Fortinet white logo
Fortinet white logo

What's new

What's new

The following sections describe new features, enhancements, and changes:

Support for shared traffic shapers and per-IP traffic shapers

You can now use shared traffic shapers in a firewall shaping policy to indicate the priority and guaranteed and maximum bandwidth for a specified type of traffic use.

You can also use per-IP traffic shapers to limit each IP address's behavior to avoid a situation where one user uses all of the available bandwidth. In addition to controlling the maximum bandwidth used per IP address, you can also define the maximum number of concurrent sessions for an IP address.

To configure shared traffic shapers or per-IP traffic shapers:
  1. Create a firewall policy under Policy and Objects >> Policy. Alternatively, use the config firewall policy command to create the firewall policy.
  2. Create the shared traffic shapers or per-IP traffic shapers in the Traffic Shapers tab under Policy >> Traffic Shaping. Alternatively, use the config firewall shaper traffic-shaper command to create the shared traffic shapers or use the config firewall shaper per-ip-shaper command to create the per-IP traffic shapers.
  3. In the Traffic Shaping Policies tab under Policy >> Traffic Shaping, create a firewall shaping policy that uses the traffic shapers you created in step 2. Alternatively, use the config firewall shaping-policy command to create the firewall shaping policy.
To diagnose shared traffic shapers, use the following commands:
  • # dia fire shaper traffic-shaper list

    name shape

    maximum-bandwidth 25000000 bytes/sec

    guaranteed-bandwidth 12500000 bytes/sec

    current-bandwidth 0 bytes/sec

    priority 2

    overhead 0

    tos ff

    packets dropped 0

    bytes dropped 0

  • # dia fire shaper traffic-shaper stats

    shapers 1 ipv4 0 ipv6 0 drops 0 dropped bytes 0

To diagnose per-IP traffic shapers, use the following commands:
  • # dia firewall shaper per-ip-shaper list

    name 1

    maximum-bandwidth 375 bytes/sec

    maximum-concurrent-session 0

    tos 07/03

    packets dropped 0

    bytes dropped 0

    addr=192.168.122.180 status: bytes/sec=0 ses=2

  • # dia firewall shaper per-ip-shaper stats

    memory allocated 2 packet dropped: 0

View license usage history

Use the new License Usage History widget to view license usage history for shared licenses at a certain interval. Configure the interval at the top-right corner with the following options: 15 seconds, 5 minutes, 1 hour, 1 day, 1 week, 1 month, or 1 year. For each timestamp, the widget displays the following values:

  • Min Usage—Minimum number of license seats used during the past interval.

  • Max Usage—Maximum number of license seats used during the past interval.

  • Average Usage—Average number of license seats used during the past interval.

Alternatively, use the following diagnose command to show license usage in the CLI:

wad license usage [seconds | minutes | hour | day | week | year]

To manipulate the license usage data for testing purposes:

You can insert a data set entry to the past 15 seconds using the following command:

diag wad license test [value] [number of entries]

For example, diag wad license test 20 1 means adding one entry of the data set [min=20, max=20, average=20] to the license usage data of the past 15 seconds.

To clear all license usage history data:

diag wad license clear

Port exhaustion alerts in GUI

Under Log & Report, use the new Port Exhaustion Alert tab to view port exhaustion events with timestamp, virtual domain, protocol, and address information of the exhaustion. When a port exhaustion occurs, an alert appears next to Log & Report and Port Exhaustion Alert until the event expires.

Set size limit of ICAP server scan

When creating or editing an ICAP profile under Content Analysis >> ICAP Profile, you can now specify the ICAP server scan size limit for a single request within the range of 0-4096 (MB). The default is 0 MB, which means unlimited.

Alternatively, in the CLI, use the set scan-size-limit {integer} option under the config icap profile command to set the ICAP server scan size limit. You can further configure whether to generate an ICAP log for bypassed oversize events using the set scan-oversize-log [disable|enable] option.

Support for forwarding domains in transparent mode

A forwarding domain is used to create separate broadcast domains and confine traffic across two or more ports. It also allows learning the same MAC in different VLANs (IVL).

  • Use the set forward-domain option under config system settings to enable or disable forwarding domains.

  • Use the set forward-domain option under config system interface to configure the transparent mode forward domain. This option accepts integers within the range 1-4094.

Enhancement to forward server monitoring

The Forward Server Monitor widget in Dashboard includes several enhancements:

  • The Status column is renamed Forward. Forward servers with Health Check disabled will always be Up in the Forward column. When such a forward server is part of a server group, it serves as a backup option when no other server is up and running.

  • The new State column is added to provide more specific state information about the forward server. The following states are available:

    • pending—Initial state of all forward servers. A pending forward server can mean one of the following:

      • The state of the forward server is unknown, which means no connection has been established yet or the state has not been updated yet.

      • The forward server is running but pending FQDN resolve. FQDN resolve failure triggers a state change to down.

    • try_once—For forward servers in down state with Health Monitor disabled, FortiProxy periodically switches its state from down to try_once to verify the latest status of the server to avoid situations where a server in down state is ignored in all subsequent health state checks.

    • busy—The forward server is running but unstable.

    • down—The forward server is not running and connections are blocked.

In the CLI, the following enhancements are applied to forward server monitoring:

  • New diagnose command diag wad webproxy forward-server detail to display the state of each worker.

  • New diagnose commands diag debug en and diag wad webproxy forward-server arbiter to display the following information:

    • All forward servers known by the arbiter.

    • Last time when the status of each server was evaluated.

    • Status of each server.

  • The diag wad webproxy forward-server command now displays the following additional information:

    • Number of successful, failed, ongoing, and total traffic through the forward server.

    • Number of blocked connection by that specific forward server.

  • The diag wad webproxy forward-server-group command now displays the following additional information:

    • Number of blocked connections.

    • Number of workers that load the forward server into memory.

Diagnose transceivers of an interface

Under Network >> Interfaces, for models that support transceivers, the Transceiver(s) column is available which shows information about transceivers plugged into the FortiProxy, including the vendor name and part number. You can hover over the transceiver to view additional information, such as the type, serial number, and port name.

Alternatively, use the new get system interface transceiver <interface name> command to diagnose interface transceivers. Interface name must be one of the following:

  • port3

  • port4

  • port7

  • port8

Example output:

fortiproxy1-nh # get sys interface transceiver port3

Interface port3 - Transceiver is not detected.

fortiproxy1-nh # get sys interface transceiver

Interface port3 - Transceiver is not detected.

Interface port4 - Transceiver is not detected.

Interface port7 - Transceiver is not detected.

Interface port8 - SFP/SFP+ (10.3G)

Vendor Name : AVAGO

Part No. : AFBR-709ASMZ

Serial No. : AA14393JMGU

Optical Optical Optical

SFP/SFP+ Temperature Voltage Tx Bias Tx Power Rx Power

Interface (Celsius) (Volts) (mA) (dBm) (dBm)

------------ ------------ ------------ ------------ ------------ ------------

port8 29.1 3.34 5.44 -2.3 -6.1

++ : high alarm, + : high warning, - : low warning, -- : low alarm, ? : suspect.

Support for webfilter strict search and safe search level on Qwant

Add local URL list as data source for firewall

To add local URL list as data source for firewall via CLI:
  1. Define the local URL list in web filter:
    config  webfilter url-list

    edit <name>

    set uuid {uuid}

    set status [enable|disable]

    set comment {var-string}

    config entries

    edit <url>

    next

    end

    next

    end

  2. Configure the firewall proxy or the to use the local URL list:
    config firewall proxy-address

    edit <name>

    set type url-list

    set url-list <External or webfilter URL list>

    next

    end

  3. You can also use the URL list as the source of servers to exempt from SSL inspection under config firewall ssl-ssh-profile:
    config ssl-exempt

    edit <id>

    set type [fortiguard-category|address|...]

    set fortiguard-category {integer}

    set address {string}

    set address6 {string}

    set wildcard-fqdn {string}

    set regex {string}

    set finger-print-category [unknown|firefox|...]

    next

    end

  4. To reference the local URL list as data source of firewall, use the firewall.policy.dstaddr command.

Changes to config firewall ssl-server command

Under config firewall ssl-server, the default value of the ssl-server cert option is changed from Fortinet_CA_SSL to Fortinet SSL cert.

Changes to config firewall ssl-ssh-profile command

Under config firewall ssl-ssh-profile, when the value of set status [disable|certificate-inspection|...] is disable or certificate-inspection, the min-allowed-ssl-version option is skipped.

Remove Unicast Heartbeat option in HA Config-Sync mode

The Unicast Heartbeat option is no longer available if the Config-Sync mode is selected when you create or edit an HA cluster.

Remove set auth-timeout option for user setting commands

The set auth-timeout option, which is used to configure the time period (in minutes) before the firewall user needs to reauthenticate, is no longer available in the following user setting commands:

Remove cifs-profile option from config firewall policy

The cifs-profile option is no longer available under config firewall policy. To configure cifs profile, use the config cifs command under config firewall profile-protocol-options instead.

What's new

What's new

The following sections describe new features, enhancements, and changes:

Support for shared traffic shapers and per-IP traffic shapers

You can now use shared traffic shapers in a firewall shaping policy to indicate the priority and guaranteed and maximum bandwidth for a specified type of traffic use.

You can also use per-IP traffic shapers to limit each IP address's behavior to avoid a situation where one user uses all of the available bandwidth. In addition to controlling the maximum bandwidth used per IP address, you can also define the maximum number of concurrent sessions for an IP address.

To configure shared traffic shapers or per-IP traffic shapers:
  1. Create a firewall policy under Policy and Objects >> Policy. Alternatively, use the config firewall policy command to create the firewall policy.
  2. Create the shared traffic shapers or per-IP traffic shapers in the Traffic Shapers tab under Policy >> Traffic Shaping. Alternatively, use the config firewall shaper traffic-shaper command to create the shared traffic shapers or use the config firewall shaper per-ip-shaper command to create the per-IP traffic shapers.
  3. In the Traffic Shaping Policies tab under Policy >> Traffic Shaping, create a firewall shaping policy that uses the traffic shapers you created in step 2. Alternatively, use the config firewall shaping-policy command to create the firewall shaping policy.
To diagnose shared traffic shapers, use the following commands:
  • # dia fire shaper traffic-shaper list

    name shape

    maximum-bandwidth 25000000 bytes/sec

    guaranteed-bandwidth 12500000 bytes/sec

    current-bandwidth 0 bytes/sec

    priority 2

    overhead 0

    tos ff

    packets dropped 0

    bytes dropped 0

  • # dia fire shaper traffic-shaper stats

    shapers 1 ipv4 0 ipv6 0 drops 0 dropped bytes 0

To diagnose per-IP traffic shapers, use the following commands:
  • # dia firewall shaper per-ip-shaper list

    name 1

    maximum-bandwidth 375 bytes/sec

    maximum-concurrent-session 0

    tos 07/03

    packets dropped 0

    bytes dropped 0

    addr=192.168.122.180 status: bytes/sec=0 ses=2

  • # dia firewall shaper per-ip-shaper stats

    memory allocated 2 packet dropped: 0

View license usage history

Use the new License Usage History widget to view license usage history for shared licenses at a certain interval. Configure the interval at the top-right corner with the following options: 15 seconds, 5 minutes, 1 hour, 1 day, 1 week, 1 month, or 1 year. For each timestamp, the widget displays the following values:

  • Min Usage—Minimum number of license seats used during the past interval.

  • Max Usage—Maximum number of license seats used during the past interval.

  • Average Usage—Average number of license seats used during the past interval.

Alternatively, use the following diagnose command to show license usage in the CLI:

wad license usage [seconds | minutes | hour | day | week | year]

To manipulate the license usage data for testing purposes:

You can insert a data set entry to the past 15 seconds using the following command:

diag wad license test [value] [number of entries]

For example, diag wad license test 20 1 means adding one entry of the data set [min=20, max=20, average=20] to the license usage data of the past 15 seconds.

To clear all license usage history data:

diag wad license clear

Port exhaustion alerts in GUI

Under Log & Report, use the new Port Exhaustion Alert tab to view port exhaustion events with timestamp, virtual domain, protocol, and address information of the exhaustion. When a port exhaustion occurs, an alert appears next to Log & Report and Port Exhaustion Alert until the event expires.

Set size limit of ICAP server scan

When creating or editing an ICAP profile under Content Analysis >> ICAP Profile, you can now specify the ICAP server scan size limit for a single request within the range of 0-4096 (MB). The default is 0 MB, which means unlimited.

Alternatively, in the CLI, use the set scan-size-limit {integer} option under the config icap profile command to set the ICAP server scan size limit. You can further configure whether to generate an ICAP log for bypassed oversize events using the set scan-oversize-log [disable|enable] option.

Support for forwarding domains in transparent mode

A forwarding domain is used to create separate broadcast domains and confine traffic across two or more ports. It also allows learning the same MAC in different VLANs (IVL).

  • Use the set forward-domain option under config system settings to enable or disable forwarding domains.

  • Use the set forward-domain option under config system interface to configure the transparent mode forward domain. This option accepts integers within the range 1-4094.

Enhancement to forward server monitoring

The Forward Server Monitor widget in Dashboard includes several enhancements:

  • The Status column is renamed Forward. Forward servers with Health Check disabled will always be Up in the Forward column. When such a forward server is part of a server group, it serves as a backup option when no other server is up and running.

  • The new State column is added to provide more specific state information about the forward server. The following states are available:

    • pending—Initial state of all forward servers. A pending forward server can mean one of the following:

      • The state of the forward server is unknown, which means no connection has been established yet or the state has not been updated yet.

      • The forward server is running but pending FQDN resolve. FQDN resolve failure triggers a state change to down.

    • try_once—For forward servers in down state with Health Monitor disabled, FortiProxy periodically switches its state from down to try_once to verify the latest status of the server to avoid situations where a server in down state is ignored in all subsequent health state checks.

    • busy—The forward server is running but unstable.

    • down—The forward server is not running and connections are blocked.

In the CLI, the following enhancements are applied to forward server monitoring:

  • New diagnose command diag wad webproxy forward-server detail to display the state of each worker.

  • New diagnose commands diag debug en and diag wad webproxy forward-server arbiter to display the following information:

    • All forward servers known by the arbiter.

    • Last time when the status of each server was evaluated.

    • Status of each server.

  • The diag wad webproxy forward-server command now displays the following additional information:

    • Number of successful, failed, ongoing, and total traffic through the forward server.

    • Number of blocked connection by that specific forward server.

  • The diag wad webproxy forward-server-group command now displays the following additional information:

    • Number of blocked connections.

    • Number of workers that load the forward server into memory.

Diagnose transceivers of an interface

Under Network >> Interfaces, for models that support transceivers, the Transceiver(s) column is available which shows information about transceivers plugged into the FortiProxy, including the vendor name and part number. You can hover over the transceiver to view additional information, such as the type, serial number, and port name.

Alternatively, use the new get system interface transceiver <interface name> command to diagnose interface transceivers. Interface name must be one of the following:

  • port3

  • port4

  • port7

  • port8

Example output:

fortiproxy1-nh # get sys interface transceiver port3

Interface port3 - Transceiver is not detected.

fortiproxy1-nh # get sys interface transceiver

Interface port3 - Transceiver is not detected.

Interface port4 - Transceiver is not detected.

Interface port7 - Transceiver is not detected.

Interface port8 - SFP/SFP+ (10.3G)

Vendor Name : AVAGO

Part No. : AFBR-709ASMZ

Serial No. : AA14393JMGU

Optical Optical Optical

SFP/SFP+ Temperature Voltage Tx Bias Tx Power Rx Power

Interface (Celsius) (Volts) (mA) (dBm) (dBm)

------------ ------------ ------------ ------------ ------------ ------------

port8 29.1 3.34 5.44 -2.3 -6.1

++ : high alarm, + : high warning, - : low warning, -- : low alarm, ? : suspect.

Support for webfilter strict search and safe search level on Qwant

Add local URL list as data source for firewall

To add local URL list as data source for firewall via CLI:
  1. Define the local URL list in web filter:
    config  webfilter url-list

    edit <name>

    set uuid {uuid}

    set status [enable|disable]

    set comment {var-string}

    config entries

    edit <url>

    next

    end

    next

    end

  2. Configure the firewall proxy or the to use the local URL list:
    config firewall proxy-address

    edit <name>

    set type url-list

    set url-list <External or webfilter URL list>

    next

    end

  3. You can also use the URL list as the source of servers to exempt from SSL inspection under config firewall ssl-ssh-profile:
    config ssl-exempt

    edit <id>

    set type [fortiguard-category|address|...]

    set fortiguard-category {integer}

    set address {string}

    set address6 {string}

    set wildcard-fqdn {string}

    set regex {string}

    set finger-print-category [unknown|firefox|...]

    next

    end

  4. To reference the local URL list as data source of firewall, use the firewall.policy.dstaddr command.

Changes to config firewall ssl-server command

Under config firewall ssl-server, the default value of the ssl-server cert option is changed from Fortinet_CA_SSL to Fortinet SSL cert.

Changes to config firewall ssl-ssh-profile command

Under config firewall ssl-ssh-profile, when the value of set status [disable|certificate-inspection|...] is disable or certificate-inspection, the min-allowed-ssl-version option is skipped.

Remove Unicast Heartbeat option in HA Config-Sync mode

The Unicast Heartbeat option is no longer available if the Config-Sync mode is selected when you create or edit an HA cluster.

Remove set auth-timeout option for user setting commands

The set auth-timeout option, which is used to configure the time period (in minutes) before the firewall user needs to reauthenticate, is no longer available in the following user setting commands:

Remove cifs-profile option from config firewall policy

The cifs-profile option is no longer available under config firewall policy. To configure cifs profile, use the config cifs command under config firewall profile-protocol-options instead.