Onboarding Devices
The last step is to onboard the "real" device by linking it to the respective Model Device. The exact actions depend on the chosen onboarding method:
-
For Zero-Touch Provisioning, it is enough to connect the FortiGate device to the network and power it on. In this case, the device will be authorized using its Serial Number.
-
For Low-Touch Provisioning, it is required to specify FortiManager details manually, using the following CLI snippet. (Device authorization can be done either using its Serial Number or using a Pre-shared key):
config system central-management set type fortimanager set fmg {<IP_address> | <Domain name>} end execute central-mgmt register-device <fmg-serial-number> <pre-shared-key>
For FortiGates running FortiOS 7.2.8 and later, the FortiManager serial number must also be preconfigured. config system central-management set type fortimanager set serial-number <FortiManager serial number> set fmg {<IP_address> | <Domain name>} end Detailed overview of the FortiGate provisioning methods is outside the scope of this document. |
Once the FortiGate device contacts FortiManager, the Auto-Link process will start, and the device is authorized and linked to its respective Model Device. The complete device configuration and the Firewall Policy Package will be pushed to the device.
You can follow this process under System Settings > Task Monitor:
Once the process is successfully completed, the FortiGate device will be fully deployed and operational: