New features or enhancements
More detailed information is available in the New Features Guide.
Cloud
See Public and private cloud in the New Features Guide for more information.
Feature ID |
Description |
---|---|
737947 |
When configuring a FortiGate VM as a network virtual appliance (NVA) as part of the Azure vWAN solution, the FortiGate can make API calls and send health metrics to Azure for integration with Azure Monitor. |
839076 |
Add GUI support for configuring various AWS resource addresses using an AWS SDN connector. |
930522 |
Remote access with read and write rights through FortiGate Cloud now requires a paid FortiGate Cloud subscription. The FortiGate can still be accessed in a read-only state with the free tier of FortiGate Cloud. Alternatively, you can access your FortiGate through its web interface. Please contact your Fortinet Sales/Partner for details on purchasing a FortiGate Cloud Service subscription license for your FortiGate device. |
938066 |
FortiOS supports customizing retry times and intervals for token activation for FortiFlex/Flex-VM licenses. execute vm-license-options count <integer> execute vm-license-options interval <integer> |
952335 |
Add GUI support to apply a FortiFlex token on the FortiGate VM License page.
|
FortiGate 6000 and 7000 platforms
Feature ID |
Description |
---|---|
814242 |
The FortiGate 7000F platform supports setting a custom load balancing method for an individual VDOM. All of the traffic destined for that VDOM will be distributed to FPMs by the NP7 load balancers according to the following setting: config system settings set dp-load-distribution-method {derived | to-primary | src-ip | dst-ip | src-dst-ip | src-ip-sport | dst-ip-dport | src-dst-ip-sport-dport} end The default load balancing method, |
GUI
See GUI in the New Features Guide for more information.
Feature ID |
Description |
---|---|
926533 |
The FortiOS GUI indicates when users are running the STS (Special Technical Support) build (formerly known as TOP3). It is more apparent that the user is using this specific build, and the associated risks are highlighted after users log in. |
Hyperscale
Feature ID |
Description |
||
---|---|---|---|
875141 |
Support the transmission of logs using TCP. This is a significant improvement from the previous version, which only supported UDP. TCP provides a more reliable connection, ensuring no logs are lost during transmission. This is beneficial for carrier customers who require a robust and dependable logging system. |
||
920148 |
IPv4 or IPv6 IP address threat feeds can be added to hyperscale firewall policies as source or destination addresses. |
||
921750 |
Support NetFlow version 9 for session logging in hyperscale VDOMs. By integrating NetFlow version 9 for session logging, the hyperscale software offers users a more comprehensive and precise view of network traffic data. This leads to enhanced network monitoring, troubleshooting, and planning capabilities. |
||
936747 |
On FortiGates with multiple NP7 processors with hyperscale enabled, you can use the following command to optimize NP7 network session setup (NSS) engine performance. config system npu set nss-threads-option {4T-EIF | 4T-NOEIF | 2T} end
|
||
940504 |
In hyperscale CGNAT PBA and SPA configurations, quick port re-use can occur because the default direct port selection mode always selects the next available port number in the port range. So if a port number that is low in the port range, becomes available it will be selected first. Quick port re-use can cause delays for some clients in some network configurations. You can use the following commands to change the PBA and SPA port selection modes to random. In random mode, after selecting the first port number in the range, random mode randomly selects any port number in the range. Selecting a random port number makes it less likely to quickly re-use the same port numbers. To change the PBA port selection mode: config system npu set pba-port-select-mode {random | direct} end |
||
968801 |
Add |
LAN Edge
See LAN Edge in the New Features Guide for more information.
Feature ID |
Description |
---|---|
834550 |
Introduce FortiSwitch management using the HTTPS protocol. This new capability supports all the same FortiLink features, offering users a simpler alternative to the more complex CAPWAP protocol. |
866172 |
The local radio of FortiWiFi 8xF, 6xF, and 40F models when operating in client mode and connecting with a third-party SSID can be configured in the GUI to use either WPA3 SAE or Opportunistic Wireless Encryption (OWE) security mode. |
866174 |
When a specific Fortinet external antenna is installed, the FortiAP profiles of FAP-432F, FAP-433F, FAP-U432F, and FAP-U433F models can be configured using the config wireless-controller wtp-profile edit "FAP433F" config radio-1 set optional-antenna {none | FANT-04ABGN-0606-O-R | FANT-04ABGN-0606-P-R} end next end This setting can be configured in the GUI for supported FortiAP profile in the Radio section. Enable External antenna and select the external antenna model from the list of defined values. This setting allows antenna gains that are specific to the Fortinet external antenna model and the Wi-Fi band (2.4 GHz or 5 GHz) being used to be taken into consideration by the FortiGate wireless controller to set transmit power properly for a managed FortiAP device. |
906063 |
FortiOS allows you to define the formatting of specific RADIUS request attributes when they are transmitted to the RADIUS server, including: User-Name, User-Password, Called-Station-Id, and Calling-Station-Id. |
913213 |
When authenticating users with a RADIUS server, FortiOS can now dynamically assign a different NAS-IP-Address attribute to the managed switches. For more control, this feature also allows you to manually override the dynamic assignment and set the NAS-IP-Address attribute for individual switches as per your requirements. |
918856 |
FortiOS supports assigning a priority to each VLAN. If there is more than one VLAN with the same name, the VLAN with the lowest priority value will be selected by the managed FortiSwitch. |
933260 |
Support RADIUS accounting interim updates on roaming for WPA-Enterprise security. The enhancement is specifically designed to resolve compatibility issues with Cisco's Identity Services Engine (ISE) session stitching feature with improved interoperability between devices and networks, leading to a more seamless and secure wireless connectivity experience. This is beneficial for organizations that rely on Cisco ISE for network access control, as it ensures their security protocols align with industry standards. config wireless-controller vap edit <name> set security wpa2-only-enterprise set roaming-acct-interim-update {enable | disable} next end |
939229 |
Support the Hunting-and-Pecking (HnP) Only authentication method for WPA3-SAE SSIDs. This setting is disabled by default. config wireless-controller vap edit <name> set ssid <name> set security wpa3-sae set pmf enable set sae-hnp-only {enable | disable} next end |
940562 |
When a third-party external antenna is installed, the FortiAP profiles of selected models can be configured with Supported FortiAP models include: FAP-432F, FAP-432FR, FAP-433F, FAP-233G, FAP-432G, FAP-433G, FAP-U432F, and FAP-U433F. For example: config wireless-controller wtp-profile edit "FP433G" config platform set type 433G end config radio-2 set optional-antenna custom set optional-antenna-gain "10" end next end These settings can be configured in the GUI for supported FortiAP profile in the Radio section. Enable External antenna, select Custom from the dropdown, and enter a value for External antenna gain (dB). |
940905 |
Support WPA3 options when the radio mode is set to Fortinet's SAM (Service Assurance Manager). This includes WPA3-SAE and WPA3 OWE. In also includes support for WPA2/WPA3-Enterprise with certificate authentication, encompassing both PEAP and EAP-TLS. config wireless-controller wtp-profile edit <name> config radio-1 set mode sam set sam-ssid <string> set sam-security-type {wpa-enterprise |wpa3-sae | owe} end next end |
960883 |
Support individual control of the 802.11k and 802.11v protocols. In previous FortiOS versions, these protocols were jointly controlled with the config wireless-controller vap edit <name> set 80211k {enable | disable} set 80211v {enable | disable} next end |
962880 |
Simplify the Bonjour profile provisioning and failover mechanism.
|
962881 |
Support hitless rolling AP upgrades. This feature smartly upgrades APs by not upgrading all APs at once. It queues some APs and considers the reachability of neighboring APs and their locations. This prevents service drops during simultaneous upgrades, ensuring uninterrupted WiFi service. |
963851 |
Enhance CAPWAP management over NAT to provide a stability boost for Fortinet APs that operate behind a NAT device. This allows users to set the frequency of keep-alive messages, thereby improving connectivity. config wireless-controller timers set nat-session-keep-alive <integer> end |
967663 |
Support the generation of a private key, a crucial component for SAE-PK authentication. This enhancement is significant as it offers an integrated mechanism for key generation, eliminating the need for third-party tools. This makes the FortiGate a more self-sufficient and secure system for SAE-PK authentication. # execute wireless-controller create-sae-pk |
969387 |
Support the automated reboot functionality for APs. This automatically reboots an AP stuck in a discovery loop, a state that disrupts network service. This smart feature reduces network downtime, and eliminates the need for manual intervention, thus saving time and resources. It ensures a resilient and seamless network experience. config wireless-controller timers set ap-reboot-wait-interval <integer> set ap-reboot-wait-time <hh:mm> set ap-reboot-wait-interval2 <integer> end |
Log & Report
See Logging in the New Features Guide for more information.
Feature ID |
Description |
---|---|
975411 |
Modify the log fields for long-lived sessions by adding three new log fields to the long-lived session log: duration delta ( |
Network
See Network in the New Features Guide for more information.
Feature ID |
Description |
---|---|
685910 |
Add SoC4 driver support for the IEEE 802.1ad, which is also known as QinQ. When the OID is used up, it is forbidden to create a new QinQ interface. |
881823 |
BGP now incorporates the advanced security measures of the TCP Authentication Option (TCP-AO). This integration bolsters the security of BGP connections and enhances the reliability of these connections, thereby contributing to the overall security of the internet.
|
890574 |
Support port mirroring with NP7 offloaded traffic. Offloaded packets are copied to a mirroring port, which can be linked to an external device for in-depth analytics. |
921795 |
Simplify the configuration of the FortiGate LAN extension feature by automatically configuring a VDOM link between a traffic VDOM, by default, the root VDOM and the LAN extension VDOM. After connecting to the FortiGate Controller, the following settings are automatically configured on the FortiGate Connector:
This feature is required to support the FortiGate Secure Edge use case for FortiSASE. |
925668 |
FortiOS can be configured with a maximum of three sFlow collectors. This also applies to multi-VDOM environments where a maximum of three sFlow collectors can be used globally and/or on a per-VDOMs basis. This feature enables up to a maximum of three unique parallel sFlow streams or transmissions per sFlow sample to three different sFlow collectors. The sFlow collector configuration can only be configured in the CLI. |
934273 |
Support the BGP graceful restart helper-only mode. This ensures that during a FortiGate HA failover, the neighboring router that only supports BGP graceful restart helper mode retains its routes. |
941347 |
Enhance FortiOS packet capture. If the browser is closed or refreshed, users can return at a later time to view, stop, restart, or download the capture. The number of captures that can be stored on FortiGate is determined by the device's capabilities. REST APIs have been introduced for starting, stopping, deleting, and downloading packet captures. |
951273 |
FortiOS provides the ability to enable or disable 802.1x authentication on a per-port basis, providing administrators precise management over which ports use 802.1x. |
951275 |
FortiOS provides the ability to enable or disable Spanning Tree Protocol (STP) on a per-port basis, providing administrators precise management over which ports use STP. |
965990 |
FortiOS supports up to six NetFlow collectors. This enhancement extends to multi-VDOM environments where a maximum of six NetFlow collectors can be used globally or on a per-VDOMs basis. |
Policy & Objects
See Policy and objects in the New Features Guide for more information.
Feature ID |
Description |
---|---|
875309 |
Add GUI support for port block allocation (PBA) IP pools for NAT64 traffic. |
886571 |
Support IPS inspection for multicast UDP traffic. |
941072 |
The handling of virtual patch local-in traffic is optimized by identifying the type of traffic early based on its port number and protocol. The IPS engine will tag the local-in sessions for services, including SSL VPN and web GUI. If a tagged session does not have any vulnerability signatures for the FortiOS version, then IPS will bypass scanning the session. This optimizes performance by only scanning and dropping the sessions that are exploiting a vulnerability. |
SD-WAN
See SD-WAN in the New Features Guide for more information.
Feature ID |
Description |
---|---|
884084 |
Update SD-WAN with ADVPN to version 2.0 with major changes to ADVPN design and operation, namely, introducing edge discovery and path management for ADVPN spokes. ADVPN 2.0 incorporates intelligence into the spokes to ensure shortcut tunnels, known as shortcuts, are established using underlays available on both spokes and chosen based on matching certain link health criteria. ADVPN 2.0 provides a more flexible SD-WAN solution than the original ADVPN to achieve resiliency against underlay outages or degraded underlay performance that is no longer dependent on specific BGP routing designs or mechanisms. |
900197 |
Add IPv6 support for SD-WAN segmentation over a single overlay. This allows seamless communication between IPv6 devices within virtual routing and forwarding (VRF) overlay networks, benefiting organizations transitioning to IPv6 or operating in a dual-stack environment. |
936294 |
Enhance the SD-WAN hub and spoke speed test feature as follows:
|
Security Fabric
See Security Fabric in the New Features Guide for more information.
Feature ID |
Description |
---|---|
815483 |
FOS now supports configurable Purdue levels for Fortinet Fabric devices, specifically: FortiGate, managed FortiSwitch, and FortiAP. This means that users have the flexibility to adjust the Purdue levels of these devices according to their specific needs and preferences, enhancing the adaptability and functionality of their Fabric devices. |
Security Profiles
See Security profiles in the New Features Guide for more information.
Feature ID |
Description |
---|---|
744954 |
Support Punycode encoding in the config webfilter profile edit <name> set web-flow-log-encoding {utf-8 | punycode} next end |
848844 |
Diameter protocol inspection is supported on the FortiGate. Key features include:
This is crucial for interfaces used to exchange information with roaming partners over the IPX network. |
888411 |
Enhance customization and control in the video filter profile with two keyword-based filters for video titles and descriptions that offer AND'/'OR logic options. Users can prioritize configured filters, and manage all categories and channels that match the filters using the Any option. |
939342 |
DLP has been enhanced with a Data Threat Feed, Exact Data Match Support, and Enhanced Keyword Search. These upgrades aim to optimize data management and minimize false positives. |
959763 |
The inline IPS feature allows HTTP/HTTPS traffic to be processed directly in WAD for application control and IPS UTM features, reducing reliance on the IPS Engine. The IPS Engine is still required for non-HTTP protocols. This feature is automatically enabled for new devices, but is not enabled if upgrading from FortiOS 7.4.1 or earlier. config ips settings set proxy-inline-ips {enable | disable} end |
System
See System in the New Features Guide for more information.
Feature ID |
Description |
---|---|
480717 |
Add |
739200 |
Add GUI support to prevent FortiGates with an expired support contract from upgrading to a major or minor firmware release. |
946205 |
Enhance IPv6 VRRP to manage and control the VRRP states. Previously, the VRRP states would continue to be primary as long as the IPv6 VRRP destination could be reached by any route, including the default route. config system interface edit <name> config ipv6 config vrrp6 edit <id> set ignore-default-route {enable | disable} next end end next end |
954639 |
Support SNMP traps for monitoring the free and freeable memory usage on FortiGates. config system snmp sysinfo set trap-free-memory-threshold <integer> set trap-freeable-memory-threshold <integer> end |
964697 |
Support the SNMP trap when power is restored to the power supply unit (PSU) in a FortiGate. When the PSU regains power after an outage, an SNMP trap should be triggered. This enhances the monitoring capabilities of the FortiGate. |
VPN
See IPsec and SSL VPN in the New Features Guide for more information.
Feature ID |
Description |
---|---|
780297 |
Rename the |
879452 |
Add the ability to rename their IPsec tunnels. Once a tunnel name is changed, all references to that tunnel, such as routing and policies, are automatically updated to reflect the new name. This ensures consistency and saves users the trouble of manually updating each reference. config vpn ipsec phase1-interface rename <string> to <string> end |
887173 |
IPsec tunnels between HA members use manual keys to encrypt and authenticate, which may not be sufficient for some internal security policies. The IKE daemon has been updated to use auto-negotiation for the IPsec tunnel key, and to establish and maintain the tunnel. config system ha set ipsec-phase2-proposal <option> end |
905804 |
Support IPsec key retrieval with a quantum key distribution (QKD) system using the ETSI standardized API. This eliminates negotiation, simplifies the process, and enhances efficiency in IPsec key management. |
921914 |
Support autoconnect to IPsec VPN using Microsoft Entra ID. This enables seamless and secure connectivity for users accessing corporate resources by automatically establishing IPsec VPN connections based on Microsoft Entra ID logon session information. |
923120 |
Introduce a proprietary solution to support the encapsulation of Encapsulating Security Payload (ESP) packets within Transmission Control Protocol (TCP) headers. This allows ESP packets to be assigned a port number, which enables them to traverse over carrier networks where direct IPsec traffic is blocked or impeded by carrier-grade NAT. The TCP port for IKE/IPsec traffic is configured in the global settings: config system settings set ike-tcp-port <integer> end The phase 1 interface settings include options for ESP encapsulation: config vpn ipsec phase1-interface edit <name> set ike-version 2 set transport {udp | udp-fallback-tcp | tcp} set fortinet-esp {enable | disable} set fallback-tcp-threshold <integer> next end |
ZTNA
See Zero Trust Network Access in the New Features Guide for more information.
Feature ID |
Description |
---|---|
865016 |
Introduce Fabric integration between the FortiGate and FortiGSLB, which allows a FortiGate to publish custom host and domain names directly to FortiGSLB. This enables external IPs on VIPs used in ZTNA server objects to be published with the host and domain names directly to FortiGSLB, where its DNS service can provide nameserver lookups for the FQDNs. |
897240 |
The Any/All GUI selector for ZTNA tags is added back to the simple and full ZTNA policy configuration page. The setting is defaulted to Any. |