Fortinet black logo

New Features

FortiCarrier upgrade license for FortiGate-VM S-series 7.0.4

Copy Link
Copy Doc ID 4f6cd3c1-22cb-11eb-96b9-00505692583a:863397
Download PDF

FortiCarrier upgrade license for FortiGate-VM S-series 7.0.4

The FortiGate-VM S-series subscription-based VM adds support for a new subscription model FortiCarrier upgrade license. You can upgrade a FortiGate-VM with an S-series VM license to a FortiCarrier-VM with a subscription model FortiCarrier upgrade license (FC1-10-FGVVS-948-02-DD). FortiCarrier has a 90-day grace period after license expiry, during which you can renew the license. After the grace period ends, the FortiGate-VM bypasses GPRS Tunneling Protocol (GTP) inspection and handles GTP traffic as regular traffic, although it retains the GTP configuration.

The new subscription model FortiCarrier upgrade license is only available on the following VM sizes. The perpetual FortiCarrier upgrade license has the equivalent restriction:

  • VM08-S
  • VM16-S
  • VM32-S
  • VMUL-S
To apply the FortiCarrier upgrade license via the GUI:
  1. Register a VM08 or higher S-series VM license on FortiCare.
  2. Register a FortiCarrier license code (FC1-10-FGVVS-948-02-DD) on FortiCare.
  3. Bind the FortiCarrier license with the S-series VM license.
  4. In the FortiOS CLI, upgrade the FortiGate by using the execute forticarrier-license command. This upgrade triggers a factoryreset2:

    SerialNumber=FGVMSLTM0000000|Contract=AVDB-1-06-20230113:0:1:1:0*AVEN-1-06-20230113:0:1:1:0*NIDS-1-06-20230113:0:1:1:0*SPRT-1-20-20230113:0:1:1:0*VMLS-1-06-20230113:0:8:0:0*PBDS-1-06-20230113:0:1:1:0*SOAR-1-06-20230113:0:1:1:0*SOCA-1-06-20230113:0:1:1:0*SPAM-1-06-20230113:0:1:1:0*SWNC-1-06-20230113:0:1:1:0*SWNM-1-06-20230113:0:1:1:0*SWNO-1-06-20230113:0:1:1:0*ZHVO-1-06-20230113:0:1:1:0*ISSS-1-06-20230113:0:1:1:0*IOTH-1-06-20230113:0:1:1:0*AFAC-1-06-20230113:0:1:1:0*FGSA-1-06-20230113:0:1:1:0*FMGC-1-06-20230113:0:1:1:0*FMWR-1-06-20230113:0:1:1:0*FRVS-1-06-20230113:0:1:1:0*FURL-1-06-20230113:0:1:1:0*FCRE-1-06-20230113:0:1:1:0*ENHN-1-20-20230113:0:1:1:0*COMP-1-20-20230113:0:1:1:0|AccountID=me@fortinet.com|Industry=Technology|Company=FTNT|UserID=000000|

  5. In the FortiOS GUI, click the dropdown list in the upper-right corner. Confirm that the GUI displays FortiCarrier VM64.

  6. Confirm that GTP Profiles displays as a subsection of Security Profiles.
  7. Confirm that GTP displays as a subsection of Log & Report.
To check the GTP inspection bypass status:

You can print the status via the CLI, but you cannot manually configure it in the CLI.

FOC-DUT # config sys global

FOC-DUT (global) # get | grep carrier

forticarrier-bypass : disable

FortiCarrier upgrade license for FortiGate-VM S-series 7.0.4

The FortiGate-VM S-series subscription-based VM adds support for a new subscription model FortiCarrier upgrade license. You can upgrade a FortiGate-VM with an S-series VM license to a FortiCarrier-VM with a subscription model FortiCarrier upgrade license (FC1-10-FGVVS-948-02-DD). FortiCarrier has a 90-day grace period after license expiry, during which you can renew the license. After the grace period ends, the FortiGate-VM bypasses GPRS Tunneling Protocol (GTP) inspection and handles GTP traffic as regular traffic, although it retains the GTP configuration.

The new subscription model FortiCarrier upgrade license is only available on the following VM sizes. The perpetual FortiCarrier upgrade license has the equivalent restriction:

  • VM08-S
  • VM16-S
  • VM32-S
  • VMUL-S
To apply the FortiCarrier upgrade license via the GUI:
  1. Register a VM08 or higher S-series VM license on FortiCare.
  2. Register a FortiCarrier license code (FC1-10-FGVVS-948-02-DD) on FortiCare.
  3. Bind the FortiCarrier license with the S-series VM license.
  4. In the FortiOS CLI, upgrade the FortiGate by using the execute forticarrier-license command. This upgrade triggers a factoryreset2:

    SerialNumber=FGVMSLTM0000000|Contract=AVDB-1-06-20230113:0:1:1:0*AVEN-1-06-20230113:0:1:1:0*NIDS-1-06-20230113:0:1:1:0*SPRT-1-20-20230113:0:1:1:0*VMLS-1-06-20230113:0:8:0:0*PBDS-1-06-20230113:0:1:1:0*SOAR-1-06-20230113:0:1:1:0*SOCA-1-06-20230113:0:1:1:0*SPAM-1-06-20230113:0:1:1:0*SWNC-1-06-20230113:0:1:1:0*SWNM-1-06-20230113:0:1:1:0*SWNO-1-06-20230113:0:1:1:0*ZHVO-1-06-20230113:0:1:1:0*ISSS-1-06-20230113:0:1:1:0*IOTH-1-06-20230113:0:1:1:0*AFAC-1-06-20230113:0:1:1:0*FGSA-1-06-20230113:0:1:1:0*FMGC-1-06-20230113:0:1:1:0*FMWR-1-06-20230113:0:1:1:0*FRVS-1-06-20230113:0:1:1:0*FURL-1-06-20230113:0:1:1:0*FCRE-1-06-20230113:0:1:1:0*ENHN-1-20-20230113:0:1:1:0*COMP-1-20-20230113:0:1:1:0|AccountID=me@fortinet.com|Industry=Technology|Company=FTNT|UserID=000000|

  5. In the FortiOS GUI, click the dropdown list in the upper-right corner. Confirm that the GUI displays FortiCarrier VM64.

  6. Confirm that GTP Profiles displays as a subsection of Security Profiles.
  7. Confirm that GTP displays as a subsection of Log & Report.
To check the GTP inspection bypass status:

You can print the status via the CLI, but you cannot manually configure it in the CLI.

FOC-DUT # config sys global

FOC-DUT (global) # get | grep carrier

forticarrier-bypass : disable