Introduction
This document provides the following information for FortiSwitchOS 7.0.5 devices managed by FortiOS 7.0.8 build 0418:
See the Fortinet Document Library for Managed FortiSwitch documentation.
Refer to the FortiLink Compatibility matrix to find which FortiSwitchOS versions support which FortiOS versions.
NOTE: FortiLink is not supported in transparent mode.
The maximum number of supported FortiSwitch units depends on the FortiGate model:
FortiGate Model Range | Number of FortiSwitch Units Supported |
---|---|
FortiGate 40F, FortiGate-VM01 | 8 |
FortiGate 60F, 6xE, 80F, 8xE, 90E, 91E | 16 |
FortiGate 100D, FortiGate-VM02 | 24 |
FortiGate 100E, 100EF, 100F, 101E, 140E, 140E-POE | 32 |
FortiGate 200E, 201E | 64 |
FortiGate 300D to 500D | 48 |
FortiGate 300E to 500E | 72 |
FortiGate 600D to 900D and FortiGate-VM04 | 64 |
FortiGate 600E to 900E | 96 |
FortiGate 1000D to 15xxD | 128 |
FortiGate 1100E to 26xxF | 196 |
FortiGate-3xxx and up and FortiGate-VM08 and up | 300 |
New models (NPI releases) might not support FortiLink. Contact Customer Service & Support to check support for FortiLink. |
What’s new in FortiOS 7.0.8
The following list contains new managed FortiSwitch features added in FortiOS 7.0.8:
-
The commands for flooding IGMP reports and flooding multicast traffic on a specified managed switch interface have changed from:
config switch-controller managed-switch
edit <FortiSwitch_serial_number>
config ports
edit <port_name>
set igmps-flood-reports {disable | enable}
set igmps-flood-traffic {disable | enable}
next
end
to:
config switch-controller managed-switch
edit <FortiSwitch_serial_number>
config ports
edit <port_name>
set igmp-snooping-flood-reports {disable | enable}
set mcast-snooping-flood-traffic {disable | enable}
next
end
For example:
config switch-controller managed-switch
edit S524DF4K15000024
config ports
edit port3
set igmp-snooping-flood-reports enable
set mcast-snooping-flood-traffic enable
next
end
-
A new test has been added to the FortiSwitch recommendations in the Security Fabric > Security Rating page to help optimize your network. The test checks the FortiSwitchOS version on the managed switches. If the FortiSwitchOS version is 7.0.0 or higher, FortiOS recommends using the strict tunnel mode, which enforces the use of strong encryption. If the managed switches are running an older firmware version, FortiOS recommends upgrading to FortiSwitchOS 7.0.0 or higher.
To set the tunnel mode to strict in FortiOS:
config switch-controller system
set tunnel-mode strict
end
-
You can now use the FortiOS CLI to specify how often the managed FortiSwitch unit will send IGMP version-2 queries when the IGMP-snooping querier is configured:
config switch-controller igmp-snooping
set query-interval <10-1200>
end
By default, queries are sent every 125 seconds. The value for
aging-time
must be greater than the value forquery-interval
. -
You can now add software switch interfaces for the incoming and outgoing interfaces when you create a new IPv4 or IPv6 multicast policy by going to Policy & Objects > Multicast Policy and clicking Create New. The members must belong to an explicit intra-switch-policy switch interface.
-
The FG-180xF and FG-260xF models can now manage 196 FortiSwitch units.