Fortinet white logo
Fortinet white logo

Product integration and support

Product integration and support

FortiSASE supports the following FortiClient versions:

FortiClient 7.2.9 is the recommended version for FortiSASE for desktop users. FortiSASE has updated installers and download links to use FortiClient 7.2.9.

  • The "recommended version" is the preferred agent release with full compatibility with FortiSASE features.
  • Fortinet Support supports newer FortiClient versions on a best-effort basis as they are not yet officially recommended versions for FortiSASE. Newer versions are agent releases newer than the recommended version, which resolve known issues for specific customer deployments.
  • Fortinet Support supports older versions until these FortiClient versions are no longer fully supported with FortiSASE. Older versions are earlier agent releases which were previously recommended versions for FortiSASE.
  • Newer and older versions pertain to patch releases within the same minor releases. Currently, only patch versions within FortiClient 7.2 are supported for FortiSASE.

Considerations

  • For existing instances created before 24.4.b.1 with remote user connectivity to FortiSASE using SSL VPN, the recommended version is FortiClient 7.2.9.
  • Starting in FortiSASE 24.4.b.1, IPsec VPN remote user support is enabled by default on new instances.
    • For instances with IPsec VPN remote user support enabled, the recommended version is FortiClient 7.2.9.
    • For instances created before 24.4.b.1, implementing IPsec VPN remote user support is a significant mode change that impacts the overall FortiSASE instance operation. It has several constraints and is subject to continual improvements.
    • You cannot disable or revert IPsec VPN remote user support implementation without significant data loss and service disruption.
    • Fortinet recommends that you only raise a request to implement IPsec VPN remote user support after careful consideration and understanding of impact and service disruptions.

Supported FortiClient features

The following table lists the FortiClient platform and version and each version's corresponding features that FortiSASE supports:

Feature

Windows 7.2.9

macOS 7.2.9

Linux 7.0.13

Android

iOS

Diagnostic logs on-demand requests from FortiSASE

Digital experience monitoring agent*

FortiGuard Forensics Analysis*

Access

Autoconnect to FortiSASE using Microsoft Entra ID credentials

Autoconnect to FortiSASE using SAML single sign on (SSO)

Bypass FortiSASE using application-based split tunnel

Bypass FortiSASE using on-net endpoint detection via DNS server

Bypass FortiSASE using on-net endpoint detection via DHCP server

Bypass FortiSASE using on-net endpoint detection via local subnet

Bypass FortiSASE using on-net endpoint detection via ping server

Bypass FortiSASE using on-net endpoint detection via public IP address

Endpoint profile assignment based on Microsoft Entra ID groups

Endpoint profile change notifications

Endpoint telemetry

Endpoint VPN connectivity notifications

Endpoint VPN disconnection by disabling management connection from FortiSASE

External browser as user-agent for SAML login

Force always on VPN

FortiClient (iOS) does not disable the VPN button instantly. You must navigate away from the VPN page to disable the VPN button.

IPsec VPN to FortiSASE

Network lockdown

Pre-logon VPN

Show zero trust network access (ZTNA) tags on FortiClient

Does not support hiding tags.

Split DNS

SSL VPN connection remains active after endpoint has been idle

SSL VPN support for DTLS**

SSL VPN to FortiSASE

FSSO

FortiClient SSO mobility agent

Protection

Antiransomware

Next generation antivirus (AV) – real-time AV and cloud malware protection

Removable media access control

FortiClient (macOS) does not support rules. It only supports allow and block actions.

FortiClient (Linux) does not support rules. It only supports allow and block actions.

Removable media access control – notify endpoint of blocks

Vulnerability scan

Vulnerability scan - event-based scan

Sandbox

Sandboxing - on-premise and FortiSASE Cloud Sandbox

ZTNA

ZTNA remote access

ZTNA tagging rules

* Requires Advanced or Comprehensive License

** DTLS support is enabled by default for existing and new FortiSASE instances.

Common use cases

To connect to a FortiSandbox appliance behind a firewall, you must open ports 514 and 443.

In some scenarios, FortiSASE interacts with other Fortinet products. The following lists the supported versions for each scenario:

Use case

Description

SIA for FortiClient agent-based remote users

Secure access to the internet using FortiClient agent.

SIA for FortiExtender site-based remote users

Secure access to the internet using Thin Edge FortiExtender device as FortiSASE LAN extension.

SIA for FortiGate SD-WAN secure edge site-based remote users

Secure access to the internet using FortiGate SD-WAN Secure Edge device as FortiGate SD-WAN Secure Edge device as FortiSASE LAN extension.

SIA for FortiAP site-based remote users

Secure access to the internet using FortiAP device as FortiSASE edge device.

SIA for SD-WAN On-Ramp site-based remote users

Secure access to the internet using SD-WAN devices via IPsec acting as an on-ramp to FortiSASE.

Log forwarding

Forward logs to an external server, such as FortiAnalyzer.

Central management using FortiManager

Centrally manage FortiSASE configuration settings from FortiManager

RBI

For secure web gateway (SWG) users, isolate browser sessions of certain websites or categories in an isolated environment, which renders content safely in a remote container.

ZTNA

Access to private company-hosted TCP-based applications behind the FortiGate ZTNA application gateway for various ZTNA use cases.

SPA using a FortiGate SD-WAN hub

Access to private company-hosted applications behind the FortiGate SD-WAN hub-and-spoke network.

SPA using a FortiSASE SPA hub

Access to private company-hosted applications behind the FortiGate next generation firewall (NGFW).

SPA using FortiGate SASE bundle license

Seamless integration of FortiGate with FortiSASE for SPA to simplify the journey from SD-WAN to SASE.

SPA using a FortiSASE SPA hub with Fabric overlay orchestrator

Access to private company-hosted applications behind the FortiGate NGFW using Fabric Overlay Orchestrator.

SPA for an MSSP hub

Access to private company-hosted applications behind the FortiGate secure private access (SPA) hub shared in a managed security service provider (MSSP), multi-tenant environment.

Data protection using FortiCASB

Visibility, compliance, data security, and threat protection for cloud-based services.

SIA for FortiClient agent-based remote users

To allow remote users to connect to FortiSASE, ensure you have purchased the per-user FortiSASE licensing contracts and applied them to FortiCloud.

See the supported FortiClient versions.

SIA for FortiExtender site-based remote users

FortiSASE supports FortiExtender models for the LAN extension feature. The FortiExtender should run 7.4.3 and later. This feature requires a separate FortiSASE subscription license per FortiExtender.

You must register FortiExtender devices used with the LAN extension feature to the same FortiCloud account used to log into FortiSASE before using this feature.

FortiSASE supports a maximum of 1024 FortiExtender devices combined that you can configure as FortiSASE edge devices.

Certain FortiExtender models are equipped with wired and/or wireless capabilities, along with advanced performance metrics to extend your microbranch LAN deployments. These models, also known as FortiBranchSASE, provide superior performance and flexibility.

The following table lists key features for different FortiExtender models that the FortiSASE for LAN extension feature supports:

Feature

FortiExtender 200F

FortiBranchSASE 20G

FortiBranchSASE 20G WiFi

FortiBranchSASE 10F WiFi

LAN extension

Zero-touch provisioning

Wi-Fi support

Ethernet support

Available Ethernet ports

5 x GbE RJ45

4 x 1GE RJ45 + 1 SFP/RJ45

4 x 1GE RJ45 + 1 SFP/RJ45

2 x 1GE RJ45

For information on FortiBranchSASE, see the FortiBranchSASE series datasheet.

Note

For existing instances provisioned before FortiSASE 24.1.b and using FortiExtender, create a new FortiCare ticket to have the resolution for the resolved issue in Bug ID 1003287 applied to your instance. See Resolved issues for relevant issues resolved.

SIA for FortiGate SD-WAN secure edge site-based remote users

FortiGate SD-WAN as a secure edge requires a separate FortiSASE subscription license per FortiGate. All FortiGate F- and G-series desktop platforms including FortiWiFi below the 100 series running FortiOS 7.4.2 and later can support FortiSASE Secure Edge connectivity.

You must register FortiGate devices used with the LAN extension feature to the same FortiCloud account used to log into FortiSASE before using this feature.

FortiSASE supports a maximum of 16 FortiGate and FortiWiFi devices combined that you can configure as FortiSASE edge devices.

SIA for FortiAP site-based remote users

FortiAP edge device support requires a separate FortiSASE subscription license per FortiAP. This feature supports FortiAP devices running FortiAP firmware 7.2.4 and later:

  • FortiAP 23JF, 231F, 234F, 431F, 432F, 432FR, 433F, 831F

  • FortiAP 231G, 233G, 234G, 431G, 432G, 433G

FortiSASE also supports profile configuration for 6G connectivity and LAN port management for selected FortiAP models.

You must register FortiAP devices used with the LAN extension feature to the same FortiCloud account used to log into FortiSASE before using this feature.

FortiSASE supports a maximum of 240 FortiAP devices that you can configure as FortiSASE edge devices.

SIA for SD-WAN On-Ramp site-based remote users

FortiSASE SD-WAN On-Ramp enables customers to connect certified IPsec devices for inbound connectivity to FortiSASE for secure internet access (SIA), secure SaaS access, and SPA. IPsec service connections require the FortiSASE instance to have these licenses applied:

  • Advanced or Comprehensive license
  • FortiSASE SD-WAN On-Ramp Location subscription license corresponding to the Advanced or Comprehensive license

See the FortiSASE Ordering Guide.

Note

SD-WAN On-Ramp and SPA share BGP configuration. You must configure the SPA network configuration before deploying an SD-WAN On-Ramp location but you can create SPA service connections after deploying an SD-WAN On-Ramp location.

The FortiSASE SD-WAN On-Ramp Location subscription license has these features:

  • IPsec connectivity to a number of FortiSASE locations depending on the number of connections (two to eight) that the license specifies
  • 1 Gbps of shared bandwidth for up to 10 simultaneous dialup IPsec connections from the IPsec device to the selected FortiSASE locations
  • FQDN and static IP address to use for each IPsec On-Ramp location
  • Enable connectivity from different IPsec device types as part of the same license

You must purchase the license multiple times if the expected bandwidth exceeds 1 Gbps for the location or the number of connected devices in one location exceeds 10.

Alternatively, if you require more than 10 connected devices in on location, you can purchase the SD-WAN On-Ramp Connection add-on license corresponding to the Advanced or Comprehensive license. This add-on can be purchased in increments of 1-2000 per location. With a maximum of 8 locations for on-ramp connections and maximum of 2000 connections per location, customers can have up to 16000 connections per account.

For example, if a customer has 200 branches using SD-WAN On-Ramp then 200 connections are required, and the following licenses can be purchased:

  • 2 SD-WAN On-Ramp Location licenses, each including 10 connections for a total of 20 connections
  • 1 SD-WAN On-Ramp Connection add-on license containing 180 connections:
    • Assign 90 connections to first On-Ramp location
    • Assign 90 connections to second On-Ramp location

See the FortiSASE Ordering Guide.

Supported SD-WAN On-Ramp IPsec devices

Device

Supported firmware version

FortiGate

7.2.8 or later

The FortiGate is the only certified IPsec device that you can use for SD-WAN On-Ramp.

Log forwarding

If using FortiAnalyzer for log forwarding, the FortiAnalyzer should be on 7.0.4 or later.

Central management using FortiManager

When using FortiManager for central management, the FortiManager or FortiManager Cloud should be on 7.4.4 or a later 7.4 version and only FortiManager VM platforms are supported. FortiSASE does not support using FortiManager 7.6 or FortiManager Cloud 7.6 for central management.

  • You cannot add FortiSASE to version 7.0 administrative domains (ADOM) or the global ADOM.
  • FortiManager only supports adding FortiSASE to FortiGate and Fabric ADOMs. Other ADOMs where the connector appears including FortiProxy, FortiFirewallCarrier, FortiFirewall, FortiCarrier, and the Global Database ADOMs are not supported. Additionally, you cannot add FortiSASE to ADOMs operating in backup mode. Attempting to do so presents the user with an An unexpected error has occurred error.

RBI

FortiSASE must have an Advanced remote users license to use remote browser isolation (RBI) with the following limitations:

  • Supported for SWG users only
  • Maximum of five simultaneous RBI sessions per user
  • Sessions time out after 10 minutes of inactivity
  • 100 MB of monthly isolation data per user included (1.2 GB per year)

ZTNA

If using ZTNA, the FortiGate acting as the ZTNA access proxy should be on the following FortiOS versions:

  • 7.0.10 or later

  • 7.2.4 or later

SPA

For securing private TCP- and UDP-based applications, FortiSASE supports a SPA deployment using an existing FortiGate SD-WAN hub or SPA using a FortiGate NGFW converted to a standalone FortiSASE SPA hub. These SPA use cases are based on IPsec VPN overlays and BGP.

SPA Service Connection license

A single SPA Service Connection license is required per FortiGate and allows inbound connectivity to the licensed device from all remote user and branch locations.

  • FortiGate desktop platforms are recommended as a single NGFW location only.

  • FortiGate 100F series and later are recommended for an SD-WAN hub.

See the FortiSASE Ordering Guide.

For the MSSP hub use case, see SPA for an MSSP hub.

SPA FortiCloud account prerequisites

You must register FortiGate devices to the same FortiCloud account used to log into FortiSASE before using these devices as SPA hubs with FortiSASE.

To activate the SPA feature on FortiSASE, you must purchase and apply a FortiSASE Service Connection license to each FortiGate device registered.

For details on registering products, see Registering assets.

SPA using a FortiGate SD-WAN hub

This use case requires a license per FortiGate device and requires each FortiGate device to be registered in the same FortiCloud account as FortiSASE. See SPA Service Connection license and SPA FortiCloud account prerequisites.

If you deploy SPA using a FortiGate SD-WAN hub, use the following versions:

Product

Supported firmware version

FortiGate

  • 7.0.10 or later
  • 7.2.4 or later
  • 7.4.0 or later
  • 7.6.0 or later

FortiManager

  • 7.2.0 or later, which supports SD-WAN overlay templates
  • 7.0.3 or later, which includes BGP and IPsec VPN recommended templates for SD-WAN overlays
  • 7.4.0 or later

FortiClient

7.2.9

SPA using a FortiSASE SPA hub

This use case requires a license per FortiGate device and requires each FortiGate device to be registered in the same FortiCloud account as FortiSASE. See SPA Service Connection license and SPA FortiCloud account prerequisites.

If you deploy SPA using a FortiSASE SPA hub, use the following versions:

Product

Supported firmware version

FortiGate

  • 7.0.10 or later
  • 7.2.4 or later
  • 7.4.0 or later
  • 7.6.0 or later

FortiClient

7.2.9

SPA using FortiGate SASE bundle license

Fortinet’s FortiGate SASE bundle license enables seamless integration of FortiGate with FortiSASE for SPA to simplify the journey from SD-WAN to SASE.

The FortiGate SASE Bundle license is available for FortiGate G-series hardware models starting from 120G and above. Each FortiGate device intended for SPA connectivity must be licensed individually with its own FortiGate SASE SPA Bundle license.

The FortiGate SASE Bundle includes the following:

  • FortiSASE SPA: enables SPA connectivity from FortiGate to FortiSASE.
  • FortiSASE Standard Starter Kit: includes FortiSASE Standard remote user licenses. The number of included remote user seats depends on the model of G-series FortiGate licensed, outlined as follows:

    Model

    Included remote user seats for each model

    Below 120G

    None

    120G to 600G

    10

    900G to 1500G

    50

    1800G+

    100

    VM and Cloud

    None

The number of remote user seats are cumulative and based on the number and model of FortiGates that have the FortiGate SASE bundle license applied under the same FortiCloud account as FortiSASE. For example, consider that a customer purchases the FortiGate SASE bundle license for:

Device

Included remote user seats for each model

One 120G FortiGate

10

One 900G FortiGate

50

In this case, the total number of included FortiSASE Standard remote user seats is 60 seats (10 + 50).

See the FortiSASE Ordering Guide.

SPA using a FortiSASE SPA hub with Fabric overlay orchestrator

This use case requires a license per FortiGate device and requires each FortiGate device to be registered in the same FortiCloud account as FortiSASE. See SPA Service Connection license and SPA FortiCloud account prerequisites.

If you deploy SPA using a FortiSASE SPA hub with the Fabric Overlay Orchestrator, use the following versions:

Product

Supported firmware version

FortiGate

  • 7.2.4 or later
  • 7.4.0 or later
  • 7.6.0 or later

FortiClient

7.2.9

The SPA easy configuration key for FortiSASE is supported in the Fabric Overlay Orchestrator in the following FortiOS version:

Product

Supported firmware version

FortiGate

  • 7.4.5 and later
  • 7.6.0 and later

SPA for an MSSP hub

For MSSPs using FortiCloud Organizations to arrange accounts into a root organizational unit (OU) and sub-OUs and where many tenants share a FortiGate SPA hub, FortiSASE supports tenants within a sub-OU inheriting SPA licenses from the root OU account.

For a FortiSASE instance within a sub-OU, the number of supported SPA hubs is the sum of the number of SPA licenses registered in the tenant sub-OU account and the number of SPA licenses registered in the root OU, up to a maximum of 12 SPA licenses in total.

Data protection using FortiCASB

FortiCASB is Fortinet's cloud-native cloud access security broker (CASB) service, which provides visibility, compliance, data security, and threat protection for cloud-based services. FortiSASE supports registering a FortiCASB data protection add-on license. The add-on license must be registered in the same FortiCloud account as FortiSASE. FortiSASE supports FortiCASB 24.4.b.

Product integration and support

Product integration and support

FortiSASE supports the following FortiClient versions:

FortiClient 7.2.9 is the recommended version for FortiSASE for desktop users. FortiSASE has updated installers and download links to use FortiClient 7.2.9.

  • The "recommended version" is the preferred agent release with full compatibility with FortiSASE features.
  • Fortinet Support supports newer FortiClient versions on a best-effort basis as they are not yet officially recommended versions for FortiSASE. Newer versions are agent releases newer than the recommended version, which resolve known issues for specific customer deployments.
  • Fortinet Support supports older versions until these FortiClient versions are no longer fully supported with FortiSASE. Older versions are earlier agent releases which were previously recommended versions for FortiSASE.
  • Newer and older versions pertain to patch releases within the same minor releases. Currently, only patch versions within FortiClient 7.2 are supported for FortiSASE.

Considerations

  • For existing instances created before 24.4.b.1 with remote user connectivity to FortiSASE using SSL VPN, the recommended version is FortiClient 7.2.9.
  • Starting in FortiSASE 24.4.b.1, IPsec VPN remote user support is enabled by default on new instances.
    • For instances with IPsec VPN remote user support enabled, the recommended version is FortiClient 7.2.9.
    • For instances created before 24.4.b.1, implementing IPsec VPN remote user support is a significant mode change that impacts the overall FortiSASE instance operation. It has several constraints and is subject to continual improvements.
    • You cannot disable or revert IPsec VPN remote user support implementation without significant data loss and service disruption.
    • Fortinet recommends that you only raise a request to implement IPsec VPN remote user support after careful consideration and understanding of impact and service disruptions.

Supported FortiClient features

The following table lists the FortiClient platform and version and each version's corresponding features that FortiSASE supports:

Feature

Windows 7.2.9

macOS 7.2.9

Linux 7.0.13

Android

iOS

Diagnostic logs on-demand requests from FortiSASE

Digital experience monitoring agent*

FortiGuard Forensics Analysis*

Access

Autoconnect to FortiSASE using Microsoft Entra ID credentials

Autoconnect to FortiSASE using SAML single sign on (SSO)

Bypass FortiSASE using application-based split tunnel

Bypass FortiSASE using on-net endpoint detection via DNS server

Bypass FortiSASE using on-net endpoint detection via DHCP server

Bypass FortiSASE using on-net endpoint detection via local subnet

Bypass FortiSASE using on-net endpoint detection via ping server

Bypass FortiSASE using on-net endpoint detection via public IP address

Endpoint profile assignment based on Microsoft Entra ID groups

Endpoint profile change notifications

Endpoint telemetry

Endpoint VPN connectivity notifications

Endpoint VPN disconnection by disabling management connection from FortiSASE

External browser as user-agent for SAML login

Force always on VPN

FortiClient (iOS) does not disable the VPN button instantly. You must navigate away from the VPN page to disable the VPN button.

IPsec VPN to FortiSASE

Network lockdown

Pre-logon VPN

Show zero trust network access (ZTNA) tags on FortiClient

Does not support hiding tags.

Split DNS

SSL VPN connection remains active after endpoint has been idle

SSL VPN support for DTLS**

SSL VPN to FortiSASE

FSSO

FortiClient SSO mobility agent

Protection

Antiransomware

Next generation antivirus (AV) – real-time AV and cloud malware protection

Removable media access control

FortiClient (macOS) does not support rules. It only supports allow and block actions.

FortiClient (Linux) does not support rules. It only supports allow and block actions.

Removable media access control – notify endpoint of blocks

Vulnerability scan

Vulnerability scan - event-based scan

Sandbox

Sandboxing - on-premise and FortiSASE Cloud Sandbox

ZTNA

ZTNA remote access

ZTNA tagging rules

* Requires Advanced or Comprehensive License

** DTLS support is enabled by default for existing and new FortiSASE instances.

Common use cases

To connect to a FortiSandbox appliance behind a firewall, you must open ports 514 and 443.

In some scenarios, FortiSASE interacts with other Fortinet products. The following lists the supported versions for each scenario:

Use case

Description

SIA for FortiClient agent-based remote users

Secure access to the internet using FortiClient agent.

SIA for FortiExtender site-based remote users

Secure access to the internet using Thin Edge FortiExtender device as FortiSASE LAN extension.

SIA for FortiGate SD-WAN secure edge site-based remote users

Secure access to the internet using FortiGate SD-WAN Secure Edge device as FortiGate SD-WAN Secure Edge device as FortiSASE LAN extension.

SIA for FortiAP site-based remote users

Secure access to the internet using FortiAP device as FortiSASE edge device.

SIA for SD-WAN On-Ramp site-based remote users

Secure access to the internet using SD-WAN devices via IPsec acting as an on-ramp to FortiSASE.

Log forwarding

Forward logs to an external server, such as FortiAnalyzer.

Central management using FortiManager

Centrally manage FortiSASE configuration settings from FortiManager

RBI

For secure web gateway (SWG) users, isolate browser sessions of certain websites or categories in an isolated environment, which renders content safely in a remote container.

ZTNA

Access to private company-hosted TCP-based applications behind the FortiGate ZTNA application gateway for various ZTNA use cases.

SPA using a FortiGate SD-WAN hub

Access to private company-hosted applications behind the FortiGate SD-WAN hub-and-spoke network.

SPA using a FortiSASE SPA hub

Access to private company-hosted applications behind the FortiGate next generation firewall (NGFW).

SPA using FortiGate SASE bundle license

Seamless integration of FortiGate with FortiSASE for SPA to simplify the journey from SD-WAN to SASE.

SPA using a FortiSASE SPA hub with Fabric overlay orchestrator

Access to private company-hosted applications behind the FortiGate NGFW using Fabric Overlay Orchestrator.

SPA for an MSSP hub

Access to private company-hosted applications behind the FortiGate secure private access (SPA) hub shared in a managed security service provider (MSSP), multi-tenant environment.

Data protection using FortiCASB

Visibility, compliance, data security, and threat protection for cloud-based services.

SIA for FortiClient agent-based remote users

To allow remote users to connect to FortiSASE, ensure you have purchased the per-user FortiSASE licensing contracts and applied them to FortiCloud.

See the supported FortiClient versions.

SIA for FortiExtender site-based remote users

FortiSASE supports FortiExtender models for the LAN extension feature. The FortiExtender should run 7.4.3 and later. This feature requires a separate FortiSASE subscription license per FortiExtender.

You must register FortiExtender devices used with the LAN extension feature to the same FortiCloud account used to log into FortiSASE before using this feature.

FortiSASE supports a maximum of 1024 FortiExtender devices combined that you can configure as FortiSASE edge devices.

Certain FortiExtender models are equipped with wired and/or wireless capabilities, along with advanced performance metrics to extend your microbranch LAN deployments. These models, also known as FortiBranchSASE, provide superior performance and flexibility.

The following table lists key features for different FortiExtender models that the FortiSASE for LAN extension feature supports:

Feature

FortiExtender 200F

FortiBranchSASE 20G

FortiBranchSASE 20G WiFi

FortiBranchSASE 10F WiFi

LAN extension

Zero-touch provisioning

Wi-Fi support

Ethernet support

Available Ethernet ports

5 x GbE RJ45

4 x 1GE RJ45 + 1 SFP/RJ45

4 x 1GE RJ45 + 1 SFP/RJ45

2 x 1GE RJ45

For information on FortiBranchSASE, see the FortiBranchSASE series datasheet.

Note

For existing instances provisioned before FortiSASE 24.1.b and using FortiExtender, create a new FortiCare ticket to have the resolution for the resolved issue in Bug ID 1003287 applied to your instance. See Resolved issues for relevant issues resolved.

SIA for FortiGate SD-WAN secure edge site-based remote users

FortiGate SD-WAN as a secure edge requires a separate FortiSASE subscription license per FortiGate. All FortiGate F- and G-series desktop platforms including FortiWiFi below the 100 series running FortiOS 7.4.2 and later can support FortiSASE Secure Edge connectivity.

You must register FortiGate devices used with the LAN extension feature to the same FortiCloud account used to log into FortiSASE before using this feature.

FortiSASE supports a maximum of 16 FortiGate and FortiWiFi devices combined that you can configure as FortiSASE edge devices.

SIA for FortiAP site-based remote users

FortiAP edge device support requires a separate FortiSASE subscription license per FortiAP. This feature supports FortiAP devices running FortiAP firmware 7.2.4 and later:

  • FortiAP 23JF, 231F, 234F, 431F, 432F, 432FR, 433F, 831F

  • FortiAP 231G, 233G, 234G, 431G, 432G, 433G

FortiSASE also supports profile configuration for 6G connectivity and LAN port management for selected FortiAP models.

You must register FortiAP devices used with the LAN extension feature to the same FortiCloud account used to log into FortiSASE before using this feature.

FortiSASE supports a maximum of 240 FortiAP devices that you can configure as FortiSASE edge devices.

SIA for SD-WAN On-Ramp site-based remote users

FortiSASE SD-WAN On-Ramp enables customers to connect certified IPsec devices for inbound connectivity to FortiSASE for secure internet access (SIA), secure SaaS access, and SPA. IPsec service connections require the FortiSASE instance to have these licenses applied:

  • Advanced or Comprehensive license
  • FortiSASE SD-WAN On-Ramp Location subscription license corresponding to the Advanced or Comprehensive license

See the FortiSASE Ordering Guide.

Note

SD-WAN On-Ramp and SPA share BGP configuration. You must configure the SPA network configuration before deploying an SD-WAN On-Ramp location but you can create SPA service connections after deploying an SD-WAN On-Ramp location.

The FortiSASE SD-WAN On-Ramp Location subscription license has these features:

  • IPsec connectivity to a number of FortiSASE locations depending on the number of connections (two to eight) that the license specifies
  • 1 Gbps of shared bandwidth for up to 10 simultaneous dialup IPsec connections from the IPsec device to the selected FortiSASE locations
  • FQDN and static IP address to use for each IPsec On-Ramp location
  • Enable connectivity from different IPsec device types as part of the same license

You must purchase the license multiple times if the expected bandwidth exceeds 1 Gbps for the location or the number of connected devices in one location exceeds 10.

Alternatively, if you require more than 10 connected devices in on location, you can purchase the SD-WAN On-Ramp Connection add-on license corresponding to the Advanced or Comprehensive license. This add-on can be purchased in increments of 1-2000 per location. With a maximum of 8 locations for on-ramp connections and maximum of 2000 connections per location, customers can have up to 16000 connections per account.

For example, if a customer has 200 branches using SD-WAN On-Ramp then 200 connections are required, and the following licenses can be purchased:

  • 2 SD-WAN On-Ramp Location licenses, each including 10 connections for a total of 20 connections
  • 1 SD-WAN On-Ramp Connection add-on license containing 180 connections:
    • Assign 90 connections to first On-Ramp location
    • Assign 90 connections to second On-Ramp location

See the FortiSASE Ordering Guide.

Supported SD-WAN On-Ramp IPsec devices

Device

Supported firmware version

FortiGate

7.2.8 or later

The FortiGate is the only certified IPsec device that you can use for SD-WAN On-Ramp.

Log forwarding

If using FortiAnalyzer for log forwarding, the FortiAnalyzer should be on 7.0.4 or later.

Central management using FortiManager

When using FortiManager for central management, the FortiManager or FortiManager Cloud should be on 7.4.4 or a later 7.4 version and only FortiManager VM platforms are supported. FortiSASE does not support using FortiManager 7.6 or FortiManager Cloud 7.6 for central management.

  • You cannot add FortiSASE to version 7.0 administrative domains (ADOM) or the global ADOM.
  • FortiManager only supports adding FortiSASE to FortiGate and Fabric ADOMs. Other ADOMs where the connector appears including FortiProxy, FortiFirewallCarrier, FortiFirewall, FortiCarrier, and the Global Database ADOMs are not supported. Additionally, you cannot add FortiSASE to ADOMs operating in backup mode. Attempting to do so presents the user with an An unexpected error has occurred error.

RBI

FortiSASE must have an Advanced remote users license to use remote browser isolation (RBI) with the following limitations:

  • Supported for SWG users only
  • Maximum of five simultaneous RBI sessions per user
  • Sessions time out after 10 minutes of inactivity
  • 100 MB of monthly isolation data per user included (1.2 GB per year)

ZTNA

If using ZTNA, the FortiGate acting as the ZTNA access proxy should be on the following FortiOS versions:

  • 7.0.10 or later

  • 7.2.4 or later

SPA

For securing private TCP- and UDP-based applications, FortiSASE supports a SPA deployment using an existing FortiGate SD-WAN hub or SPA using a FortiGate NGFW converted to a standalone FortiSASE SPA hub. These SPA use cases are based on IPsec VPN overlays and BGP.

SPA Service Connection license

A single SPA Service Connection license is required per FortiGate and allows inbound connectivity to the licensed device from all remote user and branch locations.

  • FortiGate desktop platforms are recommended as a single NGFW location only.

  • FortiGate 100F series and later are recommended for an SD-WAN hub.

See the FortiSASE Ordering Guide.

For the MSSP hub use case, see SPA for an MSSP hub.

SPA FortiCloud account prerequisites

You must register FortiGate devices to the same FortiCloud account used to log into FortiSASE before using these devices as SPA hubs with FortiSASE.

To activate the SPA feature on FortiSASE, you must purchase and apply a FortiSASE Service Connection license to each FortiGate device registered.

For details on registering products, see Registering assets.

SPA using a FortiGate SD-WAN hub

This use case requires a license per FortiGate device and requires each FortiGate device to be registered in the same FortiCloud account as FortiSASE. See SPA Service Connection license and SPA FortiCloud account prerequisites.

If you deploy SPA using a FortiGate SD-WAN hub, use the following versions:

Product

Supported firmware version

FortiGate

  • 7.0.10 or later
  • 7.2.4 or later
  • 7.4.0 or later
  • 7.6.0 or later

FortiManager

  • 7.2.0 or later, which supports SD-WAN overlay templates
  • 7.0.3 or later, which includes BGP and IPsec VPN recommended templates for SD-WAN overlays
  • 7.4.0 or later

FortiClient

7.2.9

SPA using a FortiSASE SPA hub

This use case requires a license per FortiGate device and requires each FortiGate device to be registered in the same FortiCloud account as FortiSASE. See SPA Service Connection license and SPA FortiCloud account prerequisites.

If you deploy SPA using a FortiSASE SPA hub, use the following versions:

Product

Supported firmware version

FortiGate

  • 7.0.10 or later
  • 7.2.4 or later
  • 7.4.0 or later
  • 7.6.0 or later

FortiClient

7.2.9

SPA using FortiGate SASE bundle license

Fortinet’s FortiGate SASE bundle license enables seamless integration of FortiGate with FortiSASE for SPA to simplify the journey from SD-WAN to SASE.

The FortiGate SASE Bundle license is available for FortiGate G-series hardware models starting from 120G and above. Each FortiGate device intended for SPA connectivity must be licensed individually with its own FortiGate SASE SPA Bundle license.

The FortiGate SASE Bundle includes the following:

  • FortiSASE SPA: enables SPA connectivity from FortiGate to FortiSASE.
  • FortiSASE Standard Starter Kit: includes FortiSASE Standard remote user licenses. The number of included remote user seats depends on the model of G-series FortiGate licensed, outlined as follows:

    Model

    Included remote user seats for each model

    Below 120G

    None

    120G to 600G

    10

    900G to 1500G

    50

    1800G+

    100

    VM and Cloud

    None

The number of remote user seats are cumulative and based on the number and model of FortiGates that have the FortiGate SASE bundle license applied under the same FortiCloud account as FortiSASE. For example, consider that a customer purchases the FortiGate SASE bundle license for:

Device

Included remote user seats for each model

One 120G FortiGate

10

One 900G FortiGate

50

In this case, the total number of included FortiSASE Standard remote user seats is 60 seats (10 + 50).

See the FortiSASE Ordering Guide.

SPA using a FortiSASE SPA hub with Fabric overlay orchestrator

This use case requires a license per FortiGate device and requires each FortiGate device to be registered in the same FortiCloud account as FortiSASE. See SPA Service Connection license and SPA FortiCloud account prerequisites.

If you deploy SPA using a FortiSASE SPA hub with the Fabric Overlay Orchestrator, use the following versions:

Product

Supported firmware version

FortiGate

  • 7.2.4 or later
  • 7.4.0 or later
  • 7.6.0 or later

FortiClient

7.2.9

The SPA easy configuration key for FortiSASE is supported in the Fabric Overlay Orchestrator in the following FortiOS version:

Product

Supported firmware version

FortiGate

  • 7.4.5 and later
  • 7.6.0 and later

SPA for an MSSP hub

For MSSPs using FortiCloud Organizations to arrange accounts into a root organizational unit (OU) and sub-OUs and where many tenants share a FortiGate SPA hub, FortiSASE supports tenants within a sub-OU inheriting SPA licenses from the root OU account.

For a FortiSASE instance within a sub-OU, the number of supported SPA hubs is the sum of the number of SPA licenses registered in the tenant sub-OU account and the number of SPA licenses registered in the root OU, up to a maximum of 12 SPA licenses in total.

Data protection using FortiCASB

FortiCASB is Fortinet's cloud-native cloud access security broker (CASB) service, which provides visibility, compliance, data security, and threat protection for cloud-based services. FortiSASE supports registering a FortiCASB data protection add-on license. The add-on license must be registered in the same FortiCloud account as FortiSASE. FortiSASE supports FortiCASB 24.4.b.