Introduction
This document provides the following information for FortiSwitchOS 7.2.1 devices managed by FortiOS 7.2.1 build 1254:
See the Fortinet Document Library for FortiSwitchOS documentation.
Refer to the FortiLink Compatibility table to find which FortiSwitchOS versions support which FortiOS versions.
NOTE: FortiLink is not supported in transparent mode.
The maximum number of supported FortiSwitch units depends on the FortiGate model:
FortiGate Model Range | Number of FortiSwitch Units Supported |
---|---|
FortiGate 40F, FortiGate-VM01 | 8 |
FortiGate 6xE, 8xE, 90E, 91E | 16 |
FGR-60F, FG-60F, FGR-60F-3G4G, FG-61F, FG-80F, FG-80FB, FG-80FP, FG-81F, and FG-81FP |
24 |
FortiGate 100D, FortiGate-VM02 | 24 |
FortiGate 100E, 100EF, 100F, 101E, 140E, 140E-POE | 32 |
FortiGate 200E, 201E | 64 |
FortiGate 300D to 500D | 48 |
FortiGate 300E to 500E | 72 |
FortiGate 600D to 900D and FortiGate-VM04 | 64 |
FortiGate 600E to 900E | 96 |
FortiGate 1000D to 15xxD | 128 |
FortiGate 1100E to 25xxE | 196 |
FortiGate-3xxx and up and FortiGate-VM08 and up |
300 |
New models (NPI releases) might not support FortiLink. Contact Customer Service & Support to check support for FortiLink. |
What’s new in FortiOS 7.2.1
The following list contains new managed FortiSwitch features added in FortiOS 7.2.1:
-
The
set fortilink-l3-mode
command is now deprecated. Instead, you can create a static inter-switch link (ISL) trunk and then enable or disable automatic VLAN configuration on the manually created (static) ISL trunk:config switch trunk
edit <trunk_name>
set static-isl enable
set static-isl-auto-vlan {enable | disable}
next
end
-
You can now use the FortiOS CLI to specify how often the managed FortiSwitch unit will send IGMP version-2 queries when the IGMP-snooping querier is configured:
config switch-controller igmp-snooping
set query-interval <10-1200> seconds
end
By default, queries are sent every 125 seconds. The value for
aging-time
must be greater than the value forquery-interval
. -
You can now use the FortiOS CLI to specify whether your managed FortiSwitch configuration is automatically backed up each time a user logs out or before a system upgrade is started. By default, both options are disabled.
-
The commands for flooding IGMP reports and flooding multicast traffic on a specified managed switch interface have changed from:
config switch-controller managed-switch
edit <FortiSwitch_serial_number>
config ports
edit <port_name>
set igmps-flood-reports {disable | enable}
set igmps-flood-traffic {disable | enable}
next
end
to:
config switch-controller managed-switch
edit <FortiSwitch_serial_number>
config ports
edit <port_name>
set igmp-snooping-flood-reports {disable | enable}
set mcast-snooping-flood-traffic {disable | enable}
next
end
For example:
config switch-controller managed-switch
edit S524DF4K15000024
config ports
edit port3
set igmp-snooping-flood-reports enable
set mcast-snooping-flood-traffic enable
next
end