New features or enhancements
More detailed information is available in the New Features Guide.
Cloud
See Public and private cloud in the New Features Guide for more information.
Feature ID |
Description |
---|---|
906380 |
Support Intel Sapphire Rapids (C3) instance types in GCP. |
912313 |
When integrating with Cisco ACI using a direct connection SDN connector, allow the ability to filter on the endpoint security group (ESG) when defining and resolving a dynamic address. |
916723 |
Introduce compatibility between FortiGate-VM64.ovf and FortiGate-VM64.vapp.ovf templates with VMware ESXi 8, virtual hardware version 20. |
GUI
See GUI in the New Features Guide for more information.
Feature ID |
Description |
---|---|
914305 |
Improve the FortiConverter configuration steps to provide a better user experience. Users can now see the processing status of their conversion requests. Users also have the ability to hide the FortiConverter prompt when they log in again from either the GUI or the CLI. New CLI commands have been added:
|
LAN Edge
See LAN Edge in the New Features Guide for more information.
Feature ID |
Description |
---|---|
847106 |
Support inter-VLAN routing by a managed FortiSwitch. The FortiGate can program FortiSwitch to do the Layer 3 routing of trusted traffic between specific VLANs. In this case, the traffic flows are trusted by the user and do not need to be inspected by the FortiGate. |
862149 |
Enhance wireless client mode support on FortiWiFi 80F series models. When wireless client mode is successfully configured and the FortiWiFi local radio has connected to a third-party SSID, this local radio can also concurrently work in AP mode to provide service to wireless clients. |
870337 |
Support GUI Security Rating recommendations for multi-chassis link aggregation groups (MCLAGs) up to three tiers, which is an improvement over the previous limitation of only one tier. This allows for more comprehensive security management and configuration of MCLAGs. |
888123 |
Support automatically allowing and blocking intra-VLAN traffic based on FortiLink connectivity status. This feature introduces configuration options to control switch controller access VLAN traffic behavior when the connection to FortiLink is lost. This enables customers to have the option to allow intra-VLAN traffic under the access VLAN on all affected FortiLink until the FortiLink connection is re-established. |
893194 |
Enhance the security of the Security Fabric by supporting authentication and encryption on all Fabric links wherever possible. This protects communication between FortiGate and FortiSwitch devices from unauthorized access and tampering, ensuring its security and integrity. It is supported on FortiLink over L2 and L3 Fabrics to ensure zero touch support. |
901576 |
Simplify BLE iBeacon provisioning whereby the BLE major ID can be set in WTP and WTP group settings (in addition to being set in the BLE profile settings), and the BLE minor ID can be set in the WTP settings (in addition to being set in the BLE profile settings). config wireless-controller wtp edit <id> set ble-major-id <integer> set ble-minor-id <integer> next end config wireless-controller wtp-group edit <name> set ble-major-id <integer> set wtps <wtp-id1>, <wtp-id2>, ... next end The BLE major ID defined in the WTP settings overrides the BLE major ID defined in the WTP group settings and the BLE major ID defined in the BLE profile settings. The BLE major ID defined in the WTP group settings overrides the BLE major ID defined in the BLE profile settings. The BLE minor ID defined in the WTP settings overrides the BLE minor ID defined in the BLE profile settings. |
904189 |
FortiOS can synchronize the FortiOS interface description with the VLAN description on the FortiSwitch. Previously, only the FortiOS interface name could be synchronized as the VLAN description on the FortiSwitch, and it was limited to 15 characters. This enhancement extends the VLAN description length on the FortiSwitch from 15 characters to a new maximum of 64 characters. config switch-controller global set vlan-identity {name | description} end |
905910 |
Support new changes to the Precision Time Protocol (PTP) configuration on FortiSwitch. This allows FortiOS to manage PTP configuration changes on the FortiSwitch side while maintaining support for previous PTP configuration options. |
906431 |
Before this enhancement, users could be assigned to VLANs dynamically according to the Tunnel-Private-Group-Id RADIUS attribute returned from the Access-Accept message, matching based on a VLAN name table defined under the virtual AP where the VLAN name supported a single VLAN ID. This enhancement allows multiple VLAN IDs to be configured per name tag, up to a maximum of eight VLAN IDs. Once wireless clients connect to the SSID, the FortiGate wireless controller can assign the VLAN ID by a round-robin method from the pool to ensure optimal utilization of VLAN resources. |
909971 |
Support the selection of channels per frequency band for wireless foreground scans when a radio is in monitor mode. This optimizes the wireless foreground scanning operation since only selected channels are scanned. config wireless-controller wids-profile edit <name> set ap-scan enable set ap-scan-channel-list-2G-5G <channel-1> <channel-2> ... <channel-x> set ap-scan-channel-list-6G <channel-1> <channel-2> ... <channel-y> next end |
916757 |
Enhance wireless client mode support on FortiWiFi 80F, 60F, and 40F series models that allows the local radio to connect with a WPA2/WPA3-Enterprise SSID and support PEAP and EAP-TLS authentication methods. config wifi-networks edit <id> set wifi-security wpa-enterprise set wifi-eap-type {both | tls | peap} set wifi-username <string> set wifi-client-certificate <client_certificate> set wifi-private-key <client_certificate> next end The username, client certificate, and private key settings are applicable when connecting to a WPA2/WPA3-Enterprise SSID with EAP-TLS. |
920968 |
Support MIMO mode configuration in the config wireless-controller wtp-profile edit <name> config radio-<number> set mimo-mode <supported_modes_depend_on_FAP_platform> end next end |
869610 |
Add GUI support for WPA3-SAE security mode for FortiAP wireless mesh backhaul SSID with WAP3 SAE security mode where the Hash-to-Element (H2E) only option is enforced. |
931695 |
Integrate with Pole Star's NAO Cloud service by supporting Pole Star BLE asset tags and forwarding their data to the cloud service. This solution allows wearables with BLE asset tags that are worn on staff and guests to communicate with FortiAPs through their built-in Bluetooth radios. The data forwarded to the cloud service is processed by Pole Star, and analytics are generated to map the location of each asset. |
Log & Report
See Logging in the New Features Guide for more information.
Feature ID |
Description |
---|---|
886560 |
Support switching to an alternate FortiAnalyzer if the main FortiAnalyzer is unavailable. Once the connectivity is restored, it will automatically fall back to the primary FortiAnalyzer. |
928948 |
Add JSON format support for the syslogd settings. config log syslogd setting set format json end |
Network
See Network in the New Features Guide for more information.
Feature ID |
Description |
---|---|
730332 |
Add GUI support for configuring the FortiGate controller and FortiGate connector for the FortiGate LAN extension feature. |
733258 |
Support DNS over QUIC (DoQ) and DNS over HTTP3 (DoH3) for transparent and local-in DNS modes. Connections can be established faster than with DNS over TLS (DoT) or DNS over HTTPS (DoH). Additionally, the FortiGate is now capable of handling the QUIC/TLS handshake and performing deep inspection for HTTP3 and QUIC traffic. |
765007 |
Support network troubleshooting with Connectivity Fault Management (CFM). With CFM, administrators can easily diagnose and resolve issues in Ethernet networks. CFM provides tools for monitoring, testing, and verifying the connectivity and performance of network segments. |
829480 |
The "Happy Eyeballs" (also named fast fallback) algorithm, as outlined in RFC 8305, is supported for explicit web proxy. This feature operates by attempting to connect to a web server that is available at multiple IPv4 and IPv6 addresses, either sequentially or simultaneously. As a result, the web server can be connected with reduced user-visible delay, which enhances the overall browsing experience. |
844004 |
Add GUI support for interfaces with a LAN role, wireless network interfaces, and FortiExtender LAN extension interfaces to receive an IP address from an IPAM server without any additional configuration at the interface level from the IPAM Settings tab (Network > IPAM). IPAM also detects and resolves any IP conflicts that may occur on the interfaces that it manages. If Auto-resolve conflicts is disabled in the IPAM settings, the Reallocate IP option from the tooltip can be used to manually reallocate the IP address. |
854875 |
Support overriding the IPv4 DHCP relay Option 82 Circuit ID, IPv6 Option 18 Interface ID, IPv4 DHCP relay source IP, and IPv6 DHCP relay source IP. This allows users to have more control over the configuration of their DHCP relay settings and ensures that their network is operating according to their specific needs. config system interface edit <name> set dhcp-relay-service enable set dhcp-relay-source-ip <IPv4_adress> set dhcp-relay-circuit-id <string> config ipv6 set dhcp6-relay-service enable set dhcp6-relay-source-ip <IPv6_address> set dhcp6-relay-interface-id <string> end next end |
865825 |
Support IPv6 on the cellular interface of FG-40F-3G4G devices. config system lte-modem set pdptype {IPv4 | IPv6 | IPv4v6} end |
877152 |
Support DNS local database lookup for explicit proxy. This allows the explicit proxy to perform DNS lookups using a local database, providing faster and more efficient resolution of domain names. Users can experience improved performance and reduced latency when accessing websites and online services through the explicit proxy. config system dns-database edit <name> set view {public | shadow | proxy} next end |
877393 |
Support airplane mode to enable/disable LTE and BLE RF emissions on FGR-70F-3G4G. config system global set airplane-mode {enable | disable} end Airplane mode is disabled by default, which means that LTE and BLE are enabled by default. Airplane mode must be configured in the CLI, followed by a reboot to ensure both LTE and BLE functions are disabled on the next bootup. Once airplane mode is enabled, it will keep LTE and BLE RF signals silent during normal operation of the FortiGate. A specific BIOS version is required to ensure LTE and BLE modules are completely RF silent during the bootup process. |
888381 |
On FortiGates with a cellular modem and dual SIM support, improve real-time switching to passive SIM when LTE modem traffic exceeds a specified data plan limit for a specified billing period. The SIM switch time occurs shortly after a data plan overage event occurs. config system lte-modem set data-usage-tracking enable config sim-switch set by-data-plan enable end config data-plan edit <id> set target-sim-slot {SIM-slot-1 | SIM-slot-2} set data-limit <integer> set data-limit-alert <integer> set billing-period {monthly | weekly | daily} set billing-date <integer> set billing-weekday {sunday | monday | tuesday | wednesday | thursday | friday | saturday} set billing-hour <integer> set overage {enable | disable} set iccid <SIM_ICCID> set delay-switch-time <HH:MM> next end end |
890632 |
Remove support for the outdated SSL 3.0 protocol, and set the default minimum SSL support to TLS 1.2 for all modules under FIPS-CC mode. Additionally, all modules now support the latest TLS 1.3 protocol, which provides enhanced security for data transmission. |
906748 |
Webpages can display Cross-Origin Resource Sharing (CORS) content in an explicit proxy environment when using session-based, cookie-enabled, and captive portal assisted authentication. This ensures that webpages are displayed correctly and improves the user experience. config authentication rule edit <name> set web-auth-cookie enable set cors-stateful {enable | disable} set cors-depth <integer> next end |
911412 |
An explicit web proxy can forward HTTPS requests to a web server without the need for an HTTP CONNECT message. The FortiGate explicit web proxy can be configured to detect the HTTPS scheme in the request line of a plain text HTTP request and forward it as an HTTPS request to the web server. This allows applications that cannot use the CONNECT message for sending an HTTPS request to communicate with the web server through an explicit web proxy. config firewall proxy-policy edit <id> set detect-https-in-http-request {enable | disable} next end |
912322 |
Support interfaces belonging to non-management VDOMs to be the source IP of the DNS conditional forwarding server. When |
912323 |
Support the transparent conditional DNS forwarder and add IPv6 support for the conditional DNS forwarder. The transparent conditional DNS forwarder allows the FortiGate to intercept and reroute DNS queries for specific domains to a specific DNS server. This provides greater control over DNS requests, especially when the administrator is not managing the DNS server configuration of the client devices. This can improve network efficiency and performance by resolving IPs local to the client's PCs rather than IPs local to the central DNS server. |
916843 |
The inter-VDOM link is capable of acquiring an IP address from the DHCP server. This allows for more seamless network integration. |
928885 |
Support using the web proxy forward server over IPv6. The new IPv6-enabled forward server works the same way as the previous IPv4 forward server. For example, you can configure an IPv6 address or an FQDN that resolves to an IPv6 address for the forward server, and you can also use the IPv6 forward server in a forward server group. config web-proxy forward-server edit <name> set addr-type {ipv6 | fqdn} set ipv6 <IPv6_address> next end |
Policy & Objects
See Policy and objects in the New Features Guide for more information.
Feature ID |
Description |
---|---|
829983 |
The enhanced Policy match tool retains all the functionality of its predecessor (Policy lookup) and adds the ability to return a new policy match results page based on the provided parameters. Policy match results now include web filter profile information (if a web filter is applied) and the ability to use identity-based policy matching. From the Matched Policy section in the match results, administrators can redirect to the policy list or edit the policy. The gutter area in the Policy Match Tool pane displays the top 10 recent matches. This feature provides a more comprehensive and user-friendly way to diagnose and manage policies. The # diagnose firewall iprope lookup <source_ip> <source_port> <destination_ip> <destination_port> <protocol> <device> <policy_type> [<auth_type>] [<user/group>] [<server>] |
892953 |
Support dynamic addresses in security policies in NGFW policy mode. The FABRIC_DEVICE address (a dynamic address consisting of several types of Fabric devices including FortiManager, FortiAnalyzer, FortiClient EMS, FortiMail, FortiAP, and FortiSwitch), can be used as the source or destination address in security policies. The |
906066 |
Support using the config firewall proxy-policy edit <id> set proxy access-proxy set action accept set utm-status enable set access-proxy <name> set ssh-filter-profile <string> next end |
915924 |
Active sessions can be refreshed for specific protocols and port ranges per VDOM in a specified direction. This option can help prevent potential denial of service (DoS) attacks by controlling the direction of traffic that refreshes existing sessions. config system session-ttl config port edit <id> set protocol <integer> set timeout <timeout_value> set refresh-direction {both | outgoing | incoming} next end end |
920927 |
The following updates and improvements have been made to the policy list page:
|
923611 |
Support using tags for dynamic addresses in security policies in NGFW policy mode, including EMS (normal and local EMS tags), FortiPolicy, FortiVoice, and FortiNAC. These tags can be selected as the source or destination addresses in security policies. Once these tags are used in security policies, use the |
SD-WAN
See SD-WAN in the New Features Guide for more information.
Feature ID |
Description |
---|---|
834861 |
Add route tags to static routes. config router static edit <seq-num> set tag <id> next end Add password field to BGP neighbor group to be used for the neighbor range. config router bgp config neighbor-group edit <name> set password <password> next end end |
892611 |
Improve the current SD-WAN neighbor plus The following options are added:
|
893314 |
The maximize bandwidth (
|
899827 |
Improve the client-side settings of the SD-WAN network bandwidth monitoring service to increase the flexibility of the speed tests, and to optimize the settings to produce more accurate measurements. The changes include:
|
900198 |
When a customer using SD-WAN with ADVPN has numerous IPv4 and IPv6 routes per spoke and there are many spokes in the topology, it is more suitable to deploy an IPv4- and IPv6-supported solution without a route reflector that involves an active dynamic BGP neighbor triggered by an ADVPN shortcut. This solution allows a spoke FortiGate to form a BGP neighbor with another spoke FortiGate only after the shortcut tunnel between them has been established. The spoke only learns routes from its BGP neighbors. The following IPv4 and IPv6 BGP configuration settings are required:
|
910190 |
Support using SD-WAN interfaces as source interface for authentication rules. |
914659 |
Add support for the new SD-WAN Overlay-as-a-Service through a license displayed as SD-WAN Overlay as a Service on the FortiGuard page, whose status is updated accordingly. Each FortiGate used with the FortiCloud Overlay-as-a-Service portal must have this license applied to it. |
Security Fabric
See Security Fabric in the New Features Guide for more information.
Feature ID |
Description |
---|---|
688217 |
Update FortiVoice Fabric connector:
|
860248 |
Add CIS security control mappings to the Security Rating page. Users can view ratings by CIS compliance and view the description for each CIS control. The FortiGate must have a valid Attack Surface Security Rating license to view security ratings grouped by CIS. |
875696 |
Add prompting for a one-time upgrade when a critical vulnerability is detected upon login. After logging in, the GUI displays a warning message about the critical vulnerability and allows the administrator to either upgrade or skip it. This ensures that the administrator is aware of any potential security risks and can take immediate action to address them. |
Security Profiles
See Security profiles in the New Features Guide for more information.
Feature ID |
Description |
---|---|
780874 |
OT virtual patching is a method for mitigating vulnerability exploits against OT devices by applying patches virtually on the FortiGate. In short, when a virtual patching profile is enabled on a firewall policy, the IPS engine will use the MAC address of the device to verify whether known vulnerabilities and mitigation rules are associated with it. If there is, then the IPS engine will apply mitigation rules to traffic for that device. |
819093 |
The inline CASB security profile enables the FortiGate to perform granular control over SaaS applications directly on firewall policies. The supported controls include privilege control, safe search, tenant control, and UTM bypass. Administrators can also customize their own SaaS applications, matching conditions, and custom controls and actions. A firewall policy must use proxy-based inspection with a deep inspection SSL profile in order to apply inline CASB and scan the traffic payload. |
869769 |
Display application signatures in a hierarchical manner when defining application overrides in the GUI. |
906915 |
The FortiGate can forward additional domain-related information to the ICAP server. Once domain information is gathered from an external authentication server (such as LDAP or an FSSO collector agent), FortiOS incorporates this domain information in the format, |
915879 |
Add two FortiGuard web filter categories:
|
925363 |
The FortiGate can download quarantined files in an archive format (.TGZ) instead of the original raw file. This allows for a more detailed analysis of the quarantined files and reduces the risk of malware infection. |
System
See System in the New Features Guide for more information.
Feature ID |
Description |
---|---|
843997 |
Support Enrollment over Secure Transport (EST) and the RFC 7030 standards when generating a new CSR request, performing automatic renewals, or manually regenerating a certificate. EST provides more security for automatic certificate management than Simple Certificate Enrollment Protocol (SCEP), which is commonly used for certificate enrollment. # execute vpn certificate local generate est <options> |
864021 |
Introduce the new Firmware Virtual Patch (FMWP) database to support local-in virtual patching. To install the FMWP database, the FortiGate must have a valid Firmware (FMWR) license. The FMWP database can be viewed by running the |
905629 |
Introduce the Operational Technology (OT) Security Service to help consolidate OT services under one license and to decouple the underlying definitions and packages from IoT ones. New OT-related services such as OT Detection Definitions and OT Virtual Patching Signatures used in the virtual patching profile are now licensed under the OT Security Service. |
907059 |
Allow the commands of a batch transaction to be viewed through the REST API from an API client. |
909935 |
FortiOS now includes a built-in entropy source, which eliminates the need for a physical USB entropy token when booting up in FIPS mode on any platform. This enhancement continues to meet the requirements of FIPS 140-3 Certification by changing the source of entropy to CPU jitter entropy. |
914674 |
Support log rotation for |
927945 |
Introduce selected availability (SA) versioning and labeling for special builds provided for customers that will remain on the build for a long duration. The SA versioning uses an odd number as the minor version, and a four-digit number for the patch version. |
931953 |
FortiOS supports Automatic Firmware Modification Attempt Reporting. This enhancement improves upon the Real-time file system integrity checking feature by implementing an automatic reporting mechanism in the event of an unauthorized firmware modification attempt. |
User & Authentication
See Authentication in the New Features Guide for more information.
Feature ID |
Description |
---|---|
743804 |
Add a RADIUS option to allow the FortiGate to set the RADIUS accounting message group delimiter to a comma (,) instead of a plus sign (+) when using RSSO. The default delimiter is still a plus sign. |
883884 |
Support the SAML ForceAuthn option. This option allows you to force a user to re-authenticate with their identity provider, even if they already have an active session. This can be useful in scenarios where sensitive information is being accessed, and an extra level of assurance is needed about the users identity. This setting is disabled by default. config user saml edit <name> set reauth {enable | disable} next end |
885400 |
Support local user password policies with enhanced complexity options. This allows customization of the local firewall user password policy with various settings, such as minimum length, character types, and password reuse. These settings are similar to the ones available for the system administrator password policy, which offers more security and flexibility than the previous local user password policy. |
904054 |
Support using the IP address as a Calling-Station-ID. config user radius edit <name> set call-station-id-type {legacy | IP | MAC} next end |
932769 |
Allow secure connections to SSL VPNs using certificate-based authentication. By utilizing the RADIUS protocol for authorization, access is granted based on the content of the Subject Alternative Name (SAN) in the user's certificate. This adds an extra layer of security by ensuring that only users with valid certificates can access the VPN. |
VPN
See IPsec and SSL VPN in the New Features Guide for more information.
Feature ID |
Description |
---|---|
780297 |
Enhance IKE debug filtering:
|
881903 |
Adjust the DTLS heartbeat parameters for SSL VPN. This improves the success rate of establishing a DTLS tunnel in networks with congestion or jitter. config vpn ssl settings set dtls-heartbeat-idle-timeout <integer> set dtls-heartbeat-interval <integer> set dtls-heartbeat-fail-count <integer> end The default value for these attributes is 3 seconds, which is also the minimum allowable value. The maximum allowable value for these attributes is 10 seconds. |
884772 |
Securely exchange serial numbers between FortiGates connected with IPsec VPN. This feature is supported in IKEv2, IKEv1 main mode, and IKEv1 aggressive mode. The exchange is only performed with participating FortiGates that have enabled the |
906370 |
Support EMS serial number checking per IPsec phase 1 interface. config vpn ipsec phase1-interface edit <name> set ems-sn-check {enable | disable} next end |
909970 |
Support multiple interface monitoring for IPsec. This enables IPsec to monitor multiple interfaces per IPsec tunnels and activate the backup link only when all primary links are down. This is useful for customers who have more than one WAN link and want to minimize the use of their LTE or 5G interfaces, which are more costly and bandwidth-intensive. This allows customers to optimize their WAN link selection and performance, and reduce their operational expenses. |
ZTNA
See Zero Trust Network Access in the New Features Guide for more information.
Feature ID |
Description |
---|---|
913238 |
Add four new categories and 14 subtypes of ZTNA replacement messages that correspond to new error codes error messages. Additional information is displayed for specific errors, and provides end users with more information about the error encountered. |