Skip to content

Overview

FortiGate

Currently, we support FortiOS version 5.2 and higher. In this section, you will find our recommendations regarding the setup of administrator profiles and accounts. This is very important, especially if you use Virtual Domains, since part of the required configuration can be done only from the CLI.

If you plan to use a user with full read/write permissions or even with the super_admin profile assigned (which is not recommended, except for LAB testing), you can skip the rest of this article.

User and Profile Creation

Create an Admin Profile

First, you need to create an admin profile with read-only permissions.

Follow these steps:

  1. Log in to your FortiGate. In case you have VDOMs enabled, ensure you have switched to the global scope (the relevant drop-down menu is in the top left corner).

  2. Navigate to System → Admin Profiles and click + Create New.

  3. Fill in a name and set all permissions to Read (you can do it by clicking the Set All drop-down menu). The only exception is the System → Maintenance permission, which must be set to Read/Write (especially if VDOMs are enabled). See the screenshots below from FortiOS versions 6.0 and 7.0:

    Admin Profile, FortiOS 6.0

    Admin Profile, FortiOS 7.0

Note

For FortiOS version 7.0 and higher, “permit usage of CLI diagnostic commands” has to be enabled.

Make the Created Admin Profile Global (VDOMs Only)

If Virtual Domains (VDOMs) are enabled, follow this procedure to make the created admin profile global. This means that administrators with this profile will be able to work with all VDOMs. By default, only the default prof_admin profile is set as global.

  1. Connect to the FortiGate via SSH or Telnet or use the console in the top right corner (version 5.6 and above) or at the dashboard (version 5.4 and below).

  2. Run the following commands to change the profile:

    config global
    config system accprofile
    edit read_only
    set scope global
    end
    end
    

    Change the name of the previously created profile in the 3rd line accordingly.

Create an Administrator Account

  1. Navigate to System → Administrators and click + Create New and select Administrator.

  2. Fill in its name, select a type of authentication, and finally select the previously created Administrator profile. If you have VDOMs enabled, the Virtual Domains section below should disappear (if not, the selected profile is not global).

  3. Apply other restrictions if needed and click OK.

Warning

Ensure that there is at least one interface with SSH or Telnet allowed, and this interface is accessible from the IP Fabric VM. To do so, navigate to Network → Interfaces and check the Access column.

Now it’s time to create a new snapshot or add your FortiGate to an existing one. All VDOMs should be discovered as separate devices named <hostname>/<VDOM_name>. If not, check the Connectivity Report in the IP Fabric GUI and search for the IP address of your FortiGate.

Known Bugs

FortiGate 300D Interface Flap

Known affected platforms: 6.0.*

Description: Running the get system interface transceiver command on a FortiGate 300D running version 6.0.* can cause some interfaces to flap. This was confirmed by Fortinet, but no bug ID was received. The Transceivers task has been disabled for any device matching this vendor, model, and version.

Fix: Upgrade to a newer version of FortiGate.

FortiSwitch

Transceivers

To get the brokenThld data, we need to run the diagnose switch modules state-machine command. However, currently, we do not have any outputs with meaningful data. Thus, for the FortiSwitch family, we are running this command just to collect outputs and will add the brokenThld field as soon as we collect usable data.