FortiManager 6.4 New Features Guide
FortiManager 6.4 New Features Guide
FortiManager 6.4 New Features Guide
Version 6.4.0
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
NSE INSTITUTE
https://training.fortinet.com
FORTIGUARD CENTER
https://www.fortiguard.com
FEEDBACK
Email: techdoc@fortinet.com
Change Log 5
FortiManager 6.4 New Features Guide 7
Security-driven Networking 8
NGFW 8
Restricted IPS Admin Profile 8
Extended SSL and certificate support in ssl-ssh-profile 10
SD-WAN 14
Backup and restore FortiManager settings including SD-WAN Orchestrator
configuration 14
New SD-WAN zone with support for virtual-wan-link and FortiOS 6.4.1 15
Interface widget added to system templates 6.4.2 22
Zero Trust Network Access 30
Per policy lock 30
Fabric Management Platform 35
Automation and connectors 35
SDN connector to VMware vCenter 35
Support multiple fabric connectors to Aruba ClearPass in the same ADOM 40
Support multiple VMware NSX-T connectors in the same ADOM 43
FortiManager firmware upgrade from FortiGuard servers 44
SDN connector for Cisco ACI northbound API integration 6.4.2 46
IMDSv2 support for FortiManager-VM on OCI 6.4.4 50
Single pane 51
Prompt admin to register FortiManager with FortiCloud 52
FortiManager support for FortiAnalyzer HA 58
Enable management extensions in FortiManager 59
Licenses for management extension applications 61
Online update and verification for third-party certificates (OCSP stapling) 64
Model device auto-link feature enhancements 65
Interface-based shaping profiles and monitoring 67
Multiple device selection and consolidated install preview for policy package
installation 74
FortiManager detects an unauthorized FortiAP connected to a managed FortiGate 78
Enforce firmware version when on-boarding a new FortiAP 80
Enforce firmware version when on-boarding a new FortiSwitch 82
Backup and restore FortiManager settings include Wireless Manager configuration 84
Central SD-WAN, FortiAP, and FortiSwitch templates included in ADOM revision 86
FortiManager support for FortiGate-7000E and FortiCarrier-7000E families 88
Spectrum analysis for managed APs 6.4.1 90
FortiSwitch GUI enhancements 6.4.1 93
Upgrading ADOMs managing devices running FortiOS 6.4 6.4.1 99
Interface normalization policy 6.4.1 100
Adding a FortiGate HA cluster when adding a model device 6.4.1 106
Updated Security Rating Report 6.4.1 108
ADOM locking for FortiGates with multiple VDOMs used in multiple ADOMs 6.4.1 111
2021-01-14 Added Liveness detection support for VMware NSX-T service 6.4.4 on page 183.
2021-02-10 Added FortiExtender 6.4.2 dataplan and two modems support for FortiManager 6.4.4 on
page 184 and FortiSwitch Manager device monitoring usability improvements 6.4.4 on
page 181.
2020-10-26 Added Workspace Mode can be set per-ADOM 6.4.3 on page 158.
Added Policy Hit Count on unused policy 6.4.3 on page 194.
2020-08-10 Added SDN connector for Cisco ACI northbound API integration 6.4.2 on page 46.
2020-08-31 Added IPS signature activation filter: hold-time and CVE pattern 6.4.2 on page 129.
2020-09-10 Added Display RSSI signal information and connection status for a managed
FortiExtender 6.4.2 on page 132.
2020-07-20 Added ADOM locking for FortiGates with multiple VDOMs used in multiple ADOMs 6.4.1
on page 111.
2020-04-23 Added Central SD-WAN, FortiAP, and FortiSwitch templates included in ADOM revision
on page 86.
2021-05-05 Updated Policy Hit Count on unused policy 6.4.3 on page 194.
2021-06-30 Updated New management extension - FortiPortal added to FortiManager 6.4.4 on page
165.
This document describes the new features added to FortiManager 6.4. The FortiManager new features are organized
into the following categories:
l Security-driven Networking on page 8
l Zero Trust Network Access on page 30
l Fabric Management Platform on page 35
l Other on page 194
This section lists the new features added to FortiManager for Security-driven Networking.
List of new features:
NGFW
This section lists the new features added to FortiManager for Next Generation Firewall (NGFW).
List of new features:
l Restricted IPS Admin Profile on page 8
l Extended SSL and certificate support in ssl-ssh-profile on page 10
The restricted IPS admin profile feature helps customers who are transitioning from dedicated IPS solutions to Fortinet
products. This feature provides replacement functions for IPS administrations.
1. Go to System Settings. In the tree menu, select Profile. Click Create New to create an admin profile with its type as
Restricted Admin.
2. Now, select the admin profile and click Edit from the toolbar. Alternatively, you can double-click on the admin profile
to edit.
The Edit Profile pane is displayed.
Toggle ON/OFF Allow to Install to enable or disable "Install" permission for the restricted admin. Click OK.
By default, Allow to Install is ON. When it is OFF, IPS admin can only make IPS config
changes and has no permission to push config changes down to FortiGate.
3. In the tree menu, select Administrators. Click Create New from the toolbar to create an administrator.
4. Select the administrator and click Edit from the toolbar. Alternatively, you can double-click on the administrator to
edit.
The Edit Administrator pane opens.
5. In the Edit Administrator window, select profiles for permissions and click OK.
6. Log in with your IPS admin credentials. Go to Intrusion prevention > Profiles and Custom Signatures.
IPS admin is able to create, edit, or delete IPS profiles and custom signatures.
7. Select a profile and right-click, select either Install or Where Used.
Where used dialog shows where the selected profile is being used. Click Close.
Select Install to select target devices. This copies the profile to the device db, and then installs it to the selected
device. Click OK.
1. Go to Device Manager > Device & Groups, and display the dashboard for a device.
a. In the tree menu, select the device group, for example, Managed Devices.
The list of devices display in the content pane and in the bottom tree menu.
b. In the bottom tree menu, select a device.
The System: Dashboard for the device displays in the content pane.
2. If the CLI Configurations menu is hidden, click Display Options, and select CLI Configurations.
The CLI Configurations menu is displayed.
3. In the search box, type ssl-ssh-profile, and then select the profile.
The firewall > ssl-ssh-profile is displayed.
The changes are installed to the FortiGate. You can view the changes on the FortiGate unit by using the CLI.
next
end
SD-WAN
This section lists the new features added to FortiManager for SD-WAN.
List of new features:
l Backup and restore FortiManager settings including SD-WAN Orchestrator configuration on page 14
l New SD-WAN zone with support for virtual-wan-link and FortiOS 6.4.1 on page 15
l Interface widget added to system templates 6.4.2 on page 22
FortiManager has a backup and restore option in System Settings pane. If the customer has enabled the SD-WAN
Orchestrator docker (one of the tiles under the Management Extensions modules), which is a separate application
running on FortiManager, the FortiManager backup includes the configuration for SD-WAN Orchestrator too.
The Managed Devices pane shows the configuration status of the devices.
2. In the Backup System dialog box, select the Enable checkbox to enable encryption and enter/ confirm your
password.
Click OK.
After restoring the backup file, SD-WAN Orchestrator can show the previously configured data.
1. To backup settings:
execute backup all-settings ftp <ip:port> Path/filename <username> <password>
2. To restore settings:
execute restore all-settings ftp <ip:port> Path/filename <username> <password>
New SD-WAN zone with support for virtual-wan-link and FortiOS - 6.4.1
FortiManager 6.4.1 and later supports SD-WAN zones and the virtual-wan-link option available in FortiOS 6.4.1
and later. Each SD-WAN interface member is assigned to a zone. The default zone is named virtual-wan-link.
With the implementation of SD-WAN zones, you can no longer select SD-WAN interface members in policies. Instead
you must select zones in policies.
When central management is enabled for SD-WAN in FortiManager, a normalized interface is automatically created
when you create an SD-WAN zone.
When you import an SD-WAN zone to FortiManager, FortiManager automatically creates a normalized interface and
adds per-device mappings.
This topic includes the following sections:
l Per-device management on page 16
l Central management on page 18
l Zones and interface members on page 20
l Zones in firewall policies on page 21
l SD-WAN interface members after upgrade on page 21
Per-device management
When per-device management is enabled in FortiManager, the default SD-WAN zone is named virtual-wan-link.
To create an SD-WAN zone:
6. Click OK.
The interface is added to the zone.
Central management
When central management is enabled, the default SD-WAN zone is named virtual-wan-link.
1. In an ADOM with central management enabled, go to Device Manager > SD-WAN > SD-WAN Templates.
The templates are displayed in the content screen.
You can select SD-WAN zones as source and destination interfaces in firewall policies. You cannot select interface
members of SD-WAN zones in firewall policies.
The SD-WAN interface (virtual-wan-link) used in policies is replaced by SD-WAN zones.
Before FortiManager 6.4.1, you could use SD-WAN interface members directly in a policy. After upgrading to
FortiManager 6.4.1, SD-WAN interface members are automatically upgraded to zones. Upgraded SD-WAN members
are named upg-zone-<interface-name>, and they replace interfaces in policies.
System templates now include an Interface widget. The Interface widget is useful when you want to perform the following
actions:
l Create a VLAN interface on top of a physical interface for a large number of FortiGate devices
l Create LAG interfaces
l Configure interface settings such as an IP and DHCP subnet range on a LAN interface
l Create a zone
When you create interface settings for a system template, you can specify which settings can be overridden on each
device after the system template is applied. You can also access a preview of the actions per model and device.
In the DNS widget, you can also specify which settings can be overridden.
This topic contains the following sections:
l Creating system templates with interface actions on page 23
l Accessing a post action preview of interface actions on page 24
l Allowing system template setting overrides on page 26
l Overriding system template settings on page 27
You can now create system templates with interface actions by using the Interface widget.
b. Beside Create From, choose whether to create the template from a Blank Template, Default Template, or
Clone a Template.
c. In the Name box type a name for the template, and click OK.
The system template is created.
3. Double-click the system template to open it for editing.
4. From the Toggle Widgets list, select Interface.
The Interface widget is displayed.
After you create an interface action, you can view a preview of the interface action per model or device.
In the following example, the selected platform does not have the same type of port, and an error is displayed.
In the following example, the selected device has the same type of port.
When you create a system template that includes settings from the Interface widget or the DNS widget, you can allow
value overrides. When overrides are allowed, you can change system template settings for each device after the
template is applied.
4. By the options for which you want to allow overrides, select the Allow Override Value checkbox, and click OK.
5. In the DNS widget, select the Allow Override Value checkbox beside the options for which you want to allow
overrides.
When you create a system template that includes settings from the Interface widget or the DNS widget, and you have
enabled overrides for options, you can override values for each device after the template has been applied.
This section lists the new features added to FortiManager for Zero Trust Network Access.
List of new features:
l Per policy lock on page 30
If you hover your cursor over the padlock icon, you can see who locked the policy and the time
at which it was locked.
2. In the Workspace Settings pane, select the Mode as Workspace and enable Per-Policy lock.
3. Click Apply.
To lock a policy:
Others see a red padlock icon with details indicating that this policy was locked by some other user.
Once you lock a policy, other users cannot modify this policy, but they can still modify other unlocked policies.
For instance, here, user2 is unable to edit policy 2 as it was locked by the other user.
You can still lock the policy package or the whole ADOM with confirmation.
Other users are now unable to make changes to this policy package and cannot lock the ADOM.
Sequence lock:
A policy sequence can be locked by creating, deleting, moving, cloning, or inserting policies.
The sequence lock ensures that the order of the policies is managed by one user at any given time.
If you set up a sequence lock, you see a green padlock icon at the top.
Other users see a red padlock icon at the top and cannot create, delete, clone, or insert policies, but they can still modify
existing unlocked policies.
Once a sequence is locked, others are unable to lock the related policy package and ADOM.
This section lists the new features added to FortiManager for Fabric Management Platform. They are organized into the
following sections:
l Automation and connectors on page 35
l Single pane on page 51
This section lists the new features added to FortiManager for automation and connectors.
List of new features:
l SDN connector to VMware vCenter on page 35
l Support multiple fabric connectors to Aruba ClearPass in the same ADOM on page 40
l Support multiple VMware NSX-T connectors in the same ADOM on page 43
l FortiManager firmware upgrade from FortiGuard servers on page 44
l SDN connector for Cisco ACI northbound API integration 6.4.2 on page 46
l IMDSv2 support for FortiManager-VM on OCI 6.4.4 on page 50
You can create SDN connectors for VMware vCentre to allow FortiGate to retrieve dynamic addresses from VMware
vCenter via FortiManager.
Following is an overview of how to configure an SDN connector for VMware vCenter:
1. Create an SDN connector for VMware vCenter. See Creating SDN connectors for VMware vCenter on page 35.
2. Create a dynamic address object that references the SDN connector for VMware vCenter. See Creating dynamic
addresses on page 37.
3. Create a firewall policy. See Creating firewall policies on page 38.
4. Install the changes to FortiGate. See Installing changes to FortiGate on page 39.
FortiGate can retrieve dynamic addresses from VMware vCenter via FortiManager.
This example assumes that VMware vCenter is already set up.
1. Go to Policy & Objects > Object Configurations > Fabric Connectors > SSO/Identity.
2. Click Create New > vCenter Connector.
The pane opens.
1. Go to Policy & Objects > Object Configurations > Firewall Objects > Addresses.
2. Click Create New > Address, or double-click an existing address object to open it for editing.
3. Complete the following options, and click OK.
a. In the Address Name box, type a name.
b. In the Type box, select Dynamic.
c. Beside Sub Type, select FSSO.
d. In the FSSO Group box, select the SDN connector that you created.
e. Set the remaining objects as desired.
4. In the Policy Package list, select the policy package, and click Next.
You can create multiple Aruba ClearPass connectors in each FortiManager ADOM, and then add them to a user group
object, which you can install to FortiGates via a policy package. After the policy package is installed, FortiGate can use
the multiple ClearPass connectors in the ADOM to connect to multiple CCPM (Configure ClearPass Policy Manager)
servers.
Following is an overview of how to use multiple ClearPass connectors:
1. Create multiple ClearPass connectors in an ADOM. See Creating multiple ClearPass connectors in an ADOM on
page 41.
2. Get roles and users from ClearPass. See Getting roles and users from ClearPass on page 42.
3. Create a user group object that references multiple ClearPass connectors. See Creating user groups on page 42.
4. Add the user group to a policy package, and install the policy package to FortiGate. See Installing policy packages
to FortiGate on page 42.
FortiGate uses the ClearPass connectors to connect to multiple CCPM servers.
This example assumes that Aruba ClearPass is already set up.
1. Go to Policy & Objects > Object Configurations > Fabric Connectors >SSO/Identity.
2. Double-click a ClearPass connector to open it for editing, and click Apply & Refresh.
FortiManager retrieves the roles and users from ClearPass.
3. Repeat this procedure for all ClearPass connectors in the ADOM.
1. Go to Policy & Objects > Object Configurations > User & Device > User Groups.
2. Click Create New.
3. In the Group Name box, type a name for the group.
4. Beside Type, select FSSO/SSO Connectors, and select the Aruba ClearPass connectors.
5. Set the remaining options, and click OK.
You can create multiple VMware NSX-T connectors in each FortiManager ADOM.
The multiple fabric connectors for VMware NSX-T are displayed in the ADOM.
You can upgrade FortiManager firmware by using images available on FortiGuard servers. A green checkmark beside
the available firmware images indicates the recommended FortiManager upgrade path. You can also upgrade to a
firmware image that is not recommended if desired.
1. Go to System Settings.
2. In the System Information widget, beside Firmware Version, click Update Firmware.
The Firmware Management dialog box opens.
3. From the FortiGuard Firmware box, select the version of FortiManager for the upgrade, and click OK.
The FortiGuard Firmware box displays all FortiManager firmware images available for upgrade. A green checkmark
displays beside the recommended image for FortiManager upgrade.
Because this image was captured before the release of FortiManager 6.4.0, a green
checkmark is not yet available.
If you select an image without a green checkmark, a confirmation dialog box is displayed. Click OK to continue.
FortiManager uses the downloaded image to update its firmware, and then restarts.
A new SDN connector type, ACI-direct has been added for Cisco ACI northbound API integration. It allows you to directly
define dynamic firewall addresses for Cisco ACI.
The following filters are supported:
l Tenant
l Application
l Endpoint group
l Tag
Fortinet SDN Connector is optional for this configuration.
4. In the Edit SDN Connector pane, select Direct Connection as the ACI Type, and click OK.
Alternatively, create a new SDN Connector by selecting Create New from the toolbar.
3. Right-click the ACI-direct SDN connector, here aci_direct1, and select Import.
Once the processing bar in Import SDN Connector pane is filled, Filter Generator pane opens.
4. In the Filter Generator pane, select +, and add a filter from the list.
Click OK.
The Import SDN Connector pane opens.
6. Click Close.
An ACI type dynamic address with the selected filter is automatically created.
1. Go to Policy & Objects > Object Configuration, and in the tree menu under Firewall Objects, select Addresses.
2. In the content pane, right-click the created address, and select Edit.
The Edit Address pane opens.
4. Select Install Policy Package & Device Settings, and click Next.
The ACI direct type SDN address is successfully installed to the FortiGate.
5. Click Finish.
You can verify if the installation was successful by going to Policy & Objects > Addresses in the FortiGate.
FortiManager-VM on OCI uses Oracle Instance Metadata Service version 2 (IMDSv2) to query and retrieve metadata
from OCI cloud. IMDSv2 provides enhanced security compared to version 1.
With IMDSv2:
l All requests to the IMDSv2 endpoints must include an authorization header. Requests that do not include the
authorization header are rejected.
l Requests that are forwarded using the HTTP headers Forwarded, X-Forwarded-For, or X-Forwarded-Host
are rejected.
Single pane
This section lists the new features added to FortiManager for single pane.
List of new features:
l Prompt admin to register FortiManager with FortiCloud on page 52
l FortiManager support for FortiAnalyzer HA on page 58
l Enable management extensions in FortiManager on page 59
l Licenses for management extension applications on page 61
l Online update and verification for third-party certificates (OCSP stapling) on page 64
l Interface-based shaping profiles and monitoring on page 67
l FortiManager detects an unauthorized FortiAP connected to a managed FortiGate on page 78
l Enforce firmware version when on-boarding a new FortiAP on page 80
l Enforce firmware version when on-boarding a new FortiSwitch on page 82
l Backup and restore FortiManager settings include Wireless Manager configuration on page 84
l Central SD-WAN, FortiAP, and FortiSwitch templates included in ADOM revision on page 86
l FortiManager support for FortiGate-7000E and FortiCarrier-7000E families on page 88
l Spectrum analysis for managed APs 6.4.1 on page 90
l FortiSwitch GUI enhancements 6.4.1 on page 93
l Upgrading ADOMs managing devices running FortiOS 6.4 6.4.1 on page 99
l Interface normalization policy 6.4.1 on page 100
l Adding a FortiGate HA cluster when adding a model device 6.4.1 on page 106
l Updated Security Rating Report 6.4.1 on page 108
l ADOM locking for FortiGates with multiple VDOMs used in multiple ADOMs 6.4.1 on page 111
l New and improved FortiSwitch Topology View 6.4.2 on page 112
l Run cable test on FortiSwitch ports from FortiManager 6.4.2 on page 118
l New Folder View added to display managed devices 6.4.2 on page 121
l Model device approval using device template 6.4.2 on page 124
l IPS signature activation filter: hold-time and CVE pattern 6.4.2 on page 129
l Display RSSI signal information and connection status for a managed FortiExtender 6.4.2 on page 132
l FortiSigConverter management extension tool to import Snort rules 6.4.3 on page 133
l Export policy check results 6.4.3 on page 138
l Device Health Monitoring Screen and Widget 6.4.3 on page 138
l Assign policy packages and system templates during device approval 6.4.3 on page 144
l IPsec VPN template 6.4.3 on page 148
l Support FortiSOAR license update in an air-gapped environment (closed network) 6.4.3 on page 155
l Workspace Mode can be set per-ADOM 6.4.3 on page 158
l New management extension - FortiAuthenticator added to FortiManager 6.4.3 on page 162
l Management extension logs can be accessed in FortiManager or forwarded to FortiAnalyzer to analyze them
further 6.4.3 on page 165
l New management extension - FortiPortal added to FortiManager 6.4.4 on page 165
l CLI Templates and Scripts usability improvements 6.4.4 on page 169
l FortiManager GUI accessibility improvements 6.4.4 on page 170
l Device authorization usability improvements 6.4.4 on page 173
l Device manager usability improvements 6.4.4 on page 175
l FortiOS private data encryption support 6.4.4 on page 179
l FortiSwitch Manager device monitoring usability improvements 6.4.4 on page 181
l Liveness detection support for VMware NSX-T service 6.4.4 on page 183
FortiManager VM users are now required to register their VM license or get a free trial license. You can register a
hardware device directly from the System Settings > Dashboard pane with FortiCloud.
This topic contains the following section:
l Registering a VM license on page 52
l Getting a trial VM license on page 53
l Registering a hardware device on page 55
l Viewing license information with the CLI on page 57
Registering a VM license
To download a VM license file, log in to FortiCloud, and click Asset > Manage/View Products.
Select a device from the list, and click the link in the License File field.
To register a VM license:
l Click Browse to navigate to the location of your license file on your computer.
3. Click Upload.
If a VM license is not associated with your FortiCloud account, you can get a free trial license for up to three devices.
Trial licenses do not expire.
FortiManager VM connects to FortiCloud to get the trial license, and the system reboots.
5. Go to System Settings > Dashboard to view the license status in the in the License Information widget.
6. To view your trial license in FortiCloud, log in to your account, and click Asset > Manage/View Products.
1. To verify the license is not registered, log in to FortiCloud, and click the Assets tab. If you do not see your device,
then it is not registered.
4. Enter your device information in the FortiCloud window, and click OK. FortiManager sends the information to
FortiCloud.
You can view the license status and information by using the CLI.
You can manage FortiAnalyzer HA via FortiManager. FortiManager retrieves the cluster member list and updates the
information whenever it changes, including FortiAnalyzer HA failover or a change in members.
3. From the Add FortiAnalyzer box, add FortiAnalyzer HA to FortiManager DVM by HA cluster's VIP, and click Next.
The FortiAnalyzer HA is discovered with its HA status information. Click Next to continue.
4. In the tree menu, select Managed FortiAnalyzer. The device status icon is shown as the HA cluster and the SN is
shown as the primary SN.
FortiManager DVM gets an update after the failover on FortiAnalyzer in 300 seconds. Here, the previous primary
"FAZ-VMTM20001379" becomes the secondary, and the new primary is "FAZ-VMTM20001378".
You can get the HA status update immediately, select the FortiAnalyzer device and either
click Refresh Device from the toolbar, or right-click and select Refresh.
You can enable the following applications as part of management extensions in FortiManager:
l SD-WAN Orchestrator
l Wireless Manager
When enabled, the management extension application is installed on FortiManager for you to use with FortiManager.
You can enable management extension applications by using the GUI or CLI.
1. Go to Management Extensions.
3. Click OK to continue.
The management extension application is installed and opens. For example, SD-WAN Orchestrator opens.
After you install the Wireless Manager application, you can view license information. This example shows how to view
the FWLM-BASE license in Wireless Manager.
When requesting a license for Wireless Network Manager Evaluation License Certificate, you must add the provided
registration code to the account on the Customer Service and Support site (https://support.fortinet.com) and the system
ID for Wireless Manager. You can obtain the system ID from Wireless Manager.
Uploading a license
After downloading the license file from the Customer Service and Support site, you can upload the license to Wireless
Manager.
3. Click Choose File, select the license key, and then click Upload.
You can enable Anycast to optimize the routing performance to FortiGuard servers. Relying on Fortinet DNS servers,
FortiManager obtains a single IP address for the domain name of each FortiGuard service. BGP routing optimization is
transparent to FortiManager. The domain name of each FortiGuard service is the common name in that service's
certificate. The certificate is signed by a third-party intermediate CA. The FortiGuard server uses the Online Certificate
Status Protocol (OCSP) stapling technique, enabling FortiManager to always validate the FortiGuard server certificate
efficiently.
This feature focuses on the Anycast option and TLS handshake using OCSP stapling when connecting to the FortiGuard
server.
When Anycast is enabled, FortiManager only completes the TLS handshake with a FortiGuard server that provides a
good OCSP status for its certificate. Any other status will result in a failed SSL connection. Also, FortiGuard enforces
connection only over port 443.
1. FortiManager embeds CA bundle that includes third party intermediate CA and the root CA.
2. FortiManager finds FortiGuard IP address from the DNS.
3. FortiManager initiates TLS handshake with the FortiGuard IP address.
4. FortiGuard servers provide certificates with its OCSP status: good, revoked, or unknown.
5. FortiManager verifies CA against the root CA within the CA bundle.
6. FortiManager then verifies the intermediate CA's revoke status against the root CA's CRL.
7. Finally, FortiManager verifies the FortiGuard certificate OCSP status.
OCSP stapling is reflected on the signature interval (currently, 24 hours), and good means that the certificate is not
revoked at that timestamp. The FortiGuard servers query the CA's OCSP responder every four hours and updates its
OCSP status. If the FortiGuard server is unable to reach the OCSP responder, it keeps the last known OCSP status for
seven days. This cached OCSP status is immediately sent out when a client connection request is made, which
optimizes the response time.
The Task Monitor displays more details about the task status and the amount of time to complete tasks. You can also
filter the items in the Task Monitor pane and the View History window.
The column also includes a status description as well as the number of tasks associated with the item.
c. Click Close.
3. You can also filter the content in the Task Monitor pane by entering a term in the search field.
This procedure assumes that you have already configured an SD-WAN network. In order to use traffic shaping profiles,
you must perform a number of steps before you can install traffic shaping profiles via a policy package to FortiGate
devices in an SD-WAN network.
6. Install the IPv4 and traffic shaping policies to the FortiGate devices in the SD-WAN network.
After the policies are installed, you can use monitor traffic shaping.
This procedure assumes that you have already configured an SD-WAN network.
next
edit "ingress"
set default-class-id 3
config shaping-entries
edit 1
set class-id 3
set priority medium
set guaranteed-bandwidth-percentage 30
set maximum-bandwidth-percentage 50
next
edit 2
set class-id 5
set guaranteed-bandwidth-percentage 50
set maximum-bandwidth-percentage 80
next
end
next
end
3. Assign shaping profiles to interfaces:
Use the shaping profile created in the previous step.
config system interface
...
edit "port2"
set vdom "root"
set ip 172.20.11.9 255.255.255.0
set allowaccess ping https ssh http
set type physical
set inbandwidth 100
set outbandwidth 100
set egress-shaping-profile "egress"
set estimated-upstream-bandwidth 15000
set estimated-downstream-bandwidth 15000
set role wan
set snmp-index 2
set ingress-shaping-profile "ingress"
next
edit "port3"
set vdom "root"
set ip 172.20.12.9 255.255.255.0
set allowaccess ping ssh
set type physical
set inbandwidth 500
set outbandwidth 500
set egress-shaping-profile "egress"
set estimated-upstream-bandwidth 500
set estimated-downstream-bandwidth 500
set role wan
set snmp-index 3
set ingress-shaping-profile "ingress"
next
...
edit "vpn_dc1-1"
set vdom "root"
set ip 10.254.30.2 255.255.255.255
set allowaccess ping
set type tunnel
Multiple device selection and consolidated install preview for policy package
installation
You can now preview a policy package and device settings in up to 10 devices when using the Install Wizard. Multiple
device selection is available in the Device Manager and Policy & Objects tiles.
9. Multiple preview is also available in the Install Wizard - Device Settings window.
1. Go to Policy & Objects > Policy Packages, and then select a policy from the tree menu.
2. In the toolbar, click Install > Re-Install Policy. After data is gathered, the Re-install Policy Package window is
displayed.
3. Select up to 10 devices, and then click Install Preview.
You can now authorize unknown APs that are connected to a managed FortiGate via FortiManager.
You must enable JSON API access to Read-Write to be able to authorize unknown FortiAP
devices.
3. Select the unknown FortiAP devices and either click More > Authorize from the toolbar, or right-click and select
Authorize.
4. Wait awhile and then select the APs and click More > Refresh.
APs are now online and displayed.
3. In the Add FortiAP dialog, configure the settings for your FortiAP device.
Toggle ON Enforce Firmware Version to enforce a firmware version and select the firmware version from the drop-
down menu.
4. Click OK to add your device.
5. In the tree menu under AP Manager > Managed APs, a model FortiAP device is created and added to the managed
FortiGate.
The model FortiAP is displayed as an offline authorized AP.
Once the AP is connected to the FortiGate and appears online, wait around 10 minutes for the enforced firmware to
be displayed.
6. Select the AP and click More from the toolbar and select Refresh.
5. In the Config FortiAP window, edit the FortiAP to set firmware enforcement.
Once the AP is online, FortiManager enforces the firmware version.
3. In the Add Model FortiSwitch dialog, configure the settings for your FortiSwitch.
Toggle ON Enforce Firmware Version to enforce a firmware version and select the firmware version from the drop-
down menu.
4. Click OK to add your FortiSwitch.
5. In the tree menu under FortiSwitch Manager > Managed Switches, a model FortiSwitch is created and added to the
managed FortiGate.
When the FortiSwitch is online, FortiManager sets the firmware to the enforced version.
Here, the firmware is upgraded from the previous build 194 to build 202.
5. In the Edit Managed FortiSwitch window, edit the FortiSwitch to set firmware enforcement.
Once the firmware is enforced, the FortiSwitch firmware will be changed to the enforced version.
You can backup and restore FortiManager settings including Wireless Manager configuration using the GUI or CLI.
To backup and restore FortiManager settings along with Wireless Manager configuration using the GUI:
1. Ensure FortiGates are added to the Wireless Manager device inventory through Management Extensions >
Wireless Manager > Operate > Inventory > Devices.
2. Navigate to the FortiManager System Information widget through System Settings > Dashboard and backup the
system configuration. The FortiManager system configuration is backed up along with Wireless Manager
configuration.
3. To restore the backed up settings, navigate to the FortiManager System Information widget through System
Settings > Dashboard and restore the FortiManager system configuration. The FortiManager system configuration
is restored along with Wireless Manager configuration.
4. Verify that the FortiGates are restored to the Wireless Manager device inventory through Management Extensions >
Wireless Manager > Operate > Inventory > Devices.
To backup and restore FortiManager settings along with Wireless Manager configuration using the CLI:
ADOM revisions now include SD-WAN templates, FortiAP profiles, and FortiSwitch templates when cetnral
management for each is enabled. Previously ADOM revisions included only global policies, policy packages, and policy
objects.
1. In the ADOM, ensure that central management is enabled for FortiAP, SD-WAN, and FortiSwitch.
a. Go to System Settings > All ADOMs.
b. Double-click the ADOM to open it for editing.
c. Beside Central Management, select the checkbox for FortiAP, SD-WAN, and FortiSwitch.
d. Click OK.
Central management is enabled for FortiAP, SD-WAN, and FortiSwitch.
2. Create a profile or template for FortiAP, SD-WAN, and FortiSwitch.
The following example describes how to create a profile for FortiAP.
a. Go to AP Manager > WiFi Profiles.
b. In the content pane, click Create New.
c. Complete the options, and click OK.
The profile is created.
FortiManager 6.4.0 supports the FortiGate-7000E and FortiCarrier-7000E families. Following is a list of supported
FortiGate-7000E models:
l FortiGate-7030E (FG73EQ)
l FortiGate-7030E (FG73ES)
l FortiGate-7040E (F74E8D)
l FortiGate-7040E (F74E9D)
l FortiGate-7040E (FG74E1)
l FortiGate-7040E (FG74E2)
l FortiGate-7040E (FG74E3)
l FortiGate-7040E (FG74E4)
l FortiGate-7040E (FG74E5)
l FortiGate-7040E (FG74E6)
l FortiGate-7040E (FG74E8)
l FortiGate-7040E (FG74E9)
l FortiGate-7060E (F76E9D)
l FortiGate-7060E (FG76E1)
l FortiGate-7060E (FG76E2)
l FortiGate-7060E (FG76E3)
l FortiGate-7060E (FG76E4)
l FortiGate-7060E (FG76E5)
l FortiGate-7060E (FG76E6)
l FortiGate-7060E (FG76E8)
l FortiGate-7060E (FG76E9)
l FortiGate-7060E-8-DC (F76E8D)
Following is a list of supported FortiCarrier-7000E models:
l FortiCarrier-7030E (FG73EQ)
l FortiCarrier-7030E (FG73ES)
l FortiCarrier-7040E (F74E8D)
l FortiCarrier-7040E (F74E9D)
l FortiCarrier-7040E (FG74E1)
l FortiCarrier-7040E (FG74E2)
l FortiCarrier-7040E (FG74E3)
l FortiCarrier-7040E (FG74E4)
l FortiCarrier-7040E (FG74E5)
l FortiCarrier-7040E (FG74E6)
l FortiCarrier-7040E (FG74E8)
l FortiCarrier-7040E (FG74E9)
l FortiCarrier-7060E (F76E9D)
l FortiCarrier-7060E (FG76E1)
l FortiCarrier-7060E (FG76E2)
l FortiCarrier-7060E (FG76E3)
l FortiCarrier-7060E (FG76E4)
l FortiCarrier-7060E (FG76E5)
l FortiCarrier-7060E (FG76E6)
l FortiCarrier-7060E (FG76E8)
l FortiCarrier-7060E (FG76E9)
l FortiCarrier-7060E-8-DC (F76E8D)
The following example shows Device Manager for the FortiGate-7040E:
You can view the spectrum analysis for managed APs in FortiManager 6.4. Spectrum analysis is available through AP
Manager > Managed APs.
To view the spectrum analysis for a managed AP in the FortiManager GUI:
1. Ensure the JSON API Access field is set to Read-Write, by editing the administrator. See Editing administrators in
the FortiManager Administration Guide.
2. Create a new WiFi profile or modify an existing WiFi profile, by setting the radio mode setting to Dedicated Monitor.
See AP profiles in the FortiManager Administration Guide.
3. Assign the profile to the managed AP. See Assigning profiles to FortiAP devices in the FortiManager Administration
Guide.
4. Use the Install Wizard to install the changes to FortiGate. See Using the Install Wizard to install device settings only
in the FortiManager Administration Guide.
5. On the Managed APs screen, select a managed AP, click More from the toolbar or right-click, and click View
Spectrum Analysis:
The Spectrum Analysis in the form of Signal Interference, Signal Interference Spectrogram, Duty Cycle, and Duty Cycle
Spectrogram charts, along with the tabulated Detected Interference information is displayed.
NAC Policy
NAC policies can be created or edited in FortiSwitch Profile > NAC Policies. Once the policies are created or editied, the
changes can be installed to the FortiGate.
By default, NAC Settings option is enabled and Onboarding VLAN is set to onboarding.
You may disable the NAC Settings or change the onboarding VLAN.
4. In the Edit VLAN Definition pane, set Use NAC policies on FortiSwitch Ports to Specify.
5. Select Click here to select and from the Select Entries list, select the FortiSwitch.
Click OK.
If you want to specify NAC policies on all FortiSwitches, set Use NAC policies on
FortiSwitch Ports to All.
6. In the FortiSwitch option below Use NAC policies on FortiSwitch Ports, select Specify.
7. Select Click here to select and from the Select Entries list, select the ports to specify the NAC policy on. Click OK.
Click OK to save your changes.
The Device Information column is added to show the connected device information.
Hover over the listed device to see detailed information.
The Transceiver column is added to display transceiver information. If no transceiver is connected, then the
Transceiver column shows Unknown.
The CLI Configurations tab is added to edit and display all the settings for the switch-controller.
ADOMs can concurrently manage devices running FortiOS 6.2 and 6.4. After all the devices being managed by an
ADOM are upgraded to FortiOS 6.4, you can upgrade the ADOM.
To upgrade an ADOM:
1. Go to System Settings > All ADOMs.
2. Right-click on an ADOM and select Upgrade, or select an ADOM and then select More > Upgrade from the toolbar.
If the ADOM has already been upgraded to the latest version, this option will not be available.
3. Select OK in the confirmation dialog box to upgrade the device.
If all of the devices within the ADOM are not already upgraded, the upgrade will be aborted and an error message
will be shown.
Upgrade the remaining devices within the ADOM, then return to step 1 to try upgrading the ADOM again.
When an ADOM is created, a number of per-platform interfaces are defined for all FortiGate models by default. This
allows all FortiGate models to have a number of normalized interfaces already mapped, so that policies can be installed
without custom mapping. The interface names could be matched to different real interfaces on different FortiGate
models. All mappings are explicitly shown in the mapping table. If there is no match, mapping will not exist.
The Per-Platform Mapping in a normalized interface can be edited or deleted. To edit or delete the Per-Platform Mapping
in a normalized interface:
1. Right-click on a normalized interface entry in the Normalized Interface table.
2. Select Edit. The Edit Normalized Interface page appears.
3. In the Per-Platform Mapping table, right-click on a table entry.
4. Select Edit or Delete to edit or delete the Per-Platform Mapping respectively.
A normalized interface may use Per-Platform mapping and/or Per-Device mapping. In a policy, a per-device mapping
has a higher priority than a per-platform mapping.
When creating a new normalized interface, to use a physical interface name in the per-platform mapping, the default per-
platform mapping should be deleted from the default per-platform interface first. Otherwise the system will throw an error
and the interface cannot be created.
When creating a zone, map it to a normalized interface just like mapping to a regular interface.
For each managed FortiGate device you can view the number of normalized interfaces mapped to it. To view the
normalized interfaces mapped to a FortiGate:
1. Select a normalized interface from the Normalized Interface table.
2. Click More from the toolbar above the table. A drop-down menu drops down.
3. Select Normalized Interface Preview. The Normalized Interface Mapping Preview modal window appears.
4. Select a device from the drop-down list to view the normalized interfaces mapped to it.
You can search for where a normalized interface is configured in a policy package. To search for where a normalized
interface is used in a policy package:
3. A modal window displays the policy package which the selected normalized interface is used in.
You may collapse or expand all the mappings in the Normalized Interface table. To collapse or expand all mappings:
1. Click More from the toolbar above the Normalized Interface table.
2. Select Collapse All Mapping to collapse all mappings.
When importing a device, you can choose the mapping type of the device interface to be either Per-Platform or Per-
Device.
You can add a FortiGate HA cluster using the Add Model Device method when adding a new device. The process of
adding a FortiGate HA cluster is similar to adding a model device using FortiGate serial numbers. See Adding a model
device by serial number in the FortiManager Administration Guide.
You can add the two FortiGate devices as model devices to be part of the HA cluster. In the Add Device dialog, select
Add Model Device, and select the HA Cluster option. Populate the mandatory fields HA Mode, Serial Number for both
the nodes, Device Model type, Group Name and Password for the HA cluster, Node 1 and Node 2 priority, Monitor
The FortiGate device with a higher node priority will be considered as the primary device of the
HA cluster.
Both the FortiGate devices to be added to the HA cluster must be on the same firmware
version. If not, the devices will be enforced with the same version as selected in the Enforce
Firmware Version field in the Add Device dialog.
FortiManager adds both the FortiGate devices as model devices and creates an HA cluster. Based on device node
priorities, both the devices will come online and show up in FortiManager one after the other. You can view the status of
the HA cluster and information about each of the nodes of the HA cluster in Device Manager.
You can also edit the HA cluster information after adding it. Use the Edit Device screen to modify the HA cluster
information by modifying the fields IP Address, Admin User and Password, Cluster Members, Enforce Firmware Version,
The Security Rating report in FortiManager has been synched with the FOS v6.4 version of the report. The FortiManager
Security Rating report now has the same style and content as the FortiGate 6.4 version of the report.
Requirements:
Use FortiOS to generate the Security Fabric Ratings report to view the information in FortiManager.
The Security Rating pane is separated into three major scorecards: Security Posture, Fabric Coverage, and
Optimization, which provide an executive summary of the three largest areas of security focus in the Security
Fabric.
2. Click a scorecard to view the drilldown report with itemized results and compliance recommendations.
The point score represents the net score for all passed and failed items in that area. The report includes the security
controls that were tested against, linking to specific FSBP or PCI compliance policies.
3. To exit the current view, click the icon beside the scorecard title to return to the summary view.
ADOM locking for FortiGates with multiple VDOMs used in multiple ADOMs - 6.4.1
A FortiGate can have multiple VDOMs. In advanced ADOM mode in FortiManager, you can assign VDOMs of a
FortiGate to different ADOMs. If a user locks an ADOM and installs configurations to one of the VDOMs, other users can
lock other ADOMs that have VDOMs for the FortiGate.
For example, FortiManager has advanced ADOM mode enabled, and there are two users: user1 and user2. A FortiGate
has VDOMs that are assigned to the root ADOM and a test ADOM. In the test ADOM, the first user (user1) locks the
ADOM, and installs a configuration to a VDOM of the FortiGate. In the root ADOM, the second user (user2) can view the
red lock icon, for example:
The second user can lock the root ADOM. The following example, shows the locked root ADOM:
You can now see topology view similar to FortiOS for selected devices. This gives you the visibility of the managed
FortiSwitch status, connection topology, and MC-LAG status among others.
1. Hover over the connection between fortilink interface and the FortiSwitch to see the connection member
information.
2. Hover over the connection between FortiSwitches, the connection member information is displayed.
3. Hover over the MC-LAG ICL connection to see the related information.
5. Hover over the FortiSwitch port or fortilink interface to see the port information.
7. Hover over the FortiGate or FortiSwitch to see the related device information.
8. Choose a different VDOM in FortiGate, only the FortiSwitches in the selected VDOMs are displayed.
The FortiSwitch cable test is only available on ADOM 6.4 and later.
The Select Entries list does not contain FortiLink ports because cable test is not allowed
for the FortiLink interface.
5. Click Run Cable Test to run the FortiSwitch cable test on the selected ports.
If the cable test API is not available for your version of FortiOS (6.4 branch, but build 1704 or earlier), an error
prompt is displayed asking you to update to the latest firmware.
You can now organize devices within the tree menu in Device Manager to display FortiGates. The Folder View feature
allows you to create, nest, and move folders in the tree menu. You can also move devices between folders.
To create a folder:
4. In the Create New Folder dialog, enter the name of the folder as folder1.
Click OK.
The new folder is created and visible in the tree menu. Also, the FortiGates in the folder are now displayed in the
content pane.
You can add FortiGates directly to a folder by selecting devices from the Available Entries
list in the Create New Folder dialog.
Nested folders
1. In the tree menu, right-click the folder you intend to nest and select Create New Folder.
For instance, right-click the previously created folder1 and select Create New Folder.
The Create New Folder dialog opens.
In Folder shows that the new folder will be created within folder1.
2. In the Create New Folder dialog, enter the name of the folder as nested-folder.
Click OK.
The nested-folder is created and displayed in the tree menu under the previously created folder1. Also, the folder
and the FortiGates in the parent folder are displayed in the content pane.
4. In the Edit Folder dialog, select the FortiGate to be moved from the Available Entries list.
Click OK .
Alternatively, from the Device & Groups pane, select a FortiGate, drag and drop it to the
folder where you want to move the selected FortiGate.
To move a folder:
4. In the Move Folder dialog, under In Folder, select the destination folder, here folder2.
Click OK.
The nested-folder moves to folder2 including folders and devices in it.
With FortiManager 6.4.2, you can now add a model device using a device template. You can either use a site template or
a provisioning template to add a model device.
1. Go to Device Manager > Provisioning Templates > System Templates, and create a new provisioning template.
The Allow Override option allows overriding profile values when using a provisioning
template to add a model device. Use the option while creating a template to override any
profile values later when you add a model device using a provisioning template. If the
option is left unchecked, you cannot override profile values when adding a model device
using a provisioning template.
2. Go to Device Manager > Device & Groups > Add Device. The Add Device dialog appears.
Serial Number Add the serial number of the FortiGate device to be added.
Device Model Select the device model from the drop-down list.
Assign Provisioning Template Select the provisioning template you created in Step 1 from the
drop-down list.
To continue without overriding the profile values, proceed with the next steps. To override profile values in the
provisioning template:
a. Click Override Profile Value. The template widget override dialog appears.
b. Select the interface and click Edit. The Edit Action dialog appears.
You can only change the fields that were configured with the Allow Override option
while creating the template. If the option was left unchecked, you cannot override
profile values when adding a model device using a provisioning template.
FortiManager now supports CVE ID filtering. You can also set the hold-time for an IPS signature activation.
2. In the IPS Signatures and Filters section, create a new filter or select a filter to update. The Create New IPS
Signatures and Filters dialog box is displayed.
4. Click Add Filter > CVE ID. Enter the CVE ID, then click Use Filters, and click OK.
6. In the signature-hold-time field, enter the number of days or hours hold and monitor the IPS signatures.
Display RSSI signal information and connection status for a managed FortiExtender
- 6.4.2
You can now see GSM signal information and the LTE connection status extracted from a FortiExtender and managed
by a FortiGate in FortiManager.
2. Select a FortiExtender and click View Details in the toolbar, or right-click the FortiExtender device, and select View
Details.
The Details pane opens.
Status information including system status, modem status, and data usage are displayed.
Note: For reference, the signal strength bands are derived from the following chart:
FortiManager supports Snort, a popular open source Network Intrusion Detection System (NIDS), using the
FortiSigConverter application.
You can download FortiSigConverter from registery.fortinet.com directly in FortiManager using the
Management Extensions module.
1. Go to Management Extensions.
2. Click FortiSigConverter to download the management extension, and then open the application.
3. To import a signature file, click Import SNORT Signature, and click OK.
5. To push Snort rules to FortiManager, open a signature file and select the rules you want to push.
You can use the GUI to export Policy Check results as a PDF.
System dashboards and widgets have been enhanced to provide more useful information related to health monitoring,
such as DHCP, IPsec VPN, User, and WiFi status.
l Resource Usage
l Network Monitors
3. Click the (+) icon to add a new dashboard. The Add Dashboard Widget dialog is displayed.
4. Click the add icon (+) to add a widget to the monitor. A checkmark appears next to the widget.
8. Click the menu icon, and select Remove to remove a widget from the dashboard.
Assign policy packages and system templates during device approval - 6.4.3
When you are authorizing a FortiGate device for central management, you can assign a policy package and a system
template as part of the authorization process, and you can override some system template settings.
This example describes how to assign a policy package and system template when authorizing a FortiGate for central
management. It also describes how to allow and execute overrides in a system template during device authorization.
9. Click OK.
Device authorization begins, and you can view details for each step in the process.
You can click View Details to display more details about each step.
11. Check that the installation target for the policy package lists the authorized device.
a. Go to Policy & Object > Policy Packages, and expand the policy package you selected.
b. Inside the policy package, select Installation Targets.
The list of target devices for the policy package is displayed.
12. Go to Device Manager > Device & Groups > Managed Devices.
The authorized device is displayed. The Config Status is Modified, and a configuration installation is needed. Until
the configuration is installed, the system interface displays the result of the interface template.
With this feature, you can provision IPsec tunnels to FortiGate branch devices using an IPsec template. You can save an
IPsec VPN configuration, apply it to one or more FortiGates, or reuse the same configuration over and over again. You
can specifically name IPsec tunnel interfaces using supported meta fields, and the tunnel interfaces may later on be
mapped to normalized interfaces, or used in policies and also in SD-WAN widgets.
The following example assumes that site HQ IPsec VPN has been configured and is up and running. We will establish
the configurations of Branch-A and Branch-B sites to the HQ site by using an IPsec template.
Once meta fields are created, you need to assign values to the meta field variables for each device. You will assign
values to the meta field variables branch_local_network and remote_site_id for both the sites Branch-A and
Branch-B.
4. Click OK.
Similarly, edit device Branch-B to add values to the meta field variables.
Setting Value/Description
Setting Value/Description
Remote Gateway (IP This field accepts meta field variables and you will use the remote_site_id meta field
Address) variable here, for example, 101.71.$(remote_site_id).1, where the meta
field variable value will be substituted at runtime.
Local Interface We need to create and select a normalized interface with per-device mapping as
different devices use different local interfaces. In this case, it is IPsecLAN.
Local Network Address Select Interface Local Address, and enter the meta field variable $(branch_
Object Name local_network), where the meta field variable value will be substituted at
runtime.
Authentication Method Pre-shared Key: Alphanumeric key used for device authentication.
6. Click Apply at the bottom to save the settings. The IPsec template is created and is ready to be assigned to devices.
The created IPsec template needs to be assigned to the Branch-A and Branch-B devices.
Once the IPsec template is assigned to devices, it still does not automatically push the settings to the devices. This is
indicated by the Caution icon before the template name in the IPsec Template column. You need to install the IPsec VPN
configuration and firewall policies to those devices for the IPsec template to push through all the settings.
4. Click Install > Install Wizard from the toolbar. The Install Wizard dialog appears.
5. Continue with the policy installation on both Branch-A and Branch-B devices.
6. Click Finish. The firewall policies are installed and the IPsec VPN configurations are pushed to the devices.
A device with a synchronized template status would be indicated by a green tick mark icon before the template name in
the IPsec Template column, while a device with a modified status would be indicated by a yellow triangle caution icon.
You can now create fabric ADOMs. When you add FortiSOAR devices to FortiManager as unmanaged devices, you can
only authorize FortiSOAR devices to fabric ADOMs.
In addition, you can use FortiGuard module in FortiManager in a closed network for license updates to
FortiSOAR devices.
This topic contains the following sections:
l Creating ADOMs of type Fabric on page 156
l Authorizing FortiSOAR devices on page 156
l Updating FortiSOAR licenses in closed networks on page 157
You can create ADOMs and select type Fabric. You can then select the ADOM when you authorize unmanaged
FortiSOAR devices.
6. Configure the settings for the new ADOM, and click OK.
The new ADOM displays on the All ADOMs page in the Security Fabric.
Authorizing FortiSOAR devices
When you authorize FortiSOAR devices, you can only add them to ADOMs of type Fabric. Before you authorize
FortiSOAR devices, ensure that you enable ADOMs on FortiManager and create an ADOM of type Fabric.
1. On FortiSOAR, add the FortiManager IP and configured port as the FortiGuard override server.
FortiSOAR displays in FortiManager as an unauthorized device.
2. In FortiManager, select the root ADOM, and go to Device Manager > Device & Groups > Unauthorized Devices.
FortiSOAR displays as an unauthorized device.
You can use FortiManager in a closed network to update licenses for FortiSOAR devices.
Before you can use FortiManager in a closed network to update licenses for FortiSOAR devices, you must perform the
following tasks:
l Add FortiSOAR devices to FortiManager as unmanaged devices, and authorize FortiSOAR devices to a fabric
ADOM.
l Request the entitlement file for FortiSOAR devices from the Fortinet Customer Service & Support site
1. In FortiManager, go to FortiGuard > Settings, and ensure that Enable Communication with FortiGuard Server is
toggled OFF.
test
2. Under Upload Options for FortiGate/FortiMail, click Upload beside Service License.
Although the option is labeled for FortiGate or FortiMail, you can use this option for other types of devices, such as
FortiSOAR.
The Service License Upload dialog box is displayed.
3. Drop the account entitlement file on the dialog box, and click OK.
The license information is uploaded.
4. Go to Licensing Status to view licensing information for FortiSOAR.
4. Double-click adom2. Click Workflow, configure the approval group for this ADOM, and then click OK.
The root ADOM is now set to default mode, adom1 is set to Workspace mode, and adom2 is set to Workflow mode. To
make changes to adom1 and adom2, the admin must lock the ADOM first.
1. By default, the FortiAuthenticator management extension is disabled. You can enable it through the CLI or by
clicking on the grayed-out FortiAuthenticator tile in Management Extensions when the Management Extensions tile
is already enabled.
The FortiAuthenticator management extension includes the same capabilities as the standalone FortiAuthenticator
product. See the FortiAuthenticator MEA Release Notes for exceptions.
You can use the FortiAuthenticator management extension to configure authentication requirements. For example,
create local or remote users, create LDAP and RADIUS servers, and configure SAML authentication.
Event logs generated by a management extension are available in the local event log of FortiManager. They are
displayed in the following locations in System Settings:
l Alert Message Console widget
l Event log pane
1. Go to System Settings > Event Log to view the local log list.
The recently generated management extension local logs are displayed in the Event Log pane.
FortiPortal management extension application has been added as an integrated solution to FortiManager.
1. By default, the FortiPortal management extension is disabled. You can enable it through the CLI or by clicking on
the grayed out FortiPortal tile in Management Extensions when the Management Extensions tile is already enabled.
Once the FortiPortal management extension is successfully downloaded and launched, the user is automatically logged
in as a super user (Super_User).
The function of adding a FortiManager is removed. You can only add FortiAnalyzer devices to
the FortiPortal management extension.
The FortiPortal management extension includes similar capabilities as the standalone FortiPortal. See the
FortiPortal MEA Release Notes for exceptions.
You can use the Log View and the Monitors tab in View on the customer portal to display event logs and monitoring
information for a customer.
The figure below shows an example of the Traffic tab in View > Log View that displays event logs grouped by
application.
The figure below shows an example of the Top Threats tab in View > Monitors that displays threat information.
Licensing
FortiPortal MEA includes a free license. With the free license, you can manage 3 FortiGates or 3 VDOMs that are
managed by FortiManager. If you want to manage additional devices or VDOMs with FortiPortal MEA, the following
license is required:
A few tabs of the Device Manager like Device & Groups, Provisioning Templates, and Scripts have been improved for a
better user experience.
The CLI Template and CLI Template Group entries can now be accessed from the Provisioning Templates tab instead of
the Scripts tab.
The Script and Script Group entries are consolidated and appear together in the content pane of the Scripts tab, and the
tree menu is removed from the Scripts tab for a wider content pane.
Go to Device Manager > Scripts to view the Script and Script Group entries.
When attempting to run scripts on a managed device, the Run Script on Device dialog displays Script Group entries in
addition to Script entries.
5. Click Run Now to run the selected entry on the managed device.
When viewing a Security Fabric group entry from the Managed Devices table, the fabric group entry does not display in a
collapsed view by default. The group entry is displayed in an expanded view and the device listings within the group
entry are displayed by default.
Go to Device Manager > Device & Groups, and click Managed Devices from the tree menu to view the managed devices
and group entries in an expanded view by default.
FortiManager now implements a high contrast dark theme in order to make the FortiManager GUI more accessible, and
to aid people with visual disability in using the FortiManager GUI.
To change the currently active theme to the High Contrast Dark theme:
4. Click Apply.
This version of FortiManager improves device authorization usability for a better user experience.
From a non-root ADOM under Device Manager > Device & Groups, clicking on the X Devices Unauthorized tile in the
quick status bar does not simply refresh the device list but redirects to the Unauthorized Devices page and displays the
unauthorized devices in the content pane of the root ADOM.
When authorizing devices from the root ADOM, the Authorize Device dialog has None selected by default instead of
root in the ADOM selection drop-down list.
If the devices selected to be authorized have a different firmware version than the ADOM versions the devices are added
to, the FortiManager system displays a Version Mismatch Warning confirmation dialog before proceeding with the
authorization.
This version of FortiManager improves device manager usability for a better user experience.
Devices are categorized and listed in a hierarchical tree menu into various categories like Managed Devices for all the
managed devices, Logging Devices if FortiAnalyzer features are enabled, Unauthorized Devices for devices that are not
authorized, and custom groups if created.
The right-click menu lists more options like Quick Install, Import Policy, Edit, Delete, and so on, to facilitate the user to
take actions from the tree menu.
You may Edit or Delete a device listed under the Logging Devices category in the tree menu.
You may Authorize, Hide, or Delete a device listed under the Unauthorized Devices category in the tree menu.
The System: Dashboard tab now lists widgets under Summary and Network Monitors.
FortiManager supports the private data encryption settings on FortiOS. FortiGates with the private-data-
encryption setting enabled can be managed by FortiManager.
When a FortiGate with the private-data-encryption setting enabled is added to FortiManager, FortiManager
requires the FortiGate encryption key to be entered in FortiManager to successfully install device configuration settings
and manage the added FortiGate. To know more about adding devices to FortiManager, see the FortiManager
Administration Guide on the Docs Library.
1. Go to Device Manager. The Device Manager prompts with a Warning dialog that requires the FortiGate encryption
key to be entered:
2. Enter the correct encryption key into the Private Data Encryption Key field for each of the listed FortiGates. The
Warning dialog lists all the FortiGates for which the respective encryption keys are required.
If the encryption key does not match, the verification fails, and you may try again with the correct key.
Once the added FortiGates are verified, you may start managing the added devices.
Every time you try to install configuration settings to the managed FortiGates, FortiManager checks if the FortiGate
encryption is correct. If the encryption key is incorrect, the added device is disabled for installation.
You may verify devices again from the Device Manager by entering the correct encryption keys for the disabled
FortiGates.
FortiSwitch Manager central mode device monitoring supports both the block-style topology representation and the
faceplate or port status view.
You can change views to see both the faceplate and block-style topology diagram. This facilitates viewing the uplinks in
the topology representation and which ports are up and down in the faceplate view. This is useful for troubleshooting and
also to ascertain the state of ports before making any configuration changes.
Go to FortiSwitch Manager > Monitor and click on Topology or Faceplates from the content pane to view the block-style
topology diagram or the port status view respectively. Use the search box to find a specific device or filter the view, and
hover over connections or ports to get more information.
1. Go to FortiSwitch Manager > Monitor > Faceplates. The connection and ports statuses are displayed.
2. Hover over the switch port, to view detailed information about the port.
3. Select a switch in the tree-menu to edit the switch and view the port configuration. Right-click a port to authorize,
deauthorize, or upgrade a device. You can also restart the switch or perform a cable test.
The Liveness Detection feature may be used to force the VMware NSX-T service to not use a specific FortiGate device
until its service managing FortiManager updates the FortiGate configuration. This is expected to be a common
requirement when, for example, new FortiGates are deployed. If this is desired, the newly deployed FortiGates should
not reply to liveness detection queries or forward any traffic until they have received sufficient configuration data from
their service managing FortiManager. The VMware NSX-T service will use other already-configured FortiGates instead,
if any are available.
When configuring a service from FortiManager to VMware NSX-T, you may set the Enable Liveness Detection setting to
ON or OFF. The setting is ON by default.
1. Register a service from FortiManager to VMware NSX-T. See To register a service from FortiManager to VMware
NSX-T on the Creating VMware NSX-T connector page of the FortiManager 6.4.4 Admin Guide.
2. Deploy a FortiGate VM from VMware NSX-T and enable central management. See To deploy a FortiGate VM from
VMware NSX-T and enable central management on the Creating VMware NSX-T connector page of the
FortiManager 6.4.4 Admin Guide.
3. Add the service chain and configure the Liveness Detection setting:
a. On the FortiManager GUI, go to Policy & Objects > Object Configurations > Fabric Connectors >
Endpoint/Identity and select the added NSX-T service.
b. Right-click on the selected service and click Configure. The Configure Devices of NSX-T Service dialog
appears.
c. Select the FortiGate device listed in the table and click Add. The Add Service Chain dialog appears.
FortiGate-VM64 (5) # sh
config nsxt service-chain
edit 5
config service-index
edit 1
set vd "root"
next
end
next
end
FortiGate-VM64 (5) # end
5. Check Liveness Detection and service chain configurations on FortiManager:
a. Go to Policy & Objects > Object Configurations > Fabric Connectors > Endpoint/Identity and select the added
NSX-T service.
b. Right-click on the selected service and click Configure. The Configure Devices of NSX-T Service dialog
appears. The Liveness Detection column indicates that the setting is Enabled.
6. Configure a virtual wire pair interface and a virtual wire pair policy and install to FortiGate. See To complete the
fabric connector setup on the Creating VMware NSX-T connector page of the FortiManager 6.4.4 Admin Guide.
FortiExtender 6.4.2 dataplan and two modems support for FortiManager - 6.4.4
The new Extender Manager module appears when FortiManager detects a FortiGate that is connected to FortiExtender.
You can use the module to configure two modems, as well as data plans and SIM profiles.
1. Go toExtender Manager > Managed Extenders. The managed FortiExtenders are displayed.
3. In the banner, click Install Wizard to install the changes on the device.
4. Right-click a device and click View Details to view the device information.
5. To clone a SIM profile, click Clone or right-click profile and select Clone.
3. In the toolbar, click Create New. Configure the data plan settings and click OK.
5. Click Import to import a data plan from the FortiGate settings. The data plan will be assigned to the FortiExtender
where it is imported.
6. In the toolbar, click Where Used to view where the data plan is being used.
7. In the toolbar, click Delete to remove a data plan. You cannot delete a data plan that is in use.
When you run a policy check on a policy package or select the new Find Unused Policies option from the Tools
dropdown for a policy package, FortiManager shows hit count information for unused policies with zero hit count.
The Find Unused Policies option is unavailable when classic dual pane is enabled. To disable
classic dual pane, go to System Settings > Advanced > Advanced Settings, and set the
Display Policy & Object in Classic Dual Pane option to Disable.
To view the hit count information for unused policies using the new Find Unused Policies option:
To view hit count information for unused policies in the Policy Check Report:
3. In the Policy Check dialog, click Perform Policy Check, and then click OK.
Once the policy check finishes, the results are displayed in the Policy Check window.
The Policy Check window displays the hit count information for all the policies in a policy package.
4. Select the Unused Only checkbox to view the hit count information for the unused policies only.