Fortinet white logo
Fortinet white logo

FortiOS Release Notes

New features or enhancements

New features or enhancements

More detailed information is available in the New Features Guide.

Cloud

See Public and private cloud in the New Features Guide for more information.

Feature ID

Description

737947

When configuring a FortiGate VM as a network virtual appliance (NVA) as part of the Azure vWAN solution, the FortiGate can make API calls and send health metrics to Azure for integration with Azure Monitor.

839076

Add GUI support for configuring various AWS resource addresses using an AWS SDN connector.

930522

Remote access with read and write rights through FortiGate Cloud now requires a paid FortiGate Cloud subscription. The FortiGate can still be accessed in a read-only state with the free tier of FortiGate Cloud. Alternatively, you can access your FortiGate through its web interface.

Please contact your Fortinet Sales/Partner for details on purchasing a FortiGate Cloud Service subscription license for your FortiGate device.

938066

FortiOS supports customizing retry times and intervals for token activation for FortiFlex/Flex-VM licenses.

execute vm-license-options count <integer>
execute vm-license-options interval <integer>

952335

Add GUI support to apply a FortiFlex token on the FortiGate VM License page.

  • For newly deployed or expired VM instances: when the license pop-up appears.
  • For already licensed VM instances: from the Virtual Machine dashboard widget or the System > FortiGuard page.

FortiGate 6000 and 7000 platforms

Feature ID

Description

814242

The FortiGate 7000F platform supports setting a custom load balancing method for an individual VDOM. All of the traffic destined for that VDOM will be distributed to FPMs by the NP7 load balancers according to the following setting:

config system settings
    set dp-load-distribution-method {derived | to-primary | src-ip | dst-ip | src-dst-ip | src-ip-sport | dst-ip-dport | src-dst-ip-sport-dport}
end

The default load balancing method, derived, means traffic for that VDOM uses the global load balancing method set by the dp-load-distribution-method option of the global config load-balance setting command.

GUI

See GUI in the New Features Guide for more information.

Feature ID

Description

926533

The FortiOS GUI indicates when users are running the STS (Special Technical Support) build (formerly known as TOP3). It is more apparent that the user is using this specific build, and the associated risks are highlighted after users log in.

Hyperscale

Feature ID

Description

875141

Support the transmission of logs using TCP. This is a significant improvement from the previous version, which only supported UDP. TCP provides a more reliable connection, ensuring no logs are lost during transmission. This is beneficial for carrier customers who require a robust and dependable logging system.

920148

IPv4 or IPv6 IP address threat feeds can be added to hyperscale firewall policies as source or destination addresses.

921750

Support NetFlow version 9 for session logging in hyperscale VDOMs. By integrating NetFlow version 9 for session logging, the hyperscale software offers users a more comprehensive and precise view of network traffic data. This leads to enhanced network monitoring, troubleshooting, and planning capabilities.

936747

On FortiGates with multiple NP7 processors with hyperscale enabled, you can use the following command to optimize NP7 network session setup (NSS) engine performance.

config system npu
    set nss-threads-option {4T-EIF | 4T-NOEIF | 2T}
end
  • 4T-EIF: the NSS is configured with four threads and the Endpoint Independent Filtering (EIF) feature is allowed (the default). NSS with four threads supports the maximum NP7 Connections Per Second (CPS) performance.

  • 4T-NOEIF: the NSS is configured with four threads and the EIF feature is not allowed. Also supports the maximum NP7 CPS performance.

  • 2T: the NSS is configured with two threads and the EIF feature is allowed. This setting reduces the maximum NP7 CPS performance.

Note

Changing the nss-threads-option causes the FortiGate to restart.

940504

In hyperscale CGNAT PBA and SPA configurations, quick port re-use can occur because the default direct port selection mode always selects the next available port number in the port range. So if a port number that is low in the port range, becomes available it will be selected first. Quick port re-use can cause delays for some clients in some network configurations.

You can use the following commands to change the PBA and SPA port selection modes to random. In random mode, after selecting the first port number in the range, random mode randomly selects any port number in the range. Selecting a random port number makes it less likely to quickly re-use the same port numbers.

To change the PBA port selection mode:

config system npu
    set pba-port-select-mode {random | direct}
end

968801

Add enforce-seq-order hyperscale hardware logging option to enable or disable sending hyperscale VDOM software session logs in order by sequence number.

LAN Edge

See LAN Edge in the New Features Guide for more information.

Feature ID

Description

834550

Introduce FortiSwitch management using the HTTPS protocol. This new capability supports all the same FortiLink features, offering users a simpler alternative to the more complex CAPWAP protocol.

866172

The local radio of FortiWiFi 8xF, 6xF, and 40F models when operating in client mode and connecting with a third-party SSID can be configured in the GUI to use either WPA3 SAE or Opportunistic Wireless Encryption (OWE) security mode.

866174

When a specific Fortinet external antenna is installed, the FortiAP profiles of FAP-432F, FAP-433F, FAP-U432F, and FAP-U433F models can be configured using the optional-antenna setting by choosing from a list of supported Fortinet external antenna models. For example, for the FAP-433F:

config wireless-controller wtp-profile
    edit "FAP433F"
        config radio-1
            set optional-antenna {none | FANT-04ABGN-0606-O-R | FANT-04ABGN-0606-P-R}
        end
    next
end

This setting can be configured in the GUI for supported FortiAP profile in the Radio section. Enable External antenna and select the external antenna model from the list of defined values.

This setting allows antenna gains that are specific to the Fortinet external antenna model and the Wi-Fi band (2.4 GHz or 5 GHz) being used to be taken into consideration by the FortiGate wireless controller to set transmit power properly for a managed FortiAP device.

906063

FortiOS allows you to define the formatting of specific RADIUS request attributes when they are transmitted to the RADIUS server, including: User-Name, User-Password, Called-Station-Id, and Calling-Station-Id.

913213

When authenticating users with a RADIUS server, FortiOS can now dynamically assign a different NAS-IP-Address attribute to the managed switches. For more control, this feature also allows you to manually override the dynamic assignment and set the NAS-IP-Address attribute for individual switches as per your requirements.

918856

FortiOS supports assigning a priority to each VLAN. If there is more than one VLAN with the same name, the VLAN with the lowest priority value will be selected by the managed FortiSwitch.

933260

Support RADIUS accounting interim updates on roaming for WPA-Enterprise security. The enhancement is specifically designed to resolve compatibility issues with Cisco's Identity Services Engine (ISE) session stitching feature with improved interoperability between devices and networks, leading to a more seamless and secure wireless connectivity experience. This is beneficial for organizations that rely on Cisco ISE for network access control, as it ensures their security protocols align with industry standards.

config wireless-controller vap
    edit <name>
        set security wpa2-only-enterprise
        set roaming-acct-interim-update {enable | disable}
    next
end

939229

Support the Hunting-and-Pecking (HnP) Only authentication method for WPA3-SAE SSIDs. This setting is disabled by default.

config wireless-controller vap
    edit <name>
        set ssid <name>
        set security wpa3-sae
        set pmf enable
        set sae-hnp-only {enable | disable}
    next
end

940562

When a third-party external antenna is installed, the FortiAP profiles of selected models can be configured with set optional-antenna custom and set optional-antenna-gain <integer> (in dBi, 0 - 20, default = 0).

Supported FortiAP models include: FAP-432F, FAP-432FR, FAP-433F, FAP-233G, FAP-432G, FAP-433G, FAP-U432F, and FAP-U433F. For example:

config wireless-controller wtp-profile
    edit "FP433G"
        config platform
            set type 433G
        end
        config radio-2
            set optional-antenna custom
            set optional-antenna-gain "10"
        end
    next
end

These settings can be configured in the GUI for supported FortiAP profile in the Radio section. Enable External antenna, select Custom from the dropdown, and enter a value for External antenna gain (dB).

940905

Support WPA3 options when the radio mode is set to Fortinet's SAM (Service Assurance Manager). This includes WPA3-SAE and WPA3 OWE. In also includes support for WPA2/WPA3-Enterprise with certificate authentication, encompassing both PEAP and EAP-TLS.

config wireless-controller wtp-profile
    edit <name>
        config radio-1
            set mode sam
            set sam-ssid <string>
            set sam-security-type {wpa-enterprise |wpa3-sae | owe}
        end
    next
end

960883

Support individual control of the 802.11k and 802.11v protocols. In previous FortiOS versions, these protocols were jointly controlled with the voice-enterprise option.

config wireless-controller vap
    edit <name>
        set 80211k {enable | disable}
        set 80211v {enable | disable}
    next
end

962880

Simplify the Bonjour profile provisioning and failover mechanism.

  • Users can set the Bonjour profile in the WTP configuration and WTP profile.
    config wireless-controller wtp-profile
        edit <name>
            set bonjour-profile <name>
        next
    end
  • To ensure uninterrupted service, introduce a new election procedure among the APs. This provides a failover mechanism or redundancy if the Bonjour gateway goes down.

962881

Support hitless rolling AP upgrades. This feature smartly upgrades APs by not upgrading all APs at once. It queues some APs and considers the reachability of neighboring APs and their locations. This prevents service drops during simultaneous upgrades, ensuring uninterrupted WiFi service.

963851

Enhance CAPWAP management over NAT to provide a stability boost for Fortinet APs that operate behind a NAT device. This allows users to set the frequency of keep-alive messages, thereby improving connectivity.

config wireless-controller timers
    set nat-session-keep-alive <integer>
end

967663

Support the generation of a private key, a crucial component for SAE-PK authentication. This enhancement is significant as it offers an integrated mechanism for key generation, eliminating the need for third-party tools. This makes the FortiGate a more self-sufficient and secure system for SAE-PK authentication.

# execute wireless-controller create-sae-pk

969387

Support the automated reboot functionality for APs. This automatically reboots an AP stuck in a discovery loop, a state that disrupts network service. This smart feature reduces network downtime, and eliminates the need for manual intervention, thus saving time and resources. It ensures a resilient and seamless network experience.

config wireless-controller timers
    set ap-reboot-wait-interval <integer>
    set ap-reboot-wait-time <hh:mm>
    set ap-reboot-wait-interval2 <integer>
end

Log & Report

See Logging in the New Features Guide for more information.

Feature ID

Description

975411

Modify the log fields for long-lived sessions by adding three new log fields to the long-lived session log: duration delta (durationdelta), sent packet delta (sentpktdelta), and received packet delta (rcvdpktdelta). The fields enhance the granularity and accuracy of session logs, providing a more detailed view of long-lived sessions. This aids in troubleshooting and analysis.

Network

See Network in the New Features Guide for more information.

Feature ID

Description

685910

Add SoC4 driver support for the IEEE 802.1ad, which is also known as QinQ. When the OID is used up, it is forbidden to create a new QinQ interface.

881823

BGP now incorporates the advanced security measures of the TCP Authentication Option (TCP-AO). This integration bolsters the security of BGP connections and enhances the reliability of these connections, thereby contributing to the overall security of the internet.

  • Add cmac-aes128 option in the router key-chain settings:

    config router key-chain
        edit <name>
            config key
                edit <id>
                    set algorithm cmac-aes128
                next
            end
        next
    end
  • Add auth-options for BGP neighbor and neighbor-group settings:

    config router bgp
        config neighbor
            edit <ip>
                set auth-options <key-chain>
            end
        next
        config neighbor-group
            edit <name>
                set auth-options <key-chain>
            end
        next
    end
  • Add debug command for tcp-auth-options:

    # diagnose sys tcp-auth-options

890574

Support port mirroring with NP7 offloaded traffic. Offloaded packets are copied to a mirroring port, which can be linked to an external device for in-depth analytics.

921795

Simplify the configuration of the FortiGate LAN extension feature by automatically configuring a VDOM link between a traffic VDOM, by default, the root VDOM and the LAN extension VDOM.

After connecting to the FortiGate Controller, the following settings are automatically configured on the FortiGate Connector:

  • VDOM link interface in the LAN extension VDOM is a part of the LAN extension software switch
  • VDOM link interface in the traffic VDOM is dynamically assigned an IP address, which has been obtained from the FortiGate Controller

This feature is required to support the FortiGate Secure Edge use case for FortiSASE.

925668

FortiOS can be configured with a maximum of three sFlow collectors. This also applies to multi-VDOM environments where a maximum of three sFlow collectors can be used globally and/or on a per-VDOMs basis. This feature enables up to a maximum of three unique parallel sFlow streams or transmissions per sFlow sample to three different sFlow collectors. The sFlow collector configuration can only be configured in the CLI.

934273

Support the BGP graceful restart helper-only mode. This ensures that during a FortiGate HA failover, the neighboring router that only supports BGP graceful restart helper mode retains its routes.

941347

Enhance FortiOS packet capture. If the browser is closed or refreshed, users can return at a later time to view, stop, restart, or download the capture. The number of captures that can be stored on FortiGate is determined by the device's capabilities. REST APIs have been introduced for starting, stopping, deleting, and downloading packet captures.

951273

FortiOS provides the ability to enable or disable 802.1x authentication on a per-port basis, providing administrators precise management over which ports use 802.1x.

951275

FortiOS provides the ability to enable or disable Spanning Tree Protocol (STP) on a per-port basis, providing administrators precise management over which ports use STP.

965990

FortiOS supports up to six NetFlow collectors. This enhancement extends to multi-VDOM environments where a maximum of six NetFlow collectors can be used globally or on a per-VDOMs basis.

Policy & Objects

See Policy and objects in the New Features Guide for more information.

Feature ID

Description

875309

Add GUI support for port block allocation (PBA) IP pools for NAT64 traffic.

886571

Support IPS inspection for multicast UDP traffic.

941072

The handling of virtual patch local-in traffic is optimized by identifying the type of traffic early based on its port number and protocol. The IPS engine will tag the local-in sessions for services, including SSL VPN and web GUI. If a tagged session does not have any vulnerability signatures for the FortiOS version, then IPS will bypass scanning the session. This optimizes performance by only scanning and dropping the sessions that are exploiting a vulnerability.

SD-WAN

See SD-WAN in the New Features Guide for more information.

Feature ID

Description

884084

Update SD-WAN with ADVPN to version 2.0 with major changes to ADVPN design and operation, namely, introducing edge discovery and path management for ADVPN spokes.

ADVPN 2.0 incorporates intelligence into the spokes to ensure shortcut tunnels, known as shortcuts, are established using underlays available on both spokes and chosen based on matching certain link health criteria.

ADVPN 2.0 provides a more flexible SD-WAN solution than the original ADVPN to achieve resiliency against underlay outages or degraded underlay performance that is no longer dependent on specific BGP routing designs or mechanisms.

900197

Add IPv6 support for SD-WAN segmentation over a single overlay. This allows seamless communication between IPv6 devices within virtual routing and forwarding (VRF) overlay networks, benefiting organizations transitioning to IPv6 or operating in a dual-stack environment.

936294

Enhance the SD-WAN hub and spoke speed test feature as follows:

  • Allow the speed test server to be deployed on the hub. Speed tests can be initiated from the spokes in cases when a spoke is behind NAT.
  • Support uploading and downloading tests.

  • Support TCP and UDP.
  • Allow users to apply an egress shaping profile (update-shaper) to an IPsec tunnel (none, local, remote, or both).
  • Support configuring custom speed test ports.

Security Fabric

See Security Fabric in the New Features Guide for more information.

Feature ID

Description

815483

FOS now supports configurable Purdue levels for Fortinet Fabric devices, specifically: FortiGate, managed FortiSwitch, and FortiAP.

This means that users have the flexibility to adjust the Purdue levels of these devices according to their specific needs and preferences, enhancing the adaptability and functionality of their Fabric devices.

Security Profiles

See Security profiles in the New Features Guide for more information.

Feature ID

Description

744954

Support Punycode encoding in the url and hostname fields in flow mode web filter UTM logs. This caters to domain names containing non-ASCII characters, such as internationalized domain names (IDNs). Is also aligns the functionality of flow and proxy modes, offering a more unified and improved user experience.

config webfilter profile
    edit <name>
        set web-flow-log-encoding {utf-8 | punycode}
    next
end

848844

Diameter protocol inspection is supported on the FortiGate. Key features include:

  • Diameter-based packet forwarding and routing: the FortiGate can forward and route Diameter packets that match a firewall policy with an enabled diameter-filter profile.

  • Packet sanity checking: this feature checks if the packet passing through the FortiGate conforms to the Diameter protocol standards as defined in RFC 3588.

  • Logging: for network auditing purposes, the traffic for both dropped and forwarded Diameter-based packets can be logged.

This is crucial for interfaces used to exchange information with roaming partners over the IPX network.

888411

Enhance customization and control in the video filter profile with two keyword-based filters for video titles and descriptions that offer AND'/'OR logic options. Users can prioritize configured filters, and manage all categories and channels that match the filters using the Any option.

939342

DLP has been enhanced with a Data Threat Feed, Exact Data Match Support, and Enhanced Keyword Search. These upgrades aim to optimize data management and minimize false positives.

959763

The inline IPS feature allows HTTP/HTTPS traffic to be processed directly in WAD for application control and IPS UTM features, reducing reliance on the IPS Engine. The IPS Engine is still required for non-HTTP protocols. This feature is automatically enabled for new devices, but is not enabled if upgrading from FortiOS 7.4.1 or earlier.

config ips settings
    set proxy-inline-ips {enable | disable}
end

System

See System in the New Features Guide for more information.

Feature ID

Description

480717

Add config system dedicated-mgmt to all FortiGate models with mgmt, mgmt1, and mgmt2 ports.

739200

Add GUI support to prevent FortiGates with an expired support contract from upgrading to a major or minor firmware release.

946205

Enhance IPv6 VRRP to manage and control the VRRP states. Previously, the VRRP states would continue to be primary as long as the IPv6 VRRP destination could be reached by any route, including the default route.

config system interface
    edit <name>
        config ipv6
            config vrrp6
                edit <id>
                    set ignore-default-route {enable | disable}
                next
            end
        end
    next
end

954639

Support SNMP traps for monitoring the free and freeable memory usage on FortiGates.

config system snmp sysinfo
    set trap-free-memory-threshold <integer>
    set trap-freeable-memory-threshold <integer>
end

964697

Support the SNMP trap when power is restored to the power supply unit (PSU) in a FortiGate. When the PSU regains power after an outage, an SNMP trap should be triggered. This enhances the monitoring capabilities of the FortiGate.

VPN

See IPsec and SSL VPN in the New Features Guide for more information.

Feature ID

Description

780297

Rename the mdst-addr6 IKE debug filter option to mrem-addr6.

879452

Add the ability to rename their IPsec tunnels. Once a tunnel name is changed, all references to that tunnel, such as routing and policies, are automatically updated to reflect the new name. This ensures consistency and saves users the trouble of manually updating each reference.

config vpn ipsec phase1-interface
    rename <string> to <string>
end

887173

IPsec tunnels between HA members use manual keys to encrypt and authenticate, which may not be sufficient for some internal security policies. The IKE daemon has been updated to use auto-negotiation for the IPsec tunnel key, and to establish and maintain the tunnel.

config system ha
    set ipsec-phase2-proposal <option>
end

905804

Support IPsec key retrieval with a quantum key distribution (QKD) system using the ETSI standardized API. This eliminates negotiation, simplifies the process, and enhances efficiency in IPsec key management.

921914

Support autoconnect to IPsec VPN using Microsoft Entra ID. This enables seamless and secure connectivity for users accessing corporate resources by automatically establishing IPsec VPN connections based on Microsoft Entra ID logon session information.

923120

Introduce a proprietary solution to support the encapsulation of Encapsulating Security Payload (ESP) packets within Transmission Control Protocol (TCP) headers. This allows ESP packets to be assigned a port number, which enables them to traverse over carrier networks where direct IPsec traffic is blocked or impeded by carrier-grade NAT.

The TCP port for IKE/IPsec traffic is configured in the global settings:

config system settings
    set ike-tcp-port <integer>
end

The phase 1 interface settings include options for ESP encapsulation:

config vpn ipsec phase1-interface
    edit <name>
        set ike-version 2
        set transport {udp | udp-fallback-tcp | tcp}
        set fortinet-esp {enable | disable}
        set fallback-tcp-threshold <integer>
    next
end

ZTNA

See Zero Trust Network Access in the New Features Guide for more information.

Feature ID

Description

865016

Introduce Fabric integration between the FortiGate and FortiGSLB, which allows a FortiGate to publish custom host and domain names directly to FortiGSLB. This enables external IPs on VIPs used in ZTNA server objects to be published with the host and domain names directly to FortiGSLB, where its DNS service can provide nameserver lookups for the FQDNs.

897240

The Any/All GUI selector for ZTNA tags is added back to the simple and full ZTNA policy configuration page. The setting is defaulted to Any.

New features or enhancements

New features or enhancements

More detailed information is available in the New Features Guide.

Cloud

See Public and private cloud in the New Features Guide for more information.

Feature ID

Description

737947

When configuring a FortiGate VM as a network virtual appliance (NVA) as part of the Azure vWAN solution, the FortiGate can make API calls and send health metrics to Azure for integration with Azure Monitor.

839076

Add GUI support for configuring various AWS resource addresses using an AWS SDN connector.

930522

Remote access with read and write rights through FortiGate Cloud now requires a paid FortiGate Cloud subscription. The FortiGate can still be accessed in a read-only state with the free tier of FortiGate Cloud. Alternatively, you can access your FortiGate through its web interface.

Please contact your Fortinet Sales/Partner for details on purchasing a FortiGate Cloud Service subscription license for your FortiGate device.

938066

FortiOS supports customizing retry times and intervals for token activation for FortiFlex/Flex-VM licenses.

execute vm-license-options count <integer>
execute vm-license-options interval <integer>

952335

Add GUI support to apply a FortiFlex token on the FortiGate VM License page.

  • For newly deployed or expired VM instances: when the license pop-up appears.
  • For already licensed VM instances: from the Virtual Machine dashboard widget or the System > FortiGuard page.

FortiGate 6000 and 7000 platforms

Feature ID

Description

814242

The FortiGate 7000F platform supports setting a custom load balancing method for an individual VDOM. All of the traffic destined for that VDOM will be distributed to FPMs by the NP7 load balancers according to the following setting:

config system settings
    set dp-load-distribution-method {derived | to-primary | src-ip | dst-ip | src-dst-ip | src-ip-sport | dst-ip-dport | src-dst-ip-sport-dport}
end

The default load balancing method, derived, means traffic for that VDOM uses the global load balancing method set by the dp-load-distribution-method option of the global config load-balance setting command.

GUI

See GUI in the New Features Guide for more information.

Feature ID

Description

926533

The FortiOS GUI indicates when users are running the STS (Special Technical Support) build (formerly known as TOP3). It is more apparent that the user is using this specific build, and the associated risks are highlighted after users log in.

Hyperscale

Feature ID

Description

875141

Support the transmission of logs using TCP. This is a significant improvement from the previous version, which only supported UDP. TCP provides a more reliable connection, ensuring no logs are lost during transmission. This is beneficial for carrier customers who require a robust and dependable logging system.

920148

IPv4 or IPv6 IP address threat feeds can be added to hyperscale firewall policies as source or destination addresses.

921750

Support NetFlow version 9 for session logging in hyperscale VDOMs. By integrating NetFlow version 9 for session logging, the hyperscale software offers users a more comprehensive and precise view of network traffic data. This leads to enhanced network monitoring, troubleshooting, and planning capabilities.

936747

On FortiGates with multiple NP7 processors with hyperscale enabled, you can use the following command to optimize NP7 network session setup (NSS) engine performance.

config system npu
    set nss-threads-option {4T-EIF | 4T-NOEIF | 2T}
end
  • 4T-EIF: the NSS is configured with four threads and the Endpoint Independent Filtering (EIF) feature is allowed (the default). NSS with four threads supports the maximum NP7 Connections Per Second (CPS) performance.

  • 4T-NOEIF: the NSS is configured with four threads and the EIF feature is not allowed. Also supports the maximum NP7 CPS performance.

  • 2T: the NSS is configured with two threads and the EIF feature is allowed. This setting reduces the maximum NP7 CPS performance.

Note

Changing the nss-threads-option causes the FortiGate to restart.

940504

In hyperscale CGNAT PBA and SPA configurations, quick port re-use can occur because the default direct port selection mode always selects the next available port number in the port range. So if a port number that is low in the port range, becomes available it will be selected first. Quick port re-use can cause delays for some clients in some network configurations.

You can use the following commands to change the PBA and SPA port selection modes to random. In random mode, after selecting the first port number in the range, random mode randomly selects any port number in the range. Selecting a random port number makes it less likely to quickly re-use the same port numbers.

To change the PBA port selection mode:

config system npu
    set pba-port-select-mode {random | direct}
end

968801

Add enforce-seq-order hyperscale hardware logging option to enable or disable sending hyperscale VDOM software session logs in order by sequence number.

LAN Edge

See LAN Edge in the New Features Guide for more information.

Feature ID

Description

834550

Introduce FortiSwitch management using the HTTPS protocol. This new capability supports all the same FortiLink features, offering users a simpler alternative to the more complex CAPWAP protocol.

866172

The local radio of FortiWiFi 8xF, 6xF, and 40F models when operating in client mode and connecting with a third-party SSID can be configured in the GUI to use either WPA3 SAE or Opportunistic Wireless Encryption (OWE) security mode.

866174

When a specific Fortinet external antenna is installed, the FortiAP profiles of FAP-432F, FAP-433F, FAP-U432F, and FAP-U433F models can be configured using the optional-antenna setting by choosing from a list of supported Fortinet external antenna models. For example, for the FAP-433F:

config wireless-controller wtp-profile
    edit "FAP433F"
        config radio-1
            set optional-antenna {none | FANT-04ABGN-0606-O-R | FANT-04ABGN-0606-P-R}
        end
    next
end

This setting can be configured in the GUI for supported FortiAP profile in the Radio section. Enable External antenna and select the external antenna model from the list of defined values.

This setting allows antenna gains that are specific to the Fortinet external antenna model and the Wi-Fi band (2.4 GHz or 5 GHz) being used to be taken into consideration by the FortiGate wireless controller to set transmit power properly for a managed FortiAP device.

906063

FortiOS allows you to define the formatting of specific RADIUS request attributes when they are transmitted to the RADIUS server, including: User-Name, User-Password, Called-Station-Id, and Calling-Station-Id.

913213

When authenticating users with a RADIUS server, FortiOS can now dynamically assign a different NAS-IP-Address attribute to the managed switches. For more control, this feature also allows you to manually override the dynamic assignment and set the NAS-IP-Address attribute for individual switches as per your requirements.

918856

FortiOS supports assigning a priority to each VLAN. If there is more than one VLAN with the same name, the VLAN with the lowest priority value will be selected by the managed FortiSwitch.

933260

Support RADIUS accounting interim updates on roaming for WPA-Enterprise security. The enhancement is specifically designed to resolve compatibility issues with Cisco's Identity Services Engine (ISE) session stitching feature with improved interoperability between devices and networks, leading to a more seamless and secure wireless connectivity experience. This is beneficial for organizations that rely on Cisco ISE for network access control, as it ensures their security protocols align with industry standards.

config wireless-controller vap
    edit <name>
        set security wpa2-only-enterprise
        set roaming-acct-interim-update {enable | disable}
    next
end

939229

Support the Hunting-and-Pecking (HnP) Only authentication method for WPA3-SAE SSIDs. This setting is disabled by default.

config wireless-controller vap
    edit <name>
        set ssid <name>
        set security wpa3-sae
        set pmf enable
        set sae-hnp-only {enable | disable}
    next
end

940562

When a third-party external antenna is installed, the FortiAP profiles of selected models can be configured with set optional-antenna custom and set optional-antenna-gain <integer> (in dBi, 0 - 20, default = 0).

Supported FortiAP models include: FAP-432F, FAP-432FR, FAP-433F, FAP-233G, FAP-432G, FAP-433G, FAP-U432F, and FAP-U433F. For example:

config wireless-controller wtp-profile
    edit "FP433G"
        config platform
            set type 433G
        end
        config radio-2
            set optional-antenna custom
            set optional-antenna-gain "10"
        end
    next
end

These settings can be configured in the GUI for supported FortiAP profile in the Radio section. Enable External antenna, select Custom from the dropdown, and enter a value for External antenna gain (dB).

940905

Support WPA3 options when the radio mode is set to Fortinet's SAM (Service Assurance Manager). This includes WPA3-SAE and WPA3 OWE. In also includes support for WPA2/WPA3-Enterprise with certificate authentication, encompassing both PEAP and EAP-TLS.

config wireless-controller wtp-profile
    edit <name>
        config radio-1
            set mode sam
            set sam-ssid <string>
            set sam-security-type {wpa-enterprise |wpa3-sae | owe}
        end
    next
end

960883

Support individual control of the 802.11k and 802.11v protocols. In previous FortiOS versions, these protocols were jointly controlled with the voice-enterprise option.

config wireless-controller vap
    edit <name>
        set 80211k {enable | disable}
        set 80211v {enable | disable}
    next
end

962880

Simplify the Bonjour profile provisioning and failover mechanism.

  • Users can set the Bonjour profile in the WTP configuration and WTP profile.
    config wireless-controller wtp-profile
        edit <name>
            set bonjour-profile <name>
        next
    end
  • To ensure uninterrupted service, introduce a new election procedure among the APs. This provides a failover mechanism or redundancy if the Bonjour gateway goes down.

962881

Support hitless rolling AP upgrades. This feature smartly upgrades APs by not upgrading all APs at once. It queues some APs and considers the reachability of neighboring APs and their locations. This prevents service drops during simultaneous upgrades, ensuring uninterrupted WiFi service.

963851

Enhance CAPWAP management over NAT to provide a stability boost for Fortinet APs that operate behind a NAT device. This allows users to set the frequency of keep-alive messages, thereby improving connectivity.

config wireless-controller timers
    set nat-session-keep-alive <integer>
end

967663

Support the generation of a private key, a crucial component for SAE-PK authentication. This enhancement is significant as it offers an integrated mechanism for key generation, eliminating the need for third-party tools. This makes the FortiGate a more self-sufficient and secure system for SAE-PK authentication.

# execute wireless-controller create-sae-pk

969387

Support the automated reboot functionality for APs. This automatically reboots an AP stuck in a discovery loop, a state that disrupts network service. This smart feature reduces network downtime, and eliminates the need for manual intervention, thus saving time and resources. It ensures a resilient and seamless network experience.

config wireless-controller timers
    set ap-reboot-wait-interval <integer>
    set ap-reboot-wait-time <hh:mm>
    set ap-reboot-wait-interval2 <integer>
end

Log & Report

See Logging in the New Features Guide for more information.

Feature ID

Description

975411

Modify the log fields for long-lived sessions by adding three new log fields to the long-lived session log: duration delta (durationdelta), sent packet delta (sentpktdelta), and received packet delta (rcvdpktdelta). The fields enhance the granularity and accuracy of session logs, providing a more detailed view of long-lived sessions. This aids in troubleshooting and analysis.

Network

See Network in the New Features Guide for more information.

Feature ID

Description

685910

Add SoC4 driver support for the IEEE 802.1ad, which is also known as QinQ. When the OID is used up, it is forbidden to create a new QinQ interface.

881823

BGP now incorporates the advanced security measures of the TCP Authentication Option (TCP-AO). This integration bolsters the security of BGP connections and enhances the reliability of these connections, thereby contributing to the overall security of the internet.

  • Add cmac-aes128 option in the router key-chain settings:

    config router key-chain
        edit <name>
            config key
                edit <id>
                    set algorithm cmac-aes128
                next
            end
        next
    end
  • Add auth-options for BGP neighbor and neighbor-group settings:

    config router bgp
        config neighbor
            edit <ip>
                set auth-options <key-chain>
            end
        next
        config neighbor-group
            edit <name>
                set auth-options <key-chain>
            end
        next
    end
  • Add debug command for tcp-auth-options:

    # diagnose sys tcp-auth-options

890574

Support port mirroring with NP7 offloaded traffic. Offloaded packets are copied to a mirroring port, which can be linked to an external device for in-depth analytics.

921795

Simplify the configuration of the FortiGate LAN extension feature by automatically configuring a VDOM link between a traffic VDOM, by default, the root VDOM and the LAN extension VDOM.

After connecting to the FortiGate Controller, the following settings are automatically configured on the FortiGate Connector:

  • VDOM link interface in the LAN extension VDOM is a part of the LAN extension software switch
  • VDOM link interface in the traffic VDOM is dynamically assigned an IP address, which has been obtained from the FortiGate Controller

This feature is required to support the FortiGate Secure Edge use case for FortiSASE.

925668

FortiOS can be configured with a maximum of three sFlow collectors. This also applies to multi-VDOM environments where a maximum of three sFlow collectors can be used globally and/or on a per-VDOMs basis. This feature enables up to a maximum of three unique parallel sFlow streams or transmissions per sFlow sample to three different sFlow collectors. The sFlow collector configuration can only be configured in the CLI.

934273

Support the BGP graceful restart helper-only mode. This ensures that during a FortiGate HA failover, the neighboring router that only supports BGP graceful restart helper mode retains its routes.

941347

Enhance FortiOS packet capture. If the browser is closed or refreshed, users can return at a later time to view, stop, restart, or download the capture. The number of captures that can be stored on FortiGate is determined by the device's capabilities. REST APIs have been introduced for starting, stopping, deleting, and downloading packet captures.

951273

FortiOS provides the ability to enable or disable 802.1x authentication on a per-port basis, providing administrators precise management over which ports use 802.1x.

951275

FortiOS provides the ability to enable or disable Spanning Tree Protocol (STP) on a per-port basis, providing administrators precise management over which ports use STP.

965990

FortiOS supports up to six NetFlow collectors. This enhancement extends to multi-VDOM environments where a maximum of six NetFlow collectors can be used globally or on a per-VDOMs basis.

Policy & Objects

See Policy and objects in the New Features Guide for more information.

Feature ID

Description

875309

Add GUI support for port block allocation (PBA) IP pools for NAT64 traffic.

886571

Support IPS inspection for multicast UDP traffic.

941072

The handling of virtual patch local-in traffic is optimized by identifying the type of traffic early based on its port number and protocol. The IPS engine will tag the local-in sessions for services, including SSL VPN and web GUI. If a tagged session does not have any vulnerability signatures for the FortiOS version, then IPS will bypass scanning the session. This optimizes performance by only scanning and dropping the sessions that are exploiting a vulnerability.

SD-WAN

See SD-WAN in the New Features Guide for more information.

Feature ID

Description

884084

Update SD-WAN with ADVPN to version 2.0 with major changes to ADVPN design and operation, namely, introducing edge discovery and path management for ADVPN spokes.

ADVPN 2.0 incorporates intelligence into the spokes to ensure shortcut tunnels, known as shortcuts, are established using underlays available on both spokes and chosen based on matching certain link health criteria.

ADVPN 2.0 provides a more flexible SD-WAN solution than the original ADVPN to achieve resiliency against underlay outages or degraded underlay performance that is no longer dependent on specific BGP routing designs or mechanisms.

900197

Add IPv6 support for SD-WAN segmentation over a single overlay. This allows seamless communication between IPv6 devices within virtual routing and forwarding (VRF) overlay networks, benefiting organizations transitioning to IPv6 or operating in a dual-stack environment.

936294

Enhance the SD-WAN hub and spoke speed test feature as follows:

  • Allow the speed test server to be deployed on the hub. Speed tests can be initiated from the spokes in cases when a spoke is behind NAT.
  • Support uploading and downloading tests.

  • Support TCP and UDP.
  • Allow users to apply an egress shaping profile (update-shaper) to an IPsec tunnel (none, local, remote, or both).
  • Support configuring custom speed test ports.

Security Fabric

See Security Fabric in the New Features Guide for more information.

Feature ID

Description

815483

FOS now supports configurable Purdue levels for Fortinet Fabric devices, specifically: FortiGate, managed FortiSwitch, and FortiAP.

This means that users have the flexibility to adjust the Purdue levels of these devices according to their specific needs and preferences, enhancing the adaptability and functionality of their Fabric devices.

Security Profiles

See Security profiles in the New Features Guide for more information.

Feature ID

Description

744954

Support Punycode encoding in the url and hostname fields in flow mode web filter UTM logs. This caters to domain names containing non-ASCII characters, such as internationalized domain names (IDNs). Is also aligns the functionality of flow and proxy modes, offering a more unified and improved user experience.

config webfilter profile
    edit <name>
        set web-flow-log-encoding {utf-8 | punycode}
    next
end

848844

Diameter protocol inspection is supported on the FortiGate. Key features include:

  • Diameter-based packet forwarding and routing: the FortiGate can forward and route Diameter packets that match a firewall policy with an enabled diameter-filter profile.

  • Packet sanity checking: this feature checks if the packet passing through the FortiGate conforms to the Diameter protocol standards as defined in RFC 3588.

  • Logging: for network auditing purposes, the traffic for both dropped and forwarded Diameter-based packets can be logged.

This is crucial for interfaces used to exchange information with roaming partners over the IPX network.

888411

Enhance customization and control in the video filter profile with two keyword-based filters for video titles and descriptions that offer AND'/'OR logic options. Users can prioritize configured filters, and manage all categories and channels that match the filters using the Any option.

939342

DLP has been enhanced with a Data Threat Feed, Exact Data Match Support, and Enhanced Keyword Search. These upgrades aim to optimize data management and minimize false positives.

959763

The inline IPS feature allows HTTP/HTTPS traffic to be processed directly in WAD for application control and IPS UTM features, reducing reliance on the IPS Engine. The IPS Engine is still required for non-HTTP protocols. This feature is automatically enabled for new devices, but is not enabled if upgrading from FortiOS 7.4.1 or earlier.

config ips settings
    set proxy-inline-ips {enable | disable}
end

System

See System in the New Features Guide for more information.

Feature ID

Description

480717

Add config system dedicated-mgmt to all FortiGate models with mgmt, mgmt1, and mgmt2 ports.

739200

Add GUI support to prevent FortiGates with an expired support contract from upgrading to a major or minor firmware release.

946205

Enhance IPv6 VRRP to manage and control the VRRP states. Previously, the VRRP states would continue to be primary as long as the IPv6 VRRP destination could be reached by any route, including the default route.

config system interface
    edit <name>
        config ipv6
            config vrrp6
                edit <id>
                    set ignore-default-route {enable | disable}
                next
            end
        end
    next
end

954639

Support SNMP traps for monitoring the free and freeable memory usage on FortiGates.

config system snmp sysinfo
    set trap-free-memory-threshold <integer>
    set trap-freeable-memory-threshold <integer>
end

964697

Support the SNMP trap when power is restored to the power supply unit (PSU) in a FortiGate. When the PSU regains power after an outage, an SNMP trap should be triggered. This enhances the monitoring capabilities of the FortiGate.

VPN

See IPsec and SSL VPN in the New Features Guide for more information.

Feature ID

Description

780297

Rename the mdst-addr6 IKE debug filter option to mrem-addr6.

879452

Add the ability to rename their IPsec tunnels. Once a tunnel name is changed, all references to that tunnel, such as routing and policies, are automatically updated to reflect the new name. This ensures consistency and saves users the trouble of manually updating each reference.

config vpn ipsec phase1-interface
    rename <string> to <string>
end

887173

IPsec tunnels between HA members use manual keys to encrypt and authenticate, which may not be sufficient for some internal security policies. The IKE daemon has been updated to use auto-negotiation for the IPsec tunnel key, and to establish and maintain the tunnel.

config system ha
    set ipsec-phase2-proposal <option>
end

905804

Support IPsec key retrieval with a quantum key distribution (QKD) system using the ETSI standardized API. This eliminates negotiation, simplifies the process, and enhances efficiency in IPsec key management.

921914

Support autoconnect to IPsec VPN using Microsoft Entra ID. This enables seamless and secure connectivity for users accessing corporate resources by automatically establishing IPsec VPN connections based on Microsoft Entra ID logon session information.

923120

Introduce a proprietary solution to support the encapsulation of Encapsulating Security Payload (ESP) packets within Transmission Control Protocol (TCP) headers. This allows ESP packets to be assigned a port number, which enables them to traverse over carrier networks where direct IPsec traffic is blocked or impeded by carrier-grade NAT.

The TCP port for IKE/IPsec traffic is configured in the global settings:

config system settings
    set ike-tcp-port <integer>
end

The phase 1 interface settings include options for ESP encapsulation:

config vpn ipsec phase1-interface
    edit <name>
        set ike-version 2
        set transport {udp | udp-fallback-tcp | tcp}
        set fortinet-esp {enable | disable}
        set fallback-tcp-threshold <integer>
    next
end

ZTNA

See Zero Trust Network Access in the New Features Guide for more information.

Feature ID

Description

865016

Introduce Fabric integration between the FortiGate and FortiGSLB, which allows a FortiGate to publish custom host and domain names directly to FortiGSLB. This enables external IPs on VIPs used in ZTNA server objects to be published with the host and domain names directly to FortiGSLB, where its DNS service can provide nameserver lookups for the FQDNs.

897240

The Any/All GUI selector for ZTNA tags is added back to the simple and full ZTNA policy configuration page. The setting is defaulted to Any.