Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

FortiOS 6.2.0 New Features Guide

Download as pdf or txt
Download as pdf or txt
You are on page 1of 398

FortiOS - New Features Guide

Version 6.2.0
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com

FORTINET VIDEO GUIDE


https://video.fortinet.com

FORTINET BLOG
https://blog.fortinet.com

CUSTOMER SERVICE & SUPPORT


https://support.fortinet.com

FORTINET TRAINING & CERTIFICATION PROGRAM


https://www.fortinet.com/support-and-training/training.html

NSE INSTITUTE
https://training.fortinet.com

FORTIGUARD CENTER
https://fortiguard.com/

END USER LICENSE AGREEMENT


https://www.fortinet.com/doc/legal/EULA.pdf

FEEDBACK
Email: techdoc@fortinet.com

November 20, 2019


FortiOS 6.2.0 New Features Guide
01-620-538749-20191120
TABLE OF CONTENTS

Change Log 8
Expanding Fabric Family 10
Telemetry Integration - New FTNT Products 10
Telemetry Integration - AWS Cloud Segments 14
SAML SSO for Fabric Devices 16
Split-Task VDOM Support 16
Dynamic Policy - Fabric Devices 22
Fabric Member Synchronization 24
Simplify FortiAnalyzer Pairing 24
FortiSandbox 26
FortiClient EMS 29
Security Rating 30
Security Rating - Extend Checks to FortiAnalyzer 31
Security Rating – Historical Rating Dashboard Widget 32
Comprehensive Report Extensions 33
Endpoint 36
Dynamic Policy – FortiClient EMS (Connector) 36
Captive Portal for Compliance Failure 40
FortiToken Cloud 42
Wireless 43
WiFi Location Map 43
Monitor and Suppress Phishing SSID 47
WiFi QoS Enhancement 49
Airtime Fairness 51
Extended Details on AP Drill Down 54
Troubleshooting – Extended Logging 57
Override WiFi Certificates (from GUI) 67
Wireless MAC Filter Updates 68
Change SSID to VDOM Object 70
Direct SNMP Monitoring 71
Switching 73
FortiLink Setup 73
Voice VLAN Auto-Assignment 74
Dynamic VLAN 'Name' Assignment from RADIUS Attribute 76
Netflow / IPFIX Support 77
QoS Assignment and Rate Limiting for Quarantined VLANs 78
Persistent MAC Learning (Sticky MAC) 79
Split Port Mode for QSFP ports 80
Virtual Switch Extensions 81
MSTI Support 84
FortiLink Auto Network Configuration Policy 84
FortiLink MCLAG configuration in GUI 86
FortiLink Network Sniffer Extension 87
Leverage LLDP to Simplify Security Fabric Negotiation 89

FortiOS 6.2.0 New Features Guide 3


Fortinet Technologies Inc.
Fabric Connectors 93
Multiple Concurrent SDN/Cloud Connectors 93
Filter Lookup Improvement for SDN Connectors 96
Obtain full user information through the MS Exchange connector 98
Cloud Connector - AliCloud 100
Cloud Connector - AWS - IAM Support 103
SDN Connector - VMware ESXi 106
Kubernetes (K8s) 109
Private Cloud K8s Connector 109
AWS Kubernetes (EKS) Connector 112
Azure Kubernetes (AKS) Connector 114
GCP Kubernetes (GKE) Connector 117
Oracle Kubernetes (OKE) Connector 119
SDN Connector - Azure Stack 122
SDN Connector - OpenStack Domain Filter 125
Endpoint Connector - Cisco pxGrid 127
External Block List (Threat Feed) – Policy 131
External Block List (Threat Feed) - File Hashes 132
Update to AntiVirus Profile 135
Update to utm-virus category logs 137
External Block List (Threat Feed) - Authentication 138
Connector GUI Organization 138
SD-WAN 140
Overlay Controller VPN (OCVPN) 140
Hub-and-Spoke Support 140
ADVPN Support 147
Multiple VPN Support 147
OC-VPN Cloud Portal 147
SD-WAN Bandwidth Monitoring Service 148
Rule Definition Improvements 150
Load Balancing Per-Rule 150
Interface Cost 152
DSCP Matching (Shaping) 154
Traffic Shaping Schedules 158
Application Groups in Policies 160
Internet Service Groups in Policies 162
IPv6 Support (UI) 166
Forward Error Correction 169
Represent Multiple IPsec Tunnels as a Single Interface 171
Dual VPN Tunnel Wizard 172
BGP Additional Path Support 174
SLA Logging 177
Internet Service Customization 179
SLA Monitoring via REST API 180
Multi-Cloud 183
AWS Extensions 183

FortiOS 6.2.0 New Features Guide 4


Fortinet Technologies Inc.
Cross AZ High Availability Support 183
Google Cloud Platform (GCP) Extensions 187
HA Between Zones 187
Auto Scaling 190
Oracle Cloud Extensions 195
IAM Authentication 195
Paravirtualized Mode Support 198
Native Mode Support for OCI 200
High Availability Between Availability Domains 205
AliCloud Extensions 206
Auto Scaling 206
Support up to 18 Interfaces 210
OpenStack — Network Service Header (NSH) Chaining Support 212
Physical Function (PF) SR-IOV Driver Support 213
FortiMeter Extensions 214
FortiMeter - Microsoft Hyper-V Instances 214
FortiMeter - Fallback to Public FortiGuard 216
Automation and Dev-Ops 217
Trigger - FortiAnalyzer Event Handler 217
Trigger - FortiCloud-based IOC 220
Action - NSX Quarantine 221
Action - CLI Script 225
Action - Azure Function 227
Action - Google Cloud Function 229
Action - AliCloud Function 231
Action - Webhook Extensions 233
Advanced Threats 236
Flow-based Inspection 236
Web Filtering 236
Inspection Mode Per Policy 238
Statistics 242
Protocol Port Enforcement 244
IP Reputation Filtering 246
URL Certificate Blacklist 247
Global IP Address Information Database 251
Antivirus Performance Improvements 253
CIFS Support 253
IPv6 260
Combined IPv4 and IPv6 Policy 261
FortiGuard DNS Filter 262
File Filtering for Web and Email Filter Profiles 263
Move Botnet C&C into IPS Profile 268
Botnet IPs and Botnet Domains moved to Intrusion Prevention section 269
Botnet C&C Domain Blocking 270
Botnet C&C URL Blocking 270
Botnet C&C Signature Blocking 271

FortiOS 6.2.0 New Features Guide 5


Fortinet Technologies Inc.
IOT & OT 272
MAC Address-Based Policies 272
Device Summary and Filtering 274
SOC Adoption 276
Topology View — Consolidated Risk 276
FortiView — Subnet Filters 279
FortiView Dashboards and Widgets 281
FortiView Object Names 286
FortiView Top Sources Usability 289
FortiManager Cloud Service 291
FortiAnalyzer Cloud Service 294
Compliance 299
FortiSandbox Cloud Region Selection 299
FortiCloud Log and Sandbox licenses shown in FortiOS 299
FortiSandbox Cloud region selection 301
FortiGate-VM Unique Certificate 302
Run a File System Check Automatically 304
UX / Usability 306
SAML SSO 306
Logging - Session versus Attack Direction 311
Internet Service Improvement 313
Application Control Profile GUI Improvements 314
Authentication Policy Extensions 318
Workspace Mode 319
Extend Policy/Route Check to Policy Routing 321
Address Group - Exclusions 324
Automatic Address Creation for Attached Networks 325
Centralized Web Filtering Statistics 328
Traffic Shaping GUI Update 329
Unified Login for FortiCare and FortiGate Cloud 333
Split-Task VDOM Mode 337
Other 339
Extend Interface Failure Detection to Aggregate Interfaces 339
Source & Destination UUID Logging 340
DNS - Multiple Domain List 342
DNS - Latency Info 344
DNS - Add DNS Translation to DNS Profile 346
Multiple FortiAnalyzer (or Syslog) Per VDOM 347
Web Proxy 349
Transparent Web Proxy Forwarding 349
Multiple Dynamic Header Count 350
Restricted SaaS Access (0365, G-Suite, Dropbox) 353
Protocols 355
TLS 1.3 Support 355

FortiOS 6.2.0 New Features Guide 6


Fortinet Technologies Inc.
SMBv2 Support (SSL VPN) 357
PTPv2 (Slave Mode) 357
Telnet Disabled Option 359
SHA-1 Authentication Support (for NTPv4) 361
DNS over TLS 362
LLDP Reception 363
Direct IP Support for LTE/4G 365
Recognize AnyCast Address in Geo-IP Blocking 368
GTP in Asymmetric Routing 369
Firewall - Allow to Customize Default Service 370
Firewall - Anti-Replay Option Per-Policy 371
NTLM Extensions 371
Option to Disable Stateful SCTP Inspection 374
HA Failover Condition - SSD Failure 375
Option to Fragment IP Packets Before IPSec Encapsulation 376
DHCP Relay Agent Information Option 376
VLAN Inside VXLAN 378
ECMP Acceleration in NAT Mode 380
Disable all cloud communication 382
Custom SIP RTP Port Range Support 384
Custom Service Max Value Increase 385
FortiCarrier License Activation 385
GUI Alert on Login to VMX Security Nodes 386
Event Log Subtype for FortiExtender 387
Decouple FortiSandbox Cloud from FortiCloud 389
FortiGate Cloud 391
SNMP OID for Log Failed to Send 392
FortiGuard Distribution of Updated Apple Certificates (for token push notifications) 395
Active Directory Recursive Search Option 396
Web proxy global settings 397

FortiOS 6.2.0 New Features Guide 7


Fortinet Technologies Inc.
Change Log

Change Log

Date Change Description

2019-03-28 Initial release of FortiOS 6.2.0.

2019-04-02 Simplified FortiClient EMS server configuration feature added: FortiClient EMS on
page 29.

2019-04-08 URL Certificate Blacklist and Decouple FortiSandbox Cloud from FortiCloud features
added.

2019-04-09 Event Log Subtype for FortiExtender on page 387 added.

2019-04-10 Captive Portal for Compliance Failure on page 40 added.


Centralized Web Filtering Statistics on page 328 added.
Airtime Fairness on page 51 added.
Extended Details on AP Drill Down on page 54 added.

2019-04-11 SMBv2 Support (SSL VPN) on page 357 added.


Split-Task VDOM Mode on page 337 added.

2019-04-12 FortiGate Cloud on page 391 added.


Unified Login for FortiCare and FortiGate Cloud on page 333 added.
FortiView Dashboards and Widgets on page 281 added.
SNMP OID for Log Failed to Send on page 392 added.

2019-04-15 Trigger - FortiCloud-based IOC on page 220 added.


Endpoint Connector - Cisco pxGrid on page 127 added.

2019-04-17 HA Failover Condition - SSD Failure on page 375 added.


Endpoint Connector - Cisco pxGrid on page 127 added.

2019-04-18 FortiGuard Distribution of Updated Apple Certificates (for token push notifications) on
page 395 added.
Global IP Address Information Database on page 251 added.
Action - Azure Function on page 227 added.

2019-04-22 Interface Cost on page 152 added.


SLA Monitoring via REST API on page 180 added.
Direct SNMP Monitoring on page 71 added.
Direct IP Support for LTE/4G on page 365 added.
Automatic Address Creation for Attached Networks on page 325 added.
Device Summary and Filtering on page 274 added.
Internet Service Improvement on page 313 added.
External Block List (Threat Feed) – Policy on page 131 added.
FortiView Object Names on page 286 added.
FortiView Top Sources Usability on page 289 added.

FortiOS 6.2.0 New Features Guide 8


Fortinet Technologies Inc.
Change Log

Date Change Description

Comprehensive Report Extensions on page 33 added.

2019-04-23 LLDP Reception on page 363 added.


Active Directory Recursive Search Option on page 396 added.
Connector GUI Organization on page 138 added.
CIFS Support on page 253 added.

2019-04-29 Telemetry Integration - AWS Cloud Segments on page 14 added.


SAML SSO on page 306 added.
SAML SSO for Fabric Devices on page 16 added.

2019-05-07 FortiManager Cloud Service on page 291 added.

2019-06-10 FortiAnalyzer Cloud Service on page 294 added.

2019-08-20 Web proxy global settings on page 397 added.

2019-11-20 Obtain full user information through the MS Exchange connector on page 98 added.

FortiOS 6.2.0 New Features Guide 9


Fortinet Technologies Inc.
Expanding Fabric Family

This section lists the new features added to FortiOS for the expanding fabric family.
l Telemetry Integration - New FTNT Products on page 10
l Telemetry Integration - AWS Cloud Segments on page 14
l SAML SSO for Fabric Devices on page 16
l Split-Task VDOM Support on page 16
l Dynamic Policy - Fabric Devices on page 22
l Fabric Member Synchronization on page 24
l Security Rating on page 30
l Endpoint on page 36
l Wireless on page 43
l Switching on page 73
l Leverage LLDP to Simplify Security Fabric Negotiation on page 89

Telemetry Integration - New FTNT Products

With this version, you can add other Fortinet products to the Security Fabric. The following products are supported:
l FortiMail
l FortiWeb
l FortiADC
l FortiDDOS
l FortiWLC
In FortiGate, you can show device details and widgets in the following pages:
l Security Fabric Settings
l Security Fabric Physical Topology
l Security Fabric Logical Topology
l Dashboard widgets

FortiOS 6.2.0 New Features Guide 10


Fortinet Technologies Inc.
Expanding Fabric Family

Sample configuration

To configure Security Fabric devices in the GUI:

1. In Security Fabric > Settings, configure Fabric Devices so that they appear in the Topology field.

2. In the FortiGate Telemetry section, the Topology field shows the devices.

To configure Security Fabric devices in the CLI:

config system csf


...
config fabric-device
edit "FortiADC-1"
set device-ip 172.18.64.36
set access-token xxxxxx
next

FortiOS 6.2.0 New Features Guide 11


Fortinet Technologies Inc.
Expanding Fabric Family

edit "FML-1"
set device-ip 172.18.64.48
set access-token xxxxxx
next
edit "FWB-1"
set device-ip 172.18.64.49
set access-token xxxxxx
next
end
end

To configure the Security Fabric Physical Topology in the GUI:

1. Go to Security Fabric > Physical Topology to configure the physical topology.

FortiOS 6.2.0 New Features Guide 12


Fortinet Technologies Inc.
Expanding Fabric Family

To configure the Security Fabric Logical Topology in the GUI:

1. Go to Security Fabric > Logical Topology to configure the logical topology.

To view Security Fabric devices in the Dashboard:

1. Go to Dashboard > Main. The Security Fabric widget includes the Security Fabric devices.

FortiOS 6.2.0 New Features Guide 13


Fortinet Technologies Inc.
Expanding Fabric Family

To add Security Fabric devices in the Dashboard:

1. When you add a widget, you can add Security Fabric devices.

Telemetry Integration - AWS Cloud Segments

This feature adds cloud segments to the Security Fabric topology view, including:
l Instance Details
l Instance ID
l Known CVEs
The AWS instance can be seeing in the Physical Topology at Security Fabric > Physical Topology.

FortiOS 6.2.0 New Features Guide 14


Fortinet Technologies Inc.
Expanding Fabric Family

The instance is connected through the Cloud, and shows the Instance ID.
Downstream clients also show an Instance ID, and CVEs that are discovered from AWS inspector are shown.

AWS is shown in the Logical Topology at Security Fabric > Logical Topology.
The subnet ID is shown beside the port, and the client devices are grouped accordingly.

The CVE and instance ID are also shown.

FortiOS 6.2.0 New Features Guide 15


Fortinet Technologies Inc.
Expanding Fabric Family

SAML SSO for Fabric Devices

When Security Fabric is enabled, the root FortiGate will be configured as the Identify Provider (IdP) by default. When
added to the Security Fabric, downstream FortiGates will automatically be configured as Service Providers (SP) and
provided all the links required for SAML communication. Administrators must still be authorized on each device, but log
in credentials are shared between devices. Once authorized, an administrator can move between fabric devices without
logging in again.
Optionally, the downstream FortiGate can also be manually configured as an SP and then linked to the root FortiGate.
See SAML SSO on page 306 for instructions.
The authentication service is provided by the root FortiGate using local system admin accounts for authentication. Any
of the administrator account types can be used for SAML log in. After successful authentication, the administrator logs
in to the first downstream FortiGate SP (see SAML SSO on page 306), and can then connect to other downstream
FortiGates that have the SSO account properly configured, without needing to provide credentials again.

Split-Task VDOM Support

This feature adds support for Security Fabric in split-task VDOM mode.

FortiOS 6.2.0 New Features Guide 16


Fortinet Technologies Inc.
Expanding Fabric Family

Security Fabric topology

Security Fabric setting

FortiGate Telemetry can now be enabled in split-task VDOM mode. FortiGate telemetry settings are available on the
Security Fabric > Settings page.

Telemetry settings are shown in both global and VDOM contexts, but in VDOM contexts only the Topology and
FortiTelemetry enabled interfaces fields are shown.
If the upstream FortiGate has split-task VDOM mode enabled, it can allow downstream FortiGates to join the Security
Fabric in the root and FG-traffic VDOMs. If the downstream FortiGate has split-task VDOM mode enabled, it can only
connect to the upstream FortiGate via the downstream FortiGate interface in the root VDOM.

FortiOS 6.2.0 New Features Guide 17


Fortinet Technologies Inc.
Expanding Fabric Family

Physical topology

The global Physical Topology page shows the root FortiGate and all downstream FortiGates that are in the same
Security Fabric.

FortiOS 6.2.0 New Features Guide 18


Fortinet Technologies Inc.
Expanding Fabric Family

The root or FG-traffic VDOMs' Physical Topology page shows the root FortiGate and only the downstream FortiGates
that connect to the current VDOM on the root FortiGate.

Logical topology

FortiGate interfaces are grouped by VDOMs. The global Logical Topology page shows the root FortiGate and all
downstream FortiGates that are in the same Security Fabric, including interfaces' connection information.

FortiOS 6.2.0 New Features Guide 19


Fortinet Technologies Inc.
Expanding Fabric Family

The root or FG-traffic VDOMs' Logical Topology page shows the root FortiGate and only the downstream FortiGates
that connect to the current VDOM on the root FortiGate, including interfaces' connection information.

Dashboard Security Fabric widget

The global Dashboard page shows the root FortiGate and all downstream FortiGates in the Security Fabric widget.

FortiOS 6.2.0 New Features Guide 20


Fortinet Technologies Inc.
Expanding Fabric Family

The root or FG-traffic VDOMs' Dashboard page shows the root FortiGate and only the downstream FortiGates that
connect to the current VDOM on the root FortiGate in the Security Fabric widget.

FortiOS 6.2.0 New Features Guide 21


Fortinet Technologies Inc.
Expanding Fabric Family

Dynamic Policy - Fabric Devices

A new dynamic address group is added in 6.2, which represents the configured IP addresses of all Fortinet devices
connected to the Security Fabric. In this first phase, it includes FortiManager, FortiAnalyzer, FortiClient EMS, FortiMail,
FortiAP(s), and FortiSwitch(es). Like other dynamic address groups for fabric connectors, this can be used in IPv4
policies and objects.
Firewall address now includes a new default address object called FABRIC_DEVICE, and you can apply the address
object to the following types of policies:
l IPv4 firewall policy (including virtual wire pairs)
l IPv4 shaping policy
l IPv4 ACL policy
l Policy64 and Policy46 (IPv4 only)
l Consolidated policy (IPv4 only)
You cannot apply the FABRIC_DEVICE object to the following types of policies:
l All IPv6 policies
l IPv4 explicit proxy policy
You also cannot use the FABRIC_DEVICE object with the following settings:
l Custom/extension internet-service
l Exclusion of addrgrp
Initially the FABRIC_DEVICE object, does not have an address value. The address value is populated dynamically as
things change. As a result, you cannot edit the FABRIC_DEVICE object, add any addresses to the object, or remove
any addresses from the object.
The address values of the FABRIC_DEVICE object are populated based on:
l FortiAnalyzer IP (from the Fabric Settings pane)
l FortiManager IP (from the Fabric Settings pane)
l FortiMail IP (from the Fabric Settings pane)
l FortiClient EMS IP (from the Fabric Settings pane)
l FortiAP IPs (from the FortiAP Setup pane or DHCP)
l FortiSwitch IPs (from the FortiSwitch Setup page or DHCP)
Example of the FABRIC_DEVICE object applied in an IPv4 policy:

Example of the FABRIC_DEVICE object in the Edit Address pane. The pane includes only a Return button because
the object is read-only:

FortiOS 6.2.0 New Features Guide 22


Fortinet Technologies Inc.
Expanding Fabric Family

Example of the FABRIC_DEVICE object applied in an IPv4 policy:


FGT-300D_A (root) # show fu firewall address FABRIC_DEVICE
config firewall address
edit "FABRIC_DEVICE"
set type ipmask
set comment "IPv4 addresses of Fabric Devices."
set visibility enable
set associated-interface ''
set color 0
set allow-routing disable
set subnet 0.0.0.0 0.0.0.0
next
end
FGT-300D_A (root) #
FGT-300D_A (root) # show firewall policy
config firewall policy
edit 1
set uuid cbe9e74c-37c6-51e9-9cf1-9510b503f2bf
set srcintf "port2"
set dstintf "port1"
set srcaddr "all"
set dstaddr "FABRIC_DEVICE"
set action accept
set schedule "always"
set service "ALL"
set utm-status enable
set fsso disable
set nat enable
next
end
FGT-300D_A (root) #

Example of the diagnose command, which is used to list what IP addresses are included in FABRIC_DEVICE. For now,
this is only method to list content in the FABRIC_DEVICE object:
FGT-300D_A (root) # diagnose firewall iprope list 100004
policy index=1 uuid_idx=25 action=accept
flag (8050108): redir nat master use_src pol_stats
flag2 (4000): resolve_sso
flag3 (20):
schedule(always)
cos_fwd=255 cos_rev=255
group=00100004 av=00004e20 au=00000000 split=00000000
host=0 chk_client_info=0x0 app_list=0 ips_view=0

FortiOS 6.2.0 New Features Guide 23


Fortinet Technologies Inc.
Expanding Fabric Family

misc=0 dd_type=0 dd_mode=0


zone(1): 10 -> zone(1): 9
source(1): 0.0.0.0-255.255.255.255, uuid_idx=3,
dest(5): 172.18.64.48-172.18.64.48, uuid_idx=1, 172.18.60.25-172.18.60.25, uuid_idx=1,
172.18.52.154-172.18.52.154, uuid_idx=1, 172.18.28.31-172.18.28.31, uuid_idx=1,
172.18.62.6-172.18.62.6, uuid_idx=1,
service(1):
[0:0x0:0/(0,65535)->(0,65535)] helper:auto
FGT-300D_A (root) #

Fabric Member Synchronization

This section lists new fabric member synchronization features added to FortiOS for the expanding fabric family.
l Simplify FortiAnalyzer Pairing on page 24
l FortiSandbox on page 26
l FortiClient EMS on page 29

Simplify FortiAnalyzer Pairing

This version simplifies the pairing of FortiAnalyzer and FortiGate by using certificate verification to allow the FortiGate
admin to preauthorize access.
When configuring FortiAnalyzer in the root FortiGate, FortiGate has an option to allow FortiAnalyzer to access the
FortiGate REST API. FortiGate verifies the FortiAnalyzer by retrieving the FortiAnalyzer serial number and checking it
against the FortiAnalyzer certificate. After verification, the FortiAnalyzer serial number is stored in the FortiGate
configuration.
Then on the FortiAnalyzer side, the admin authorizes FortiGates in the same Security Fabric. After authorization, the
FortiGates can form a Security Fabric in the FortiAnalyzer side without entering the admin credentials of the root
FortiGate.

FortiOS 6.2.0 New Features Guide 24


Fortinet Technologies Inc.
Expanding Fabric Family

Sample configuration

To configure FortiAnalyzer in the root FortiGate GUI:

1. Go to Security Fabric > Settings.


2. Enable FortiGate Telemetry and configure settings.

To configure FortiAnalyzer in the root FortiGate CLI:

config log fortianalyzer setting


set status enable
set server "10.6.30.250"
set certificate-verification enable
set serial "FL-4HET318900407"
set access-config enable
set upload-option realtime
set reliable enable
end

To authorize FortiGates in the same Security Fabric using the FortiAnalyzer GUI:

1. In FortiAnalyzer, go to Device Manager and select the FortiGates to be authorized.

FortiOS 6.2.0 New Features Guide 25


Fortinet Technologies Inc.
Expanding Fabric Family

2. After a moment, the FortiGates can form a Security Fabric in the FortiAnalyzer without entering the admin
credentials of the root FortiGate.

3. Go to the FortiGate to see the FortiAnalyzer logging information.

FortiSandbox

FortiSandbox connection information is defined on the Security Fabric Settings page, and is now synchronized between
all fabric members.

To configure a FortiSandbox appliance or FortiSandbox Cloud through the root FortiGate:

1. Navigate to Security Fabric > Settings.


2. Sandbox inspection displays as enabled and shows FortiSandbox settings for the FortiSandbox Appliance or
FortiSandbox Cloud.

FortiOS 6.2.0 New Features Guide 26


Fortinet Technologies Inc.
Expanding Fabric Family

l FortiSandbox Appliance:

l FortiSandbox Cloud:

FortiOS 6.2.0 New Features Guide 27


Fortinet Technologies Inc.
Expanding Fabric Family

To view FortiSandbox settings from a downstream FortiGate:

1. Navigate to Security Fabric > Settings.


2. FortiSandbox settings cannot be accessed when configuring a downstream FortiGate to join the Security Fabric.

3. Once the downstream FortiGate successfully joins the Security Fabric, FortiSandbox settings are synced from the
root FortiGate and cannot be changed from the downstream FortiGate.
l FortiSandbox Appliance:

FortiOS 6.2.0 New Features Guide 28


Fortinet Technologies Inc.
Expanding Fabric Family

l FortiSandbox Cloud:

FortiClient EMS

This feature simplifies enabling and configuring FortiClient EMS servers in the Security Fabric. Up to three EMS servers
can be added on the global Security Fabric Settings page using the servers' IP addresses, and all EMS settings are
synchronized between all fabric members.

To configure FortiClient EMS servers in the GUI:

1. On the FortiGate, go to Security Fabric > Settings.


2. Enable FortiClient Endpoint Management System (EMS).
3. Click the plus bar to add an EMS server.
4. Enter a name for the server, it's IP/Domain Name, Serial Number, Admin User, and Password (if required) in the
requisite fields.

FortiOS 6.2.0 New Features Guide 29


Fortinet Technologies Inc.
Expanding Fabric Family

5. Add up to two more servers as needed.

6. Click Apply.

To configure FortiClient EMS servers using the CLI:

config endpoint-control fctems


edit "ems_133"
set server "172.16.200.133"
set serial-number "FCTEMS1234567890"
set https-port 10443
set admin-username "admin"
next
edit "ems_134"
set server "172.16.200.134"
set serial-number "FCTEMS1234567891"
set https-port 10443
set admin-username "admin"
next
edit "ems_135"
set server "172.16.200.135"
set serial-number "FCTEMS1234567892"
set https-port 10443
set admin-username "admin"
next
end

Security Rating

l Security Rating - Extend Checks to FortiAnalyzer on page 31


l Security Rating – Historical Rating Dashboard Widget on page 32
l Comprehensive Report Extensions on page 33

FortiOS 6.2.0 New Features Guide 30


Fortinet Technologies Inc.
Expanding Fabric Family

Security Rating - Extend Checks to FortiAnalyzer

In 6.2, the Security Rating feature can verify FortiAnalyzer configurations and report the results for Compatible
Firmware and Admin Idle Timeout.

To view FortiAnalyzer information and tests in Security Rating:

1. Navigate to Security Fabric > Security Rating.


2. The Security Rating results page displays the FortiAnalyzer icon in the topology field, and FortiAnalyzer information
is available through the tooltip.

3. The Compatible Firmware and Admin Idle Timeout tests for FortiAnalyzer are now available:
l Compatible Firmware:

FortiOS 6.2.0 New Features Guide 31


Fortinet Technologies Inc.
Expanding Fabric Family

l Admin Idle Timeout:

Security Rating – Historical Rating Dashboard Widget

A new System Dashboard widget is added in FortiGate which retrieves and displays the historical security rating trends
for the Security Fabric.
This version adds a historical security rating score chart to the existing Security Rating Dashboard widget that shows the
security rating results over time.
The Security Rating Dashboard widget has two new views:
l A view to show the historical security rating scores over time, along with the industry average for comparison.
l A view to show historical security rating scores percentile over time.
The following are available in both views:
l You can select All Industries or My Industry.
l You can select All Regions or My Region.
l You can select Account Registered Region and Industry.
l The widget displays only one result per day from FortiAnalyzer.

Sample Security Rating widget showing historical score

The blue line represents the FortiGate Security Rating score.


The red line represents the Region & Industry Average score.

FortiOS 6.2.0 New Features Guide 32


Fortinet Technologies Inc.
Expanding Fabric Family

Sample Security Rating widget showing historical percentile

The blue line represents the FortiGate Security Rating percentile against the selected Region and Industry.

Comprehensive Report Extensions

This feature adds extensions to the Security Rating report, including:


l Summary charts along the top. You can click a chart for easy filtering.
l Grouping common rating checks across multiple devices in a single entry.
l Right frame summarizes all information for the single check.
l You can "Easy Apply" recommendations from within the single page – simpler than the two step process in previous

FortiOS 6.2.0 New Features Guide 33


Fortinet Technologies Inc.
Expanding Fabric Family

versions.
l Choose to show full results or subsets such as failed only, etc.

Sample configuration

The default view for the Security Rating Report.

Security Rating Report with a specific test selected.

Additional details on each compliance test.

FortiOS 6.2.0 New Features Guide 34


Fortinet Technologies Inc.
Expanding Fabric Family

You can select Easy Apply for individual recommendations.

Security Rating Report Summary.

Security Rating Report with full results including passed and failed tests.

FortiOS 6.2.0 New Features Guide 35


Fortinet Technologies Inc.
Expanding Fabric Family

Endpoint

This section lists new endpoint features added to FortiOS for the expanding Fabric family:
l Dynamic Policy – FortiClient EMS (Connector) on page 36
l Captive Portal for Compliance Failure on page 40
l FortiToken Cloud on page 42

Dynamic Policy – FortiClient EMS (Connector)

This feature introduces a dynamic policy connector for FortiClient EMS. This allows objects to be defined on the
FortiGate which map to tags/groups on EMS. EMS dynamically updates these endpoint groups when host compliance
or other events happen. This causes FortiOS to dynamically adjust the security policy based on those group definitions.
EMS can define compliance verification rules based on criteria such as certificates, the logged in domain, files present,
OS versions, running processes, and registry keys. When a FortiClient endpoint registers to EMS, EMS dynamically
groups the endpoint based on the compliance verification rules. FortiOS can receive the dynamic endpoint groups from
EMS via the FSSO protocol, using the new "fortiems" FSSO agent type which supports SSL and imports trusted
certificates.
After FortiOS pulls the tags from EMS via the FSSO protocol, you can create user groups based on the tags, then apply
dynamic firewall policies to the user groups. When host compliance or other events happen, EMS sends updates to
FortiOS to update the dynamic policies.
The following instructions assume that EMS is installed, configured, and has endpoints connected. For information on
configuring EMS, see the FortiClient EMS Administration Guide.
This feature is only available when using FortiOS with EMS 6.2.0 or later.

To add a compliance verification rule in EMS:

This example creates a compliance verification rule that applies to endpoints that have Windows 10 installed.

FortiOS 6.2.0 New Features Guide 36


Fortinet Technologies Inc.
Expanding Fabric Family

1. In EMS, go to Compliance Verification > Compliance Verification Rules, and click Add.
2. In the Name field, enter the desired rule name. Note that EMS uses the tag name to dynamically group endpoints,
not the rule name configured in this field.
3. Toggle Status on or off to enable or disable the rule.
4. For Type, select Windows, Mac, or Linux. This affects what rule types are available. In this example, Windows is
selected.
5. From the Rule dropdown list, select the rule type and configure the related options. Ensure you click the + button
after entering each criterion.

Rule type Description

Certificate In the Subject and Issuer fields, enter the certificate subject and issuer. You
can enter multiple certificates using the + button. You can also use the NOT
option to indicate that the rule requires that a certain certificate is not present
for the endpoint.
The endpoint must satisfy all conditions to satisfy this rule. For example, if the
rule is configured to require certificate A, certificate B, and NOT certificate C,
then the endpoint must have both certificates A and B and not certificate C.

Logged in Domain In the Domain field, enter the domain name. You can enter multiple domain
names using the + button. If the rule is configured for multiple domains, the
endpoint is considered as satisfying the rule if it belongs to one of the
configured domains. This option is not available for Linux endpoints.

File In the File field, enter the file path. You can enter multiple files using the +
button. You can also use the NOT option to indicate that the rule requires that
a certain file is not present on the endpoint.
The endpoint must satisfy all conditions to satisfy this rule. For example, if the
rule is configured to require file A, file B, and NOT file C, then the endpoint
must have both files A and B and not file C.

OS Version From the OS Version field, select the OS version. You can enter multiple
OS versions using the + button. If the rule is configured for multiple
OS versions, the endpoint is considered as satisfying the rule if it has one of
the configured OS versions installed.

Running Process In the Running Process field, enter the process name. You can enter multiple
processes using the + button. You can also use the NOT option to indicate
that the rule requires that a certain process is not running on the endpoint.
The endpoint must satisfy all conditions to satisfy this rule. For example, if the
rule is configured to require process A, process B, and NOT process C, then
the endpoint must have both processes A and B running and process C not
running.

Registry Key In the Registry Key field, enter the registry key value. You can enter values
using the + button. You can also use the NOT option to indicate that the rule
requires that a certain registry key is not present on the endpoint.
The endpoint must satisfy all conditions to satisfy this rule. For example, if the
rule is configured to require registry key A, registry key B, and NOT registry key
C, then the endpoint must have both registry keys A and B and not registry key
C.

FortiOS 6.2.0 New Features Guide 37


Fortinet Technologies Inc.
Expanding Fabric Family

Rule type Description

This option is only available for Windows endpoints.

In this example, OS Version is selected from the Rule dropdown list, and Windows 10 is then selected from the
OS Version dropdown list.
6. Under Assign to, select All.
7. In the Tag endpoint as dropdown list, select an existing tag or enter a new tag. In this example, a new tag, WIN10_
EMS134, is created. EMS uses this tag to dynamically group together endpoints that satisfy the rule, as well as any
other rules that are configured to use this tag.
8. Click Save.

9. Go to Compliance Verification > Host Tag Monitor. All endpoints that have Windows 10 installed are shown
grouped by the WIN10_EMS134 tag.

To configure the fortiems FSSO agent:

In the FortiOS CLI, run the following commands. In this example, the FSSO agent name is ems_02, and the
EMS server is located at 172.16.200.134.
config user fsso
edit "ems_02"
set server "172.16.200.134"
set password 123456
set type fortiems
set ssl enable
set ssl-trusted-cert "Fortinet_CA"
next
end

To configure EMS FSSO groups:

In the FortiOS CLI, run the following commands. In this example, the FSSO groups for two FSSO agents, ems_02 and
ems_03, are being configured. The WIN10_EMS134 dynamic endpoint group is added to the ems_02 FSSO group, and
the MAC_TEAMVIEWER_EMS135 dynamic endpoint group is added to the ems_03 FSSO group.
config user adgrp

FortiOS 6.2.0 New Features Guide 38


Fortinet Technologies Inc.
Expanding Fabric Family

edit "TAG_WIN10_EMS134"
set server-name "ems_02"
next
edit "TAG_MAC_TEAMVIEWER_EMS135"
set server-name "ems_03"
next
end​​

To configure a user group based on EMS tags:

1. In FortiOS, go to User & Device > User Groups. Click Create New.
2. In the Name field, enter the desired name.
3. For Type, select Fortinet Single Sign-On (FSSO).
4. In the Members field, click +. The Select Entries pane appears. You can identify the dynamic endpoint groups
pulled from EMS because the names begin with TAG_, followed by the tag name from EMS.

5. Select the desired dynamic endpoint groups. Endpoints that currently belong to this dynamic endpoint group in
EMS will be members of this FortiOS user group.
6. Click OK.

To create a dynamic firewall policy for the user group:

You can now create a dynamic firewall policy for the user group. In this example, an IPv4 policy is created for the user
group.
1. In FortiOS, go to Policy & Objects > IPv4 Policy. Click Create New.
2. In the Source field, click +. The Select Entries pane appears. On the User tab, select the user group configured
above.
3. Configure other options as desired. Click OK.
4. Go to Policy & Objects > IPv4 Policy to ensure the policy was created and applied to the desired user group.
FortiOS will update this policy when it receives updates from EMS.

FortiOS 6.2.0 New Features Guide 39


Fortinet Technologies Inc.
Expanding Fabric Family

Captive Portal for Compliance Failure

FortiOS 6.2.0 replaces the endpoint compliance profile with the EMS connector. FortiGate supports a customizable
captive portal to direct users to install or enable the required software.
FortiOS supports per-policy custom disclaimers. For example, you may want to configure three firewall policies, each of
which matches traffic from endpoints with different FortiClient statuses:

Endpoint status FortiOS behavior

Endpoint does not have Traffic matches a firewall policy that displays an in-browser warning to install
FortiClient installed. FortiClient from the provided link.

Endpoint has FortiClient Traffic matches a dynamic firewall policy which allows the endpoint to reach its
installed, registered to EMS, and destination via this policy.
connected to the FortiGate.

Endpoint is deregistered from Traffic matches another dynamic firewall policy that displays warning to register
EMS and disconnected from the FortiClient to EMS.
FortiGate.

To configure this feature in the GUI:

1. In the FortiOS CLI, run the following commands to enable per-policy disclaimer messages:
config user setting
set auth-cert "Fortinet_Factory"
set per-policy-disclaimer enable
end
2. Go to Policy & Objects > IPv4 Policy and select the desired policy for when the endpoint does not have FortiClient
installed.
3. Under Disclaimer Options, enable Display Disclaimer.
4. Enable Customize Messages.
5. Click Edit Disclaimer Message.
6. FortiOS displays the default disclaimer message. Edit the disclaimer to warn users to install FortiClient and provide
the FortiClient download link. Click Save.

FortiOS 6.2.0 New Features Guide 40


Fortinet Technologies Inc.
Expanding Fabric Family

7. Repeat steps 2-6 for each desired policy, creating custom disclaimers as desired.

To configure this feature in the CLI:

config user setting


set auth-cert "Fortinet_Factory"
set per-policy-disclaimer enable
end
config firewall policy
edit 1
set name "111"
set uuid c3ad8da0-bd7c-51e8-c0da-fe9053bf35ae
set srcintf "port12"
set dstintf "port11"
set srcaddr "all"
set dstaddr "pc155_address"
set action accept
set schedule "always"
set service "ALL"
set wsso disable
set groups "ems_03_group"
set disclaimer enable
set replacemsg-override-group "test"
set nat enable
next
edit 4
set name "44"
set uuid 686ea2ca-348d-51e9-9dca-b2b4b4aabbe2
set srcintf "port12"
set dstintf "port11"
set srcaddr "all"
set dstaddr "pc5-address"
set action accept
set schedule "always"
set service "ALL"

FortiOS 6.2.0 New Features Guide 41


Fortinet Technologies Inc.
Expanding Fabric Family

set wsso disable


set groups "ems_03_group"
set disclaimer enable
set replacemsg-override-group "test2"
set nat enable
next
edit 6
set name "66"
set uuid f1034e52-36d5-51e9-fbae-da21922ccd10
set srcintf "port12"
set dstintf "port11"
set srcaddr "all"
set dstaddr "all"
set status disable
set schedule "always"
set service "ALL"
set logtraffic all
set fsso disable
set block-notification enable
set replacemsg-override-group "endpoint-override"
next
end

FortiToken Cloud

This feature adds centralized token authentication in the cloud, as opposed to built into FortiGate or FortiAuthenticator,
simplifying FortiToken management and provisioning.

To configure the centralized token authentication in the cloud on the FortiGate:

1. Enable the FortiToken cloud service feature:


config system global
set fortitoken-cloud-service enable
end

2. Assign the FortiCloud token to local users or administrators using the fortitoken-cloud option:
config user local
edit "test-cl3"
set type password
set two-factor fortitoken-cloud
set email-to .........
...
next
end

The following commands can be used to manage FortiCloud users:

Command Description

diagnose ftk-cloud show users Show all current users on the FortiCloud server.

diagnose ftk-cloud delete user Delete the specified user from FortiCloud.
<username>

FortiOS 6.2.0 New Features Guide 42


Fortinet Technologies Inc.
Expanding Fabric Family

Command Description

diagnose ftk-cloud sync Update the information on the FortiCloud server after changing an email address
or phone number on the FortiGate.

diagnose ftk-cloud server Change the current FortiCloud server. All FortiCloud related operations on the
<server_ip> FortiGate will be synchronized with the new server.

Wireless

This section lists new wireless features added to FortiOS for the expanding fabric family.
l WiFi Location Map on page 43
l Monitor and Suppress Phishing SSID on page 47
l WiFi QoS Enhancement on page 49
l Airtime Fairness on page 51
l Extended Details on AP Drill Down on page 54
l Troubleshooting – Extended Logging on page 57
l Override WiFi Certificates (from GUI) on page 67
l Wireless MAC Filter Updates on page 68
l Change SSID to VDOM Object on page 70
l Direct SNMP Monitoring on page 71

WiFi Location Map

This feature allows you to upload custom maps or floor plans and then place FortiAP units on the map. Wifi Maps show
real-time status and alerts for the FortiAP units on the map. This features gives you an intuitive view of the location and
status of each FortiAP unit on the map.

FortiOS 6.2.0 New Features Guide 43


Fortinet Technologies Inc.
Expanding Fabric Family

To set up WiFi Maps:

1. Obtain a floor plan or map of where FortiAP units are located.


2. Go to WiFi & Switch Controller > WiFi Maps and click Add Map.

3. Click Upload and specify a map in PNG, JPEG, or GIF format to be uploaded.
a. Enter the Map name, for example, Level-2.
b. If you want, enable Image grayscale to change a color map to grayscale.
c. Set Image opacity to specify map transparency.

4. Click OK.
After setting up a WiFi map, you can place FortiAP units on the map.

FortiOS 6.2.0 New Features Guide 44


Fortinet Technologies Inc.
Expanding Fabric Family

5. At the top left, click the lock icon to modify the map; and then click the Unplaced AP(s) icon to display the list of
unplaced APs.

6. Drag and drop each FortiAP unit onto its location on the map.

7. When all FortiAP units have been placed on the map, click the lock icon.
The WiFi map shows where each FortiAP unit is located.

FortiOS 6.2.0 New Features Guide 45


Fortinet Technologies Inc.
Expanding Fabric Family

To view a FortiAP unit's operating data, hover over that FortiAP icon.

To view a FortiAP unit's detailed operating data, click that FortiAP icon.

FortiOS 6.2.0 New Features Guide 46


Fortinet Technologies Inc.
Expanding Fabric Family

In Wifi Maps, you can select to show the 2.4 GHz or 5 GHz band or both. You can also show numerical operating
information such as client count, channel, radio TX power, and channel utilization.

You must use the GUI to upload WiFi maps.

To configure WiFi map settings using CLI commands, see the following examples:

config wireless-controller region


edit "Level-2"
set grayscale enable
set opacity 40
next
end

config wireless-controller wtp


edit "FP423E3X16000320"
set region "Level-2"
set region-x "0.660498"
set region-y "0.442825"
next
end

Monitor and Suppress Phishing SSID

In addition to rogue AP detection, wireless administrators should also be concerned about phishing SSIDs, which are
defined as either:
l An SSID defined on FortiGate that is broadcast from an uncontrolled AP
l A pre-defined pattern for an offending SSID pattern
For example, you could define any SSID that contains your company name to be a phishing SSID.
This new feature enables FortiAP to monitor and report these SSIDs in logs and to optionally suppress them.

FortiOS 6.2.0 New Features Guide 47


Fortinet Technologies Inc.
Expanding Fabric Family

You can only configure this feature by using the CLI:


config wireless-controller setting
set phishing-ssid-detect enable|disable
set fake-ssid-action log|suppress
config offending-ssid
edit 1
set ssid-pattern "OFFENDING*"
set action log|suppress
next
end
end

The set phishing-ssid-detect enable|disable option enables or disables the phishing SSID detection
feature. The default setting is enable.
The set fake-ssid-action log|suppress option defines what action FortiGate takes after detecting a fake
SSID. The default setting is log, and can be set to either one or both.
The set ssid-pattern OFFENDING* option defines what criteria which will be used to match an offending
SSID. In this case, it means all SSID names with leading string OFFENDING, which is not case-sensitive.
The set action log|suppress defines what action FortiGate takes after detecting the corresponding offending
SSID pattern entry. The default setting is log and can be set to either one or both.

Log examples

WiFi event log sample for fake SSID detection

Following is a sample of the log that is generated when a fake SSID is first detected:
1: date=2019-03-01 time=14:53:23 logid="0104043567" type="event" subtype="wireless"
level="warning" vd="root" eventtime=1551480803 logdesc="Fake AP detected" ssid="CORP_
WIFI_ACCESS" bssid="08:5b:0e:18:1b:d0" aptype=0 rate=130 radioband="802.11n-5G"
channel=149 action="fake-ap-detected" manuf="Fortinet, Inc." security="WPA2 Personal"
encryption="AES" signal=-41 noise=-95 live=173397 age=0 onwire="no"
detectionmethod="N/A" stamac="N/A" apscan="N/A" sndetected="FP321C3X15001615"
radioiddetected=1 stacount=0 snclosest="FP321C3X15001615" radioidclosest=1 apstatus=0
msg="Detected Fake AP CORP_WIFI_ACCESS 08:5b:0e:18:1b:d0 chan 149 live 173397 age 0"

Following is a sample of the log that is periodically generated when a fake SSID is continuously detected:
1: date=2019-03-01 time=14:58:53 logid="0104043568" type="event" subtype="wireless"
level="warning" vd="root" eventtime=1551481133 logdesc="Fake AP on air" ssid="CORP_
WIFI_ACCESS" bssid="08:5b:0e:18:1b:d0" aptype=0 rate=130 radioband="802.11n-5G"
channel=149 action="fake-ap-on-air" manuf="Fortinet, Inc." security="WPA2 Personal"
encryption="AES" signal=-41 noise=-95 live=173728 age=330 onwire="no"
detectionmethod="N/A" stamac="N/A" apscan="N/A" sndetected="N/A" radioiddetected=0
stacount=0 snclosest="FP321C3X15001615" radioidclosest=1 apstatus=0 msg="Fake AP On-
air CORP_WIFI_ACCESS 08:5b:0e:18:1b:d0 chan 149 live 173728 age 330"

WiFi event log sample for fake SSID suppression

Following is a sample of the log that is generated when a fake SSID is suppressed:
1: date=2019-03-01 time=14:53:23 logid="0104043569" type="event" subtype="wireless"
level="warning" vd="root" eventtime=1551480803 logdesc="Rogue AP suppressed"
ssid="CORP_WIFI_ACCESS" bssid="08:5b:0e:18:1b:d0" aptype=0 rate=130
radioband="802.11n-5G" channel=149 action="rogue-ap-suppressed" manuf="Fortinet, Inc."
security="WPA2 Personal" encryption="AES" signal=-41 noise=-95 live=173397 age=0

FortiOS 6.2.0 New Features Guide 48


Fortinet Technologies Inc.
Expanding Fabric Family

onwire="no" detectionmethod="N/A" stamac="N/A" apscan="N/A" sndetected="N/A"


radioiddetected=0 stacount=0 snclosest="FP321C3X15001615" radioidclosest=1 apstatus=0
msg="AP CORP_WIFI_ACCESS 08:5b:0e:18:1b:d0 chan 149 live 173397 age 0"

WiFi event log sample for offending SSID detection

Following a sample of the log that is generated when an offending SSID is first detected:
1: date=2019-03-01 time=14:53:33 logid="0104043619" type="event" subtype="wireless"
level="warning" vd="root" eventtime=1551480811 logdesc="Offending AP detected"
ssid="OFFENDING_SSID" bssid="1a:5b:0e:b5:f3:bf" aptype=0 rate=130 radioband="802.11n-
5G" channel=153 action="offending-ap-detected" manuf="Fortinet, Inc." security="WPA2
Personal" encryption="AES" signal=-41 noise=-95 live=173406 age=8 onwire="no"
detectionmethod="N/A" stamac="N/A" apscan="N/A" sndetected="FP321C3X15001615"
radioiddetected=1 stacount=0 snclosest="FP321C3X15001615" radioidclosest=1 apstatus=0
msg="Detected Offending AP OFFENDING_SSID 1a:5b:0e:b5:f3:bf chan 153 live 173406 age
8"

Following is a sample of a log that is periodically generated when an offending SSID is continuously detected:
1: date=2019-03-01 time=14:55:54 logid="0104043620" type="event" subtype="wireless"
level="warning" vd="root" eventtime=1551480952 logdesc="Offending AP on air"
ssid="OFFENDING_SSID_TEST" bssid="9a:5b:0e:18:1b:d0" aptype=0 rate=130
radioband="802.11n-5G" channel=149 action="offending-ap-on-air" manuf="N/A"
security="WPA2 Personal" encryption="AES" signal=-41 noise=-95 live=173548 age=150
onwire="no" detectionmethod="N/A" stamac="N/A" apscan="N/A" sndetected="N/A"
radioiddetected=0 stacount=0 snclosest="FP321C3X15001615" radioidclosest=1 apstatus=0
msg="Offending AP On-air OFFENDING_SSID_TEST 9a:5b:0e:18:1b:d0 chan 149 live 173548
age 150"

WiFi event log sample for offending SSID suppression

Following is a sample of the log that is generated when an offending SSID is suppressed:
1: date=2019-03-01 time=14:53:33 logid="0104043569" type="event" subtype="wireless"
level="warning" vd="root" eventtime=1551480811 logdesc="Rogue AP suppressed"
ssid="OFFENDING_SSID" bssid="1a:5b:0e:b5:f3:bf" aptype=0 rate=130 radioband="802.11n-
5G" channel=153 action="rogue-ap-suppressed" manuf="Fortinet, Inc." security="WPA2
Personal" encryption="AES" signal=-41 noise=-95 live=173406 age=8 onwire="no"
detectionmethod="N/A" stamac="N/A" apscan="N/A" sndetected="N/A" radioiddetected=0
stacount=0 snclosest="FP321C3X15001615" radioidclosest=1 apstatus=0 msg="AP OFFENDING_
SSID 1a:5b:0e:b5:f3:bf chan 153 live 173406 age 8"

WiFi QoS Enhancement

This feature enables FortiGate to preserve the WiFi Multi-Media (WMM) QoS marking of packets by translating them to
Differentiated Services Code Point (DSCP) values when forwarding upstream.
The following QoS profile commands are added to the CLI:

wmm-dscp-marking Enable/disable WMM Differentiated Services Code Point (DSCP) marking (default =
disable).
wmm-vo-dscp DSCP marking for voice access (default = 48).
wmm-vi-dscp DSCP marking for video access (default = 32).

FortiOS 6.2.0 New Features Guide 49


Fortinet Technologies Inc.
Expanding Fabric Family

wmm-be-dscp DSCP marking for best effort access (default = 0).


wmm-bk-dscp DSCP marking for background access (default = 8).

This feature requires a FortiAP-S or FortiAP-W2 device.

To configure WMM QoS marking of packets:

1. Create a QoS profile with wmm-dscp-marking enabled, and modify the wmm-dscp settings:
config wireless-controller qos-profile
edit qos-wifi
set wmm-dscp-marking enable
set wmm-vo-dscp 44
set wmm-vi-dscp 24
set wmm-be-dscp 12
set wmm-bk-dscp 6
end

2. Select the QoS profile on a VAP interface:


config wireless-controller vap
edit "stability3"
set qos-profile "qos-wifi"
next
end

3. Verify that the wmm-dscp-marking values are pushed on FortiAP:


cw_diag -c k-qos wlan00
WLAN Kernel QoS Settings
..
....
WLAN wlan00 :
wmm : 1
wmm uapsd : 1
call admission control : 0
call capacity : 0
bandwidth admission control : 0
bandwidth capacity : 0
dscp mapping : 0
dscp marking : 1
vo dscp : 44
vi dscp : 24

FortiOS 6.2.0 New Features Guide 50


Fortinet Technologies Inc.
Expanding Fabric Family

be dscp : 12
bk dscp : 6

4. Verify that, when sending traffic from a client with a WMM setting of VO, the FortiGate receives the packets with a
DSCP TID value or 44:

5. Verify that, when sending traffic from a client with a WMM setting of VI, the FortiGate receives the packets with a
DSCP TID value or 24:

6. Verify that, when sending traffic from a client with a WMM setting of BE, the FortiGate receives the packets with a
DSCP TID value or 12:

7. Verify that, when sending traffic from a client with a WMM setting of BK, the FortiGate receives the packets with a
DSCP TID value or 6:

Airtime Fairness

WiFi has a natural tendency for clients farther away or clients at lower data rates to monopolize the airtime and drag
down the overall performance. Airtime fairness helps to improve the overall network performance in these conditions.
Airtime fairness has these characteristics:
l Only applies to downlink traffic.
l Can be set on both 2.4 GHz and 5 GHz radio bands.
l Can be set per-SSID. Each VAP is granted airtime according to the percentage assigned to the VAP.
l Can apply to all kinds of VAP (Bridge, Tunnel, or Mesh) and all kinds of authentication (Open, PSK, or Enterprise).
l Only applies to data and is not for control or management.
Airtime fairness is balanced from TX side from AP to client since that's the only direction under the control of AP.

FortiOS 6.2.0 New Features Guide 51


Fortinet Technologies Inc.
Expanding Fabric Family

Sample topology and usage

For example, there are two Bridge mode SSIDs with a wireless client and an airtime fairness weight of 80% and 20%.
Using WaveDynamix to simulate the same traffic from Ethernet to the wireless client, the traffic for each SSID matches
the airtime fairness weight assigned to them.
Airtime fairness is not related to SSID type or authentication type. In this example, it uses Bridge mode SSID and Open
Authentication.
You must use the CLI to use this feature.

To set the airtime fairness weight in SSID:

The default atf-weight is 20 so there is no need to set this option for atf_br2.
config wireless-controller vap
edit "atf_br1"
set atf-weight 80
set ssid "atf_br1"
set security open
set local-bridging enable
set schedule "always"
next
end

config wireless-controller vap


edit "atf_br2"
set ssid "atf_br2"
set security open
set local-bridging enable
set schedule "always"
next
end

To enable airtime fairness in radio:

This example uses one FAP-S423E unit and only enable airtime fairness on the 5 GHz radio band.
config wireless-controller wtp-profile
edit "S423E_atf"
config platform
set type S423E
end
config radio-1
set mode disabled
end
config radio-2
set band 802.11ac
set airtime-fairness enable

FortiOS 6.2.0 New Features Guide 52


Fortinet Technologies Inc.
Expanding Fabric Family

set vap-all disable


set vaps "atf_br1" "atf_br2"
set channel "149"
end
set ext-info-enable enable
next
end

config wireless-controller wtp


edit "PS423E3X16000029"
set admin enable
set wtp-profile "S423E_atf"
config radio-2
end
next
end

To verify the airtime fairness weight from FAP:

PS423E3X16000029 # cw_diag -c atf


Airtime Fairness Info:
interface ssid configured-atf applied-atf
Radio 0 ATF disabled
Radio 1 ATF enabled
wlan10 atf_ssid1 80 80
wlan11 atf_ssid2 20 20

PS423E3X16000029 # wlanconfig wlan10 showatfinfo


SHOW RADIO ATF TABLE
WLAN:SSID/Client(MAC Address) Air time(%) Config ATF(%%) Assoc
wlan10:atf_ssid1 80.0 80.0
wlan11:atf_ssid2 20.0 20.0
------:Unallocated Airtime 0.0

Verify the airtime fairness weight from real traffic

Using WaveDynamix to create two same clients connected with two SSIDs, downlink traffic is passed from Ethernet to
the wireless client with the same bit rate.
This example shows tx_bytes from atf_br1 is almost four times higher than atf_br2.

To view traffic statistics from SSID1:

PS423E3X16000029 # cw_diag -d vap 90:6C:AC:8A:66:10


VAP extension info
Radio 1 VAP 0:
tx_packets : 60543
tx_bytes : 70608777
tx_data_packets : 60543
tx_data_bytes : 70608777
tx_datapyld_bytes : 68308143
tx_ucast_data_packets : 57462
tx_mbcast_data_packets : 3081
tx_discard : 94193

FortiOS 6.2.0 New Features Guide 53


Fortinet Technologies Inc.
Expanding Fabric Family

To view traffic statistics from SSID2:

PS423E3X16000029 # cw_diag -d vap 90:6C:AC:8A:66:11


VAP extension info
Radio 1 VAP 1:
tx_packets : 18839
tx_bytes : 19731946
tx_data_packets : 18839
tx_data_bytes : 19731946
tx_datapyld_bytes : 19016064
tx_ucast_data_packets : 15760
tx_mbcast_data_packets : 3079
tx_discard : 84924

Extended Details on AP Drill Down

This feature provides extended details of an AP. On the Managed FortiAPs page, you can drill down to view all
available details of a FortiAP, including:
l AP system information.
l Dynamic health and performance information.
l Dynamic radio and client details.
l Relevant links such as location of the AP in the location map.

Sample topology

FortiOS 6.2.0 New Features Guide 54


Fortinet Technologies Inc.
Expanding Fabric Family

Sample configuration

In WiFi & Switch Controller > Managed FortiAPs, right-click a FortiAP and select Drill Down to Details.

The details pane includes the following information:


l The top left shows a summary of configuration and connection status for the AP. The Actions button provides
some actions to the AP such as Authorize/Deauthorize, Upgrade, Restart, and LED Blink. The Edit button opens
the Managed FortiAP page.
l The top right shows the General Health assessment of the AP and the health assessment based on radio band.
l The Locate button appears if the FortiAP is on a WiFi Map.
l The bottom section includes tabs to show the Radios summary, Clients list, and a filtered Logs view of all logs of
the FortiAP.

FortiOS 6.2.0 New Features Guide 55


Fortinet Technologies Inc.
Expanding Fabric Family

If a FortiAP is on a WiFi Map, click the Locate button and that FortiAP is highlighted with a flashing yellow circle on the
WiFi Map.

Click Edit to open the Managed FortiAP page to show the FortiAP's operation information and a summary of its health
status. Click View More Details to open the details pane.

FortiOS 6.2.0 New Features Guide 56


Fortinet Technologies Inc.
Expanding Fabric Family

On the WiFi Map, click a FortiAP icon to open its details pane.

Troubleshooting – Extended Logging

This version adds new logging information in four key areas to aid in wireless troubleshooting: Association,
Authentication, DHCP, and DNS.
In previous versions, there were not enough detailed wireless event logs to show client connection procession, and IT
administrators sometimes had difficulty troubleshooting wireless connection problems by checking logs. In this version,
the FortiAP can send more detailed events of client connections (such as probe, associate, authentication, 4-way
handshake, DHCP), and FortiGate can create associated logs of these event.

FortiOS 6.2.0 New Features Guide 57


Fortinet Technologies Inc.
Expanding Fabric Family

New probe, authentication, and associate logs when wireless clients try to connect a broadcasted SSID
with any security-mode

Probe request and response logs

Action Description Message Detail

probe- Probe request AP received date=2019-01-30 time=14:09:52 logid="0104043681" type="event"


req from wireless probe request subtype="wireless" level="notice" vd="vdom1"
station frame from client eventtime=1548886190 logdesc="Probe request from wireless
f0:98:9d:76:64:c4 station" sn="PS221E3X16000022" ap="PS221E3X16000022"
vap="stability3" ssid="Guest-11" radioid=1
stamac="f0:98:9d:76:64:c4" channel=6 security="WPA2 Personal"
encryption="AES" action="probe-req" reason="Reserved 0"
msg="AP received probe request frame from client
f0:98:9d:76:64:c4" remotewtptime="49.326391"

probe- Probe AP sent probe date=2019-01-30 time=14:09:52 logid="0104043682" type="event"


resp response to response frame subtype="wireless" level="notice" vd="vdom1"
wireless to client eventtime=1548886190 logdesc="Probe response to wireless
station f0:98:9d:76:64:c4 station" sn="PS221E3X16000022" ap="PS221E3X16000022"
vap="stability3" ssid="Guest-11" radioid=1
stamac="f0:98:9d:76:64:c4" channel=6 security="WPA2 Personal"
encryption="AES" action="probe-resp" reason="Reserved 0"
msg="AP sent probe response frame to client f0:98:9d:76:64:c4"
remotewtptime="49.326459"

Authentication request and response logs

Action Description Message Detail

auth-req Authentication AP received date=2019-01-30 time=14:09:48 logid="0104043675" type="event"


request from authentication subtype="wireless" level="notice" vd="vdom1"
wireless request frame eventtime=1548886188 logdesc="Authentication request from
station from client wireless station" sn="PS221E3X16000022"
f0:98:9d:76:64:c4 ap="PS221E3X16000022" vap="stability3" ssid="Guest-11"
radioid=1 stamac="f0:98:9d:76:64:c4" channel=6 security="WPA2
Personal" encryption="AES" action="auth-req" reason="Reserved 0"
msg="AP received authentication request frame from client
f0:98:9d:76:64:c4" remotewtptime="44.902962"

auth- Authentication AP sent date=2019-01-30 time=14:09:48 logid="0104043676" type="event"


resp response to authentication subtype="wireless" level="notice" vd="vdom1"
wireless response frame eventtime=1548886188 logdesc="Authentication response to
station to client wireless station" sn="PS221E3X16000022"
f0:98:9d:76:64:c4 ap="PS221E3X16000022" vap="stability3" ssid="Guest-11"
radioid=1 stamac="f0:98:9d:76:64:c4" channel=6 security="WPA2
Personal" encryption="AES" action="auth-resp" reason="Reserved
0" msg="AP sent authentication response frame to client
f0:98:9d:76:64:c4" remotewtptime="44.903038"

FortiOS 6.2.0 New Features Guide 58


Fortinet Technologies Inc.
Expanding Fabric Family

Associate request and response logs

Action Description Message Detail

assoc- Association AP received date=2019-01-30 time=14:09:48 logid="0104043677" type="event"


req request from association subtype="wireless" level="notice" vd="vdom1"
wireless request frame eventtime=1548886188 logdesc="Association request from
station from client wireless station" sn="PS221E3X16000022"
f0:98:9d:76:64:c4 ap="PS221E3X16000022" vap="stability3" ssid="Guest-11"
radioid=1 stamac="f0:98:9d:76:64:c4" channel=6 security="WPA2
Personal" encryption="AES" action="assoc-req" reason="Reserved
0" msg="AP received association request frame from client
f0:98:9d:76:64:c4" remotewtptime="44.915155"

assoc- Association AP sent date=2019-01-30 time=14:09:48 logid="0104043679" type="event"


resp response to association subtype="wireless" level="notice" vd="vdom1"
wireless response frame eventtime=1548886188 logdesc="Association response to wireless
station to client station" sn="PS221E3X16000022" ap="PS221E3X16000022"
f0:98:9d:76:64:c4 vap="stability3" ssid="Guest-11" radioid=1
stamac="f0:98:9d:76:64:c4" channel=6 security="WPA2 Personal"
encryption="AES" action="assoc-resp" reason="Reserved 0"
msg="AP sent association response frame to client
f0:98:9d:76:64:c4" remotewtptime="44.916829"

New WPA 4-Way handshake logs when wireless clients try to connect WPA2-Personal/WPA2-Enterprise
SSID

Complete WPA 4-Way handshake logs

Action Description Message Detail

WPA- AP sent 1/4 AP sent 1/4 date=2019-01-30 time=14:09:48 logid="0104043650" type="event"


1/4-key- message of 4 message of 4- subtype="wireless" level="notice" vd="vdom1"
msg way way handshake to eventtime=1548886188 logdesc="AP sent 1/4 message of 4 way
handshake to client handshake to wireless client" sn="PS221E3X16000022"
wireless client f0:98:9d:76:64:c4 ap="PS221E3X16000022" vap="stability3" ssid="Guest-11"
radioid=1 stamac="f0:98:9d:76:64:c4" channel=6 security="WPA2
Personal" encryption="AES" action="WPA-1/4-key-msg"
reason="Reserved 0" msg="AP sent 1/4 message of 4-way
handshake to client f0:98:9d:76:64:c4"
remotewtptime="44.920791"

FortiOS 6.2.0 New Features Guide 59


Fortinet Technologies Inc.
Expanding Fabric Family

Action Description Message Detail

WPA- Wireless client AP received 2/4 date=2019-01-30 time=14:09:48 logid="0104043651" type="event"


2/4-key- sent 2/4 message of 4- subtype="wireless" level="notice" vd="vdom1"
msg message of 4 way handshake eventtime=1548886188 logdesc="Wireless client sent 2/4
way from client message of 4 way handshake" sn="PS221E3X16000022"
handshake f0:98:9d:76:64:c4 ap="PS221E3X16000022" vap="stability3" ssid="Guest-11"
radioid=1 stamac="f0:98:9d:76:64:c4" channel=6 security="WPA2
Personal" encryption="AES" action="WPA-2/4-key-msg"
reason="Reserved 0" msg="AP received 2/4 message of 4-way
handshake from client f0:98:9d:76:64:c4"
remotewtptime="44.926647"

WPA- AP sent 3/4 AP sent 3/4 date=2019-01-30 time=14:09:48 logid="0104043652" type="event"


3/4-key- message of 4 message of 4- subtype="wireless" level="notice" vd="vdom1"
msg way way handshake to eventtime=1548886188 logdesc="AP sent 3/4 message of 4 way
handshake to client handshake to wireless client" sn="PS221E3X16000022"
wireless client f0:98:9d:76:64:c4 ap="PS221E3X16000022" vap="stability3" ssid="Guest-11"
radioid=1 stamac="f0:98:9d:76:64:c4" channel=6 security="WPA2
Personal" encryption="AES" action="WPA-3/4-key-msg"
reason="Reserved 0" msg="AP sent 3/4 message of 4-way
handshake to client f0:98:9d:76:64:c4"
remotewtptime="44.928406"

WPA- Wireless client AP received 4/4 date=2019-01-30 time=14:09:48 logid="0104043653" type="event"


4/4-key- sent 4/4 message of 4- subtype="wireless" level="notice" vd="vdom1"
msg message of 4 way handshake eventtime=1548886188 logdesc="Wireless client sent 4/4
way from client message of 4 way handshake" sn="PS221E3X16000022"
handshake f0:98:9d:76:64:c4 ap="PS221E3X16000022" vap="stability3" ssid="Guest-11"
radioid=1 stamac="f0:98:9d:76:64:c4" channel=6 security="WPA2
Personal" encryption="AES" action="WPA-4/4-key-msg"
reason="Reserved 0" msg="AP received 4/4 message of 4-way
handshake from client f0:98:9d:76:64:c4"
remotewtptime="44.933383"

Invalid 2/4 handshake logs with wrong PSK input

Action Description Message Detail

WPA- Wireless client Probably wrong date=2019-01-31 time=16:41:02 logid="0104043648" type="event"


invalid- 4 way password subtype="wireless" level="warning" vd="vdom1"
2/4-key- handshake entered, invalid eventtime=1548981661 logdesc="Wireless client 4 way handshake
msg failed with MIC in 2/4 failed with invalid 2/4 message" sn="PS421E3X15000017"
invalid 2/4 message of 4- ap="PS421E3X15000017" vap="stability3" ssid="Guest-11"
message way handshake radioid=1 stamac="f0:98:9d:76:64:c4" channel=11 security="WPA2
from client Personal" encryption="AES" action="WPA-invalid-2/4-key-msg"
f0:98:9d:76:64:c4 reason="Reserved 0" msg="Probably wrong password entered,
invalid MIC in 2/4 message of 4-way handshake from client
f0:98:9d:76:64:c4" remotewtptime="0.0"

FortiOS 6.2.0 New Features Guide 60


Fortinet Technologies Inc.
Expanding Fabric Family

New RADIUS authentication logs when clients connect WPA2-Enterprise with User-group or Radius-auth
SSID

RADIUS authenticate success log when client pass authentication

Action Description Message Detail

RADIUS- Wireless client Wireless client date=2019-01-30 time=14:36:09 logid="0104043630" type="event"


auth- RADIUS RADIUS subtype="wireless" level="notice" vd="vdom1"
success authentication authentication eventtime=1548887768 logdesc="Wireless client RADIUS
success success authentication success" sn="PS221E3X16000022"
ap="PS221E3X16000022" vap="stability4" ssid="Guest-21" radioid=1
stamac="f0:98:9d:76:64:c4" channel=6 security="WPA2 Enterprise"
encryption="AES" action="RADIUS-auth-success" reason="Reserved
0" msg="Client f0:98:9d:76:64:c4 RADIUS authentication success"
remotewtptime="0.0"

RADIUS authenticate failure log when client fails to pass authentication

Action Description Message Detail

RADIUS- Wireless client Client date=2019-01-30 time=14:35:51 logid="0104043629" type="event"


auth- RADIUS f0:98:9d:76:64:c4 subtype="wireless" level="warning" vd="vdom1"
failure authentication RADIUS eventtime=1548887750 logdesc="Wireless client RADIUS
failure authentication authentication failure" sn="PS221E3X16000022"
failure ap="PS221E3X16000022" vap="stability4" ssid="Guest-21"
radioid=1 stamac="f0:98:9d:76:64:c4" channel=6 security="WPA2
Enterprise" encryption="AES" action="RADIUS-auth-failure"
reason="Reserved 0" msg="Client f0:98:9d:76:64:c4 RADIUS
authentication failure" remotewtptime="0.0"

New RADIUS MAC authentication logs when clients try to connect a SSID with radius-mac-auth enabled

RADIUS MAC authenticate success log when client passes RADIUS MAC authentication

Action Description Message Detail

RADIUS- Wireless client Client date=2019-01-30 time=15:54:40 logid="0104043633" type="event"


MAC- RADIUS MAC b4:ae:2b:cb:d1:72 subtype="wireless" level="notice" vd="vdom1"
auth- authentication RADIUS MAC eventtime=1548892477 logdesc="Wireless client RADIUS MAC
success success authentication authentication success" sn="PS221E3X16000022"
success ap="PS221E3X16000022" vap="stability3" ssid="Guest-11"
radioid=1 stamac="b4:ae:2b:cb:d1:72" channel=6 security="WPA2
Personal" encryption="AES" action="RADIUS-MAC-auth-success"
reason="Reserved 0" msg="Client b4:ae:2b:cb:d1:72 RADIUS
MAC authentication success" remotewtptime="0.0"

FortiOS 6.2.0 New Features Guide 61


Fortinet Technologies Inc.
Expanding Fabric Family

RADIUS MAC authenticate failure log when client fails to pass RADIUS MAC authentication

Action Description Message Detail

RADIUS- Wireless client Client date=2019-01-30 time=15:47:42 logid="0104043632" type="event"


MAC- RADIUS MAC 1c:87:2c:b6:a8:49 subtype="wireless" level="warning" vd="vdom1"
auth- authentication RADIUS MAC eventtime=1548892061 logdesc="Wireless client RADIUS MAC
success success authentication authentication failure" sn="FP320C3X17001909" ap="320C-TEST"
failure vap="stability3" ssid="Guest-11" radioid=2
stamac="1c:87:2c:b6:a8:49" channel=40 security="WPA2
Personal" encryption="AES" action="RADIUS-MAC-auth-failure"
reason="Reserved 0" msg="Client 1c:87:2c:b6:a8:49 RADIUS
MAC authentication failure" remotewtptime="0.0"

New DHCP logs when clients try to acquire IP after connected

Complete DHCP Discover/Offer/Request/ACK logs

Action Description Message Detail

DHCP- Wireless DHCP date=2019-01-30 time=14:09:48 logid="0104043663"


DISCOVER station sent DISCOVER from type="event" subtype="wireless" level="notice" vd="vdom1"
DHCP client eventtime=1548886188 logdesc="Wireless station sent DHCP
DISCOVER f0:98:9d:76:64:c4 DISCOVER" sn="PS221E3X16000022"
ap="PS221E3X16000022" vap="stability3" ssid="Guest-11"
stamac="f0:98:9d:76:64:c4" security="WPA2 Personal"
encryption="AES" action="DHCP-DISCOVER" reason="N/A"
msg="DHCP DISCOVER from client f0:98:9d:76:64:c4"
remotewtptime="45.123652"

DHCP- DHCP server DHCP OFFER of date=2019-01-30 time=14:09:49 logid="0104043664"


OFFER sent DHCP IP 11.10.80.2 type="event" subtype="wireless" level="notice" vd="vdom1"
OFFER from server eventtime=1548886189 logdesc="DHCP server sent DHCP
11.10.80.1 for OFFER" sn="PS221E3X16000022" ap="PS221E3X16000022"
client vap="stability3" ssid="Guest-11" stamac="f0:98:9d:76:64:c4"
f0:98:9d:76:64:c4 security="WPA2 Personal" encryption="AES" action="DHCP-
OFFER" reason="N/A" msg="DHCP OFFER of IP 11.10.80.2
from server 11.10.80.1 for client f0:98:9d:76:64:c4"
remotewtptime="46.156969"

DHCP- Wireless DHCP REQUEST date=2019-01-30 time=14:09:50 logid="0104043666"


REQUEST station sent for IP 11.10.80.2 type="event" subtype="wireless" level="notice" vd="vdom1"
DHCP offered by server eventtime=1548886190 logdesc="Wireless station sent DHCP
REQUEST 11.10.80.1 from REQUEST" sn="PS221E3X16000022" ap="PS221E3X16000022"
client vap="stability3" ssid="Guest-11" stamac="f0:98:9d:76:64:c4"
f0:98:9d:76:64:c4 security="WPA2 Personal" encryption="AES" action="DHCP-
REQUEST" reason="N/A" msg="DHCP REQUEST for IP
11.10.80.2 offered by server 11.10.80.1 from client
f0:98:9d:76:64:c4" remotewtptime="47.243792"

FortiOS 6.2.0 New Features Guide 62


Fortinet Technologies Inc.
Expanding Fabric Family

Action Description Message Detail

DHCP-ACK DHCP server DHCP ACK for IP date=2019-01-30 time=14:09:50 logid="0104043667"


sent DHCP 11.10.80.2 from type="event" subtype="wireless" level="notice" vd="vdom1"
ACK server 11.10.80.1 eventtime=1548886190 logdesc="DHCP server sent DHCP ACK"
for client sn="PS221E3X16000022" ap="PS221E3X16000022"
f0:98:9d:76:64:c4 vap="stability3" ssid="Guest-11" stamac="f0:98:9d:76:64:c4"
security="WPA2 Personal" encryption="AES" action="DHCP-
ACK" reason="N/A" msg="DHCP ACK for IP 11.10.80.2 from
server 11.10.80.1 for client f0:98:9d:76:64:c4"
remotewtptime="47.246381"

Error logs when DHCP failure happens

Action Description Message Detail

DHCP- DHCP server IP address not date=2019-01-30 time=15:22:08 logid="0104043661"


NAK sent DHCP assigned, DHCP type="event" subtype="wireless" level="warning" vd="vdom1"
NAK NAK from server eventtime=1548890528 logdesc="DHCP server sent DHCP NAK"
11.10.80.1 for sn="PS221E3X16000022" ap="PS221E3X16000022"
client vap="stability3" ssid="Guest-11" stamac="b4:ae:2b:cb:d1:72"
b4:ae:2b:cb:d1:72 security="WPA2 Personal" encryption="AES" action="DHCP-NAK"
reason="requested address not available" msg="IP address not
assigned, DHCP NAK from server 11.10.80.1 for client
b4:ae:2b:cb:d1:72" remotewtptime="289.83561"

DHCP- Wireless DHCP server not date=2019-02-01 time=10:39:07 logid="0104043658"


no- station DHCP responding for type="event" subtype="wireless" level="warning" vd="vdom1"
response process failed client eventtime=1549046347 logdesc="Wireless station DHCP process
with no server b4:ae:2b:cb:d1:72 failed with no server response" sn="PS421E3X15000017"
response ap="PS421E3X15000017" vap="stability3" ssid="Guest-11"
stamac="b4:ae:2b:cb:d1:72" security="WPA2 Personal"
encryption="AES" action="DHCP-no-response" reason="N/A"
msg="DHCP server not responding for client b4:ae:2b:cb:d1:72"
remotewtptime="457.629929"

DHCP- No DHCP ACK No DHCP ACK for date=2019-02-01 time=10:38:56 logid="0104043660"


no-ACK from server IP 11.10.80.3 type="event" subtype="wireless" level="warning" vd="vdom1"
requested by eventtime=1549046336 logdesc="No DHCP ACK from server"
client sn="PS421E3X15000017" ap="PS421E3X15000017"
b4:ae:2b:cb:d1:72 vap="stability3" ssid="Guest-11" stamac="b4:ae:2b:cb:d1:72"
security="WPA2 Personal" encryption="AES" action="DHCP-no-
ACK" reason="N/A" msg="No DHCP ACK for IP 11.10.80.3
requested by client b4:ae:2b:cb:d1:72"
remotewtptime="448.236740"

FortiOS 6.2.0 New Features Guide 63


Fortinet Technologies Inc.
Expanding Fabric Family

Action Description Message Detail

DHCP- Wireless Detected self date=2019-02-01 time=10:38:51 logid="0104043670"


self- station is using assigned IP type="event" subtype="wireless" level="warning" vd="vdom1"
assigned- self-assigned 169.254.210.208 eventtime=1549046330 logdesc="Wireless station is using self-
IP IP of client assigned IP" sn="PS421E3X15000017" ap="PS421E3X15000017"
b4:ae:2b:cb:d1:72 vap="stability3" ssid="Guest-11" stamac="b4:ae:2b:cb:d1:72"
security="WPA2 Personal" encryption="AES" action="DHCP-self-
assigned-IP" reason="N/A" msg="Detected self assigned IP
169.254.210.208 of client b4:ae:2b:cb:d1:72"
remotewtptime="441.742363"

New GTK-Rekey logs when clients perform gtk-rekey

Action Description Message Detail

WPA- AP sent 1/2 AP sent 1/2 date=2019-01-30 time=15:12:01 logid="0104043654" type="event"


group- message of message of group subtype="wireless" level="notice" vd="vdom1"
1/2-key- group key key handshake to eventtime=1548889920 logdesc="AP sent 1/2 message of group
msg handshake to client key handshake to wireless client" sn="PS221E3X16000022"
wireless client f0:98:9d:76:64:c4 ap="PS221E3X16000022" vap="stability4" ssid="Guest-21"
radioid=1 stamac="f0:98:9d:76:64:c4" channel=6 security="WPA2
Enterprise" encryption="AES" action="WPA-group-1/2-key-msg"
reason="Reserved 0" msg="AP sent 1/2 message of group key
handshake to client f0:98:9d:76:64:c4"
remotewtptime="3778.128070"

WPA- Wireless client AP received 2/2 date=2019-01-30 time=15:12:01 logid="0104043655" type="event"


group- sent 2/2 message of group subtype="wireless" level="notice" vd="vdom1"
2/2-key- message of key handshake eventtime=1548889920 logdesc="Wireless client sent 2/2
msg group key from client message of group key handshake" sn="PS221E3X16000022"
handshake f0:98:9d:76:64:c4 ap="PS221E3X16000022" vap="stability4" ssid="Guest-21"
radioid=1 stamac="f0:98:9d:76:64:c4" channel=6 security="WPA2
Enterprise" encryption="AES" action="WPA-group-2/2-key-msg"
reason="Reserved 0" msg="AP received 2/2 message of group key
handshake from client f0:98:9d:76:64:c4"
remotewtptime="3778.228253"

FortiOS 6.2.0 New Features Guide 64


Fortinet Technologies Inc.
Expanding Fabric Family

New Fast-BSS-Transition (FT) logs when 802.11r clients roam between 2 FAPs

FT logs when clients succeed to roaming

Action Description Message Detail

FT- Wireless client AP received FT date=2019-01-31 time=15:13:23 logid="0104043642" type="event"


action- sent FT action action request subtype="wireless" level="notice" vd="vdom1"
req request frame from client eventtime=1548976403 logdesc="Wireless client sent FT action
f0:98:9d:76:64:c4 request" sn="PS221E3X16000022" ap="PS221E3X16000022"
vap="stability3" ssid="Guest-11" radioid=1
stamac="f0:98:9d:76:64:c4" channel=1 security="WPA2 Personal"
encryption="AES" action="FT-action-req" reason="Reserved 0"
msg="AP received FT action request frame from client
f0:98:9d:76:64:c4" remotewtptime="146.847041"

FT- FT action AP sent FT action date=2019-01-31 time=15:13:23 logid="0104043643" type="event"


action- response was response frame subtype="wireless" level="notice" vd="vdom1"
resp sent to to client eventtime=1548976403 logdesc="FT action response was sent to
wireless client f0:98:9d:76:64:c4 wireless client" sn="PS221E3X16000022"
ap="PS221E3X16000022" vap="stability3" ssid="Guest-11"
radioid=1 stamac="f0:98:9d:76:64:c4" channel=1 security="WPA2
Personal" encryption="AES" action="FT-action-resp"
reason="Reserved 0" msg="AP sent FT action response frame to
client f0:98:9d:76:64:c4" remotewtptime="146.849137"

FT- Wireless client AP received FT date=2019-01-31 time=15:13:23 logid="0104043646" type="event"


reassoc- sent FT re- re-association subtype="wireless" level="notice" vd="vdom1"
req association request frame eventtime=1548976403 logdesc="Wireless client sent FT
request from client reassociation request" sn="PS221E3X16000022"
f0:98:9d:76:64:c4 ap="PS221E3X16000022" vap="stability3" ssid="Guest-11"
radioid=2 stamac="f0:98:9d:76:64:c4" channel=40 security="WPA2
Personal" encryption="AES" action="FT-reassoc-req"
reason="Reserved 0" msg="AP received FT reassociation request
frame from client f0:98:9d:76:64:c4"
remotewtptime="146.899110"

FT- FT re- AP sent FT re- date=2019-01-31 time=15:13:23 logid="0104043647" type="event"


reassoc- association association subtype="wireless" level="notice" vd="vdom1"
resp response was response frame eventtime=1548976403 logdesc="FT reassociation response was
sent to to client sent to wireless client" sn="PS221E3X16000022"
wireless client f0:98:9d:76:64:c4 ap="PS221E3X16000022" vap="stability3" ssid="Guest-11"
radioid=2 stamac="f0:98:9d:76:64:c4" channel=40 security="WPA2
Personal" encryption="AES" action="FT-reassoc-resp"
reason="Reserved 0" msg="AP sent FT reassociation response
frame to client f0:98:9d:76:64:c4" remotewtptime="146.904372"

FortiOS 6.2.0 New Features Guide 65


Fortinet Technologies Inc.
Expanding Fabric Family

Action Description Message Detail

FT-auth- Wireless client AP received FT date=2019-01-31 time=16:49:18 logid="0104043644" type="event"


req sent FT auth authentication subtype="wireless" level="notice" vd="vdom1"
request request frame eventtime=1548982158 logdesc="Wireless client sent FT auth
from client request" sn="PS421E3X15000017" ap="PS421E3X15000017"
f0:98:9d:76:64:c4 vap="stability3" ssid="Guest-11" radioid=2
stamac="f0:98:9d:76:64:c4" channel=100 security="WPA2
Personal" encryption="AES" action="FT-auth-req"
reason="Reserved 0" msg="AP received FT authentication request
frame from client f0:98:9d:76:64:c4"
remotewtptime="1805.311496"

FT-auth- FT auth AP sent FT date=2019-01-31 time=16:49:18 logid="0104043645" type="event"


resp response was authentication subtype="wireless" level="notice" vd="vdom1"
sent to response frame eventtime=1548982158 logdesc="FT auth response was sent to
wireless client to client wireless client" sn="PS421E3X15000017"
f0:98:9d:76:64:c4 ap="PS421E3X15000017" vap="stability3" ssid="Guest-11"
radioid=2 stamac="f0:98:9d:76:64:c4" channel=100
security="WPA2 Personal" encryption="AES" action="FT-auth-resp"
reason="Reserved 0" msg="AP sent FT authentication response
frame to client f0:98:9d:76:64:c4" remotewtptime="1805.312777"

Error logs when FT failure

Action Description Message Detail

FT- Wireless client Receive invalid date=2019-01-31 time=16:49:17 logid="0104043639" type="event"


invalid- sent invalid FT FT request action subtype="wireless" level="warning" vd="vdom1"
action- action request frame from client eventtime=1548982157 logdesc="Wireless client sent invalid FT
req f0:98:9d:76:64:c4 action request" sn="PS421E3X15000017"
ap="PS421E3X15000017" vap="stability3" ssid="Guest-11"
radioid=2 stamac="f0:98:9d:76:64:c4" channel=100
security="WPA2 Personal" encryption="AES" action="FT-invalid-
action-req" reason="Reserved 0" msg="Receive invalid FT request
action frame from client f0:98:9d:76:64:c4" remotewtptime="0.0"

FT- Wireless client Receive invalid date=2019-01-31 time=16:49:18 logid="0104043640" type="event"


invalid- sent invalid FT FT authentication subtype="wireless" level="warning" vd="vdom1"
auth-req auth request request frame eventtime=1548982157 logdesc="Wireless client sent invalid FT
from client auth request" sn="PS421E3X15000017" ap="PS421E3X15000017"
f0:98:9d:76:64:c4 vap="stability3" ssid="Guest-11" radioid=2
stamac="f0:98:9d:76:64:c4" channel=100 security="WPA2
Personal" encryption="AES" action="FT-invalid-auth-req"
reason="Reserved 0" msg="Receive invalid FT authentication
request frame from client f0:98:9d:76:64:c4" remotewtptime="0.0"

FortiOS 6.2.0 New Features Guide 66


Fortinet Technologies Inc.
Expanding Fabric Family

New DNS error logs in DNS service failure

Action Description Message Detail

DNS-no- Wireless DNS lookup of date=2019-02-01 time=09:42:03 logid="0104043673" type="event"


domain station DNS uop.umeng.com subtype="wireless" level="warning" vd="vdom1"
process failed from client eventtime=1549042922 logdesc="Wireless station DNS process
due to non- 3c:2e:ff:83:91:33 failed due to non-existing domain" sn="PS421E3X15000017"
existing failed with \"non- ap="PS421E3X15000017" vap="stability3" ssid="Guest-11"
domain existing domain\" stamac="3c:2e:ff:83:91:33" security="WPA2 Personal"
encryption="AES" action="DNS-no-domain" reason="Server
100.100.16.172 replied \"non-existing domain\"" msg="DNS lookup
of uop.umeng.com from client 3c:2e:ff:83:91:33 failed with \"non-
existing domain\"" remotewtptime="1130.445518"

Override WiFi Certificates (from GUI)

This feature enables selecting an uploaded WiFi certificate and WiFi CA certificate in the GUI, and not just the CLI.

To select a WiFi and WiFi CA certificate:

1. Go to System > Settings.


2. Select the WiFi certificate from the WiFi certificate dropdown menu.

FortiOS 6.2.0 New Features Guide 67


Fortinet Technologies Inc.
Expanding Fabric Family

3. Select the WiFi CA certificate from the WiFi CA certificate dropdown menu.

Wireless MAC Filter Updates

This feature changes the MAC filter function on SSIDs so that it is only based on the MAC address of clients. Previously,
the MAC filter worked with device-detection and clients could be filtered by MAC address or device type.
The filter configuration in the CLI is moved from user device and user device-access-list to wireless-
controller address and wireless-controller addrgrp respectively.
The new MAC filter function is independent from the security mode of the SSID. To enable it on an SSID, the wireless
controller address and address group must be configured.

To block a specific client from connecting to an SSID using a MAC filter:

1. Create a wireless controller address with the client's MAC address, and set the policy to deny:
config wireless-controller address
edit "client_1"
set mac b4:ae:2b:cb:d1:72
set policy deny
next
end

FortiOS 6.2.0 New Features Guide 68


Fortinet Technologies Inc.
Expanding Fabric Family

2. Create a wireless controller address group using the above address and setting the default policy to allow:
config wireless-controller addrgrp
edit mac_grp
set addresses "client_1"
set default-policy allow
next
end

3. On the VAP, select the above address group:


config wireless-controller vap
edit wifi-vap
set ssid "Fortinet-psk"
set security wpa2-only-personal
set passphrase fortinet
set address-group "mac_grp"
next
end

The client's MAC address (b4:ae:2b:cb:d1:72 in this example) will be denied a connection to the SSID (Fortinet-
psk), but other clients (such as e0:33:8e:e9:65:01) will be allowed to connect.

To allow a specific client to connect to an SSID using a MAC filter:

1. Create a wireless controller address with the client's MAC address, and set the policy to allow:
config wireless-controller address
edit "client_1"
set mac b4:ae:2b:cb:d1:72
set policy allow
next
end

2. Create a wireless controller address group using the above address and setting the default policy to deny:
config wireless-controller addrgrp
edit mac_grp
set addresses "client_1"
set default-policy deny
next
end

3. On the VAP, select the above address group:


config wireless-controller vap
edit wifi-vap
set ssid "Fortinet-psk"
set security wpa2-only-personal
set passphrase fortinet
set address-group "mac_grp"
next
end

The client's MAC address (b4:ae:2b:cb:d1:73 in this example) will be allowed to connect to the SSID (Fortinet-
psk), but other clients (such as e0:33:8e:e9:65:01) will be denied a connection.

FortiOS 6.2.0 New Features Guide 69


Fortinet Technologies Inc.
Expanding Fabric Family

Change SSID to VDOM Object

This feature changes the wireless-controller VAP (for SSID configuration) from a global object to a VDOM object,
simplifying tracking the object reference count. It also removes the vdom setting from VAP configuration. When
multi-vdom is enabled on a FortiGate, the wireless-controller VAP can be added, edited, or deleted only inside of a
VDOM.

To create a VAP entry:

1. When vdom-mode is no-vdom:


# config wireless-controller vap
(vap) # edit new
new entry 'new' added
(new) # set ssid new
(new) # set passphrase 12345678
(new) # set vdom
command parse error before 'vdom'
(new) # end
# show wireless-controller vap new
config wireless-controller vap
edit "new"
set ssid "new"
set passphrase ENC
qmVlo9Zn3C4aVZMIw9LrHhXX+wDNn2BMT9hP3vmZGQFZZz+gQ6Lb1jS9UkAkbQabWkGq8uDZDf
qwtWV8lZdMDOFyDC0Kgh/yCuCkM5xM1bm9gvnGC9+84VY2mvkV4pUeiugJ/8o1m++buXmP9CdU
mLz7eY/VZwYlKnSyFvk7DphbfZJapCOXtgN2zseNoITPQUTKLA==
next
end
2. When vdom-mode is multi-vdom:
l A VAP cannot be created in global:
# config global
(global) # config wireless-controller vap
command parse error before 'vap'
Command fail. Return code 1
(global) #
l A VAP can only be created in a VDOM:
# config vdom
(vdom) # edit vdom2
current vf=vdom2:1
(vdom2) # config wireless-controller vap
(vap) # edit new
new entry 'new' added
(new) # set ssid new
(new) # set passphrase 12345678
(new) # set vdom
command parse error before 'vdom'
(new) # end
(vdom2) # sh wireless-controller vap new
config wireless-controller vap
edit "new"
set ssid "new"
set passphrase ENC
IidSvoD1C6feNonhsYfUTnOtO89UE/S/wWmOxRHLCud+eR0LD8xuYzWzsRg9/c299Vd2UA
809NSUfyRBRD/pFFd/QS6ArQPs4sLVtPiftE63uI53d9azeQv6e5tkQjg4Z7Ztlv2hE47n
KkdVXeWZE3mpfRhSxvDUKVzwpR1b8pdwbzDGFlPs+JcoNso6ZeRCuMg54g==

FortiOS 6.2.0 New Features Guide 70


Fortinet Technologies Inc.
Expanding Fabric Family

next
end
(vdom2) #
3. When vdom-mode is multi-vdom, references to user-group and radius can be checked correctly when they are
used by a VAP interface:
l A VAP interface with security-mode set to WPA2-Enterprise and RADIUS authentication:
(vdom2) # show wireless-controller vap new
config wireless-controller vap
edit "new"
set ssid "new"
set security wpa2-only-enterprise
set auth radius
set radius-server "peap"
next
end
(vdom2) # diagnose sys cmdb refcnt show user.radius.name peap
entry used by table wireless-controller.vap:name 'new'
l A VAP interface with security-mode set to WPA2-Enterprise and User-group authentication:
(vdom2) # show wireless-controller vap new
config wireless-controller vap
edit "new"
set ssid "new"
set security wpa2-only-enterprise
set auth usergroup
set usergroup "group-radius"
next
end
(vdom2) # diagnose sys cmdb refcnt show user.group.name group-radius
entry used by child table usergroup:name 'group-radius' of table wireless-
controller.vap:name 'new'

Direct SNMP Monitoring

This feature enables SNMP directly on FortiAP by implementing a SNMPD daemon/subagent on the FortiAP side.

To configure SNMP operation settings per VDOM:

config wireless-controller snmp


set engine-id "fap-fortinet"
set contact-info "fosqa@fortinet.com"
set trap-high-cpu-threshold 80
set trap-high-mem-threshold 80
config community
edit 1
set name "fap-comm-1"
set status enable
set query-v1-status enable
set query-v2c-status enable
set trap-v1-status enable
set trap-v2c-status enable
next
end
config user
edit "fap"

FortiOS 6.2.0 New Features Guide 71


Fortinet Technologies Inc.
Expanding Fabric Family

set status enable


set queries enable
set trap-status enable
set security-level no-auth-no-priv
next
end
end

To allow SNMP access in FortiAP profiles or per FortiAP device:

config wireless-controller wtp-profile


edit FAP423E-default
append allowaccess snmp
next
end

To disallow SNMP access in FortiAP profiles or per FortiAP device:

config wireless-controller wtp-profile


edit FAP423E-default
unselect allowaccess snmp
next
end

FortiAP SNMP implementation

FortiAP-S and FortiAP-W2 6.2 and later support SNMP query and trap messages according to the wireless controller
SNMP settings pushed from the FortiGate device.
The below example shows an Ubuntu-OS querying a FortiAP 222E unit with the snmpwalk command. The SNMP
agent software has the FORTINET-FORTIAP-MIB already imported.
tester@ControlPC:~$ snmpwalk -v 2c -c QAMikeAn 172.18.56.32 .1.3.6.1.4.1.12356.120.1
FORTINET-FORTIAP-MIB::fapVersion.0 = STRING: FP222E-v6.2-build0231
FORTINET-FORTIAP-MIB::fapSerialNum.0 = STRING: FP222E3X17000073
FORTINET-FORTIAP-MIB::fapHostName.0 = STRING: FortiAP-222E
FORTINET-FORTIAP-MIB::fapRegionCode.0 = STRING: A
FORTINET-FORTIAP-MIB::fapBaseMacAddr.0 = STRING: 70:4c:a5:5d:ea:d0
FORTINET-FORTIAP-MIB::fapBiosVer.0 = STRING: 04000002
FORTINET-FORTIAP-MIB::fapBiosDataVer.0 = INTEGER: 3
FORTINET-FORTIAP-MIB::fapSysPartNum.0 = STRING: 20844-04

Five kinds of trap messages can be sent by the FortiAP-S and FortiAP-W2 devices:
l fapDevUp: Indicates that the specified AP device is up.
l CpuOverloadfap: Indicates that the CPU usage of the specified AP has exceeded the configured threshold.
l MemOverload: Indicates that the memory usage of the specified AP has exceeded the configured threshold.
l fapDevDown: Indicates that the specified AP device is down.
l fapfapAcConnected: Indicates that the specified AP device has connected to the specified AC.
The following screenshot shows an SNMP trap receiver (SnmpB) that has received one fapDevUp trap message from a
FortiAP unit (serial number: FP222E3X17000000).

FortiOS 6.2.0 New Features Guide 72


Fortinet Technologies Inc.
Expanding Fabric Family

Switching

This section lists new switching features added to FortiOS for the expanding fabric family.
l FortiLink Setup on page 73
l Voice VLAN Auto-Assignment on page 74
l Dynamic VLAN 'Name' Assignment from RADIUS Attribute on page 76
l Netflow / IPFIX Support on page 77
l QoS Assignment and Rate Limiting for Quarantined VLANs on page 78
l Persistent MAC Learning (Sticky MAC) on page 79
l Split Port Mode for QSFP ports on page 80
l Virtual Switch Extensions on page 81
l MSTI Support on page 84
l FortiLink Auto Network Configuration Policy on page 84
l FortiLink MCLAG configuration in GUI on page 86
l FortiLink Network Sniffer Extension on page 87

FortiLink Setup

Use WiFI & Switch Controller > FortiLink Interface to create or edit FortiLink interfaces. The available options depend
on the capability of the FortiGate model.
By automatically creating FortiLink interfaces as a logical aggregate or hard/soft switch, you can modify the FortiLink
interfaces. If the physical port in use changes, you don't need to migrate existing policies.

FortiOS 6.2.0 New Features Guide 73


Fortinet Technologies Inc.
Expanding Fabric Family

To configure FortiLink interfaces:

1. Go to WiFi & Switch Controller > FortiLink Interface.

2. Configure the interface settings and click Apply.

Voice VLAN Auto-Assignment

You can leverage LLDP-MED to assign voice traffic to the desired voice VLAN. After detection and setup, the IP phone
on the network is segmented to its own VLAN for policy, prioritization, and reporting. The LLDP reception capabilities in
FortiOS have been extended to support LLDP-MED assignment for voice, voice signaling, guest, guest voice signaling,
softphone, video conferencing, streaming video, and video signaling.
You can configure this feature using the FortiOS CLI. Configuration consists of the following steps:
1. Setting up the VLAN for the voice device
2. Setting up the DHCP server for the voice VLAN
3. Setting up the LLDP network policy
4. Enabling LLDP on the physical interface that the VLAN belongs to
5. Applying the LLDP network policy on the physical interface
6. Confirming that the VLAN was assigned

To set up the VLAN for the voice device:

config system interface


edit "vlan_100"
set vdom "root"
set ip 192.168.1.99 255.255.255.0
set alias "voice_vlan"
set device-identification enable

FortiOS 6.2.0 New Features Guide 74


Fortinet Technologies Inc.
Expanding Fabric Family

set role lan


set snmp-index 25
set interface "port10"
set vlanid 100
next
end

To set up the DHCP server for the voice VLAN:

config system dhcp server


edit 1
set dns-service default
set default-gateway 192.168.1.99
set netmask 255.255.255.0
set interface "vlan_100"
config ip-range
edit 1
set start-ip 192.168.1.110
set end-ip 192.168.1.210
next
end
next
end

To set up the LLDP network policy:

config system lldp network-policy


edit "1"
config voice
set status enable
set tag dot1q
set vlan 100
end
next
end

To enable LLDP on the physical interface that the VLAN belongs to:

config system interface


edit "port10"
set vdom "root"
set type physical
set lldp-reception enable
set lldp-transmission enable
set snmp-index 14
next
end

To apply the LLDP network policy on the physical interface:

config system interface


edit "port10"
set lldp-network-policy "1"
next
end

FortiOS 6.2.0 New Features Guide 75


Fortinet Technologies Inc.
Expanding Fabric Family

To confirm that the VLAN was assigned:

To confirm that the VLAN was assigned as expected, connect an IP phone to the network. Check the IP address on the
phone. The IP address should belong to the voice VLAN.
You can also sniff on the FortiGate incoming interface to see if traffic from the IP phone has the desired VLAN tag.
In the example commands above, the voice VLAN was configured as VLAN 100. Therefore, voice traffic from the IP
phone should be in VLAN 100.

Dynamic VLAN 'Name' Assignment from RADIUS Attribute

Starting in 6.2, when FortiSwitch receives a VLAN assignment from RADIUS, it determines if the data is an integer or
string representation. If the representation is an integer, FortiSwitch assigns the VLAN. If the representation is a string,
the 802.1x agent will search each VLAN's description field for all VLANs (names defined by FortiOS VLAN description).
If found, the 802.1x agent will make the assignment.

Example

On the FortiGate, all VLANs are specified as a system interface. Each system interface has a well-defined and unique
name. When running FortiLink, the switch has no knowledge of the name association. The switch communicates
directly with the RADIUS server and needs to know the mapping to make the proper selection.
As a result, this information must be provided to the switch. In order to make the feature generic and applicable to the
switch in standalone mode as well, the system interface description field is leveraged. The switch-controller
synchronizes this field to the switch for information purposes, and the description-to-description synchronization has
been removed. All descriptions on the FortiGate remain on the FortiGate. The switch-controller synchronizes the
FortiGate system interface name to the switch VLAN description.
When FortiSwitch receives a VLAN assignment from RADIUS, it determines if the data is an integer or string
representation. If the representation is an integer, FortiSwitch assigns the VLAN. If the representation is a string, the
802.1x agent will search each VLAN's description field for all VLANs (names defined by FortiOS VLAN description). If
found, the 802.1x agent will make the assignment.

To configure dynamic VLAN name assignment:

1. Configure a RADIUS server:


l Set Tunnel-Type to "VLAN".
l Set Tunnel-Medium-Type to "IEEE-802".
l Set Tunnel-Private-Group-Id to "my.vlan.10". In this option, you designate the VLAN name instead of VLAN
ID.
2. Configure FortiGate:
​edit "my.vlan.10"
set vdom "root"
set ip 1.1.1.254 255.255.255.0
set allowaccess ping
set interface "my.fortlink"
set vlanid 10
next
end
3. Configure FortiSwitch:
# show switch vlan

FortiOS 6.2.0 New Features Guide 76


Fortinet Technologies Inc.
Expanding Fabric Family

config switch vlan


edit 10
set description "my.vlan.10" --------> VLAN name will be stored into the
"description", which is not new CLI but just new API mapping to be implemented in
backend.
next
end

Netflow / IPFIX Support

Support for Netflow (v1, v5, v9) and IPFIX (IP Flow Information Export) is added to FortiSwitch 6.2, and the resulting
data will be available to FortiAnalyzer (and FortiView) for new traffic statistics and topology views. Traffic sampling data
can be used to show which users or devices behind switches are generating the highest traffic in those networks.
You can now configure Netflow/IPFIX on managed FortiSwitch units on switch controller.

You can configure flow-tracking related parameters by using the default values:
# config switch-controller flow-tracking
(flow-tracking) # get
sample-mode : perimeter
sample-rate : 512
format : netflow9
collector-ip : 0.0.0.0 ------> all-zero IP address implies disabled

FortiOS 6.2.0 New Features Guide 77


Fortinet Technologies Inc.
Expanding Fabric Family

collector-port : 0
transport : udp
level : ip
filter : -------> complies with tcpdump/wireshark filter syntax
max-export-pkt-size : 512
timeout-general : 3600
timeout-icmp : 300
timeout-max : 604800
timeout-tcp : 3600
timeout-tcp-fin : 300
timeout-tcp-rst : 120
timeout-udp : 300
aggregates:

Following are the sampling mode options:


l Perimeter sampling: RX sampling enabled on all non-fabric FortiSwitch ports, including access port and FortiLink
port, but not the FortiLink ISL port.
l Device-Ingress sampling: RX sampling enabled on all FortiSwitch ports.
l Local sampling: Sampling must be enabled on specific FortiSwitch ports by using config switch-
controller managed-switch and config ports.

QoS Assignment and Rate Limiting for Quarantined VLANs

When devices are quarantined, they are isolated from the rest of the network. However, they can still impact the
network if not controlled beyond isolation. A quarantined host, which offers heavy traffic, could congest the network and
create a DOS-style reduction in service to authorized hosts.
Within the quarantined VLAN, two restrictions are available within the network:
l Traffic policing (also known as rate limiting)
l QoS (Quality of Service) assignment (also known as priority assignment)
Each quarantined host's traffic can be subject to rate limiting and priority adjustment. This reduces the impact that any
quarantined host can have on authorized traffic on the network.
You can only configure this feature by using the CLI.
config switch-controller traffic-policy
(traffic-policy) # get
== [ quarantine ] -----> newly added pre-defined traffic-policy for quar-
antine (not only for quarantine, can be applied to other switch vlan interface based on
configuration)
name: quarantine
== [ sniffer ]
name: sniffer
(traffic-policy) # edit quarantine
(quarantine) # show
config switch-controller traffic-policy
edit "quarantine"
set description "Rate control for quarantined traffic"
set guaranteed-bandwidth 163840
set guaranteed-burst 8192
set maximum-burst 163840
set cos-queue 0
next

FortiOS 6.2.0 New Features Guide 78


Fortinet Technologies Inc.
Expanding Fabric Family

end
next
end
end

config system interface


edit "qtn.aggr1"
set vdom "root"
set ip 10.254.254.254 255.255.255.0
set description "Quarantine VLAN"
set security-mode captive-portal
set replacemsg-override-group "auth-intf-qtn.aggr1"
set device-identification enable
set snmp-index 30
set switch-controller-access-vlan enable
set switch-controller-traffic-policy "quarantine" -----> By default, switch-
controller-traffic-policy is empty. Users need to apply the necessary traffic-policy, not
only limited to "quarantine"
set color 6
set interface "aggr1"
set vlanid 4093
next
end

Persistent MAC Learning (Sticky MAC)

Persistent MAC learning or sticky MAC is a port security feature where dynamically learned MAC addresses are retained
when a switch or interface comes back online. The benefits of this feature include:
l Prevent traffic loss from trusted workstations and servers since there is no need to relearn MAC address after a
restart.
l Protect the switch and the whole network when combined with MAC-learning-limit against security attacks such as
Layer 2 DoS and overflow attacks.
Persistent MAC learning is configured in FortiGate and implemented in FortiSwitch.
This feature is disabled by default. You can use persistent MAC learning together with MAC limiting to restrict the
number of persistent MAC addresses.
This feature is hardware and CPU intensive and can take several minutes depending on the number of entries.
You can only use CLI to configure this feature.

This feature is supported on all FortiSwitch models in FSW 6.0.


This feature is supported on models in FSW 3.6 higher than the 124D series.

To enable sticky MAC on FortiGate:

config switch-controller managed-switch


edit <switch-serial-number>
conf ports
edit <port-number>
set sticky-mac enable
next

FortiOS 6.2.0 New Features Guide 79


Fortinet Technologies Inc.
Expanding Fabric Family

end
next
end

Before saving sticky Mac entries into CMDB, you might want to delete the unsaved sticky MAC items so that only the
items you want are saved.
Saving sticky MAC items copies the sticky MAC items from memory to CMDB on FortiSwitches and FortiGates.

To delete unsaved sticky MAC items:

execute switch-controller switch-action sticky-mac delete-unsaved <all | interface><switch-


serial-number>

To save sticky MAC items into CMDB:

execute switch-controller switch-action sticky-mac save <all | interface><switch-serial-


number>

Split Port Mode for QSFP ports

The quad small form-factor pluggable transceiver (QSFP/QSPF28) is a module that offers high-density 40/100 Gigabit
Ethernet connectivity options for data center and high-performance computing networks. The QSFP transceiver module
is a hot-swappable, parallel fiber-optic/copper module with four independent optical transmit and receive channels.
These channels can terminate in another Ethernet QSFP transceiver, or the channels can be broken out to four separate
physical ports.
Configuration of which FortiSwitch ports are split is controlled directly on the FortiSwitch. An administrator needs to
manually log into the FortiSwitch and set the desired split port configuration. After a split port configuration change is
made on the FortiSwitch, it will automatically reboot. If the FortiSwitch was previously discovered or authorized, it
should be deleted to allow the switch to be newly discovery again.

This feature requires a FortiSwitch model with SFP+ 40G ports, and FortiSwitch must be in
Fortlink mode when changing the split configuration.

To use FortiSwitch with split ports with the switch controller (previously discovered):

1. On FortiSwitch, change the split mode:


This change requires a reboot.
config switch phy-mode
set port29-phy-mode 4x10G
set port30-phy-mode 4x10G
end
2. Delete the FortiSwitch from managed-switch stanza.
3. Discover and authorize.

To use FortiSwitch with split ports with the switch controller (out of the box with factory defaults):

1. Discover and Authorize.


This change requires a reboot.

FortiOS 6.2.0 New Features Guide 80


Fortinet Technologies Inc.
Expanding Fabric Family

2. On FortiSwitch, change split mode.


This change requires a reboot.
3. Delete switch from managed-switch stanza.
4. Discover and authorize.
No CLI changes; however, FortiGate introduces a new FortiSwitch port index:
config switch-controller managed-switch
edit S524DN4K15000008
config ports
edit "port29.1"
set speed 10000
set vlan "vsw.port11"
set allowed-vlans "qtn.port11"
set untagged-vlans "qtn.port11"
set export-to "root"
next
......
edit "port29.4"
set speed 10000
set vlan "vsw.port11"
set allowed-vlans "qtn.port11"
set untagged-vlans "qtn.port11"
set export-to "root"
next
edit "port30.1"
set speed 10000
set vlan "vsw.port11"
set allowed-vlans "qtn.port11"
set untagged-vlans "qtn.port11"
set export-to "root"
next
......
edit "port30.4"
set speed 10000
set vlan "vsw.port11"
set allowed-vlans "qtn.port11"
set untagged-vlans "qtn.port11"
set export-to "root"
next
end
next
end

Virtual Switch Extensions

The Virtual Switch concept was introduced in previous releases. It provides a container for physical ports to be loaned
out to other VDOMs, which allows local management of the resource. In the original feature, only a minimum of switch
capability was introduced, such as VLAN, allowed-vlan, status, speed, poe-status, and poe-reset.

This extends some of the port capabilities including:


l poe-pre-standard-detection
l learning-limit
l qos-policy

FortiOS 6.2.0 New Features Guide 81


Fortinet Technologies Inc.
Expanding Fabric Family

l port-security-policy
l trunk ports (with some limitations)

Example

The following example shows how to export managed FortiSwitch ports to multi-tenant VDOMs. Some of the
capabilities are available in previous releases of FortiOS, and the 6.2.0 release expands the functionality.

To export managed FortiSwitch ports to multi-tenant VDOMs:

1. Configure switch VLAN interfaces, and assign them to the tenant VDOM:
In this example, the owner VDOM is root, and the tenant VDOM is vdom2.
(root) # config system interface
edit "tenant-vlan1"
set vdom "vdom2"
set device-identification enable
set fortiheart beat enable
set role lan
set snmp-index 34
set interface "aggr1"
set vlanid 101
next
end
2. In the tenant VDOM, designate default-virtual-switch-vlan, which is used to set the native VLAN of
ports leased from the owner VDOM:
(vdom2) # config switch-controller global
set default-virtual-switch-vlan "tenant-vlan1"
end
3. Owner vdom admin can export managed fsw ports to tenant vdom, as below
(root) # conf switch-controller managed-switch
(managed-switch) # edit S248EPTF1800XXXX
(S248EPTF1800XXXX) # conf ports
(ports) # edit port1
(port1) # set export-to ?
<string> string please input string value
root vdom
vdom1 vdom
vdom2 vdom
vdom3 vdom
(port1) # set export-to vdom2
(port1) # end
Alternatively, the admin of the owner VDOM can export managed FortiSwitch ports to shared virtual-switch pools
for the tenant VDOM to pick, for example:
(root) # config switch-controller virtual-port-pool
edit "pool1"
next
end
(root) # conf switch-controller managed-switch
(managed-switch) # edit S248EPTF18001384
(S248EPTF18001384) # conf ports
(ports) # edit port8
(port8) # set export-to-pool pool1
(port8) # next
(ports) # edit port9

FortiOS 6.2.0 New Features Guide 82


Fortinet Technologies Inc.
Expanding Fabric Family

(port9) # set export-to-pool pool1


(port9) # end
4. The admin of the tenant VDOM logs in, and configures the ports of the leased managed FortiSwitch, or the admin
continues to lease/release ports from virtual switch pool.
Then in each tenant VDOM, the tenant admin can configure and leverage the FortiSwitch ports locally with limited
range of operations based on the available CLI operations:
login: vdom2
Password: *****
Welcome !
$ show switch-controller managed-switch
config switch-controller managed-switch
edit "S248EPTF1800XXXX"
set type virtual
set owner-vdom "root"
config ports
edit "port1"
set poe-capable 1
set vlan "tenant-vlan1"
next
edit "port6"
set poe-capable 1
set vlan "tenant-vlan1"
next
$ conf switch-controller managed-switch
(managed-switch) $ edit S248EPTF1800XXXX
(S248EPTF1800XXXX) $ config ports
(ports) $ edit port1
(port1) $ set
port-owner Switch port name.
speed Switch port speed; default and available settings depend on hardware.
status Switch port admin status: up or down.
poe-status Enable/disable PoE status.
poe-pre-standard-detection Enable/disable PoE pre-standard detection. -->
expanded to tenant VDOM in FortiOS 6.2
poe-capable PoE capable.
vlan Assign switch ports to a VLAN.
allowed-vlans Configure switch port tagged vlans
untagged-vlans Configure switch port untagged vlans
type Interface type: physical or trunk port.
qos-policy Switch controller QoS policy from available options. --> expanded
to tenant VDOM in FortiOS 6.2
storm-control-policy Switch controller storm control policy from available
options.
port-security-policy Switch controller authentication policy to apply to
this managed switch from available options.--> expanded to tenant
VDOM in FortiOS 6.2
learning-limit Limit the number of dynamic MAC addresses on this Port (1 -
128, 0 = no limit, default).--> expanded to tenant VDOM in FortiOS 6.2
(ports) # edit trunk1
(trunk) # set type trunk --> expanded to tenant VDOM in FortiOS 6.2
$ exe switch-controller virtual-port-pool request S248EPTF1800XXXX port8
$ exe switch-controller virtual-port-pool show

FortiOS 6.2.0 New Features Guide 83


Fortinet Technologies Inc.
Expanding Fabric Family

MSTI Support

In 6.0, the switch controller maps all user VLANs into the MSTI-CST (common spanning tree) instance 0. While
reserving MSTI-0 (CST) and MSTI-15 for FortiLink management VLAN=4094. In 6.2, the administrator can control
MSTI 1-14.
Each instance is a full and complete spanning tree. Any user VLAN may be mapped to any instance, allowing the
spanning trees to have different topologies for each MSTI. Each instance allows the setting of various parameters such
as cost and priority.
You must configure this feature by using the CLI.

To configure MSTI support:

1. Create or modify stp-instance between 1 to 14:


(root) # conf switch-controller stp-instance
(stp-instance) # edit 15
please enter a value of 1 to 14.
(stp-instance) # edit 1 ----> created stp instances will be applied to all
managed fsws
new entry '1' added
(1) # set vlan-range
*vlan-name VLAN name.
cam.aggr1 interface
snf.aggr1 interface
tenant-vlan3 interface
tenant-vlan4 interface
voi.aggr1 interface
vsw.aggr1 interface
(1) # set vlan-range tenant-vlan3 vsw.aggr1
(1) # end

2. Configure specific stp priority on different managed FortiSwitch units:


(root) # conf switch-controller managed-switch
(managed-switch) # edit S248EPTF1800XXXX

(S248EPTF1800XXXX) # conf stp-instance

(stp-instance) # edit 1

# get
id : 1
priority : 32768 ------> Default priority
(1) # set priority 8192

(1) # end

FortiLink Auto Network Configuration Policy

In 6.0, FortiLink supports automatic network detection and configuration. As links can automatically appear and
disappear, this presents challenges for customization because administrators can only select the default QoS policy

FortiOS 6.2.0 New Features Guide 84


Fortinet Technologies Inc.
Expanding Fabric Family

which is applied to all FortiSwitch units in the network. In some cases, this is enough, but larger and more complex
topologies require more flexibility.
In 6.2, the Switch Controller introduces a network auto-config option, which contains configurable defaults, policy
customization, and an individual interface override. This gives administrators simple and flexible control.
Following is a description of these options:

auto-config default Provides the default actions for the first hop (fgt-policy) and lower-tier
devices (isl-policy).

auto-config policy A database containing policies that can be applied as a system-wide default or to
a specific interface.
auto-config custom Allows for the override of the auto-config default on a specific interface.
This information is retained and is reapplied if an interface leaves and then is
rediscovered.

To configure automatic network detection:

1. Create or modify an auto-config policy:


config switch-controller auto-config policy
edit test123
get
name : test123
qos-policy : default <== leverage the default qos-policy
storm-control-policy: auto-config <== leverage auto-config storm-control-
policy by default
poe-status : enable <== If target of auto-config is poe port,
keep poe-status enabled by default
next
end

2. Designate an auto-config policy to FortiLink, ISL, or ICL on Managed FortiSwitches.


config switch-controller auto-config default
get
fgt-policy : test123
isl-policy : test123
icl-policy : test123
set ?
fgt-policy Default FortiLink auto-config policy.
isl-policy Default ISL auto-config policy.
icl-policy Default ICL auto-config policy.
end

3. Customize an auto-config policy for a specific FGT, ICL, or ISL interface.


config switch-controller auto-config custom
edit ?
*name Auto-Config FortiLink or ISL/ICL interface name.
edit G5H0E391790XXXX
new entry 'G5H0E391790XXXX' added
config switch-binding
edit ?
*switch-id Switch name.

FortiOS 6.2.0 New Features Guide 85


Fortinet Technologies Inc.
Expanding Fabric Family

edit S524DN4K1500XXXX
new entry 'S524DN4K1500XXXX' added
get
switch-id : S524DN4K1500XXXX
policy : default
next
end
next
end

FortiLink MCLAG configuration in GUI

In this version, you can enable MCLAG in the GUI and view ports grouped by trunks. You need to configure ports from
two switches, that is, two MCLAG peer switches to be included in one MCLAG.

Sample configuration

In WiFi & Switch Controller > FortiSwitch Ports, there is a new MC-LAG option.

FortiOS 6.2.0 New Features Guide 86


Fortinet Technologies Inc.
Expanding Fabric Family

In WiFi & Switch Controller > FortiSwitch Ports, there is a separate Trunk view.

FortiLink Network Sniffer Extension

In 6.0, the switch controller introduced traffic mirroring with a single switch. This provides a general capability, but can
result in large volumes of traffic being mirrored. In 6.2, the new switch controller option of traffic-sniffer
provides a targeted approach: mirrored traffic is always directed towards the FortiGate on a dedicated VLAN. This
allows for easy sniffing by using the CLI or GUI. Additionally, the traffic can also be routed through the FortiGate using
Encapsulated Remote Switched Port Analyzer (ERSPAN) for external analysis and storage.
With the new option, you can define targeted sniffers by IP or MAC address. Traffic matching is replicated to the
FortiGate, which is helpful when you know what device you are looking for, but you don't know where it is located.
FortiLink networks can have multiple switches, and traffic typically traverses several switches. If each switch mirrors any
match, the sniffer would see multiple copies of traffic. To reduce this, the targets are applied at the perimeter of the
FortiSwitch network. Traffic entering by a user port or traffic from FortiGate is considered eligible for mirroring.
You can also enable traditional port-based sniffers in the ingress or egress direction.
All sniffer traffic arrives at the FortiGate using ERSPAN and the traffic is encapsulated in generic routing encapsulation
(GRE).

FortiOS 6.2.0 New Features Guide 87


Fortinet Technologies Inc.
Expanding Fabric Family

You can only configure this feature using the CLI:


l Use pre-defined sniffer-used switch VLAN interface:
config system interface
edit "snf.aggr1" ---> Newly added pre-defined switch vlan interface. Created
automatically after the first FortiSwitch is discovered and authorized.
set vdom "root"
set ip 10.254.253.254 255.255.254.0
set allowaccess ping
set description "Sniffer VLAN"
set snmp-index 33
set switch-controller-traffic-policy "sniffer"
set color 6
set interface "aggr1"
set vlanid 4092
next
end
l Enable traffic sniffer based on target IP or MAC addresses on target ports of managed FortiSwitch units:
config switch-controller traffic-sniffer ---> newly added>
set erspan-ip 2.2.2.2 ---> Designated ERSPAN collector
config target-mac
edit 11:11:11:11:11:11
next
end
config target-ip
edit 4.4.4.4
next
end
config target-port
edit "S524DN4K1500XXXX"

FortiOS 6.2.0 New Features Guide 88


Fortinet Technologies Inc.
Expanding Fabric Family

set in-ports "port2" "port4" "port6"


set out-ports "port3" "port5" "port7"
next
end
end
l Use troubleshooting tools:
FortiGate-500E (root) # diag switch-controller switch-info mirror status S524DN4K1500XXXX

Managed Switch : S524DN4K1500XXXX


flink.sniffer
Mode : ERSPAN-auto
Status : Active
Source-Ports:
Ingress: port2, port4, port6
Egress : port3, port5, port7
Used-by-ACLs : True
Auto-config-state : Resolved/Running
Last-update : 1464 seconds ago
Issues : None
Collector-IP : 2.2.2.2
Source-IP : 10.254.252.208
Source-MAC : 08:5b:0e:ff:40:27
Next-Hop :
IP : 10.254.253.254
MAC : 00:09:0f:09:00:0c
Via-System-Interface : sniffer
VLAN : 4092(tagged)
Via-Switch-Interface : G5H0E391790XXXX

Leverage LLDP to Simplify Security Fabric Negotiation

This feature enables LLDP reception on WAN interfaces, and prompts FortiGates that are joining the Security Fabric if
the upstream FortiGate asks.
l If an interface's role is undefined, LLDP reception and transmission inherit settings from the VDOM.
l If an interface's role is WAN, LLDP reception is enabled.
l If an interface's role is LAN, LLDP transmission is enabled.

When a FortiGate B's WAN interface detects that FortiGate A's LAN interface is immediately upstream (through the
default gateway), and FortiGate A has Security Fabric enabled, FortiGate B will show a notification on the GUI asking to
join the Security Fabric.

FortiOS 6.2.0 New Features Guide 89


Fortinet Technologies Inc.
Expanding Fabric Family

To configure LLDP reception and join a Security Fabric:

1. Go To Network > Interfaces.


2. Configure an interface:
l If the interface's role is undefined, under Administrative Access, set Receive LLDP and Transmit LLDP to
Use VDOM Setting.

Using the CLI:


config system interface
edit "port3"
set lldp-reception vdom
set lldp-transmission vdom
set role undefined
...
next
end

l If the interface's role is WAN, under Administrative Access, set Receive LLDP to Enable and Transmit LLDP
to Use VDOM Setting.

Using the CLI:

FortiOS 6.2.0 New Features Guide 90


Fortinet Technologies Inc.
Expanding Fabric Family

config system interface


edit "wan1"
set lldp-reception enable
set lldp-transmission vdom
set role wan
...
next
end

l If the interface's role is LAN, under Administrative Access, set Receive LLDP to Use VDOM Setting and
Transmit LLDP to Enable.

Using the CLI:


config system interface
edit "port2"
set lldp-reception vdom
set lldp-transmission enable
set role lan
...
next
end

A notification will be shown on FortiGate B.

FortiOS 6.2.0 New Features Guide 91


Fortinet Technologies Inc.
Expanding Fabric Family

3. Click the notification. The Security Fabric Settings page opens with all the required settings automatically
configured.

4. Click Apply to apply the settings, or use the following CLI commands:
config system csf
set status enable
set upstream-ip 10.2.200.1
end

FortiOS 6.2.0 New Features Guide 92


Fortinet Technologies Inc.
Fabric Connectors

This section lists the new features added to FortiOS for Security Fabric connectors.
l Multiple Concurrent SDN/Cloud Connectors on page 93
l Filter Lookup Improvement for SDN Connectors on page 96
l Obtain full user information through the MS Exchange connector on page 98
l Cloud Connector - AliCloud on page 100
l Cloud Connector - AWS - IAM Support on page 103
l SDN Connector - VMware ESXi on page 106
l Kubernetes (K8s) on page 109
l SDN Connector - Azure Stack on page 122
l SDN Connector - OpenStack Domain Filter on page 125
l Endpoint Connector - Cisco pxGrid on page 127
l External Block List (Threat Feed) – Policy on page 131
l External Block List (Threat Feed) - File Hashes on page 132
l External Block List (Threat Feed) - Authentication on page 138
l Connector GUI Organization on page 138

Multiple Concurrent SDN/Cloud Connectors

This feature introduces support for multiple connectors of all SDN connector types to be defined. Previously, only a
single connector could be configured for most types, and the SDN connector had to be specified when creating a
dynamic firewall address. Now, multiple instances can be configured for every SDN connector, and the specific
connector instance must be specified when creating a dynamic firewall address.
This example shows two Microsoft Azure SDN connectors being created, and then being used in new dynamic firewall
addresses.

Multiple concurrent SDN/Cloud connectors are not supported yet for Cisco ACI or Nuage.

To create and use two new SDN connectors with the CLI:

1. Create two new SDN connectors:


config system sdn-connector
edit "azure1"
set type azure
set tenant-id "942b80cd-bbbb-42a1-8888-4b21dece61ba"
set subscription-id "2f96c44c-cccc-4621-bbbb-65ba45185e0c"
set client-id "14dbd5cc-3333-4ea4-8888-68738141feb1"
set client-secret xxxxx

FortiOS 6.2.0 New Features Guide 93


Fortinet Technologies Inc.
Fabric Connectors

set update-interval 30
next
edit "azure2"
set type azure
set tenant-id "942b80cd-bbbb-42a1-8888-4b21dece61ba"
set client-id "3baa0acc-ffff-4444-b292-0777a2c36be6"
set client-secret xxxxx
set update-interval 30
next
end

2. Create new dynamic firewall addresses that use the new connectors:
config firewall address
edit "azure-address-location1"
set type dynamic
set color 2
set sdn azure1
set filter "location=WestUs"
next
edit "azure-address-location2"
set type dynamic
set color 2
set sdn azure2
set filter "location=NorthEurope"
next
end

To create and use two new SDN connectors with the GUI:

1. Create two new SDN connectors:


a. Go to Security Fabric > Fabric Connectors, and click Create New in the toolbar.
b. Click on Microsoft Azure.
c. Fill in the required information, then click OK.

FortiOS 6.2.0 New Features Guide 94


Fortinet Technologies Inc.
Fabric Connectors

d. Repeat the above steps for the second connector.

Two Microsoft Azure connectors will now be created.

2. Create new dynamic firewall addresses that use the new connectors:
a. Go to Policy and Objects > Addresses and click Create New > Address in the toolbar.
b. Enter a name for the address, and select Fabric Connector Address for the Type.
c. Select one of the previously created SDN connectors from the SDN Connector drop down list.

d. Configure the rest of the required information, then click OK to create the address.
e. Repeat the above steps to create the second address, selecting the other Microsoft Azure SDN connector.

FortiOS 6.2.0 New Features Guide 95


Fortinet Technologies Inc.
Fabric Connectors

Filter Lookup Improvement for SDN Connectors

In 6.0, when configuring dynamic address mappings for filters in AWS, FortiGate can query the filters automatically,
while for other clouds the configuration is a manual process. In 6.2, the same capability is expanded to SDN connectors
for Azure, GCP, OpenStack, Kubernetes, and AliCloud.

To use the improved filter lookup:

1. Navigate to Policy & Objects > Addresses.


2. Create or edit an SDN connector type dynamic IP address.
Supported SDN connector types include: AWS, Azure, GCP, OpenStack, Kubernetes, and AliCloud. The example
below is for an Azure SDN connector.
3. In the address Filter field, users can:
l List all available filters in Omniselect.

l Search the available filters in Omniselect.

FortiOS 6.2.0 New Features Guide 96


Fortinet Technologies Inc.
Fabric Connectors

l Create custom filters in Omniselect.

FortiOS 6.2.0 New Features Guide 97


Fortinet Technologies Inc.
Fabric Connectors

l Set filter logic [and|or] in multiple Omniselects.

Obtain full user information through the MS Exchange connector

FortiGate can collect additional information about authenticated users from corporate MS Exchange servers. After a
user logs in, the additional information can be viewed in various parts of the GUI.
The Exchange connector must be mapped to the LDAP server that is used for authentication.
The following attributes are retrieved:

USER_INFO_FULL_NAME USER_INFO_COMPANY USER_INFO_CITY


USER_INFO_FIRST_NAME USER_INFO_DEPARTMENT USER_INFO_STATE
USER_INFO_LAST_NAME USER_INFO_GROUP USER_INFO_POSTAL_CODE
USER_INFO_LOGON_NAME USER_INFO_TITLE USER_INFO_COUNTRY
USER_INFO_TELEPHONE USER_INFO_MANAGER USER_INFO_ACCOUNT_EXPIRES
USER_INFO_EMAIL USER_INFO_STREET
USER_INFO_USER_PHOTO USER_INFO_POST_OFFICE_BOX

This example shows the configuration and verification in the CLI.

To configure and use an Exchange connector:

1. Configure the Exchange user:


config user exchange
edit "exchange140"
set server-name "W2K8-SERV1"
set domain-name "FORTINET-FSSO.COM"
set username "Administrator"
set password ENC XXXXXXXXXXXXXXXXXXXXXXX

FortiOS 6.2.0 New Features Guide 98


Fortinet Technologies Inc.
Fabric Connectors

set ip 10.1.100.140
set kdc-ip "10.1.100.131"
next
end

Where:

server-name The hostname of the Exchange server.


domain-name The domain name of active directory.
username The username that FortiGate uses to connect to the Exchange server.
password The password that FortiGate uses to connect to the Exchange server.
ip The IP address of the Exchange server.
kdc-ip The IP address of the Global Catalog server.

For details about other commands, so the FortiOS CLI Reference.


2. Set the exchange server in the LDAP user:
config user ldap
edit "AD-ldap"
set server "10.1.100.131"
set server-identity-check disable
set cnid "cn"
set dn "dc=fortinet-fsso,dc=com"
set type regular
set username "cn=Administrator,cn=users,dc=fortinet-fsso,dc=com"
set password ENC XXXXXXXXXXXXXXXXXXXX
set secure ldaps
set port 636
set password-renewal enable
set user-info-exchange-server "exchange140"
next
end

To check the collected information after the user has been authenticated:

1. In the GUI, go to Monitor > Firewall User Monitor and hover over the user name.

FortiOS 6.2.0 New Features Guide 99


Fortinet Technologies Inc.
Fabric Connectors

2. In the CLI, run the following command:


# diagnose wad user info 20 test1
'username' = 'test1'
'sourceip' = '10.1.100.185'
'vdom' = 'root'
'cn' = 'test1'
'givenName' = 'test1'
'sn' = 'test101'
'userPrincipalName' = 'test1@Fortinet-FSSO.COM'
'telephoneNumber' = '604-123456'
'mail' = 'test1@fortinet-fsso.com'
'thumbnailPhoto' = '/tmp/wad/user_info/76665fff62ffffffffffffffffffff75ff68fffffffffa'
'company' = 'Fortinet'
'department' = 'Release QA'
'memberOf' = 'CN=group321,OU=Testing,DC=Fortinet-FSSO,DC=COM'
'memberOf' = 'CN=g1,OU=Testing,DC=Fortinet-FSSO,DC=COM'
'memberOf' = 'CN=group21,OU=Testing,DC=Fortinet-FSSO,DC=COM'
'memberOf' = 'CN=group1,OU=Testing,DC=Fortinet-FSSO,DC=COM'
'manager' = 'CN=test6,OU=Testing,DC=Fortinet-FSSO,DC=COM'
'streetAddress' = 'One Backend Street 1901'
'l' = 'Burnaby'
'st' = 'BC'
'postalCode' = '4711'
'co' = 'Canada'
'accountExpires' = '9223372036854

If the results are not as expected, use the following commands to verify what information FortiGate can collect
from the Exchange server:
diagnose test application wad 2500
diagnose test application wad 162

You can also enable debugging during user authentication:


diagnose wad debug enable level verbose

Cloud Connector - AliCloud

FortiOS now supports automatically updating dynamic addresses for AliCloud using an AliCloud SDN connector,
including mapping the following attributes from AliCloud instances to dynamic address groups in FortiOS:
l ImageId
l InstanceId
l SecurityGroupId
l VpcId
l VSwitchId
l TagKey
l TagValue

FortiOS 6.2.0 New Features Guide 100


Fortinet Technologies Inc.
Fabric Connectors

To configure AliCloud SDN connector using the GUI:

1. Configure the AliCloud SDN connector:


a. Go to Security Fabric > Fabric Connectors.
b. Click Create New, and select Alibaba Cloud.
c. Configure as shown, substituting the access key, secret, and region ID for your deployment. The update
interval is in seconds.

2. Create a dynamic firewall address for the configured AliCloud SDN connector:
a. Go to Policy & Objects > Addresses.
b. Click Create New, then select Address.
c. Configure the address as shown, selecting the desired filter in the Filter dropdown list. In this example, the
AliCloud SDN Connector will automatically populate and update IP addresses only for instances that belong to
the specified security group:

3. Ensure that the AliCloud SDN connector resolves dynamic firewall IP addresses:
a. Go to Policy & Objects > Addresses.
b. Hover over the address created in step 2 to see a list of IP addresses for instances that belong to the security

FortiOS 6.2.0 New Features Guide 101


Fortinet Technologies Inc.
Fabric Connectors

group configured in step 2:

To configure AliCloud SDN connector using CLI commands:

1. Configure the AliCloud SDN connector:


config system sdn-connector
edit "ali1"
set type acs
set access-key "LTAIKmERWEuEOChg"
set secret-key xxxxx
set region "us-west-1"
set update-interval 30
next
end
2. Create a dynamic firewall address for the configured AliCloud SDN connector with the supported AliCloud filter. In
this example, the AliCloud SDN Connector will automatically populate and update IP addresses only for instances
that belong to the specified security group:
config firewall address
edit "ali-address-security"
set type dynamic
set sdn "ali1"
set filter "SecurityGroupId=sg-rj9bp5ax5kwy3gqdizqb"
next
end
3. Confirm that the AliCloud SDN connector resolves dynamic firewall IP addresses using the configured filter:
config firewall address
edit "ali-address-security"
set uuid 62a76df2-18f6-51e9-b555-360b18359ebe
set type dynamic
set sdn "ali1"
set filter "SecurityGroupId=sg-rj9bp5ax5kwy3gqdizqb"
config list
edit "10.0.0.16"
next
edit "10.0.0.17"
next
edit "10.0.0.20"
next
end
next
end

FortiOS 6.2.0 New Features Guide 102


Fortinet Technologies Inc.
Fabric Connectors

Cloud Connector - AWS - IAM Support

For instances running in AWS (on demand or BYOL), you can now set up the AWS connector by using AWS Identify and
Access Management (IAM) credentials.
IAM authentication is available only for FGT-AWS and FGT-AWSONDEMAND platforms.

To configure AWS SDN connector using the GUI:

1. Configure the AWS SDN connector:


a. Go to Security Fabric > Fabric Connectors.
b. Click Create New, and select Amazon Web Services (AWS).
c. Configure as shown:

2. Create a dynamic firewall address for the configured AWS SDN connector:
a. Go to Policy & Objects > Addresses.
b. Click Create New, then select Address.
c. Configure the address as shown, selecting the desired filter in the Filter dropdown list.
Following is an example for a public SDN address type:

FortiOS 6.2.0 New Features Guide 103


Fortinet Technologies Inc.
Fabric Connectors

Following is an example for a private SDN address type:

3. Ensure that the AWS SDN connector resolves dynamic firewall IP addresses:
a. Go to Policy & Objects > Addresses.
b. Hover over the address created in step 2 to see a list of IP addresses for instances that belong to the security
group configured in step 2.
Following is an example for a public SDN address type:

FortiOS 6.2.0 New Features Guide 104


Fortinet Technologies Inc.
Fabric Connectors

Following is an example for a private SDN address type:

To configure AWS SDN connector using CLI commands:

1. Configure the AWS connector:


config system sdn-connector
edit "aws1"
set status enable
set type aws
set use-metadata-iam enable
set update-interval 60
next
end
2. Create a dynamic firewall address for the configured AWS SDN connector with the supported filter:
Dynamic firewall address IPs are resolved by the SDN connector.
config firewall address

FortiOS 6.2.0 New Features Guide 105


Fortinet Technologies Inc.
Fabric Connectors

edit "aws-ec2"
set type dynamic
set sdn "aws1"
set filter "SecurityGroupId=sg-05f4749cf84267548"
set sdn-addr-type public
next
edit "aws-eks1"
set type dynamic
set sdn "aws1"
set filter "K8S_Region=us-west-2"
next
end
3. Confirm that the AWS SDN connector resolves dynamic firewall IP addresses using the configured filter:
config firewall address
edit "aws-ec2"
set uuid e756e786-3a2e-51e9-9d40-9492098de42d
set type dynamic
set sdn "aws1"
set filter "SecurityGroupId=sg-05f4749cf84267548"
set sdn-addr-type public
config list
edit "34.222.246.198"
next
edit "54.188.139.177"
next
edit "54.218.229.229"
next
end
next
edit "aws-eks1"
set uuid d84589aa-3a10-51e9-b1ac-08145abce4d6
set type dynamic
set sdn "aws1"
set filter "K8S_Region=us-west-2"
config list
edit "192.168.114.197"
next
edit "192.168.167.20"
next
edit "192.168.180.72"
next
edit "192.168.181.186"
next
edit "192.168.210.107"
next
end
next
end

SDN Connector - VMware ESXi

FortiOS now supports automatically updating dynamic addresses for VMware ESXi and vCenter servers using a VMware
ESXi SDN connector, including mapping the following attributes from VMware ESXi and vCenter objects to dynamic

FortiOS 6.2.0 New Features Guide 106


Fortinet Technologies Inc.
Fabric Connectors

address groups in FortiOS:


l vmid
l host
l name
l uuid
l vmuuid
l vmnetwork
l guestid
l guestname
l annotation

To configure VMware ESXi SDN connector using the GUI:

1. Configure the VMware ESXi SDN connector:


a. Go to Security Fabric > Fabric Connectors.
b. Click Create New, and select VMware ESXi.
c. Configure as shown, substituting the server IP address, username, and password for your deployment. The
update interval is in seconds.

2. Create a dynamic firewall address for the configured VMware ESXi SDN connector:
a. Go to Policy & Objects > Addresses.
b. Click Create New, then select Address.
c. Configure the address as shown, selecting the desired filter in the Filter dropdown list. In this example, the
VMware ESXi SDN Connector will automatically populate and update IP addresses only for instances that

FortiOS 6.2.0 New Features Guide 107


Fortinet Technologies Inc.
Fabric Connectors

belong to VLAN80:

3. Ensure that the VMware ESXi SDN connector resolves dynamic firewall IP addresses:
a. Go to Policy & Objects > Addresses.
b. Hover over the address created in step 2 to see a list of IP addresses for instances that belong to VLAN80 as
configured in step 2:

To configure VMware ESXi SDN connector using CLI commands:

1. Configure the VMware ESXi SDN connector:


config system sdn-connector
edit "vmware1"
set type vmware
set server "172.17.48.222"
set username "example_username"
set password xxxxx
set update-interval 30
next
end
2. Create a dynamic firewall address for the configured VMware ESXi SDN connector with the supported VMware
ESXi filter. In this example, the VMware ESXi SDN Connector will automatically populate and update IP addresses
only for instances that belong to the specified VLAN:
config firewall address

FortiOS 6.2.0 New Features Guide 108


Fortinet Technologies Inc.
Fabric Connectors

edit "vmware-network"
set type dynamic
set sdn "vmware1"
set filter "vmnetwork=VLAN80"
next
end
3. Confirm that the VMware ESXi SDN connector resolves dynamic firewall IP addresses using the configured filter:
config firewall address
edit "vmware-network"
set uuid abfa1748-1b80-51e9-d0fd-ea322b3bba2d
set type dynamic
set sdn "vmware1"
set filter "vmnetwork=VLAN80"
config list
edit "192.168.8.240"
next
end
next
end

Kubernetes (K8s)

This section lists the new features added to FortiOS for Kubernetes.
l Private Cloud K8s Connector on page 109
l AWS Kubernetes (EKS) Connector on page 112
l Azure Kubernetes (AKS) Connector on page 114
l GCP Kubernetes (GKE) Connector on page 117
l Oracle Kubernetes (OKE) Connector on page 119

Private Cloud K8s Connector

FortiOS now supports automatically updating dynamic addresses for Kubernetes (K8S) using a K8S SDN connector,
enabling FortiOS to manage K8S pods as global address objects, as with other connectors. This includes mapping the
following attributes from K8S instances to dynamic address groups in FortiOS:

Filter Description

Namespace Filter service IP addresses in a given namespace.

ServiceName Filter service IP addresses by the given service name.

NodeName Filter node IP addresses by the given node name.

Label.XXX Filter service or node IP addresses with the given label XXX.

FortiOS 6.2.0 New Features Guide 109


Fortinet Technologies Inc.
Fabric Connectors

To configure K8S SDN connector using the GUI:

1. Configure the K8S SDN connector:


a. Go to Security Fabric > Fabric Connectors.
b. Click Create New, and select Kubernetes.
c. Configure as shown substituting the IP address, port number, and secret token for your deployment. The
update interval is in seconds.

2. Create a dynamic firewall address for the configured K8S SDN connector:
a. Go to Policy & Objects > Addresses.
b. Click Create New, then select Address.
c. Configure the address as shown, selecting the desired filter in the Filter dropdown list. In this example, the
K8S SDN connector will automatically populate and update IP addresses only for node instances that match
the specified node name:

3. Ensure that the K8S SDN connector resolves dynamic firewall IP addresses:
a. Go to Policy & Objects > Addresses.
b. Hover over the address created in step 2 to see a list of IP addresses for node instances that match the node

FortiOS 6.2.0 New Features Guide 110


Fortinet Technologies Inc.
Fabric Connectors

name configured in step 2:

To configure K8S SDN connector using CLI commands:

1. Configure the K8S SDN connector:


config system sdn-connector
edit "kubernetes1"
set type kubernetes
set server "172.18.64.38"
set server-port 6443
set secret-token xxxxx
set update-interval 30
next
end
2. Create a dynamic firewall address for the configured K8S SDN connector with the supported K8S filter. In this
example, the K8S SDN connector will automatically populate and update IP addresses only for node instances that
match the specified node name:
config firewall address
edit "k8s_nodename"
set type dynamic
set sdn "kubernetes1"
set filter "K8S_NodeName=van-201669-pc1"
next
end
3. Confirm that the K8S SDN connector resolves dynamic firewall IP addresses using the configured filter:
config firewall address
edit "k8s_nodename"
set uuid 462112a2-1ab1-51e9-799c-652621ba8c0c
set type dynamic
set sdn "kubernetes1"
set filter "K8S_NodeName=van-201669-pc1"
config list
edit "172.16.65.227"
next
end
next
end

FortiOS 6.2.0 New Features Guide 111


Fortinet Technologies Inc.
Fabric Connectors

AWS Kubernetes (EKS) Connector

This feature extends the existing AWS SDN connector to support dynamic address groups based on AWS Kubernetes
(EKS) filters.
To filter out the Kubernetes IP addresses, the following address filters have been introduced:

k8s_cluster Name of Kubernetes cluster.

k8s_namespace Namespace of a Kubernetes service or pod.

k8s_svcname Name of a Kubernetes service.

k8s_nodename Name of a Kubernetes node.

k8s_zone Zone of a Kubernetes node.

k8s_region Region of a Kubernetes node.

k8s_podname Name of a Kubernetes pod.

k8s_label.xxx Name of label of a Kubernetes resource (cluster/service/node/Pod).

To enable an AWS SDN connector to fetch IP addresses from AWS Kubernetes:

1. In Fabric Connectors, configure an SDN connector for AWS Kubernetes.

2. Go to Policies & Objects > Addresses and create a dynamic firewall address for the configured SDN connector
using the supported Kubernetes filter.

FortiOS 6.2.0 New Features Guide 112


Fortinet Technologies Inc.
Fabric Connectors

3. To filter out the Kubernetes IP addresses, select the address filter or filters.

4. Configure the rest of the settings, then click OK.


The dynamic firewall address IP is resolved by the SDN connector.

To configure an AWS Kubernetes connector through the CLI:

1. Configure an SDN connector for Kubernetes:


config system sdn-connector
edit "aws1"
set type aws
set access-key "AKIAIJNKE75ANVN5AEQA"
set secret-key xxxxx
set region "us-west-2"
set update-interval 30
next
end
2. Create a dynamic firewall address for the SDN connector with a supported Kubernetes filter:
config firewall address
edit "aws-pod"
set type dynamic
set sdn "aws1"
set filter "K8S_PodName=aws-node-g6zhx"
next

FortiOS 6.2.0 New Features Guide 113


Fortinet Technologies Inc.
Fabric Connectors

end
The dynamic firewall address IP is resolved by the SDN connector:
config firewall address
edit "aws-pod"
set uuid a7a37298-19e6-51e9-851a-2c551ffc174d
set type dynamic
set sdn "aws1"
set filter "K8S_PodName=aws-node-g6zhx"
config list
edit "192.168.114.197"
next
end
next
end

Azure Kubernetes (AKS) Connector

This feature extends the existing Azure SDN connector to support dynamic address groups based on Azure Kubernetes
(AKS) filters.
To filter out the Kubernetes IP addresses, the following address filters have been introduced:

k8s_cluster Kubernetes cluster name.

k8s_namespace Namespace of a Kubernetes service or pod.

k8s_svcname Kubernetes service name.

k8s_nodename Kubernetes node name.

k8s_region Kubernetes node region.

k8s_podname Kubernetes pod name.

k8s_label.xxx Name of label of a Kubernetes resource (cluster/service/node/Pod).

To enable an Azure SDN connector to fetch IP addresses from Azure Kubernetes:

1. Configure the Azure SDN connector:


a. Go to Security Fabric > Fabric Connectors.
b. Click Create New, and select Azure.
c. Configure as shown substituting the region, tenant and client IDs, and client secret for your deployment. The

FortiOS 6.2.0 New Features Guide 114


Fortinet Technologies Inc.
Fabric Connectors

update interval is in seconds.

2. Create a dynamic firewall address for the configured K8S SDN connector:
a. Go to Policy & Objects > Addresses.
b. Click Create New, then select Address.
c. Configure the address as shown, selecting the desired filter in the Filter dropdown list. In this example, the
Azure SDN connector will automatically populate and update IP addresses only for instances that belong to the
zhmKC cluster:

3. Ensure that the K8S SDN connector resolves dynamic firewall IP addresses:
a. Go to Policy & Objects > Addresses.
b. Hover over the address created in step 2 to see a list of IP addresses for instances that belong to the

FortiOS 6.2.0 New Features Guide 115


Fortinet Technologies Inc.
Fabric Connectors

zhmKC cluster as configured in step 2:

To configure an Azure Kubernetes connector through the CLI:

1. Configure an SDN connector for Kubernetes:


config system sdn-connector
edit "azure1"
set type azure
set tenant-id "942b80cd-1b14-42a1-8dcf-4b21dece61ba"
set client-id "14dbd5c5-307e-4ea4-8133-68738141feb1"
set client-secret xxxxx
set update-interval 30
next
end
2. Create a dynamic firewall address for the SDN connector with a supported Kubernetes filter. In this example, the
Azure SDN connector will automatically populate and update IP addresses only for instances that belong to the
zhmKC cluster:
config firewall address
edit "az-k8s-cluster"
set type dynamic
set sdn "azure1"
set filter "K8S_Cluster=zhmKC"
next
end
3. Confirm that the Azure SDN connector resolves dynamic firewall IP addresses using the configured filter: :
config firewall address
edit "az-k8s-cluster"
set uuid c3859270-1919-51e9-4a99-47d8caf97a01
set type dynamic
set sdn "azure1"
set filter "K8S_Cluster=zhmKC"
config list
edit "10.240.0.4"
next
edit "10.240.0.5"

FortiOS 6.2.0 New Features Guide 116


Fortinet Technologies Inc.
Fabric Connectors

next
edit "10.244.0.10"
next
end
next
end

GCP Kubernetes (GKE) Connector

This feature extends the existing Google Cloud Platform (GCP) SDN connector to support dynamic address groups
based on GCP Kubernetes Engine (GKE) filters.
To filter out the Kubernetes IP addresses, the following address filters have been introduced:

k8s_cluster Name of Kubernetes cluster.

k8s_nodepool Name of node pool for a Kubernetes cluster.

k8s_namespace Namespace of a Kubernetes service or pod.

k8s_servicename Name of a Kubernetes service.

k8s_nodename Name of a Kubernetes node.

k8s_zone Zone of a Kubernetes node.

k8s_region Region of a Kubernetes node.

k8s_podname Name of a Kubernetes pod.

k8s_label.xxx Name of label of a Kubernetes resource (cluster/service/node/Pod).

To enable a GCP SDN connector to fetch IP addresses from GKE:

1. In Fabric Connectors, configure an SDN connector for GCP.

FortiOS 6.2.0 New Features Guide 117


Fortinet Technologies Inc.
Fabric Connectors

2. Go to Policies & Objects > Addresses and create a dynamic firewall address for the configured SDN connector
using the supported Kubernetes filter.
3. To filter out the Kubernetes IP addresses, select the address filter or filters. In this example, the GCP SDN
connector will automatically populate and update IP addresses only for instances that belong to the zhm-
kc3 cluster:

4. Configure the rest of the settings, then click OK.


The dynamic firewall address IP is resolved by the SDN connector.

To configure a GCP Kubernetes connector through the CLI:

1. Configure an SDN connector for Kubernetes:


config system sdn-connector
edit "gcp1"
set type gcp
set gcp-project "dev-project-001-166400"
set service-account "966517025500-compute@developer.gserviceaccount.com"

FortiOS 6.2.0 New Features Guide 118


Fortinet Technologies Inc.
Fabric Connectors

set update-interval 30
next
end
2. Create a dynamic firewall address for the SDN connector with a supported Kubernetes filter:
config firewall address
edit "gcp-k8s-cluster"
set type dynamic
set sdn "gcp1"
set filter "K8S_Cluster=zhm-kc3"
next
end
The dynamic firewall address IP is resolved by the SDN connector:
config firewall address
edit "gcp-k8s-cluster"
set uuid e4a1aa3c-25be-51e9-e9af-78ab2eebe6ee
set type dynamic
set sdn "gcp1"
set filter "K8S_Cluster=zhm-kc3"
config list
edit "10.0.2.4"
next
edit "10.0.2.7"
next
edit "10.28.0.13"
next
end
next
end

Oracle Kubernetes (OKE) Connector

This project extends the existing SDN connector for OCI to support dynamic address groups based on Oracle
Kubernetes (OKE) filters.
To filter out the Kubernetes IP addresses, the following address filters have been introduced:

k8s_compartment Name of compartment that the Kubernetes cluster created in.

k8s_cluster Name of Kubernetes cluster.

k8s_namespace Namespace of a Kubernetes service or pod.

k8s_servicename Name of a Kubernetes service.

k8s_nodename Name of a Kubernetes node.

k8s_region Region of a Kubernetes node.

k8s_zone Zone of a Kubernetes node.

k8s_podname name of a Kubernetes pod.

k8s_label.xxx Name of label of a Kubernetes resource (cluster/service/node/Pod)

FortiOS 6.2.0 New Features Guide 119


Fortinet Technologies Inc.
Fabric Connectors

To enable an OCI SDN connector to fetch IP addresses from Oracle Kubernetes:

1. Configure the OCI SDN connector:


a. Go to Security Fabric > Fabric Connectors.
b. Click Create New, and select Oracle Cloud Infrastructure (OCI).
c. Configure as shown substituting the region, tenant and client IDs, and client secret for your deployment. The
update interval is in seconds.

2. Create dynamic firewall addresses for the configured SDN connector with supported Kubernetes filter:
a. Go to Policy & Objects > Addresses.
b. Click Create New, then select Address.
c. Configure the addresses.

FortiOS 6.2.0 New Features Guide 120


Fortinet Technologies Inc.
Fabric Connectors

3. Confirm that the SDN connector resolves dynamic firewall IP addresses:


a. Go to Policy & Objects > Addresses.
b. Hover over the address created in step 2 to see a list of IP addresses for instances:

To configure an SDN connector through the CLI:

1. Configure the OCI SDN connector:


config system sdn-connector
edit "oci1"
set type oci
set tenant-id
"ocid1.tenancy.oc1..aaaaaaaambr3uzztoyhweohbzqqdo775h7d3t54zpmzkp4b2cf35vs55c
xxx"
set user-id
"ocid1.user.oc1..aaaaaaaaq2lfspeo3uetzbzpiv2pqvzzevozccnys347stwssvizqlatfxx
x"
set compartment-id
"ocid1.compartment.oc1..aaaaaaaaelxxdjazqo7nzczpgypyiqcgkmytjry6nfq5345vw7eav
pwnmxxx"
set oci-region ashburn
set oci-cert "cert-sha2"
set update-interval 30
next
end
2. Create dynamic firewall addresses for the configured SDN connector with supported Kubernetes filter:
config firewall address
edit "k8s_nodename"
set type dynamic
set sdn "oci1"
set filter "K8S_NodeName=129.213.120.172"
next
end
3. Confirm that the SDN connector resolves dynamic firewall IP addresses:
config firewall address
edit "k8s_nodename"
set uuid 052f1420-3ab8-51e9-0cf8-6db6bc3395c0

FortiOS 6.2.0 New Features Guide 121


Fortinet Technologies Inc.
Fabric Connectors

set type dynamic


set sdn "oci1"
set filter "K8S_NodeName=129.213.120.172"
config list
edit "10.0.32.2"
next
edit "10.244.2.2"
next
edit "10.244.2.3"
next
edit "10.244.2.4"
next
edit "10.244.2.5"
next
end
next
end

SDN Connector - Azure Stack

FortiOS now supports automatically updating dynamic addresses for Azure Stack on-premises environments using an
Azure Stack SDN connector, including mapping the following attributes from Azure Stack instances to dynamic address
groups in FortiOS:
l vm
l tag
l size
l securitygroup
l vnet
l subnet
l resourcegroup
l vmss

To configure Azure Stack SDN connector using the GUI:

1. Configure the Azure Stack SDN connector:


a. Go to Security Fabric > Fabric Connectors.
b. Click Create New, and select Microsoft Azure.
c. Configure as shown, substituting the Azure Stack settings for your deployment. The update interval is in

FortiOS 6.2.0 New Features Guide 122


Fortinet Technologies Inc.
Fabric Connectors

seconds.

2. Create a dynamic firewall address for the configured Azure Stack SDN connector:
a. Go to Policy & Objects > Addresses.
b. Click Create New, then select Address.
c. Configure the address as shown, selecting the desired filter in the Filter dropdown list. In this example, the
Azure Stack SDN Connector will automatically populate and update IP addresses only for instances that are
named tfgta:

3. Ensure that the Azure Stack SDN connector resolves dynamic firewall IP addresses:
a. Go to Policy & Objects > Addresses.
b. Hover over the address created in step 2 to see a list of IP addresses for instances that are named tftgta as
configured in step 2:

FortiOS 6.2.0 New Features Guide 123


Fortinet Technologies Inc.
Fabric Connectors

To configure Azure Stack SDN connector using CLI commands:

1. Configure the Azure Stack SDN connector:


config system sdn-connector
edit "azurestack1"
set type azure
set azure-region local
set server "azurestack.external"
set username "username@azurestoreexamplecompany.onmicrosoft.com"
set password xxxxx
set log-in endpoint "https://login.microsoftonline.com/942b80cd-1b14-42a1-8dcf-
4b21dece61ba"
set resource-url
"https://management.azurestoreexamplecompany.onmicrosoft.com/12b6fedd-9364-4cf0-
822b-080d70298323"
set update-interval 30
next
end
2. Create a dynamic firewall address for the configured Azure Stack SDN connector with the supported Azure Stack
filter. In this example, the Azure Stack SDN Connector will automatically populate and update IP addresses only for
instances that are named tfgta:
config firewall address
edit "azurestack-address-name1"
set type dynamic
set sdn "azurestack1"
set filter "vm=tfgta"
next
end
3. Confirm that the Azure Stack SDN connector resolves dynamic firewall IP addresses using the configured filter:
config firewall address
edit "azurestack-address-name1"
set type dynamic
set sdn "azurestack1"
set filter "vm=tfgta"
config list
edit "10.0.1.4"
next
edit "10.0.2.4"
next
edit "10.0.3.4"
next
edit "10.0.4.4"
next
edit "192.168.102.32"
next
edit "192.168.102.35"
next
end
next
end

FortiOS 6.2.0 New Features Guide 124


Fortinet Technologies Inc.
Fabric Connectors

SDN Connector - OpenStack Domain Filter

A domain attribute is now available for selection when configuring an OpenStack SDN Connector in FortiOS. When a
domain is configured for the OpenStack SDN Connector, FortiOS resolves OpenStack SDN dynamic firewall addresses
from the specified OpenStack domain. If a domain is not specified, FortiOS resolves the dynamic firewall addresses
using the default OpenStack domain.

To configure OpenStack SDN connector with a domain using the GUI:

1. Configure the OpenStack SDN connector:


a. Go to Security Fabric > Fabric Connectors.
b. Click Create New, and select Openstack (Horizon).
c. In the Domain field, enter the desired domain name from OpenStack. The SDN Connector will only resolve IP
addresses for instances that belong to the specified domain.
d. Configure as shown, substituting the server IP address, username, and password for your deployment. The
update interval is in seconds.

2. Create a dynamic firewall address for the configured OpenStack SDN connector:
a. Go to Policy & Objects > Addresses.
b. Click Create New, then select Address.
c. Configure the address as shown, selecting the desired filter in the Filter dropdown list. The OpenStack
SDN Connector will automatically populate and update IP addresses only for instances that belong to the

FortiOS 6.2.0 New Features Guide 125


Fortinet Technologies Inc.
Fabric Connectors

specified domain and network:

3. Ensure that the OpenStack SDN connector resolves dynamic firewall IP addresses:
a. Go to Policy & Objects > Addresses.
b. Hover over the address created in step 2 to see a list of IP addresses for instances that belong to the specified
domain and specified network as configured in steps 1 and 2:

To configure OpenStack SDN connector with a domain using CLI commands:

1. Configure the OpenStack SDN connector. The SDN Connector will only resolve IP addresses for instances that
belong to the specified domain:
config system sdn-connector
edit "openstack-domain"
set type openstack
set server "http://172.16.165.86:5000"
set username "example_username"
set password xxxxx
set domain "example_domain"
set update-interval 30
next
end

FortiOS 6.2.0 New Features Guide 126


Fortinet Technologies Inc.
Fabric Connectors

2. Create a dynamic firewall address for the configured OpenStack SDN connector with the supported OpenStack
filter. The OpenStack SDN Connector will automatically populate and update IP addresses only for instances that
belong to the specified domain and the specified network:
config firewall address
edit "openstack-domain-network"
set type dynamic
set sdn "openstack-domain"
set filter "Network=example-net1"
next
end
3. Confirm that the OpenStack SDN connector resolves dynamic firewall IP addresses using the configured domain
and filter:
config firewall address
edit "openstack-domain-network"
set uuid 02837298-234d-51e9-efda-559c6001438a
set type dynamic
set sdn "openstack-domain"
set filter "Network=example-net1"
config list
edit "10.0.0.13"
next
edit "10.0.0.16"
next
edit "10.0.0.3"
next
edit "172.24.4.18"
next
edit "172.24.4.24"
next
edit "172.24.4.3"
next
end
next
end

Endpoint Connector - Cisco pxGrid

FortiOS 6.2 now supports an endpoint connector to Cisco pxGrid via FortiManager. FortiManager dynamically collects
updates from pxGrid and forwards them to FortiGate using the Fortinet Single Sign On (FSSO) protocol.

To create an endpoint connector for Cisco pxGrid:

1. On FortiManager, create an SSO Connector to Cisco ISE.


Communication between FortiManager and Cisco ISE is secured by using TLS. FortiManager requires a client
certificate issued by Cisco ISE. FortiManager uses the certificate to authenticate to Cisco ISE.

FortiOS 6.2.0 New Features Guide 127


Fortinet Technologies Inc.
Fabric Connectors

2. On FortiManager, map Cisco ISE groups to a Fortinet FSSO group.


Once a secured communication channel is established, Cisco sends all user groups to FortiManager.
The FortiManager administrator can select specific groups and map them to Fortinet FSSO groups.

FortiOS 6.2.0 New Features Guide 128


Fortinet Technologies Inc.
Fabric Connectors

3. On FortiManager, add Fortinet FSSO group to a firewall policy in a policy package.

4. On FortiManager, synchronize the policy package to the firewall for the managed FortiGate.

5. On FortiGate, verify that the synced firewall policy contains the correct FSSO group and that all FSSO-related
information in user adgrp is correct.

FortiOS 6.2.0 New Features Guide 129


Fortinet Technologies Inc.
Fabric Connectors

6. After successful user authentication on Cisco ISE, verify that information is forwarded to FortiManager.
On FortiManager, the icon next to the authenticated user in pxGrid Monitor should be green.

FortiGate should have two entries: one in the firewall-authenticated user list and one in the FSSO logged-on user
list.
In the FSSO logged-on user list, you can view both groups. You view the group that the user belongs to on Cisco
ISE and the Fortinet FSSO group.

FortiOS 6.2.0 New Features Guide 130


Fortinet Technologies Inc.
Fabric Connectors

External Block List (Threat Feed) – Policy

This version extends the External Block List (Threat Feed). In addition to using the External Block List (Threat Feed) for
web filtering and DNS, you can use External Block List (Threat Feed) in firewall policies.
This version includes the following new features:
l Policy support for external IP list used as source/destination address.
l Support for IPv4 and IPv6 firewall policy only. ACL, DoS, NAT64, NAT46, shaping, local-in policy are not supported.
l Support for both CLI and GUI.

Sample configuration

In Security Fabric > Fabric Connectors > Threat Feeds > IP Address, create or edit an external IP list object.

Click View Entries to see the external IP list.

FortiOS 6.2.0 New Features Guide 131


Fortinet Technologies Inc.
Fabric Connectors

To create an external iplist object using the CLI:

config system external-resource


edit "test-external-iplist-1"
set status enable
set type address
set username ''
set password ENC
set comments ''
set resource "http://10.6.30.55/ip_list_test/test-external-iplist-2.txt"
set refresh-rate 15
next
end

To apply an external iplist object to the firewall policy using the CLI:

config firewall policy


edit 1
set name "policyid-1"
set srcintf "wan2"
set dstintf "wan1"
set srcaddr "all"
set dstaddr "test-external-iplist-1"
set action accept
set schedule "always"
set service "ALL"
set logtraffic all
set auto-asic-offload disable
set nat enable
next
end

External Block List (Threat Feed) - File Hashes

This version adds a new type of Threat Feed connector that supports a list of file hashes which can be used as part of
Virus Outbreak Prevention.

FortiOS 6.2.0 New Features Guide 132


Fortinet Technologies Inc.
Fabric Connectors

To configure Malware Hash:

1. Navigate to Security Fabric > Fabric Connectors and click Create New.
2. In the Threat Feeds section, click Malware Hash.

The Malware Hash source objects are displayed.

FortiOS 6.2.0 New Features Guide 133


Fortinet Technologies Inc.
Fabric Connectors

3. To configure Malware Hash, fill in the Connector Settings section.

4. Beside the Last Update field, click View Entries to display the external Malware Hash list contents.

New Malware value for external-resource parameter in CLI


FGT_PROXY (external-resource) # edit sha1_list
new entry 'sha1_list' added

FortiOS 6.2.0 New Features Guide 134


Fortinet Technologies Inc.
Fabric Connectors

FGT_PROXY (sha1_list) # set type ?


category FortiGuard category.
address Firewall IP address.
domain Domain Name.
malware Malware hash.

To configure external Malware Hash list sources in CLI:

config global

config system external-resource


edit "md5_list"
set type malware
set comments "List of md5 hashes only"
set resource "http://172.16.200.44/outbreak/md5_list"
set refresh-rate 30
next
edit "sha1_list"
set type malware
set comments "List of sha1 hashes only"
set resource "http://172.16.200.44/outbreak/sha1_list"
set refresh-rate 30
next
edit "sha256_list"
set type malware
set comments "List of sha256 hashes only"
set resource "http://172.16.200.44/outbreak/sha256_list"
set refresh-rate 30
next
end

end

Update to AntiVirus Profile

In Security Profiles > AntiVirus, the Virus Outbreak Prevention section allows you to enable the following options:
l Use Fortinet outbreak Prevention Database.
l Use External Malware Block List.

FortiOS 6.2.0 New Features Guide 135


Fortinet Technologies Inc.
Fabric Connectors

To view Virus Outbreak Prevention options in CLI:

FGT_PROXY (vdom1) # config antivirus profile


FGT_PROXY (profile) # edit av
FGT_PROXY (av) # config outbreak-prevention
FGT_PROXY (outbreak-prevention) # set
ftgd-service Enable/disable FortiGuard Virus outbreak prevention service.
external-blocklist Enable/disable external malware blocklist.

FGT_PROXY (outbreak-prevention) # set

To configure Virus Outbreak Prevention options in CLI:

You must first enable outbreak-prevention in the protocol and then enable external-blocklist under
outbreak-prevention.
config antivirus profile
edit "av"
set analytics-db enable
config http
set options scan
set outbreak-prevention full-archive
end
config ftp
set options scan
set outbreak-prevention files
end
config imap
set options scan
set outbreak-prevention full-archive

FortiOS 6.2.0 New Features Guide 136


Fortinet Technologies Inc.
Fabric Connectors

end
config pop3
set options scan
set outbreak-prevention full-archive
end
config smtp
set options scan
set outbreak-prevention files
end
config mapi
set options scan
set outbreak-prevention full-archive
end
config nntp
set options scan
set outbreak-prevention full-archive
end
config smb
set options scan
set outbreak-prevention full-archive
end
config outbreak-prevention
set ftgd-service enable
set external-blocklist enable
end
next
end

Update to utm-virus category logs

This feature adds the fields filehash and filehashsrc to outbreak prevention detection events.

Example of the utm-virus log generated when a file is detected by FortiGuard queried outbreak prevention:
2: date=2018-07-30 time=13:57:59 logid="0204008202" type="utm" subtype="virus" event-
type="outbreak-prevention" level="warning" vd="root" evnttime=1532984279 msg="Blocked by Virus
Outbreak Prevention service." action="blocked" service="HTTP" sessionid=174777 srcip-
p=192.168.101.20 dstip=172.16.67.148 srcport=37044 dstport=80 srcintf="lan" srcintfrole="lan"
dstintf="wan1" dstintfrole="wan" policyid=1 proto=6 direction="incoming" filename="zhvo_test.-
com" checksum="583369a5" quarskip="No-skip" virus="503e99fe40ee120c45bc9a30835e7256fff3e46a"
dtype="File Hash" filehash="503e99fe40ee120c45bc9a30835e7256fff3e46a" file-
hashsrc="fortiguard" url="http://172.16.67.148/zhvo_test.com" profile="mhash_test" agent-
t="Firefox/43.0" analyticssubmit="false" crscore=30 crlevel="high&#8220;

Example of the utm-virus log generated when a file is detected by External Malware Hash List outbreak prevention:
1: date=2018-07-30 time=13:59:41 logid="0207008212" type="utm" subtype="virus" event-
type="malware-list" level="warning" vd="root" eventtime=1532984381 msg="Blocked by local mal-
ware list." action="blocked" service="HTTP" sessionid=174963 srcip=192.168.101.20
dstip=172.16.67.148 srcport=37045 dstport=80 srcintf="lan" srcintfrole="lan" dstintf="wan1"
dstintfrole="wan" policyid=1 proto=6 direction="incoming" filename="mhash_block.com" check-
sum="90f0cb57" quarskip="No-skip" virus="mhash_block.com" dtype="File Hash" file-
hash="93bdd30bd381b018b9d1b89e8e6d8753" filehashsrc="test_list"
url="http://172.16.67.148/mhash_block.com" profile="mhash_test" agent="Firefox/43.0" ana-
lyticssubmit="false"

FortiOS 6.2.0 New Features Guide 137


Fortinet Technologies Inc.
Fabric Connectors

External Block List (Threat Feed) - Authentication

In FortiOS 6.2, the external Threat Feed connector (block list retrieved by HTTPS) now supports username and
password authentication.

To enable username and password authentication:

1. Navigate to Security Fabric > Fabric Connectors.


2. Edit an existing Threat Feed or create a new one by selecting Create New.
3. In Connector Settings, select the HTTP basic authentication toggle to enable the feature.
4. Enter a username and password.

5. Select OK to save your changes.

Connector GUI Organization

This version improves the GUI display and organization of cloud and SDN Fabric Connectors, grouping them into public
and private SDN Connectors.
When creating new SDN Connectors, they are sorted based on popularity and grouped into public and private SDN
Connectors.

FortiOS 6.2.0 New Features Guide 138


Fortinet Technologies Inc.
Fabric Connectors

After SDN Connectors are created, they are grouped into public and private SDN sections separately.

FortiOS 6.2.0 New Features Guide 139


Fortinet Technologies Inc.
SD-WAN

This section lists the new features added to FortiOS for SD-WAN.
l Overlay Controller VPN (OCVPN) on page 140
l SD-WAN Bandwidth Monitoring Service on page 148
l Rule Definition Improvements on page 150
l Forward Error Correction on page 169
l Represent Multiple IPsec Tunnels as a Single Interface on page 171
l Dual VPN Tunnel Wizard on page 172
l BGP Additional Path Support on page 174
l SLA Logging on page 177
l Internet Service Customization on page 179
l SLA Monitoring via REST API on page 180

Overlay Controller VPN (OCVPN)

This section lists the new features added to FortiOS for OCVPN.
l Hub-and-Spoke Support on page 140
l ADVPN Support on page 147
l Multiple VPN Support on page 147
l OC-VPN Cloud Portal on page 147

Hub-and-Spoke Support

This version extends OCVPN to support hub-and-spoke topology in addition to full mesh support.
This feature includes support for the following:
l OCVPN portal with FortiCare SSO.
l Enforce limits for OCVPN free service.
l Define multiple overlay network using OCVPN hub-and-spoke.
l ADVPN for hub-and-spoke. The ADVPN shortcut is enabled by default.

FortiOS 6.2.0 New Features Guide 140


Fortinet Technologies Inc.
SD-WAN

Sample topology

OCVPN portal with FortiCare SSO

The OCVPN portal can display customer and portal information including:
l The customer OCVPN license type: free or full.
l Registered device information including:
l Device serial number.
l OCVPN role.
l Hostname.
l WAN IP address.
l Configured overlays.

FortiOS 6.2.0 New Features Guide 141


Fortinet Technologies Inc.
SD-WAN

You can display the OCVPN network topology in a diagram.

You can unregister OCVPN devices on the portal.

FortiOS 6.2.0 New Features Guide 142


Fortinet Technologies Inc.
SD-WAN

OCVPN free license limit

The current OCVPN free license limit is three devices and full mesh only.
There is currently no limit to the free licenses on the OCVPN cloud side.
Warning messages appear when the free license limit is reached. For example:
"Primary-Hub role is not supported with OCVPN free license. Please upgrade to
full OCVPN license to use hub and spoke topology.
object check operator error, -9999, discard the setting
Command fail. Return code -9999"

"OCVPN free license limit (3) has been reached. Please upgrade to
full OCVPN license to register additional devices.
object check operator error, -9999, discard the setting
Command fail. Return code -9999"

To check the OCVPN license type, see Diagnostic commands on page 147.

FortiOS 6.2.0 New Features Guide 143


Fortinet Technologies Inc.
SD-WAN

OCVPN hub-and-spoke with multiple overlays with ADVPN shortcut

To configure the Spoke in the GUI:

1. Go to VPN > Overlay Controller VPN and create or edit an overlay.


2. For Role, select Spoke.

To configure Spoke1 OCVPN in the CLI:

config vpn ocvpn


set status enable
config overlays
edit 1
set name "QA"
config subnets
edit 1
set subnet 10.1.100.0 255.255.255.0
next
end
next
edit 2
set name "PM"
config subnets
edit 1
set subnet 10.2.100.0 255.255.255.0
next
end
next
end
end

FortiOS 6.2.0 New Features Guide 144


Fortinet Technologies Inc.
SD-WAN

To configure Spoke2 OCVPN in the CLI:

config vpn ocvpn


set status enable
config overlays
edit 1
set name "QA"
config subnets
edit 1
set subnet 192.168.4.0 255.255.255.0
next
end
next
edit 2
set name "PM"
config subnets
edit 1
set subnet 192.168.5.0 255.255.255.0
next
end
next
end
end

To configure the Primary Hub in the GUI:

1. Go to VPN > Overlay Controller VPN and create or edit an overlay.


2. For Role, select Primary Hub.

FortiOS 6.2.0 New Features Guide 145


Fortinet Technologies Inc.
SD-WAN

To configure the Primary Hub in the CLI:

config vpn ocvpn


set status enable
set role primary-hub
config overlays
edit 1
set name "QA"
config subnets
edit 1
set subnet 172.16.101.0 255.255.255.0
next
end
next
edit 2
set name "PM"
config subnets
edit 1
set subnet 172.16.102.0 255.255.255.0
next
end
next
end
end

To configure the Secondary Hub in the GUI:

1. Go to VPN > Overlay Controller VPN and create or edit an overlay.


2. For Role, select Secondary Hub.

To configure the Secondary Hub in the CLI:

config vpn ocvpn


set status enable
set role secondary-hub
end

FortiOS 6.2.0 New Features Guide 146


Fortinet Technologies Inc.
SD-WAN

Diagnostic commands

To check the OCVPN license type:

# diagnose vpn ocvpn show-meta


Topology :: auto
License :: full
Members :: 4
Max-free :: 3

To check the OCVPN status:

# diagnose vpn ocvpn status


Current State : Registered
Topology : Dual-Hub-Spoke
Role : Spoke
Server Status : Up
Registration time : Mon Mar 11 16:42:31 2019
Poll time : Mon Mar 11 16:55:53 2019

# diagnose vpn ocvpn status


Current State : Registered
Topology : Dual-Hub-Spoke
Role : Primary-Hub
Server Status : Up
Registration time : Mon Mar 11 16:42:25 2019
Update time : Mon Mar 11 15:10:28 2019
Poll time : Mon Mar 11 16:55:35 2019

ADVPN Support

OCVPN hub-and-spoke includes support for ADVPN.


For information on hub-and-spoke support, see Hub-and-Spoke Support on page 140.

Multiple VPN Support

OCVPN hub-and-spoke includes support for multiple overlay VPNs..


For information on hub-and-spoke support, see Hub-and-Spoke Support on page 140.

OC-VPN Cloud Portal

A new cloud portal is available (via FortinetOne login) for viewing overlay VPN status or troubleshooting needs.
For information on OCVPN, see Overlay Controller VPN (OCVPN) on page 140.

FortiOS 6.2.0 New Features Guide 147


Fortinet Technologies Inc.
SD-WAN

SD-WAN Bandwidth Monitoring Service

This version adds a new bandwidth measuring tool to detect true upload and download speeds. Bandwidth tests can be
run on demand or automated using a script, and can be useful when configuring SD-WAN SLA and rules to balance SD-
WAN traffic.
This feature needs a license which is part of 360 Protection Bundle in 6.2, or you must have a SD-WAN Bandwidth
Monitoring Service license.
This speed test tool compatible with iperf3.6 with SSL support. This tool can send traffic to test uploading bandwidth to
the FortiCloud speed test service. It can initiate the connection with the server and initiate downloading requests to the
server.
This tool's daily running quota is limited to avoid abusing the usage for valid customers. The current daily quota is 10.
FortiGate first downloads the speed test server list. The server list expires after 24 hours. Based on customer's input, it
selects one of the servers to do the speed test. The speed test includes uploading speed test and downloading speed
test. After the test is done, the results are printed on the terminal.

To download the speed test server list:

# execute speed-test-server download


Download completed.

To check the speed test server list:

FG3H0E5818904285 (root) # execute speed-test-server list


AWS_West valid
Host: 34.210.67.183 5204 fortinet
Host: 34.210.67.183 5205 fortinet
Host: 34.210.67.183 5206 fortinet
Host: 34.210.67.183 5207 fortinet
Google_West valid
Host: 35.197.55.210 5204 fortinet
Host: 35.197.55.210 5205 fortinet
Host: 35.197.55.210 5206 fortinet
Host: 35.197.55.210 5207 fortinet
Host: 35.230.2.124 5204 fortinet
Host: 35.230.2.124 5205 fortinet
Host: 35.230.2.124 5206 fortinet
Host: 35.230.2.124 5207 fortinet
Host: 35.197.18.234 5204 fortinet
Host: 35.197.18.234 5205 fortinet
Host: 35.197.18.234 5206 fortinet
Host: 35.197.18.234 5207 fortinet

To run the speed test:

You can run the speed test without specifying a server. The system will automatically choose one server from the list
and run the speed test.
FG3H0E5818904285 (root) # execute speed-test auto
The license is valid to run speed test.
Speed test quota for 2/1 is 9
current vdom=root

FortiOS 6.2.0 New Features Guide 148


Fortinet Technologies Inc.
SD-WAN

Run in uploading mode.


Connecting to host 35.230.2.124, port 5206
[ 16] local 172.16.78.185 port 2475 connected to 35.230.2.124 port 5206
[ ID] Interval Transfer Bitrate Retr Cwnd
[ 16] 0.00-1.01 sec 11.0 MBytes 91.4 Mbits/sec 0 486 KBytes
[ 16] 1.01-2.00 sec 11.6 MBytes 98.4 Mbits/sec 0 790 KBytes
[ 16] 2.00-3.01 sec 11.0 MBytes 91.6 Mbits/sec 15 543 KBytes
[ 16] 3.01-4.01 sec 11.2 MBytes 94.2 Mbits/sec 1 421 KBytes
[ 16] 4.01-5.01 sec 11.2 MBytes 93.5 Mbits/sec 0 461 KBytes
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval Transfer Bitrate Retr
[ 16] 0.00-5.01 sec 56.1 MBytes 93.8 Mbits/sec 16 sender
[ 16] 0.00-5.06 sec 55.8 MBytes 92.6 Mbits/sec receiver

speed test Done.


Run in reverse downloading mode!
Connecting to host 35.230.2.124, port 5206
Reverse mode, remote host 35.230.2.124 is sending
[ 16] local 172.16.78.185 port 2477 connected to 35.230.2.124 port 5206
[ ID] Interval Transfer Bitrate
[ 16] 0.00-1.00 sec 10.9 MBytes 91.4 Mbits/sec
[ 16] 1.00-2.00 sec 11.2 MBytes 93.9 Mbits/sec
[ 16] 2.00-3.00 sec 11.2 MBytes 94.0 Mbits/sec
[ 16] 3.00-4.00 sec 11.2 MBytes 93.9 Mbits/sec
[ 16] 4.00-5.00 sec 10.9 MBytes 91.1 Mbits/sec
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval Transfer Bitrate Retr
[ 16] 0.00-5.03 sec 57.5 MBytes 95.9 Mbits/sec 40 sender
[ 16] 0.00-5.00 sec 55.4 MBytes 92.9 Mbits/sec receiver

speed test Done

To run the speed test on a server farm or data center:

FG3H0E5818904285 (root) # execute speed-test auto AWS_West


The license is valid to run speed test.
Speed test quota for 2/1 is 8
current vdom=root
Run in uploading mode.
Connecting to host 34.210.67.183, port 5205

To run the speed test on a local interface when there are multiple valid routes:

FG3H0E5818904285 (root) # execute speed-test port1 Google_West


The license is valid to run speed test.
Speed test quota for 2/1 is 6
bind to local ip 172.16.78.202
current vdom=root
Specified interface port1 does not comply with default outgoing interface port2 in routing
table!
Force to use the specified interface!
Run in uploading mode.
Connecting to host 35.197.18.234, port 5205
[ 11] local 172.16.78.202 port 20852 connected to 35.197.18.234 port 5205
[ ID] Interval Transfer Bitrate Retr Cwnd
[ 11] 0.00-1.01 sec 10.7 MBytes 89.0 Mbits/sec 0 392 KBytes

FortiOS 6.2.0 New Features Guide 149


Fortinet Technologies Inc.
SD-WAN

[ 11] 1.01-2.01 sec 10.5 MBytes 88.5 Mbits/sec 1 379 KBytes


[ 11] 2.01-3.01 sec 11.3 MBytes 94.5 Mbits/sec 0 437 KBytes
[ 11] 3.01-4.01 sec 11.2 MBytes 94.3 Mbits/sec 0 478 KBytes
[ 11] 4.01-5.00 sec 11.3 MBytes 95.2 Mbits/sec 0 503 KBytes
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval Transfer Bitrate Retr
[ 11] 0.00-5.00 sec 55.1 MBytes 92.3 Mbits/sec 1 sender
[ 11] 0.00-5.04 sec 54.5 MBytes 90.7 Mbits/sec receiver

speed test Done.


Run in reverse downloading mode!
Connecting to host 35.197.18.234, port 5205
Reverse mode, remote host 35.197.18.234 is sending
[ 11] local 172.16.78.202 port 20853 connected to 35.197.18.234 port 5205
[ ID] Interval Transfer Bitrate
[ 11] 0.00-1.00 sec 10.9 MBytes 91.1 Mbits/sec
[ 11] 1.00-2.00 sec 11.2 MBytes 94.0 Mbits/sec
[ 11] 2.00-3.00 sec 11.2 MBytes 94.0 Mbits/sec
[ 11] 3.00-4.00 sec 11.2 MBytes 94.0 Mbits/sec
[ 11] 4.00-5.00 sec 11.2 MBytes 94.0 Mbits/sec
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval Transfer Bitrate Retr
[ 11] 0.00-5.03 sec 57.4 MBytes 95.8 Mbits/sec 33 sender
[ 11] 0.00-5.00 sec 55.7 MBytes 93.4 Mbits/sec receiver

speed test Done.

Rule Definition Improvements

This section lists rule definition improvements added to FortiOS for SD-WAN.
l Load Balancing Per-Rule on page 150
l Interface Cost on page 152
l DSCP Matching (Shaping) on page 154
l Traffic Shaping Schedules on page 158
l Application Groups in Policies on page 160
l Internet Service Groups in Policies on page 162
l IPv6 Support (UI) on page 166

Load Balancing Per-Rule

This feature introduces SD-WAN load balancing for all explicit rules. When a rule is hit, traffic is hashed based on the
defined load balancing algorithm among the selected SD-WAN members that satisfy the defined SLA.
Previously, SD-WAN load balancing was only available on the last implicit rule. This covered all the SD-WAN interface
members, but when an explicit SD-WAN rule was created, it prevented load balancing from occurring for that protocol,
and traffic was only routed over a single interface.

FortiOS 6.2.0 New Features Guide 150


Fortinet Technologies Inc.
SD-WAN

ADVPN is not supported in this mode.

To add load balancing to a rule with the GUI:

1. Go to Network > SD-WAN Rules.


2. Edit a rule, or create a new one.
3. Under Outgoing Interfaces, select a Strategy, Interface preference, and Required SLA target or Measured SLA.

4. Click OK to apply your changes.

To add load balancing to a rule with the CLI:

config system virtual-wan-link


config service
edit 1
set name "balance"
set mode load-balance
set dst "10.100.20.0"
config sla
edit "ping"
set id 2
next
end
set priority-members 1 2 3
next
end
end

FortiOS 6.2.0 New Features Guide 151


Fortinet Technologies Inc.
SD-WAN

To diagnose the load balancing status:

FGT_A (root) # diagnose sys virtual-wan-link health-check


Health Check(ping):
Seq(2): state(alive), packet-loss(40.000%) latency(0.049), jitter(0.017) sla_map=0x3
Seq(1): state(alive), packet-loss(0.000%) latency(0.020), jitter(0.005) sla_map=0x3

FGT_A (root) # diagnose sys virtual-wan-link service

Service(22): Address Mode(IPV4) flags=0x0


TOS(0x0/0x0), Protocol(0: 1->65535), Mode(load-balance)
Members:
1: Seq_num(1), alive, sla(0x1), num of pass(1), selected
2: Seq_num(2), alive, sla(0x1), num of pass(1), selected
Dst fqdn: gmail.com(119)

Interface Cost

This feature adds multiple extensions to various objects and rules, increasing the flexibility of how SD-WAN can be set
up.
The cost parameter is added for SD-WAN members, to support assigning a cost value to each interface. It can be used
in SLA mode rules to select the lowest cost link from the links that otherwise satisfy the SLA. If the costs are the same,
the configuration order is used.
Interface selection based on quality now balances across all matching links that satisfy the quality SLA. Traffic can also
be restricted to a specific subset of interfaces.=

To configure interface cost:

config system virtual-wan-link


config members
edit 1
set cost 10
next
edit 2
set cost 5
next
... ...
end
end

Example

In this example:
l The SD-WAN has four members:
l Member 1 and member 2 can satisfy the SLA and are selected as candidates.
l Member 3 and member 4 are slower and cannot satisfy the SLA.
l The cost parameter only applies to candidates, even though the interface cost of members 3 and 4 are lower than
that of members 1 and 2.

FortiOS 6.2.0 New Features Guide 152


Fortinet Technologies Inc.
SD-WAN

The ISP of member 1 is more expensive, so the its cost is set higher than the member 2 cost. Consequently,
member 2, with the lower cost, is the first choice. If the cost parameters for all of the members were not set, or were
all set to the same value, the selection would be the highest priority member that satisfies the SLA.

To configure the SD-WAN:

config system virtual-wan-link


set status enable
set load-balance-mode usage-based
config members
edit 1
set interface "port13"
set gateway 10.100.1.1
set cost 10
next
edit 2
set interface "port12"
set cost 5
next
edit 3
set interface "agg1"
set gateway 172.16.203.2
set cost 1
next
edit 4
set interface "vlan200"
set gateway 172.16.216.2
set cost 1
next
end
config health-check
edit "ping"
set server "10.100.2.22"
set threshold-warning-latency 2
set threshold-alert-latency 5
set members 2 1 3 4
config sla
edit 1
set link-cost-factor latency
next
edit 2
set link-cost-factor latency
set latency-threshold 4
next
end
next
end
config service
edit 2
set name "google-dns"
set mode sla
set src "all"
set internet-service enable
set internet-service-id 65539
config sla
edit "ping"

FortiOS 6.2.0 New Features Guide 153


Fortinet Technologies Inc.
SD-WAN

set id 2
next
end
set priority-members 3 4 1 2
next
end
end

To check the link status and sequence:

diagnose sys virtual-wan-link health-check <<<<<<<< check link status, pay attention
to state(alive or dead) and the link quality
Health Check(ping):
Seq(2): state(alive), packet-loss(0.000%) latency(0.244), jitter(0.028) sla_map=0x2
Seq(1): state(alive), packet-loss(0.000%) latency(0.697), jitter(0.094) sla_map=0x2
Seq(3): state(alive), packet-loss(0.000%) latency(21.835), jitter(1.159) sla_map=0x0
Seq(4): state(alive), packet-loss(3.333%) latency(21.975), jitter(1.271) sla_map=0x0

diagnose sys virtual-wan-link service <<<<<<<< check link sequence and pay attention to
"sla(0x)" value
Service(2): Address Mode(IPV4) flags=0x0
TOS(0x0/0x0), Protocol(0: 1->65535), Mode(sla)
Members:
1: Seq_num(2), alive, sla(0x1),cfg_order(3), selected
2: Seq_num(1), alive, sla(0x1),cfg_order(2), selected
3: Seq_num(3), alive, sla(0x0),cfg_order(0), selected
4: Seq_num(4), alive, sla(0x0),cfg_order(1), selected
Internet Service: Google-DNS(65539)
Src address: 0.0.0.0-255.255.255.255

DSCP Matching (Shaping)

This feature has three parts:


l DSCP matching in firewall policies
l DSCP matching in firewall shaping policies
l DSCP marking in firewall shaping policies

DSCP matching in firewall policies

Traffic is allowed or blocked according to the DSCP values in the incoming packets.
The following CLI variables are added to the config firewall policy command:

tos-mask <mask_value> Non-zero bit positions are used for comparison. Zero bit positions are ignored
(default = 0x00).
This variable replaces the dscp-match variable.
tos <tos_value> Type of Service (ToC) value that is used for comparison (default = 0x00). This
variable is only available when tos-mask is not zero.
This variable replaces the dscp-value variable.

FortiOS 6.2.0 New Features Guide 154


Fortinet Technologies Inc.
SD-WAN

tos-negate {enable | Enable/disable negated ToS match (default = disable). This variable is only
disable} available when tos-mask is not zero.
This variable replaces the dscp-negate variable.

DSCP matching in firewall shaping policies

Shaping is applied to the session or not according to the DSCP values in the incoming packets. The same logic and
commands as in firewall policies are used.

DSCP marking in firewall shaping policies

Traffic is allowed or blocked according to the DSCP values in the incoming packets. DSCP marking in firewall shaping
policies uses the same logic and commands as in firewall policy and traffic-shaper.
When DSCP marking on firewall shaper traffic-shaper, firewall shaping-policy, and firewall
policy all apply to the same session, shaping-policy overrides policy, and shaper traffic-shaper
overrides both shaping-policy and policy.
The following CLI variables in config firewall policy are used to mark the packets:

diffserv-forward {enable | Enable/disable changing a packet's DiffServ values to the value specified in
disable} diffservcode-forward (default = disable).
diffservcode-forward The value that packet's DiffServ is set to (default = 000000). This variable is only
<dscp_value> available when diffserv-forward is enabled.
diffserv-reverse {enable | Enable/disable changing a packet's reverse (reply) DiffServ values to the value
disable} specified in diffservcode-rev (default = disable).
diffservcode-rev <dscp_ The value that packet's reverse (reply) DiffServ is set to (default = 000000). This
value> variable is only available when diffserv-rev is enabled.

Examples

Example 1

FortiGate A marks traffic from the sales and QA teams with different DSCP values. FortiGate B does DSCP matching,
allowing only the sales team to access the database.
1. Configure FortiGate A:
config firewall policy
edit 1
set srcintf "port2"

FortiOS 6.2.0 New Features Guide 155


Fortinet Technologies Inc.
SD-WAN

set dstintf "port3"


set srcaddr "QA"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set diffserv-forward enable
set diffservcode-forward 110000
set nat enable
next

edit 5
set srcintf "port2"
set dstintf "port3"
set srcaddr "Sales"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set diffserv-forward enable
set diffservcode-forward 111011
set nat enable
next
end

2. Configure FortiGate B:
config firewall policy
edit 2
set srcintf "port3"
set dstintf "port1"
set srcaddr "all"
set dstaddr "Database"
set action accept
set schedule "always"
set service "ALL"
set tos-mask 0xf0
set tos 0xe0
set fsso disable
set nat enable
next
end

Example 2

FortiGate A marks traffic from the sales and QA teams with different DSCP values. FortiGate B uses a firewall shaping
policy to do the DSCP matching, limiting the connection speed of the sales team to the database to 10MB/s.
1. Configure FortiGate A:
config firewall policy
edit 1
set srcintf "port2"
set dstintf "port3"
set srcaddr "QA"
set dstaddr "all"
set action accept

FortiOS 6.2.0 New Features Guide 156


Fortinet Technologies Inc.
SD-WAN

set schedule "always"


set service "ALL"
set diffserv-forward enable
set diffservcode-forward 110000
set nat enable
next

edit 5
set srcintf "port2"
set dstintf "port3"
set srcaddr "Sales"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set diffserv-forward enable
set diffservcode-forward 111011
set nat enable
next
end

2. Configure FortiGate B:
config firewall policy
edit 2
set srcintf "port3"
set dstintf "port1"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set nat enable
next
end

config firewall shaper traffic-shaper


edit "10MB/s"
set guaranteed-bandwidth 60000
set maximum-bandwidth 80000
next
end

config firewall shaping-policy


edit 1
set service "ALL"
set dstintf "port1"
set tos-mask 0xf0
set tos 0xe0
set traffic-shaper "10MB/s"
set srcaddr "all"
set dstaddr "all"
next
end

FortiOS 6.2.0 New Features Guide 157


Fortinet Technologies Inc.
SD-WAN

Example 3

FortiGate A has a traffic shaping policy to mark traffic from the QA team with a DSCP value of 100000, while reverse
traffic is marked with 000011.
1. Configure FortiGate A:
config firewall shaping-policy
edit 1
set name "QA Team 50MB"
set service "ALL"
set dstintf "port3"
set traffic-shaper "50MB/s"
set traffic-shaper-reverse "50MB/s"
set diffserv-forward enable
set diffserv-reverse enable
set srcaddr "QA"
set dstaddr "all"
set diffservcode-forward 100000
set diffservcode-rev 000011
next
end

Traffic Shaping Schedules

In a shaping policy, there are many matching criteria available for administrators to match a specific traffic and apply a
traffic shaper or shaping group to the traffic. This version adds a new matching criterion: Schedule. This feature gives
shaping policy the ability to apply different shaping profiles at different times. Administrators can select a one-time
schedule, recurring schedule, or schedule group.
Schedule is not a mandatory setting. If it is not set, then the current date and time are not used to match the traffic.

To configure Traffic Shaping Policy in GUI:

1. Navigate to Policy & Objects > Traffic Shaping Policy.


2. Create or edit a Traffic Shaping Policy.

FortiOS 6.2.0 New Features Guide 158


Fortinet Technologies Inc.
SD-WAN

3. Enable Schedule and select a schedule option.

4. Configure other options and click OK.

To configure Traffic Shaping Policy in CLI:

config firewall schedule recurring


edit "work-hours"
set start 07:00
set end 20:00
set day monday tuesday wednesday thursday friday
next
end

config firewall shaping-policy


edit 1
set name "demo"
set service "ALL"
set schedule "work-hours" <<< Can select schedule from one-time schedule, recurring
schedule or schedule group
set dstintf "port1"
set traffic-shaper "high-priority"
set traffic-shaper-reverse "high-priority"
set srcaddr "all"
set dstaddr "all"
next
end

To troubleshoot Traffic Shaping Policy in CLI:

The selected schedule is listed in the iprope.

FortiOS 6.2.0 New Features Guide 159


Fortinet Technologies Inc.
SD-WAN

dia firewall iprope list 100015

policy index=1 uuid_idx=0 action=accept


flag (0):
schedule(work-hours)
shapers: orig=high-priority(2/0/134217728) reply=high-priority(2/0/134217728)
cos_fwd=0 cos_rev=0
group=00100015 av=00000000 au=00000000 split=00000000
host=1 chk_client_info=0x0 app_list=0 ips_view=0
misc=0 dd_type=0 dd_mode=0
zone(1): 0 -> zone(1): 9
source(1): 0.0.0.0-255.255.255.255, uuid_idx=28,
dest(1): 0.0.0.0-255.255.255.255, uuid_idx=28,
service(1):
[0:0x0:0/(0,65535)->(0,65535)] helper:auto

Application Groups in Policies

This feature adds an application group command for firewall shaping policies.
The following CLI command is added:
config firewall shaping-policy
edit 1
set app-group <application group>...
......
next
end

Example

In this example, there are two traffic shaping policies:


l Policy 1 is for traffic related to cloud applications that has high priority.
l Policy 2 is for other traffic and has low priority.

To create the shaping policies using the GUI:

1. Configure an application group for cloud applications:


a. Go to Security Profiles > Custom Signatures.
b. Click Create New > Application Group. The New Application Group page opens.

c. Enter a name for the group, select the type, and then add the group the members.
d. Click OK.

FortiOS 6.2.0 New Features Guide 160


Fortinet Technologies Inc.
SD-WAN

2. Create the shaping policy for the high priority cloud application traffic:
a. Go to Policy & Objects > Traffic Shaping Policy.
b. Click Create New. The New Shaping Policy page opens.

c. Configure the shaping policy, selecting the previously created cloud application group, and setting both the
Shared shaper and Reverse shaper to high-priority.
d. Click OK.

At least one firewall policy must have application control enabled for the applications to
match any policy traffic.

3. Create the shaping policy for all other traffic, setting both the Shared shaper and Reverse shaper to low-priority.

To create the shaping policies using the CLI:

1. Configure an application group for cloud applications:


config application group
edit "cloud app group"
set application 27210 36740 35944 24467 33048

FortiOS 6.2.0 New Features Guide 161


Fortinet Technologies Inc.
SD-WAN

next
end

2. Create the shaping policies for the high priority cloud application traffic and the other, low priority traffic:
config firewall shaping-policy
edit 1
set name "For Cloud Traffic"
set service "ALL"
set app-category 30
set app-group "cloud app group"
set dstintf "port1"
set traffic-shaper "high-priority"
set traffic-shaper-reverse "high-priority"
set srcaddr "all"
set dstaddr "all"
next
edit 2
set name "For Other Traffic"
set service "ALL"
set dstintf "port1"
set traffic-shaper "low-priority"
set traffic-shaper-reverse "low-priority"
set srcaddr "all"
set dstaddr "all"
next
end

Internet Service Groups in Policies

This feature adds support for Internet Service Groups in traffic shaping and firewall policies. Service groups can be used
as the source and destination of the policy. Internet Service Groups are used as criteria to match traffic; the shaper will
be applied when the traffic matches.
To use a group as a destination, internet-service must be enabled. To use a group as a source, internet-
service-src must be enabled.
The following CLI variables are added to the firewall policy and firewall shaping-policy commands:

Variable Description

internet-service-group <string> Internet Service group name.

internet-service-custom-group <string> Custom Internet Service group name.

internet-service-src-group <string> Internet Service source group name.

internet-service-src-custom-group <string> Custom Internet Service source group name.

FortiOS 6.2.0 New Features Guide 162


Fortinet Technologies Inc.
SD-WAN

Examples

The following examples use the below topology.

Example 1

In this example, the PC is allowed to access Google, so all Google services are put into an Internet Service Group.

To configure access to Google services using an Internet Service Group using the CLI:

1. Create a Service Group:


config firewall internet-service-group
edit "Google_Group"
set direction destination
set member 65537 65538 65539 65540 65542 65543 65544 65545 65550 65536 65646
next
end

2. Create a firewall policy to allow access to all Google Services from the PC:
config firewall policy
edit 1
set name "PC to Google"
set srcintf "port2"
set dstintf "port1"
set srcaddr "PC"
set internet-service enable
set internet-service-group "Google_Group"
set action accept
set schedule "always"
set fsso disable
set nat enable
next
end

To configure access to Google services using an Internet Service Group in the GUI:

1. On the FortiGate, create a Service Group using the CLI.


2. Go to Policy & Objects > IPv4 Policy, and create a new policy.

FortiOS 6.2.0 New Features Guide 163


Fortinet Technologies Inc.
SD-WAN

3. Set the Destination as the just created Internet Service Group.

4. Configure the remaining options as shown, then click OK.


On the policy page, hover over the group to view a list of its members.

Example 2

In this example, two office FTP servers are put into an Internet Custom Service Group, and the PC connection to the
FTP servers is limited to 1Mbps.

To put two FTP servers into a custom service group and limit the PC connection speed to them using the
CLI:

1. Create custom internet services for the internal FTP servers:


config firewall internet-service-custom
edit "FTP_PM"
config entry
edit 1

FortiOS 6.2.0 New Features Guide 164


Fortinet Technologies Inc.
SD-WAN

config port-range
edit 1
set start-port 21
set end-port 21
next
end
set dst "PM_Server"
next
end
next
edit "FTP_QA"
config entry
edit 1
config port-range
edit 1
set start-port 21
set end-port 21
next
end
set dst "QA_Server"
next
end
next
end

2. Create a custom internet server group and add the just created custom internet services to it:
config firewall internet-service-custom-group
edit "Internal_FTP"
set member "FTP_QA" "FTP_PM"
next
end

3. Create a traffic shaper to limit the maximum bandwidth:


config firewall shaper traffic-shaper
edit "Internal_FTP_Limit_1Mbps"
set guaranteed-bandwidth 500
set maximum-bandwidth 1000
set priority medium
next
end

4. Create a firewall shaping policy to limit the speed from the PC to the internal FTP servers:
config firewall shaping-policy
edit 1
set name "For Internal FTP"
set internet-service enable
set internet-service-custom-group "Internal_FTP"
set dstintf "port1"
set traffic-shaper "Internal_FTP_Limit_1Mbps"
set traffic-shaper-reverse "Internal_FTP_Limit_1Mbps"
set srcaddr "PC"
next
end

FortiOS 6.2.0 New Features Guide 165


Fortinet Technologies Inc.
SD-WAN

To put two FTP servers into a custom service group and limit the PC connection speed to the using the
GUI:

1. Create custom internet services for the internal FTP servers using the CLI.
2. Create a custom internet server group and add the just created custom internet services to it using the CLI.
3. Create a traffic shaper to limit the maximum bandwidth:
a. Go to Policy & Objects > Traffic Shapers, and click Create New.
b. Enter a Name for the shaper, such as Internal_FTP_Limit_1Mbps.
c. Set the Traffic Priority to Medium.
d. Enable Max Bandwidth and set it to 1000.
e. Enable Guaranteed Bandwidth and set it to 500.
f. Click OK.
4. Create a firewall shaping policy to limit the speed from the PC to the internal FTP servers:
a. Go to Policy & Objects > Traffic Shaping Policy, and click Create New.
b. Set the Destination as the just created Custom Internet Service Group, and apply the just create traffic
shaper.

c. Configure the remaining options as shown, then click OK.

IPv6 Support (UI)

This version adds GUI support for SD-WAN setup, including:


l SD-WAN Interfaces with IPv6 addressing (gateway).
l IPv6 Mode for Performance SLA.
l IPv6 SD-WAN Rules.

Sample configuration

In Network > SD-WAN , set Status to Enable and configure SD-WAN Interface Members in the IPv6 Gateway field.

FortiOS 6.2.0 New Features Guide 166


Fortinet Technologies Inc.
SD-WAN

In Network > Performance SLA, set IP Version to IPv6 and configure fields.

The Performance SLA page displays the entry you configured.

FortiOS 6.2.0 New Features Guide 167


Fortinet Technologies Inc.
SD-WAN

In Network > SD-WAN Rules, set IP Version to IPv6 and configure SD-WAN IPv6 mode rules.

The Network > SD-WAN Rules page displays the rules you configured.

FortiOS 6.2.0 New Features Guide 168


Fortinet Technologies Inc.
SD-WAN

Forward Error Correction

Forward Error Correction (FEC) is used to lower the packet loss ratio by consuming more bandwidth. This features adds
Forward Error Correction (FEC) to IPsec VPN.
Six new parameters are added to the IPsec phase1-interface settings:

fec-ingress Enable/disable Forward Error Correction for ingress IPsec traffic (default = disable).
fec-egress Enable/disable Forward Error Correction for egress IPsec traffic (default = disable).
fec-base The number of base Forward Error Correction packets (1 - 100, default = 20).
fec-redundant The number of redundant Forward Error Correction packets (1 - 100, default = 10).
fec-send-timeout The time before sending Forward Error Correction packets, in milliseconds (1 - 1000,
default = 8).
fec-receive-timeout The time before dropping Forward Error Correction packets, in milliseconds (1 - 10000,
default = 5000).

FEC is disabled by default. FortiGate supports unidirectional and bidirectional FEC, and achieves the expected packet
loss ration and latency by tuning the above parameters.
Two checkboxes are added to the IPsec phase1 settings in the GUI:

FortiOS 6.2.0 New Features Guide 169


Fortinet Technologies Inc.
SD-WAN

To configure FEC with the CLI:

config vpn ipsec phase1-interface


edit "demo"
........................
set fec-egress enable
set fec-ingress enable
set fec-base 20
set fec-redundant 10
set fec-send-timeout 8
set fec-receive-timeout 5000
......................
next
end

To debug the VPN tunnel:

FGT-A # diagnose vpn tunnel list


list all ipsec tunnel in vd 0
------------------------------------------------------
name=demo ver=1 serial=1 172.16.200.1:0->172.16.200.2:0
bound_if=11 lgwy=static/1 tun=intf/0 mode=auto/1 encap=none/3600 options[0e10]=create_dev
frag-rfc fec-egress fec-ingress accept_traffic=1

proxyid_num=1 child_num=0 refcnt=11 ilast=8 olast=8 ad=/0


stat: rxp=0 txp=0 rxb=0 txb=0
dpd: mode=on-demand on=1 idle=20000ms retry=3 count=0 seqno=0
natt: mode=none draft=0 interval=0 remote_port=0
fec-egress: base=20 redundant=10 remote_port=50000 <<<<<<<<<<<<<<<<<<<<<<
fec-ingress: base=20 redundant=10 <<<<<<<<<<<<<<<<<<<<<<
proxyid=demo proto=0 sa=1 ref=2 serial=1
src: 0:10.1.100.0/255.255.255.0:0
dst: 0:173.1.1.0/255.255.255.0:0
SA: ref=3 options=10226 type=00 soft=0 mtu=1390 expire=42897/0B replaywin=2048
seqno=1 esn=0 replaywin_lastseq=00000000 itn=0 qat=0
life: type=01 bytes=0/0 timeout=42899/43200
dec: spi=181f4f81 esp=aes key=16 6e8fedf2a77691ffdbf3270484cb2555
ah=sha1 key=20 f92bcf841239d15d30b36b695f78eaef3fad05c4
enc: spi=0ce10190 esp=aes key=16 2d684fb19cbae533249c8b5683937329
ah=sha1 key=20 ba7333f89cd34cf75966bd9ffa72030115919213
dec:pkts/bytes=0/0, enc:pkts/bytes=0/0

FortiOS 6.2.0 New Features Guide 170


Fortinet Technologies Inc.
SD-WAN

Represent Multiple IPsec Tunnels as a Single Interface

With this feature, you can create a static aggregate interface using IPsec tunnels as members, with traffic load balanced
between the members. An IP address can be assigned to the aggregate interface, dynamic routing can run on the
interface, and the interface can be a member interface in SD-WAN.
The supported load balancing algorithms are: L3, L4, round-robin (default), and redundant.

1. Create a site to site VPN phase1 interface with net-device disabled:


config vpn ipsec phase1-interface
edit tunnel1
set interface port1
set net-device disable
set remote-gw 172.16.100.1
set psksecret sample
next
edit tunnel2
set interface port2
set net-device disable
set remote-gw 172.31.1.1
set psksecret sample
next
end

2. Configure IPsec aggregation:


config system ipsec-aggregate
edit agg1
set member tunnel1 tunnel2
next
end

3. Configure a firewall policy:


config firewall policy
edit 0
set srcaddr all
set srcintf port10
set dstaddr all
set dstintf agg1
set schedule always
set action accept
set service ALL
next
end

FortiOS 6.2.0 New Features Guide 171


Fortinet Technologies Inc.
SD-WAN

4. Configure a static route:


config router static
edit 0
set device agg1
next
end

To debug the IPsec aggregation list:

#diagnose sys ipsec-aggregate list


agg1 algo=RR member=2 run_tally=2
members:
tunnel1
tunnel2

Dual VPN Tunnel Wizard

This new wizard is used to automatically set up multiple VPN tunnels to the same destination over multiple outgoing
interfaces. This includes automatically configuring IPsec, Routing, and Firewall settings, avoiding cumbersome and
error-prone configuration steps.

To create a new SD-WAN VPN interface using the tunnel wizard:

1. Go to Network > SD-WAN.


2. Add a new interface member.

FortiOS 6.2.0 New Features Guide 172


Fortinet Technologies Inc.
SD-WAN

3. In the Interface drop-down, click +VPN. The Create IPsec VPN for SD-WAN members pane opens.

4. Enter the required information, then click Create.

5. Click Close to return to the SD-WAN page.


The newly created VPN interface will be highlighted in the Interface drop-down list.

FortiOS 6.2.0 New Features Guide 173


Fortinet Technologies Inc.
SD-WAN

6. Select the VPN interface to add it as an SD-WAN member.


7. Click Apply to save the SD-WAN settings.

BGP Additional Path Support

Currently, when deploying Auto-Discovery VPN (ADVPN) for Software-Defined Wide Area Networks (SD-WAN), a
FortiGate deployed as the ADVPN hub is a route reflector. As such, it only advertises one path, which is the best path.
Due to this, the branches receive different routes in their routing tables that point to the same next hop.
In 6.2, this is addressed by adding additional Border Gateway Protocol (BGP) path support, which allows the ADVPN
hub to advertise multiple paths.
This feature allows BGP to extend and keep additional network paths according to RFC 7911.

FortiOS 6.2.0 New Features Guide 174


Fortinet Technologies Inc.
SD-WAN

Example

In the following example topology, each spoke has four VPN tunnels connected to the Hub with ADVPN. The Spoke-Hub
has established four BGP neighbors on all four tunnels.

Spoke 1 and Spoke 2 can learn four different routes from each other.

Hub
config router bgp
set as 65505
set router-id 11.11.11.11
set ibgp-multipath enable
set additional-path enable <<<<<<<<<< new
set additional-path-select 4 <<<<<<<<<< new
config neighbor-group
edit "gr1"
set capability-default-originate enable
set remote-as 65505
set additional-path both <<<<<<<<<< new
set adv-additional-path 4 <<<<<<<<<< new
set route-reflector-client enable
next
end
config neighbor-range
edit 1
set prefix 10.10.0.0 255.255.0.0
set neighbor-group "gr1"
next
end
config network
edit 12
set prefix 11.11.11.11 255.255.255.255

FortiOS 6.2.0 New Features Guide 175


Fortinet Technologies Inc.
SD-WAN

next
end
end

Spoke
config router bgp
set as 65505
set router-id 2.2.2.2
set ibgp-multipath enable
set additional-path enable <<<<<<<<<< new
set additional-path-select 4 <<<<<<<<<< new
config neighbor
edit "10.10.100.254"
set soft-reconfiguration enable
set remote-as 65505
set additional-path both <<<<<<<<<< new
set adv-additional-path 4 <<<<<<<<<< new
next
edit "10.10.200.254"
set soft-reconfiguration enable
set remote-as 65505
set additional-path both
set adv-additional-path 4
next
edit "10.10.203.254"
set soft-reconfiguration enable
set remote-as 65505
set additional-path both
set adv-additional-path 4
next
edit "10.10.204.254"
set soft-reconfiguration enable
set remote-as 65505
set additional-path both
set adv-additional-path 4
next
end
config network
edit 3
set prefix 22.1.1.0 255.255.255.0
next
end
end
Spoke1 # get router info routing-table bgp
Routing table for VRF=0
B* 0.0.0.0/0 [200/0] via 10.10.200.254, vd2-2, 03:57:26
[200/0] via 10.10.203.254, vd2-3, 03:57:26
[200/0] via 10.10.204.254, vd2-4, 03:57:26
[200/0] via 10.10.100.254, vd2-1, 03:57:26
B 1.1.1.1/32 [200/0] via 11.1.1.1 (recursive via 12.1.1.1), 03:57:51
[200/0] via 11.1.1.1 (recursive via 12.1.1.1), 03:57:51
[200/0] via 11.1.1.1 (recursive via 12.1.1.1), 03:57:51
[200/0] via 11.1.1.1 (recursive via 12.1.1.1), 03:57:51
B 11.11.11.11/32 [200/0] via 10.10.200.254, vd2-2, 03:57:51
[200/0] via 10.10.203.254, vd2-3, 03:57:51
[200/0] via 10.10.204.254, vd2-4, 03:57:51

FortiOS 6.2.0 New Features Guide 176


Fortinet Technologies Inc.
SD-WAN

[200/0] via 10.10.100.254, vd2-1, 03:57:51


B 33.1.1.0/24 [200/0] via 10.10.204.3, vd2-4, 03:57:26
[200/0] via 10.10.203.3, vd2-3, 03:57:26
[200/0] via 10.10.200.3, vd2-2, 03:57:26
[200/0] via 10.10.100.3, vd2-1, 03:57:26
[200/0] via 10.10.204.3, vd2-4, 03:57:26
[200/0] via 10.10.203.3, vd2-3, 03:57:26
[200/0] via 10.10.200.3, vd2-2, 03:57:26
[200/0] via 10.10.100.3, vd2-1, 03:57:26
[200/0] via 10.10.204.3, vd2-4, 03:57:26
[200/0] via 10.10.203.3, vd2-3, 03:57:26
[200/0] via 10.10.200.3, vd2-2, 03:57:26
[200/0] via 10.10.100.3, vd2-1, 03:57:26
[200/0] via 10.10.204.3, vd2-4, 03:57:26
[200/0] via 10.10.203.3, vd2-3, 03:57:26
[200/0] via 10.10.200.3, vd2-2, 03:57:26
[200/0] via 10.10.100.3, vd2-1, 03:57:26
Spoke1 #

SLA Logging

The features adds an SD-WAN daemon function to keep a short, 10 minute history of SLA that can be viewed in the CLI.
Performance SLA results related to interface selection, session failover, and other information, can be logged. These
logs can then be used for long-term monitoring of traffic issues at remote sites, and for reports and views in
FortiAnalyzer.
The time intervals that Performance SLA fail and pass logs are generated in can be configured.

To configure the fail and pass logs' generation time interval:

config system virtual-wan-link


config health-check
edit "ping"
set sla-fail-log-period 30
set sla-pass-log-period 60
next
end
end

To view the 10 minute Performance SLA link status history:

FGT_A (root) # diagnose sys virtual-wan-link sla-log ping 1


Timestamp: Thu Feb 28 10:58:24 2019, vdom root, health-check ping, interface: R150, status:
up, latency: 0.000, jitter: 0.000, packet loss: 0.000%.
Timestamp: Thu Feb 28 10:58:24 2019, vdom root, health-check ping, interface: R150, status:
up, latency: 0.097, jitter: 0.000, packet loss: 0.000%.
Timestamp: Thu Feb 28 10:58:25 2019, vdom root, health-check ping, interface: R150, status:
up, latency: 0.058, jitter: 0.040, packet loss: 0.000%.
Timestamp: Thu Feb 28 10:58:25 2019, vdom root, health-check ping, interface: R150, status:
up, latency: 0.044, jitter: 0.026, packet loss: 0.000%.
... ...

FortiOS 6.2.0 New Features Guide 177


Fortinet Technologies Inc.
SD-WAN

SLA pass logs

The FortiGate generates Performance SLA logs at the specified pass log interval (sla-pass-log-period) when
SLA passes.
3: date=2019-02-28 time=11:53:26 logid="0100022925" type="event" subtype="system" level-
l="information" vd="root" eventtime=1551383604 logdesc="Link monitor SLA information" name-
e="ping" interface="R160" status="up" msg="Latency: 0.013, jitter: 0.001, packet loss: 0.000%,
inbandwidth: 0Mbps, outbandwidth: 0Mbps, bibandwidth: 0Mbps, sla_map: 0x1"
7: date=2019-02-28 time=11:52:26 logid="0100022925" type="event" subtype="system" level-
l="information" vd="root" eventtime=1551383545 logdesc="Link monitor SLA information" name-
e="ping" interface="R160" status="up" msg="Latency: 0.013, jitter: 0.002, packet loss: 0.000%,
inbandwidth: 0Mbps, outbandwidth: 0Mbps, bibandwidth: 0Mbps, sla_map: 0x1"

In the FortiAnalyzer GUI:

SLA fail logs

The FortiGate generates Performance SLA logs at the specified fail log interval (sla-fail-log-period) when SLA
fails.
6: date=2019-02-28 time=11:52:32 logid="0100022925" type="event" subtype="system" level-
l="notice" vd="root" eventtime=1551383552 logdesc="Link monitor SLA information" name="ping"
interface="R150" status="down" msg="Latency: 0.000, jitter: 0.000, packet loss: 100.000%,
inbandwidth: 0Mbps, outbandwidth: 200Mbps, bibandwidth: 200Mbps, sla_map: 0x0"
8: date=2019-02-28 time=11:52:02 logid="0100022925" type="event" subtype="system" level-
l="notice" vd="root" eventtime=1551383522 logdesc="Link monitor SLA information" name="ping"
interface="R150" status="down" msg="Latency: 0.000, jitter: 0.000, packet loss: 100.000%,
inbandwidth: 0Mbps, outbandwidth: 200Mbps, bibandwidth: 200Mbps, sla_map: 0x0"

In the FortiAnalyzer GUI:

FortiOS 6.2.0 New Features Guide 178


Fortinet Technologies Inc.
SD-WAN

Internet Service Customization

This version introduces new flexibility to tune Internet Service DB (ISDB) entries for their environments. A new CLI
option allows the admin to add custom port and port ranges into their predefined ISDB entries.
Use the new CLI config firewall internet-service-addition command in system global to tune
ISDB for your environment.

To add custom port range in global:

config firewall internet-service-addition


edit 65646
set comment "Add custom port-range:tcp/8080-8090 into 65646"
config entry
edit 1
set protocol 6
config port-range
edit 1
set start-port 8080
set end-port 8090
next
end
next
end
next
end

To execute internet-service refresh to apply the change:

FGT-201E (65646) # end


Warning: Configuration will only be applied after rebooting or using the 'execute internet-
service refresh' command.

FGT-201E (global) # exec internet-service refresh


Internet Service database is refreshed.

FortiOS 6.2.0 New Features Guide 179


Fortinet Technologies Inc.
SD-WAN

To verify that the change was applied:

FGT-201E (global) # diagnose internet-service info FG-traffic 6 8080 2.20.183.160


Internet Service: 65646(Google.Gmail)
FGT-201E (global) #

SLA Monitoring via REST API

This feature adds the ability to monitor the SLA log information and interface SLA information using the REST API. This
feature is also be used by FortiManager as part of its detailed SLA monitoring and drill-down features.

Interface log command example:

https://172.172.172.9/api/v2/monitor/virtual-wan/interface-log
{
"http_method":"GET",
"results":[
{
"interface":"port13",
"logs":[
{
"timestamp":1547087168,
"tx_bandwidth":3447,
"rx_bandwidth":3457,
"bi_bandwidth":6904,
"tx_bytes":748875,
"rx_bytes":708799,
"egress_queue":[
]
},
{
"timestamp":1547087178,
"tx_bandwidth":3364,
"rx_bandwidth":3400,
"bi_bandwidth":6764,
"tx_bytes":753789,
"rx_bytes":712835,
"egress_queue":[
]
},
....
....

SLA log command example:

https://172.172.172.9/api/v2/monitor/virtual-wan/sla-log
{
"http_method":"GET",
"results":[
{
"name":"ping",
"interface":"port13",

FortiOS 6.2.0 New Features Guide 180


Fortinet Technologies Inc.
SD-WAN

"logs":[
{
"timestamp":1547087204,
"link":"up",
"latency":0.686433,
"jitter":0.063400,
"packetloss":0.000000
},
{
"timestamp":1547087205,
"link":"up",
"latency":0.688433,
"jitter":0.063133,
"packetloss":0.000000
},
{
"timestamp":1547087206,
"link":"up",
"latency":0.688300,
"jitter":0.065267,
"packetloss":0.000000
},
....
....

CLI diagnose commands:

# diagnose sys virtual-wan-link sla-log ping 1


Timestamp: Wed Jan 9 18:35:11 2019, vdom root, health-check ping, interface: port13,
status: up, latency: 0.698, jitter: 0.073, packet loss: 0.000%.
Timestamp: Wed Jan 9 18:35:12 2019, vdom root, health-check ping, interface: port13,
status: up, latency: 0.704, jitter: 0.073, packet loss: 0.000%.
Timestamp: Wed Jan 9 18:35:13 2019, vdom root, health-check ping, interface: port13,
status: up, latency: 0.709, jitter: 0.073, packet loss: 0.000%.
Timestamp: Wed Jan 9 18:35:14 2019, vdom root, health-check ping, interface: port13,
status: up, latency: 0.707, jitter: 0.066, packet loss: 0.000%.
Timestamp: Wed Jan 9 18:35:15 2019, vdom root, health-check ping, interface: port13,
status: up, latency: 0.710, jitter: 0.061, packet loss: 0.000%.
Timestamp: Wed Jan 9 18:35:16 2019, vdom root, health-check ping, interface: port13,
status: up, latency: 0.707, jitter: 0.055, packet loss: 0.000%.
Timestamp: Wed Jan 9 18:35:17 2019, vdom root, health-check ping, interface: port13,
status: up, latency: 0.703, jitter: 0.055, packet loss: 0.000%.

# diagnose sys virtual-wan-link intf-sla-log port13


Timestamp: Wed Jan 9 18:33:49 2019, used inbandwidth: 3208bps, used outbandwidth: 3453bps,
used bibandwidth: 6661bps, tx bytes: 947234bytes, rx bytes: 898622bytes.
Timestamp: Wed Jan 9 18:33:59 2019, used inbandwidth: 3317bps, used outbandwidth: 3450bps,
used bibandwidth: 6767bps, tx bytes: 951284bytes, rx bytes: 902937bytes.
Timestamp: Wed Jan 9 18:34:09 2019, used inbandwidth: 3302bps, used outbandwidth: 3389bps,
used bibandwidth: 6691bps, tx bytes: 956268bytes, rx bytes: 907114bytes.
Timestamp: Wed Jan 9 18:34:19 2019, used inbandwidth: 3279bps, used outbandwidth: 3352bps,
used bibandwidth: 6631bps, tx bytes: 958920bytes, rx bytes: 910793bytes.
Timestamp: Wed Jan 9 18:34:29 2019, used inbandwidth: 3233bps, used outbandwidth: 3371bps,
used bibandwidth: 6604bps, tx bytes: 964374bytes, rx bytes: 914854bytes.
Timestamp: Wed Jan 9 18:34:39 2019, used inbandwidth: 3235bps, used outbandwidth: 3362bps,
used bibandwidth: 6597bps, tx bytes: 968250bytes, rx bytes: 918846bytes.

FortiOS 6.2.0 New Features Guide 181


Fortinet Technologies Inc.
SD-WAN

Timestamp: Wed Jan 9 18:34:49 2019, used inbandwidth: 3165bps, used outbandwidth: 3362bps,
used bibandwidth: 6527bps, tx bytes: 972298bytes, rx bytes: 922724bytes.
Timestamp: Wed Jan 9 18:34:59 2019, used inbandwidth: 3184bps, used outbandwidth: 3362bps,
used bibandwidth: 6546bps, tx bytes: 977282bytes, rx bytes: 927019bytes.

FortiOS 6.2.0 New Features Guide 182


Fortinet Technologies Inc.
Multi-Cloud

This section lists the new features added to FortiOS for multi-cloud.
l AWS Extensions on page 183
l Google Cloud Platform (GCP) Extensions on page 187
l Oracle Cloud Extensions on page 195
l AliCloud Extensions on page 206
l Support up to 18 Interfaces on page 210
l OpenStack — Network Service Header (NSH) Chaining Support on page 212
l Physical Function (PF) SR-IOV Driver Support on page 213

AWS Extensions

This section lists the new features added for AWS extensions.
l Cross AZ High Availability Support on page 183

Cross AZ High Availability Support

In 6.2, FortiGate High Availability (Active/Passive) can be deployed in AWS across Availability Zones (AZs).
With FortiGates of an HA pair in separate AZs, one FortiGate can remain operational if the other AZ fails.
This configuration supports the following HA features:
l Config synchronization
l IP failover
l Route failover
The following HA features are not supported with this configuration:
l Session pickup
l Session synchronization

Topology

FortiOS uses a normal HA configuration that uses unicast.


AWS uses the following configuration:
l 1 VPC 10.0.0.0/16 CIDR
l 8 Subnets
l 4 in Availability Zone A - Master FGTA has a NIC in each of these:
l Public: 10.0.0.0/24 EIP
l Internal: 10.0.1.0/24

FortiOS 6.2.0 New Features Guide 183


Fortinet Technologies Inc.
Multi-Cloud

l Heartbeat: 10.0.2.0/24
l Management: 10.0.3.0/24 EIP
l 4 in Availability Zone B - Slave FGTB has a NIC in each of these:
l Public 10.0.10.0/24
l Internal 10.0.11.0/24
l Heartbeat 10.0.12.0/24
l Management 10.0.13.0/24 EIP
l 3 AWS UDR Routing Tables
l For Public, add default route to Internet Gateway
l For Internal, add default to Master FortiGate internal NIC
l For all others, leave it default with AWS local address

Example

* Same as regular AWS HA unicast peering


##MASTER##
​config system interface
edit "port1"
set vdom "root"
set ip 10.0.0.11 255.255.255.0
set allowaccess ping https ssh snmp http telnet fgfm radius-acct probe-response capwap ftm
set type physical
set snmp-index 1
set mtu-override enable
set mtu 9001
next
edit "port2"
set vdom "root"
set ip 10.0.1.11 255.255.255.0
set allowaccess ping https ssh snmp http telnet fgfm radius-acct probe-response capwap ftm
set type physical
set snmp-index 3
set mtu-override enable
set mtu 9001
next
edit "port3"
set ip 10.0.2.11 255.255.255.0
set allowaccess ping https ssh snmp http telnet fgfm radius-acct probe-response capwap ftm
set type physical
set snmp-index 4
next
edit "port4"
set ip 10.0.3.11 255.255.255.0
set allowaccess ping https ssh snmp http telnet fgfm radius-acct probe-response capwap ftm
set type physical
set snmp-index 5
next
edit "ssl.root"
set vdom "root"
set type tunnel
set alias "SSL VPN interface"
set snmp-index 2
next

FortiOS 6.2.0 New Features Guide 184


Fortinet Technologies Inc.
Multi-Cloud

end
config router static
edit 1
set gateway 10.0.0.1
set device "port1"
next
edit 2
set dst 10.0.11.0 255.255.255.0
set gateway 10.0.1.1
set device "port2"
next
end
config system ha
set group-name "test"
set mode a-p
set hbdev "port3" 50
set session-pickup enable
set ha-mgmt-status enable
config ha-mgmt-interfaces
edit 1
set interface "port4"
set gateway 10.0.3.1
next
end
set override disable
set priority 255
set unicast-hb enable
set unicast-hb-peerip 10.0.12.11
end

##SLAVE##
config system interface
edit "port1"
set vdom "root"
set ip 10.0.10.11 255.255.255.0
set allowaccess ping https ssh snmp http telnet fgfm radius-acct probe-response capwap ftm
set type physical
set snmp-index 1
set mtu-override enable
set mtu 9001
next
edit "port2"
set vdom "root"
set ip 10.0.11.11 255.255.255.0
set allowaccess ping https ssh snmp http telnet fgfm radius-acct probe-response capwap ftm
set type physical
set snmp-index 2
set mtu-override enable
set mtu 9001
next
edit "port3"
set ip 10.0.12.11 255.255.255.0
set allowaccess ping https ssh snmp http telnet fgfm radius-acct probe-response capwap ftm
set type physical
set snmp-index 3
set mtu-override enable

FortiOS 6.2.0 New Features Guide 185


Fortinet Technologies Inc.
Multi-Cloud

set mtu 9001


next
edit "port4"
set ip 10.0.13.11 255.255.255.0
set allowaccess ping https ssh snmp http telnet fgfm radius-acct probe-response capwap ftm
set type physical
set snmp-index 4
set mtu-override enable
set mtu 9001
next
edit "ssl.root"
set vdom "root"
set type tunnel
set alias "SSL VPN interface"
set snmp-index 5
next
end
config router static
edit 1
set gateway 10.0.10.1
set device "port1"
next
edit 2
set dst 10.0.1.0 255.255.255.0
set gateway 10.0.11.1
set device "port2"
next
end
config system ha
set group-name "test"
set mode a-p
set hbdev "port3" 50
set session-pickup enable
set ha-mgmt-status enable
config ha-mgmt-interfaces
edit 1
set interface "port4"
set gateway 10.0.13.1
next
end
set override disable
set priority 1
set unicast-hb enable
set unicast-hb-peerip 10.0.2.11
end

##Trigger Failover##

slave # Become HA master


send_vip_arp: vd root master 1 intf port1 ip 10.0.10.11
send_vip_arp: vd root master 1 intf port2 ip 10.0.11.11
awsd get instance id i-0b29804fd38976af4
awsd get iam role WikiDemoHARole
awsd get region us-east-1
awsd get vpc id vpc-0ade7ea6e64befbfc
awsd doing ha failover for vdom root

FortiOS 6.2.0 New Features Guide 186


Fortinet Technologies Inc.
Multi-Cloud

awsd associate elastic ip for port1


awsd associate elastic ip allocation eipalloc-06b849dbb0f76555f to 10.0.10.11 of eni eni-
0ab045a4d6dce664a
awsd associate elastic ip successfully
awsd update route table rtb-0a7b4fec57feb1a21, replace route of dst 0.0.0.0/0 to eni-
0c4c085477aaff8c5
awsd update route successfully

Google Cloud Platform (GCP) Extensions

This section lists the new features added for GCP extensions.
l HA Between Zones on page 187
l Auto Scaling on page 190

HA Between Zones

6.2 supports auto-scaling HA (High Availability) between Zones in Google Cloud environments.

Example

Following is an overview of how the feature works:


1. Create FGT-A as a master on one zone with metadata that has ha-master configuration.
2. Create FGT-B as a slave on another zone with metadata that has ha-slave configuration.
3. Create a PC that can access the Internet via FGT-HA.
4. Shut down FGT-A, and FGT-B become the master to handle traffic. The public EIP will attach to FGT-B.

FortiOS 6.2.0 New Features Guide 187


Fortinet Technologies Inc.
Multi-Cloud

To configure HA between zones:

1. Create 4 VPC networks in region, such as us-central1.

2. Create routes for each network.

3. Create firewall rules for each network.

4. Reserve three external IP addresses for convenience.

FortiOS 6.2.0 New Features Guide 188


Fortinet Technologies Inc.
Multi-Cloud

5. Create both FGT-A and FGT-B in GCP:


gcloud beta compute --project=dev-project-001-166400 instances create fhua-fgt-a --zone=us-
central1-c --machine-type=n1-standard-4 --network-tier=PREMIUM --can-ip-forward --
maintenance-policy=MIGRATE --service-account=966517025500-
compute@developer.gserviceaccount.com --scopes=https://www.googleapis.com/auth/cloud-
platform --image=fhua-ond-0804 --image-project=dev-project-001-166400 --boot-disk-
type=pd-standard --boot-disk-device-name=fhua-fgt-0804 --network-interface
subnet=fhua-hapvc-port1external,private-network-ip=10.0.0.15,address=104.154.241.0 --
network-interface subnet=fhua-hapvc-port2internal,private-network-ip=10.0.1.15,no-
address --network-interface subnet=fhua-hapvc-port3heartbeat,private-network-
ip=10.0.2.15,no-address --network-interface subnet=fhua-hapvc-port4mgmt,private-
network-ip=10.0.3.15,address=104.154.25.116 --metadata-from-file user-
data=/home/gcloud/config/master.conf
gcloud beta compute --project=dev-project-001-166400 instances create fhua-fgt-b --zone=us-
central1-a --machine-type=n1-standard-4 --network-tier=PREMIUM --can-ip-forward --
maintenance-policy=MIGRATE --service-account=966517025500-
compute@developer.gserviceaccount.com --scopes=https://www.googleapis.com/auth/cloud-
platform --image=fhua-ond-0804 --image-project=dev-project-001-166400 --boot-disk-
type=pd-standard --boot-disk-device-name=fhua-fgt-0804 --network-interface
subnet=fhua-hapvc-port1external,private-network-ip=10.0.0.16,no-address --network-
interface subnet=fhua-hapvc-port2internal,private-network-ip=10.0.1.16,no-address --
network-interface subnet=fhua-hapvc-port3heartbeat,private-network-ip=10.0.2.16,no-
address --network-interface subnet=fhua-hapvc-port4mgmt,private-network-
ip=10.0.3.16,address=35.226.235.236 --metadata-from-file user-
data=/home/gcloud/config/slave.conf
After the FGT-VM-GCP is set up, you can view it in the FortiOS GUI:

6. Configure FGT-A:
config system ha
set group-id 21
set group-name "cluster1"
set mode a-p
set hbdev "port3" 50
set session-pickup enable
set session-pickup-connectionless enable
set ha-mgmt-status enable
config ha-mgmt-interfaces
edit 1
set interface "port4"
set gateway 10.0.3.1
next
end
set override enable
set priority 200
set unicast-hb enable
set unicast-hb-peerip 10.0.2.16
set unicast-hb-netmask 255.255.255.0

FortiOS 6.2.0 New Features Guide 189


Fortinet Technologies Inc.
Multi-Cloud

end
config system sdn-connector
edit "gcp_conn"
set type gcp
set ha-status enable
config external-ip
edit "fhua-reserve-fgthapublic"
next
end
config route
edit "fhua-route-internal"
next
end
set use-metadata-iam disable
set gcp-project "..."
set service-account "..."
set private-key "..."
next
end
7. Configure FGT-B:
config system ha
set group-id 21
set group-name "cluster1"
set mode a-p set hbdev "port3" 50
set session-pickup enable
set session-pickup-connectionless enable
set ha-mgmt-status enable
config ha-mgmt-interfaces
edit 1
set interface "port4"
set gateway 10.0.3.1
next
end
set override enable
set priority 20
set unicast-hb enable
set unicast-hb-peerip 10.0.2.15
set unicast-hb-netmask 255.255.255.0
end
8. Create a PC that can access the Internet via FGT-HA.

Auto Scaling

This version supports auto scaling for Google Cloud environments.

Sample configuration

To set up auto scaling for a Google Cloud environment:


1. Create an instance template with Google Cloud Platform console.
2. Create an instance group with Google Cloud Platform console.
3. Set the first FortiGate VM in the auto scaling group as the master member.

FortiOS 6.2.0 New Features Guide 190


Fortinet Technologies Inc.
Multi-Cloud

4. Scale out another FortiGate VM and set it as a slave member; and then synchronize configuration from master to
slave.

To create an instance template with Google Cloud Platform console:

1. Go to Instance templates console and click CREATE INSTANCE TEMPLATE.

2. Configure the instance template.


l Enter the instance template Name, for example instance-template-demo.
l Select the Machine type.
l Change Boot disk to your FortiGate VM image.
l In the Firewall section, select Allow HTTP traffic and Allow HTTPS traffic.
l Click Create.

FortiOS 6.2.0 New Features Guide 191


Fortinet Technologies Inc.
Multi-Cloud

3. Go to Instance templates console and check that your instance template is created.

To create an instance group with Google Cloud Platform console:

1. Go to Instance groups console and click CREATE INSTANCE GROUP.

2. Configure the instance group.


l Enter the instance group Name, for example instance-group-demo.
l Select the Instance template you created.
l For Autoscaling, select On.

l For Autoscaling policy, select CPU usage.


l Enter the Target CPU usage percentage. For example, 60%.
l Enter the Maximum number of instances that you want for this instance group.

FortiOS 6.2.0 New Features Guide 192


Fortinet Technologies Inc.
Multi-Cloud

l If desired, enter the Minimum number of instances and Cool down period.
The cool down period is the number of seconds auto scaling waits after a VM starts before collecting
information from it. The time is typically the VM initialization time, when the collected usage is not reliable for
auto scaling. The default cool down period is 60 seconds.
l Click Create.

3. Go to Instance groups console and check that your instance group is created.

4. Wait a few moments and click the instance group to check if an instance was launched automatically, since the
minimum number of instances is set to 1.
In this example, the first FortiGate VM instance name is instance-group-demo-2kp9.

FortiOS 6.2.0 New Features Guide 193


Fortinet Technologies Inc.
Multi-Cloud

To set the first FortiGate VM in the auto scaling group as the master member:

1. Log into the FortiGate VM as administrator and the instance ID as the default password.
2. Use the CLI to enable auto scaling and set the role to master.
config system auto-scale
set status enable
set role master
set sync-interface "port1"
set psksecret xxxxxx
end

3. In the GUI, go to the Dashboard Virtual Machine widget to check that Auto Scaling is enabled and Role is Master.

To scale out another FortiGate VM and set it as a slave member; and then synchronize configuration from
master to slave:

1. Generate test traffic on the FortiGate VM where the CPU rate is higher than the instance group target CPU usage.
For test purpose, you can also change the target CPU usage to a small value.
The instance group will trigger to scale out an new FortiGate VM.
In this example, the second FortiGate VM instance name is instance-group-demo-mq3v.

2. Log into the second FortiGate VM as administrator and the instance ID as the default password.
Use the CLI to enable auto scaling and set the role to slave.
For the master-ip, use the IP of the master member sync interface. The master IP should be the master side
private IP address.
Check that the configuration can be synced from the master member to the slave member.

FortiOS 6.2.0 New Features Guide 194


Fortinet Technologies Inc.
Multi-Cloud

config system auto-scale


set status enable
set role slave
set sync-interface "port1"
set master-ip 10.128.0.41
set psksecret xxxxxx
end

3. Wait a few moments for the slave member to sync with the master member; and then the slave member can sync
the FortiGate configuration from the master member.
FortiGate-VM64-GCPON~AND # diag deb app hasync -1
slave's configuration is not in sync with master's, sequence:0
slave's configuration is not in sync with master's, sequence:1
slave's configuration is not in sync with master's, sequence:2
slave's configuration is not in sync with master's, sequence:3
slave's configuration is not in sync with master's, sequence:4
slave starts to sync with master
logout all admin users

Oracle Cloud Extensions

This section lists the new features added for Oracle Cloud extensions.
l IAM Authentication on page 195
l Paravirtualized Mode Support on page 198
l Native Mode Support for OCI on page 200
l High Availability Between Availability Domains on page 205

IAM Authentication

This feature adds the ability to use IAM credentials for Oracle Cloud Infrastructure (OCI) SDN connector functionality,
including HA and dynamic address updating.
Prior to enabling IAM credentials for an SDN connector, a dynamic group and policy must configured on OCI. The SDN
connector can then be configured using the FortiGate CLI or GUI.

To configure OCI:

1. Create a Dynamic Group that includes rules to allow an instance that matches the FortiGate HA device's instance
ID. For example:
ALL {instance.id =
'ocid1.instance.oc1.iad.abuwcljtkqllbq6yxgxtowybgc4ht6sxqpfccckjj23p6pbfmvbl52uttb
iq'}
ALL {instance.id =
'ocid1.instance.oc1.iad.abuwcljttcylhekauqy42jzpsnu2dkalbhnlulqxfe2az24fktcuhtj65v
nq'}

FortiOS 6.2.0 New Features Guide 195


Fortinet Technologies Inc.
Multi-Cloud

2. Create a policy that allows that group to manage all resources:


Allow dynamic-group API to manage all-resources in TENANCY

To Configure the FortiGate using the CLI:

1. Configure the SDN connector:


config system sdn-connector
edit "oci-sdn"
set status enable
set type oci
set ha-status enable
set tenant-id
"ocid1.tenancy.oc1..aaaaaaaambr3uzztoyhweohbzqqdo775h7d3t54zpmzkp4b2cf35vs55c
k3a"
set user-id
"ocid1.user.oc1..aaaaaaaaq2lfspeo3uetzbzpiv2pqvzzevozccnys347stwssvizqlatfv7
q"
set compartment-id
"ocid1.tenancy.oc1..aaaaaaaambr3uzztoyhweohbzqqdo775h7d3t54zpmzkp4b2cf35vs55c
k3a"

FortiOS 6.2.0 New Features Guide 196


Fortinet Technologies Inc.
Multi-Cloud

set oci-region ashburn


set oci-cert ''
set use-metadata-iam enable
set update-interval 60
next
end
2. Confirm the HA failover succeeds on the secondary HA device:
# HA event
OCI sdn connector oci-sdn updating

Updating Compartment: fortinetoraclecloud1


VM FAZ-B1750
ip are 129.213.120.204:10.0.0.5
VM fmg-b1746
Become HA master mode 2
ocid collect vnics info for instance thomas-slave
vnic state: ATTACHED
vnic id(1/4):
ocid1.vnic.oc1.iad.abuwcljt5f2ehfi2zlkhqqbrewgrnpy7iqhsxuqyad7k6natuq42lsqo3hfq
ip are 129.213.138.127:10.0.0.5
VM fmg-b1781
vnic state: ATTACHED
vnic id(2/4):
ocid1.vnic.oc1.iad.abuwcljtk6t4glgvzjy5rwk3jywsthbyoxjdbojwouppnwdnbpadpnr3unra
vnic state: ATTACHED
vnic id(3/4):
ocid1.vnic.oc1.iad.abuwcljtipazqefscqemll5forvnzfmo5zh22zjaeahnbph67wjmm7gd6qha
ip are 132.145.170.31:10.0.0.14
VM instance-20180813-1141
vnic state: ATTACHED
vnic id(4/4):
ocid1.vnic.oc1.iad.abuwcljtyy3mvw7uqoefma6vx5y5g7bzjw4hycr37urncf53xyyzntzfeqza
ocid fail over private ip: 10.0.1.15
ip are 129.213.124.225:10.0.0.2
VM instance-20181024-1439
private ip 10.0.1.15 is attached in remote instance
attaching private ip 10.0.1.15 to local vnic
(ocid1.vnic.oc1.iad.abuwcljtk6t4glgvzjy5rwk3jywsthbyoxjdbojwouppnwdnbpadpnr3unra)
updating private ip with data: {"vnicId":
"ocid1.vnic.oc1.iad.abuwcljtk6t4glgvzjy5rwk3jywsthbyoxjdbojwouppnwdnbpadpnr3unra"}
ip are 132.145.173.187:10.0.0.11
ip are 132.145.173.187:10.0.10.2
VM instance-20181128-1505
ip are 132.145.162.119:10.0.0.3
VM instance-20181214-1616
moving private ip 10.0.1.15 to local successfully

ocid fail over private ip: 10.0.0.15


ip are 132.145.167.255:10.0.0.15
VM jkato-fgt603-dev005
private ip 10.0.0.15 is attached in remote instance
attaching private ip 10.0.0.15 to local vnic
(ocid1.vnic.oc1.iad.abuwcljtipazqefscqemll5forvnzfmo5zh22zjaeahnbph67wjmm7gd6qha)
updating private ip with data: {"vnicId":

FortiOS 6.2.0 New Features Guide 197


Fortinet Technologies Inc.
Multi-Cloud

"ocid1.vnic.oc1.iad.abuwcljtipazqefscqemll5forvnzfmo5zh22zjaeahnbph67wjmm7gd6qha"}
moving private ip 10.0.0.15 to local successfully

To Configure the FortiGate using the GUI:

1. Go to Security Fabric > Fabric Connectors.


2. Click Create New, then select Oracle Cloud Infrastructure (OCI) from the SDN category.
3. Fill in the Name, User ID, OCI tenant ID, and OCI compartment ID.
4. Enable Use metadata IAM.

5. Configure the Update Interval and Status, then click OK.


6. Go to Policy and Objects > Addresses to check that the dynamic address can update.

Paravirtualized Mode Support

FGT_VM64_OPC now supports the new paravirtualized mode on Oracle Cloud Infrastructure (OCI).
The below instructions assume that the user already has an OCI account.

To launch a FortiGate-VM instance with paravirtualized mode:

1. Obtain the deployment image file:


a. Go to Customer Service & Support. Navigate to Download > VM Images in the top menu.
b. In the Select Product dropdown list, select FortiGate.
c. In the Select Platform dropdown list, select Oracle.
d. Obtain the FGT_VM64_OPC-vX-buildXXXX-FORTINET.out.OpenXen.zip file. XXXX is the build number.
Ensure the file name includes OpenXen.
e. After downloading, unzip the file. You will find the forties.qcow2 file, which is needed to deploy the FortiGate
on OCI. Rename the file to FGT_VM64_OPC-v6-build0805-FORTINET.out.OpenXen.qcow2.
2. Upload the deployment image file:
a. In OCI, go to Storage > Object Storage. Click an existing storage bucket or create a new bucket.
b. Select the desired bucket, then upload the deployment image file FGT_VM64_OPC-v6-build0805-
FORTINET.out.OpenXen.qcow2.
c. Click Upload Object. The dialog shows the upload progress.

FortiOS 6.2.0 New Features Guide 198


Fortinet Technologies Inc.
Multi-Cloud

3. Copy the qcow2 file URL:


a. From the Storage > Object Storage > Bucket Details page, click Create Pre-Authenticated Requests.
b. Copy the URL under PRE-AUTHENTICATED REQUEST URL.
4. Create a FortiGate-VM image in paravirtualized mode:
a. In OCI, go to Compute > Custom Images, then click Import Image.
b. In the OBJECT STORAGE URL field, paste the URL copied in step 3.
c. Under IMAGE TYPE, select QCOW2.
d. Under LAUNCH MODE, select PARAVIRTUALIZED MODE.
e. Configure other fields as desired, then click Import Image.

FortiOS 6.2.0 New Features Guide 199


Fortinet Technologies Inc.
Multi-Cloud

5. On the Image Details page, click Create Instance to create an instance with the newly created image.

The paravirtualized mode FortiGate-VM instance boots up and functions as expected.

Native Mode Support for OCI

FGT_VM64_OPC now supports native mode on Oracle Cloud Infrastructure (OCI), in addition to emulation mode and
paravirtualized mode. This version also supports iSCSI type hard disks.

To create a native mode FGT_VM64_OPC custom image:

1. Download the FGT image for OCI. The naming convention is: FGT_VM64_OPC-v6-buildxxxx-
FORTINET.out.OpenXen.zip.
2. Unzip the file to get fortios.qcow2.
3. Upload fortios.qcow2 to the OCI object storage and copy the file URL path (URI), for example,
https://objectstorage.us-ashburn-
1.oraclecloud.com/n/fortinetoraclecloud1/b/fhua-bucket002/o/fortios.qcow2.
4. Log into the Oracle Cloud web portal and go to Compute > Custom Images > Import Image.
5. Enter the image NAME, in this example, fhua-temp-b0838-native.
6. For OPERATING SYSTEM, select Linux.
7. For the OBJECT STORAGE URL, paste the URI you copied when you uploaded fortios.qcow2.
8. For IMAGE TYPE, select QCOW2.
9. For LAUNCH MODE, select NATIVE MODE.

FortiOS 6.2.0 New Features Guide 200


Fortinet Technologies Inc.
Multi-Cloud

10. Click Import Image.

When the import is complete, the FortiGate for OCI custom image is available. In this example, the custom image
name is fhua-temp-b0838-native.

To create a FGT_VM64_OPC instance with the native mode custom image:

1. Log into the Oracle Cloud web portal and go to Compute > Instances > Create Instance.
2. In Name your instance, enter your FGT-VM instance name.
3. Select an availability domain for your instance.
4. Select the image source fhua-temp-b0838-native that you configured in the previous procedure.
5. For Choose instance type, select Bare Metal Machine.

FortiOS 6.2.0 New Features Guide 201


Fortinet Technologies Inc.
Multi-Cloud

6. Click Change Shape and select your instance shape, for example, BM.Standard2.52.

7. Leave Configure boot volume as default.


8. If necessary, add your SSH key file.
9. Select your Virtual cloud network and Subnet.
10. Click Create.

11. Wait for the instance to run.


You can access the FGT-VM using your SSH key or the default username/password of admin/ocid.

FortiOS 6.2.0 New Features Guide 202


Fortinet Technologies Inc.
Multi-Cloud

12. Hover your pointer over the … to the right of the FGT-VM and click View Instance Details.
The Instance Information tab shows that Launch Mode is NATIVE.

To attach a hard disk to the FGT_VM64_OPC with iSCSI mode:

1. On the Instance Details page navigation bar, click Attached Block Volumes and then click Attach Block Volume.
2. In the Attach Block Volume dialog box, select ISCSI.
3. Select the BLOCK VOLUME COMPARTMENT.
4. Select the BLOCK VOLUME.
5. Leave ACCESS as default.
6. Click Attach.

7. Wait for the block volume to be attached.


8. In the Instance Details page, hover your pointer over the … to the right of the block volume entry and click iSCSI
Commands & Information.

FortiOS 6.2.0 New Features Guide 203


Fortinet Technologies Inc.
Multi-Cloud

This dialog box shows this iSCSI's IP address and IQN.

To configure the iSCSI hard disk in FortiGate using CLI:

config system iscsi


edit "i1"
set ip <class_ip>
set iqn <string>
next
end

For example:
config system iscsi
edit "Demo-iSCSI-HD"
set ip 169.254.2.4
set iqn "iqn.2015-12.com.oracleiaas:debf5040-260a-4a28-a00e-da172baa6698"
next
end

To connect an iSCSI hard disk in FortiGate using CLI:

execute iscsi login <iscis-disk-name>

To disconnect an iSCSI hard disk in FortiGate using CLI:

execute iscsi logout <iscis-disk-name>

To check the hard disk in FortiGate and the second HD (50.0GiB) is attached:

fhua-native-Standard # d hardware deviceinfo disk

Disk SYSTEM(boot) 46.6GiB type: ISCSI [IET Controller] dev: /dev/sda


partition 123.0MiB, 62.0MiB free mounted: Y label: dev: /dev/sda1(boot) start:
2048
partition 1.7GiB, 1.7GiB free mounted: Y label: dev: /dev/sda2(boot) start:

FortiOS 6.2.0 New Features Guide 204


Fortinet Technologies Inc.
Multi-Cloud

264192
partition ref: 3 127.0MiB, 86.0MiB free mounted: N label: dev: /dev/sda3 start:
3932160

Disk Virtual-Disk ref: 32 50.0GiB type: ISCSI [IET Controller] dev: /dev/sdc
partition ref: 33 49.2GiB, 48.9GiB free mounted: N label: LOGUSEDX6FFE3A65 dev:
/dev/sdc1 start: 2048

Total available disks: 2


Max SSD disks: 8 Available storage disks: 1

High Availability Between Availability Domains

Support for Active-Passive HA (High Availability) between Availability Domains (ADs) in Oracle Cloud.
This feature adds another layer of redundancy to ensure uptime if a catastrophic failure occurs to an entire availability
zone. You can now deploy FortiGate units across Availability Domains in HA A-P configurations.
Following is an example structure:
l 1 VCN 10.0.0.0/16 CIDR:
l 8 Subnets:
l 4 in Availability Domain 1 - Master FGTA has a NIC in each of these:
l Public - 10.0.0.0/24 EIP
l Internal - 10.0.1.0/24
l Heartbeat - 10.0.2.0/24
l Management - 10.0.3.0/24 EIP
l 4 in Availability Domain 2 - Slave FGTB has a NIC in each of these:
l Public - 10.0.10.0/24
l Internal - 10.0.11.0/24
l Heartbeat - 10.0.12.0/24
l Management - 10.0.13.0/24 EIP
l 3 OCI Routing Tables:
l For Public, add default route to Internet Gateway
l For Internal, add default to Master FGT internal nic
l For all others, use a default route table with no rules, but a local peering gateway so traffic can traverse across
subnets in the same VCN
Following is a sample configuration:
config system ha
set group-name "test"
set mode a-p
set hbdev "port3" 50
set ha-mgmt-status enable
config ha-mgmt-interfaces
edit 1
set interface "port4"
set gateway 10.0.103.1
next
end
set override disable
set priority 1

FortiOS 6.2.0 New Features Guide 205


Fortinet Technologies Inc.
Multi-Cloud

set unicast-hb enable


set unicast-hb-peerip 10.0.2.11 <--- IP of other FortiGate for heartbeat and sync
end

After HA has synchronized, shut down the master to trigger a failover. The following example shows that the failover
was successful. Note that the failover public IP moves from master to slave, and the routing table for internal addresses
are also moved.

AliCloud Extensions

This section lists the new features added for GCP extensions.
l Auto Scaling on page 206

Auto Scaling

This version supports auto scaling for AliCloud or Aliyun environments.

Sample configuration

To set up auto scaling for a an AliCloud environment:


1. Create a scaling group in AliCloud console.
2. Create a scaling configuration in AliCloud console.
3. Create scaling rules in AliCloud console.
4. Set the first FortiGate VM in the auto scaling group as the master member.
5. Scale out another FortiGate VM and set it as a slave member; and then synchronize configuration from master to
slave.

FortiOS 6.2.0 New Features Guide 206


Fortinet Technologies Inc.
Multi-Cloud

To create a scaling group in AliCloud console:

1. In AliCloud, go to Auto Scaling > Scaling Groups, click Create Scaling Group.
2. Configure the scaling group parameters:

Scaling Group Name Enter a name. In this example: FGT-ASG.

Maximum Instances In this example: 4.

Minimum Instances In this example: 1.

Instance Configuration Source Use the default.

Network Type Use the default of VPC .

VPC ID Select the VPC ID.

VSwitch Select the VSwitch.

To create a scaling configuration in AliCloud console:

1. In the scaling group pop-up window, click Create Now to create a new scaling configuration.
2. Select the Instance Type and FortiGate image.
3. Select Assign Public IP and the Security Group.

FortiOS 6.2.0 New Features Guide 207


Fortinet Technologies Inc.
Multi-Cloud

4. Click Next: System Configurations.

5. If desired, select a Key Pair.


6. Click Preview.

FortiOS 6.2.0 New Features Guide 208


Fortinet Technologies Inc.
Multi-Cloud

7. If the configuration is correct, click Create and then click Enable Configuration.

8. Check that the auto scaling group is created and the first FortiGate VM is launched automatically.

To create scaling rules in AliCloud console:

1. In the Auto Scaling console Scaling Groups page, click FGT-ASG to edit it.
2. In the left menu, click Scaling Rules.
3. Configure the scaling rule parameters:

Name Enter a scaling rule name. In this example: FGT-ASG-ADD1.

Action Select the Action. In this example, 1.

Cooldown Time In this example: 300 seconds.

The scaling rule FGT-ASG-ADD1 is created and it can be executed to add one FGT-ASG instance.

FortiOS 6.2.0 New Features Guide 209


Fortinet Technologies Inc.
Multi-Cloud

Use the same procedure to create another scaling rule named FGT-ASG-REMOVE1 to remove one FortiGate VM
instance.

To set the first FortiGate VM in the auto scaling group as the master member:

1. Log into the FortiGate VM as administrator.


2. Use the CLI to enable auto scaling and set the role to master.
config system auto-scale
set status enable
set role master
set sync-interface "port1"
set psksecret xxxxxx
end

To scale out another FortiGate VM and set it as a slave member; and then synchronize configuration from
master to slave:

1. In the Auto Scaling console FGT-ASG scaling rules page, execute the scaling rule policy FGT-ASG-ADD1.
A new FortiGate VM instance is created.
2. Log into the new FortiGate VM as administrator and use the CLI to enable auto scaling and set the role to slave.
For the master-ip, use the master side private IP address.
config system auto-scale
set status enable
set role slave
set sync-interface "port1"
set master-ip 192.168.1.204
set psksecret xxxxxx
end

3. Wait a few moments for the slave member to sync with the master member; and then the slave member can sync
the FortiGate configuration from the master member.
FortiGate-VM64-ALION~AND # diag deb app hasync -1
slave's configuration is not in sync with master's, sequence:0
slave's configuration is not in sync with master's, sequence:1
slave's configuration is not in sync with master's, sequence:2
slave's configuration is not in sync with master's, sequence:3
slave's configuration is not in sync with master's, sequence:4
slave starts to sync with master
logout all admin users

Support up to 18 Interfaces

The number of network interfaces that can be supported by FortiGate-VM has been increased. Currently, FortiGate-VM
supports up to a maximum of 10 interfaces. This new feature expands this support to a maximum of 18 interfaces (16
traffic ports, 1 management port, 1 HA port).

This change applies to all FortiGate-VM models except VMX and SVM, as VMX does not use
interfaces to process traffic.

FortiOS 6.2.0 New Features Guide 210


Fortinet Technologies Inc.
Multi-Cloud

To configure the maximum number of interfaces:

1. In your hypervisor, create a new VM or open an existing VM.


2. Create up to a maximum of 18 interfaces.

3. Once created, the interfaces will be displayed in the FortiGate GUI under Network > Interfaces.

Limitations

Certain cloud service providers and hypervisors have their own limitations on the maximum number of interfaces
supported, for example:

Cloud Service Provider Maximum Interfaces Supported

AWS 15

Azure 8

FortiOS 6.2.0 New Features Guide 211


Fortinet Technologies Inc.
Multi-Cloud

Cloud Service Provider Maximum Interfaces Supported

Google Cloud Platform 8

Oracle 16

Aliyun 8

Physical Hypervisor Maximum Interfaces Supported

VMware 10

Hyper-V 12

OpenStack 28

XenServer 7

The maximum number of interfaces supported per cloud provider/hypervisor is subject to


change without notice. The lists above are not inclusive of all cloud providers and hypervisors.

OpenStack — Network Service Header (NSH) Chaining Support

This version provides NSH chaining support for virtual wire pair, TP mode networks. FortiOS receives and unwraps the
NSH packets and re-encapsulates them before sending them out. The inner packet is processed by firewall policies.
NSH support in FortiGate is basically unwrapping the packet on Ingress and putting the NSH header back on before
sending it out. Other parts of NSH aren't supported yet (SI is currently left unchanged).
There's no CLI/GUI change. The only change is to show ext_header=nsh in NSH session info when listing sessions.

Sample configuration

To configure virtual wire pair and firewall policy using the CLI:

config system virtual-wire-pair


edit "test-vw"
set member "port1" "mgmt2"
next
end
config firewall policy
edit 99
set uuid 241710a0-3ac6-51e9-10e9-9dd3eb65e708
set srcintf "mgmt2"
set dstintf "port1"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"

FortiOS 6.2.0 New Features Guide 212


Fortinet Technologies Inc.
Multi-Cloud

set logtraffic all


next
end

Sample results of configuring a wire pair and policy between port1 and mgmt2. Packets with NSH are processed and the
session list shows ext_header=nsh.
A (vdom1) # diag sys session list

session info: proto=6 proto_state=01 duration=10 expire=3595 timeout=3600 flags=00000000 sock-


flag=00000000 sockport=0 av_idx=0 use=4
origin-shaper=
reply-shaper=
per_ip_shaper=
class_id=0 ha_id=0 policy_dir=0 tunnel=/ vlan_cos=0/0
state=log may_dirty br src-vis dst-vis f00
statistic(bytes/packets/allow_err): org=112/2/1 reply=60/1/1 tuples=2
tx speed(Bps/kbps): 10/0 rx speed(Bps/kbps): 5/0
orgin->sink: org pre->post, reply pre->post dev=4->9/9->4 gwy=0.0.0.0/0.0.0.0
hook=pre dir=org act=noop 172.16.200.11:46739->172.16.200.55:23(0.0.0.0:0)
hook=post dir=reply act=noop 172.16.200.55:23->172.16.200.11:46739(0.0.0.0:0)
pos/(before,after) 0/(0,0), 0/(0,0)
src_mac=00:00:11:11:11:11 dst_mac=00:00:22:22:22:22
misc=0 policy_id=99 auth_info=0 chk_client_info=0 vd=1
serial=0000094d tos=ff/ff app_list=0 app=0 url_cat=0
rpdb_link_id = 00000000
dd_type=0 dd_mode=0
npu_state=0x040001 no_offload
no_ofld_reason: mac-host-check disabled-by-policy non-npu-intf
ext_header_type=nsh
total session 1

Physical Function (PF) SR-IOV Driver Support

This feature adds Physical Function (PF) SR-IOV drivers for i40e and ixgbe interfaces in virtual environments.
PF adds the ability for PCI Passthrough, but requires an entire Network Interface Card (NIC) for a VM. It can usually
achieve greater performance than a Virtual Function (VF) based SR-IOV. PF is also expensive; while VF allows one NIC
to be shared among multiple guests VMs, PF is allocated to one port on a VM.
The now supported driver versions are:
l ixgbe: 5.3.7
l ixgbevf: 4.3.5
l i40e: 2.4.10
l i40evf: 3.5.13

All tools and software utilities for UEFI 1.X have been removed from this release. Update to
UEFI 2.x to use the UEFI tools or software utilities.

Configuration to use PF or VF is done on the hypervisor, and is not configured on the FortiGate.

FortiOS 6.2.0 New Features Guide 213


Fortinet Technologies Inc.
Multi-Cloud

The following CLI command can be used to check what driver is being used on the FortiGate:
FGVM0800000000 # diagnose hardware deviceinfo nic port2
Name: port2
Driver: i40e
Version: 2.4.10
Bus: 0000:03:00.0
Hwaddr: 3c:fd:fe:1e:98:02
Permanent Hwaddr:3c:fd:fe:1e:98:02
State: up
Link: up
Mtu: 1500
Supported: auto 1000full 10000full
Advertised: auto 1000full 10000full
Auto: disabled
Rx packets: 0
Rx bytes: 0
Rx compressed: 0
...

FortiMeter Extensions

This section lists the new features added for FortiMeter extensions.
l FortiMeter - Microsoft Hyper-V Instances on page 214
l FortiMeter - Fallback to Public FortiGuard on page 216

FortiMeter - Microsoft Hyper-V Instances

FortiMeter now supports Microsoft Hyper-V in addition to support for VMware, KVM, and Xen.
The Microsoft Hyper-V FortiOS-VM must be added to the FortiManager system before authorization. Once the
Microsoft Hyper-V FortiOS-VM is authorized, it can receive updates from FortiManager and process traffic. An
unauthorized Microsoft Hyper-V FortiOS-VM cannot receive updates from FortiManager or process traffic.

Microsoft Hyper-V FortiOS-VM support requires FortiManager 6.2.0 or a later version.

To authorize a Microsoft Hyper-V FortiOS-VM on FortiManager using the GUI:

1. Ensure that the VM is registered to the FortiManager. See the FortiManager 6.2.0 Administration Guide.
2. Ensure that you are in the correct ADOM.

FortiOS 6.2.0 New Features Guide 214


Fortinet Technologies Inc.
Multi-Cloud

3. Go to Device Manager > Device & Groups > Unauthorized Devices.

4. Select the Microsoft Hyper-V FortiOS-VM, then click Authorize in the toolbar, right-click on a device then select
Authorize, or double-click on a device. The Authorize Device(s) dialog box opens. An unauthorized device can use
firewall services for up to 48 hours.

5. Select the License Type:

Trial Maximum of two devices can have a trial license at any one time.
No traffic data are sent to FortiGuard, so no points are used.
Can be used for up to 30 days.

Regular Regular license.


Points used based on the service level and volume of traffic going to
FortiGuard.

6. Select the Services:

Firewall Firewall only. This option cannot be deselected.

IPS IPS services.

Web Filter Web filtering services.

AntiVirus Antivirus services.

App Control Application control services.

Full UTM All services are selected.

7. Click OK to authorize the device. The device now shows as authorized on the FortiManager GUI.

FortiOS 6.2.0 New Features Guide 215


Fortinet Technologies Inc.
Multi-Cloud

To authorize a Microsoft Hyper-V FortiOS-VM on FortiManager using CLI commands:

In the example below, the FortiManager IP address is 172.18.3.72. Run the following commands in the FortiOS CLI :
config system central-management
set type fortimanager
set fmg "172.18.3.72"
config server-list
edit 1
set server-type update rating
set server-address 172.18.3.72
next
end
end

FortiMeter - Fallback to Public FortiGuard

In previous releases, FortiOS-VM (FortiMeter) instances needed to get services from FortiManager that facilitated
updates by tracking service entitlements based on serial numbers starting with FOSVM1. However, if the FortiMeter
instance connected directly to Fortinet Distribution Network (FDN), updates were not available since FDN was not
aware of serial numbers with prefix FOSVM1.
In the current release, the serial number prefix FOSVM2 was added to FortiOS-VM. When the FortiMeter instance
connects directly to FDN, it is now able to receive the updates.
The same serial number will have two different prefixes depending on the situation:
l FortiOS-VM sends the serial numbers with prefix FOSVM2 to FortiManager or FortiGuard for updates and rating
service. FOSVM2 is not visible on the FortiManager GUI.
l FortiOS-VM sends the serial numbers with prefix FOSVM1 to FortiManager for management. FOSVM1 is shown
on the FortiManager GUI.

FortiGate Serial Numbers shown in FortiManager

l FortiOS-VM in FortiOS Unauthorized Devices list with the serial number prefix FOSVM1

l Authorized FortiOS-VM in FortiOS

l Authorize FortiGuard service to FortiOS-VM. FortiOS checks service license with serial number prefix FOSVM1
while providing service to FOSVM2.

FortiOS 6.2.0 New Features Guide 216


Fortinet Technologies Inc.
Automation and Dev-Ops

This section lists the new features added to FortiOS for automation and dev-ops.
l Trigger - FortiAnalyzer Event Handler on page 217
l Trigger - FortiCloud-based IOC on page 220
l Action - NSX Quarantine on page 221
l Action - CLI Script on page 225
l Action - Azure Function on page 227
l Action - Google Cloud Function on page 229
l Action - AliCloud Function on page 231
l Action - Webhook Extensions on page 233

Trigger - FortiAnalyzer Event Handler

This feature adds a FortiAnalyzer event handler as an automation stitch trigger. You can trigger automation rules based
on FortiAnalyzer event handlers, giving you the ability to define rules based on complex correlation across devices, log
types, frequency, and other criteria.
When a FortiAnalyzer event handler is triggered, it sends a notification to the FortiGate automation framework, which
generates a log and triggers the automation stitch.
In FortiAnalyzer Event Manager > FortiGate Event Handlers, configure the FortiAnalyzer event handler that will be
triggered when FortiGate logs in.

FortiOS 6.2.0 New Features Guide 217


Fortinet Technologies Inc.
Automation and Dev-Ops

In FortiGate Security Fabric > Settings, configure FortiAnalyzer and get authorized.

To configure Security Fabric Settings using the CLI:

config log fortianalyzer setting


set status enable
set server "10.6.30.250"
set serial "FL-4HET318900407"
set upload-option realtime
set reliable enable
end

To configure Security Fabric Automation Stitch with trigger of FortiAnalyzer Event Handler in the GUI:

FortiOS 6.2.0 New Features Guide 218


Fortinet Technologies Inc.
Automation and Dev-Ops

To configure Security Fabric Automation Stitch with trigger of FortiAnalyzer Event Handler in the CLI:

config system automation-action


edit "auto-faz-1_email"
set action-type email
set email-to "jamesli@fortinet.com"
set email-subject "CSF stitch alert"
set email-body "User login FortiGate successfully."
next
end

config system automation-trigger


edit "auto-faz-1"
set event-type faz-event
set faz-event-name "system-log-handler2"
set faz-event-severity "medium"
set faz-event-tags "User login successfully"
next
end

config system automation-stitch


edit "auto-faz-1"
set trigger "auto-faz-1"
set action "auto-faz-1_email"
next
end

To see the trigger event log in the GUI:

1. Log in to the FortiGate to trigger the FortiAnalyzer event.


The FortiAnalyzer sends notification to the FortiGate automation framework and generates an event log in
FortiGate and triggers the automation stitch.

FortiOS 6.2.0 New Features Guide 219


Fortinet Technologies Inc.
Automation and Dev-Ops

Sample of the trigger event log in the CLI

date=2019-02-05 time=14:16:17 logid="0100046600" type="event" subtype="system" level-


l="notice" vd="root" eventtime=1549404977 logdesc="Automation stitch triggered" stitch-
h="auto-faz-1" trigger="auto-faz-1" from="log" msg="stitch:auto-faz-1 is triggered."

Sample of email sent when automation stitch is triggered

Trigger - FortiCloud-based IOC

This feature expands topology, FortiView, and automation to support Indicators of Compromise (IOC) detection from
the FortiCloud IOC service.
FortiGate can now list IOC entries on the FortiView pane and use the IOC event logs as a trigger for automation
framework.
FortiGate requires an IOC license and a Webfilter license to use this feature. In addition, you must enabled FortiCloud
logging on the FortiGate.
To view compromised hosts, go to FortiView > Compromised Hosts. The IOC entries are displayed when the source is
FortiCloud.

FortiOS 6.2.0 New Features Guide 220


Fortinet Technologies Inc.
Automation and Dev-Ops

You can also view the IOC entries on FortiCloud portal:

Action - NSX Quarantine

This feature adds a new Security Fabric > Automation > Action: Assign VMware NSX Security Tag to the NSX
endpoint instance. This action is only available when the Trigger is Compromised Host.
First configure NSX type SDN connector in FortiGate. Then FortiGate can retrieve security tags from VMware NSX
server through the NSX connector.
Configure an automation stitch with the trigger Compromised Host and the Action Assign VMware NSX Security Tag,
then choose a Security tag in the security tags retrieved from VMware NSX server through NSX connector.
If an endpoint instance in the VMware NSX environment is compromised which triggers the automation stitch in
FortiGate, FortiGate will then assign the configured security tag to the compromised NSX endpoint instance.

FortiOS 6.2.0 New Features Guide 221


Fortinet Technologies Inc.
Automation and Dev-Ops

To configure a VMware NSX SDN connector in the GUI:

1. Go to Security Fabric > Fabric Connectors and click Create New.


2. Select VMware NSX and configure its settings.

To configure a VMware NSX SDN connector in the CLI:

config system sdn-connector


edit "nsx"
set type nsx
set server "172.18.64.32"
set username "admin"
set password xxxxx
next
end

To configure an automation stitch with a Trigger Compromised Host and Action Assign VMware NSX
Security Tag using the GUI:

1. Go to Security Fabric > Automation and click Create New.


2. In the Trigger section, select Compromised Host.

FortiOS 6.2.0 New Features Guide 222


Fortinet Technologies Inc.
Automation and Dev-Ops

3. In the Action section, select Assign VMware NSX Security Tag and configure its settings.

To configure an automation stitch with a Trigger Compromised Host and Action Assign VMware NSX
Security Tag using the CLI:

config system automation-action


edit "pcui-test_quarantine-nsx"
set action-type quarantine-nsx
set security-tag "pcui-tag2"
set sdn-connector "nsx"
next
end

config system automation-trigger


edit "pcui-test"
set ioc-level high
next
end

config system automation-stitch


edit "pcui-test"
set trigger "pcui-test"
set action "pcui-test_quarantine-nsx"
next
end

FortiOS 6.2.0 New Features Guide 223


Fortinet Technologies Inc.
Automation and Dev-Ops

To configure FortiAnalyzer in FortiGate which is used to send endpoint compromise notifications to


FortiGate using the GUI:

1. Go to Security Fabric > Settings.


2. Enable FortiAnalyzer Logging and configure its settings.

To configure FortiAnalyzer in FortiGate which is used to send endpoint compromise notifications to


FortiGate using the CLI:

config log fortianalyzer setting


set status enable
set server "172.18.64.234"
set serial "FL-8HFT718900132"
set upload-option realtime
set reliable enable
end

When an endpoint instance is compromised

When an endpoint instance, for example, pcui-ubuntu2, in the VMware NSX environment is compromised, the
automation stitch in FortiGate is triggered. FortiGate then assigns the security tag, in this example, pcui-tag2, to the
compromised NSX endpoint instance.

FortiOS 6.2.0 New Features Guide 224


Fortinet Technologies Inc.
Automation and Dev-Ops

Action - CLI Script

This feature adds support for calling a CLI script when an automation stitch is triggered. You can use this feature to add
CLI script actions for Security Fabric automation.
CLI scripts can be manually entered, uploaded as a file, or recorded in CLI console. The CLI script output can be sent in
an Automation Action email.

To configure a Security Fabric Automation Stitch using the GUI:

1. Go to Security Fabric > Automation.


2. In the Action section, select CLI Script and Email.
3. Configure a CLI script.
l To manually enter a CLI script, enter the script in the Script box.
l To upload a script file, click Upload and specify the script file.

FortiOS 6.2.0 New Features Guide 225


Fortinet Technologies Inc.
Automation and Dev-Ops

l To record a script in CLI console, click >_Record in CLI console and then save the script.

4. Enter the other fields as required and click OK.

To configure a Security Fabric Automation Stitch using the CLI:

config system automation-trigger


edit "auto-cli-1"
set trigger-type event-based
set event-type security-rating-summary
next
end

config system automation-action


edit "set admintimeout480"
set action-type cli-script
set minimum-interval 0
set delay 0
set required enable
set script "config system global
set admintimeout 480
end"
next
edit "auto-cli-1_email"
set action-type email
set email-to "jamesli@fortinet.com"
set email-subject "CSF stitch alert"
set email-body "%%results%%"
set minimum-interval 0
next
end

config system automation-stitch


edit "auto-cli-1"
set status enable
set trigger "auto-cli-1"
set action "set admintimeout480" "auto-cli-1_email"

FortiOS 6.2.0 New Features Guide 226


Fortinet Technologies Inc.
Automation and Dev-Ops

next
end

To execute the CLI script automatically after the Automation Stitch is triggered:

To execute the CLI script automatically after the Automation Stitch is triggered:

FGTA-1 # show system global


config system global
set admintimeout 480
...
end

Sample of script output sent in automation action email

Action - Azure Function

This feature adds support for calling Azure functions when an automation stitch is triggered.

FortiOS 6.2.0 New Features Guide 227


Fortinet Technologies Inc.
Automation and Dev-Ops

To configure an Azure function using the GUI:

1. Go to Security Fabric > Automation.


2. Configure an Automation Stitch and set the Action to Azure-function.

When the automation stitch is triggered, FortiGate shows the stitch trigger time.

To configure an Azure function using the CLI:

config system automation-action


edit "azure_function"
set action-type azure-function
set azure-app "liang01-no-delete-jlum"
set azure-function "headersResponse"
set azure-function-authorization function
set azure-api-key xxxxxx
set headers "header1:value1" "header2:value2"

FortiOS 6.2.0 New Features Guide 228


Fortinet Technologies Inc.
Automation and Dev-Ops

next
end
config system automation-trigger
edit "auto-azure"
set event-type security-rating-summary
next
end
config system automation-stitch
edit "auto-azure"
set trigger "auto-azure"
set action "azure_function"
next
end

To see the function log in Azure:

1. The function log shows that the configured function was called, executed, and finished.

Action - Google Cloud Function

This feature adds support for calling Google Cloud functions when an automation stitch is triggered.

FortiOS 6.2.0 New Features Guide 229


Fortinet Technologies Inc.
Automation and Dev-Ops

To configure a Google Cloud function using the GUI:

1. Go to Security Fabric > Automation.


2. Configure an Automation Stitch and set the Action to Google Cloud Function.

When the automation stitch is triggered, FortiGate shows the stitch trigger time.

To configure a Google Cloud function using the CLI:

config system automation-action


edit "google-echo"
set action-type google-cloud-function
set gcp-function-region "us-central1"
set gcp-project "dev-project-001-166400"
set gcp-function-domain "cloudfunctions.net"
set gcp-function "jlum-echo"
set headers "echo-header:echo-value"
next
end
config system automation-trigger
edit "auto-google1"

FortiOS 6.2.0 New Features Guide 230


Fortinet Technologies Inc.
Automation and Dev-Ops

set event-type security-rating-summary


next
end
config system automation-stitch
edit "auto-google1"
set trigger "auto-google1"
set action "google-echo"
next
end

To see the function log in Google Cloud using the GUI:

1. Go to Google Cloud Platform > Logs.


The function log shows that the configured function was called, executed, and finished.

Action - AliCloud Function

This feature adds support for calling AliCloud functions when an automation stitch is triggered.

FortiOS 6.2.0 New Features Guide 231


Fortinet Technologies Inc.
Automation and Dev-Ops

To configure an AliCloud function automation stitch in the GUI:

1. Go to Security Fabric > Automation.


2. Select AliCloud Function and configure its settings.

3. Click OK.

To configure an AliCloud function automation stitch in the CLI:

config system automation-action


edit "Ali-Action-1"
set action-type alicloud-function
set alicloud-account-id "5594200612296301"
set alicloud-region "us-east-1"
set alicloud-version "2016-08-15"
set alicloud-service "jlum-test-function"
set alicloud-function "echoBodyAuth"
set alicloud-function-authorization function
set alicloud-access-key-id "LTAIKmERWEuEOChg"
set alicloud-access-key-secret xxxxxx
next
end

config system automation-trigger


edit "auto-ali"
set event-type security-rating-summary
next
end

config system automation-stitch


edit "auto-ali"
set trigger "auto-ali"
set action "Ali-Action-1"
next
end

When the automation stitch is triggered, FortiGate shows the stitch trigger time.

FortiOS 6.2.0 New Features Guide 232


Fortinet Technologies Inc.
Automation and Dev-Ops

In AliCloud, the function log shows that the function was called, executed, and finished.

Action - Webhook Extensions

This feature introduces the PATCH and DELETE methods in the Webhook section in Security Fabric > Automation.
The following shows examples of PATCH and DELETE methods using the GUI and CLI.

To set the Patch method using the GUI:

1. Go to Security Fabric > Automation and click Create New.


2. In the Action section, click Webhook to display the Webhook section.

FortiOS 6.2.0 New Features Guide 233


Fortinet Technologies Inc.
Automation and Dev-Ops

3. For the Method, select PATCH.

4. Fill in the other fields and click OK.


On the server, check that FortiGate sends the header, body, and method correctly:

To set the Patch method using the CLI, see the following example:

In the CLI, set method patch is added.


config system automation-action
edit "demowebhook"
set action-type webhook
set method patch
set uri "10.6.30.44/v1/{tenant_id}/stacks/{stack_name}/{stack_id}"
set http-body "testbody"
set port 80
set headers "headervalue:headercontentvalue"
next
end

To set the Delete method using the GUI:

1. Go to Security Fabric > Automation and click Create New.


2. In the Action section, click Webhook to display the Webhook section.

FortiOS 6.2.0 New Features Guide 234


Fortinet Technologies Inc.
Automation and Dev-Ops

3. For the Method, select DELETE.

4. Fill in the other fields and click OK.


On the server, check that FortiGate sends the header, body, and method correctly:

To set the Delete method using the CLI, see the following example:

In the CLI, set method delete is added.


config system automation-action
edit "demowebhook"
set action-type webhook
set method delete
set uri "10.6.30.44/v1/{tenant_id}/stacks/{stack_name}/{stack_id}"
set http-body "/v1/{tenant_id}/stacks/{stack_name}/{stack_id}/preview"
set port 80
set headers "headervalue:headercontentvalue"
next
end

FortiOS 6.2.0 New Features Guide 235


Fortinet Technologies Inc.
Advanced Threats

This section lists the new features added to FortiOS for advanced threats.
l Flow-based Inspection on page 236
l IP Reputation Filtering on page 246
l URL Certificate Blacklist on page 247
l Global IP Address Information Database on page 251
l IPv6 on page 260
l File Filtering for Web and Email Filter Profiles on page 263
l Move Botnet C&C into IPS Profile on page 268

Flow-based Inspection

This section lists new flow-based inspection features added to FortiOS.


l Web Filtering on page 236
l Inspection Mode Per Policy on page 238
l Statistics on page 242
l Protocol Port Enforcement on page 244

Web Filtering

Flow-based web filtering support has been extended to allow for the following options:
l Authenticate: Require authentication for specific website categories.
l Warn: Display a warning message but allow users to continue to the website.
l Override: Allow users with valid credentials to override their web filter profile.

To enable Authenticate and Warning web filters:

1. Go to Security Profiles > Web Filter in the FortiGate web GUI.


2. Right-click on a selected category to view the context menu.

FortiOS 6.2.0 New Features Guide 236


Fortinet Technologies Inc.
Advanced Threats

3. Select the Authenticate or Warning web filter.

4. Select Apply.

FortiOS 6.2.0 New Features Guide 237


Fortinet Technologies Inc.
Advanced Threats

To allow users to override blocked categories:

1. Select Allow users to override blocked categories.

2. Enter the following information:


l Groups that can override
l Profile can switch to
l Switch applies to
l Switch duration
3. Select Apply.

Inspection Mode Per Policy

In this version, in NGFW Mode, the Inspection Mode is moved to per-policy, enabling more flexible setup for different
policies.
In System > VDOM, the NGFW Mode option has been removed.
When you configure a policy, you can select a Flow-based or Proxy-based Inspection Mode. Default is Flow-based.
If you change to Proxy-based, the Proxy HTTP(S) traffic option displays.

FortiOS 6.2.0 New Features Guide 238


Fortinet Technologies Inc.
Advanced Threats

In the Security Profiles section, if no security profiles are enabled, the default SSL Inspection is no-inspection.

In the Security Profiles section, if you enable any security profile, the SSL Inspection changes to certificate-
inspection.

FortiOS 6.2.0 New Features Guide 239


Fortinet Technologies Inc.
Advanced Threats

To see the inspection mode changes in the CLI:

FortiGate-101E (root) # config firewall policy

FortiGate-101E (policy) # edit 1

FortiGate-101E (1) # set utm-status disable

FortiGate-101E (1) # set inspection-mode


proxy Proxy based inspection.
flow Flow based inspection.

FortiGate-101E (1) # set inspection-mode proxy

FortiGate-101E (1) # end

FortiGate-101E (root) # sh firewall policy


config firewall policy
edit 1
set uuid 05d88354-4817-51e9-7494-06cb70accbf0
set srcintf "wan2"
set dstintf "wan1"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set inspection-mode proxy
set nat enable
next
end

FortiOS 6.2.0 New Features Guide 240


Fortinet Technologies Inc.
Advanced Threats

To see http-policy-redirect/ssh-policy-redirect setting when inspection mode is set to proxy:

FortiGate-101E (root) # config firewall policy

FortiGate-101E (policy) # end

FortiGate-101E (root) # config firewall policy

FortiGate-101E (policy) # edit 1

FortiGate-101E (1) # set inspection-mode proxy

FortiGate-101E (1) # set http-policy-redirect


enable Enable HTTP(S) policy redirect.
disable Disable HTTP(S) policy redirect.

FortiGate-101E (1) # set ssh-policy-redirect


enable Enable SSH policy redirect.
disable Disable SSH policy redirect.

FortiGate-101E (1) # set http-policy-redirect enable

FortiGate-101E (1) # set ssh-policy-redirect enable

FortiGate-101E (1) # end

FortiGate-101E (root) # sh firewall policy 1


config firewall policy
edit 1
set uuid 05d88354-4817-51e9-7494-06cb70accbf0
set srcintf "wan2"
set dstintf "wan1"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set inspection-mode proxy
set http-policy-redirect enable
set ssh-policy-redirect enable
set nat enable
next
end

To see the default ssl-ssh-policy set to no inspection:

FortiGate-101E (root) # config firewall policy

FortiGate-101E (policy) # edit 1

FortiGate-101E (1) # sh
config firewall policy
edit 1
set uuid 05d88354-4817-51e9-7494-06cb70accbf0
set srcintf "wan2"
set dstintf "wan1"

FortiOS 6.2.0 New Features Guide 241


Fortinet Technologies Inc.
Advanced Threats

set srcaddr "all"


set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set inspection-mode proxy
set http-policy-redirect enable
set ssh-policy-redirect enable
set nat enable
next
end

FortiGate-101E (1) # sh fu | grep ssl-ssh-profile


set ssl-ssh-profile "no-inspection"

FortiGate-101E (1) # end

Statistics

This feature adds a flow AV statistics check, and provides an API for SNMP to get AV statistics.
Two CLI commands are added to show and clear the AV statistics:
diagnose ips av stats show
diagnose ips av stats clear

This example uses the following topology:

To check flow AV statistics:

1. Create an AV profile:
config antivirus profile
edit "av-test"
config http
set options scan avmonitor
end
config ftp
set options scan quarantine
end
next
end
2. Enable the profile on a firewall policy:
config firewall policy
edit 1

FortiOS 6.2.0 New Features Guide 242


Fortinet Technologies Inc.
Advanced Threats

set name "policy1"


set srcintf "port2"
set dstintf "port1"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set utm-status enable
set fsso disable
set av-profile "av-test"
set ssl-ssh-profile "custom-deep-inspection"
set nat enable
next
end
3. On the client PC, download the EICAR Standard Anti-Virus Test File via HTTP.
4. Check the AV statistics on the FortiGate. As the action is set to monitor for HTTP, HTTP virus detected is
increased by 1:
diagnose ips av stats show
AV stats:
HTTP virus detected: 1
HTTP virus blocked: 0
SMTP virus detected: 0
SMTP virus blocked: 0
POP3 virus detected: 0
POP3 virus blocked: 0
IMAP virus detected: 0
IMAP virus blocked: 0
NNTP virus detected: 0
NNTP virus blocked: 0
FTP virus detected: 0
FTP virus blocked: 0
SMB virus detected: 0
SMB virus blocked: 0
5. On the client PC, download the EICAR file via FTP.
6. Check the AV statistics on the FortiGate. As the action is set to quarantine for FTP, FTP virus detected and
FTP virus blocked are both increased by 1:
diagnose ips av stats show
AV stats:
HTTP virus detected: 1
HTTP virus blocked: 0
SMTP virus detected: 0
SMTP virus blocked: 0
POP3 virus detected: 0
POP3 virus blocked: 0
IMAP virus detected: 0
IMAP virus blocked: 0
NNTP virus detected: 0
NNTP virus blocked: 0
FTP virus detected: 1
FTP virus blocked: 1
SMB virus detected: 0
SMB virus blocked: 0
7. Check the AV statistics using snmpwalk:
root:~# snmpwalk -c public -v 1 10.1.100.6 1.3.6.1.4.1.12356.101.8.2.1.1

FortiOS 6.2.0 New Features Guide 243


Fortinet Technologies Inc.
Advanced Threats

iso.3.6.1.4.1.12356.101.8.2.1.1.1.1 = Counter32: 2 (fgAvVirusDetected)


iso.3.6.1.4.1.12356.101.8.2.1.1.2.1 = Counter32: 1 (fgAvVirusBlocked)
iso.3.6.1.4.1.12356.101.8.2.1.1.3.1 = Counter32: 1 (fgAvHTTPVirusDetected)
iso.3.6.1.4.1.12356.101.8.2.1.1.4.1 = Counter32: 0
iso.3.6.1.4.1.12356.101.8.2.1.1.5.1 = Counter32: 0
iso.3.6.1.4.1.12356.101.8.2.1.1.6.1 = Counter32: 0
iso.3.6.1.4.1.12356.101.8.2.1.1.7.1 = Counter32: 0
iso.3.6.1.4.1.12356.101.8.2.1.1.8.1 = Counter32: 0
iso.3.6.1.4.1.12356.101.8.2.1.1.9.1 = Counter32: 0
iso.3.6.1.4.1.12356.101.8.2.1.1.10.1 = Counter32: 0
iso.3.6.1.4.1.12356.101.8.2.1.1.11.1 = Counter32: 1 (fgAvFTPVirusDetected)
iso.3.6.1.4.1.12356.101.8.2.1.1.12.1 = Counter32: 1 (fgAvFTPVirusBlocked)
iso.3.6.1.4.1.12356.101.8.2.1.1.13.1 = Counter32: 0
iso.3.6.1.4.1.12356.101.8.2.1.1.14.1 = Counter32: 0
iso.3.6.1.4.1.12356.101.8.2.1.1.15.1 = Counter32: 0
iso.3.6.1.4.1.12356.101.8.2.1.1.16.1 = Counter32: 0
iso.3.6.1.4.1.12356.101.8.2.1.1.17.1 = Counter32: 0
iso.3.6.1.4.1.12356.101.8.2.1.1.18.1 = Counter32: 0
iso.3.6.1.4.1.12356.101.8.2.1.1.19.1 = Counter32: 0
iso.3.6.1.4.1.12356.101.8.2.1.1.20.1 = Counter32: 0
iso.3.6.1.4.1.12356.101.8.2.1.1.21.1 = Counter32: 0
iso.3.6.1.4.1.12356.101.8.2.1.1.22.1 = Counter32: 0
8. Optionally, reset the AV statistics to zero:
diagnose ips av stats clear

Protocol Port Enforcement

Protocol enforcement is added to the Application Control Profile, allowing the admin to configure network services (e.g.,
FTP, HTTP, HTTPS) on known ports (e.g., 21, 80, 443), while blocking those services on other ports.
The feature takes action in the following scenarios:
l When one protocol dissector confirms the service of network traffic, protocol enforcement can check whether the
confirmed service is whitelisted under the server port. If it is not, then the traffic is considered a violation and IPS
can take action (e.g., block) specified in the configuration.
l There is no confirmed service for the network traffic. It would be considered a service violation if IPS dissectors rule
out all the services enforced under its server port.

FortiOS 6.2.0 New Features Guide 244


Fortinet Technologies Inc.
Advanced Threats

In Security Profiles > Application Control, a new Network Protocol Enforcement pane lets you create and configure
network services on specific ports and set violation action.

To configure the application profile default network service list using CLI:

config application list


edit "protocol-GUI"
set other-application-log enable
set control-default-network-services enable # Enable enforcement of protocols over
select ports.
config default-network-services # Default network service entries
edit 1
set port 80 # Port number, port Enter an integer

FortiOS 6.2.0 New Features Guide 245


Fortinet Technologies Inc.
Advanced Threats

value from <0> to <65535>


set services http # Network protocols: http, ssh, telnet,
ftp, dns, smtp, pop3, imap, snmp, nntp and https
next
edit 2
set port 53
set services dns
set violation-action monitor # Set action for protocols not whitel-
isted under select port: block/pass/monitor
next
end
next
end

IP Reputation Filtering

This features adds support for reputation filtering in the firewall policies.
Currently, there are five reputation levels in the internet-service database (ISDB), and custom reputation levels can be
defined in a custom internet-service. This features allows firewall policies to filter traffic according to the configured
reputation level. If the reputation level of either the source or destination IP address is equal to or greater than the level
set in the policy, then the packet is forwarded, otherwise, the packet is dropped.
The five default reputation levels are:

1 Known malicious sites related to botnet servers, phishing sites, etc.

2 Sites providing high risk services, such as TOR, proxy, P2P, etc.

3 Unverified sites.

4 Reputable sites from social media, such as Facebook, Twitter, etc.

5 Known and verified safe sites, such as Gmail, Amazon, eBay, etc.

The default minimum reputation level in a policy is zero, meaning that the reputation filter is disabled.
For IP addresses that are not included in the ISDB, the default reputation level is three.
The default reputation direction is destination.

To set the reputation level and direction in a policy:

config firewall policy


edit 1
set uuid dfcaec9c-e925-51e8-cf3e-fed9a1d42a1c
set srcintf "wan2"
set dstintf "wan1"
set dstaddr "all"
set reputation-minimum 3
set reputation-direction source
set action accept
set schedule "always"
set service "ALL"

FortiOS 6.2.0 New Features Guide 246


Fortinet Technologies Inc.
Advanced Threats

set logtraffic all


set auto-asic-offload disable
set nat enable
next
end

Packets from the source IP address with reputation levels three, four, or five will be forwarded by this policy.

In a policy, if reputation-minimum is set, and the reputation-direction is


destination, then the dstaddr, service, and internet-service options are
removed from the policy.
If reputation-minimum is set, and the reputation-direction is source, then the
srcaddr, and internet-service-src options are removed from the policy.

URL Certificate Blacklist

As increasing numbers of malware have started to use SSL to attempt to bypass IPS, maintaining a fingerprint-based
certificate blacklist is useful to block botnet communication that relies on SSL.
This feature adds a dynamic package that is distributed by FortiGuard and is part of the Web Filtering service. It is
enabled by default for SSL/SSH profiles, and can be configured using the following new CLI commands (highlighted in
bold):
config vdom
edit <vdom>
config firewall ssl-ssh-profile
edit "certificate-inspection"
set comment "Read-only SSL handshake inspection profile."
config ssl
set inspect-all disable
end
config https
set ports 443
set status certificate-inspection
set invalid-server-cert block
set untrusted-server-cert allow
set sni-server-cert-check enable
end
config ftps
set status disable
set invalid-server-cert block
set untrusted-server-cert allow
end
config imaps
set status disable
set invalid-server-cert block
set untrusted-server-cert allow
end
config pop3s
set status disable
set invalid-server-cert block
set untrusted-server-cert allow

FortiOS 6.2.0 New Features Guide 247


Fortinet Technologies Inc.
Advanced Threats

end
config smtps
set status disable
set invalid-server-cert block
set untrusted-server-cert allow
end
config ssh
set ports 22
set status disable
set inspect-all disable
set unsupported-version bypass
set ssh-tun-policy-check disable
set ssh-algorithm compatible
end
set block-blacklisted-certificates enable
set caname "Fortinet_CA_SSL"
set ssl-anomalies-log enable
next
edit "deep-inspection"
set comment "Read-only deep inspection profile."
config ssl
set inspect-all disable
end
config https
set ports 443
set status deep-inspection
set client-cert-request bypass
set unsupported-ssl bypass
set invalid-server-cert block
set untrusted-server-cert allow
set sni-server-cert-check enable
end
config ftps
set ports 990
set status deep-inspection
set client-cert-request bypass
set unsupported-ssl bypass
set invalid-server-cert block
set untrusted-server-cert allow
end
config imaps
set ports 993
set status deep-inspection
set client-cert-request inspect
set unsupported-ssl bypass
set invalid-server-cert block
set untrusted-server-cert allow
end
config pop3s
set ports 995
set status deep-inspection
set client-cert-request inspect
set unsupported-ssl bypass
set invalid-server-cert block
set untrusted-server-cert allow
end

FortiOS 6.2.0 New Features Guide 248


Fortinet Technologies Inc.
Advanced Threats

config smtps
set ports 465
set status deep-inspection
set client-cert-request inspect
set unsupported-ssl bypass
set invalid-server-cert block
set untrusted-server-cert allow
end
config ssh
set ports 22
set status disable
set inspect-all disable
set unsupported-version bypass
set ssh-tun-policy-check disable
set ssh-algorithm compatible
end
set whitelist disable
set block-blacklisted-certificates enable
config ssl-exempt
edit 1
set type fortiguard-category
set fortiguard-category 31
next
edit 2
set type fortiguard-category
set fortiguard-category 33
next
edit 3
set type wildcard-fqdn
set wildcard-fqdn "g-adobe"
next
edit 4
set type wildcard-fqdn
set wildcard-fqdn "g-Adobe Login"
next
edit 5
set type wildcard-fqdn
set wildcard-fqdn "g-android"
next
edit 6
set type wildcard-fqdn
set wildcard-fqdn "g-apple"
next
edit 7
set type wildcard-fqdn
set wildcard-fqdn "g-appstore"
next
edit 8
set type wildcard-fqdn
set wildcard-fqdn "g-auth.gfx.ms"
next
edit 9
set type wildcard-fqdn
set wildcard-fqdn "g-citrix"
next
edit 10

FortiOS 6.2.0 New Features Guide 249


Fortinet Technologies Inc.
Advanced Threats

set type wildcard-fqdn


set wildcard-fqdn "g-dropbox.com"
next
edit 11
set type wildcard-fqdn
set wildcard-fqdn "g-eease"
next
edit 12
set type wildcard-fqdn
set wildcard-fqdn "g-firefox update server"
next
edit 13
set type wildcard-fqdn
set wildcard-fqdn "g-fortinet"
next
edit 14
set type wildcard-fqdn
set wildcard-fqdn "g-googleapis.com"
next
edit 15
set type wildcard-fqdn
set wildcard-fqdn "g-google-drive"
next
edit 16
set type wildcard-fqdn
set wildcard-fqdn "g-google-play2"
next
edit 17
set type wildcard-fqdn
set wildcard-fqdn "g-google-play3"
next
edit 18
set type wildcard-fqdn
set wildcard-fqdn "g-Gotomeeting"
next
edit 19
set type wildcard-fqdn
set wildcard-fqdn "g-icloud"
next
edit 20
set type wildcard-fqdn
set wildcard-fqdn "g-itunes"
next
edit 21
set type wildcard-fqdn
set wildcard-fqdn "g-microsoft"
next
edit 22
set type wildcard-fqdn
set wildcard-fqdn "g-skype"
next
edit 23
set type wildcard-fqdn
set wildcard-fqdn "g-softwareupdate.vmware.com"
next
edit 24

FortiOS 6.2.0 New Features Guide 250


Fortinet Technologies Inc.
Advanced Threats

set type wildcard-fqdn


set wildcard-fqdn "g-verisign"
next
edit 25
set type wildcard-fqdn
set wildcard-fqdn "g-Windows update 2"
next
edit 26
set type wildcard-fqdn
set wildcard-fqdn "g-live.com"
next
edit 27
set type wildcard-fqdn
set wildcard-fqdn "g-google-play"
next
edit 28
set type wildcard-fqdn
set wildcard-fqdn "g-update.microsoft.com"
next
edit 29
set type wildcard-fqdn
set wildcard-fqdn "g-swscan.apple.com"
next
edit 30
set type wildcard-fqdn
set wildcard-fqdn "g-autoupdate.opera.com"
next
end
set server-cert-mode re-sign
set caname "Fortinet_CA_SSL"
set untrusted-caname "Fortinet_CA_Untrusted"
set ssl-anomalies-log enable
set ssl-exemptions-log disable
set rpc-over-https disable
set mapi-over-https disable
set use-ssl-server disable
next
end
next
end

Global IP Address Information Database

This feature adds extensions to Internet Service and IP Reputation to download more details about public IP addresses,
including ownership, known services, geographic location, blacklisting information, etc. The new details are available in
drilldown information, tooltips, and similar mechanisms in FortiView and other areas.
The global IP address database is an integrated database containing all public IP addresses and is implemented in the
Internet-Service Database.

FortiOS 6.2.0 New Features Guide 251


Fortinet Technologies Inc.
Advanced Threats

To view the owner of the IP address:

(global) # get firewall internet-service-owner ?


id Internet Service owner ID.
1 Google
2 Facebook
3 Apple
4 Yahoo
5 Microsoft
......
115 Cybozu
116 VNC

To check for any known service running on an IP address:

(global) # diagnose internet-service info FG-traffic 6 80 8.8.8.8


Internet Service: 65537(Google.Web)

To check GeoIP location and black list information:

(global) # diagnose internet-service id 65537 | grep 8.8.8.8


8.8.8.8-8.8.8.8 geo_id(11337) black list(0x0) proto(6) port(80 443)
8.8.8.8-8.8.8.8 geo_id(11337) black list(0x0) proto(17) port(443)

To check a known malicious server:

(global) # diagnose internet-service id-summary 3080383


Version: 0000600096
Timestamp: 201902111802
Total number of IP ranges: 444727
Number of Groups: 7
Group(0), Singularity(20), Number of IP ranges(142740)
Group(1), Singularity(19), Number of IP ranges(1210)
Group(2), Singularity(16), Number of IP ranges(241)
Group(3), Singularity(15), Number of IP ranges(38723)
Group(4), Singularity(10), Number of IP ranges(142586)
Group(5), Singularity(8), Number of IP ranges(5336)
Group(6), Singularity(6), Number of IP ranges(113891)
Internet Service: 3080383(Botnet.C&C.Server)
Number of IP range: 111486
Number of IP numbers: 111486
Singularity: 20
Reputation: 1(Known malicious sites related to botnet servers, phishing sites, etc.)
Icon Id: 591
Second Level Domain: 1(other)
Direction: dst
Data source: irdb

To check questionable usage:

(global) # diag internet-service id-summary 2818238


Version: 0000600096
Timestamp: 201902111802
Total number of IP ranges: 444727
Number of Groups: 7

FortiOS 6.2.0 New Features Guide 252


Fortinet Technologies Inc.
Advanced Threats

Group(0), Singularity(20), Number of IP ranges(142740)


Group(1), Singularity(19), Number of IP ranges(1210)
Group(2), Singularity(16), Number of IP ranges(241)
Group(3), Singularity(15), Number of IP ranges(38723)
Group(4), Singularity(10), Number of IP ranges(142586)
Group(5), Singularity(8), Number of IP ranges(5336)
Group(6), Singularity(6), Number of IP ranges(113891)
Internet Service: 2818238(Tor.Relay.Node)
Number of IP range: 13718
Number of IP numbers: 13718
Singularity: 20
Reputation: 2(Sites providing high risk services such as TOR, proxy, P2P, etc.)
Icon Id: 43
Second Level Domain: 1(other)
Direction: dst
Data source: irdb

(global) # diagnose internet-service id-summary 2818243


Version: 0000600096
Timestamp: 201902111802
Total number of IP ranges: 444727
Number of Groups: 7
Group(0), Singularity(20), Number of IP ranges(142740)
Group(1), Singularity(19), Number of IP ranges(1210)
Group(2), Singularity(16), Number of IP ranges(241)
Group(3), Singularity(15), Number of IP ranges(38723)
Group(4), Singularity(10), Number of IP ranges(142586)
Group(5), Singularity(8), Number of IP ranges(5336)
Group(6), Singularity(6), Number of IP ranges(113891)
Internet Service: 2818243(Tor.Exit.Node)
Number of IP range: 1210
Number of IP numbers: 1210
Singularity: 19
Reputation: 2(Sites providing high risk services such as TOR, proxy, P2P, etc.)
Icon Id: 43
Second Level Domain: 1(other)
Direction: src
Data source: irdb

Antivirus Performance Improvements

This section lists new Antivirus performance improvements added to FortiOS.


l CIFS Support on page 253

CIFS Support

This version supports file-type filtering and antivirus scanning for proxy-based inspection on CIFS traffic.
File filter for CIFS is performed by inspecting the first 4 kB of the file to identify the file's magic number. If a match
occurs, CIFS file-filtering prevents the CIFS command that contains that file from running.

FortiOS 6.2.0 New Features Guide 253


Fortinet Technologies Inc.
Advanced Threats

This feature also introduces a new security profile called cifs-profile which handles the configuration for file-type
filtering on CIFS.
The antivirus profile still handles the antivirus configuration for CIFS scanning.

Requirements

The firewall policy must be set to Proxy inspection mode for CIFS profile to be available for assignment to the policy.
The following are not supported by CIFS scanning in proxy inspection mode:
l File types and infections within archive files cannot be detected.
l Oversized files cannot be detected.
l Special condition archive files (encrypted, corrupted, mailbomb, etc.) marked by AV engine are blocked
automatically.
l IPv6 CIFS traffic is not supported.

Sample configuration

You must use CLI to configure this feature.

CIFS domain controller configuration

The domain controller configuration is necessary when CIFS traffic is encrypted, such as used by SMB 3.0.
This configuration tells the FortiGate the location of the domain controller in the network and the superuser credentials.
This is all needed to decrypt SMB 3.0 traffic.
FGT_PROXY (vdom1) # config cifs
domain-controller Define known domain controller servers.
profile Configure CIFS profile.

FGT_PROXY (vdom1) # config cifs domain-controller

FGT_PROXY (domain-controller) # edit DOMAIN


new entry 'DOMAIN' added

FGT_PROXY (DOMAIN) # set ?


*domain-name Fully qualified domain name (FQDN). E.g. 'EXAMPLE.COM'.
*username User name to sign in with. Must have proper permissions for service.
*password Password for specified username.
port Port number of service. Port number 0 indicates automatic discovery.
ip IPv4 server address.
ip6 IPv6 server address.

FGT_PROXY (DOMAIN) # show


config cifs domain-controller
edit "DOMAIN"
set domain-name "EXAMPLE.COM"
set username "admin-super"
set password ENC 1mKKNo0z95t/+9B9IisyLsSfevTNRePp6mFk+dtDdZ7r2V8CYUrXp7k-
cxVauWp-
dHYlQs-
rY8g2Y-

FortiOS 6.2.0 New Features Guide 254


Fortinet Technologies Inc.
Advanced Threats

po+UYDsBUxELDp-
fLYC7C31rCm6WD0jYiRcQ/kZhWp-
wB5Dl3W7Z9865r/ntVu1YCsWex/+MnnMYyzFXaNJriXuPLYKEv2fe79NpmSuvouEMvc6zgPPBbXE+28SHzA==
set ip 172.16.201.40
next
end

Sample profile configuration for deep CIFS inspection (for SMB 3.0)

FGT_PROXY (vdom1) # config cifs profile

FGT_PROXY (profile) # edit cifs

FGT_PROXY (cifs) # set ?


*server-credential-type CIFS server credential type.

FGT_PROXY (cifs) # set server-credential-type ?


none Credential derivation not set.
credential-replication Credential derived using Replication account on Domain Controller.
credential-keytab Credential derived using server keytab.

No-Encryption

none is the default for CIFS profile's server-credential-type parameter. When none is set, the CIFS profile
assumes the CIFS traffic is unencrypted (used with SMB 2.0).

Account-Replication

This method of decrypting CIFS traffic involves FortiOS obtaining the session key from the domain controller by logging
into the superuser account.
When credential-replication is set, the parameter domain-controller becomes available and domain
controller must be specified.
For an example of the domain controller entry, see the CIFS domain controller configuration section above.
FGT_PROXY (vdom1) # config cifs profile

FGT_PROXY (profile) # edit cifs

FGT_PROXY (cifs) # set server-credential-type credential-replication

FGT_PROXY (cifs) # set ?


*server-credential-type CIFS server credential type.
*domain-controller Domain for which to decrypt CIFS traffic.

FGT_PROXY (cifs) # set domain-controller ?


<string> please input string value
DOMAIN domain-controller

FGT_PROXY (cifs) # set domain-controller DOMAIN

FGT_PROXY (cifs) # show


config cifs profile
edit "cifs"
set server-credential-type credential-replication

FortiOS 6.2.0 New Features Guide 255


Fortinet Technologies Inc.
Advanced Threats

config file-filter
config entries
end
end
set domain-controller "DOMAIN"
next
end

Keytab

This method of decrypting CIFS traffic involves FortiOS using a series of keytab values to decrypt CIFS traffic.
Use this method when the SMB connection is authenticated by Kerberos.
When credential-keytab is set, the keytab table server-keytab becomes available and keytab entries can be
configured.
Keytab values are stored in the FortiOS configuration in plain text.
FGT_PROXY (vdom1) # config cifs profile

FGT_PROXY (profile) # edit cifs

FGT_PROXY (cifs) # set server-credential-type credential-keytab

FGT_PROXY (cifs) # config


file-filter File filter.
server-keytab Server keytab.

FGT_PROXY (cifs) # config server-keytab

FGT_PROXY (server-keytab) # edit keytab1

FGT_PROXY (keytab1) # set ?


*keytab Base64 encoded keytab file containing credential of the server.

FGT_PROXY (keytab1) # set keytab BQIAAABFAAEAC0VYQU1QTEUuQ09NAAdleGFtcGxlAAAAAVUmAl-


wBABIAILdV5P6NXT8RrTvapcMJQxDYCjRQiD0BzxhwS9h0VgyM

FGT_PROXY (keytab1) # end

FGT_PROXY (cifs) # show


config cifs profile
edit "cifs"
set server-credential-type credential-keytab
config file-filter
end
config server-keytab
edit "keytab1"
set keytab "BQIAAABFAAEAC0VYQU1QTEUuQ09NAAdleGFtcGxlAAAAAVUmAl-
wBABIAILdV5P6NXT8RrTvapcMJQxDYCjRQiD0BzxhwS9h0VgyM"
next
end
next
end

FortiOS 6.2.0 New Features Guide 256


Fortinet Technologies Inc.
Advanced Threats

CIFS profile file filtering

This filter has two configurable parameters:


l status - Enables or disables the file filter. Default is enable.
l log - Enables or disables CIFS event logs when a file is detected. Default is enable.
FGT_PROXY (vdom1) # config cifs profile

FGT_PROXY (profile) # edit cifs

FGT_PROXY (cifs) # config file-filter

FGT_PROXY (file-filter) # set ?


status Enable/disable file filter.
log Enable/disable file filter logging.

FGT_PROXY (file-filter) # set status ?


enable Enable file filter.
disable Disable file filter.

FGT_PROXY (file-filter) # set log ?


enable Enable file filter logging.
disable Disable file filter logging.

CIFS profile file filter entries

The configurable parameters for each entry are:


l action - Blocks or monitors the detected file type. Default is log.
l direction - Sets the direction of traffic which the filter should be applied to. Default value is any.
l file-type - The file type to be detected. Default is blank (unset).
FGT_PROXY (file-filter) # config entries

FGT_PROXY (entries) # edit 1

FGT_PROXY (1) # set ?


comment Comment.
action Action taken for matched file.
direction Match files transmitted in the session's originating or reply direction.
file-type Select file type.

FGT_PROXY (1) # set action ?


log Allow the content and write a log message.
block Block the content and write a log message.

FGT_PROXY (1) # set direction ?


incoming Match files transmitted in the session's originating direction.
outgoing Match files transmitted in the session's reply direction.
any Match files transmitted in the session's originating and reply direction.

FGT_PROXY (1) # set file-type ?


name File type name.
7z Match 7-zip files.
arj Match arj compressed files.

FortiOS 6.2.0 New Features Guide 257


Fortinet Technologies Inc.
Advanced Threats

cab Match Windows cab files.


lzh Match lzh compressed files.
rar Match rar archives.
tar Match tar files.
zip Match zip files.
bzip Match bzip files.
gzip Match gzip files.
bzip2 Match bzip2 files.
xz Match xz files.
bat Match Windows batch files.
msc Match msc files.
uue Match uue files.
mime Match mime files.
base64 Match base64 files.
binhex Match binhex files.
bin Match bin files.
elf Match elf files.
exe Match Windows executable files.
hta Match hta files.
html Match html files.
jad Match jad files.
class Match class files.
cod Match cod files.
javascript Match javascript files.
msoffice Match MS-Office files. For example, doc, xls, ppt, and so on.
msofficex Match MS-Office XML files. For example, docx, xlsx, pptx, and so on.
fsg Match fsg files.
upx Match upx files.
petite Match petite files.
aspack Match aspack files.
prc Match prc files.
sis Match sis files.
hlp Match Windows help files.
activemime Match activemime files.
jpeg Match jpeg files.
gif Match gif files.
tiff Match tiff files.
png Match png files.
bmp Match bmp files.
ignored Match ignored files.
unknown Match unknown files.
mpeg Match mpeg files.
mov Match mov files.
mp3 Match mp3 files.
wma Match wma files.
wav Match wav files.
pdf Match Acrobat pdf files.
avi Match avi files.
rm Match rm files.
torrent Match torrent files.
msi Match Windows Installer msi files.
mach-o Match Mach object files.
dmg Match Apple disk image files.
.net Match .NET files.
xar Match xar archive files.
chm Match Windows compiled HTML help files.

FortiOS 6.2.0 New Features Guide 258


Fortinet Technologies Inc.
Advanced Threats

iso Match ISO archive files.


crx Match Chrome extension files.

Change to antivirus profile

This version has a minor change to the antivirus profile.


The previous config smb is now changed to config cifs.
FGT_PROXY (av) # show full-configuration

config antivirus profile


edit "av"
set comment ''
set replacemsg-group ''
set mobile-malware-db enable
...
config cifs
set options scan quarantine
unset archive-block
unset archive-log
set emulator enable
set outbreak-prevention full-archive
end
next
end

Logs & Report

This feature includes a new UTM log category type: utm-cifs which logs the file-type detection events generated by
cifs-profile.
Antivirus detection over CIFS protocol still generate logs under the utm-virus category.
FGT_PROXY (vdom1) # execute log filter category
Available categories:
0: traffic
1: event
2: utm-virus
3: utm-webfilter
4: utm-ips
5: utm-emailfilter
7: utm-anomaly
8: utm-voip
9: utm-dlp
10: utm-app-ctrl
12: utm-waf
15: utm-dns
16: utm-ssh
17: utm-ssl
18: utm-cifs

Logs generated by CIFS profile file filter:

date=2019-03-28 time=10:39:19 logid="1800063001" type="utm" subtype="cifs" eventtype="cifs-


filefilter" level="notice" vd="vdom1" eventtime=1553794757 msg="File was detected by file fil-
ter." direction="incoming" action="passthrough" service="CIFS" srcip=10.1.100.11

FortiOS 6.2.0 New Features Guide 259


Fortinet Technologies Inc.
Advanced Threats

dstip=172.16.200.44 srcport=33372 dstport=445 srcintf="wan2" srcintfrole="wan" dstintf="wan1"


dstintfrole="wan" policyid=1 proto=16 profile="cifs" filesize="1154" file-
name="virus\\test.jpg" filtername="2" filetype="png"

date=2019-03-28 time=10:39:12 logid="1800063001" type="utm" subtype="cifs" eventtype="cifs-


filefilter" level="notice" vd="vdom1" eventtime=1553794751 msg="File was detected by file fil-
ter." direction="incoming" action="passthrough" service="CIFS" srcip=10.1.100.11 dstip-
p=172.16.200.44 srcport=33370 dstport=445 srcintf="wan2" srcintfrole="wan" dstintf="wan1"
dstintfrole="wan" policyid=1 proto=16 profile="cifs" filesize="81975" file-
name="virus\\screen.jpg" filtername="2" filetype="png"

date=2019-03-28 time=10:33:55 logid="1800063000" type="utm" subtype="cifs" eventtype="cifs-


filefilter" level="warning" vd="vdom1" eventtime=1553794434 msg="File was blocked by file fil-
ter." direction="incoming" action="blocked" service="CIFS" srcip=10.1.100.11 dstip-
p=172.16.200.44 srcport=33352 dstport=445 srcintf="wan2" srcintfrole="wan" dstintf="wan1"
dstintfrole="wan" policyid=1 proto=16 profile="cifs" filesize="28432" file-
name="filetypes\\mpnotify.exe" filtername="3" filetype="exe"

date=2019-03-28 time=10:33:45 logid="1800063000" type="utm" subtype="cifs" eventtype="cifs-


filefilter" level="warning" vd="vdom1" eventtime=1553794424 msg="File was blocked by file fil-
ter." direction="incoming" action="blocked" service="CIFS" srcip=10.1.100.11 dstip-
p=172.16.200.44 srcport=33348 dstport=445 srcintf="wan2" srcintfrole="wan" dstintf="wan1"
dstintfrole="wan" policyid=1 proto=16 profile="cifs" filesize="96528" file-
name="filetypes\\winmine.exe" filtername="3" filetype="exe"

Logs generated by AV profile for infections detected over CIFS:

date=2019-04-09 time=15:19:02 logid="0204008202" type="utm" subtype="virus" event-


type="outbreak-prevention" level="warning" vd="vdom1" eventtime=1554848342519005401 msg-
g="Blocked by Virus Outbreak Prevention service." action="blocked" service="SMB" sessionid=177
srcip=10.1.100.11 dstip=172.16.200.44 srcport=37444 dstport=445 srcintf="wan2" srcint-
frole="wan" dstintf="wan1" dstintfrole="wan" policyid=1 proto=6 direction="incoming" file-
name="outbreak\\zhvo_test.com" quarskip="File-was-not-quarantined."
virus="503e99fe40ee120c45bc9a30835e7256fff3e46a" dtype="File Hash" file-
hash="503e99fe40ee120c45bc9a30835e7256fff3e46a" filehashsrc="fortiguard" profile="av" ana-
lyticssubmit="false" crscore=50 craction=2 crlevel="critical"

date=2019-04-09 time=15:18:59 logid="0211008192" type="utm" subtype="virus" event-


type="infected" level="warning" vd="vdom1" eventtime=1554848339909808987 msg="File is infec-
ted." action="blocked" service="SMB" sessionid=174 srcip=10.1.100.11 dstip=172.16.200.44
srcport=37442 dstport=445 srcintf="wan2" srcintfrole="wan" dstintf="wan1" dstintfrole="wan"
policyid=1 proto=6 direction="incoming" filename="sample\\eicar.com" quarskip="File-was-not-
quarantined." virus="EICAR_TEST_FILE" dtype="Virus" ref="http://www.fortinet.com/ve?vn=EICAR_
TEST_FILE" virusid=2172 profile="av" ana-
lyticscksum="275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f" ana-
lyticssubmit="false" crscore=50 craction=2 crlevel="critical"

IPv6

This section lists new IPv6 features added to FortiOS.


l Combined IPv4 and IPv6 Policy on page 261
l FortiGuard DNS Filter on page 262

FortiOS 6.2.0 New Features Guide 260


Fortinet Technologies Inc.
Advanced Threats

Combined IPv4 and IPv6 Policy

This feature introduces a new, consolidated policy mode. In this mode, IPv4 and IPv6 policies are combined into a
single, consolidated policy. This means that a single policy can be defined that includes both IPv4 and IPv6, instead of
defining separate policies.
In consolidated policy mode, there is a single policy table for the GUI. The same source interface, destination interface,
service, user, and schedule are shared for both IPv4 and IPv6, while there are different IP addresses and IP pool
settings.

Consolidated policy mode can be enabled with the following CLI command:
config system settings
set consolidated-firewall-mode enable
Enabling consolidated-firewall-mode will delete all firewall policy/policy6. Do you
want to continue? (y/n) y
end

Enabling consolidated policy mode will delete all existing IPv4 and IPv6 policies.

To configure a consolidated policy in the CLI:

config firewall consolidated policy


edit 1
set uuid 754a86b6-2507-51e9-ef0d-13a6e4bf2e9d
set srcintf "port18"
set dstintf "port17"
set srcaddr4 "10-1-100-0" <-------- IPv4 srcaddr
set dstaddr4 "172-16-200-0" <-------- IPv4 dstaddr
set srcaddr6 "2000-10-1-100-0" <-------- IPv6 srcaddr
set dstaddr6 "2000-172-16-200-0" <-------- IPv6 dstaddr
set action accept
set schedule "always"

FortiOS 6.2.0 New Features Guide 261


Fortinet Technologies Inc.
Advanced Threats

set service "ALL"


set logtraffic all
set ippool enable
set poolname4 "test-ippool4-1" <-------- IPv4 poolname
set poolname6 "test-ippool6-1" <-------- IPv6 poolname
set nat enable
next
end

Limitations

The following features are not currently supported by consolidated policy mode:
l Policy-learning mode
l Internet-services in policy
l Address-negate and service-negate
l DSCP-match/Tos
l Traffic shaper in policy
l Capture-packet in policy
l External IP list in policy
l schedule-timeout, block-notification, disclaimer, custom-log-fields, or reputation in policy
l timeout-send-rst, tcp-session-without-syn, or anti-replay in policy;
l Policy Interface Pair View
l Policy lookup function on page.
The session/iprope tables for IPv4 and IPv6 are still displayed separately.

FortiGuard DNS Filter

This feature adds DNS profile inspection to IPv6 policies. This includes FortiGuard DNS filtering (with a web filtering
license), and portal replacement message redirect.

To apply a DNS Filter profile to an IPv6 policy using the CLI:


config firewall policy6
edit 1
set name "IPV6-DNSFilter"
set uuid b1adb096-1919-51e9-05c7-87813d4e2b2a
set srcintf "port10"
set dstintf "port9"
set srcaddr "all"
set dstaddr "all"

FortiOS 6.2.0 New Features Guide 262


Fortinet Technologies Inc.
Advanced Threats

set action accept


set schedule "always"
set service "ALL"
set utm-status enable
set dnsfilter-profile "default"
set ssl-ssh-profile "protocols"
set nat enable
next
end

A new CLI variable is added to the DNS filter profile for the IPv6 address of the SDNS redirect portal: redirect-
portal6
config dnsfilter profile
edit "default"
set comment "Default dns filtering."
config domain-filter
unset domain-filter-table
end
config ftgd-dns
unset options
config filters
edit 1
set category 2
set action monitor
next
edit 2
set category 7
set action monitor
next
......
end
set log-all-domain disable
set sdns-ftgd-err-log enable
set sdns-domain-log enable
set block-action redirect
set block-botnet enable
set safe-search disable
set redirect-portal 0.0.0.0
set redirect-portal6 ::
next
end

After the FortiGate has successfully initialized communication with the SDNS server (for domain rating service), the
following CLI command will show the default redirect portal IPv6 address:
(global) # diag test app dnsproxy 3
......
FGD_REDIR_V4:208.91.112.55 FGD_REDIR_V6:[2001:cdba::3257:9652]

File Filtering for Web and Email Filter Profiles

This feature adds file filtering capabilities to web and email filter profiles. The web filters will cover the detection of
HTTP and FTP traffic, while the email filters cover SMTP, POP3, and IMAP. New logs and replacement messages are

FortiOS 6.2.0 New Features Guide 263


Fortinet Technologies Inc.
Advanced Threats

also added.

To add a file filter to a web filter profile in the GUI:

1. On the FortiGate, go to Security Profiles > Web Filter.


2. Edit an existing profile, or create a new one.

3. Enable File Filter, if not already enabled, then click Create New in the filter table. The Create New File Filter Rule
pane opens.

4. Configure the filter as required, then click OK.

To add a file filter to a web filter profile using the CLI:

config webfilter profile


edit "webfilter-file-filter"
config file-filter
set status {enable | disable}
set log {enable | disable}
set scan-archive-contents {enable | disable}
config entries

FortiOS 6.2.0 New Features Guide 264


Fortinet Technologies Inc.
Advanced Threats

edit "filter1"
set comment "Block files"
set protocol [http | ftp]
set action {block | log}
set direction {any | incoming | outgoing}
set encryption {any | yes}
set file-type "pdf" "msofficex"
next
end
end
next
end

Web filter profiles handle HTTP and FTP protocols, and can configure the traffic direction.

Variable Description

status {enable | disable} Enable/disable file filtering (default = enable).

log {enable | disable} Enable/disable file filter logging (default = enable).

scan-archive-contents {enable | disable} Enable/disable file filter archive contents scan (default =
enable).

comment <string> Optional comments.

protocol [http | ftp] Protocols to use (default = http ftp).

action {block | log} The action taken for matched file (default = log).

direction {any | incoming | outgoing} Match files transmitted in the session's originating
direction (incoming), reply direction (outgoing), or either
(any) (default = any).

encryption {any | yes} Match encrypted files or not:


l any - match any file (default).
l yes - match only encrypted files.
file-type <string> Select the file types to match.

FortiOS 6.2.0 New Features Guide 265


Fortinet Technologies Inc.
Advanced Threats

To add a file filter to an email filter profile in the GUI:

1. On the FortiGate, go to Security Profiles > Email Filter.


2. Edit an existing profile, or create a new one.

3. Enable Enable Spam Detection and Filtering, if not already enabled.


4. Enable File Filter, if not already enabled, then click Create New in the filter table. The Create New File Filter Rule
pane opens.

5. Configure the filter as required, then click OK.

To add a file filter to an email filter profile with the CLI:

config emailfilter profile


edit "emailfilter-file-filter"
config file-filter
set status {enable | disable}
set log {enable | disable}
set scan-archive-contents {enable | disable}
config entries
edit "filter1"

FortiOS 6.2.0 New Features Guide 266


Fortinet Technologies Inc.
Advanced Threats

set comment "Block files"


set protocol [smtp | imap | pop3]
set action {block | log}
set encryption {any | yes}
set file-type "exe"
next
end
end
next
end

Email filter profiles handle SMTP, IMAP, and POP3 protocols. The traffic direction cannot be
configured, as it is implied by the protocol.

Variable Description

status {enable | disable} Enable/disable file filtering (default = enable).

log {enable | disable} Enable/disable file filter logging (default = enable).

scan-archive-contents {enable | disable} Enable/disable file filter archive contents scan (default =
enable).

comment <string> Optional comments.

protocol [smtp | imap | pop3] Protocols to use (default = smtp imap pop3).

action {block | log} The action taken for matched file (default = log).

encryption {any | yes} Match encrypted files or not:


l any - match any file (default).
l yes - match only encrypted files.
file-type <string> Select the file types to match.

New logs

A new file_filter event type is added to both web and email filter log categories.

Log samples

Web Filter File Filter action as Block:


1: date=2019-03-19 time=09:42:15 logid="0346012673" type="utm" subtype="webfilter" event-
type="file_filter" level="warning" vd="vd1" eventtime=1548438135 policyid=1 ses-
sionid=29449 srcip=10.1.100.22 srcport=52816 srcintf="dmz" srcintfrole="undefined"
dstip=172.16.200.55 dstport=80 dstintf="wan1" dstintfrole="undefined" proto=6 ser-
vice="HTTP" hostname="172.16.200.55" profile="webfilter-filefilter" action="blocked" req-
type="direct" url="/app_data/test1.pdf" sentbyte=0 rcvdbyte=0 direction="incoming"
filename="test1.pdf" filtername="filter1" filetype="pdf" msg="File was blocked by file fil-
ter."

FortiOS 6.2.0 New Features Guide 267


Fortinet Technologies Inc.
Advanced Threats

Web Filter File Filter action as Log:


2: date=2019-03-19 time=10:48:23 logid="0346012672" type="utm" subtype="webfilter" event-
type="file_filter" level="notice" vd="vd1" eventtime=1548442102 policyid=1 sessionid=521
srcip=10.1.100.22 srcport=52894 srcintf="dmz" srcintfrole="undefined" dstip=172.16.200.55
dstport=80 dstintf="wan1" dstintfrole="undefined" proto=6 service="HTTP" host-
name="172.16.200.55" profile="webfilter-filefilter" action="passthrough" reqtype="direct"
url="/app_data/park.jpg" sentbyte=0 rcvdbyte=0 direction="incoming" filename="park.jpg"
filtername="filter2" filetype="jpeg" msg="File was detected by file filter."

Email Filter File Filter action as Block:


1: date=2019-01-25 time=15:20:16 logid="0554020511" type="utm" subtype="emailfilter" event-
type="file_filter" level="warning" vd="vdom1" eventtime=1548458416 policyid=1 ses-
sionid=2881 srcip=10.1.100.12 srcport=45974 srcintf="port2" srcintfrole="undefined"
dstip=172.16.200.56 dstport=143 dstintf="port1" dstintfrole="undefined" proto=6 ser-
vice="IMAP" action="blocked" from="emailuser1@qa.fortinet.com" to="-
"emailuser2@qa.fortinet.com" recipient="emailuser2" direction="incoming" subject="EXE file
block" size="622346" attachment="yes" filename="putty.exe" filtername="filter1" file-
type="exe"

Email Filter File Filter action as Log:


1: date=2019-01-25 time=15:23:16 logid="0554020510" type="utm" subtype="emailfilter" event-
type="file_filter" level="notice" vd="vdom1" eventtime=1548458596 policyid=1 ses-
sionid=3205 srcip=10.1.100.12 srcport=55664 srcintf="port2" srcintfrole="undefined"
dstip=172.16.200.56 dstport=25 dstintf="port1" dstintfrole="undefined" proto=6 ser-
vice="SMTP" profile="emailfilter-file-filter" action="detected" from-
m="emailuser1@qa.fortinet.com" to="emailuser2@qa.fortinet.com"
sender="emailuser1@qa.fortinet.com" recipient="emailuser2@qa.fortinet.com" dir-
ection="outgoing" subject="PDF file log" size="390804" attachment="yes" file-
name="fortiauto.pdf" filtername="filter2" filetype="pdf"

New replacement messages

Web Filter File Filter blocking upload:


You are not permitted to upload the file "%%FILE%%".
Web Filter File Filter blocking download:
Your attempt to access the file "%%FILE%%" has been blocked by your system administrator.
Email Filter File Filter blocking emails:
This email has been blocked. The file %%FILE%% was blocked due to its file type or properties.

Move Botnet C&C into IPS Profile

Security Profiles > Intrusion Prevention has a new Botnet C&C option. This option consolidates multiple botnet
options into a single option in the IPS Profile so that in one place, you can enable botnet blocking across all traffic that
match the policy.
The new Security Profiles > Intrusion Prevention > Botnet C&C option replaces and enhances the old Network
Interfaces > Scan Outgoing Connections to Botnet Sites option.

FortiOS 6.2.0 New Features Guide 268


Fortinet Technologies Inc.
Advanced Threats

To configure Botnet C&C IP blocking using the GUI:

1. Go to Security Profiles > Intrusion Prevention and enable Botnet C&C by setting Scan Outgoing Connections to
Botnet Sites to Block or Monitor.

2. Add the above sensor to the firewall policy and the IPS engine will start to scan outgoing connections to botnet
sites.
For example, visit a botnet IP and an IPS log is generated for this attack.

To configure Botnet C&C IP blocking using the CLI:

config ips sensor now has a new scan-botnet-connections option.


config ips sensor
edit "Demo"
set scan-botnet-connections <disable | block | monitor>
next
end

The scan-botnet-connections command is no longer available in the following CLI


commands:
l config firewall policy
l config firewall interface-policy
l config firewall proxy-policy
l config firewall sniffer

Botnet IPs and Botnet Domains moved to Intrusion Prevention section

In System > FortiGuard , Botnet IPs and Botnet Domains are now in the Intrusion Prevention section.

FortiOS 6.2.0 New Features Guide 269


Fortinet Technologies Inc.
Advanced Threats

Botnet C&C Domain Blocking

There are no changes from version 6.0.4 in configuring Security Profiles > DNS Filter > Redirect botnet C&C requests
to Block Portal. Add the profile to a firewall policy to block connections to Botnet domains.

Botnet C&C URL Blocking

There are no changes from version 6.0.4 in configuring Security Profiles > Intrusion Prevention > Block malicious
URLs. Enable Block malicious URLs in IPS Sensor and then add the sensor to a firewall policy.

FortiOS 6.2.0 New Features Guide 270


Fortinet Technologies Inc.
Advanced Threats

Botnet C&C Signature Blocking

In this version and version 6.0.4, there are IPS signatures for botnet attacks. Include these signatures in IPS Sensor and
then add the sensor to a firewall policy to detect or block attacks matching the IPS signatures.

FortiOS 6.2.0 New Features Guide 271


Fortinet Technologies Inc.
IOT & OT

IOT & OT

This section lists the new features added to FortiOS for IOT & OT.
l MAC Address-Based Policies on page 272
l Device Summary and Filtering on page 274

MAC Address-Based Policies

This version adds a new address type — range of MAC addresses for IPv4 policies, including:
l IPv4 Firewall Policy.
l IPv4 Virtual Wire Pair Policy.
l IPv4 ACL Policy.
l IPv4 Central SNAT Policy.
l IPv4 DoS Policy.
The MAC address is a link layer-based address type and the MAC address cannot be forwarded across different IP
segments.
For policies in NAT mode VDOM, we only support this new MAC address type as source address.
For policies in Transparent mode or Virtual Wire Pair interface, you can use this address type as source or destination
address.
When you use this address type in a policy as source address in NAT mode VDOM, IP address translation (NAT) is still
performed according to the rules defined in the policy. This new address type only works for source address matching. It
does not have any association with NAT actions.

Sample configuration

To configure a MAC address range using the GUI:

1. Go to Policy & Objects > Addresses to create or edit an address.


l For Category, select Address.
l For Type, select MAC Address Range and enter the address range.
l Enter the other fields and click OK.

FortiOS 6.2.0 New Features Guide 272


Fortinet Technologies Inc.
IOT & OT

2. Go to Policy & Objects > IPv4 Policy to apply the address type to a policy in NAT mode VDOM.
In NAT mode VDOM, this address type cannot be used as destination address.

To configure a MAC address range using the CLI:

1. Create a new MAC address range type.


config firewall address
edit <object_name>
set type mac
set start-mac <mac_address_start #>
set end-mac <mac_address_end #>
next
end

2. Apply the address type to a policy. In Transparent mode or Virtual Wire Pair interface, this address type can be
mixed with other address types in the policy.
config firewall address
edit "test-mac-addr1"

FortiOS 6.2.0 New Features Guide 273


Fortinet Technologies Inc.
IOT & OT

set type mac


set start-mac 00:0c:29:41:98:88
set end-mac 00:0c:29:41:98:88
next
end
config firewall policy
edit 1
set srcintf "port2"
set dstintf "port1"
set srcaddr "test-mac-addr1" "10-1-100-42"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set logtraffic all
set nat enable
next
end

Device Summary and Filtering

New summary charts are introduced to Device Inventory for Device type, Status, Interfaces. These charts are click-
able to simplify filtering and searching the list. This framework is generic and will be added to other areas of the GUI in
the future.

To use device summary and filtering:

1. Go to User & Device > Device Inventory.

2. On the Device Type chart, click Linux PC to filter all Linux devices.

FortiOS 6.2.0 New Features Guide 274


Fortinet Technologies Inc.
IOT & OT

3. On the Status chart, click Status to filter all offline devices.

4. In the Interfaces chart, click port1 to filter all devices discovered from port1.

5. Click the Filter button to remove the filter.

FortiOS 6.2.0 New Features Guide 275


Fortinet Technologies Inc.
SOC Adoption

This section lists the new features added to FortiOS for SOC adoption.
l Topology View — Consolidated Risk on page 276
l FortiView — Subnet Filters on page 279
l FortiView Dashboards and Widgets on page 281
l FortiView Object Names on page 286
l FortiView Top Sources Usability on page 289
l FortiManager Cloud Service on page 291
l FortiAnalyzer Cloud Service on page 294

Topology View — Consolidated Risk

The new Consolidated Risk View in the Security Fabric Topology displays different risks within the topology view. The
filter considers threats originating from different components including:
l IOC Detections
l Vulnerabilities
l Threat Score
The topology shows endpoints based on their highest severity event. Details are available in the tooltips. Administrators
can also filter by risk type or severity.
This version adds two improvements for topology pages:
l Add the ability to highlight hosts with critical vulnerabilities along with compromised hosts as Critical Risks in the
default topology view. You can also view Critical Risk devices in the right pane.
l Consolidate the Vulnerability, Threat Score, and 'IOC Score view into a new view mode called Risk view.

In Security Fabric > Physical Topology, the default topology view highlights hosts with critical vulnerabilities along with
compromised hosts as Critical Risks.

FortiOS 6.2.0 New Features Guide 276


Fortinet Technologies Inc.
SOC Adoption

Click Critical Risks to view critical risk devices in the right pane.

Using View mode Risk with Risk Type All.

FortiOS 6.2.0 New Features Guide 277


Fortinet Technologies Inc.
SOC Adoption

Using View mode Risk with Risk Type Compromised Hosts.

Using View mode Risk with Risk Type Vulnerability.

FortiOS 6.2.0 New Features Guide 278


Fortinet Technologies Inc.
SOC Adoption

Using View mode Risk with Risk Type Threat Score.

FortiView — Subnet Filters

This version supports filtering source IPs or destination IPs with subnet mask in the format of x.x.x.x/x in both real-time
and historical modes. Both logging from disk and logging from FortiAnalyzer are supported.

FortiOS 6.2.0 New Features Guide 279


Fortinet Technologies Inc.
SOC Adoption

Sample configuration

Sample results in the backend subnet filter

FG201E4Q17900791 # di de application miglogd 0x70000


Debug messages will be on for unlimited time.

FG201E4Q17900791 # fortiview_add_filter_field_ex()-1559: fortiview add filter field:"des-


tination"=>"dstip" type:4 negate:0
fortiview_add_filter_field_ex()-1560: values:
fortiview_add_filter_field_ex()-1562: value[0]=91.189.0.0/16
fortiview_add_filter_field_ex()-1559: fortiview add filter field:"srcintfrole"=>"srcintfrole"
type:4 negate:0
fortiview_add_filter_field_ex()-1560: values:
fortiview_add_filter_field_ex()-1562: value[0]=lan
fortiview_add_filter_field_ex()-1562: value[1]=dmz
fortiview_add_filter_field_ex()-1562: value[2]=undefined
__params_from_filter()-583: filter field:dstip 91.189.0.0/16
__params_from_filter()-583: filter field:srcintfrole lan
__params_from_filter()-583: filter field:srcintfrole dmz
__params_from_filter()-583: filter field:srcintfrole undefined
fortiview_request_data()-896: dataset:fv.dest.group tabid:0
_dump_sql()-829: dataset=fv.dest.group, sql:select dstip, max(dstintf) dst_intf,max(dstdev-
type) dst_devtype,max(dstmac) dst_mac,group_concat(distinct appid) appid,group_concat(distinct
appservice||case when subapp is null then '' else '_'||subapp end) appname,sum(sessioncount)
session_count, sum(case when passthrough<>'block' then sessioncount else 0 end) session_allow,
sum(case when passthrough='block' then sessioncount else 0 end) session_block, sum(rcvdbyte)
r, sum(sentbyte) s, sum(rcvdbyte + sentbyte) bandwidth ,sum(crscore) score, sum(case when
passthrough<>'block' then crscore else 0 end) score_allow, sum(case when passthrough='block'
then crscore else 0 end) score_block from grp_traffic_all_dst where timestamp between
1551397800 and 1551484200 and 1=1 AND ( ft_ipmask(dstip, 0, '91.189.0.0/16') ) AND srcint-
frole in ('lan','dmz','undefined') group by dstip order by bandwidth desc limit 100;
takes 10(ms), agggr:0(ms)

fortiview_request_data()-933: total:12 start:1551397800 end:1551484200


__params_from_filter()-583: filter field:dstip 91.189.0.0/16

FortiOS 6.2.0 New Features Guide 280


Fortinet Technologies Inc.
SOC Adoption

__params_from_filter()-583: filter field:srcintfrole lan


__params_from_filter()-583: filter field:srcintfrole dmz
__params_from_filter()-583: filter field:srcintfrole undefined
fortiview_request_data()-896: dataset:fv.general.chart tabid:0
_dump_sql()-829: dataset=fv.general.chart, sql:select a.timestamp1,ses_al,ses_bk,r,s,ifnull
(sc_l,0),ifnull(sc_m,0),ifnull(sc_h,0),ifnull(sc_c,0) from (select timestamp-(timestamp%600)
timestamp1 ,sum(case when passthrough<>'block' then sessioncount else 0 end) ses_al,sum(case
when passthrough='block' then sessioncount else 0 end) ses_bk,sum(rcvdbyte) r,sum(sentbyte) s
from grp_traffic_all_dst where timestamp BETWEEN 1551397800 and 1551484199 and 1=1 AND ( ft_
ipmask(dstip, 0, '91.189.0.0/16') ) AND srcintfrole in ('lan','dmz','undefined') group by
timestamp1 ) a left join (select timestamp-(timestamp%600) timestamp1 ,sum(case when threat_
level=1 then crscore else 0 end) sc_l,sum(case when threat_level=2 then crscore else 0 end)
sc_m,sum(case when threat_level=3 then crscore else 0 end) sc_h,sum(case when threat_level=4
then crscore else 0 end) sc_c from grp_threat where timestamp BETWEEN 1551397800 and
1551484199 and 1=1 AND ( ft_ipmask(dstip, 0, '91.189.0.0/16') ) AND srcintfrole in
('lan','dmz','undefined') group by timestamp1 ) b on a.timestamp1 = b.timestamp1;
takes 30(ms), agggr:0(ms)

fortiview_request_data()-933: total:47 start:1551397800 end:1551484199

FortiView Dashboards and Widgets

FortiView is now consolidated with the System Dashboards:


l All FortiView pages are now available as widgets that can be added to the flexible dashboards.
l Dashboards are now available per VDOM.
l New default dashboards were added.
Following is a summary of the changes:
l The name of the Main dashboard changed to Status:

FortiOS 6.2.0 New Features Guide 281


Fortinet Technologies Inc.
SOC Adoption

l New default dashboards are now available:


l New dashboard named Top Usage LAN/DMZ:

l New dashboard named Security:

FortiOS 6.2.0 New Features Guide 282


Fortinet Technologies Inc.
SOC Adoption

l Only core FortiView pages remain in the FortiView section:

l All non-core FortiView pages have been removed from the left navigation and are now available as dashboard
widgets:

FortiOS 6.2.0 New Features Guide 283


Fortinet Technologies Inc.
SOC Adoption

FortiOS 6.2.0 New Features Guide 284


Fortinet Technologies Inc.
SOC Adoption

l The Threat Map moves to the Monitor section:

l After enabling VDOMs, dashboards are now created per VDOM.


l For example, add a Sessions widget to the root VDOM:

FortiOS 6.2.0 New Features Guide 285


Fortinet Technologies Inc.
SOC Adoption

l Notice that no Sessions widget is added to another VDOM:

FortiView Object Names

In this version, FortiView Top Sources and Top Destinations views leverage UUID to resolve Firewall Object (Address)
names for improved usability.

Requirements

l Firewall Objects-based view is only available when the data source is disk.
l To have historical Firewall Objects-based view, address objects UUID need to be logged. Enable log-uuid-
address under system global:
config system global
set log-uuid-address enable
end

Sample configuration

In this example, firewall addresses have been configured using the commands in To configure firewall addresses in the
CLI: on page 288 and each firewall address object is associated with an unique UUID.
In the GUI, Top Sources can display Firewall Objects-based chart in real time.

FortiOS 6.2.0 New Features Guide 286


Fortinet Technologies Inc.
SOC Adoption

Top Destinations can display Firewall Objects-based chart in real time.

The Top Sources > Historical tab can display Firewall Objects-based chart.

You can drill down a source object. This example shows a drill down of PC2.

FortiOS 6.2.0 New Features Guide 287


Fortinet Technologies Inc.
SOC Adoption

The Top Destinations > Historical tab can display Firewall Objects-based chart.

You can drill down a destination object. This example shows a drill down of 172-16-200-55-PC5.

To configure firewall addresses in the CLI:

config firewall address


edit "PC2"
set uuid b3eba698-5c89-51e9-1af9-363b23a3fef8
set subnet 10.1.100.22 255.255.255.255
next
edit "10.1.100.11-PC1"
set uuid 96bcbca2-5cb5-51e9-bc02-465c0aab5e2c
set subnet 10.1.100.11 255.255.255.255
next
edit "172.16.200.55-PC5"
set uuid a2c368f2-5cb5-51e9-1c35-082a57898065
set subnet 172.16.200.55 255.255.255.255
next
edit "PW2-172-16-200-254"
set uuid def64b6a-5d45-51e9-5ab0-b0d0a3128098

FortiOS 6.2.0 New Features Guide 288


Fortinet Technologies Inc.
SOC Adoption

set subnet 172.16.200.254 255.255.255.255


next
end

To configure the firewall policy with defined firewall addresses in the CLI:

config firewall policy


edit 1
set name "v4-out"
set uuid 4825ff5a-dc94-51e8-eeab-e138bc255e4a
set srcintf "port10"
set dstintf "port9"
set srcaddr "PC2" "10.1.100.11-PC1"
set dstaddr "172.16.200.55-PC5" "PW2-172-16-200-254"
set action accept
set schedule "always"
set service "ALL"
set utm-status enable
set inspection-mode proxy
set logtraffic all
set av-profile "default"
set ssl-ssh-profile "custom-deep-inspection"
set nat enable
next
edit 2
set name "to-Internet"
set uuid 28379372-5c8a-51e9-c765-cc755a07a200
set srcintf "port10"
set dstintf "port9"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set utm-status enable
set inspection-mode proxy
set logtraffic all
set av-profile "default"
set nat enable
next
end

FortiView Top Sources Usability

This feature enhances Top Sources view by adding the following functions for both real-time and historical view:
l Improve Top Sources view with the avatar and device information.
l Add support for using right-click to create/edit device definition in Top Sources view.
l Add support for using right-click to create/edit address definition in Top Sources view.

FortiOS 6.2.0 New Features Guide 289


Fortinet Technologies Inc.
SOC Adoption

Sample configuration

In the GUI, FortiView > Sources shows the avatar and device information at the top level.

On drill down, the Summary of box shows the avatar and device details.

In the top view, you can right-click to create or edit a custom device, or perform other actions.

FortiOS 6.2.0 New Features Guide 290


Fortinet Technologies Inc.
SOC Adoption

In the drill down view Summary of box, you can select the Action button to edit a custom device, or perform other
actions.

FortiManager Cloud Service

A new cloud-based SaaS management service is available based on FortiManager. This service is also included in the
360 Protection Bundle.
Once FortiGate has acquired a contract named FortiManager Cloud, FortinetOne creates a cloud-based FortiManager
instance under the user account. You can launch the portal for the cloud-based FortiManager from FortinetOne, and its
URL starts with the User ID.
You can use a FortiGate with a contract for FortiManager Cloud to configure central management by using the FQDN of
fortimanager.forticloud.com. A FortiGate-FortiManager tunnel is established between FortiGate and the FortiManager
instance.
After the tunnel is established, you can execute FortiManager functions from the cloud-based FortiManager portal.

FortiOS 6.2.0 New Features Guide 291


Fortinet Technologies Inc.
SOC Adoption

To manage FortiGate with FortiManager Cloud:

1. In the FortiCare portal, ensure that you have a product entitlement for FortiManager Cloud, and note your user
ID number.

2. Click the FortinetOne icon in the upper-right corner to access the FortiManager Cloud instance.
User ID on FortiManager portal represents the dedicated instance.

FortiOS 6.2.0 New Features Guide 292


Fortinet Technologies Inc.
SOC Adoption

3. In FortiOS, enable FortiManager Cloud.


a. Go to Security Fabric > Settings, and enable Central Management.
b. Click FortiManager Cloud, and then Apply.
The FortiManager Cloud button is only available when you have a FortiManager Cloud product entitlement;
the FortiManager Cloud button is not available without a FortiManager Cloud product entitlement.

4. In the FortiManager Cloud instance, go to Device Manager and authorize the FortiGate.
When using FortiGate to enable FortiManager Cloud, the FortiGate device appears as an unauthorized device.

After authorizing the FortiGate, the FortiGate becomes a managed device.

FortiOS 6.2.0 New Features Guide 293


Fortinet Technologies Inc.
SOC Adoption

In FortiOS, the central management status displays Registered on FortiManager.

FortiAnalyzer Cloud Service

FortiGate now supports FortiAnalyzer Cloud service for Event Logging.

Traffic and Security logs are not supported in the initial version of FortiAnalyzer Cloud.

When FortiAnalyzer Cloud is licensed and enabled, all Event logs are sent to FortiAnalyzer Cloud by default, and all
Traffic logs, Security logs, and archive files are not sent to FortiAnalyzer Cloud.
Limitations:
l FortiAnalyzer Cloud cannot be enabled in vdom override-setting when global FortiAnalyzer Cloud is
disabled.

FortiOS 6.2.0 New Features Guide 294


Fortinet Technologies Inc.
SOC Adoption

l You must use the CLI to retrieve and display logs sent to FortiAnalyzer Cloud. FortiOS GUI is not supported.
l You cannot enable FortiAnalyzer Cloud and FortiGate Cloud at the same time.
On the Security Fabric > Settings pane in FortiOS, the FortiAnalyzer Cloud tab is grayed out when you do not have a
FortiAnalyzer Cloud entitlement:

When you have a FortiAnalyzer Cloud entitlement, the FortiAnalyzer Cloud tab is available on the Security Fabric
> Settings pane:

You can also view the FortiAnalyzer Cloud settings on the Log & Report > Log Settings pane:

FortiOS 6.2.0 New Features Guide 295


Fortinet Technologies Inc.
SOC Adoption

In FortiAnalyzer Cloud, you can view logs from FortiOS:

FortiOS 6.2.0 New Features Guide 296


Fortinet Technologies Inc.
SOC Adoption

To enable fortianalyzer-cloud using the CLI:

config log fortianalyzer-cloud setting


set status enable
set ips-archive disable
set access-config enable
set enc-algorithm high
set ssl-min-proto-version default
set conn-timeout 10
set monitor-keepalive-period 5
set monitor-failure-retry-period 5
set certificate ''
set source-ip ''
set upload-option realtime
end
config log fortianalyzer-cloud filter
set severity information
set forward-traffic disable
set local-traffic disable
set multicast-traffic disable
set sniffer-traffic disable
set anomaly disable
set voip disable
set dlp-archive disable
set dns disable
set ssh disable
set ssl disable
set cifs disable
set filter ''
set filter-type include
end

To disable fortianalyzer-cloud for a specific VDOM using the CLI:

​config log setting


set faz-override enable
end
config log fortianalyzer-cloud override-setting
set status disable
end

To set fortianalyzer-cloud filter for a specific vdom using the CLI:

​config log setting


set faz-override enable
end
config log fortianalyzer-cloud override-setting
set status enable
end
config log fortianalyzer-cloud override-filter
set severity information
set forward-traffic disable
set local-traffic disable
set multicast-traffic disable
set sniffer-traffic disable
set anomaly disable
set voip disable

FortiOS 6.2.0 New Features Guide 297


Fortinet Technologies Inc.
SOC Adoption

set dlp-archive disable


set dns disable
set ssh disable
set ssl disable
set cifs disable
set filter ''
set filter-type include
end

To display fortianalyzer-cloud log using the CLI:

​exe log filter device fortianalyzer-cloud


exe log filter category event
exe log display

Sample log:

date=2019-05-01 time=17:57:45 idseq=60796052214644736 bid=100926 dvid=1027 itime="2019-05-01


17:57:48" euid=3 epid=3 dsteuid=0 dstepid=3 logver=602000890 logid=0100032002
type="event" subtype="system" level="alert" srcip=10.6.30.254 dstip=10.6.30.9
action="login" msg="Administrator ddd login failed from https(10.6.30.254) because of
invalid user name" logdesc="Admin login failed" sn="0" user="ddd" ui="https(10.6.30.254)"
status="failed" reason="name_invalid" method="https" eventtime=1556758666274548325
devid="FG5H1E5818900076" vd="root" dtime="2019-05-01 17:57:45" itime_t=1556758668
devname="FortiGate-501E"
date=2019-05-01 time=17:57:21 idseq=60796052214644736 bid=100926 dvid=1027 itime="2019-05-01
17:57:23" euid=3 epid=3 dsteuid=0 dstepid=3 logver=602000890 logid=0100044546
type="event" subtype="system" level="information" action="Edit" msg="Edit
log.fortianalyzer-cloud.filter " logdesc="Attribute configured" user="admin" ui="ssh
(10.6.30.254)" cfgtid=164757536 cfgpath="log.fortianalyzer-cloud.filter"
cfgattr="severity[information->critical]" eventtime=1556758642413367644
devid="FG5H1E5818900076" vd="root" dtime="2019-05-01 17:57:21" itime_t=1556758643
devname="FortiGate-501E"

FortiOS 6.2.0 New Features Guide 298


Fortinet Technologies Inc.
Compliance

Compliance

This section lists the new features added to FortiOS for Compliance.
l FortiSandbox Cloud Region Selection on page 299
l FortiGate-VM Unique Certificate on page 302
l Run a File System Check Automatically on page 304

FortiSandbox Cloud Region Selection

In FortiOS 6.2, FortiSandbox Cloud services, also referred to as FortiCloud Sandbox services, are decoupled from the
FortiCloud license, allowing users to specify a FortiSandbox Cloud region as well as take advantage of FortiSandbox
features without a FortiCloud account.
The topology below demonstrates how FortiCloud Logs and FortiSandbox Cloud are separated in FOS 6.2.

FortiCloud Log and Sandbox licenses shown in FortiOS

l FortiGate’s Main Dashboard displays separated FortiSandbox Cloud and FortiCloud Log license statuses within
the FortiCloud widget.
In the example below, the FortiCloud account is using a free license while FortiSandbox Cloud is using a paid
license.

FortiOS 6.2.0 New Features Guide 299


Fortinet Technologies Inc.
Compliance

l To obtain a FortiSandbox Cloud license, register the FortiGate with a paid FortiGuard AntiVirus license. As the
FortiSandbox Cloud license is linked to the user's AntiVirus license, it will expire when the AntiVirus license expires.

l If the FortiGate is not registered with a paid AntiVirus license, the FortiGate will use the free FortiCloud license.
This license limits the FortiGate to 100 FortiSandbox Cloud submissions per day.

FortiOS 6.2.0 New Features Guide 300


Fortinet Technologies Inc.
Compliance

FortiSandbox Cloud region selection

To set the FortiSandbox Cloud region in the GUI:

1. Go to Security Fabric > Settings.


2. In the Sandbox Inspection section, select a region from the FortiSandbox cloud region dropdown.
The following regions are available:
l Europe
l Global
l Japan
l US

3. Select Apply.

FortiOS 6.2.0 New Features Guide 301


Fortinet Technologies Inc.
Compliance

To set the FortiSandbox Cloud region in the CLI:

l In the FortiOS CLI, enter the command: forticloud-sandbox region and select a region.
FGT_PROXY (global) # exec forticloud-sandbox region
0 Europe
1 Global
2 Japan
3 US
Please select cloud sandbox region[0-3]:3
Cloud sandbox region is selected: US

FGT_PROXY (global) #

l The separation of the FortiCloud Log and Sandbox services can be seen in the example below:
FGT_PROXY (global) # diagnose test application forticldd 3
Debug zone info:
Domain:FortiCloud ReleaseQA Global - 172.16.95.16
Home log server: 172.16.95.93:514
Alt log server: 172.16.95.27:514
Active Server IP: 172.16.95.93
Active Server status: up
Log quota: 102400MB
Log used: 0MB
Daily volume: 20480MB
fams archive pause: 0
APTContract : 1
APT server: 172.16.102.52:514
APT Altserver: 172.16.102.51:514
Active APTServer IP: 172.16.102.52
Active APTServer status: up

FGT_PROXY (global) #

FortiGate-VM Unique Certificate

To safeguard against certificate compromise, FortiGate VM and FortiAnalyzer VM allow the same deployment model as
FortiManager VM whereby the license file contains a unique certificate tied to the virtual device's serial number.
A hardware appliance usually comes with a BIOS certificate with a unify serial number that identifies the hardware
appliance. This built-in BIOS certificate is different from a firmware certificate. A firmware certificate is distributed in all
appliances with the same firmware version.
Using a BIOS certificate with a built-in serial number provides a high trust level for the other side in X.509
authentication.
Since a VM appliance has no BIOS certificate, a signed VM license can provide an equivalent of a BIOS certificate. The
VM license assigns a serial number in the BIOS equivalent certificate, which gives the certificate with an abstract access
ability, i.e., the same as a BIOS certificate with the same high trust level.

Only new, registered VM licenses support this feature.

FortiOS 6.2.0 New Features Guide 302


Fortinet Technologies Inc.
Compliance

Sample configuration

Depending on the firmware version and VM license, check the following sample configurations.
If you are using new firmware (6.2.0) with a new VM license, verify VM license can be validated and the certificates
Fortinet_Factory and Fortinet_Factory_Backup CN are changed to the FortiGate VM serial number.

If you are using new firmware (6.2.0) with an old VM license, verify VM license can be validated and the certificates
Fortinet_Factory and Fortinet_Factory_Backup CN are kept as CN = FortiGate and not changed to
the serial number.

If you are using old firmware (6.0.2) with a new VM license, verify VM license can be validated and the certificates
Fortinet_Factory and Fortinet_Factory_Backup CN are kept as CN = FortiGate and not changed to
the serial number.

FortiOS 6.2.0 New Features Guide 303


Fortinet Technologies Inc.
Compliance

Run a File System Check Automatically

This feature adds the option to perform an automatic file system check if the FortiGate shuts down ungracefully.
By default, automatic file system check is disabled. When disabled, the next time an administrator logs in after an
ungraceful shutdown, a warning message will advise them to manually run a file system check.
GUI warning:

CLI warning:
WARNING: File System Check Recommended! Unsafe reboot may have caused inconsistency in
disk drive.
It is strongly recommended that you check file system consistency before proceeding.
Please run 'execute disk scan 17'
Note: The device will reboot and scan during startup. This may take up to an hour

Enable automatic file system checks

Automatic file system checking can be enabled using both the GUI and the CLI.

FortiOS 6.2.0 New Features Guide 304


Fortinet Technologies Inc.
Compliance

To enable automatic file system checks in the GUI:

1. On the FortiGate, go to System > Settings.


2. In the Start Up Settings section, enable Auto file system check.

3. Click Apply.

To enable automatic file system checks using the CLI:

config system global


set autorun-log-fsck enable
end

FortiOS 6.2.0 New Features Guide 305


Fortinet Technologies Inc.
UX / Usability

This section lists the new features added to FortiOS for usability.
l SAML SSO on page 306
l Logging - Session versus Attack Direction on page 311
l Internet Service Improvement on page 313
l Application Control Profile GUI Improvements on page 314
l Authentication Policy Extensions on page 318
l Workspace Mode on page 319
l Extend Policy/Route Check to Policy Routing on page 321
l Address Group - Exclusions on page 324
l Automatic Address Creation for Attached Networks on page 325
l Centralized Web Filtering Statistics on page 328
l Traffic Shaping GUI Update on page 329
l Unified Login for FortiCare and FortiGate Cloud on page 333
l Split-Task VDOM Mode on page 337

SAML SSO

SAML SSO enables a single FortiGate device to act as the Identify Provider (IdP), while other FortiGate devices act as
Service Providers (SP) and redirect log ins to the IdP.
All administrators must be actively added into each SP. When an administrator first logs in to an SP, a temporary
account is created with the no access profile, and the device administrator must enable access for each account on
each device.

Configure FGT_A as the IdP:

1. Log in to FGT_A with the device administrator account.


2. Go to User & Device > SAML SSO.
3. Set the Mode to Identity Provider (IdP).
4. Configure the IdP address and certificate.
5. Add an SP:
a. In the Service Providers table, click Create New.
b. Enter the SP name, prefix, type, and address. Copy the prefix, as it will be needed when configuring FGT_B.

FortiOS 6.2.0 New Features Guide 306


Fortinet Technologies Inc.
UX / Usability

c. Configure other settings as needed.


d. Click OK.

6. Click Apply.

Configure FGT_B as an SP:

1. Log in to FGT_B with the device administrator account.


2. Go to User & Device > SAML SSO.
3. Set the Mode to Service Provider (SP).
4. Configure the SP address.
5. Configure the IdP settings:
a. Set IdP type to Fortinet Product.
b. Enter the IdP address, as configured on FGT_A.
c. Enter the prefix copied from FGT_A.
d. Select the same certificate as used on FGT_A.

6. Click Apply.

Create a new system administrator on the IdP (FGT_A):

1. Log in to FGT_A with the device administrator account.


2. Go to System > Administrators.
3. Create a new administrator

FortiOS 6.2.0 New Features Guide 307


Fortinet Technologies Inc.
UX / Usability

4. Set Type set to Local User.


5. Configure other settings as needed.

6. Click OK.

Log in the FGT_B using Single Sign-On:

1. At the FGT_B log in prompt, click or via Single Sign-On.

The SSO log in prompt opens.


2. Enter the log in information for the administrator that you just created on FGT_A.

3. Click Login.
A GUI warning opens.

FortiOS 6.2.0 New Features Guide 308


Fortinet Technologies Inc.
UX / Usability

As the account is using a restricted access profile, additional permissions must be granted by the device
administrator.
4. Click Logout.

Grant permissions to the new SSO administrator account:

1. Log in to FGT_B with the device administrator account.


2. Go to System > Administrators.

The new Single Sign-On Administrator was automatically created when it logged in the first time.

FortiOS 6.2.0 New Features Guide 309


Fortinet Technologies Inc.
UX / Usability

3. Edit the new SSO admin and change their Administrator Profile.

4. Click OK.

Log in the FGT_B using Single Sign-On again:

1. At the FGT_B log in prompt, click or via Single Sign-On. The SSO log in prompt opens.
2. Enter the log in information for the SSO administrator.

3. Click Login.
FGT_B is successfully logged into.

FortiOS 6.2.0 New Features Guide 310


Fortinet Technologies Inc.
UX / Usability

CLI commands

To configure the IdP:

config system saml


set status enable
set role IDP
set cert "Fortinet_Factory"
set server-address "172.16.106.74"
config service-providers
edit "csf_172.16.106.74:12443"
set prefix "csf_ngczjwqxujfsbhgr9ivhehwu37fml20"
set sp-entity-id "http://172.16.106.74/metadata/"
set sp-single-sign-on-url "https://172.16.106.74/saml/?acs"
set sp-single-logout-url "https://172.16.106.74/saml/?sls"
set sp-portal-url "https://172.16.106.74/saml/login/"
config assertion-attributes
edit "username"
next
edit "tdoc@fortinet.com"
set type email
next
end
next
end
end

To configure an SP:

config system saml


set status enable
set cert "Fortinet_Factory"
set idp-entity-id "http://172.16.106.74/saml-idp/csf_ngczjwqxujfsb-
hgr9ivhehwu37fml20/metadata/"
set idp-single-sign-on-url "https://172.16.106.74/csf_
ngczjwqxujfsbhgr9ivhehwu37fml20/login/"
set idp-single-logout-url "https://172.16.106.74/saml-idp/csf_ngczjwqxujfsb-
hgr9ivhehwu37fml20/logout/"
set idp-cert "REMOTE_Cert_1"
set server-address "172.16.106.74:12443"
end

To configure an SSO administrator:

config system sso-admin


edit "SSO-admin-name"
set accprofile <SSO admin user access profile>
set vdom <Virtual domain(s) that the administrator can access>
next
end

Logging - Session versus Attack Direction

FortiOS 6.2.0 New Features Guide 311


Fortinet Technologies Inc.
UX / Usability

IPS logs have been updated to record source and destination information based on session direction instead of attack
direction. This update allows for better alignment between IPS and traffic logs, as traffic logs also record source and
destination information based on session direction. FortiOS can use this information to present a more accurate
summary and drill-down path.
IPS logs also include a new direction field to indicate attack direction when applicable.

The following scenarios show examples of traffic and IPS logs for server-side and client-side attacks. Both scenarios use
the topology illustrated below. The session direction is from the client to the server.

In both scenarios, note that both the traffic and IPS log record the source and destination IP addresses using the
session direction, treating the client as the source and the server as the destination. The source fields (srcip,
srcport, and srcintf) use client data. The destination fields (dstip, dstport, and dstinf) use server data.
The IPS log examples also include the direction field to show the attack direction.

Server-side attack traffic and IPS logs

In this scenario, the client attempts to download malware from the server. The attack direction therefore is incoming
(from the server to the client). The table below shows the traffic and IPS logs for this scenario:

Traffic log IPS log


date=2018-12-29 time=14:50:47 date=2018-12-29 time=14:50:47
logid="0000000013" type="traffic" logid="0419016384" type="utm"
subtype="forward" level="notice" subtype="ips" eventtype="signature"
vd="vdom1" eventtime=1540849847 level="alert" vd="vdom1"
srcip=10.1.100.22 srcport=46552 eventtime=1540849847 severity="info"
srcintf="dmz" srcintfrole="lan" srcip=10.1.100.22 srccountry="Reserved"
dstip=172.16.200.55 dstport=80 dstip=172.16.200.55 srcintf="dmz"
dstintf="wan1" dstintfrole="wan" srcintfrole="lan" dstintf="wan1"
poluuid="c939f294-d6ff-51e8-3988- dstintfrole="wan" sessionid=2979
c628cfa2a346" sessionid=2979 proto=6 action="reset" proto=6 service="HTTP"
action="server-rst" policyid=1 policyid=1 attack="Virus.File"
policytype="policy" service="HTTP" srcport=46552 dstport=80
dstcountry="Reserved" hostname="172.16.200.55"
srccountry="Reserved" trandisp="snat" url="/virus/example.com"
transip=172.16.200.6 transport=46552 direction="incoming" attackid=29844
duration=0 sentbyte=296 rcvdbyte=152 profile="ips-test"
sentpkt=4 rcvdpkt=3 appcat="unscanned" ref="http://www.fortinet.com/ids/VID29844"
utmaction="reset" countips=1 incidentserialno=122164746 msg="file_
devtype="Linux PC" devcategory="None" transfer: Virus.File,"
osname="Linux" osversion="Debian"
mastersrcmac="00:0c:29:6c:43:21"
srcmac="00:0c:29:6c:43:21" srcserver=0
utmref=65522-42

FortiOS 6.2.0 New Features Guide 312


Fortinet Technologies Inc.
UX / Usability

Client-side attack traffic and IPS logs

In this scenario, the client attempts to post malware to the server. The attack direction therefore is outgoing (from the
client to the server). The table below shows the traffic and IPS logs for this scenario:

Traffic log IPS log


date=2018-12-29 time=15:30:25 date=2018-12-29 time=15:30:25
logid="0000000013" type="traffic" logid="0419016384" type="utm"
subtype="forward" level="notice" subtype="ips" eventtype="signature"
vd="vdom1" eventtime=1540852225 level="alert" vd="vdom1"
srcip=10.1.100.22 srcport=53330 eventtime=1540852225 severity="info"
srcintf="dmz" srcintfrole="lan" srcip=10.1.100.22 srccountry="Reserved"
dstip=172.16.200.55 dstport=80 dstip=172.16.200.55 srcintf="dmz"
dstintf="wan1" dstintfrole="wan" srcintfrole="lan" dstintf="wan1"
poluuid="c939f294-d6ff-51e8-3988- dstintfrole="wan" sessionid=4205
c628cfa2a346" sessionid=4205 proto=6 action="reset" proto=6 service="HTTP"
action="server-rst" policyid=1 policyid=1 attack="Virus.File"
policytype="policy" service="HTTP" srcport=53330dstport=80
dstcountry="Reserved" hostname="172.16.200.55" url="/cgi-
srccountry="Reserved" trandisp="snat" bin/upload.py?root" direction="outgoing"
transip=172.16.200.6 transport=53330 attackid=29844 profile="ips-test"
duration=0 sentbyte=692 rcvdbyte=318 ref="http://www.fortinet.com/ids/VID29844"
sentpkt=6 rcvdpkt=5 appcat="unscanned" incidentserialno=2111356281 msg="file_
utmaction="reset" countips=1 transfer: Virus.File,"
devtype="Linux PC" devcategory="None"
osname="Linux" osversion="Debian"
mastersrcmac="00:0c:29:6c:43:21"
srcmac="00:0c:29:6c:43:21" srcserver=0
utmref=65522-96

Internet Service Improvement

This feature improves the Internet Service display and configuration by supporting frequently-seen icons such as
Facebook and LinkedIn icons on the Policy page and ISDB page.

Sample configuration

Go to Policy & Objects > Internet Service Database to see and use the icons for common Internet Services.

FortiOS 6.2.0 New Features Guide 313


Fortinet Technologies Inc.
UX / Usability

Go to a Policy page in Policy & Objects to see and use the icons for common Internet Services.

Application Control Profile GUI Improvements

This version adds multiple GUI enhancements to the Application Control Profile including:
l A right-sided pane in the sensor page to display FortiGuard help links.
l Individual application overrides and filter overrides tables are combined into one override table. The two types are
combined when adding a new override.
l Override entries in the table display sequence numbers and can be reordered by dragging and dropping.
Specific application overrides and filter overrides tables are combined into one override table, where signature and filter
entries are mixed together. A right-sided gutter has been added to sensor page to display FortiGuard help links.

FortiOS 6.2.0 New Features Guide 314


Fortinet Technologies Inc.
UX / Usability

For specific applications, parent/child application structures are removed.

Override entries in the table display sequence numbers that can be reordered by dragging and dropping.
Entries in the Application and Filter Overrides table can be reordered by dragging the priority number to the desired
position. The priority number and the selected entries are reordered.

In the Application and Filter Overrides section, the pane to add and edit overrides entries has two tabs: Application and
Filter.

FortiOS 6.2.0 New Features Guide 315


Fortinet Technologies Inc.
UX / Usability

For each entry in the override table, you can only configure one type: for Application or Filter option.

Type Select Application for application override.


Select Filter for filter override.

Action No change from previous version.


Can be set to Monitor/Allow/Block/Quarantine.

Application Available if you select Application Type.


Use the pane to add one or more application signatures for an entry. Use the
search box to filter signatures.

Filter Available if you select Filter Type.


You can select filters by behavior/application
category/technology/popularity/protocol/risk/vendor subtypes. Filters can be
accumulated to filter a set of signatures that match all selected filters.
The Search box can be use to find if input signature is included in selected filters,
where matched applications are shown at the bottom.

To create a new Application Control Profile with the Application Type:

1. In Security Profiles > Application Control in the Application and Filter Overrides section, click Create New.
2. For Type, select Application. For Action, select Block.
3. For Application, click +.
All application signatures are listed.
4. In the Search box, enter Facebook and select Facebook.

5. Click OK to apply this entry.


6. Click Create New to create another entry.
7. For Type, select Filter. For Action, select Block.
8. For Filter, click +.

FortiOS 6.2.0 New Features Guide 316


Fortinet Technologies Inc.
UX / Usability

9. In the Select Entries list under BEHAVIOR, select Cloud.


All matching signatures are listed.

10. Click OK to apply this entry.


The Application and Filter Overrides section shows two entries.

FortiOS 6.2.0 New Features Guide 317


Fortinet Technologies Inc.
UX / Usability

11. Drag the second entry to the top, and click OK to save this profile.

Authentication Policy Extensions

In 6.0, if you defined an authentication policy for specific traffic, then you might need to exclude the destination from the
default implicit policy, otherwise, the implicit rule might allow unauthenticated users go to through. This new option
forces the authentication to take precedence over subsequent rules without having to create additional policies.
By default, unauthenticated traffic is permitted to fall through to the next policy. FortiGate only forces unauthenticated
users to authenticate against the authentication policy when there are no other matching policies. In this version,
administrators can force the authentication to always take place.

To set authentication requirement:

config user setting


set auth-on-demand <always|implicitly>
end

always Always trigger firewall authentication on demand.

implicitly (default) Implicitly trigger firewall authentication on demand. This is the default setting
and the original behavior.

You can only use CLI to configure this feature. See the following example.
config user setting
set auth-on-demand always
end
config firewall policy
edit 1
set name "QA to Database"

FortiOS 6.2.0 New Features Guide 318


Fortinet Technologies Inc.
UX / Usability

set srcintf "port10"


set dstintf "port9"
set srcaddr "QA_subnet"
set dstaddr "Database"
set action accept
set schedule "always"
set service "ALL"
set fsso disable
set groups "qa_group"
set nat enable
next
edit 2
set name "QA to Internet"
set srcintf "port10"
set dstintf "port9"
set srcaddr "QA_subnet"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set fsso disable
set nat enable
next
end

Workspace Mode

This feature adds a workspace mode to FortiOS, allowing administrators to make a batch of changes that are not
implemented until the transaction is committed. Prior to committing, the changes can be reverted or edited as needed
without impacting current operations.
When an object is edited in workspace mode it is locked, preventing other administrators from editing that object. A
warning message will be shown to let the administrator know that the object is currently being configured in another
transaction.
All administrators can use workspace mode; their permissions in workspace mode are the same as defined in their
account profile.
A workspace mode transaction times out in five minutes if there is no activity. When a transaction times out, all changes
are discarded. A warning message will be shown to let the administrator know that a timeout is imminent, or has already
happened:
config transaction id=1 will expire in 30 seconds
config transaction id=1 will expire in 20 seconds
config transaction id=1 will expire in 10 seconds
config transaction id=1 has expired

The following configurations are not changeable in a workspace transaction:


system.console
system.resource-limits
system.elbc
config system global
set split-port
set vdom-admin

FortiOS 6.2.0 New Features Guide 319


Fortinet Technologies Inc.
UX / Usability

set management-vdom
set wireless-mode
set internal-switch-mode
end
config system settings
set opmode
end
system.npu
system.np6
config system wireless
set mode
end
system.vdom-property
system.storage

The execute batch command cannot be used in or to start workspace mode.

To use workspace mode:

1. Start workspace mode:


execute config-transaction start
Once in workspace mode, the administrator can make configuration changes, all of which are made in a local CLI
process that is not viewable by other processes.
2. Commit configuration changes:
execute config-transaction commit
After performing the commit, the changes are available for all other processes, and are also made in the kernel.
3. Abort configuration changes:
execute config-transaction abort
If changes are aborted, no changes are made to the current configuration or the kernel.

Diagnose commands

diagnose sys config-transaction show txn-meta

Show config transaction meta information. For example:


# diagnose sys config-transaction show txn-meta
txn_next_id=8, txn_nr=2

diagnose sys config-transaction show txn-info

Show config transaction information. For example:


# diagnose sys config-transaction show txn-info
current_jiffies=680372

txn_id=6, expire_jiffies=706104, clicmd_fpath='/dev/cmdb/txn/6_EiLl9G.conf'


txn_id=7, expire_jiffies=707427, clicmd_fpath='/dev/cmdb/txn/7_UXK6wY.conf'

diagnose sys config-transaction show txn-entity

Show config transaction entity. For example:


# diagnose sys config-transaction show txn-entity
vd='global', cli-node-oid=37(system.vdom), txn_id=7. location: fileid=0, storeid=0,
pgnr=0, pgidx=0
vd='global', cli-node-oid=46(system.interface), txn_id=7. location: fileid=3, storeid=0,
pgnr=0, pgidx=0

FortiOS 6.2.0 New Features Guide 320


Fortinet Technologies Inc.
UX / Usability

diagnose sys config-transaction show txn-lock

Show transaction lock status. For example:


# diagnose sys config-transaction show txn-lock
type=-1, refcnt=0, value=256, pid=128

diagnose sys config-transaction status

Show the transaction status in the current CLI.

Extend Policy/Route Check to Policy Routing

The existing Policy Check and Route Check features in FortiOS 6.0 exclude checking against the Policy Routing engine.
In 6.2, this is added, and new options are available in the GUI to support further testing scenarios.
This version adds policy route look up support and prioritizes it over static/dynamic (normal) routes when doing route
lookup in the GUI.
In Monitor > Routing Monitor, click Route Lookup to look up an address. If it matches the policy route first, the policy
route is highlighted.

The result of the matching policy route is highlighted in the Route Monitor page. Below is an example of IPv4 lookup.

FortiOS 6.2.0 New Features Guide 321


Fortinet Technologies Inc.
UX / Usability

Below is an example of IPv6 lookup.

The result of the matching IPv6 policy route is highlighted in the Route Monitor page.

FortiOS 6.2.0 New Features Guide 322


Fortinet Technologies Inc.
UX / Usability

IPv4 policy route match CLI command:

diag ip proute match <IPv6 destination address> <IPv6 source address> <interface name>
<protocol> <destination port>
proute IPv6 policy routing.
match Match IPv6 route to policy routes.
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx IPv6 destination address.
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx IPv6 source address.
intf-name Interface Name.
<1-255> Protocol.
<0-65535> Destination port.

IPv6 policy route match CLI command:

diag ipv6 proute match <destination ip addres> <source ip address> <interface name> <protocol>
<destination port>
proute Policy routing.
match Match policy route
XXX.XXX.XXX.XXX Destination IP address.
XXX.XXX.XXX.XXX Source IP address.
intf-name Interface Name.
<1-255> Protocol.
<0-65535> Destination port.

To configure IP policy route match using the CLI — example 1:

FGT (root) # diagnose ip proute match 10.100.21.44 2.2.2.2 port2 6 2


dst=10.100.21.44 src=2.2.2.2 iif=24 protocol=6 dport=2
id=7f00000c type=VWL
seq-num=12

FortiOS 6.2.0 New Features Guide 323


Fortinet Technologies Inc.
UX / Usability

To configure IP policy route match using the CLI — example 2:

FGT (root) # diagnose ip proute match 10.100.20.44 2.2.2.2 port2 6 2


dst=10.100.20.44 src=2.2.2.2 iif=24 protocol=6 dport=2
id=00000016 type=Policy Route
seq-num=22

Address Group - Exclusions

This feature introduces the Exclude Members setting in IPv4 address groups. The specified IP addresses or ranges are
subtracted from the address group.

This feature is only supported for IPv4 address groups, and only for addresses with a Type of
IP Range or Subnet.

To exclude an address or addresses from an address group using the GUI:

1. Go to Policy & Objects > Addresses.


2. Create a new address group, or edit an existing group.

FortiOS 6.2.0 New Features Guide 324


Fortinet Technologies Inc.
UX / Usability

3. Enable Exclude Members, and select the addresses that will be excluded from the group.

4. Click OK.
The excluded members are listed in the Exclude Member column.

To exclude an address or addresses from an address group using CLI commands:

config firewall addrgrp


edit <address group>
set exclude enable
set exclude-member <address> <address> ... <address>
next
end

Automatic Address Creation for Attached Networks

For all interfaces set to a LAN or DMZ role, a new option is available to automatically create an address object for the
connected network.
The new Create address object matching subnet option is displayed in the GUI when Role is set to LAN or DMZ:

FortiOS 6.2.0 New Features Guide 325


Fortinet Technologies Inc.
UX / Usability

l When Role is set to LAN, the Create address object matching subnet option is displayed:

l When Role is set to DMZ, the Create address object matching subnet option is displayed:

The Create address object matching subnet option is hidden in the GUI when Role is set to WAN or Undefined:

FortiOS 6.2.0 New Features Guide 326


Fortinet Technologies Inc.
UX / Usability

l When Role is set to WAN , the Create address object matching subnet option is hidden:

l When Role is set to Undefined, the Create address object matching subnet option is hidden:

When the Create address object matching subnet option is enabled, the new address object displays on the Policy &
Objects > Address page:

When using the CLI, the following options are available:


config firewall address
edit "port1 address"
set type interface-subnet

FortiOS 6.2.0 New Features Guide 327


Fortinet Technologies Inc.
UX / Usability

set subnet 192.168.100.99 255.255.255.0


set interface "port1"
next
end

Centralized Web Filtering Statistics

Instead of individual counters, this version uses a centralized set of counters for the combined results for Explicit Proxy,
Flow mode, and Proxy mode web filtering.
The CLI shows the global cumulative IPS engine daemon/workers statistics. For Proxy mode or Flow mode web
filtering, you can now use these counters to check all the Proxy or Flow daemons/workers statistics. You don't have to
check the statistics for each daemon/worker or check the statistics from the URL filter daemon (FortiGuard rating
daemon).

Sample usage

You must use the CLI to use this feature.


Use the Flow mode web filtering global statistics counter for the web filtering statistics of all accessible VDOMs for an
IPS engine.

To display global Flow URL filter statistics counter:

(global)# diag test app ipsmonitor 29


Global URLF states:
request: 116
response: 116
pending: 1
request error: 0
response timeout: 0
blocked: 24
allowed: 92

To reset the global Flow URL filter statistics counter:

(global)# diag test app ipsmonitor 30

Proxy mode web filter

The Proxy mode web filter counter is not new. This version adds the results from Flow mode.
Use the Proxy mode web filtering statistics counter for all the web filtering statistics of the WAD daemon, including
transparent proxy policy and explicit webproxy policy scenarios. This is global and per-VDOM.

FortiOS 6.2.0 New Features Guide 328


Fortinet Technologies Inc.
UX / Usability

To use Proxy mode web filtering:

(vdom)# diag wad stats filter list


......

filtering of all accessible vdoms <-- under VDOM


dlp = 0
content-type = 0
urls:
examined = 181
allowed = 16
blocked = 1
logged = 95
overridden = 6

(global)# diag wad stats filter list


......

filtering of all accessible vdoms <-- under global


dlp = 0
content-type = 0
urls:
examined = 181
allowed = 16
blocked = 1
logged = 95
overridden = 6

To define global or per-VDOM output statistics:

(global)# diagnose wad filter vd root <-- filter-out output for vdom root

(global)# diagnose wad stats filter list

filtering of vdom root <-- statistics for VDOM root (under global)

dlp = 0
content-type = 0
urls:
examined = 0
allowed = 0
blocked = 0
logged = 0
overridden = 0

Traffic Shaping GUI Update

This feature adds GUI support for interface based traffic shaping.

FortiOS 6.2.0 New Features Guide 329


Fortinet Technologies Inc.
UX / Usability

Example

In this example, QA traffic to the database is put into shaping group 10 and is guaranteed to have 60% of the interface
bandwidth, which is 6Mbps. Other QA traffic is put into shaping group 20 and is guaranteed to have 40% of the interface
bandwidth, which is 4Mbps.

To configure interface based traffic shaping in the GUI:

1. On the FortiGate, create a firewall policy for the traffic.


2. Create the shaping policy for QA to access the database:
a. Go to Policy & Objects > Traffic Shaping Policy.
b. Click Create New. The New Shaping Policy page opens.

c. Configure the settings as needed, setting the Destination to the database, the Outgoing interface to port9,
and the Shaping group to 10.
d. Click OK.
3. Create the shaping policy for all other QA traffic:
a. Go to Policy & Objects > Traffic Shaping Policy.
b. Click Create New. The New Shaping Policy page opens.
c. Configure the settings as needed, setting the Shaping group to 20.
d. Click OK.

FortiOS 6.2.0 New Features Guide 330


Fortinet Technologies Inc.
UX / Usability

Traffic from QA to the database is put into shaping group 10, and all other QA traffic is put into shaping group 20.
4. Configure a traffic shaping profile:
a. Go to Policy & Objects > Traffic Shaping Profile.
b. Click Create New. The Create shaping profile page opens.
c. Set the Default Shaping Group to Shaping group 20 with a Guaranteed bandwidth of 40.
d. Add an Additional Shaping Group, and set the Shaping group to 10 and Guaranteed bandwidth to 60.

e. Configure the remaining settings as needed.


f. Click OK.
5. Enable interface based traffic shaping on an interface (port9 in this example):
a. Go to Network > Interfaces and double-click on port9. The Edit Interface page opens.
b. Set the Outbound Bandwidth to 10000 Kbps.

FortiOS 6.2.0 New Features Guide 331


Fortinet Technologies Inc.
UX / Usability

c. Set the Outgoing Shaping Profile to the just created profile.

d. Configure the remaining settings as needed.


e. Click OK.

To configure interface based traffic shaping in the CLI:

1. On the FortiGate, create a firewall policy for the traffic:


config firewall policy
edit 2
set name "QA to Internet"
set srcintf "port10"
set dstintf "port9"
set srcaddr "QA_subnet"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set auto-asic-offload disable
set nat enable
next
end

2. Create shaping policies for QA to access the database and the Internet:
config firewall shaping-policy
edit 1
set name "To_Database"
set service "ALL"
set dstintf "port9"
set class-id 10
set srcaddr "QA_subnet"
set dstaddr "Database"
next
edit 2
set name "To_Internet"

FortiOS 6.2.0 New Features Guide 332


Fortinet Technologies Inc.
UX / Usability

set service "ALL"


set dstintf "port9"
set class-id 20
set srcaddr "QA_subnet"
set dstaddr "all"
next
end

3. Configure a firewall shaping profile:


config firewall shaping-profile
edit "QA_Profile"
set default-class-id 20
config shaping-entries
edit 1
set class-id 20
set priority medium
set guaranteed-bandwidth-percentage 40
set maximum-bandwidth-percentage 50
next
edit 2
set class-id 10
set guaranteed-bandwidth-percentage 60
set maximum-bandwidth-percentage 80
next
end
next
end

4. Enable interface based traffic shaping on an interface (port9 in this example):


config system interface
edit "port9"
set vdom "qa_team"
set ip 172.16.200.1 255.255.255.0
set allowaccess ping https ssh http telnet
set type physical
set outbandwidth 10000
set egress-shaping-profile "QA_Profile"
set snmp-index 11
next
end

Interface based traffic shaping cannot be used when traffic is offloaded.

Unified Login for FortiCare and FortiGate Cloud

With the availability of FortinetOne, FortiGate now supports a unified login between FortiCare and FortiGate Cloud.
During initial setup, it's no longer required to authenticate with both separately - the FortiGate Cloud setup is now a
subset of the FortiCare setup.
You now have the following options:

FortiOS 6.2.0 New Features Guide 333


Fortinet Technologies Inc.
UX / Usability

l You can activate FortiGate Cloud with a FortinetOne account.


l You can activate FortiGate Cloud with a Standalone account.
l You can migrate from a Standalone account to a FortinetOne account.
From the FortiOS GUI, you can activate FortiGate Cloud with a FortinetOne account:

From the FortiOS GUI, you can activate FortiGate Cloud with a Standalone account:

To migrate from a Standalone account to a FortinetOne account using the GUI:

1. Go to Dashboard > Main, and ensure that you have logged into FortiCare with a FortinetOne account and have
activated FortiGate Cloud with a Standalone account.

FortiOS 6.2.0 New Features Guide 334


Fortinet Technologies Inc.
UX / Usability

2. Go to Security Fabric > Settings > Cloud Logging and/or Central Management, and click Migrate Now.

FortiOS 6.2.0 New Features Guide 335


Fortinet Technologies Inc.
UX / Usability

3. In the Password box, type the password for the FortinetOne account, and click OK.

4. Confirm that the FortiCloud account was successfully migrated from a Standalone account to a FortinetOne
account.

To migrate from a Standalone account to a FortinetOne account using the CLI:

1. Locate the migration command:


FortiGate-300D # exec fortiguard-log ?
migration Migrate standalone FortiGate Cloud account to FortinetOne.
2. Execute the migration:
FortiGate-300D # exec fortiguard-log migration ?
<password> Password.

FortiOS 6.2.0 New Features Guide 336


Fortinet Technologies Inc.
UX / Usability

Split-Task VDOM Mode

Split-task VDOM mode simplifies deployments that require only one management VDOM and one traffic VDOM. The
management VDOM is used to manage the FortiGate, and cannot be used to process traffic. The traffic VDOM
provides separate security policies, and is used to process all network traffic.
Split-task VDOM mode is not available on all FortiGate models. The Fortinet Security Fabric supports split-task VDOM
mode.

Enable split-task VDOM mode

Split-task VDOM mode can be enabled in the GUI or CLI. Enabling it does not require a reboot, but does log you out of
the FortiGate.

When split-task VDOM mode is enabled, all current management configuration is assigned to
the root VDOM, and all non-management settings, such as firewall policies and security
profiles, are deleted.

To enable split-task VDOM mode with the CLI:

config system global


set vdom-mode split-vdom
end

FortiOS 6.2.0 New Features Guide 337


Fortinet Technologies Inc.
UX / Usability

To enable split-task VDOM mode in the GUI:

1. On the FortiGate, go to System > Settings.


2. In the System Operation Settings section, enable Virtual Domains.

3. Select Split-Task VDOM for the VDOM mode.


4. Select a Dedicated Management Interface from the Interface list. This interface is used to access the
management VDOM, and cannot be used in firewall policies.
5. Click OK.

FortiOS 6.2.0 New Features Guide 338


Fortinet Technologies Inc.
Other

This section lists other new features added to FortiOS.


l Extend Interface Failure Detection to Aggregate Interfaces on page 339
l Source & Destination UUID Logging on page 340
l DNS - Multiple Domain List on page 342
l DNS - Latency Info on page 344
l DNS - Add DNS Translation to DNS Profile on page 346
l Multiple FortiAnalyzer (or Syslog) Per VDOM on page 347
l Web Proxy on page 349
l Protocols on page 355
l Recognize AnyCast Address in Geo-IP Blocking on page 368
l GTP in Asymmetric Routing on page 369
l Firewall - Allow to Customize Default Service on page 370
l Firewall - Anti-Replay Option Per-Policy on page 371
l NTLM Extensions on page 371
l Option to Disable Stateful SCTP Inspection on page 374
l HA Failover Condition - SSD Failure on page 375
l Option to Fragment IP Packets Before IPSec Encapsulation on page 376
l DHCP Relay Agent Information Option on page 376
l VLAN Inside VXLAN on page 378
l ECMP Acceleration in NAT Mode on page 380
l Disable all cloud communication on page 382
l Custom SIP RTP Port Range Support on page 384
l Custom Service Max Value Increase on page 385
l FortiCarrier License Activation on page 385
l GUI Alert on Login to VMX Security Nodes on page 386
l Event Log Subtype for FortiExtender on page 387
l Decouple FortiSandbox Cloud from FortiCloud on page 389
l FortiGate Cloud on page 391
l SNMP OID for Log Failed to Send on page 392
l FortiGuard Distribution of Updated Apple Certificates (for token push notifications) on page 395
l Active Directory Recursive Search Option on page 396
l Web proxy global settings on page 397

Extend Interface Failure Detection to Aggregate Interfaces

This feature extends fail-detect to aggregate and redundant interfaces. When an aggregate or a redundant interface
goes down, the corresponding fail-alert-interface will be changed to down. When the aggregate or redundant interface
comes up, the corresponding fail-alert-interface will be changed to up.

FortiOS 6.2.0 New Features Guide 339


Fortinet Technologies Inc.
Other

Fail-detect on aggregate and redundant interfaces can be configured using the CLI.

To configure an aggregate interface so that port3 goes down with it:

config system interface


edit "agg1"
set vdom "root"
set fail-detect enable
set fail-alert-method link-down
set fail-alert-interfaces "port3"
set type aggregate
set member "port1" "port2"
next
end

To configure a redundant interface so that port4 goes down with it:

config system interface


edit "red1"
set vdom "root"
set fail-detect enable
set fail-alert-method link-down
set fail-alert-interfaces "port4"
set type redundant
set member "port1" "port2"
next
end

Source & Destination UUID Logging

This feature has two parts:


l The log-uuid setting in system global is split into two settings: log-uuid-address and log-uuid
policy.
l Two internet-service name fields are added to the traffic log: Source Internet Service (srcinetsvc) and
Destination Internet Service (dstinetsvc).

FortiOS 6.2.0 New Features Guide 340


Fortinet Technologies Inc.
Other

Log UUIDs

This feature allows matching UUIDs for each source and destination that match a policy to be added to the traffic log.
This allows the address objects to be referenced in log analysis and reporting.
As this may consume a significant amount of storage space, this feature is optional. By default, policy UUID insertion is
enabled and address UUID insertion is disabled.

To enable insertion of address and policy UUIDs to traffic logs in the GUI:

1. Go to Log Settings.

2. Under UUIDs in Traffic Log, enable Policy and/or Address.


3. Click Apply.

To enable insertion of address and policy UUIDs to traffic logs in the CLI:

Enter the following CLI commands:


config system global
set log-uuid-address enable
set log-uuid-policy enable
end

Example forward traffic log:


# date=2019-01-25 time=11:32:55 logid="0000000013" type="traffic" subtype="forward"
level="notice" vd="vdom1" eventtime=1528223575 srcip=192.168.1.183 srcname="PC24"
srcport=33709 srcintf="lan" srcintfrole="lan" dstip=192.168.70.184 dstport=80
dstintf="wan1" dstintfrole="wan" srcuuid="27dd503e-883c-51e7-ade1-7e015d46494f"
dstuuid="27dd503e-883c-51e7-ade1-7e015d46494f"
poluuid="9e0fe24c-1808-51e8-1257-68ce4245572c" sessionid=5181 proto=6 action="client-
rst" policyid=4 policytype="policy" service="HTTP" trandisp="snat"
transip=192.168.70.228 transport=33709 appid=38783 app="Wget"
appcat="General.Interest" apprisk="low" applist="default" duration=5 sentbyte=450
rcvdbyte=2305 sentpkt=6 wanin=368 wanout=130 lanin=130 lanout=130 utmaction="block"
countav=2 countapp=1 crscore=50 craction=2 devtype="Linux PC" devcategory="None"
osname="Linux" mastersrcmac="00:0c:29:36:5c:c3" srcmac="00:0c:29:36:5c:c3" srcserver=0
utmref=65523-1018

FortiOS 6.2.0 New Features Guide 341


Fortinet Technologies Inc.
Other

Internet service name fields

The forward traffic log for internet-service has two new fields: Source Internet Service and Destination Internet
Service.

Example internet-service name fields in forward traffic log:


# date=2019-01-25 time=14:17:04 logid="0000000013" type="traffic" subtype="forward"
level="notice" vd="vdom1" eventtime=1548454622 srcip=10.1.100.11 srcport=51112
srcintf="port3" srcintfrole="undefined" dstip=172.217.14.228 dstport=80
dstintf="port1" dstintfrole="undefined" poluuid="af519380-2094-51e9-391c-b78e8edbddfc"
srcinetsvc="isdb-875099" dstinetsvc="Google.Gmail" sessionid=6930 proto=6
action="close" policyid=2 policytype="policy" service="HTTP" dstcountry="United
States" srccountry="Reserved" trandisp="snat" transip=172.16.200.2 transport=51112
duration=11 sentbyte=398 rcvdbyte=756 sentpkt=6 rcvdpkt=4 appcat="unscanned"
devtype="Router/NAT Device" devcategory="Fortinet Device"
mastersrcmac="90:6c:ac:41:7a:24" srcmac="90:6c:ac:41:7a:24" srcserver=0
dstdevtype="Unknown" dstdevcategory="Fortinet Device" masterdstmac="08:5b:0e:1f:ed:ed"
dstmac="08:5b:0e:1f:ed:ed" dstserver=0

DNS - Multiple Domain List

DNS settings have been expanded to support a list of up to eight domains. When a client requests a URL that does not
include a FQDN, FortiOS resolves the URL by traversing through the DNS domain list and performing a query for each
domain until the first match is found.
You can configure a DNS domain list using the GUI or the CLI.
CLI options have been added to allow customization of the DNS timeout and retry settings.

FortiOS 6.2.0 New Features Guide 342


Fortinet Technologies Inc.
Other

To configure a DNS domain list using the GUI:

1. In FortiOS, go to Network > DNS.


2. You can click the + button to add multiple domains. Configure up to eight domains as required. In the example
below, the DNS domain list is configured to include three domains: sample.com, example.com, and
domainname.com.
3. Configure additional DNS settings as required, then click Apply.

To configure a DNS domain list using the CLI:

The example below shows the CLI commands for setting the primary DNS server IP address to 172.16.200.1 and
configuring multiple domains: sample.com, example.com, and domainname.com.
config system dns
set primary 172.16.200.1
set domain "sample.com" "example.com" "domainname.com"
end

To configure the DNS timeout and retry settings using the CLI:

You may want to customize the DNS timeout and retry settings. For example, if you have eight domains configured, you
may want to decrease the DNS timeout value to avoid delays. The following table defines the timeout and retry settings:

CLI option Description

timeout DNS query timeout interval in seconds. Enter an integer value between 1 and 10.
The default value is 5 seconds.

retry Number of times to retry the DNS query. Enter an integer value between 0 and 5.
The default value is 2 tries.

The example below increases the timeout to 7 seconds and the number of retries to 3:
config system dns
set timeout 7
set retry 3
end

FortiOS 6.2.0 New Features Guide 343


Fortinet Technologies Inc.
Other

To confirm the DNS domain list was configured:

Once configuration is complete, you can verify that the DNS domain list was configured as desired.
In the example below, the local DNS server has the entry for host1 mapped to the FQDN of host1.sample.com, while
the entry for host2 is mapped to the FQDN of host2.example.com. The example shows pinging host1 and host2 to
verify that the domain list was configured as desired.
1. In Command Prompt, enter ping host1. The system returns the following response:
PING host1.sample.com (1.1.1.1): 56 data bytes
Since the request does not include a FQDN, FortiOS traverses the configured DNS domain list to find a match.
Since host1 is mapped to the host1.sample.com, FortiOS resolves host1 to sample.com, the first entry in the
domain list.
2. Enter ping host2. The system returns the following response:
PING host2.example.com (2.2.2.2): 56 data bytes
Again, FortiOS traverses the domain list to find a match. It first queries sample.com, the first entry in the domain
list, but does not find a match. It then queries the second entry in the domain list, example.com. Since host2 is
mapped to the FQDN of host2.example.com, FortiOS resolves host2 to example.com.

DNS - Latency Info

When there is high latency in DNS traffic, it might result in sluggish overall experience for end users. This new feature
helps administrators quickly identify DNS latency issues in their configuration.
The Interfaces > DNS page shows additional details about DNS latency.

If you use FortiGuard DNS, the information includes latency for regular DNS, DNS filter servers, web filter server, and
outbreak prevention servers.

FortiOS 6.2.0 New Features Guide 344


Fortinet Technologies Inc.
Other

Hover your pointer over a latency value to see the last updated time.
There are no new CLI commands for this feature. DNS latency information is extracted from the CLI data below. See
the following examples.
diagnose test application dnsproxy 2
worker idx: 0
worker: count=1 idx=0
retry_interval=500 query_timeout=1495
DNS latency info:
vfid=0 server=2001::1 latency=1494 updated=73311
vfid=0 server=208.91.112.52 latency=1405 updated=2547
vfid=0 server=208.91.112.53 latency=19 updated=91
SDNS latency info:
vfid=0 server=173.243.138.221 latency=1 updated=707681
DNS_CACHE: alloc=35, hit=26
RATING_CACHE: alloc=1, hit=49
DNS UDP: req=66769 res=63438 fwd=83526 alloc=0 cmp=0 retrans=16855 to=3233
cur=111 switched=8823467 num_switched=294 v6_cur=80 v6_switched=7689041 num_v6_switched=6
ftg_res=8 ftg_fwd=8 ftg_retrans=0
DNS TCP: req=0, res=0, fwd=0, retrans=0 alloc=0, to=0
FQDN: alloc=45 nl_write_cnt=9498 nl_send_cnt=21606 nl_cur_cnt=0
Botnet: searched=57 hit=0 filtered=57 false_positive=0

To see the latency from web filter server and outbreak protection server, use the diagnose debug rating
command, for example:
diagnose debug rating
Locale : english

Service : Web-filter
Status : Enable
License : Contract

FortiOS 6.2.0 New Features Guide 345


Fortinet Technologies Inc.
Other

Service : Antispam
Status : Disable

Service : Virus Outbreak Prevention


Status : Disable

-=- Server List (Tue Jan 22 08:03:14 2019) -=-

IP Weight RTT Flags TZ Packets Curr Lost Total Lost Updated Time
173.243.138.194 10 0 DI -8 700 0 2 Tue Jan 22 08:02:44 2019
173.243.138.195 10 0 -8 698 0 4 Tue Jan 22 08:02:44 2019
173.243.138.198 10 0 -8 698 0 4 Tue Jan 22 08:02:44 2019
173.243.138.196 10 0 -8 697 0 3 Tue Jan 22 08:02:44 2019
173.243.138.197 10 1 -8 694 0 0 Tue Jan 22 08:02:44 2019
96.45.33.64 10 22 D -8 701 0 6 Tue Jan 22 08:02:44 2019
64.26.151.36 40 62 -5 704 0 10 Tue Jan 22 08:02:44 2019
64.26.151.35 40 62 -5 703 0 9 Tue Jan 22 08:02:44 2019
209.222.147.43 40 70 D -5 696 0 1 Tue Jan 22 08:02:44 2019
66.117.56.42 40 70 -5 697 0 3 Tue Jan 22 08:02:44 2019
66.117.56.37 40 71 -5 702 0 9 Tue Jan 22 08:02:44 2019
65.210.95.239 40 74 -5 695 0 1 Tue Jan 22 08:02:44 2019
65.210.95.240 40 74 -5 695 0 1 Tue Jan 22 08:02:44 2019
45.75.200.88 90 142 0 706 0 12 Tue Jan 22 08:02:44 2019
45.75.200.87 90 155 0 714 0 20 Tue Jan 22 08:02:44 2019
45.75.200.85 90 156 0 711 0 17 Tue Jan 22 08:02:44 2019
45.75.200.86 90 159 0 704 0 10 Tue Jan 22 08:02:44 2019
62.209.40.72 100 157 1 701 0 7 Tue Jan 22 08:02:44 2019
62.209.40.74 100 173 1 705 0 11 Tue Jan 22 08:02:44 2019
62.209.40.73 100 173 1 699 0 5 Tue Jan 22 08:02:44 2019
121.111.236.179 180 138 9 706 0 12 Tue Jan 22 08:02:44 2019
121.111.236.180 180 138 9 704 0 10 Tue Jan 22 08:02:44 2019

DNS - Add DNS Translation to DNS Profile

DNS translation has moved to the DNS profile configuration, allowing different translations to be applied on a per-policy
basis. Prior to 6.2, this was a single table outside of the profile.
DNS filter dns-translation enforces what 'a record' (IP address) in a DNS reply will be translated into another IP address,
which allows you to control the DNS resolve result.

FortiOS 6.2.0 New Features Guide 346


Fortinet Technologies Inc.
Other

To configure a DNS filter using the GUI:

1. Go to Security Profiles > DNS Filter.


2. Enable DNS Translation, configure as follows, and click Appy:

3. Apply the DNS filter profile to the firewall policy.

To configure a DNS filter using the CLI:

1. Enable dns-translation:
config dnsfilter profile
edit "<dns-filter-profile>"
......
config dns-translation
edit 1
set src 93.184.216.34
set dst 10.1.100.99
set netmask 255.255.255.255
next
end
end

Multiple FortiAnalyzer (or Syslog) Per VDOM

Under VDOM, support has been added for multiple FortiAnalyzer and Syslog servers as follows:
l Support for up to three override FortiAnalyzer servers.
l Support for up to four override Syslog servers.

FortiOS 6.2.0 New Features Guide 347


Fortinet Technologies Inc.
Other

If the VDOM faz-override and/or syslog-override setting is enabled or disabled (default) before upgrading,
the setting remains the same after upgrading.
In the GUI, if the override setting is disabled, the GUI displays the global FortiAnalyzer1 or syslog1 setting. If the
override setting is enabled, the GUI displays the VDOM override FortiAnalyzer1 or syslog1 setting.
You can only use CLI to enable the override to support multiple log servers.

To enable FortiAnalyzer and Syslog server override under VDOM:

config log setting


set faz-override enable
set syslog-override enable
end

When faz-override and/or syslog-override is enabled, the following CLI commands are available to config
VDOM override:

To configure VDOM override for FortiAnalyzer:

config log fortianalyzer/fortianalyzer2/fortianalyzer3 override-setting


set status enable
set server "123.12.123.123"
set reliable enable
end
config log fortianalyzer/fortianalyzer2/fortianalyzer3 override-filter
set severity information
set forward-traffic enable
set local-traffic enable
set multicast-traffic enable
set sniffer-traffic enable
set anomaly enable
set voip enable
set dlp-archive enable
set dns enable
set ssh enable
set ssl enable
end

To configure VDOM override for Syslog server:

config log syslogd/syslogd2/syslogd3/syslogd4 override-setting


set status enable
set server "123.12.123.12"
set facility local1
end
config log syslogd/syslogd2/syslogd3/syslogd4 override-filter
set severity information
set forward-traffic enable
set local-traffic enable
set multicast-traffic enable
set sniffer-traffic enable
set anomaly enable
set voip enable
set dns enable
set ssh enable
set ssl enable

FortiOS 6.2.0 New Features Guide 348


Fortinet Technologies Inc.
Other

end

Web Proxy

This section lists other new features added to FortiOS related to web proxy.
l Transparent Web Proxy Forwarding on page 349
l Multiple Dynamic Header Count on page 350
l Restricted SaaS Access (0365, G-Suite, Dropbox) on page 353

Transparent Web Proxy Forwarding

This feature enables the proxy forwarding option for Transparent Web Proxy policies and Regular Firewall for HTTP and
HTTPS.
In previous versions of FortiOS, explicit proxy allowed the user to forward proxy traffic to another proxy server (proxy
chaining). With this new implementation, web traffic can be forwarded to the upstream proxy without requiring the users
to reconfigure their browsers or publish a proxy auto-reconfiguration (PAC) file.
Once configured, traffic generated by a client is forwarded by the FortiGate to the upstream proxy, then the upstream
proxy forwards it to the server.

Example configuration:

1. Configure the web proxy forwarding server:


config web-proxy forward-server
edit "PC_03"
set ip 172.16.200.46
set healthcheck enable
set monitor "http://www.google.ca"
next
end

2. Append the web proxy forwarding server to a firewall policy:


config firewall policy
edit 1
set name "LAN to WAN"
set uuid b89f6184-2a6b-51e9-5e2d-9b877903a308
set srcintf "port2"
set dstintf "port1"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set utm-status enable
set logtraffic all
set webproxy-forward-server "PC_03"
set fsso disable
set av-profile "av"

FortiOS 6.2.0 New Features Guide 349


Fortinet Technologies Inc.
Other

set ssl-ssh-profile "deep-custom"


set nat enable
next
end

Multiple Dynamic Header Count

This feature adds support for dynamic headers for web proxy profiles, as well as base64 encoding and append/new
options. Previously, web proxy profiles supported dynamic (or user defined) header content for filtering, but the format
was fixed and could not support multiple patterns in one header. With this features, multiple patterns are supported.
With the implementation of dynamic headers, an administrator only has to select the dynamic header, and the
FortiGate will automatically display the corresponding static value. For example, if the administrator selects the $client-
ip header in the profile, the FortiGate will display the actual client IP address.
The supported headers are:

$client-ip Client IP address

$user Authentication user name

$domain User domain name

$local_grp Firewall group name

$remote_grp Group name from authentication server

$proxy_name Proxy realm name

Example configuration:

As authentication is required, FSSO NTLM authentication is configured for this example.


1. Configure LDAP:
config user ldap
edit "ldap-kerberos"
set server "172.18.62.220"
set cnid "cn"a
set dn "dc=fortinetqa,dc=local"
set type regular
set username "CN=root,CN=Users,DC=fortinetqa,DC=local"
set password ENC
k9AF5nj3NInc11qORQ+WHUmNbCKGX/4d6MkzdBwPSnJQHNCEJBnVSiiMwQ1FKHIQFZVDFK3ACD/mCfJWyENnWBE6M3/
Qk3DweaRhlLjxSLSXs6H/R5oTCl3nrj5yFZEjDMZtbWwjwC7MtgxzXZ0ztLqFeVPhy8jzmxBJLwvan2nUnu/Xe5ujkK
XdOxRm1cAI7q/shg==
next
end

2. Configure FSSO:
config user fsso
edit "1"
set server "172.18.62.220"
set password ENC
I4b2VpJAM5AZsbqGsIJ/EfvYgbN3hmEU7O2PXU9YK0AbmpTiX7Evlo5xy74bkgPniWJrHJ49Gtx8mGb4HcGa2XKdD9b

FortiOS 6.2.0 New Features Guide 350


Fortinet Technologies Inc.
Other

STvgQqfCcZuLANBSrJg/Qy4V7RyrkKp8B3Zsbj7nN+Rzg5FAoNhnw1Hrf0ZvdSTKvAGN5e+OtILz7lR9jaudydIOpy6
0qq4I7RHeGiVQiXA==
next
end

3. Configure a user group:


config user group
edit "NTLM-FSSO"
set group-type fsso-service
set member "FORTINETQA/FSSO"
next
end

4. Configure an authentication scheme:


config authentication scheme
edit "au-sch-ntlm"
set method ntlm
next
end

5. Configure an authentication rule:


config authentication rule
edit "au-rule-fsso"
set srcaddr "all"
set active-auth-method "au-sch-ntlm"
next
end

6. Create a web proxy profile, adding the new dynamic and custom via header
config web-proxy profile
edit "test"
set log-header-change enable
config headers
edit 1
set name "client-ip"
set content "$client-ip"
next
edit 2
set name "Proxy-Name"
set content "$proxy_name"
next
edit 3
set name "user"
set content "$user"
next
edit 4
set name "domain"
set content "$domain"
next
edit 5
set name "local_grp"
set content "$local_grp"
next
edit 6
set name "remote_grp"

FortiOS 6.2.0 New Features Guide 351


Fortinet Technologies Inc.
Other

set content "$remote_grp"


next
edit 7
set name "Via"
set content "Fortigate-Proxy"
next
end
next
end

7. In the proxy policy, append the web proxy profile created in the previous step:
config firewall proxy-policy
edit 1
set uuid bb7488ee-2a6b-51e9-45c6-1715bdc271d8
set proxy explicit-web
set dstintf "port1"
set srcaddr "all"
set dstaddr "all"
set service "web"
set action accept
set schedule "always"
set logtraffic all
set groups "NTLM-FSSO"
set webproxy-profile "test"
set utm-status enable
set av-profile "av"
set webfilter-profile "content"
set ssl-ssh-profile "deep-custom"
next
end

8. Once traffic is being generated from the client, look at the web filter logs to verify that it is working.
All the added header fields display their corresponding value in the Change headers section at the bottom of the
Log Details screen.
1: date=2019-02-07 time=13:57:24 logid="0344013632" type="utm" subtype="webfilter"
eventtype="http_header_change" level="notice" vd="vdom1" eventtime=1549576642 policyid=1
transid=50331689 sessionid=1712788383 user="TEST21@FORTINETQA" group="NTLM-FSSO"
profile="test" srcip=10.1.100.116 srcport=53278 dstip=172.16.200.46 dstport=80
srcintf="port2" srcintfrole="undefined" dstintf="port1" dstintfrole="undefined" proto=6
service="HTTP" url="http://172.16.200.46/" agent="curl/7.22.0" chgheaders="Added=client-ip:
10.1.100.116|Proxy-Name: 1.1 100D.qa|user: TEST21|domain: FORTINETQA|local_grp: NTLM-
FSSO|remote_grp: FORTINETQA/FSSO|Via: Fortigate-Proxy"

FortiOS 6.2.0 New Features Guide 352


Fortinet Technologies Inc.
Other

Restricted SaaS Access (0365, G-Suite, Dropbox)

This feature extends the web-proxy profile to allow for specifying access permissions for Microsoft Office 365, Google G
Suite, and Dropbox. It works by inserting vendor defined headers that restrict access to the specific accounts. Custom
headers for any destination can also be inserted.
The web-proxy profile can be configured with the required headers for the specific destinations, and then applied directly
into a policy to control the header's insertion.
To implement Office 365 tenant restriction, Dropbox network access control, and Google G Suite account access
control on FortiGate, you need to:
1. Configure a web-proxy profile according to the vendors' specifications:
a. Define the traffic destination (service provider).
b. Define the header name, defined by the service provider.
c. Define the value that will be inserted into the traffic, defined by your settings.
2. Apply the web-proxy profile to a policy.
The following example creates a web-proxy profile for Office 365, G Suite, and Dropbox access control. Note that, due
to vendors' changing requirements, this example may no longer be in compliance with the vendors' official guidelines.
1. Configure the web-proxy profile:
config web-proxy profile
edit "SaaS-Tenant-Restriction"
set header-client-ip pass
set header-via-request pass
set header-via-response pass
set header-x-forwarded-for pass
set header-front-end-https pass
set header-x-authenticated-user pass
set header-x-authenticated-groups pass
set strip-encoding disable
set log-header-change disable
config headers
edit 1

FortiOS 6.2.0 New Features Guide 353


Fortinet Technologies Inc.
Other

set name "Restrict-Access-To-Tenants" <---header name defined by Office365


spec. input EXACTLY as it is
set dstaddr "Microsoft Office 365" <----built-in destination address for
Office365
set action add-to-request
set base64-encoding disable
set add-option new
set protocol https http
set content "contoso.onmicrosoft.com,fabrikam.onmicrosoft.com" <----your
tenants restriction configuration
next
edit 2
set name "Restrict-Access-Context" <----header name defined by Office365
spec. input EXACTLY as it is
set dstaddr "Microsoft Office 365" <----build-in destination address for
Office365
set action add-to-request
set base64-encoding disable
set add-option new
set protocol https http
set content "456ff232-35l2-5h23-b3b3-3236w0826f3d" <----your directory ID
can find in Azure portal
next
edit 3
set name "X-GooGApps-Allowed-Domains" <----header name defined by Google G
suite.
set dstaddr "G Suite" <---- built-in G Suite destination address
set action add-to-request
set base64-encoding disable
set add-option new
set protocol https http
set content "abcd.com" <----your domain restriction when you create G
Suite account
next

edit 4
set name "X-Dropbox-allowed-Team-Ids" <----header defined by Dropbox
set dstaddr "wildcard.dropbox.com" <----build-in destination address for
Dropbox
set action add-to-request
set base64-encoding disable
set add-option new
set protocol https http
set content "dbmid:FDFSVF-DFSDF" <----your team-Id in Dropbox
next
end
next
end

2. Apply the web-proxy profile to a firewall policy:


config firewall policy
edit 1
set name "WF"
set uuid 09928b08-ce46-51e7-bd95-422d8fe4f200
set srcintf "port10" "wifi"
set dstintf "port9"

FortiOS 6.2.0 New Features Guide 354


Fortinet Technologies Inc.
Other

set srcaddr "all"


set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set webproxy-profile "SaaS-Tenant-Restriction"
set utm-status enable
set utm-inspection-mode proxy
set logtraffic all
set webfilter-profile "blocktest2"
set application-list "g-default"
set profile-protocol-options "protocol"
set ssl-ssh-profile "protocols"
set nat enable
next
end

References:

Office 365 - Use Tenant Restrictions to manage access to SaaS cloud applications
G Suite - Block access to consumer accounts
Dropbox - Network Control

Protocols

This section lists other new features added to FortiOS related to protocols.
l TLS 1.3 Support on page 355
l SMBv2 Support (SSL VPN) on page 357
l PTPv2 (Slave Mode) on page 357
l Telnet Disabled Option on page 359
l SHA-1 Authentication Support (for NTPv4) on page 361
l DNS over TLS on page 362
l LLDP Reception on page 363
l Direct IP Support for LTE/4G on page 365

TLS 1.3 Support

SSL VPN

TLS 1.3 support has been added for SSL VPN. The following steps are required for a client to establish an SSL VPN
connection with TLS 1.3 to the FortiGate:
1. Configure TLS 1.3 support using the FortiOS CLI.
2. Configure the SSL VPN and firewall policy.
3. For Linux clients, ensure OpenSSL 1.1.1a is installed.

FortiOS 6.2.0 New Features Guide 355


Fortinet Technologies Inc.
Other

4. Use OpenSSL with the TLS 1.3 option to connect to SSL VPN.
5. Ensure that the SSL VPN connection has been established with TLS 1.3.

This feature can only be used with endpoints that have FortiClient 6.2.0 or a later version
installed. Earlier FortiClient versions do not support TLS 1.3.

To configure TLS 1.3 support using the FortiOS CLI:

A new command for TLS 1.3 has been added under config vpn ssl setting. By default, TLS 1.3 support is
enabled. You can enable TLS 1.3 support using the following FortiOS CLI command:
config vpn ssl setting
set tlsv1-3 enable
end

To configure SSL VPN and the firewall policy:

Configure the SSL VPN settings and firewall policy as required.

To ensure OpenSSL 1.1.1a is installed on the Linux client:

Run the following commands in the terminal on the Linux client:


root@PC1:~/tools# openssl
OpenSSL> version

If OpenSSL 1.1.1a is installed, the system displays a response like the following:
OpenSSL 1.1.1a 20 Nov 2018

To connect to SSL VPN using OpenSSL with TLS 1.3:

On the Linux client, use OpenSSL to connect to FortiGate SSL VPN with TLS 1.3 by running the following command:
#openssl s_client -connect 10.1.100.10:10443 -tls1_3

To ensure that SSL VPN connection is established with TLS 1.3:

Run the following commands in the FortiOS CLI to ensure that the SSL VPN connection has been established with TLS
1.3:
# diagnose debug application sslvpn -1
# diagnose debug enable

The system should display a response like the following:


[207:root:1d]SSL established: TLSv1.3 TLS_AES_256_GCM_SHA384

Deep Inspection (Flow Based)

FortiOS now supports TLS 1.3 for policies that have the following security profiles applied:
l Web Filter profile with flow-based inspection mode enabled
l Deep inspection SSL/SSH Inspection profile

FortiOS 6.2.0 New Features Guide 356


Fortinet Technologies Inc.
Other

Consider that a policy with the above Web Filter and SSL/SSH Inspection profiles applied is enabled. A client attempts
to access a website that supports TLS 1.3. FortiOS sends the traffic to the IPS engine. The IPS engine then decodes
TLS 1.3, and the client is able to access the website.

TLS 1.3 support is only available for IPS engine 4.205 and later versions.

SMBv2 Support (SSL VPN)

On all FortiGate models, SMBv2 is enabled by default for SSL VPN.


Client PCs can access the SMBv2 server using SSL VPN web-only mode.
This version adds two new commands under config vpn ssl web portal.

Sample configuration

You must use the CLI to use this feature.

To configure SMBv2:

1. Run config vpn ssl web portal:


config vpn ssl web portal
edit portal-name
set smb-min-version smbv2
set smb-max-version smbv3
end

2. After running config vpn ssl web portal, configure SSL VPN and firewall policies as usual.
3. Then connect to the SSL VPN web portal and create an SMB bookmark for the SMBv2 server.
4. Click the bookmark to connect to the SMBv2 server.
5. In the FortiGate, use package capture to verify that SMBv2 works:

PTPv2 (Slave Mode)

Precision Time Protocol (PTP) is used to synchronize network clocks. It is best suited to situations where time accuracy
is of the utmost importance, as it supports accuracy in the sub-microsecond range. Conversely, NTP accuracy is in the
range of milliseconds or tens of milliseconds.
The following CLI commands have been added:
config system ptp
set status {enable | disable}
set mode {multicast | hybrid}
set delay-mechanism {E2E | P2P}
set request-interval <integer>
set interface <interface>
end

FortiOS 6.2.0 New Features Guide 357


Fortinet Technologies Inc.
Other

Command Description

status {enable | disable} Enable/disable setting the FortiGate system time by synchronizing with an PTP
server (default = disable).

mode {multicast | hybrid} Use multicast or hybrid transmission (default = multicast).

delay-mechanism {E2E | P2P} Use End to End (E2E) or Peer to Peer (P2P) delay detection (default = E2E).

request-interval <integer> The logarithmic mean interval between the delay request messages sent by the
client to the server, in seconds (default = 1).

interface <interface> The interface that the PTP client will reply through.

This example uses the following topology:

To configure a FortiGate to act as a PTP client that synchronizes itself with a Linux PTP server:

1. Enable debug messages:


diagnose debug application ptpd -1
This command will provide details to debug the PTP communication with the server.
2. Check the system date:
execute date
current date is: 2019-01-01
3. Configure PTP in global mode:
config system ptp
set status enable
set interface wan2
end
The following, or similar, debug message will be shown:
FGT_A (global) # [notice]PTPDv2 started successfully on wan2 using "slaveonly" preset
(PID 5958)
[info]TimingService.PTP0: PTP service init
[info]Observed_drift loaded from kernel: 0 ppb
[notice]Now in state: PTP_LISTENING
[warning]TimingService: No TimingService available for clock sync
[info]New best master selected: 000c29fffe236b0c(unknown)/1
[notice]Now in state: PTP_SLAVE, Best master: 000c29fffe236b0c(unknown)/1
(IPv4:172.16.200.55)
[notice]Received first Sync from Master
[critical]Offset above 1 second. Clock will step.
[warning]Change time from Tue Jan 1 00:00:28 2019 to Mon Jan 14 15:11:10 2019.
[notice]Now in state: PTP_LISTENING
[info]New best master selected: 000c29fffe236b0c(unknown)/1

FortiOS 6.2.0 New Features Guide 358


Fortinet Technologies Inc.
Other

[notice]Now in state: PTP_SLAVE, Best master: 000c29fffe236b0c(unknown)/1


(IPv4:172.16.200.55)
[notice]Received first Sync from Master
[info]TimingService.PTP0: now available
[notice]Received first Delay Response from Master
[notice]Received new Delay Request interval 0 from Master (was: 1)
[notice]TimingService.PTP0: elected best TimingService
[info]TimingService.PTP0: acquired clock control
4. Check the system date again after synchronization with the PTP server
execute date
current date is: 2019-08-20

Telnet Disabled Option

A new CLI option has been added that completely disables Telnet, removing the GUI options per interface and disabling
the Telnet daemon.
When Telnet is disabled, the Telnet port cannot be configured and access cannot be enabled on interfaces.

Telnet is enabled by default.

To disable Telnet:

config system global


set admin-telnet disable
end

When disabled, the Telnet port is removed from the System > Settings page, and TELNET is no longer an
administrative access option on the Network > Interfaces page.

FortiOS 6.2.0 New Features Guide 359


Fortinet Technologies Inc.
Other

To enable Telnet:

config system global


set admin-telnet enable
set admin-telnet-port <port>
end

When Telnet is enabled, the port can be configured on the System > Settings page, and TELNET can be selected can
be selected as an administrative access option on the Network > Interfaces page.

FortiOS 6.2.0 New Features Guide 360


Fortinet Technologies Inc.
Other

SHA-1 Authentication Support (for NTPv4)

SHA-1 authentication support allows the NTP client to verify that servers are known and trusted and not intruders
masquerading (accidentally or intentionally) as legitimate servers. In cryptography, SHA-1 is a cryptographic hash
algorithmic function.

In this version, SHA-1 authentication support is only available for NTP clients, not NTP
servers.

The following CLI commands have been added to config ntpserver:

Command Description

authentication <enable | Enable/disable MD5/SHA1 authentication (default = disable).


disable>
key <passwd> Key for MD5/SHA1 authentication. Enter a password value.

key-id Key ID for authentication. Enter an integer value from <0> to <4294967295>.

For example, to configure authentication on a FortiGate NTP client:


config system ntp
set ntpsync enable
set type custom
set syncinterval 1
config ntpserver
edit 883502
set server "10.1.100.11"
set authentication enable
set key
ENCi9NmcqsV3xBJvOkgIL3lFxA8mnNs2XKfB7spOQoUw4cm8FOOP0nrCbqx6rJ+om95+hVUHpaVZmepdd
4KznPlAHNiuliPgPOk

FortiOS 6.2.0 New Features Guide 361


Fortinet Technologies Inc.
Other

set key-id 1
next
end
end

If NTP authentication is set up correctly, diag sys ntp status shows server-version=4. For example:
diag sys ntp status
synchronized: yes, ntpsync: enabled, server-mode: disabled
ipv4 server(10.1.100.11) 10.1.100.11 -- reachable(0xff) S:4 T:6 selected
server-version=4, stratum=3

DNS over TLS

A new option is added to DNS Profile, forcing DNS over TLS for added security.
DNS over TLS (DoT) is a security protocol for encrypting and wrapping Domain Name System (DNS) queries and
answers via the Transport Layer Security (TLS) protocol. The goal of the method is to increase user privacy and security
by preventing eavesdropping and manipulation of DNS data via man-in-the-middle attacks.
Below is a typical topology.
FortiGate (client/server)<-----(DNS over TLS)<-----------------> DNS server/client

To configure DNS over TLS using the GUI:

1. Go to Network > DNS.


2. In DNS over TLS, select Enforce.

To configure DNS over TLS using the CLI:

FGT_A (global) # config system dns

FGT_A (dns) # show


config system dns
set primary 8.8.8.8
set dns-over-tls enforce
end

FGT_A (dns) # set dns-over-tls


disable Disable DNS over TLS.
enable Use TLS for DNS queries if TLS is available.
enforce Use only TLS for DNS queries. Does not fall back to unencrypted DNS queries if TLS
is unavailable.

FGT_A (dns) # set dns-over-tls enforce

FortiOS 6.2.0 New Features Guide 362


Fortinet Technologies Inc.
Other

<Enter>

FGT_A (dns) # set dns-over-tls enforce

FGT_A (dns) # set ssl-certificate


<string> please input string value
Fortinet_CA_SSL local
Fortinet_CA_Untrusted local
Fortinet_Factory local
Fortinet_SSL local
Fortinet_SSL_DSA1024 local
Fortinet_SSL_DSA2048 local
Fortinet_SSL_ECDSA256 local
Fortinet_SSL_ECDSA384 local
Fortinet_SSL_RSA1024 local
Fortinet_SSL_RSA2048 local
Server local
testercert local

FGT_A (dns) # set ssl-certificate

LLDP Reception

This feature receives and stores LLDP messages, and makes the LLDP information available via the CLI, REST API,
and SNMP. The feature can be enabled on three levels: globally, per VDOM, or per interface.
In the GUI, go to User & Device > Device Inventory to view the information.

To configure LLDP reception globally:

config system global


set lldp-reception enable
end

To configure LLDP reception per VDOM:

config system setting


set lldp-reception enable
end

FortiOS 6.2.0 New Features Guide 363


Fortinet Technologies Inc.
Other

To configure LLDP reception per interface:

config system interface


edit <port>
set lldp-reception enable
next
end

To view the received LLDP information in the CLI:

diagnose user device list


hosts
vd root/0 44:0a:a0:0a:0a:0a gen 3 req S/2
created 10290s gen 1 seen 0s port3 gen 1
ip 172.22.22.22 src lldp
type 20 'Other Network Device' src lldp id 155 gen 2
os 'Artist EOS ' version '4.20.4' src lldp id 155
host 'artist' src lldp

To view the received LLDP information in the REST API:

"http_method":"GET",
"results":[
{
"mac":"90:9c:9c:c9:c9:90",
"chassis_id":"90:9C:9C:C9:C9:90",
"port":19,
"port_id":"port12",
"port_desc":"port12",
"system_name":"S124DN3W00000000",
"system_desc":"FortiSwitch-124D v3.6.6,build0416,180515 (GA)",
"ttl":120,
"addresses":[
{
"type":"ipv4",
"address":"192.168.1.99"
}
]
}
],
"vdom":"root",
"path":"network",
"name":"lldp",
"action":"neighbors",
"status":"success",
"serial":"FG201E4Q00000000",
"version":"v6.2.0",
"build":866
}

{
"http_method":"GET",
"results":[
{
"name":"port1",

FortiOS 6.2.0 New Features Guide 364


Fortinet Technologies Inc.
Other

"rx":320,
"neighbors":1
}
],
"vdom":"root",
"path":"network",
"name":"lldp",
"action":"ports",
"mkey":"port1",
"status":"success",
"serial":"FG201E4Q00000000",
"version":"v6.2.0",
"build":866
}

Direct IP Support for LTE/4G

This project introduces Direct IP support when using LTE/4G modems.


Direct IP is a public IP address that is assigned to a computing device, which allows the device to directly access the
Internet.
When an LTE modem is enabled for FortiGate, a DHCP interface is created. As a result, FortiGate can acquire direct IP,
which includes IP, DNS, and gateway, from the carrier's LTE network.
Since some LTE modems require users to input the access point name for the LTE network, the LTE modem
configuration allows Access Point Name (APN) to be set.
LTE modem can only be enabled by using the CLI.

To enable direct IP support using the CLI:

1. Enable LTE modem.


config system lte-modem
set status enable
end
2. Check that LTE interface is created.
config system interface
edit "wwan"
set vdom "root"
set mode dhcp
set status down
set distance 1
set type physical
set snmp-index 23
next
end
Shortly after LTE modem joins carriers's network, wwan will be enabled and granted direct IP:
FortiGate-600D # config system interface
FortiGate-600D (interface) # edit wwan
FortiGate-600D (wwan) # get
name : wwan
....
ip : 100.112.75.43 255.255.255.248
....

FortiOS 6.2.0 New Features Guide 365


Fortinet Technologies Inc.
Other

status : up
....
defaultgw : enable
DHCP Gateway : 100.112.75.41
Lease Expires : Thu Feb 21 19:33:27 2019
dns-server-override : enable
Acquired DNS1 : 184.151.118.254
Acquired DNS2 : 70.28.245.227
....
PC can reach internet via the following firewall policy:
config firewall policy
....
edit 5
set name "LTE"
set uuid 61880e9a-36ce-51e9-a4f4-15cc3ffc25f3
set srcintf "port9"
set dstintf "wwan"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set utm-status enable
set fsso disable
set nat enable
next
end

With LTE modem enabled, you can use the GUI to view the LTE interface and check the acquired IP, DNS, and
gateway:

You can configure the firewall policy that utilizes this LTE interface:

FortiOS 6.2.0 New Features Guide 366


Fortinet Technologies Inc.
Other

Limitations:
l Most LTE modems have a preset APN in the SIM card. As a result, the APN doesn't need to be set in FortiOS
configuration. In cases where the Internet cannot be accessed, you can consult with your carrier about APN (for
example, inet.bell.ca) and set the APN in LTE modem configuration.
config system lte-modem
set status enable
set apn "inet.bell.ca"
end
l Some FortiGate units have built-in LTE modems, such as the FortiGate-30E-3G4G. This type of FortiGate has LTE
modem enabled by default. Firewall policy via LTE interface is also created by default. After the user plugs in a SIM
card, the user's network devices can reach the Internet.
FWF-30E-3G4G default configuration:
config system lte-modem
set status enable
set extra-init ''
set manual-handover disable
set force-wireless-profile 0
set authtype none
set apn ''
set modem-port 255
set network-type auto
set auto-connect disable
set gpsd-enabled disable
set data-usage-tracking disable
set gps-port 255
end
config firewall policy
....
edit 3
set uuid f7c77cc6-36d1-51e9-2899-a7040791330c
set srcintf "internal"

FortiOS 6.2.0 New Features Guide 367


Fortinet Technologies Inc.
Other

set dstintf "wwan"


set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set nat enable
next
end

Recognize AnyCast Address in Geo-IP Blocking

An AnyCast IP can be advertised from multiple locations and the router selects a path based on latency, distance, cost,
number of hops, etc. This technique is widely used by providers to route users to the closest server. Since the IP is
hosted in multiple geographic locations, there is no way to specify one single location to that IP.
This version introduces an option to bypass AnyCast IP ranges in Geo-IP blocking. ISDB contains a list of confirmed
AnyCast IP ranges that can be used for this purpose.
When source/destination is set to geoip, you can enable the geoip-anycast option. When enabled, IPs where the
AnyCast option is set to 1 in geoip_db are bypassed in country matching and blocking.

You can only use CLI to configure this feature. See the following example.

To enable geoip-anycast setting in a policy:

config firewall policy


edit 1
set name "policyid-1"
set uuid dfcaec9c-e925-51e8-cf3e-fed9a1d42a1c
set srcintf "wan2"
set dstintf "wan1"
set srcaddr "all"
set dstaddr "test-geoip-CA_1"
set action accept
set schedule "always"
set service "ALL"
set geoip-anycast enable
set logtraffic all
set nat enable
next
end

To check the geoip-anycast option for an IP address:

diag geoip ip2country 1.0.0.1


1.0.0.1 - Australia, is anycast ip

1.0.0.1 is the AnyCast IP.

FortiOS 6.2.0 New Features Guide 368


Fortinet Technologies Inc.
Other

GTP in Asymmetric Routing

FortiOS 6.2.0 improves communication for FortiGates acting as a GPRS Tunneling Protocol (GTP) firewall that is
deployed in asymmetric routing environments. Previously in asymmetric routing environments, the GTP-C reply might
be processed before the GTP-C request was fully synchronized by FortiGate Session Life Support Protocol (FGSP),
which resulted in dropped sessions. With FortiOS 6.2.0, communication is improved by adding a new set gtp-
asym-fgsp command in system settings that allows two members in FGSP to synchronize the GTP-C message.

Example

FOC-A-171 and FOC-B-172 are two FGSP members.


SGSN Simulator (10.1.100.60) generates a GTP-C request that is passed through FGT-175 to reach FGSP
member FOC-A-171, but the response GTP-C from GGSN Simulator(172.16.200.61) is passed through FGT-176 to
reach another FGSP member FOC-B-172. Previously in this asymmetric topology, FOC can't help establish the GTP
tunnel between SGSN Simulator and GGSN Simulator.
However with the set gtp-asym-fgsp command, two members in FGSP can synchronize the GTP-C message. In
both FOC-A-171 and FOC-B-172, when the set gtp-asym-fgsp command is enabled, the SGSN Simulator can
obtain the correct tunnel private IP address(192.168.0.2) and establish the GTP tunnel with GGSN Simulator.
Check on the SGSN simulator:
root@mmsclient:~# sgsnemu -c /root/openggsn-0.84/examples/fgt_sgsnemu.conf &
[1] 5592
root@mmsclient:~# cmdline_parser_configfile
remote: 172.16.200.61
listen: 10.1.100.60
conf: /root/openggsn-0.84/examples/fgt_sgsnemu.conf
debug: 1
imsi: 310150123456789
qos: 0x0b921f
charging: 0x800
apn: internet
msisdn: 6044301297
uid: mig
pwd: hemmelig
pidfile: ./sgsnemu.pid
statedir: ./
contexts: 1
timelimit: 0
createif: 1
ipup: /etc/sgsnemu/ip-up
ipdown: /etc/sgsnemu/ip-down
defaultroute: 1
pingrate: 1
pingsize: 56
pingcount: 0
pingquiet: 0

FortiOS 6.2.0 New Features Guide 369


Fortinet Technologies Inc.
Other

Using default DNS server


Local IP address is: 10.1.100.60 (10.1.100.60)
Remote IP address is: 172.16.200.61 (172.16.200.61)
IMSI is: 310150123456789 (0xf987654321051013)
Using NSAPI: 0
Using GTP version: 1
Using APN: internet
Using selection mode: 1
Using MSISDN: 6044301297
Initialising GTP library
openggsn[5592]: GTP: gtp_newgsn() started
Setting up interface
Done initialising GTP library
Sending off echo request
Setting up PDP context #0
Waiting for response from ggsn........
idletime.tv_sec 3, idleTime.tv_usec 0
Received echo response
idletime.tv_sec 3, idleTime.tv_usec 0
Received create PDP context response. IP address: 192.168.0.2 <--------NOTE

Check on FOC that the GTP tunnel was established successfully:


FOC-A-171(vdom1) # dia firewall gtp tunnel list
list gtp tunnels
-----------prof=gtpp ref=6 imsi=310150123456789 msisdn=6044301297 mei=unknown ms_
addr=192.168.0.2 s11_s4 0-----------
-----------index=00000001 life=2082(sec) idle=41(sec) vd=3 ver=1-----------
c_pkt=4 c_bytes=506 u_pkt=0 u_bytes=0
downlink cfteid:
addr=10.1.100.60 teid=0x00000001 role=control vd=3 intf_type=gn-gp sgsn gtp-c
uplink cfteid:
addr=172.16.200.61 teid=0x00000001 role=control vd=3 intf_type=gn-gp ggsn gtp-c
1/1 bearers:
id=0 linked_id=0 type=regular dead=0 apn=internet selection=ms-provided-apn user_
addr=192.168.0.2 u_pkt=0 u_bytes=0
2 fteids:
addr=10.1.100.60 teid=0x00000001 role=data vd=3 intf_type=gn-gp sgsn gtp-u
addr=172.16.200.61 teid=0x00000001 role=data vd=3 intf_type=gn-gp ggsn gtp-u

Firewall - Allow to Customize Default Service

This feature allows the default service port range to be customized using the following CLI command:
config system global
set default-service-source-port <port range>
end

Where <port range> is the new default service port range, that can have a minimum value down to 0 and a
maximum value up to 65535. The default value is 1-65535.

This change takes effect on the TCP/UDP protocol.

FortiOS 6.2.0 New Features Guide 370


Fortinet Technologies Inc.
Other

Firewall - Anti-Replay Option Per-Policy

When the global anti-replay option is disabled, the FortiGate does not check TCP flags in packets. This feature adds a
per policy anti-replay option that overrides the global setting. This allows you to control whether or not TCP flags are
checked per policy.
In this example, a policy is created with the anti-replay option enabled so that TCP flags are checked:
config firewall policy
edit 1
set name "policyid-1"
set uuid dfcaec9c-e925-51e8-cf3e-fed9a1d42a1c
set srcintf "wan2"
set dstintf "wan1"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set anti-replay enable
set logtraffic all
set nat enable
next
end

NTLM Extensions

FortiOS 6.2 extends agentless Windows NT LAN Manager (NTLM) authentication to include support for the following
items:
l Multiple servers
l Individual users
Previously only one server and only group matching were supported.
You can now use multiple domain controller servers for the agentless NTLM for load balancing and high service stability.
You can also use user-based matching in groups for Kerberos and agentless NTLM. For Kerberos and agentless NTLM,
FortiOS matches the user's group information from an LDAP server.

To support multiple domain controllers for agentless NTLM:

1. Configure an LDAP server:


config user ldap
edit "ldap-kerberos"
set server "172.18.62.177"
set cnid "cn"
set dn "dc=fortinetqa,dc=local"
set type regular
set username "CN=root,CN=Users,DC=fortinetqa,DC=local"
set password ENC
PD0++FaJxGwPta/dE4GFboqOJpk4WNHk12JAMBQrn6s3hkMWlhN+Hg36ULQOMl9/OvbJ7lJFgPnpFv8Z

FortiOS 6.2.0 New Features Guide 371


Fortinet Technologies Inc.
Other

4QnZeBtzIcqenr2jmcYPTsbegmSjEPyO6/vl4rX5ZRfF2l3adKcCf56575TkRpIdlYELBpc44eNfoxA2
KWqmANKkzOnv2w12eDEXanXkHaDgs8WBBnvZnQ==
next
end
2. Configure multiple Domain Controllers:
config user domain-controller
edit "dc1"
set ip-address 172.18.62.177
config extra-server
edit 1
set ip-address 172.18.62.220
next
end
set ldap-server "ldap-kerberos"
next
end
3. Create an authenticate scheme and rule:
config authentication scheme
edit "au-ntlm"
set method ntlm
set domain-controller "dc1"
next
end
config authentication rule
edit "ru-ntlm"
set srcaddr "all"
set ip-based disable
set active-auth-method "au-ntlm"
next
end
4. In the proxy policy, append the user group for authorization:
config firewall proxy-policy
edit 1
set uuid 6cfe58e4-2ff1-51e9-6b4c-a7d4a8db0f30
set proxy explicit-web
set dstintf "port1"
set srcaddr "all"
set dstaddr "all"
set service "web"
set action accept
set schedule "always"
set groups "ldap-group"
set utm-status enable
set av-profile "av"
set ssl-ssh-profile "deep-custom"
next
end
This configuration uses a round-robin method. When the first user logs in, FortiGate sends the authentication
request to the first domain controller. Later when another user logs in, FortiGate sends the authentication request
to another domain controller. After the user successfully logs in, you can verify the behavior by using the following
CLI:
FGT_A (vdom1) # diagnose wad user list
ID: 1825, IP: 10.1.100.71, VDOM: vdom1
user name : test1
duration : 497

FortiOS 6.2.0 New Features Guide 372


Fortinet Technologies Inc.
Other

auth_type : Session
auth_method : NTLM
pol_id : 1 g_id : 5
user_based : 0 e
xpire : 103
LAN:
bytes_in=2167 bytes_out=7657
WAN:
bytes_in=3718 bytes_out=270

To support individual users for agentless NTLM:

1. Configure an LDAP server:


config user ldap
edit "ldap-kerberos"
set server "172.18.62.177"
set cnid "cn"
set dn "dc=fortinetqa,dc=local"
set type regular
set username "CN=root,CN=Users,DC=fortinetqa,DC=local"
set password ENC
PD0++FaJxGwPta/dE4GFboqOJpk4WNHk12JAMBQrn6s3hkMWlhN+Hg36ULQOMl9/OvbJ7lJFgPnpFv8Z
4QnZeBtzIcqenr2jmcYPTsbegmSjEPyO6/vl4rX5ZRfF2l3adKcCf56575TkRpIdlYELBpc44eNfoxA2
KWqmANKkzOnv2w12eDEXanXkHaDgs8WBBnvZnQ==
next
end
2. Configure user group and allow user based matching in the group:
config user group
edit "ldap-group"
set member "ldap" "ldap-kerberos"
config match
edit 1
set server-name "ldap-kerberos"
set group-name "test1"
next
end
next
end
3. Create an authentication scheme and rule:
config authentication scheme
edit "au-ntlm"
set method ntlm
set domain-controller "dc1"
next
end
config authentication rule
edit "ru-ntlm"
set srcaddr "all"
set ip-based disable
set active-auth-method "au-ntlm"
next
end
4. In the proxy policy, append the user group for authorization:
config firewall proxy-policy
edit 1
set uuid 6cfe58e4-2ff1-51e9-6b4c-a7d4a8db0f30

FortiOS 6.2.0 New Features Guide 373


Fortinet Technologies Inc.
Other

set proxy explicit-web


set dstintf "port1"
set srcaddr "all"
set dstaddr "all"
set service "web"
set action accept
set schedule "always"
set groups "ldap-group"
set utm-status enable
set av-profile "av"
set ssl-ssh-profile "deep-custom"
next
end
This implementation lets you configure a single user instead of a whole group, and FortiGate will allow user named
test1. You can verify the configuration by using the CLI:
diagnose wad user list
ID: 1827, IP: 10.1.15.25, VDOM: vdom1
user name : test1
duration : 161
auth_type : Session
auth_method : NTLM
pol_id : 1
g_id : 5
user_based : 0
expire : 439
LAN:
bytes_in=1309 bytes_out=4410
WAN:
bytes_in=2145 bytes_out=544

Option to Disable Stateful SCTP Inspection

You now have the option to disable stateful SCTP inspection. This option is useful when FortiGates are deployed in a
High Availability (HA) cluster that uses the FortiGate Clustering Protocol (FGCP) and virtual clustering in a multihoming
topology. In this configuration, the primary Stream Control Transmission Protocol (SCTP) path traverses the master
FortiGate node by using its active VDOM (for example, VDOM1), and the backup SCTP path traverses the other passive
FortiGate node by using its active VDOM (for example VDOM2).
When stateful SCTP inspection is enabled, SCTP heartbeat traffic will fail via the backup path because the primary path
goes through a different platform and VDOM. Since there is no state sharing between VDOMs, the passive FortiGate is
not aware of the original SCTP session and drops the heartbeats because of no associated sessions.
You can now use the following command to disable stateful inspection of SCTP, which allows the passive node to
permit the SCTP heartbeats to pass:
config sys settings
set sctp-session-without-init enable
end

When set to enable, SCTP session creation without SCTP INIT is enabled. When set to disable, SCTP session
creation without SCTP INIT is disabled. The default setting is disabled.
Following is an example topology and scenario:

FortiOS 6.2.0 New Features Guide 374


Fortinet Technologies Inc.
Other

In this example, FGT_A and FGT_B are in HA a-p mode with two virtual clusters. Two masters exist on different
FortiGate units. PC1 eth1 can access PC5 eth1 through Vdom1, and PC1 eth2 can access PC5 eth2 through Vdom2.
On PC5, listening for SCTP connection:
sctp_darn -H 172.16.200.55 -B 172.17.200.55 -P 2500 -l

On PC1, start SCTP connection:


sctp_darn -H 10.1.100.11 -B 20.1.100.11 -P 2600 -c 172.16.200.55 -c 172.17.200.55 -p 2500 -s

SCTP 4-way handshake is on one VDOM, and a session is created on that VDOM. With the default configuration, there
is no session on any other VDOM, and the heartbeat on another path (another VDOM) is dropped. After enabling
sctp-session-without-init, the other VDOM creates the session when it receives the heartbeat, and the
heartbeat is forwarded.

HA Failover Condition - SSD Failure

This feature adds a new HA failover condition that is triggered by an SSD failure.

FortiOS 6.2.0 New Features Guide 375


Fortinet Technologies Inc.
Other

To enable an SSD failure triggering HA failover:

config system ha
set ssd-failover enable
end

Option to Fragment IP Packets Before IPSec Encapsulation

A new ip-fragmentation option has been added to control fragmentation of packets before IPsec encapsulation,
which can benefit packet loss in some environments.
The following options are available for the ip-fragmentation variable:

Option Description

pre-encapsulation Fragment before IPsec encapsulation.

post-encapsulation (default Fragment after IPsec encapsulation (RFC compliant).


value)

You can only control this option using the CLI:


config vpn ipsec phase1-interface
edit "demo"
set interface "port1"
set authmethod signature
set peertype any
set net-device enable
set proposal aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1
set ip-fragmentation pre-encapsulation
set remote-gw 172.16.200.4
set certificate "Fortinet_Factory"
next
end

DHCP Relay Agent Information Option

This feature adds DHCP option 82 (DHCP relay information option). It can help protect the FortiGate against attacks
such as spoofing (or forging) of IP and MAC addresses, and DHCP IP address starvation.
The following CLI variables are added to or modified in the config system dhcp server > config
reserved-address command:

circuit-id-type {hex | DHCP option type, hex or string (default).


string}
circuit-id <value> Option 82 circuit ID of the client that will get the reserved IP address.
Format: vlan-mod-port
l vlan: VLAN ID (2 bytes)

FortiOS 6.2.0 New Features Guide 376


Fortinet Technologies Inc.
Other

l mod: 1 = snoop, 0 = relay (1 byte)


l port: port number (1 byte)
remote-id-type {hex | DHCP option type, hex or string (default).
string}
remote-id <value> Option 82 remote ID of the client that will get the reserved IP address.
Format: the MAC address of the client.
type {mac | option82} The DHCP reserved-address type, either mac (default) or option82 (newly
added).

To create an IP address assignment rule using option 82 in the GUI:

1. On the FortiGate, go to Network > Interfaces.


2. Edit and existing port, or create a new one.
3. Ensure that the Role is either LAN or Undefined.
4. Enable DHCP Server.
5. Configure address ranges and other settings as needed.

6. In the IP Address Assignment Rules table, click Create New. The Create New IP Address Assignment Rule
pane opens.

FortiOS 6.2.0 New Features Guide 377


Fortinet Technologies Inc.
Other

7. For the Type, select DHCP Relay Agent.

8. Enter the Circuit ID, Remote ID, and the IP address that will be reserved.
9. Click OK to create the rule.

To create an IP address assignment rule using option 82 with the CLI:

config system dhcp server


edit 1
set netmask 255.255.255.0
set interface "port4"
config ip-range
edit 1
set start-ip 100.100.100.1
set end-ip 100.100.100.99
next
edit 2
set start-ip 100.100.100.101
set end-ip 100.100.100.254
next
end
config reserved-address
edit 1
set type option82
set ip 100.100.100.12
set circuit-id-type hex
set circuit-id "00010102"
set remote-id-type hex
set remote-id "704ca5e477d6"
next
end
next
end

VLAN Inside VXLAN

In this version, VLANs can be assigned to VXLAN interfaces.

FortiOS 6.2.0 New Features Guide 378


Fortinet Technologies Inc.
Other

In a data center network where VXLAN is used to create a L2 overlay network and for multi-tenant environment, a
customer VLAN tag needs to be kept on VXLAN tunnel. This version introduces a solution where the VLAN tag can be
assigned to VXLAN interface.

You can only use CLI to configure this feature. See the following example.

To configure VLAN inside VXLAN:

1. Configure VXLAN.
config system vxlan
edit vxlan1
set interface port1
set vni 1000
set remote-ip 172.16.200.3
next
end

2. Configure system interface.


config system interface
edit vlan100
set vdom root
set vlanid 100
set interface dmz
next
edit vxlan100
set type vlan
set vlanid 100
set vdom root
set interface vxlan1
next
end

3. Configure software-switch.
config system switch-interface
edit sw1
set vdom root
set member vlan100 vxlan100
next
end

FortiOS 6.2.0 New Features Guide 379


Fortinet Technologies Inc.
Other

ECMP Acceleration in NAT Mode

In 6.0, Equal-Cost Multi-Path (ECMP) traffic is not offloaded to the NP6 processor in NAT mode. This is now supported
in 6.2.

Topology

Set up ECMP for both client and server on FortiGate. FortiGate uses ECMP through port1 (p1) and port2 (p2) to the
client and ECMP through port 3 (p3) and port 4 (p4) to the server.

Example

This example demonstrates how the feature works.

Session one

This session demonstrates symmetric traffic with symmetric routing. No auxiliary session for the initial session.
Set the priority in the static route to prefer p1 to p3 and reply p3 to p1. Verify that the session can be established and
offloaded to the NP6 processor and that session counters are correctly reflecting the status of the session.
session info: proto=17 proto_state=00 duration=27 expire=473 timeout=500 flags=00000000
sockflag=00000000 sockport=0 av_idx=0 use=4
origin-shaper=
reply-shaper=
per_ip_shaper=
class_id=0 ha_id=0 policy_dir=0 tunnel=/ vlan_cos=0/255
state=may_dirty npu route_preserve
statistic(bytes/packets/allow_err): org=60/2/1 reply=0/0/0 tuples=2
tx speed(Bps/kbps): 0/0 rx speed(Bps/kbps): 0/0
orgin->sink: org pre->post, reply pre->post dev=37->38/38->37 gwy=0.0.0.0/0.0.0.0
hook=pre dir=org act=noop 10.1.100.22:35101->172.16.204.44:5001(0.0.0.0:0)
hook=post dir=reply act=noop 172.16.204.44:5001->10.1.100.22:35101(0.0.0.0:0)
src_mac=90:6c:ac:19:19:58
misc=0 policy_id=1 auth_info=0 chk_client_info=0 vd=2
serial=00001c8e tos=ff/ff app_list=0 app=0 url_cat=0
rpdb_link_id = 00000000
dd_type=0 dd_mode=0
npu_state=0x000400
npu info: flag=0x91/0x00, offload=8/0, ips_offload=0/0, epid=129/0, ipid=142/0,
vlan=0x0017/0x0000

FortiOS 6.2.0 New Features Guide 380


Fortinet Technologies Inc.
Other

vlifid=142/0, vtag_in=0x0017/0x0000 in_npu=1/0, out_npu=1/0, fwd_en=0/0, qid=7/0


no_ofld_reason:
total session 1

Session two

Keep session one alive in the session table. Change the UDP session from client to server through p2, p3,
unidirectional. Verify that a new auxiliary session can be established and offloaded to the NP6 processor and that
session counters are correctly reflecting the status of session.
session info: proto=17 proto_state=00 duration=241 expire=495 timeout=500 flags=00000000
sockflag=00000000 sockport=0 av_idx=0 use=5
origin-shaper=
reply-shaper=
per_ip_shaper=
class_id=0 ha_id=0 policy_dir=0 tunnel=/ vlan_cos=0/255
state=may_dirty npu route_preserve
statistic(bytes/packets/allow_err): org=126/4/1 reply=0/0/0 tuples=2
tx speed(Bps/kbps): 0/0 rx speed(Bps/kbps): 0/0
orgin->sink: org pre->post, reply pre->post dev=37->38/38->37 gwy=0.0.0.0/0.0.0.0
hook=pre dir=org act=noop 10.1.100.22:35101->172.16.204.44:5001(0.0.0.0:0)
hook=post dir=reply act=noop 172.16.204.44:5001->10.1.100.22:35101(0.0.0.0:0)
src_mac=90:6c:ac:19:19:58
misc=0 policy_id=1 auth_info=0 chk_client_info=0 vd=2
serial=00001c8e tos=ff/ff app_list=0 app=0 url_cat=0
rpdb_link_id = 00000000
dd_type=0 dd_mode=0
npu_state=0x000400
npu info: flag=0x91/0x00, offload=8/0, ips_offload=0/0, epid=129/0, ipid=142/0,
vlan=0x0017/0x0000
vlifid=142/0, vtag_in=0x0017/0x0000 in_npu=1/0, out_npu=1/0, fwd_en=0/0, qid=7/0
no_ofld_reason:
reflect info 0:
dev=36->38/38->36
npu_state=0x000400
npu info: flag=0x91/0x00, offload=8/0, ips_offload=0/0, epid=129/0, ipid=142/0,
vlan=0x0016/0x0000
vlifid=142/0, vtag_in=0x0016/0x0000 in_npu=1/0, out_npu=1/0, fwd_en=0/0, qid=7/0
total reflect session num: 1
total session 1

Reply traffic through p4

Keep sessions one and two alive. Send reply traffic from server to client in the sessions one and two through p4 to
p1/p2. Verify that new auxiliary sessions can be established and offloaded to the NP6 processor and that session
counters correctly reflect the status of session.
session info: proto=17 proto_state=01 duration=356 expire=497 timeout=500 flags=00000000
sockflag=00000000 sockport=0 av_idx=0 use=6
origin-shaper=
reply-shaper=
per_ip_shaper=
class_id=0 ha_id=0 policy_dir=0 tunnel=/ vlan_cos=0/255
state=may_dirty npu route_preserve
statistic(bytes/packets/allow_err): org=126/4/1 reply=66/2/1 tuples=2
tx speed(Bps/kbps): 0/0 rx speed(Bps/kbps): 0/0
orgin->sink: org pre->post, reply pre->post dev=37->38/38->37 gwy=0.0.0.0/0.0.0.0

FortiOS 6.2.0 New Features Guide 381


Fortinet Technologies Inc.
Other

hook=pre dir=org act=noop 10.1.100.22:35101->172.16.204.44:5001(0.0.0.0:0)


hook=post dir=reply act=noop 172.16.204.44:5001->10.1.100.22:35101(0.0.0.0:0)
src_mac=90:6c:ac:19:19:58
misc=0 policy_id=1 auth_info=0 chk_client_info=0 vd=2
serial=00001c8e tos=ff/ff app_list=0 app=0 url_cat=0
rpdb_link_id = 00000000
dd_type=0 dd_mode=0
npu_state=0x000400
npu info: flag=0x91/0x00, offload=8/0, ips_offload=0/0, epid=129/0, ipid=142/0,
vlan=0x0017/0x0000
vlifid=142/0, vtag_in=0x0017/0x0000 in_npu=1/0, out_npu=1/0, fwd_en=0/0, qid=7/0
no_ofld_reason:
ofld_fail_reason(kernel, drv): none/not-established, none(0)/none(0)
npu_state_err=00/04
reflect info 0:
dev=36->39/39->36
npu_state=00000000
npu info: flag=0x00/0x00, offload=0/0, ips_offload=0/0, epid=0/0, ipid=0/0, vlan=0x0000/0x0000
vlifid=0/0, vtag_in=0x0000/0x0000 in_npu=0/0, out_npu=0/0, fwd_en=0/0, qid=0/0
reflect info 1:
dev=36->38/38->36
npu_state=0x000400
npu info: flag=0x91/0x00, offload=8/0, ips_offload=0/0, epid=129/0, ipid=142/0,
vlan=0x0016/0x0000
vlifid=142/0, vtag_in=0x0016/0x0000 in_npu=1/0, out_npu=1/0, fwd_en=0/0, qid=7/0
total reflect session num: 2
total session 1

Reply traffic through p3

Send reply traffic from the server to the client in the same sessions through p3 to p1/p2. Verify that no auxiliary sessions
are created, sessions can be offloaded to the NP6 processor, and session counters correctly reflect the status of
session.

Offloading

The main session and the auxiliary session can be offloaded to the NP6 processor, if the policy allows offloading.

Disable all cloud communication

All cloud communication can be disabled with the following CLI command:
config system global
set cloud-communication disable
end

The forticldd and updated daemons are shutdown, and multiple settings are disabled.

The following settings are automatically changed:


config system global
set endpoint-control-fds-access disable

FortiOS 6.2.0 New Features Guide 382


Fortinet Technologies Inc.
Other

set fds-statistics disable


unset fgd-alert-subscription
set security-rating-result-submission disable
end
config system central-management
set type none
set include-default-servers disable
end
config system fortiguard
set service-account-id ''
set auto-join-forticloud disable
set sandbox-region ''
set antispam-force-off enable
set outbreak-prevention-force-off enable
set webfilter-force-off enable
end
config system email-server
set server ''
end
config system ntp
set ntpsync disable
end
config system autoupdate push-update
set status disable
end
config system autoupdate schedule
set status disable
end
config system autoupdate tunneling
set status disable
end
config log fortiguard setting
set status disable
end
config vpn ocvpn
set status disable
end
config log fortiguard override-setting
set override disable
end

To reenable cloud communications, each individual setting must be changed after running the following CLI command:
config system global
set cloud-communication enable
end

For example, to reenable automatically connecting and logging in to FortiCloud:


config system global
set cloud-communication enable
end
config system fortiguard
set auto-join-forticloud enable
end

FortiOS 6.2.0 New Features Guide 383


Fortinet Technologies Inc.
Other

Custom SIP RTP Port Range Support

A new nat-port-range attribute can be used to specify a port range in the Voice Over Internet Protocol (VoIP)
profile to restrict the Network Address Translation (NAT) port range for Real-Time Transport Protocol/Real-Time
Transport Control Protocol (RTP/RTCP) packets in a Session Initiation Protocol (SIP) call session that is handled by the
SIP ALG (Application Layer Gateway) in a FortiGate device.
When NAT is enabled or VIP is used in a firewall policy for SIP ALG to handle a SIP call session established through a
FortiGate device, the SIP ALG can perform NAT to translate the ports used for the RTP/RTCP packets when they are
flowing through the device between the external and internal networks.
Previously, you could not configure the translated port range, and the fixed port range was [5117-65533]. Now you can
control the translated port range for RTP/RTCP packets by using the CLI:
config voip profile
edit <profile-name>
config sip
set nat-port-range <start_port_number>-<end_port_number>
end
next
end
FGT(sip) # set nat-port-range ?
<start>-<end> NAT port range (default 5117-65533)
A valid port range must be configured within [5117-65533]. For example: set nat-port-range
30000-30099 .

Example

This section provides an example for NAT where Phone1 is in subnet_1, and the SIP server and phone are in subnet_2.
All SIP signaling messages and RTP/RTCP packets will go through the SIP Server. In this example, the RTP/RTCP
ports on Phone1 are configured as 17078/17079.
The FortiGate administrator wants to use NAT for the port 17078/17079 to 30000/30001. As a result, all RTP/RTCP
packets going out of port2 have source ports of 30000/30001, and all RTP/RTCP packets going into port2 have
destination ports of 30000/30001 too, which can be specified in the nat-port-range.
The topology is shown as follows:

FortiOS 6.2.0 New Features Guide 384


Fortinet Technologies Inc.
Other

The configuration is as follows:


config voip profile
edit "natPortRange"
config sip
set nat-port-range 30000-30001 <--------------------------------
end
next
end
configure firewall policy
edit 1
set srcintf port1
set dstintf port2
set srcaddr all
set dstaddr all
set service SIP
set action accept
set schedule always
set voip-profile natPortRange <---------------------
set nat enable <---------------------
end

Now if phone1 and phone2 are registered to the SIP server, and they establish a call session between them through the
FortiGate and the SIP server, then the RTP/RTCP ports 17078/17079 of phone1 will be NATed to 30000/30001 at the
FortiGate unit based on the setting of nat-port-range. That is, the RTP/RTCP packets egressing port2 of the Fortigate
will have the source port as 30000/30001, and the RTP/RTCP packets ingressing port2 will have the destination port as
30000/30001.

Custom Service Max Value Increase

In FortiOS 6.2.0, the number of custom services is increased on all FortiGate 100-series platforms and above. The
following table identifies that maximum number of custom services supported for the different types of FortiGate model
series:

FortiGate Model Maximum Number of Custom Services

FortiGate 100 series and lower 1024 (no change)

FortiGate 100 to 400 series 2048

FortiGate 500 - 1200 series 4096

Two rack units 10240

Three rack units and chassis 16348

FortiCarrier License Activation

In FortiOS 6.0.x, when applying the FortiCarrier license, the FortiCarrier configuration is reset to the factory default
settings. With FortiOS 6.2.0 and later, the basic system, interface, and routing settings are retained to avoid a full

FortiOS 6.2.0 New Features Guide 385


Fortinet Technologies Inc.
Other

factory reset.
When you load a FortiCarrier license to FortiOS, the following message is displayed, informing you what settings are
retained and not returned to factory default settings:
FortiGate-3000D (global) # execute forticarrier-license DD4K-PVIQ-TEXX-OHAM-XO5T-CHJG-ZQ
This operation will reset the system to factory default except system.global.vdom-
mode/system.global.long-vdom-
name/VDOMs/system.interface/system.settings/router.static/router.static6!
Do you want to continue? (y/n)​​

GUI Alert on Login to VMX Security Nodes

This version displays a warning on VMware NSX-V security nodes that VMX nodes are managed by SVM and to make all
configuration changes on SVM. Changing configurations on each node might cause inconsistencies so you must use
SVM as a single point of configuration changes.
This is a sample of the alert:

To view or configure this alert using CLI:

FortiGate-VMX # config global

FortiGate-VMX (global) # config sys replacemsg admin pre_admin-disclaimer-text

FortiGate-VMX (pre_admin-discla~ext) # unset buffer

FortiGate-VMX (pre_admin-discla~ext) # get


msg-type : pre_admin-disclaimer-text
buffer : This FortiGate-VMX node is managed by Service Manager

Changes should be performed from Service Manager to avoid conflict.


Please select Accept to proceed, Decline to logout.

header : none
format : text

FortiOS 6.2.0 New Features Guide 386


Fortinet Technologies Inc.
Other

Event Log Subtype for FortiExtender

This version enhances FortiExtender logging and moves the FortiExtender logs from the subtype Event Log > System
Events to Event Log > FortiExtender Events.

In the CLI, logs have the following format:


logid="0111046409" type="event" subtype="fortiextender"

Each FortiExtender logging activity has a corresponding action description.


Logs can be written to a local device or FortiAnalyzer.
This is an example of a FortiExtender log:
** FortiExtender Authorized
action: fex_auth
meta data: SN
Event log: date=2019-02-20 time=09:57:22 logid="0111046400" type="event" sub-
type="fortiextender" level="notice" vd="root" eventtime=1550685442 logdesc="FortiExtender sys-
tem activity" action="FortiExtender Authorized" msg="ext SN:FX04DN4N16002352 authorized"

** FortiExtender DeAuthorized
action: fex_deauth
meta data: SN
Event log: date=2019-02-20 time=09:51:42 logid="0111046401" type="event" sub-
type="fortiextender" level="notice" vd="root" eventtime=1550685102 logdesc="FortiExtender con-
troller activity" sn="FX04DN4N16002352" ip=11.11.11.2 action="ext session-deauthed" msg="ext
SN:FX04DN4N16002352 deauthorized"

** Cellular connected
action: cellular_connected
meta data: SN, IMEI, ICCID, IMSI, PhoneNumber, Carrier, plan,service
Event log: date=2019-02-20 time=10:02:26 logid="0111046409" type="event" sub-
type="fortiextender" level="information" vd="root" eventtime=1550685746 logdesc="Remote
FortiExtender info activity" sn="FX04DN4N16002352" ip=11.11.11.2 action="Cellular Connected"
imei="359376060442770" imsi="302720502331361" iccid="89302720403038146410" phonenum-
ber="+16045067526" carrier="Rogers" plan="Rogers-plan" apn="N/A" service="LTE"

FortiOS 6.2.0 New Features Guide 387


Fortinet Technologies Inc.
Other

msg="FX04DN4N16002352 STATE: sim with imsi:302720502331361 in slot:2 on carrier:Rogers con-


nected"

** Cellular disconnected
action: cellular_disconnected
meta data: SN, IMEI, ICCID, IMSI, PhoneNumber, Carrier, plan,service
Event log: date=2019-02-20 time=10:33:57 logid="0111046407" type="event" sub-
type="fortiextender" level="warning" vd="root" eventtime=1550687636 logdesc="Remote FortiEx-
tender warning activity" sn="FX04DN4N16002352" ip=11.11.11.2 action="Cellular Disconnected"
imei="359376060442770" imsi="N/A" iccid="N/A" phonenumber="N/A" carrier="N/A" plan="N/A" apn-
n="N/A" service="LTE" msg="FX04DN4N16002352 STATE: sim with imsi: in slot:2 on
carrier:N/A disconnected"

** Cellular connecting
action: cellular_connecting
meta data: SN, IMEI, ICCID, IMSI, PhoneNumber, Carrier, plan,service
Event log: date=2019-02-20 time=10:02:24 logid="0111046409" type="event" sub-
type="fortiextender" level="information" vd="root" eventtime=1550685744 logdesc="Remote
FortiExtender info activity" sn="FX04DN4N16002352" ip=11.11.11.2 action="Cellular Connecting"
imei="359376060442770" imsi="302720502331361" iccid="89302720403038146410" phonenum-
ber="+16045067526" carrier="Rogers" plan="Rogers-plan" apn="N/A" service="N/A" msg-
g="FX04DN4N16002352 STATE: sim with imsi:302720502331361 in slot:2 on carrier:Rogers
connecting

** SIM Insert
action: sim_insert
meta data: SN, IMEI, SIM_slot
Event log: date=2019-02-20 time=10:47:19 logid="0111046407" type="event" sub-
type="fortiextender" level="warning" vd="root" eventtime=1550688438 logdesc="Remote FortiEx-
tender warning activity" sn="FX04DN4N16002352" ip=11.11.11.2 action="SIM Change" imei="N/A"
slot=2 msg="FX04DN4N16002352 SIM: SIM2 is inserted"

** SIM Plugout
action: sim_plugout
meta data: SN, IMEI, SIM_slot
Event log: date=2019-02-20 time=10:57:50 logid="0111046407" type="event" sub-
type="fortiextender" level="warning" vd="root" eventtime=1550689069 logdesc="Remote FortiEx-
tender warning activity" sn="FX04DN4N16002352" ip=11.11.11.2 action="SIM Change"
imei="359376060442770" slot=1 msg="FX04DN4N16002352 SIM: SIM2 is plucked out"

** SIM Switch
action: sim_switch
meta data: SN, IMEI, ICCID, IMSI, PhoneNumber, Carrier,reason
Event log: date=2019-02-20 time=12:02:24 logid="0111046407" type="event" sub-
type="fortiextender" level="warning" vd="root" eventtime=1550692942 logdesc="Remote FortiEx-
tender warning activity" sn="FX04DN4N16002352" ip=11.11.11.2 action="SIM Switch"
imei="359376060442770" reason="sim-switch can't take effect due to unavailability of 2 sim
cards" msg="FX04DN4N16002352 SIM: sim-switch can't take effect due to unavailability of 2 sim
cards"

** cellular signal stattistics


action: cellualr_signal_stats
meta data: SN, IMEI, ICCID, IMSI, PhoneNumber, Carrier,plan,service,
RSSI, SINR, RSRP,RSRQ, signalstrength
Event log: date=2019-02-19 time=18:08:46 logid="0111046409" type="event" sub-
type="fortiextender" level="information" vd="root" eventtime=1550628524 logdesc="Remote

FortiOS 6.2.0 New Features Guide 388


Fortinet Technologies Inc.
Other

FortiExtender info activity" sn="FX04DN4N16002352" ip=11.11.11.2 action="Cellular Signal Stat-


istics" imei="359376060442770" imsi="302720502331361" iccid="89302720403038146410" phonenum-
ber="+16045067526" carrier="Rogers" plan="Rogers-plan" service="LTE" sinr="7.0 dB" rsrp="-89
dBm" rsrq="-16 dB" signalstrength="92 dBm" rssi="-54" temperature="40 C" apn="N/A" msg-
g="FX04DN4N16002352 INFO: LTE RSSI=-54dBm,RSRP=-89dBm,RSRQ=-16dB,SINR-
R=7.0dB,BAND=B2,CELLID=061C700F,BW=15MHz,RXCH=1025,TXCH=19025,TAC=8AAC,TEMPERATURE=40 C"

** cellular data statistics


action: cellular_data_stats
meta data: SN, IMEI, ICCID, IMSI, PhoneNumber, Carrier, plan, service, rx, tx
Event log: date=2019-02-19 time=18:09:46 logid="0111046409" type="event" sub-
type="fortiextender" level="information" vd="root" eventtime=1550628585 logdesc="Remote
FortiExtender info activity" sn="FX04DN4N16002352" ip=11.11.11.2 action="Cellular Data Stat-
istics" imei="359376060442770" imsi="302720502331361" iccid="89302720403038146410" phonenum-
ber="+16045067526" carrier="Rogers" plan="Rogers-plan" service="LTE" rcvdbyte=7760
sentbyte=3315 msg="FX04DN4N16002352 INFO: SIM2 LTE, rx=7760, tx=3315, rx_diff=2538, tx_diff-
f=567"

Decouple FortiSandbox Cloud from FortiCloud

This feature allows users to use the FortiSanbox Cloud without a FortiCloud account. The FortiCloud Sandbox service
can be used for free for up to 100 submissions per day. To use FortiCloud Sandbox without this limitation, a FortiGuard
Antivirus license can be purchased.
The FortiCloud widget on the FortiGate's Status dashboard shows that FortiSandbox Cloud is decoupled from the
FortiCloud account, and can be used without logging in to FortiCloud.

The Global > System > FortiGuard page also shows that the accounts are decoupled, and that FortiSandbox Cloud is
licensed when the FortiGate is registered in FortiCare with a Antivirus license.

FortiOS 6.2.0 New Features Guide 389


Fortinet Technologies Inc.
Other

If the FortiGate does not have an Antivirus license, it will be restricted to 100 sandbox submissions per day.

To configure FortiSandbox Cloud inspection in the GUI:

1. Go to Global > Security Fabric > Settings.


2. Enable Sandbox Inspection.
3. For the Sandbox type, select FortiSandbox Cloud.
4. A FortiCloud account does not need to be logged in to. Instead, select the FortiSandbox cloud region from the
drop-down list.

FortiOS 6.2.0 New Features Guide 390


Fortinet Technologies Inc.
Other

5. Click Apply.

To configure sandbox inspection with the CLI:

config global
execute forticloud-sandbox region
0 Europe
1 Global
2 Japan
3 US
Please select cloud sandbox region[0-3]:
Cloud sandbox region is selected: ...
end

FortiGate Cloud

Starting in the second quarter of 2019, FortiCloud is renamed to FortiGate Cloud.


Because FortiCloud was renamed to FortiGate Cloud, the following items changed from FortiCloud to FortiGate Cloud
in the FortiOS GUI:
l Dashboard widget
l Security Fabric Settings
l System > Advanced > Run Script
l Log & Report > Log Settings
l Log & Report > FortiCloud reports
Following is an example of FortiGate Cloud in the FortiOS 6.2 GUI:

FortiOS 6.2.0 New Features Guide 391


Fortinet Technologies Inc.
Other

Following is an example of the old FortiCloud terminology in the FortiOS GUI prior to the 6.2.0 release:

SNMP OID for Log Failed to Send

A new SNMP counter is added for logs that fail to send out.

This feature is implemented only for SNMP query and not for SNMP trap.

When a syslog server encounters low-performance conditions and slows down to respond, the buffered syslog message
in kernel might overflow after a certain number of retransmissions, and then the overflowed message is lost. This
feature introduces new Object Identifiers (OIDs) to track the lost messages or failed logs.
New SNMP OIDs now include log statistics for global log devices.
l FORTINET-FORTIGATE-MIB:fortinet.fnFortiGateMib.fgLog.fgLogDeviceNumber 1.3.6.1.4.1.12356.101.21.1.1
l FORTINET-FORTIGATE-
MIB:fortinet.fnFortiGateMib.fgLog.fgLogDevices.fgLogDeviceTable.fgLogDeviceEntry.fgLogDeviceEntryIndex
1.3.6.1.4.1.12356.101.21.2.1.1.1
l FORTINET-FORTIGATE-
MIB:fortinet.fnFortiGateMib.fgLog.fgLogDevices.fgLogDeviceTable.fgLogDeviceEntry.fgLogDeviceEnabled
1.3.6.1.4.1.12356.101.21.2.1.1.2
l FORTINET-FORTIGATE-
MIB:fortinet.fnFortiGateMib.fgLog.fgLogDevices.fgLogDeviceTable.fgLogDeviceEntry.fgLogDeviceName
1.3.6.1.4.1.12356.101.21.2.1.1.3
l FORTINET-FORTIGATE-
MIB:fortinet.fnFortiGateMib.fgLog.fgLogDevices.fgLogDeviceTable.fgLogDeviceEntry.fgLogDeviceSentCount
1.3.6.1.4.1.12356.101.21.2.1.1.4

FortiOS 6.2.0 New Features Guide 392


Fortinet Technologies Inc.
Other

l FORTINET-FORTIGATE-
MIB:fortinet.fnFortiGateMib.fgLog.fgLogDevices.fgLogDeviceTable.fgLogDeviceEntry.fgLogDeviceRelayedCount
1.3.6.1.4.1.12356.101.21.2.1.1.5
l FORTINET-FORTIGATE-
MIB:fortinet.fnFortiGateMib.fgLog.fgLogDevices.fgLogDeviceTable.fgLogDeviceEntry.fgLogDeviceCachedCount
1.3.6.1.4.1.12356.101.21.2.1.1.6
l FORTINET-FORTIGATE-
MIB:fortinet.fnFortiGateMib.fgLog.fgLogDevices.fgLogDeviceTable.fgLogDeviceEntry.fgLogDeviceFailedCount
1.3.6.1.4.1.12356.101.21.2.1.1.7
l FORTINET-FORTIGATE-
MIB:fortinet.fnFortiGateMib.fgLog.fgLogDevices.fgLogDeviceTable.fgLogDeviceEntry.fgLogDeviceDroppedCount
1.3.6.1.4.1.12356.101.21.2.1.1.8
Where:
l fgLogDeviceNumber is the number of devices in the table.
l fgLogDeviceEnabled is either 1 or 0, indicating whether the device is enabled.
l fgLogDeviceName is the name of the device.
A FortiGate unit connected to a syslog server or a FortiAnalyzer unit would generate statistics that can be seen by the
diagnostic test application named miglogd. Following are some examples.

You can also view the same statistics in snmpwalk/snmpget on the


OID 1.3.6.1.4.1.12356.101.21.

FGT_A (global) # diagnose test application miglogd 6


mem=404, disk=657, alert=0, alarm=0, sys=920, faz=555, webt=0, fds=0
interface-missed=460
Queues in all miglogds: cur:0 total-so-far:526
global log dev statistics:
syslog 0: sent=254, failed=139, relayed=0
syslog 1: sent=220, failed=139, relayed=0
syslog 2: sent=95, failed=73, relayed=0
faz 0: sent=282, failed=0, cached=0, dropped=0 , relayed=0
Num of REST URLs: 3
/api/v2/monitor/system/csf/ : 0 : 300
/api/v2/cmdb/system/interface/ : 394.0.673.15877729363538323653.1547149763 : 1200
/api/v2/monitor/system/ha-checksums/ : 0 : 1200
faz 1: sent=272, failed=0, cached=0, dropped=0 , relayed=0
Num of REST URLs: 2
/api/v2/monitor/system/csf/ : 0 : 300
/api/v2/cmdb/system/interface/ : 394.0.673.15877729363538323653.1547149763 : 1200
FGT_A (global) #
snmpwalk -v2c -c REGR-SYS 172.16.200.1 1.3.6.1.4.1.12356.101.21
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.1.1.0 = INTEGER: 9
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.1.0 = INTEGER: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.1.1 = INTEGER: 1
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.1.2 = INTEGER: 2
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.1.3 = INTEGER: 3
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.1.4 = INTEGER: 4
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.1.5 = INTEGER: 5
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.1.6 = INTEGER: 6
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.1.7 = INTEGER: 7
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.1.8 = INTEGER: 8

FortiOS 6.2.0 New Features Guide 393


Fortinet Technologies Inc.
Other

FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.2.0 = INTEGER: 1
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.2.1 = INTEGER: 1
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.2.2 = INTEGER: 1
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.2.3 = INTEGER: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.2.4 = INTEGER: 1
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.2.5 = INTEGER: 1
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.2.6 = INTEGER: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.2.7 = INTEGER: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.2.8 = INTEGER: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.3.0 = STRING: "syslog"
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.3.1 = STRING: "syslog2"
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.3.2 = STRING: "syslog3"
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.3.3 = STRING: "syslog4"
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.3.4 = STRING: "faz"
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.3.5 = STRING: "faz2"
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.3.6 = STRING: "faz3"
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.3.7 = STRING: "webtrends"
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.3.8 = STRING: "fds"
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.4.0 = Counter32: 254
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.4.1 = Counter32: 220
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.4.2 = Counter32: 95
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.4.3 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.4.4 = Counter32: 282
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.4.5 = Counter32: 272
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.4.6 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.4.7 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.4.8 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.5.0 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.5.1 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.5.2 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.5.3 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.5.4 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.5.5 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.5.6 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.5.7 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.5.8 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.6.0 = Gauge32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.6.1 = Gauge32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.6.2 = Gauge32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.6.3 = Gauge32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.6.4 = Gauge32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.6.5 = Gauge32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.6.6 = Gauge32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.6.7 = Gauge32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.6.8 = Gauge32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.7.0 = Counter32: 139
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.7.1 = Counter32: 139
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.7.2 = Counter32: 73
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.7.3 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.7.4 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.7.5 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.7.6 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.7.7 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.7.8 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.8.0 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.8.1 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.8.2 = Counter32: 0

FortiOS 6.2.0 New Features Guide 394


Fortinet Technologies Inc.
Other

FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.8.3 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.8.4 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.8.5 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.8.6 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.8.7 = Counter32: 0
FORTINET-FORTIGATE-MIB::fnFortiGateMib.21.2.1.1.8.8 = Counter32: 0

FortiGuard Distribution of Updated Apple Certificates (for token


push notifications)

Push notifications for iPhone (for the purpose of two-factor authentication) require a TLS server certificate to
authenticate to Apple. Since this certificate is only valid for one year, a new service extension allows FortiGuard to
distribute updated TLS server certificates to FortiGate when needed.
FortiGuard update service will update local Apple push notification TLS server certificates when the local certificate is
expired. FortiGuard update service will also reinstall certificates when the certificates are lost.
You can verify that the feature works on the FortiGate by using the CLI shell.

To verify certificate updates:

1. Using FortiOS CLI shell, verify that all certificates are installed:
/data/etc/apns # ls -al
drwxr-xr-x 2 0 0 Tue Jan 15 08:42:39 2019 1024 .
drwxr-xr-x 12 0 0 Tue Jan 15 08:45:00 2019 2048 ..
-rw-r--r-- 1 0 0 Sat Jan 12 00:06:30 2019 2377 apn-dev-cert.pem
-rw-r--r-- 1 0 0 Sat Jan 12 00:06:30 2019 1859 apn-dev-key.pem
-rw-r--r-- 1 0 0 Sat Jan 12 00:06:30 2019 8964 apn-dis-cert.pem
-rw-r--r-- 1 0 0 Sat Jan 12 00:06:30 2019 4482 apn-dis-key.pem
2. Rename all current Apple certificates.
Apple push notification no longer works after you rename the certificates.
/data/etc/apns # mv apn-dis-cert.pem apn-dis-cert.pem.save
/data/etc/apns # mv apn-dev-key.pem apn-dev-key.pem.save
/data/etc/apns # mv apn-dev-cert.pem apn-dev-cert.pem.save
/data/etc/apns # mv apn-dis-key.pem apn-dis-key.pem.save
/data/etc/apns # ls -al
drwxr-xr-x 2 0 0 Tue Jan 15 08:51:15 2019 1024 .
drwxr-xr-x 12 0 0 Tue Jan 15 08:45:00 2019 2048 ..
-rw-r--r-- 1 0 0 Sat Jan 12 00:06:30 2019 2377 apn-dev-
cert.pem.save
-rw-r--r-- 1 0 0 Sat Jan 12 00:06:30 2019 1859 apn-dev-
key.pem.save
-rw-r--r-- 1 0 0 Sat Jan 12 00:06:30 2019 8964 apn-dis-
cert.pem.save
-rw-r--r-- 1 0 0 Sat Jan 12 00:06:30 2019 4482 apn-dis-
key.pem.save
3. Run a FortiGuard update, and verify that all certificates are installed again:
/data/etc/apns # ls -al drwxr-xr-x 2 0 0 Tue Jan 15 08:56:20 2019
1024 .
drwxr-xr-x 12 0 0 Tue Jan 15 08:56:15 2019 2048 ..
-rw-r--r-- 1 0 0 Sat Jan 12 00:06:30 2019 2377 apn-dev-
cert.pem.save

FortiOS 6.2.0 New Features Guide 395


Fortinet Technologies Inc.
Other

-rw-r--r-- 1 0 0 Sat Jan 12 00:06:30 2019 1859 apn-dev-


key.pem.save
-rw-r--r-- 1 0 0 Tue Jan 15 08:56:20 2019 2167 apn-dis-cert.pem
<--- downloaded from FortiGuard
-rw-r--r-- 1 0 0 Sat Jan 12 00:06:30 2019 8964 apn-dis-
cert.pem.save
-rw-r--r-- 1 0 0 Tue Jan 15 08:56:20 2019 1704 apn-dis-key.pem
<--- downloaded from FortiGuard
-rw-r--r-- 1 0 0 Sat Jan 12 00:06:30 2019 4482 apn-dis-
key.pem.save
-rw-r--r-- 1 0 0 Tue Jan 15 08:56:20 2019 41 apn-version.dat
<--- downloaded from FortiGuard
/data/etc/apns #

Active Directory Recursive Search Option

This feature changes the default search behavior for user group memberships on Windows Active Directory (AD) LDAP
servers. By default, nested groups (groups that are members or other groups) are not searched, as this can slow down
the group membership search. A new option is added to enable searching nested groups for user group memberships
on AD LDAP servers. This option is not available for other LDAP servers, such as OpenLDAP based LDAP servers.

The default behavior does not include nested groups:

config user ldap


edit "ldap-ad"
set server "10.1.100.131"
set cnid "cn"
set dn "dc=fortinet-fsso,dc=com"
set type regular
set username "cn=Administrator,cn=users,dc=fortinet-fsso,dc=com"
set password XXXXXXXXXXXXXXXXXXXXXXXX
next
end

The default search results show only groups that have the user as member, and no groups that have groups as
members:
diagnose test authserver ldap ldap-ad nuser nuser
authenticate 'nuser' against 'ldap-ad' succeeded!
Group membership(s) - CN=nested3,OU=Testing,DC=Fortinet-FSSO,DC=COM
CN=Domain Users,CN=Users,DC=Fortinet-FSSO,DC=COM

Enable recursive search to include nested groups in the results:

config user ldap


edit "ldap-ad"
set server "10.1.100.131"
set cnid "cn"
set dn "dc=fortinet-fsso,dc=com"
set type regular
set username "cn=Administrator,cn=users,dc=fortinet-fsso,dc=com"
set password XXXXXXXXXXXXXXXXXXXXXXXX
set search-type recursive

FortiOS 6.2.0 New Features Guide 396


Fortinet Technologies Inc.
Other

next
end

The search results include groups that have other groups as members:
diagnose test authserver ldap ldap-ad nuser nuser
authenticate 'nuser' against 'ldap-ad' succeeded!
Group membership(s) - CN=nested3,OU=Testing,DC=Fortinet-FSSO,DC=COM
CN=Domain Users,CN=Users,DC=Fortinet-FSSO,DC=COM
CN=nested2,OU=Testing,DC=Fortinet-FSSO,DC=COM
CN=nested1,OU=Testing,DC=Fortinet-FSSO,DC=COM

The group nested3 is a member of the group nested2, which is itself a member of the group nested1.

Web proxy global settings

The config web-proxy global CLI command has settings that affect which certificate is used to sign block page
in explicit proxy.
config web-proxy global
set ssl-cert {string}
set ssl-ca-cert {string}

Parameter Name Description Type Size


ssl-cert SSL certificate for SSL interception. string Maximum length: 35
ssl-ca-cert SSL CA certificate for SSL interception. string Maximum length: 35

FortiOS 6.2.0 New Features Guide 397


Fortinet Technologies Inc.
Copyright© 2020 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., in
the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be
trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and
other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding
commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s
General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such
event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be
limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. In no event does Fortinet make any commitment related to future deliverables, features or
development, and circumstances may change such that any forward-looking statements herein are not accurate. Fortinet disclaims in full any covenants, representations, and
guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most
current version of the publication shall be applicable.

You might also like