, and/or special characters.
Admin Password Specify the number of days a password is valid for. When the time expires, an
Expires after administrator will be prompted to enter a new password.
Enforce Password Enable to set the number of unique new passwords that must be used before an old
History password can be reused, from 1 to 20.
By default, the number password retry attempts is set to three, allowing the administrator a maximum of three attempts
at logging in to their account before they are locked out for a set amount of time (by default, 60 seconds).
The number of attempts and the default wait time before the administrator can try to enter a password again can be
customized. Both settings can be configured using the CLI.
To set the lockout threshold to one attempt and set a five minute duration before the administrator can try to log in again,
enter the following CLI commands:
config system global
set admin-lockout-duration 300
set admin-lockout-threshold 1
end
GUI language
Idle timeout
To ensure security, the idle timeout period should be short. By default, administrative sessions are disconnected if no
activity takes place for 900 seconds (15 minutes). This idle timeout is recommended to prevent anyone from using the
GUI on a PC that was logged in to the GUI and then left unattended.
There are multiple idle timeout settings, which allows you to control idle timeout for API, GUI, and SSO sessions
individually. The Idle Timeout setting controls all other idle timeout, including the idle timeout for SSH and console.
The idle timeout for SSO can only be set in the CLI using the following command:
config system admin setting
set idle_timeout_sso <integer>
end
For more information, see the FortiManager CLI Reference in the Fortinet Document Library.
When using FortiOS to create a Security Fabric connection to FortiManager, the process includes device authorization.
The authorization process uses a browser popup window that requires communication to FortiManager. Depending on
the topology, communication might fail, unless you specify the accessible management IP address and/or port of
FortiManager that the browser popup window in FortiOS can use to connect with FortiManager.
FortiOS retrieves this information from FortiManager and makes it available to the browser popup window used for the
authorization process.
Authorization Port If a non-default port is used, type the port number used for GUI access to
FortiManager.
3. Click Apply.
Administrative access to FortiManager can be controlled by a IPv4/IPv6 local-in policy. This feature can only be
configured using the FortiManager CLI.
For more information, see the FortiManager CLI Reference Guide on the Fortinet Docs Library.
Multi-factor authentication
To configure two-factor authentication for administrators with FortiAuthenticator you will need the following:
l FortiManager
l FortiAuthenticator
l FortiToken
Configuring FortiAuthenticator
On the FortiAuthenticator, you must create a local user and a RADIUS client.
Before proceeding, ensure you have configured your FortiAuthenticator, created a NAS entry
for your FortiManager, and created or imported FortiTokens.
For more information, see the RADIUS Interoperability Guide and FortiAuthenticator
Administration Guide in the Fortinet Document Library.
Enable account expiration Optionally, select to enable account expiration. For more information see the
FortiAuthenticator Administration Guide.
Password-based Leave this option selected. Select [Change Password] to change the
authentication password for this local user.
Enable account expiration Optionally, select to enable account expiration. For more information see the
FortiAuthenticator Administration Guide.
User Role
Web service Select to allow Web service, which allows the administrator to access the web
service via a REST API or by using a client application. This option is only
available when Role is Administrator.
Restrict admin Select to restrict admin login from trusted management subnets only, then
login from trusted enter the trusted subnets in the table. This option is only available when Role
management is Administrator.
subnets only
Allow LDAP Select to allow LDAP browsing. This option is only available when Role is
Browsing User.
Client name/IP Enter the IP address or Fully Qualified Domain Name (FQDN) of the
FortiManager.
Secret Enter the server secret. This value must match the FortiManager RADIUS
server setting at System Settings > Remote Authentication Server.
Apply this profile based on Select to apply the profile based on RADIUS attributes.
RADIUS attributes
Authentication method Select Enforce two-factor authentication from the list of options.
Check machine Select to check machine based authentication and apply groups based on the
authentication success or failure of the authentication.
For more information, see the FortiAuthenticator Administration Guide, available in the
Fortinet Document Library.
On the FortiManager, you need to configure the RADIUS server and create an administrator that uses the RADIUS
server for authentication.
Server Name/IP Enter the IP address or fully qualified domain name of your FortiAuthenticator.
Secondary Server Name/IP Enter the IP address or fully qualified domain name of the secondary
FortiAuthenticator, if applicable.
Authentication Type Select the authentication type the FortiAuthenticator requires. If you select the
default ANY, FortiManager tries all authentication types.
Note: RADIUS server authentication for local administrator users stored in
FortiAuthenticator requires the PAP authentication type.
sent an email to the specified address with a link to activate their token in
the FortiToken Mobile app on their mobile device. After FortiToken Mobile
app is activated, they will receive their token codes through the app.
l Country Dial Code: Select a country code for the mobile number.
l Mobile Number: Enter a valid mobile phone number for receiving SMS
messages.
FortiManager high availability (HA) provides a solution for a key requirement of critical enterprise management and
networking components: enhanced reliability. Understanding what’s required for FortiManager reliability begins with
understanding what normal FortiManager operations are and how to make sure normal operations continue if a
FortiManager unit fails.
Most of the FortiManager operations involve storing FortiManager and FortiGate configuration and related information in
the FortiManager database on the FortiManager unit hard disk. A key way to enhance reliability of FortiManager is to
protect the data in the FortiManager database from being lost if the FortiManager unit fails. This can be achieved by
dynamically backing up FortiManager database changes to one or more backup FortiManager units. Then, if the
operating FortiManager unit fails, a backup FortiManager unit can take the place of the failed unit.
FortiAnalyzer Features must be disabled on FortiManager before you can form a FortiManager HA cluster. A
FortiManager HA cluster can have a maximum of five units: one primary unit with up to four backup or secondary units.
All units in the cluster must be of the same FortiManager series. All units are visible on the network.
The primary unit and the secondary units can be in the same location or different locations. FortiManager HA supports
geographic redundancy so the primary unit and secondary units can be in different locations attached to different
networks as long as communication is possible between them (for example, on the Internet, on a WAN, or in a private
network).
Administrators connect to the primary unit GUI or CLI to perform FortiManager operations. Managed devices connect
with the primary unit for normal management operations (configuration push, auto-update, firmware upgrade, and so
on). If FortiManager is used to distribute FortiGuard updates to managed devices, managed devices can connect to the
primary FortiManager unit or one of the secondary units.
FortiManager supports manual and automatic (VRRP) failover settings. Automatic failover can be enabled by selecting
the VRRP failover mode during HA configuration. See Configuring HA options on page 1038.
When using manual failover settings, you must manually configure one of the secondary units to become the primary
unit when the primary unit fails. The new primary unit will keep its IP address. FortiManager's IP address registered on
FortiGate will be automatically changed when the new primary unit is selected.
You don't need to reboot the FortiManager device when it is promoted from a backup to the
primary unit.
FortiManager HA can be formed between all versions of the FortiManager-VM platform. For
example, you can deploy the Primary device using KVM and the secondary using VMware
ESXi. The steps to configure HA are unchanged.
When devices with different licenses are used to create an HA cluster, the license that allows
for the smallest number of managed devices is used.
All changes to the FortiManager database are saved on the primary unit, and then these changes are synchronized to
the backup units. The FortiManager configuration of the primary unit is also synchronized to the backup units, except for
the following settings:
l Hostname
l System time and NTP server
l FortiCloud
l FortiGuard database downloaded by FortiManager
l Network
l HA
l Local certificates
l SNMP
l Mail server
l Syslog server
l FortiGuard settings (FortiManager CM database also known as CMDB)
Aside from these settings, the backup units always match the primary unit. So if the primary unit fails, a backup unit can
be configured to take the place of the primary unit and continue functioning as a standalone FortiManager unit.
While the FortiManager cluster is operating, all backup units in the cluster exchange HA heartbeat packets with the
primary unit so the primary unit can verify the status of the backup units and the backup units can verify the status of the
primary unit. The HA heartbeat packets use TCP port 5199. HA heartbeat monitoring, as well as FortiManager database
and configuration synchronization takes place using the connections between the FortiManager units in the cluster. As
part of configuring the primary unit you add peer IPs and peer serial numbers of each of the backup FortiManager units in
the cluster. You also add the peer IP of the primary unit and the primary unit serial number to each of the backup units.
Depending on the peer IPs that you use, you can isolate HA traffic to specific FortiManager
interfaces and connect those interfaces together so they function as synchronization
interfaces between the FortiManager units in the cluster. Communication between the units in
the cluster must be maintained for the HA cluster to operate.
The interfaces used for HA heartbeat and synchronization communication can be connected to your network. However,
if possible you should isolate HA heartbeat and synchronization packets from your network to save bandwidth.
Manual failover
If the primary unit fails, the backup units stop receiving HA heartbeat packets from the primary unit. If one of the backup
units fails, the primary unit stops receiving HA heartbeat packets from the backup unit. In either case, the cluster is
considered down until it is reconfigured.
When the cluster goes down, the cluster units still operating send SNMP traps and write log messages to alert the
system administrator that a failure has occurred. You can also see the failure on the HA Status page.
Reconfigure the cluster by removing the failed unit from the cluster configuration. If the primary unit has failed, this
means configuring one of the backup units to be the primary unit and adding peer IPs for all of the remaining backup
units to the new primary unit configuration.
If a backup unit has failed, reconfigure the cluster by removing the peer IP of the failed backup unit from the primary unit
configuration.
Once the cluster is reconfigured, it will continue to operate as before but with fewer cluster units. If the failed unit is
restored you can reconfigure the cluster again to add the failed unit back into the cluster. In the same way you can add a
new unit to the cluster by changing the cluster configuration to add it.
When the monitored interface for the primary FortiManager is down, HA automatic failover will occur, and the secondary
FortiManager will automatically become the new primary. The Priority setting determines which device will be primary
and secondary in an HA configuration. See Configuring HA options on page 1038.
FortiManager units configured for HA start up begin sending HA heartbeat packets to their configured peer IP addresses
and also begin listening for HA heartbeat packets from their configured peer IP addresses.
When the FortiManager units receive HA heartbeat packets with a matching HA cluster ID and password from a peer IP
address, the FortiManager unit assumes the peer is functioning.
When the primary unit is receiving HA heartbeat packets from all of the configured peers or backup units, the primary unit
sets the cluster status to up. Once the cluster is up the primary unit then synchronizes its configuration to the backup
unit. This synchronization process can take a few minutes depending on the size of the FortiManager database. During
this time database and configuration changes made to the primary unit are not synchronized to the backup units. Once
synchronization is complete, if changes were made during synchronization, they are re-synchronized to the backup
units.
Most of the primary unit configuration, as well as the entire FortiManager database, are synchronized to the backup unit.
For settings that are not synchronized, you must configure the settings on each cluster unit. For a list of settings not
synchronized, see Synchronizing the FortiManager configuration and HA heartbeat on page 1037.
Once the synchronization is complete, the FortiManager HA cluster begins normal operation.
Configuring HA options
To configure HA options go to System Settings > HA. Use the Cluster Settings pane to configure FortiManager units to
create an HA cluster or change cluster configuration.
To configure a cluster, set the Operation Mode of the primary unit to Primary and the modes of the backup units to
Secondary. Then add the IP addresses and serial numbers of each backup unit to primary unit peer list. The IP address
and serial number of the primary unit must be added to each backup unit's HA configuration. The primary unit and all
backup units must have the same Cluster ID and Group Password.
You can connect to the primary unit GUI to work with FortiManager. Using configuration synchronization, you can
configure and work with the cluster in the same way as you work with a standalone FortiManager unit.
If the FortiManager HA is behind a NAT device while using Manual Failover Mode, you must
configure the FortiManager management address for the Primary and Secondary device. By
configuring the management address setting, FortiManager knows the public IP for Primary
and Secondary devices, and can configure it on FortiGate. See Configuring the management
address on page 112.
This is not required when using VRRP Failover Mode.
Cluster Status Monitor FortiManager HA status. See Monitoring HA status on page 1051.
Cluster Settings
Failover Mode Select Manual to configure manual failover. When the primary unit fails, you must
manually configure one of the secondary units to become the primary unit. The
new primary unit will keep its IP address. FortiManager's IP address registered on
FortiGate will be automatically changed when the new primary unit is selected.
Select VRRP to configure automatic failover. When the monitored interface for the
primary FortiManager is unreachable or down, HA automatic failover will occur,
and the secondary FortiManager will automatically become the primary.
Operation Mode Select Primary to configure the FortiManager unit to be the primary unit in a
cluster.
Select Secondary to configure the FortiManager unit to be a backup unit in a
cluster.
Select Standalone to stop operating in HA mode.
Peer IP Select the peer IP version from the dropdown list, either IPv4 or IPv6. Then, type
the IP address of another FortiManager unit in the cluster. For the primary unit you
can add up to four Peer IP addresses for up to four backup units. For a backup
unit you can only add the IP address of the primary unit.
Type the IP address of another FortiManager unit in the cluster. For the primary
unit you can add up to four Peer IP addresses for up to four backup units. For a
backup unit you can only add the IP address of the primary unit.
Peer SN Type the serial number of the FortiManager unit corresponding to the entered IP
address.
Cluster ID A number between 1 and 64 that identifies the HA cluster. All members of the HA
cluster must have the same cluster ID. If you have more than one FortiManager
HA cluster on the same network, each HA cluster must have a different cluster ID.
The FortiManager GUI browser window title changes to include the cluster ID
when FortiManager unit is operating in HA mode.
Group Password A password for the HA cluster. All members of the HA cluster must have the same
password.
If you have more than one FortiManager HA cluster on the same network, each
HA cluster must have a different password. The maximum password length is 19
characters.
File Quota Enter the file quota, from 2048 to 20480 MB (default: 4096 MB).
You cannot configure the file quota for backup units.
Heart Beat Interval The time the primary unit waits between sending heartbeat packets, in seconds.
The heartbeat interval is also the amount of time that backup units waits before
expecting to receive a heartbeat packet from the primary unit.
The default heartbeat interval is 5 seconds. The heartbeat interval range is 1 to
255 seconds. You cannot configure the heartbeat interval on the backup units.
Failover Threshold The number of heartbeat intervals that one of the cluster units waits to receive HA
heartbeat packets from other cluster units before assuming that the other cluster
units have failed. The default failover threshold is 3. The failover threshold range
is 1 to 255. You cannot configure the failover threshold of the backup units.
In most cases you do not have to change the heartbeat interval or failover
threshold. The default settings mean that if the a unit fails, the failure is detected
after 3 x 5 or 15 seconds; resulting in a failure detection time of 15 seconds.
If the failure detection time is too short, the HA cluster may detect a failure when
none has occurred. For example, if the primary unit is very busy it may not
respond to HA heartbeat packets in time. In this situation, the backup unit may
assume the primary unit has failed when the primary unit is actually just busy.
Increase the failure detection time to prevent the backup unit from detecting a
failure when none has occurred.
If the failure detection time is too long, administrators will be delayed in learning
that the cluster has failed. In most cases, a relatively long failure detection time
will not have a major effect on operations. But if the failure detection time is too
long for your network conditions, then you can reduce the heartbeat interval or
failover threshold.
Priority Set the priority for this device between 1 (lowest) and 253 (highest). The device
with a higher priority will operate as the primary unit when possible.
This setting can only be configured when the Failover Mode is VRRP.
Unicast Optionally, toggle this setting ON to use Unicast for the VRRP message.
This setting can only be configured when the Failover Mode is VRRP.
Monitored IP Configure the monitored IP and interface. You can add additional monitored IPs
by clicking the add icon.
This setting can only be configured when the Failover Mode is VRRP.
Download Debug Select to download the HA debug log file to the management computer.
Log
Use the following procedures to configure the FortiManager units for HA operation from the FortiManager unit GUI. It
assumes you are starting with three FortiManager units with factory default configurations. The primary unit and the first
backup unit are connected to the same network. The second backup unit is connected to a remote network and
communicates with the primary unit over the Internet. Sample configuration settings are also shown.
Peer IP 172.20.120.23
Peer SN <serial_number>
Peer IP 192.268.34.23
Peer SN <serial_number>
Cluster ID 15
4. Click Apply.
Peer IP 172.20.120.45
Peer SN <serial_number>
Cluster ID 15
4. Click Apply.
Peer IP 192.168.20.23
Peer SN <serial_number>
Cluster ID 15
4. Click Apply.
To change the network configuration so that the remote backup unit and the primary unit can
communicate with each other:
Configure the appropriate firewalls or routers to allow HA heartbeat and synchronization traffic to pass between the
primary unit and the remote backup unit using the peer IPs added to the primary unit and remote backup unit
configurations.
HA traffic uses TCP port 5199.
In the following scenario, HA with VRRP failover is configured for two FortiManager devices in different geographic areas
for geo-redundancy using Layer 3.
In this example, FortiManager-A is on the 198.51.100.0/24 subnet and FortiManager-B is on the 203.0.113.0/24
subnet.
VIP Enter the VIP address for the cluster (example, 192.0.2.1).
This is a dummy IP and will not be used for deployment or management.
The VIP IP MUST be identical in all peers.
Priority 200
Unicast On.
In Geo-HA it is mandatory to use Unicast as peers will not be in the same
Layer2.
VIP Enter the VIP address for the cluster (example, 192.0.2.1).
This is a dummy IP and will not be used for deployment or management.
The VIP IP MUST be identical in all peers.
Priority 100
Unicast On.
In Geo-HA it is mandatory to use Unicast as peers will not be in the same
Layer2.
Command Description
get system ha-status Print the HA status.
diagnose ha stats Diagnose the HA status.
diagnose sniffer packet Perform a packet sniffer on the port used by the VRRP protocol using "vrrp" as
<interface> "vrrp" a filter.
This command can be used to verify that the advertisements are sent using
the preferred method when Unicast mode is disabled/enabled.
In this scenario, FortiManager is using 2 IP addresses (198.51.100.1 and 203.0.113.1) to manage FortiGates. It is
a best practice to define all FortiManager IPs that will be used to manage FortiGates so that it is reflected in the FortiGate
config system central-management settings if FortiGate is added from FortiManager.
l Using the FortiManager CLI, you can run the following configuration:
config system admin setting
set mgmt-fqdn <FQDN_1 | IP_1> <FQDN_2 | IP_2> ... <FQDN_N | IP_N>
end
1. On FortiManager-A, go to Device Manager > Device & Groups > Managed FortiGate.
2. Click Add Device > Discover Device.
3. Enable Use Legacy Device Login and enter the device IP Address, User Name, and Password.
4. Click Next, Next, and Import Later.
5. Run the show system central-management command in the FortiGate CLI to check the management
IP addresses:
show system central-management
config system central-management
set type fortimanager
set fmg "198.51.100.1" "203.0.113.1"
end
The IP addresses shown should reflect the IP addresses and FQDNs configured in FortiManager under config
system admin setting as explained in the previous section.
In the following scenario, HA with VRRP failover is configured for two FortiManager devices in different geographic areas
for geo-redundancy using Layer 3.
In this example, FortiManager-A is on the 192.0.2.160/28 subnet and FortiManager-B is on the 192.0.2.176/28
subnet. FortiManager-A has a static NAT to public IP 198.51.100.1, and FortiManager-B has static NAT to public
IP 203.0.113.1.
The internal FortiGates have internal routing to both FortiManagers using the private IPs 192.0.2.161 and
192.0.2.117 for FortiManager-A and FortiManager-B respectively. External FortiGates can reach the public IPs
198.51.100.1 and 203.0.113.1 for FortiManager-A and FortiManager-B respectively.
VIP Enter the VIP address for the cluster (example, 192.0.2.1).
This is a dummy IP and will not be used for deployment or management.
The VIP MUST be identical in all peers.
Priority 200
Unicast On.
In Geo-HA it is mandatory to use Unicast as peers will not be in the same
Layer2.
VIP Enter the VIP address for the cluster (example, 192.0.2.1).
This is a dummy IP and will not be used for deployment or management.
The VIP MUST be identical in all peers.
Priority 100
Unicast On.
In Geo-HA it is mandatory to use Unicast as peers will not be in the same
Layer2.
Command Description
get system ha-status Print the HA status.
diagnose ha stats Diagnose the HA status.
diagnose sniffer packet Perform a packet sniffer on the port used by the VRRP protocol using "vrrp" as
<interface> "vrrp" a filter.
This command can be used to verify that the advertisements are sent using
the preferred method when Unicast mode is disabled/enabled.
Depending on the scenario, FortiManager can be using either 2 or 4 IP addresses (192.0.2.161 and 192.0.2.177
for internal FortiGates and 198.51.100.1 and 203.0.133.1 for external FortiGates). It is a best practice to define all
FortiManager IPs that will be used to manage FortiGates so that it is reflected in the FortiGate config system
central-management settings if FortiGate is added from FortiManager.
l Using the FortiManager CLI, you can run the following configuration:
config system admin setting
set mgmt-fqdn <FQDN_1 | IP_1> <FQDN_2 | IP_2> ... <FQDN_N | IP_N>
end
1. On FortiManager-A, go to Device Manager > Device & Groups > Managed FortiGate.
2. Click Add Device > Discover Device.
3. Enable Use Legacy Device Login and enter the device IP Address, User Name, and Password.
4. Click Next, Next, and Import Later.
5. Run the show system central-management command in the FortiGate CLI to check the management
IP addresses:
show system central-management
config system central-management
set type fortimanager
set fmg "192.0.2.161" "192.0.2.177" "198.51.100.1" "203.0.113.1"
end
The IP addresses shown should reflect the IP addresses and FQDNs configured in FortiManager under config
system admin setting as explained in the previous section.
In case of failover, FortiGate will try to reach out to all IP addresses configured under system
central management and only the Primary FortiManager will respond.
Monitoring HA status
Go to System Settings > HA to monitor the status of the FortiManager units in an HA cluster. The FortiManager HA
status pane displays information about the role of each cluster unit, the HA status of the cluster, and the HA configuration
of the cluster.
The FortiManager GUI browser window title changes to indicate that the FortiManager unit is
operating in HA mode. The following text is added to the title HA (Group ID: <group_id>).
Where <group_id> is the HA Group ID.
You can use the CLI command get system ha to display the same HA status information.
Cluster Status The cluster status can be Up if this unit is received HA heartbeat packets from all
of its configured peers. The cluster status will be Down if the cluster unit is not
receiving HA heartbeat packets from one or more of its configured peers.
Mode The role of the FortiManager unit in the cluster. The role can be:
l Primary: for the primary unit.
l Secondary: for the backup units.
Module Data Synchronized The amount of data synchronized between this cluster unit and other cluster units.
Pending Module Data The amount of data waiting to be synchronized between this cluster unit and other
cluster units.
For information on upgrading the FortiManager firmware for an operating cluster, see the FortiManager Upgrade Guide
on the Fortinet Docs Library.
Management Extensions
The Management Extensions pane allows you to enable licensed applications that are released and signed by Fortinet.
The applications are installed and run on FortiManager.
The Management Extensions pane is only displayed in the GUI after at least one management
extension application (MEA) is enabled and running on FortiManager.
You must enable your first MEA using the CLI; subsequent MEAs can be enabled using
the GUI.
A number of management extension applications (MEAs) are available. The following table identifies the available
applications and any ADOM requirements needed to access the application:
FortiAIOps MEA
FortiAIOps management extension application (MEA) aims at diagnosing and troubleshooting network issues by
analyzing potential problems and suggesting remedial steps based on the Artificial Intelligence (AI) and Machine
Learning (ML) architecture that it is built upon. FortiAIOps learns from your network data to report statistics on a
comprehensive and simple dashboard, providing network visibility and deep insight into your network. Thus, enabling
you to effectively manage your connected devices and resolve network issues swiftly with the help of AI/ML.
FortiAIOps MEA is hosted on FortiManager.
FortiAIOps MEA cannot be used when FortiAnalyzer Features are enabled. You must first
disable FortiAnalyzer Features on FortiManager before using FortiAIOps MEA.
For details about using FortiAIOps MEA, see the FortiAIOps MEA User Guide on the Document Library.
FortiSigConverter MEA
FortiSigConverter management extension application (MEA) imports Snort rules directly into FortiManager and converts
them to Fortinet supported IPS signatures. Snort is a popular open source Network Intrusion Detection System (NIDS).
For details about using FortiSigConverter MEA, see the FortiSigConverter MEA Administration Guide on the Document
Library.
When FortiSigConverter is enabled, you can import Snort signature files and convert them into IPS signatures. After the
signature files are converted, you can use the application to select rules you want to push to FortiManager. To view the
signatures in FortiManager, go to Policy & Objects > Object Configurations.
FortiSOAR MEA
You can enable the Fortinet Security Orchestration, Automation, and Response (FortiSOAR) management extension
application (MEA) on FortiManager, and use it to manage the entire lifecycle of a threat or breach within your
organization. For details about using FortiSOAR MEA, see the FortiSOAR MEA Administration Guide on the Document
Library.
FortiWLM MEA
You can use FortiWLM management extension application (MEA) to monitor, operate, and administer wireless networks
on FortiGates that are managed by FortiManager. For details about using FortiWLM MEA, see the FortiWLM
MEA Administration Guide on the Document Library.
When FortiWLM is enabled, the FortiManager configuration backup includes the configuration for FortiWLM too. See
Backing up the system on page 65.
When FortiWLM is enabled, you can use it to monitor your wireless network. You must configure the wireless network by
using the Device Manager and AP Manager modules of FortiManager.
Policy Analyzer management extension application (MEA) is used to learn about FortiGate traffic from logs, and present
you with several policy options, based on the needs of the analyzed traffic. You can choose a policy option, and Policy
Analyzer MEA adds a policy block to the policy, and triggers installation of the updated policy package to FortiGate.
In order to use Policy Analyzer MEA, you must have the following products:
l FortiGate running FortiOS 7.0.2
l FortiAnalyzer 7.0.2
l FortiManager 7.0.2
l ADOM version 7.0
l FortiManager must be able to communicate with FortiAnalyzer by its IP address, and the FortiManager
administrator requires valid FortiAnalyzer credentials to authorize access to the logs.
For details about configuring devices for Policy Analyzer MEA and using Policy Analyzer MEA, see the Policy Analyzer
1.0.0 Administration Guide on the Document Library.
Universal Connector management extension application (MEA) lets you configure fabric connectors to external
applications, such as Guardicore Centra. Fabric connectors let you retrieve information from external applications to
FortiManager, and use the information in FortiManager to create objects for use in policies that are installed to
FortiGates.
FortiManager hosts Universal Connector, and Universal Connector hosts fabric connectors to external applications.
For details about using Universal Connector MEA, see the Universal Connector 1.0.0 Administration Guide on the
Document Library.
FortiManager provides access to applications that are released and signed by Fortinet.
1. Go to Management Extensions.
l The first MEA used on FortiManager must be enabled using the CLI. After it is enabled and running, the
Management Extensions pane is displayed in the GUI and subsequent MEAs can be enabled in the GUI
following the steps below. For instructions on enabling your first MEA, see CLI for management extensions on
page 1056.
l Some management applications are only available in the root ADOM or in specific ADOM versions.
3. Click OK in the dialog that appears. It might take some time to install the application.
You can use the CLI console to enable, disable, update, debug, and check the management extension.
l The CLI commands allow you to set the resource limit globally for all management
extension applications.
l If management extension applications reach the limit of allocated FortiManager resource,
a warning appears in the Alert Message Console widget.
See also Checking for new versions and upgrading on page 1057.
Event logs generated by a management extension are available in the local event log of FortiManager. They are
displayed in the following locations:
l Dasboard > Alert Message Console widget
l System Settings > Event log pane
1. Go to System Settings > Event Log to view the local log list.
The recently generated management extension local logs are displayed in the Event Log pane.
You can check whether a new version of an enabled management extension application is available on the Fortinet
registry by using the CLI.
When the latest version of an enabled management extension application is running on FortiManager, the version is
reported as (up to date). When a new image is available on the Fortinet registry for an enabled management
extension application, the output displays (new image available).
In the example below, FortiSOAR MEA is enabled and a new version is available for installation. You can upgrade
FortiSOAR MEA by using the CLI.
This section identifies the request for comment (RFC) notes supported by FortiManager.
RFC 2548
Description:
Category:
Informational
Webpage:
http://tools.ietf.org/html/rfc2548
RFC 3414
Description:
User-Based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3).
Category:
Standards Track
Webpage:
http://tools.ietf.org/html/rfc3414
RFC 2665
Description:
Category:
Standards Track
Webpage:
http://tools.ietf.org/html/rfc2665
RFC 1213
Description:
Category:
FortiManager (SNMP)
Webpage:
http://tools.ietf.org/html/rfc1213
Notes
RFC support for SNMP v3 includes Architecture for SNMP Frameworks (as described in RFC 3411). Generic
Fortinet traps : ColdStart, WarmStart, LinkUp, LinkDown (as described in RFC 1215).
When migrating a FortiManager to a new license type, the serial number associated with the FortiManager is also
changed. This impacts the FGFM (FortiGate to FortiManager) tunnel that exists between FortiManager and its managed
FortiGate devices.
Depending on how the FortiGate was initially added to the FortiManager (through the FortiManager or through the
FortiGate), you may need to manually update the username and password of FortiGate devices in the FortiManager
database before the FGFM tunnel can be re-established.
Follow the steps below to re-establish the FGFM connection with managed FortiGate devices.
l FGFM connection established through FortiManager on page 1061
l FGFM connection established through FortiGate on page 1061
If the device was added from the FortiManager using the Add Device wizard, after the migration the FortiManager will
automatically have the correct device's username and password and the FGFM tunnel can be immediately re-
established.
1. In the FortiManager CLI, execute the following to bring the tunnel up:
execute fgfm reclaim-dev-tunnel
If the FGFM tunnel was initialized through the FortiGate, and FortiManager was used to promote (authorize) the device,
the FortiManager may not have the device's administrator username and password. You can configure the credentials
required for the FGFM tunnel through the FortiManager GUI, CLI, or through the FortiGate CLI. See Step 1: Configure
the FGFM credentials on page 1062
After updating the FGFM credentials, perform the execute fgfm reclaim-dev-tunnel command to bring the
tunnel up. See Step 2: Re-establish the FGFM tunnel on page 1063.
4. Click OK.
5. Repeat this process for each FortiGate that needs to be updated.
To re-establish the FGFM tunnel after the FGFM credentials are updated:
1. Enter the following command in the FortiManager CLI to re-establish the FGFM tunnel:
execute fgfm reclaim-dev-tunnel
Documentation for the Fortinet FortiManager Ansible Collection is available through the link below.
l FortiManager Ansible Collection documentation
The monthly token allocation for the FortiAI license varies by FortiManager platform.
For information about FortiAI tokens, see FortiAI tokens on page 759.
FC1-10-FMGVS-1118-01-DD 63998
FC1-10-M3004-1118-02-DD 251698
FC2-10-M3004-1118-02-DD 2013576
FC3-10-M3004-1118-02-DD 6292426
FC4-10-M3004-1118-02-DD 17870488
FC5-10-M3004-1118-02-DD 63175950
FC6-10-M3004-1118-02-DD 126100204
FC7-10-M3004-1118-02-DD 139971226
Copyright© 2024 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s Chief Legal Officer, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.