Fortinet black logo

SD-WAN Deployment for MSSPs

7.2.0

Onboarding Devices

Onboarding Devices

The last step is to onboard the "real" device by linking it to the respective Model Device. The exact actions depend on the chosen onboarding method:

  • For Zero-Touch Provisioning, it is enough to connect the FortiGate device to the network and power it on. In this case, the device will be authorized using its Serial Number.

  • For Low-Touch Provisioning, it is required to specify FortiManager details manually, using the following CLI snippet. (Device authorization can be done either using its Serial Number or using a Pre-shared key):

    config system central-management
        set type fortimanager
        set fmg {<IP_address> | <Domain name>}
    end
    execute central-mgmt register-device <fmg-serial-number> <pre-shared-key>
Note

For FortiGates running FortiOS 7.2.8 and later, the FortiManager serial number must also be preconfigured.

config system central-management
  set type fortimanager
  set serial-number <FortiManager serial number>
  set fmg {<IP_address> | <Domain name>}
end

Detailed overview of the FortiGate provisioning methods is outside the scope of this document.

Once the FortiGate device contacts FortiManager, the Auto-Link process will start, and the device is authorized and linked to its respective Model Device. The complete device configuration and the Firewall Policy Package will be pushed to the device.

You can follow this process under System Settings > Task Monitor:

Once the process is successfully completed, the FortiGate device will be fully deployed and operational:

Onboarding Devices

The last step is to onboard the "real" device by linking it to the respective Model Device. The exact actions depend on the chosen onboarding method:

  • For Zero-Touch Provisioning, it is enough to connect the FortiGate device to the network and power it on. In this case, the device will be authorized using its Serial Number.

  • For Low-Touch Provisioning, it is required to specify FortiManager details manually, using the following CLI snippet. (Device authorization can be done either using its Serial Number or using a Pre-shared key):

    config system central-management
        set type fortimanager
        set fmg {<IP_address> | <Domain name>}
    end
    execute central-mgmt register-device <fmg-serial-number> <pre-shared-key>
Note

For FortiGates running FortiOS 7.2.8 and later, the FortiManager serial number must also be preconfigured.

config system central-management
  set type fortimanager
  set serial-number <FortiManager serial number>
  set fmg {<IP_address> | <Domain name>}
end

Detailed overview of the FortiGate provisioning methods is outside the scope of this document.

Once the FortiGate device contacts FortiManager, the Auto-Link process will start, and the device is authorized and linked to its respective Model Device. The complete device configuration and the Firewall Policy Package will be pushed to the device.

You can follow this process under System Settings > Task Monitor:

Once the process is successfully completed, the FortiGate device will be fully deployed and operational: