FortiManager Release Notes

FortiManager

FortiManager, 7.4.6, Release Notes

Fortinet Inc.

FortiManager 7.4.6 Release Notes

May 9, 2025 — For more information, see the FortiManager Administration Guide. Supported models. The following tables list which FortiGate, FortiCarrier, FortiDDoS, ...

PDF preview unavailable. Download the PDF instead.

fortimanager-v7.4.6-release-notes
Release Notes
FortiManager 7.4.6

FORTINET DOCUMENT LIBRARY https://docs.fortinet.com FORTINET VIDEO LIBRARY https://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT https://support.fortinet.com FORTINET TRAINING & CERTIFICATION PROGRAM https://www.fortinet.com/training-certification FORTINET TRAINING INSTITUTE https://training.fortinet.com FORTIGUARD LABS https://www.fortiguard.com END USER LICENSE AGREEMENT https://www.fortinet.com/doc/legal/EULA.pdf FEEDBACK Email: techdoc@fortinet.com
May 20, 2025 FortiManager 7.4.6 Release Notes 02-746-1092551-20250509

TABLE OF CONTENTS

Change Log

7

FortiManager 7.4.6 Release

9

Supported models

9

FortiManager VM subscription license

9

Management extension applications

10

Supported models for MEA

10

Minimum system requirements

10

Special Notices

12

Compatibility issues with FortiOS 7.2.11

12

FortiManager-3700G v2 support

12

Cannot use FortiManager-VM 7.4.6 as a local FortiGuard server to provide query

services

12

Custom certificate name verification for FortiGate connection

13

The names of policies derived from policy blocks no longer automatically include the

policy block name

14

Upgrading from 7.4.3 to 7.4.6 with FIPS mode enabled

14

Device blueprint header

14

Shell access has been removed

15

Enable fcp-cfg-service for Backup Mode ADOMs

15

System Templates include new fields

15

Additional configuration required for SSO users

16

When using VPN Manager, IPSEC VPN CA certificates must be re-issued to all devices

after upgrade

16

FortiGuard web filtering category v10 update

16

FortiManager 7.2.3 and later firmware on FortiGuard

17

Configuration backup requires a password

17

FortiManager-400E support

17

Serial console has changed for FortiManager deployments on Xen

18

OpenXen in PV mode is not supported in FortiManager 7.4.1

18

Default GUI theme changed

18

Option to enable permission check when copying policies

19

Management Extensions visibility in the GUI

19

Install On column for policies

19

SD-WAN Orchestrator removed in 7.2

19

Changes to FortiManager meta fields

19

Setup wizard requires FortiCare registration

20

Access lists as ADOM-level objects

20

View Mode is disabled in policies when policy blocks are used

20

Reconfiguring Virtual Wire Pairs (VWP)

20

Scheduling firmware upgrades for managed devices

21

Modifying the interface status with the CLI

21

FortiManager 7.4.6 Release Notes

3

Fortinet Inc.

SD-WAN with upgrade to 7.0 Citrix XenServer default limits and upgrade Multi-step firmware upgrades Hyper-V FortiManager-VM running on an AMD CPU SSLv3 on FortiManager-VM64-AWS
New features
Upgrade Information Downgrading to previous firmware versions Firmware image checksums FortiManager VM firmware SNMP MIB files
Product Integration and Support Supported software Web browsers FortiOS and FortiOS Carrier FortiADC FortiAnalyzer FortiAnalyzer-BigData FortiAuthenticator FortiCache FortiCASB FortiClient FortiDDoS FortiDeceptor FortiFirewall and FortiFirewallCarrier FortiMail FortiPAM FortiProxy FortiSandbox FortiSASE FortiSOAR FortiSRA FortiSwitch FortiTester FortiToken FortiWeb Virtualization Feature support Language support Supported models FortiGate models FortiGate special branch models FortiCarrier models FortiCarrier special branch models FortiADC models FortiAnalyzer models FortiAnalyzer-BigData models
FortiManager 7.4.6 Release Notes
Fortinet Inc.

21 21 22 22 22
23
24 24 24 25 26
27 27 28 28 28 29 29 29 29 29 30 30 30 30 30 31 31 31 32 32 32 32 32 32 33 33 33 34 35 36 39 40 42 43 44 44
4

FortiAuthenticator models FortiCache models FortiDDoS models FortiDeceptor models FortiFirewall models FortiFirewallCarrier models FortiMail models FortiPAM models FortiProxy models FortiSandbox models FortiSOAR models FortiSRA models FortiSwitch models FortiTester models FortiWeb models FortiExtender MODEM firmware compatibility
Compatibility with FortiOS Versions FortiManager 7.4.6 and FortiOS 7.0.16 compatibility issues FortiManager 7.4.6 and FortiOS 7.0.17 compatibility issues FortiManager 7.4.6 and FortiOS 7.2.11 compatibility issues FortiManager 7.4.6 and FortiOS 7.4.7 compatibility issues
Resolved issues AP Manager Device Manager FortiSwitch Manager Others Policy and Objects Script System Settings Common Vulnerabilities and Exposures
Known issues New known issues Device Manager FortiSwitch Manager Policy & Objects Others Services System Settings VPN Manager Existing known issues AP Manager Device Manager FortiSwitch Manager Others Policy & Objects Script Services
FortiManager 7.4.6 Release Notes
Fortinet Inc.

45 45 45 46 46 47 48 48 48 49 49 49 50 50 51 51
52 52 52 53 54
56 56 56 57 57 58 58 59 59
60 60 60 60 61 61 62 62 63 63 63 63 65 66 66 68 68
5

System Settings

68

VPN Manager

68

Appendix A - FortiGuard Distribution Servers (FDS)

69

FortiGuard Center update support

69

Appendix B - Default and maximum number of ADOMs supported

71

Hardware models

71

Virtual Machines

71

FortiManager 7.4.6 Release Notes

6

Fortinet Inc.

Change Log

Date 2024-12-18 2024-12-20 2025-01-02 2025-01-06 2025-01-10
2025-01-14 2025-01-27 2025-01-28 2025-01-31
2025-02-04 2025-02-06
2025-02-07 2025-02-12
2025-02-18
2025-02-19 2025-02-27 2025-03-10 2025-03-13 2025-03-17 2025-03-31

Change Description Initial release. Updated Known issues on page 60. Updated Special Notices on page 12. Updated Resolved issues on page 56 and Known issues on page 60. Updated:
l Appendix A - FortiGuard Distribution Servers (FDS) on page 69. l Special Notices on page 12 Updated FortiOS and FortiOS Carrier on page 28. Updated Compatibility with FortiOS Versions on page 52. Updated Known issues on page 60. Updated: l FortiManager 7.4.6 and FortiOS 7.0.16 compatibility issues on page 52 l FortiManager 7.4.6 and FortiOS 7.0.17 compatibility issues on page 52 l Known issues on page 60 Updated FortiProxy on page 31. Updated "Custom certificate name verification for FortiGate connection" in Special Notices on page 12. Updated Resolved issues on page 56 and Known issues on page 60. Added FortiManager 7.4.6 and FortiOS 7.4.7 compatibility issues on page 54. UpdatedResolved issues on page 56 and Known issues on page 60. Added FortiManager 7.4.6 and FortiOS 7.2.11 compatibility issues on page 53. Updated Virtualization on page 33. Updated Known issues on page 60. Updated Known issues on page 60. Added "FortiManager-3700G v2 support" to Special Notices on page 12. Updated Known issues on page 60. Updated Resolved issues on page 56. Updated Resolved issues on page 56. Updated Known issues on page 60.

FortiManager 7.4.6 Release Notes

7

Fortinet Inc.

Change Log
Date 2025-04-01 2025-04-04 2025-04-08 2025-04-14 2025-04-17
2025-04-23 2025-04-29 2025-05-01
2025-05-09 2025-05-16

Change Description Updated Compatibility with FortiOS Versions on page 52. Updated Appendix A - FortiGuard Distribution Servers (FDS) on page 69. Updated Resolved issues on page 56. Updated Known issues on page 60. Added "Compatibility issues with FortiOS 7.2.11" to Special Notices on page 12. Updated FortiManager 7.4.6 and FortiOS 7.2.11 compatibility issues on page 53. Updated Known issues on page 60. Updated FortiSASE on page 32 and Known issues on page 60. Updated Web browsers on page 28. Added New features on page 23. Updated Known issues on page 60. Updated Feature support on page 33. Updated Known issues on page 60.

FortiManager 7.4.6 Release Notes

8

Fortinet Inc.

FortiManager 7.4.6 Release

This document provides information about FortiManager version 7.4.6 build 2588.
The recommended minimum screen resolution for the FortiManager GUI is 1920 x 1080. Please adjust the screen resolution accordingly. Otherwise, the GUI may not display properly.
This section includes the following topics: l Supported models on page 9 l FortiManager VM subscription license on page 9 l Management extension applications on page 10

Supported models

FortiManager version 7.4.6 supports the following models:

FortiManager FortiManager VM

FMG-200F, FMG-200G, FMG-300F, FMG-400G, FMG-410G, FMG-1000F, FMG-1000G, FMG-2000E, FMG-3000F, FMG-3000G, FMG-3100G, FMG3700F, and FMG-3700G.
FMG_VM64, FMG_VM64_ALI, FMG_VM64_AWS, FMG_VM64_ AWSOnDemand, FMG_VM64_Azure, FMG_VM64_GCP, FMG_VM64_IBM, FMG_VM64_HV (including Hyper-V 2016, 2019, and 2022), FMG_VM64_KVM, FMG_VM64_OPC, FMG_VM64_XEN (for both Citrix and Open Source Xen).

For access to container versions of FortiManager, contact Fortinet Support.

FortiManager VM subscription license
The FortiManager VM subscription license supports FortiManager version 6.4.1 and later. For information about supported firmware, see FortiManager VM firmware on page 25. See also Appendix B - Default and maximum number of ADOMs supported on page 71.

FortiManager 7.4.6 Release Notes

9

Fortinet Inc.

FortiManager 7.4.6 Release
Management extension applications

The following section describes supported models and minimum system requirements for management extension applications (MEA) in FortiManager7.4.6.
FortiManager uses port TCP/443 or TCP/4443 to connect to the Fortinet registry and download MEAs. Ensure that the port is also open on any upstream FortiGates. For more information about incoming and outgoing ports, see the FortiManager 7.0 Ports Guide.
As of FortiManager 7.4.0, the Management Extensions pane is only visible in the GUI when docker status is enabled and at least one MEA is enabled and downloaded. For more information about enabling and using the MEAs, see the Management Extensions documentation in the FortiManager Documents Library.

Supported models for MEA

You can use any of the following FortiManager models as a host for management extension applications:

FortiManager FortiManager VM

FMG-3000F, FMG-3000G, FMG-3700F, and FMG-3700G.
FMG_VM64, FMG_VM64_ALI, FMG_VM64_AWS, FMG_VM64_ AWSOnDemand, FMG_VM64_Azure, FMG_VM64_GCP, FMG_VM64_IBM, FMG_VM64_HV (including Hyper-V 2016, 2019, and 2022), FMG_VM64_KVM, FMG_VM64_OPC, FMG_VM64_XEN (for both Citrix and Open Source Xen).

Minimum system requirements
By default FortiManager VMs use the following system resource settings:
l 4 vCPU l 16 GB RAM l 500 GB disk space
Starting with FortiManager 7.0.0, RAM and CPU is capped at 50% for MEAs. (Use the config system docker command to view the setting.) If FortiManager has 8 CPUs and 16 GB RAM, then only 4 CPUs and 8 GB RAM are available to MEAs by default, and the 4 CPUs and 8 GB RAM are used for all enabled MEAs.
Some management extension applications have minimum system requirements that require you to increase system resources. The following table identifies the minimum requirements for each MEA as well as the recommended system resources to function well in a production environment.
MEA minimum system requirements apply only to the individual MEA and do not take into consideration any system requirements for resource-sensitive FortiManager features or multiple, enabled MEAs. If you are using multiple MEAs, you must increase the system resources to meet the cumulative need of each MEA.

FortiManager 7.4.6 Release Notes

10

Fortinet Inc.

FortiManager 7.4.6 Release

Management Extension Application FortiAIOps
FortiSigConverter
FortiSOAR
Policy Analyzer
Universal Connector
Wireless Manager (FortiWLM)

Minimum system requirements
l 8 vCPU l 32 GB RAM l 500 GB disk storage l 4 vCPU l 8 GB RAM l 4 vCPU l 8 GB RAM l 500 GB disk storage l 4 vCPU l 8 GB RAM l 1 GHZ vCPU l 2 GB RAM l 1 GB disk storage l 4 vCPU l 8 GB RAM

Recommended system resources for production*
No change
No change
l 16 vCPU l 64 GB RAM l No change for disk storage No change
No change
No change

*The numbers in the Recommended system resources for production column are a combination of the default system resource settings for FortiManager plus the minimum system requirements for the MEA.

FortiManager 7.4.6 Release Notes

11

Fortinet Inc.

Special Notices

This section highlights some of the operational changes that administrators should be aware of in 7.4.6.
Compatibility issues with FortiOS 7.2.11
Starting from FortiOS version 7.2.11, FortiGate devices use a different password type for the administrator's password field. FortiManager versions released before this change cannot verify the administrator password when installing to a FortiGate, which may result in an installation failure.
FortiManager-3700G v2 support
A second variant of the FortiManager 3700G has been introduced, featuring an updated RAID controller subsystem. This change was necessary as the previous RAID subsystem has reached end-of-life with our OEM partner. To verify the system part number, use the following command:
get system status For example:
l FMG-3700G v1 system part number: P26600-01 l FMG-3700G v2 system part number: P26600-10 Using an image compatible with the first variant on a second variant device may result in the hardware RAID controller not being recognized properly. If the new variant is detected and firmware versions 7.4.6 or 7.6.2 are required, a special build image must be used. Please contact our support team to obtain this special image. Versions 7.2.9, 7.4.6, 7.6.2, and earlier support only the first variant. Versions 7.2.10, 7.4.7, 7.6.3, and later support both variants.
Cannot use FortiManager-VM 7.4.6 as a local FortiGuard server to provide query services
When the FortiGuard Web Filter and Email Filter services are enabled, the usage of the root filesystem ("rootfs") gradually increases until it reaches 100%. This will affect the performance of other functions on the FortiManager, and it will be more noticeable when the FortiManager-VM is operating with a smaller memory size.

FortiManager 7.4.6 Release Notes

12

Fortinet Inc.

Special Notices
If these services are required, you must upgrade to 7.6.2 and above or a later 7.4 release when it is available. Alternatively, you can use the public FortiGuard web filtering service instead of the service on FortiManager. When using FortiManager 7.4.6, all query services must be disabled using the following workaround.
Workaround:
1. Disable all FortiGuard query services and delete their databases by using the following commands. config fmupdate service set query-antispam disable set query-antivirus disable set query-filequery disable set query-iot disable set query-iot-collection disable set query-iot-vulnerability disable set query-outbreak-prevention disable set query-webfilter disable end
diagnose fmupdate fgd-del-db <Database-category-type> For example: diagnose fmupdate fgd-del-db wf 2. Reboot the FortiManager. Since the FortiGuard query services are disabled, their databases will no longer be updated.
Custom certificate name verification for FortiGate connection
In FortiManager 7.4.6, the fgfm-peercert-withoutsn setting has been removed, so there is no method to disable this verification. The FortiGate certificate must contain the FortiGate serial number in either the CN or SAN.
FortiManager 7.4.3 introduces a new verification of the CN or SAN of a custom certificate uploaded by the FortiGate admin. This custom certificate is used when a FortiGate device connects to a FortiManager unit. The FortiGate and FortiManager administrators may configure the use of a custom certificate with the following CLI commands: FortiGate-related CLI:
config system central-management local-cert Certificate to be used by FGFM protocol. ca-cert CA certificate to be used by FGFM protocol.
FortiManager-related CLI: config system global fgfm-ca-cert set the extra fgfm CA certificates. fgfm-cert-exclusive set if the local or CA certificates should be used exclusively. fgfm-local-cert set the fgfm local certificate.

FortiManager 7.4.6 Release Notes

13

Fortinet Inc.

Special Notices
Upon upgrading to FortiManager 7.4.3, FortiManager will request that the FortiGate certificate must contain the FortiGate serial number either in the CN or SAN. The tunnel connection may fail if a matching serial number is not found. If the tunnel connection fails, the administrator may need to re-generate the custom certificates to include serial number.
The names of policies derived from policy blocks no longer automatically include the policy block name
Previously, when a policy was derived from a "policy block," its name was automatically prefixed with the policy block name, ensuring unique names but sometimes exceeding the 35-character limit in the policy package. To address this, the renaming behavior has been removed, and policies now retain their original names without policy block prefixes, avoiding the character limit issue. After the fix, FortiManager may encounter duplicate policy names if multiple policy blocks previously contained policies with the same base name. Since FortiManager requires unique policy names for proper management, this duplication can break the installation or functionality of policies. To resolve this, customers may need to manually identify and rename all conflicting policies after upgrading.
Upgrading from 7.4.3 to 7.4.6 with FIPS mode enabled
When FIPS mode is enabled, upgrading from 7.4.3 to 7.4.6 might fail due to the following error message: "FIPS firmware signature verification failed". The following steps should be taken as workaround: 1. Backup FortiManager-v7.4.3-fips-cc mode DB. 2. Disable FortiManager-v7.4.3-fips mode to normal mode. 3. Upgrade FortiManager-v7.4.3 normal mode to v7.4.6. 4. FortiManager-v7.4.6 enable fips-cc mode. 5. Restore FortiManager-v7.4.3-fips DB on FortiManager-v7.4.6-fips. Note that you do not need to follow this workaround if upgraading from 7.4.4 or 7.4.5 to 7.4.6.
Device blueprint header
The device blueprint header is updated in FortiManager 7.4.4, and the new format is required when importing model devices from a CSV file. If you have existing CSV files that are used as a template to import model devices, the header must be updated to use the new format.

FortiManager 7.4.6 Release Notes

14

Fortinet Inc.

Special Notices
To update the header for an existing CSV file: 1. In the FortiManager 7.4.4 or later GUI, go to Device Manager > Device & Groups. 2. From the Add Device dropdown, select Device Blueprint. 3. Select an existing blueprint and click Generate CSV. 4. Open the new CSV file and copy the header. 5. Open the existing CSV file and paste the new header, replacing the old header from previous versions.
Shell access has been removed
As of FortiManager 7.4.4, shell access has been removed. The following CLI variables have been removed, which were previously used to enable shell access:
config system admin setting set shell-access {enable | disable} set shell-password <passwd>
The following CLI command has been removed, which was previously used to access shell when enabled: execute shell
Enable fcp-cfg-service for Backup Mode ADOMs
When performing a configuration backup from the CLI of FortiGates managed by FortiManager in Backup Mode ADOMs, you must enable the "fcp-cfg-service" using the following command on the FortiManager:
config system global set fcp-cfg-service enable
end
System Templates include new fields
Beginning in FortiManager 7.4.3, the Hostname, Timezone, gui-device-latitude, and gui-device-longitude fields have been added to System Templates. System Templates created before upgrading to 7.4.3 must be reconfigured to specify these fields following the upgrade. If these fields are not specified in a System Template, the default settings will be applied the next time an install is performed which may result in preferred settings being overwritten on the managed device.

FortiManager 7.4.6 Release Notes

15

Fortinet Inc.

Special Notices
Additional configuration required for SSO users
Beginning in 7.4.3, additional configuration is needed for FortiManager Users declared as wildcard SSO users. When configuring Administrators as wildcard SSO users, the ext-auth-accprofile-override and/or ext-authadom-override features, under Advanced Options, should be enabled if the intent is to obtain the ADOMs list and/or permission profile from the SAML IdP.
When using VPN Manager, IPSEC VPN CA certificates must be re-issued to all devices after upgrade
When FortiManager is upgraded to 7.4.2 or later, it creates a new CA <ADOM Name>_CA3 certificate as part of a fix for resolved issue 796858. See Resolved Issues in the FortiManager 7.4.2 Release Notes. These certificates are installed to the FortiGate devices on the next policy push. As a result, the next time any IPSEC VPNs which use FortiManager certificates rekey, they will fail authentication and be unable to re-establish. The old CA <ADOM Name>_CA2 cannot be deleted, as existing certificates rely on it for validation. Similarly, the new CA <ADOM Name>_CA3 cannot be deleted as it is required for the fix. Therefore, customers affected by this change must follow the below workaround after upgrading FortiManager to v7.4.2 or later. A maintenance period is advised to avoid IPSEC VPN service disruption. Workaround: Re-issue all certificates again to all devices, and then delete the old CA <ADOM Name>_CA2 from all devices. Next, regenerate the VPN certificates. To remove CA2 from FortiManager, Policy & Objects > Advanced > CA Certificates must be enabled in feature visibility.
FortiGuard web filtering category v10 update
Fortinet has updated its web filtering categories to v10, which includes two new URL categories for AI chat and cryptocurrency web sites. In order to use the new categories, customers must upgrade their Fortinet products to one of the versions below.
l FortiManager - Fixed in 6.0.12, 6.2.9, 6.4.7, 7.0.2, 7.2.0, 7.4.0. l FortiOS - Fixed in 7.2.8 and 7.4.1. l FortiClient - Fixed in Windows 7.2.3, macOS 7.2.3, Linux 7.2.3. l FortiClient EMS - Fixed in 7.2.1. l FortiMail - Fixed in 7.0.7, 7.2.5, 7.4.1. l FortiProxy - Fixed in 7.4.1.

FortiManager 7.4.6 Release Notes

16

Fortinet Inc.

Special Notices
Please read the following CSB for more information to caveats on the usage in FortiManager and FortiOS. https://support.fortinet.com/Information/Bulletin.aspx

FortiManager 7.2.3 and later firmware on FortiGuard

Starting in FortiManager 7.2.1, a setup wizard executes to prompt the user for various configuration steps and registration with FortiCare. During the execution, the FortiManager unit attempts to communicate with FortiGuard for a list of FortiManager firmware images currently available on FortiGuard ­ older and newer.
In the case of FortiManager 7.2.2, a bug in the GUI prevents the wizard from completing and prevents the user from accessing the FortiManager unit. The issue has been fixed in 7.2.3 and later and a CLI command has been added to bypass the setup wizard at login time.
config system admin setting set firmware-upgrade-check disable
end
Fortinet has not uploaded FortiManager 7.2.3 and later firmware to FortiGuard in order to work around the GUI bug, however, the firmware is available for download from the Fortinet Support website.

Configuration backup requires a password

As of FortiManager 7.4.2, configuration backup files are automatically encrypted and require you to set a password. The password is required for scheduled backups as well.
In previous versions, the encryption and password were optional.
For more information, see the FortiManager Administration Guide.

FortiManager-400E support

FortiManager 7.4.2 and later does not support the FortiManager-400E device.
FortiManager 7.4.2 introduces an upgrade of the OpenSSL library to address known vulnerabilities in the library. As a result, the SSL connection that is setup between the FortiManager-400E device and the Google Map server hosted by Fortinet uses a SHA2 (2048) public key length. The certificate stored on the BIOS that is used during the setup of the SSL connection contains a SHA1 public key length, which causes the connection setup to fail. Running the following command shows the key length.
FMG400E # conf sys certificate local (local)# ed Fortinet_Local (Fortinet_Local)# get name : Fortinet_Local password : * comment : Default local certificate

FortiManager 7.4.6 Release Notes

17

Fortinet Inc.

Special Notices
private-key : certificate : Subject: C = US, ST = California, L = Sunnyvale, O = Fortinet, OU = FortiManager, CN
= FL3K5E3M15000074, emailAddress = support@fortinet.com Issuer: C = US, ST = California, L = Sunnyvale, O = Fortinet, OU = Certificate
Authority, CN = support, emailAddress = support@fortinet.com Valid from: 2015-03-06 16:22:10 GMT Valid to: 2038-01-19 03:14:07 GMT Fingerprint: FC:D0:0C:8D:DC:57:B6:16:58:DF:90:22:77:6F:2C:1B Public key: rsaEncryption (1024 bits) Signature: sha1WithRSAEncryption Root CA: No Version: 3 Serial Num: 1e:07:7a Extension 1: X509v3 Basic Constraints: CA:FALSE ... (Fortinet_Local)#
Serial console has changed for FortiManager deployments on Xen
As of FortiManager 7.4.1, the serial console for Xen deployments has changed from hvc0 (Xen specific) to ttyS0 (standard).
OpenXen in PV mode is not supported in FortiManager 7.4.1
As of FortiManager 7.4.1, kernel and rootfs are encrypted. OpenXen in PV mode tries to unzip the kernel and rootfs, but it will fail. Therefore, OpenXen in PV mode cannot be used when deploying or upgrading to FortiManager 7.4.1. Only HVM (hardware virtual machine) mode is supported for OpenXen in FortiManager 7.4.1.
Default GUI theme changed
As of FortiManager 7.4.1, the default GUI theme is Jade. The default theme can be changed from System Settings > Settings.

FortiManager 7.4.6 Release Notes

18

Fortinet Inc.

Special Notices
Option to enable permission check when copying policies
As of 7.4.0, a new command is added in the CLI: config system global set no-copy-permission-check {enable | disable} end
By default, this is set to disable. When set to enable, a check is performed when copying policies to prevent changing global device objects if the user does not have permission.
Management Extensions visibility in the GUI
As of FortiManager 7.4.0, the Management Extensions pane is only visible in the GUI when docker status is enabled and at least one management extension application (MEA) is enabled and downloaded. For more information about enabling and using the MEAs, see the Management Extensions documentation in the FortiManager Documents Library.
Install On column for policies
Prior to version 7.2.3, the 'Install-on' column for policies in the policy block had no effect. However, starting from version 7.2.3, the 'Install-on' column is operational and significantly impacts the behavior and installation process of policies. It's important to note that using 'Install-on' on policies in the policy block is not recommended. If required, this setting can only be configured through a script or JSON APIs.
SD-WAN Orchestrator removed in 7.2
Starting in 7.2.0, the SD-WAN Orchestrator is no longer available in FortiManager. Instead, you can use the SDWAN Overlay Template wizard to configure your SD-WAN overlay network. For more information, see SD-WAN Overlay Templates in the FortiManager Administration Guide.
Changes to FortiManager meta fields
Beginning in 7.2.0, FortiManager supports policy object metadata variables.

FortiManager 7.4.6 Release Notes

19

Fortinet Inc.

Special Notices
When upgrading from FortiManager 7.0 to 7.2.0 and later, FortiManager will automatically create ADOM-level metadata variable policy objects for meta fields previously configured in System Settings that have per-device mapping configurations detected. Objects using the meta field, for example CLI templates, are automatically updated to use the new metadata variable policy objects. Meta fields in System Settings can continue to be used as comments/tags for configurations. For more information, see ADOM-level meta variables for general use in scripts, templates, and model devices.

Setup wizard requires FortiCare registration

Starting in FortiManager 7.2.1, the FortiManager Setup wizard requires you to complete the Register with FortiCare step before you can access the FortiManager appliance or VM. Previously the step was optional.
For FortiManager units operating in a closed environment, contact customer service to receive an entitlement file, and then load the entitlement file to FortiManager by using the CLI.

Access lists as ADOM-level objects

Starting in 7.2.0, FortiManager supports IPv4 and IPv6 access lists as ADOM-level object configurations from FortiGate. Previously, access lists were controlled by the device database/FortiGate configuration.
After upgrading to 7.2.0 from an earlier release, the next time you install changes to a FortiGate device with an IPv4 or IPv6 access list, FortiManager will purge the device database/FortiGate configuration which may have previously contained the access list. To address this, administrators can re-import the FortiGate policy configuration to an ADOM's policy package or re-create the IPv4/IPv6 access list in the original package.

View Mode is disabled in policies when policy blocks are used

When policy blocks are added to a policy package, the View Mode option is no longer available, and policies in the table cannot be arranged by Interface Pair View. This occurs because policy blocks typically contain policies with multiple interfaces, however, View Mode is still disabled even when policy blocks respect the interface pair.

Reconfiguring Virtual Wire Pairs (VWP)

A conflict can occur between the ADOM database and device database when a Virtual Wire Pair (VWP) is installed on a managed FortiGate that already has a configured VWP in the device database. This can happen when an existing VWP

FortiManager 7.4.6 Release Notes

20

Fortinet Inc.

Special Notices
has been reconfigured or replaced. Before installing the VWP, you must first remove the old VWP from the device's database, otherwise a policy and object validation error may occur during installation. You can remove the VWP from the device database by going to Device Manager > Device & Groups, selecting the managed device, and removing the VWP from System > Interface.
Scheduling firmware upgrades for managed devices
Starting in FortiManager 7.0.0, firmware templates should be used to schedule firmware upgrades on managed FortiGates. Attempting firmware upgrade from the FortiManager GUI by using legacy methods may ignore the schedule upgrade option and result in FortiGates being upgraded immediately.
Modifying the interface status with the CLI
Starting in version 7.0.1, the CLI to modify the interface status has been changed from up/down to enable/disable. For example: config system interface
edit port2 set status <enable/disable>
next end
SD-WAN with upgrade to 7.0
Due to design change with SD-WAN Template, upgrading to FortiManager 7.0 may be unable to maintain dynamic mappings for all SD-WAN interface members. Please reconfigure all the missing interface mappings after upgrade.
Citrix XenServer default limits and upgrade
Citrix XenServer limits ramdisk to 128M by default. However the FMG-VM64-XEN image is larger than 128M. Before updating to FortiManager 6.4, increase the size of the ramdisk setting on Citrix XenServer.

FortiManager 7.4.6 Release Notes

21

Fortinet Inc.

Special Notices
To increase the size of the ramdisk setting: 1. On Citrix XenServer, run the following command:
xenstore-write /mh/limits/pv-ramdisk-max-size 536,870,912 2. Confirm the setting is in effect by running xenstore-ls.
----------------------limits = "" pv-kernel-max-size = "33554432" pv-ramdisk-max-size = "536,870,912" boot-time = "" --------------------------3. Remove the pending files left in /run/xen/pygrub.
The ramdisk setting returns to the default value after rebooting.
Multi-step firmware upgrades
Prior to using the FortiManager to push a multi-step firmware upgrade, confirm the upgrade path matches the path outlined on our support site. To confirm the path, please run: dia fwmanager show-dev-upgrade-path <device name> <target firmware> Alternatively, you can push one firmware step at a time.
Hyper-V FortiManager-VM running on an AMD CPU
A Hyper-V FMG-VM running on a PC with an AMD CPU may experience a kernel panic. Fortinet recommends running VMs on an Intel-based PC.
SSLv3 on FortiManager-VM64-AWS
Due to known vulnerabilities in the SSLv3 protocol, FortiManager-VM64-AWS only enables TLSv1 by default. All other models enable both TLSv1 and SSLv3. If you wish to disable SSLv3 support, please run: config system global set ssl-protocol t1sv1 end

FortiManager 7.4.6 Release Notes

22

Fortinet Inc.

New features
New features
For information about what's new in FortiManager 7.4.6, see the FortiManager 7.4 New Features Guide. The index in the New Features Guide lists new features by release.

FortiManager 7.4.6 Release Notes

23

Fortinet Inc.

Upgrade Information

Prior to upgrading your FortiManager, please review the FortiManager Upgrade Guide in detail as it includes all of the necessary steps and associated details required to upgrade your FortiManager device or VM, including recommended upgrade paths. See the FortiManager Upgrade Guidein the Fortinet Document Library.
Before upgrading FortiManager, check ADOM versions. Check the ADOM versions supported by the destination firmware and the current firmware. If the current firmware uses ADOM versions not supported by the destination firmware, upgrade ADOM versions in FortiManager before upgrading FortiManager to the destination firmware version. For example, FortiManager 7.2 supports ADOM versions 6.4, 7.0, and 7.2, but FortiManager 7.4 supports ADOM versions 7.0, 7.2, and 7.4. Before you upgrade FortiManager 7.2 to 7.4, ensure that all ADOM 6.4 versions have been upgraded to ADOM version 7.0 or later. See the FortiManager Upgrade Guidein the Fortinet Document Library.
This section contains the following topics: l Downgrading to previous firmware versions on page 24 l Firmware image checksums on page 24 l FortiManager VM firmware on page 25 l SNMP MIB files on page 26
Downgrading to previous firmware versions
FortiManager does not provide a full downgrade path. You can downgrade to a previous firmware release by using the GUI or CLI, but doing so results in configuration loss. A system reset is required after the firmware downgrade process has completed. To reset the system, use the following CLI commands via a console port connection: execute reset {all-settings | all-except-ip} execute format {disk | disk-ext4 | disk-ext3}
Firmware image checksums
The MD5 checksums for all Fortinet software and firmware releases are available at the Customer Service & Support portal, https://support.fortinet.com. After logging in, go to Download > Firmware Image Checksums, enter the image file name including the extension, and select Get Checksum Code.

FortiManager 7.4.6 Release Notes

24

Fortinet Inc.

Upgrade Information
FortiManager VM firmware
Fortinet provides FortiManager VM firmware images for Amazon AWS, Amazon AWSOnDemand, Citrix and Open Source XenServer, Linux KVM, Microsoft Hyper-V Server, and VMware ESX/ESXi virtualization environments.
Amazon Web Services l The 64-bit Amazon Machine Image (AMI) is available on the AWS marketplace.
Citrix XenServer and Open Source XenServer l .out: Download the 64-bit firmware image to upgrade your existing FortiManager VM installation. l .out.OpenXen.zip: Download the 64-bit package for a new FortiManager VM installation. This package contains the QCOW2 file for the Open Source Xen Server. l .out.CitrixXen.zip: Download the 64-bit package for a new FortiManager VM installation. This package contains the Citrix XenServer Virtual Appliance (XVA), Virtual Hard Disk (VHD), and OVF files.
Google Cloud Platform l .out: Download the 64-bit firmware image to upgrade your existing FortiManager VM installation. l .out.gcp.zip: Download the 64-bit package for a new FortiManager VM installation.
Linux KVM l .out: Download the 64-bit firmware image to upgrade your existing FortiManager VM installation. l .out.kvm.zip: Download the 64-bit package for a new FortiManager VM installation. This package contains QCOW2 that can be used by qemu.
Microsoft Azure The files for Microsoft Azure have AZURE in the filenames, for example <product>_VM64_AZURE-v<number>build<number>-FORTINET.out.hyperv.zip.
l .out: Download the firmware image to upgrade your existing FortiManager VM installation.
Microsoft Hyper-V Server The files for Microsoft Hyper-V Server have HV in the filenames, for example, <product>_VM64_HV-v<number>build<number>-FORTINET.out.hyperv.zip.
l .out: Download the firmware image to upgrade your existing FortiManager VM installation. l .hyperv.zip: Download the package for a new FortiManager VM installation. This package contains a Virtual
Hard Disk (VHD) file for Microsoft Hyper-V Server.
Microsoft Hyper-V 2016 is supported.

FortiManager 7.4.6 Release Notes

25

Fortinet Inc.

Upgrade Information
Oracle Private Cloud l .out: Download the 64-bit firmware image to upgrade your existing FortiManager VM installation. l .out.opc.zip: Download the 64-bit package for a new FortiManager VM installation.
VMware ESX/ESXi l .out: Download the 64-bit firmware image to upgrade your existing VM installation. l .ovf.zip: Download either the 64-bit package for a new VM installation. This package contains an Open Virtualization Format (OVF) file for VMware and two Virtual Machine Disk Format (VMDK) files used by the OVF file during deployment.
For more information see the FortiManager Data Sheet available on the Fortinet web site. VM installation guides are available in the Fortinet Document Library.
SNMP MIB files
You can download the FORTINET-FORTIMANAGER-FORTIANALYZER.mib MIB file in the firmware image file folder. The Fortinet Core MIB file is located in the main FortiManagerversion 5.00 file folder.

FortiManager 7.4.6 Release Notes

26

Fortinet Inc.

Product Integration and Support

This section lists FortiManager 7.4.6 support of other Fortinet products. It also identifies what FortiManager features are supported for managed platforms and what languages FortiManager supports. It also lists which Fortinet models can be managed by FortiManager.
The section contains the following topics:
l Supported software on page 27 l Feature support on page 33 l Language support on page 34 l Supported models on page 35 l FortiExtender MODEM firmware compatibility on page 51
Supported software
FortiManager 7.4.6supports the following software:
l Web browsers on page 28 l FortiOS and FortiOS Carrier on page 28 l FortiADC on page 28 l FortiAnalyzer on page 29 l FortiAnalyzer-BigData on page 29 l FortiAuthenticator on page 29 l FortiCache on page 29 l FortiCASB on page 29 l FortiClient on page 30 l FortiDDoS on page 30 l FortiDeceptor on page 30 l FortiFirewall and FortiFirewallCarrier on page 30 l FortiMail on page 30 l FortiPAM on page 31 l FortiProxy on page 31 l FortiSandbox on page 31 l FortiSASE on page 32 l FortiSOAR on page 32 l FortiSRA on page 32 l FortiSwitch on page 32 l FortiTester on page 32 l FortiToken on page 32

FortiManager 7.4.6 Release Notes

27

Fortinet Inc.

Product Integration and Support
l FortiWeb on page 33 l Virtualization on page 33
To confirm that a device model or firmware version is supported by the current firmware version running on FortiManager, run the following CLI command:
diagnose dvm supported-platforms list
Always review the Release Notes of the supported platform firmware version before upgrading your device.
Web browsers
FortiManager 7.4.6supports the following web browsers: l Google Chrome version 135 l Microsoft Edge version 135 l Mozilla Firefox 138
Other web browsers may function correctly, but are not supported by Fortinet.
FortiOS and FortiOS Carrier
The FortiManager Release Notes communicate support for FortiOS versions that are available at the time of the FortiManager 7.4.6 release. For additional information about other supported FortiOS versions, please refer to the FortiManager compatibility chart in the Fortinet Document Library. See FortiManager compatibility with FortiOS.
FortiManager 7.4.6supports the following versions of FortiOS and FortiOS Carrier: l 7.4.0 to 7.4.7 l 7.2.0 to 7.2.11 l 7.0.0 to 7.0.17
Some FortiOS versions are supported with compatibility issues. For more details, see Compatibility with FortiOS Versions on page 52.
FortiADC
FortiManager 7.4.6supports the following versions of FortiADC:

FortiManager 7.4.6 Release Notes

28

Fortinet Inc.

Product Integration and Support
l 7.4.0 and later l 7.2.0 and later l 7.1.0 and later
FortiAnalyzer
FortiManager 7.4.6supports the following versions of FortiAnalyzer: l 7.4.0 and later l 7.2.0 and later l 7.0.0 and later
FortiAnalyzer-BigData
FortiManager 7.4.6supports the following versions of FortiAnalyzer-BigData: l 7.2.0 and later l 7.0.0 and later
FortiAuthenticator
FortiManager 7.4.6supports the following versions of FortiAuthenticator: l 6.6.0 and later l 6.5.0 and later l 6.4.0 and later l 6.3.0 and later
FortiCache
FortiManager 7.4.6supports the following versions of FortiCache: l 4.2.0 and later l 4.1.0 and later l 4.0.0 and later
FortiCASB
FortiManager 7.4.6supports the following versions of FortiCASB: l 23.2.0 and later

FortiManager 7.4.6 Release Notes

29

Fortinet Inc.

Product Integration and Support
FortiClient
FortiManager 7.4.6supports the following versions of FortiClient: l 7.4.0 and later l 7.2.0 and later l 7.0.0 and later l 6.4.0 and later
FortiDDoS
FortiManager 7.4.6supports the following versions of FortiDDoS: l 7.0.0 and later l 6.6.0 and later l 6.5.0 and later l 6.4.0 and later l 5.7.0 and later l 5.6.0 and later
Limited support. For more information, see Feature support on page 33.
FortiDeceptor
FortiManager 7.4.6 supports the following versions of FortiDeceptor: l 5.3.0 and later l 5.2.0 and later l 5.1.0 and later l 5.0.0 and later l 4.3.0 and later
FortiFirewall and FortiFirewallCarrier
FortiManager 7.4.6supports the following versions of FortiFirewall and FortiFirewallCarrier: l 7.4.0 and later l 7.2.0 and later l 7.0.0 and later
FortiMail
FortiManager 7.4.6supports the following versions of FortiMail:

FortiManager 7.4.6 Release Notes

30

Fortinet Inc.

Product Integration and Support
l 7.4.0 and later l 7.2.0 and later l 7.0.0 and later
FortiPAM
FortiManager 7.4.6 supports the following versions of FortiPAM: l 1.4.0 and later l 1.3.0 and later l 1.2.0 and later l 1.1.0 and later l 1.0.0 and later
FortiProxy
FortiManager 7.4.6 supports configuration management for the following versions of FortiProxy: l 7.4.0 to 7.4.5 l 7.2.2, 7.2.3, 7.2.7, and 7.2.9 l 7.0.7 to 7.0.18
Configuration management support is identified as Management Features in these release notes. See Feature support on page 33.
FortiManager 7.4.6 supports logs from the following versions of FortiProxy: l 7.4.0 to 7.4.5 l 7.2.0 to 7.2.11 l 7.0.0 to 7.0.20 l 2.0.0 to 2.0.5 l 1.2.0 to 1.2.13 l 1.1.0 to 1.1.6 l 1.0.0 to 1.0.7
FortiSandbox
FortiManager 7.4.6supports the following versions of FortiSandbox: l 4.4.0 and later l 4.2.0 and later l 4.0.0 and 4.0.1 l 3.2.0 and later

FortiManager 7.4.6 Release Notes

31

Fortinet Inc.

Product Integration and Support
FortiSASE
The FortiSASE connector is only supported on FortiManager VM platforms, not FortiManager hardware models. For more information about compatibility, see the FortiSASE Release Notes.
FortiSOAR
FortiManager 7.4.6supports the following versions of FortiSOAR: l 7.4.0 and later l 7.3.0 and later l 7.2.0 and later
FortiSRA
FortiManager 7.4.6 supports the following versions of FortiSRA: l 1.1.0 and later l 1.0.0 and later
FortiSwitch
FortiManager 7.4.6supports the following versions of FortiSwitch: l 5.2.0 and later l 5.0.0 and later l 4.3.0 and later
FortiTester
FortiManager 7.4.6 supports the following versions of FortiTester: l 7.3.0 and later l 7.2.0 and later l 7.1.0 and later
FortiToken
FortiManager 7.4.6supports the following versions of FortiToken: l 3.0.0 and later

FortiManager 7.4.6 Release Notes

32

Fortinet Inc.

Product Integration and Support
FortiWeb
FortiManager 7.4.6supports the following versions of FortiWeb: l 7.4.0 and later l 7.2.0 and later l 7.0.0 and later
Virtualization
FortiManager 7.4.6supports the following virtualization software:
Public Cloud l Amazon Web Service AMI, Amazon EC2, Amazon EBS l Alibaba Cloud l Google Cloud Platform l IBM Cloud l Microsoft Azure l Oracle Cloud Infrastructure
Private Cloud l Citrix XenServer 8.2 and later l OpenSource XenServer 4.2.5 l Microsoft Hyper-V Server 2016, 2019, and 2022 l Nutanix l AHV 20220304 and later l AOS 6.5 and later l NCC 4.6 and later l LCM 3.0 and later l RedHat 9.1 l Other versions and Linux KVM distributions are also supported l VMware ESXi versions 6.5 and later
Feature support
The following table lists FortiManager feature support for managed platforms.

FortiManager 7.4.6 Release Notes

33

Fortinet Inc.

Product Integration and Support

Platform

Configuration Management

FortiGate



FortiCarrier



FortiADC

FortiAnalyzer

FortiAP

*

FortiAuthenticator

FortiCache

FortiClient

FortiDDoS

FortiDeceptor

FortiExtender

*

FortiFirewall



FortiFirewall



Carrier

FortiMail

FortiProxy



FortiSandbox

FortiSOAR

FortiSwitch



FortiTester

FortiWeb

Syslog

Firmware Management

FortiGuard Update Services














 

      

VM License Activation
   


   


Reports   
  
  


Logging
 

   
    
 

*FortiManager can push FortiAP, FortiSwitch, and FortiExtender configuration to FortiGate. FortiGate then manages the FortiAP, FortiSwitch, or FortiExtender; they will not be directly managed by FortiManager.

Language support

The following table lists FortiManager language support information.

FortiManager 7.4.6 Release Notes

34

Fortinet Inc.

Product Integration and Support

Language

GUI

English



Chinese (Simplified)



Chinese (Traditional)



French



Japanese



Korean



Portuguese

Spanish

Reports        

To change the FortiManager language setting, go to System Settings > Admin > Admin Settings, in Administrative Settings > Language select the desired language on the drop-down menu. The default value is Auto Detect.
Russian, Hebrew, and Hungarian are not included in the default report languages. You can create your own language translation files for these languages by exporting a predefined language from FortiManager, modifying the text to a different language, saving the file as a different language name, and then importing the file into FortiManager. For more information, see the FortiManager Administration Guide.

Supported models

The following tables list which FortiGate, FortiCarrier, FortiDDoS, FortiAnalyzer, FortiMail, FortiSandbox, FortiSwitch, FortiWeb, FortiCache, FortiProxy, FortiAuthenticator, and other Fortinet product models and firmware versions can be managed by a FortiManager or send logs to a FortiManager running version 7.4.6.
Software license activated LENC devices are supported, if their platforms are in the supported models list. For example, support of FG-3200D indicates support of FG3200D-LENC.
This section contains the following topics:
l FortiGate models on page 36 l FortiGate special branch models on page 39 l FortiCarrier models on page 40 l FortiCarrier special branch models on page 42 l FortiADC models on page 43 l FortiAnalyzer models on page 44 l FortiAnalyzer-BigData models on page 44 l FortiAuthenticator models on page 45 l FortiCache models on page 45 l FortiDDoS models on page 45 l FortiDeceptor models on page 46

FortiManager 7.4.6 Release Notes

35

Fortinet Inc.

Product Integration and Support
l FortiFirewall models on page 46 l FortiFirewallCarrier models on page 47 l FortiMail models on page 48 l FortiPAM models on page 48 l FortiProxy models on page 48 l FortiSandbox models on page 49 l FortiSOAR models on page 49 l FortiSRA models on page 49 l FortiSwitch models on page 50 l FortiTester models on page 50 l FortiWeb models on page 51

FortiGate models

The following FortiGate models are released with FortiOS firmware. For information about supported FortiGate models on special branch releases of FortiOS firmware, see FortiGate special branch models on page 39.

Model

Firmware Version

FortiGate: FortiGate-40F, FortiGate-40F-3G4G, FortiGate-60E, FortiGate-60E-DSL,

7.4

FortiGate-60E-DSLJ, FortiGate-60E-POE, FortiGate-60F, FortiGate-61E, FortiGate-61F,

FortiGate-70F, FortiGate-71F, FortiGate-80E, FortiGate-80E-POE, FortiGate-80F, FortiGate-

80F-Bypass, FortiGate-80F-DSL, FortiGate-80F-POE, FortiGate-81E, FortiGate-81E-POE,

FortiGate-81F, FortiGate-81F-POE, FortiGate-90E, FortiGate-90G, FortiGate-91E, FortiGate-

91G, FortiGate-100F, FortiGate-101F, FortiGate-120G, FortiGate-121G, FortiGate-140E,

FortiGate-140E-POE, FortiGate-200E, FortiGate-200F, FortiGate-201E, FortiGate-201F,

FortiGate-300E, FortiGate-301E, FortiGate-400E, FortiGate-400F, FortiGate-400E-Bypass,

FortiGate-401E, FortiGate-401F, FortiGate-500E, FortiGate-501E, FortiGate-600E,

FortiGate-600F, FortiGate-601E, FortiGate-601F, FortiGate-800D, FortiGate-900D,

FortiGate-900G, FortiGate-901G, FortiGate-1000D, FortiGate-1000F, FortiGate-1001F,

FortiGate-1100E, FortiGate-1101E, FortiGate-1500D, FortiGate-1500DT, FortiGate-1800F,

FortiGate-1801F, FortiGate-2000E, FortiGate-2200E, FortiGate-2201E, FortiGate-2500E,

FortiGate-2600F, FortiGate-2601F, FortiGate-3000D, FortiGate-3000F, FortiGate-3001F,

FortiGate-3100D, FortiGate-3200D, FortiGate-3200F, FortiGate-3201F, FortiGate-3300E,

FortiGate-3301E, FortiGate-3400E, FortiGate-3401E, FortiGate-3500F, FortiGate-3501F,

FortiGate-3600E, FortiGate-3600E-DC, FortiGate-3601E, FortiGate-3700D, FortiGate-

3700F, FortiGate-3701F, FortiGate-3800D, FortiGate-3960E, FortiGate-3980E, FortiGate-

4200F, FortiGate-4201F, FortiGate-4400F, FortiGate-4401F, FortiGate-4800F, FortiGate-

4801F

FortiGate 5000 Series: FortiGate-5001E, FortiGate-5001E1

FortiGate 6000 Series: FortiGate-6000F, FortiGate-6001F, FortiGate-6300F, FortiGate6300F-DC, FortiGate-6301F, FortiGate-6301F-DC, FortiGate-6500F, FortiGate-6500F-DC, FortiGate-6501F, FortiGate-6501F-DC

FortiManager 7.4.6 Release Notes

36

Fortinet Inc.

Product Integration and Support

Model

Firmware Version

FortiGate 7000 Series: FortiGate-7000E, FortiGate-7000F, FortiGate-7030E, FortiGate7040E, FortiGate-7060E, FortiGate-7060E-8-DC, FortiGate-7081F, FortiGate-7081F-DC, FortiGate-7081F-2-DC, FortiGate-7121F, FortiGate-7121F-2, FortiGate-7121F-2-DC, FortiGate-7121F-DC
FortiGate DC: FortiGate-400F-DC, FortiGate-401F-DC, FortiGate-401E-DC, FortiGate800D-DC, FortiGate-900G-DC, FortiGate-1100E-DC, FortiGate-1500D-DC, FortiGate1800F-DC, FortiGate-1801F-DC, FortiGate-2201E-ACDC, FortiGate-2600F-DC, FortiGate2601F-DC, FortiGate-3000D-DC, FortiGate-3000F-DC, FortiGate-3000F-ACDC, FortiGate3001F-DC, FortiGate-3001F-ACDC, FortiGate-3100D-DC, FortiGate-3200D-DC, FortiGate3400E-DC, FortiGate-3401E-DC, FortiGate-3700D-DC, FortiGate-3800D-DC, FortiGate3960E-ACDC, FortiGate-3960E-DC, FortiGate-3980E-DC, FortiGate-4200F-DC, FortiGate4201F-DC, FortiGate-4400F-DC, FortiGate-4401F-DC
FortiWiFi: FWF-40F, FWF-40F-3G4G, FWF-60E, FWF-60E-DSL, FWF-60E-DSLJ, FWF60F, FWF-61E, FWF-61F, FWF-80F-2R, FWF-81F-2R, FWF-80F-2R-3G4G-DSL, FWF-81F2R-3G4G-DSL, FWF-81F-2R-3G4G-POE, FWF-81F-2R-POE
FortiGate VM: FortiGate-ARM64-AWS, FortiGate-ARM64-Azure, FortiGate-ARM64-GCP, FortiGate-ARM64-KVM, FortiGate-ARM64-OCI, FortiGate-VM64, FortiGate-VM64-ALI, FortiGate-VM64-AWS, FortiGate-VM64-Azure, FortiGate-VM64-GCP, FortiGate-VM64-HV, FortiGate-VM64-IBM, FortiGate-VM64-KVM, FortiGate-VM64-OPC, FortiGate-VM64RAXONDEMAND, FortiGate-VM64-Xen
FortiGate Rugged: FGR-60F, FGR-60F-3G4G, FGR-70F, FGR-70F-3G4G

FortiGate: FortiGate-40F, FortiGate-40F-3G4G, FortiGate-60E, FortiGate-60E-DSL,

7.2

FortiGate-60E-DSLJ, FortiGate-60E-POE, FortiGate-60F, FortiGate-61E, FortiGate-61F,

FortiGate-70F, FortiGate-70G, FortiGate-70G-POE, FortiGate-71F, FortiGate-71G,

FortiGate-71G-POE, FortiGate-80E, FortiGate-80E-POE, FortiGate-80F, FortiGate-80F-

Bypass, FortiGate-80F-DSL, FortiGate-80F-POE, FortiGate-81E, FortiGate-81E-POE,

FortiGate-81F, FortiGate-81F-POE, FortiGate-90E, FortiGate-90G, FortiGate-91E, FortiGate-

91G, FortiGate-100E, FortiGate-100EF, FortiGate-100F, FortiGate-101E, FortiGate-101F,

FortiGate-120G, FortiGate-121G, FortiGate-140E, FortiGate-140E-POE, FortiGate-200E,

FortiGate-200F, FortiGate-201E, FortiGate-201F, FortiGate-300E, FortiGate-301E,

FortiGate-400E, FortiGate-400E-Bypass, FortiGate-400F, FortiGate-401E, FortiGate-401F,

FortiGate-500E, FortiGate-501E, FortiGate-600E, FortiGate-600F, FortiGate-601E,

FortiGate-601F, FortiGate-800D, FortiGate-900D, FortiGate-900G, FortiGate-901G,

FortiGate-1000D, FortiGate-1000F, FortiGate-1001F, FortiGate-1100E, FortiGate-1101E,

FortiGate-1500D, FortiGate-1500DT, FortiGate-1800F, FortiGate-1801F, FortiGate-2000E,

FortiGate-2200E, FortiGate-2201E, FortiGate-2500E, FortiGate-2600F, FortiGate-2601F,

FortiGate-3000D, FortiGate-3000F, FortiGate-3001F, FortiGate-3100D, FortiGate-3200D,

FortiGate-3200F, FortiGate-3201F, FortiGate-3300E, FortiGate-3301E, FortiGate-3400E,

FortiGate-3401E, FortiGate-3500F, FortiGate-3501F, FortiGate-3600E, FortiGate-3601E,

FortiGate-3700D, FortiGate-3700F, FortiGate-3701F, FortiGate-3800D, FortiGate-3960E,

FortiGate-3980E, FortiGate-4200F, FortiGate-4201F, FortiGate-4400F, FortiGate-4401F,

FortiGate-4800F, FortiGate-4801F

FortiGate 5000 Series: FortiGate-5001E, FortiGate-5001E1

FortiManager 7.4.6 Release Notes

37

Fortinet Inc.

Product Integration and Support

Model

Firmware Version

FortiGate 6000 Series: FortiGate-6000F, FortiGate-6001F, FortiGate-6300F, FortiGate6300F-DC, FortiGate-6301F, FortiGate-6301F-DC, FortiGate-6500F, FortiGate-6500F-DC, FortiGate-6501F, FortiGate-6501F-DC
FortiGate 7000 Series: FortiGate-7000E, FortiGate-7000F, FortiGate-7030E, FortiGate7040E, FortiGate-7060E, FortiGate-7060E-8-DC, FortiGate-7081F, FortiGate-7081F-DC, FortiGate-7081F-2-DC, FortiGate-7121F, FortiGate-7121F-2, FortiGate-7121F-2-DC, FortiGate-7121F-DC
FortiGate DC: FortiGate-400F-DC, FortiGate-401F-DC, FortiGate-401E-DC, FortiGate800D-DC, FortiGate-900G-DC, FortiGate-1100E-DC, FortiGate-1500D-DC, FortiGate1800F-DC, FortiGate-1801F-DC, FortiGate-2201E-ACDC, FortiGate-2600F-DC, FortiGate2601F-DC, FortiGate-3000D-DC, FortiGate-3000F-DC, FortiGate-3000F-ACDC, FortiGate3001F-DC, FortiGate-3001F-ACDC, FortiGate-3100D-DC, FortiGate-3200D-DC, FortiGate3400E-DC, FortiGate-3401E-DC, FortiGate-3600E-DC, FortiGate-3700D-DC, FortiGate3800D-DC, FortiGate-3960E-ACDC, FortiGate-3960E-DC, FortiGate-3980E-DC, FortiGate4200F-DC, FortiGate-4201F-DC, FortiGate-4400F-DC, FortiGate-4401F-DC, FortiGate4800F-DC, FortiGate-4801F-DC
FortiWiFi: FWF-60E, FWF-60E-DSL, FWF-60E-DSLJ, FWF-60F, FWF-61E, FWF-61F, FWF-70G, FWF-71G, FWF-80F-2R, FWF-80F-2R-3G4G-DSL, FWF-81F-2R, FWF-81F-2R3G4G-DSL, FWF-81F-2R-3G4G-POE, FWF-81F-2R-POE
FortiGate VM: FortiGate-ARM64-AWS, FortiGate-ARM64-Azure, FortiGate-ARM64-GCP, FortiGate-ARM64-KVM, FortiGate-ARM64-OCI, FortiGate-VM64, FortiGate-VM64-ALI, FortiGate-VM64-AWS, FortiGate-VM64-Azure, FortiGate-VM64-GCP, FortiGate-VM64-HV, FortiGate-VM64-IBM, FortiGate-VM64-KVM, FortiGate-VM64-OPC, FortiGate-VM64RAXONDEMAND, FortiGate-VM64-XEN, FortiGate-VMX-Service-Manager
FortiOS-VM: FOS-VM64, FOS-VM64-HV, FOS-VM64-KVM, FOS-VM64-Xen
FortiGate Rugged: FGR-60F, FGR-60F-3G4G, FGR-70F, FGR-70F-3G4G

FortiGate: FortiGate-40F, FortiGate-40F-3G4G, FortiGate-60E, FortiGate-60E-DSL,

7.0

FortiGate-60E-DSLJ, FortiGate-60E-POE, FortiGate-60F, FortiGate-61E, FortiGate-61F,

FortiGate-70F, FortiGate-71F, FortiGate-80E, FortiGate-80E-POE, FortiGate-80F, FortiGate-

80F-Bypass, FortiGate-80F-POE, FortiGate-81E, FortiGate-81E-POE, FortiGate-81F,

FortiGate-81F-POE, FortiGate-90E, FortiGate-91E, FortiGate-100E, FortiGate-100EF,

FortiGate-100F, FortiGate-101E, FortiGate-101F, FortiGate-140E, FortiGate-140E-POE,

FortiGate-200E, FortiGate-200F, FortiGate-201E, FortiGate-201F, FortiGate-300D,

FortiGate-300E, FortiGate-301E, FortiGate-400D, FortiGate-400E, FortiGate-400E-Bypass,

FortiGate-400F, FortiGate-401E, FortiGate-401F, FortiGate-500D, FortiGate-500E,

FortiGate-501E, FortiGate-600D, FortiGate-600E, FortiGate-600F, FortiGate-601E,

FortiGate-601F, FortiGate-800D, FortiGate-900D, FortiGate-1000D, FortiGate-1100E,

FortiGate-1101E, FortiGate-1200D, FortiGate-1500D, FortiGate-1500DT, FortiGate-1800F,

FortiGate-1801F, FortiGate-2000E, FortiGate-2200E, FortiGate-2201E, FortiGate-2500E,

FortiGate-2600F, FortiGate-2601F, FortiGate-3000D, FortiGate-3000F, FortiGate-3001F,

FortiGate-3100D, FortiGate-3200D, FortiGate-3300E, FortiGate-3301E, FortiGate-3400E,

FortiGate-3401E, FortiGate-3500F, FortiGate-3501F, FortiGate-3600E, FortiGate-3601E,

FortiGate-3700D, FortiGate-3800D, FortiGate-3810D, FortiGate-3815D, FortiGate-3960E,

FortiGate-3980E, FortiGate-4200F, FortiGate-4201F, FortiGate-4400F, FortiGate-4401F,

FortiGate 5000 Series: FortiGate-5001D, FortiGate-5001E, FortiGate-5001E1

FortiManager 7.4.6 Release Notes

38

Fortinet Inc.

Product Integration and Support

Model

Firmware Version

FortiGate DC: FortiGate-400F-DC, FortiGate-401F-DC, FortiGate-401E-DC, FortiGate800D-DC, FortiGate-1100E-DC, FortiGate-1500D-DC, FortiGate-1800F-DC, FortiGate1801F-DC, FortiGate-2201E-ACDC, FortiGate-2600F-DC, FortiGate-2601F-DC, FortiGate3000D-DC, FortiGate-3000F-DC, FortiGate-3000F-ACDC, FortiGate-3001F-DC, FortiGate3001F-ACDC, FortiGate-3100D-DC, FortiGate-3200D-DC, FortiGate-3400E-DC, FortiGate3401E-DC, FortiGate-3600E-DC, FortiGate-3700D-DC, FortiGate-3800D-DC, FortiGate3810D-DC, FortiGate-3815D-DC, FortiGate-3960E-ACDC, FortiGate-3960E-DC, FortiGate3980E-DC, FortiGate-4200F-DC, FortiGate-4201F-DC, FortiGate-4400F-DC, FortiGate4401F-DC
FortiWiFi: FWF-60E, FWF-60E-DSL, FWF-60E-DSLJ, FWF-60F, FWF-61E, FWF-61F, FWF-80F-2R, FWF-81F-2R, FWF-81F-2R-3G4G-POE, FWF-81F-2R-POE
FortiGate VM: FortiGate-ARM64-AWS, FortiGate-ARM64-KVM, FortiGate-ARM64-OCI, FortiGate-VM64, FortiGate-VM64-ALI, FortiGate-VM64-AWS, FortiGate-VM64-Azure, FortiGate-VM64-GCP, FortiGate-VM64-HV, FortiGate-VM64-IBM, FortiGate-VM64-KVM, FortiGate-VM64-OPC, FortiGate-VM64-RAXONDEMAND, FortiGate-VM64-XEN, FortiGateVMX-Service-Manager
FortiOS-VM: FOS-VM64, FOS-VM64-HV, FOS-VM64-KVM, FOS-VM64-Xen
FortiGate Rugged: FGR-60F, FGR-60F-3G4G

FortiGate special branch models

The following FortiGate models are released on special branches of FortiOS. FortiManager version 7.4.6 supports these models on the identified FortiOS version and build number.
For information about supported FortiGate models released with FortiOS firmware, see FortiGate models on page 36.

FortiOS 7.2

FortiGate Model FortiGate-30G FortiGate-200G, FortiGate-201G FortiWiFi-30G

FortiOS Version 7.2.8 7.2.8 7.2.8

FortiOS Build 6390 6397 6390

FortiOS 7.0
FortiGate Model FortiGate-50G-DSL FortiGate-50G-SFP FortiGate-50G-SFP-POE

FortiOS Version 7.0.12 7.0.12 7.0.12

FortiOS Build 7353 7192 7257

FortiManager 7.4.6 Release Notes

39

Fortinet Inc.

Product Integration and Support

FortiGate Model

FortiOS Version

FortiGate-51G-SFP-POE

7.0.12

FortiGate-80F-DSL

7.0.15

FortiGate-90G, FortiGate-91G

7.0.15

FortiGate-120G, FortiGate-121G

7.0.15

FortiGate-900G, FortiGate-900G-DC, FortiGate-901G, FortiGate-901G-DC

7.0.15

FortiGate-1000F, FortiGate-1001F

7.0.15

FortiGate-3200F

7.0.15

FortiGate-3201F

7.0.15

FortiGate-3700F, FortiGate-3701F

7.0.15

FortiGate-4800F, FortiGate-4800F-DC, FortiGate-4801F, FortiGate-4801F-DC

7.0.15

FortiGate-6000F, FortiGate-6001F, FortiGate-6300F, FortiGate-6300F-DC, FortiGate-6301F, FortiGate-6301F-DC, FortiGate-6500F, FortiGate-6500F-DC, FortiGate-6501F, FortiGate-6501F-DC

7.0.15

FortiGate-7000E, FortiGate-7030E, FortiGate-7040E, FortiGate-7060E, FortiGate-7060E-8-DC

7.0.15

FortiGate-7000F, FortiGate-7081F, FortiGate-7081F-DC, FortiGate-7081F-2-DC, FortiGate-7121F, FortiGate-7121F-2, FortiGate-7121F-2-DC, FortiGate-7121F-DC

7.0.15

FortiGateRugged-70F, FortiGateRugged70F-3G4G

7.0.15

FortiWiFi-50G-5G

7.0.12

FortiWiFi-50G-DSL

7.0.12

FortiWiFi-50G-SFP

7.0.12

FortiWiFi-80F-2R-3G4G-DSL

7.0.15

FortiWiFi-81F-2R-3G4G-DSL

7.0.15

FortiCarrier models
The following FortiCarrier models are released with FortiCarrier firmware.

FortiOS Build 7257 7272 7288 7277 7266 7267 7278 7273 7286 7286 0247
0247
0247
7284 7192 7353 7192 7272 7272

FortiManager 7.4.6 Release Notes

40

Fortinet Inc.

Product Integration and Support

For information about supported FortiCarrier models on special branch releases of FortiCarrier firmware, see FortiCarrier special branch models on page 42.

Model

Firmware Version

FortiCarrier: FortiCarrier-2600F, FortiCarrier-2601F, FortiCarrier-3000D, FortiCarrier-3000F, 7.4 FortiCarrier-3001F, FortiCarrier-3100D, FortiCarrier-3200D, FortiCarrier-3200F, FortiCarrier3201F, FortiCarrier-3300E, FortiCarrier-3301E, FortiCarrier-3400E, FortiCarrier-3401E, FortiCarrier-3500F, FortiCarrier-3501F, FortiCarrier-3600E, FortiCarrier-3601E, FortiCarrier3700D, FortiCarrier-3700F, FortiCarrier-3701F, FortiCarrier-3800D, FortiCarrier-3960E, FortiCarrier-3980E, FortiCarrier-4200F, FortiCarrier-4201F, FortiCarrier-4400F, FortiCarrier4401F, FortiCarrier-4800F, FortiCarrier-4801F
FortiCarrier 5000 Series: FortiCarrier-5001E, FortiCarrier-5001E1
FortiCarrier 6000 Series: FortiCarrier-6000F, FortiCarrier-6001F, FortiCarrier-6300F, FortiCarrier-6300F-DC, FortiCarrier-6301F, FortiCarrier-6301F-DC, FortiCarrier-6500F, FortiCarrier-6500F-DC, FortiCarrier-65001F, FortiCarrier-6501F-DC
FortiCarrier 7000 Series: FortiCarrier-7000E, FortiCarrier-7000F, FortiCarrier-7030E, FortiCarrier-7040E, FortiCarrier-7060E, FortiCarrier-7060E-8-DC, FortiCarrier-7081F, FortiCarrier-7081F-DC, FortiCarrier-7081F-2-DC, FortiCarrier-7121F, FortiCarrier-7121F-2, FortiCarrier-7121F-2-DC, FortiCarrier-7121F-DC
FortiCarrier-DC: FortiCarrier-2600F-DC, FortiCarrier-2601F-DC, FortiCarrier-3000D-DC, FortiCarrier-3000F-DC, FortiCarrier-3000F-ACDC, FortiCarrier-3001F-DC, FortiCarrier3001F-ACDC, FortiCarrier-3100D-DC, FortiCarrier-3200D-DC, FortiCarrier-3400E-DC, FortiCarrier-3401E-DC, FortiCarrier-3600E-DC, FortiCarrier-3700D-DC, FortiCarrier-3800DDC, FortiCarrier-3960E-DC, FortiCarrier-3980E-DC, FortiCarrier-4200F-DC, FortiCarrier4201F-DC, FortiCarrier-4400F-DC, FortiCarrier-4401F-DC
FortiCarrier-VM: FortiCarrier-ARM64-AWS, FortiCarrier-ARM64-Azure, FortiCarrierARM64-GCP, FortiCarrier-ARM64-KVM, FortiCarrier-ARM64-OCI, FortiCarrier-VM64, FortiCarrier-VM64-ALI, FortiCarrier-VM64-AWS, FortiCarrier-VM64-Azure, FortiCarrierVM64-GCP, FortiCarrier-VM64-HV, FortiCarrier-VM64-KVM, FortiCarrier-VM64-IBM, FortiCarrier-VM64-OPC, FortiCarrier-VM64-Xen

FortiCarrier: FortiCarrier-2600F, FortiCarrier-2601F, FortiCarrier-3000D, FortiCarrier-3000F, 7.2 FortiCarrier-3001F, FortiCarrier-3100D, FortiCarrier-3200D, FortiCarrier-3200F, FortiCarrier3201F, FortiCarrier-3300E, FortiCarrier-3301E, FortiCarrier-3400E, FortiCarrier-3401E, FortiCarrier-3500F, FortiCarrier-3501F, FortiCarrier-3600E, FortiCarrier-3601E, FortiCarrier3700D, FortiCarrier-3700F, FortiCarrier-3701F, FortiCarrier-3800D, FortiCarrier-3960E, FortiCarrier-3980E, FortiCarrier-4200F, FortiCarrier-4201F, FortiCarrier-4400F, FortiCarrier4401F, FortiCarrier-4800F, FortiCarrier-4801F
FortiCarrier 5000 Series: FortiCarrier-5001E, FortiCarrier-5001E1
FortiCarrier 6000 Series: FortiCarrier-6000F, FortiCarrier-6001F, FortiCarrier-6300F, FortiCarrier-6300F-DC, FortiCarrier-6301F, FortiCarrier-6301F-DC, FortiCarrier-6500F, FortiCarrier-6500F-DC, FortiCarrier-65001F, FortiCarrier-6501F-DC
FortiCarrier 7000 Series: FortiCarrier-7000E, FortiCarrier-7000F, FortiCarrier-7030E, FortiCarrier-7040E, FortiCarrier-7060E, FortiCarrier-7060E-8-DC, FortiCarrier-7081F, FortiCarrier-7081F-DC, FortiCarrier-7081F-2-DC, FortiCarrier-7121F, FortiCarrier-7121F-2, FortiCarrier-7121F-2-DC, FortiCarrier-7121F-DC

FortiManager 7.4.6 Release Notes

41

Fortinet Inc.

Product Integration and Support

Model

Firmware Version

FortiCarrier-DC: FortiCarrier-2600F-DC, FortiCarrier-2601F-DC, FortiCarrier-3000D-DC, FortiCarrier-3000F-DC, FortiCarrier-3000F-ACDC, FortiCarrier-3001F-DC, FortiCarrier3001F-ACDC, FortiCarrier-3100D-DC, FortiCarrier-3200D-DC, FortiCarrier-3400E-DC, FortiCarrier-3401E-DC, FortiCarrier-3600E-DC, FortiCarrier-3700D-DC, FortiCarrier-3800DDC, FortiCarrier-3960E-DC, FortiCarrier-3980E-DC, FortiCarrier-4200F-DC, FortiCarrier4201F-DC, FortiCarrier-4400F-DC, FortiCarrier-4401F-DC
FortiCarrier-VM: FortiCarrier-ARM64-AWS, FortiCarrier-ARM64-Azure, FortiCarrierARM64-GCP, FortiCarrier-ARM64-KVM, FortiCarrier-ARM64-OCI, FortiCarrier-VM64, FortiCarrier-VM64-ALI, FortiCarrier-VM64-AWS, FortiCarrier-VM64-Azure, FortiCarrierVM64-GCP, FortiCarrier-VM64-HV, FortiCarrier-VM64-IBM, FortiCarrier-VM64-KVM, FortiCarrier-VM64-OPC, FortiCarrier-VM64-Xen

FortiCarrier: FortiCarrier-2600F, FortiCarrier-2601F, FortiCarrier-3000D, FortiCarrier-

7.0

3100D, FortiCarrier-3200D, FortiCarrier-3300E, FortiCarrier-3301E, FortiCarrier-3400E,

FortiCarrier-3401E, FortiCarrier-3500F, FortiCarrier-3501F, FortiCarrier-3600E, FortiCarrier-

3601E, FortiCarrier-3700D, FortiCarrier-3800D, FortiCarrier-3810D, FortiCarrier-3815D,

FortiCarrier-3960E, FortiCarrier-3980E

FortiCarrier 5000 Series: FortiCarrier-5001D, FortiCarrier-5001E, FortiCarrier-5001E1

FortiCarrier-DC: FortiCarrier-2600F-DC, FortiCarrier-2601F-DC, FortiCarrier-3000D-DC, FortiCarrier-3000F-DC, FortiCarrier-3000F-ACDC, FortiCarrier-3001F-DC, FortiCarrier3001F-ACDC, FortiCarrier-3100D-DC, FortiCarrier-3200D-DC, FortiCarrier-3400E-DC, FortiCarrier-3401E-DC, FortiCarrier-3600E-DC, FortiCarrier-3700D-DC, FortiCarrier-3800DDC, FortiCarrier-3810D-DC, FortiCarrier-3815D-DC, FortiCarrier-3960E-DC, FortiCarrier3980E-DC

FortiCarrier-VM: FortiCarrier-ARM64-AWS, FortiCarrier-ARM64-KVM, FortiCarrier-ARM64OCI, FortiCarrier-VM64, FortiCarrier-VM64-ALI, FortiCarrier-VM64-AWS, FortiCarrier-VM64Azure, FortiCarrier-VM64-GCP, FortiCarrier-VM64-HV, FortiCarrier-VM64-IBM, FortiCarrierVM64-KVM, FortiCarrier-VM64-OPC, FortiCarrier-VM64-Xen, FortiCarrier-ARM64-KVM

FortiCarrier special branch models

The following FortiCarrier models are released on special branches of FortiOS Carrier. FortiManager version 7.4.6 supports these models on the identified FortiOS Carrier version and build number.
For information about supported FortiCarrier models released with FortiOS Carrier firmware, see FortiCarrier models on page 40.

FortiCarrier 7.0

FortiCarrier Model FortiCarrier-3200F FortiCarrier-3201F

FortiCarrier Version 7.0.15 7.0.15

FortiCarrier Build 7278 7273

FortiManager 7.4.6 Release Notes

42

Fortinet Inc.

Product Integration and Support

FortiCarrier Model
FortiCarrier-3700F, FortiCarrier-3701F
FortiCarrier-4800F, FortiCarrier-4800F-DC, FortiCarrier-4801F, FortiCarrier-4801F-DC
FortiCarrier-6000F, FortiCarrier-6001F, FortiCarrier-6300F, FortiCarrier-6300F-DC, FortiCarrier-6301F, FortiCarrier-6301F-DC, FortiCarrier-6500F, FortiCarrier-6500F-DC, FortiCarrier-65001F, FortiCarrier-6501F-DC
FortiCarrier-7000E, FortiCarrier-7030E, FortiCarrier-7040E, FortiCarrier-7060E, FortiCarrier-7060E-8-DC
FortiCarrier-7000F, FortiCarrier-7081F, FortiCarrier-7081F-DC, FortiCarrier-7081F2-DC, FortiCarrier-7121F, FortiCarrier7121F-2, FortiCarrier-7121F-2-DC, FortiCarrier-7121F-DC

FortiCarrier Version 7.0.15 7.0.15 7.0.15
7.0.15
7.0.15

FortiCarrier Build 7331 7286 0247
0247
0247

FortiADC models

Model
FortiADC: FortiADC-100F, FortiADC-120F, FortiADC-200D, FortiADC-200F, FortiADC220F, FortiADC-300D, FortiADC-300F, FortiADC-400D, FortiADC-400F, FortiADC-420F, FortiADC-700D, FortiADC-1000F, FortiADC-1200F, FortiADC-1500D, FortiADC-2000D, FortiADC-2000F, FortiADC-2200F, FortiADC-4000D, FortiADC-4000F, FortiADC-4200F, FortiADC-5000F FortiADC VM: FortiADC-VM
FortiADC: FortiADC-100F, FortiADC-120F, FortiADC-200D, FortiADC-200F, FortiADC220F, FortiADC-300D, FortiADC-300F, FortiADC-400D, FortiADC-400F, FortiADC-700D, FortiADC-1000F, FortiADC-1200F, FortiADC-1500D, FortiADC-2000D, FortiADC-2000F, FortiADC-2200F, FortiADC-4000D, FortiADC-4000F, FortiADC-4200F, FortiADC-5000F FortiADC VM: FortiADC-VM

Firmware Version 7.4
7.1, 7.2

FortiManager 7.4.6 Release Notes

43

Fortinet Inc.

Product Integration and Support

FortiAnalyzer models

Model

Firmware Version

FortiAnalyzer: FortiAnalyzer-150G, FortiAnalyzer-300F, FortiAnalyzer-300G, FortiAnalyzer- 7.4 400E, FortiAnalyzer-800F, FortiAnalyzer-800G, FortiAnalyzer-810G, FortiAnalyzer-1000F, FortiAnalyzer-2000E, FortiAnalyzer-3000F, FortiAnalyzer-3000G, FortiAnalyzer-3500F, FortiAnalyzer-3500G, FortiAnalyzer-3510G, FortiAnalyzer-3700F, FortiAnalyzer-3700G, FortiAnalyzer-3900E
FortiAnalyzer VM: FortiAnalyzer-VM64, FortiAnalyzer-VM64-ALI, FortiAnalyzer-VM64AWS, FortiAnalyzer-VM64-AWS-OnDemand, FortiAnalyzer-VM64-Azure, FortiAnalyzerVM64-Azure-OnDemand, FortiAnalyzer-VM64-GCP, FortiAnalyzer-VM64-HV, FortiAnalyzerVM64-IBM, FortiAnalyzer-VM64-KVM, FortiAnalyzer-VM64-OPC, FortiAnalyzer-VM64-Xen

FortiAnalyzer: FortiAnalyzer-150G, FortiAnalyzer-300F, FortiAnalyzer-300G, FortiAnalyzer- 7.2 400E, FortiAnalyzer-800F, FortiAnalyzer-800G, FortiAnalyzer-810G, FortiAnalyzer-1000F, FortiAnalyzer-2000E, FortiAnalyzer-3000E, FortiAnalyzer-3000F, FortiAnalyzer-3000G, FortiAnalyzer-3500E, FortiAnalyzer-3500F, FortiAnalyzer-3500G, FortiAnalyzer-3510G, FortiAnalyzer-3700F, FortiAnalyzer-3700G, FortiAnalyzer-3900E
FortiAnalyzer VM: FortiAnalyzer-VM64, FortiAnalyzer-VM64-ALI, FortiAnalyzer-VM64AWS, FortiAnalyzer-VM64-AWS-OnDemand, FortiAnalyzer-VM64-Azure, FortiAnalyzerVM64-Azure-OnDemand, FortiAnalyzer-VM64-GCP, FortiAnalyzer-VM64-HV, FortiAnalyzerVM64-IBM, FortiAnalyzer-VM64-KVM, FortiAnalyzer-VM64-OPC, FortiAnalyzer-VM64-Xen

FortiAnalyzer: FortiAnalyzer-150G, FortiAnalyzer-200F, FortiAnalyzer-300F, FortiAnalyzer- 7.0 300G, FortiAnalyzer-400E, FortiAnalyzer-800F, FortiAnalyzer-800G, FortiAnalyzer-810G, FortiAnalyzer-1000F, FortiAnalyzer-2000E, FortiAnalyzer-3000E, FortiAnalyzer-3000F, FortiAnalyzer-3000G, FortiAnalyzer-3500E, FortiAnalyzer-3500F, FortiAnalyzer-3500G, FortiAnalyzer-3700F, FortiAnalyzer-3700G, FortiAnalyzer-3900E
FortiAnalyzer VM: FortiAnalyzer-VM64, FortiAnalyzer-VM64-ALI, FortiAnalyzer-VM64-ALIOnDemand, FortiAnalyzer-VM64-AWS, FortiAnalyzer-VM64-Azure, FortiAnalyzer-VM64Azure-OnDemand, FortiAnalyzer-VM64-GCP, FortiAnalyzer-VM64-GCP-OnDemand, FortiAnalyzer-VM64-HV, FortiAnalyzer-VM64-IBM, FortiAnalyzer-VM64-KVM, FortiAnalyzerVM64-OPC, FortiAnalyzer-VM64-Xen

FortiAnalyzer-BigData models
Model FortiAnalyzer-BigData: FortiAnalyzer-BigData-4500F FortiAnalyzer-BigData VM: FortiAnalyzer-BigData-VM64 FortiAnalyzer-BigData: FortiAnalyzer-BigData-4500F FortiAnalyzer-BigData VM: FortiAnalyzer-BigData-VM64

Firmware Version 7.2
7.0

FortiManager 7.4.6 Release Notes

44

Fortinet Inc.

Product Integration and Support

FortiAuthenticator models

Model
FortiAuthenticator: FAC-200E, FAC-300F, FAC-400E, FAC-800F, FAC-2000E, FAC3000E, FAC-3000F FortiAuthenticator VM: FAC-VM
FortiAuthenticator: FAC-200E, FAC-300F, FAC-400E, FAC-800F, FAC-2000E, FAC3000E, FAC-3000F FortiAuthenticator VM: FAC-VM
FortiAuthenticator: FAC-200D, FAC-200E, FAC-300F, FAC-400C, FAC-400E, FAC-800F, FAC-1000C, FAC-1000D, FAC-2000E, FAC-3000D, FAC-3000E, FAC-3000F FortiAuthenticator VM: FAC-VM
FortiAuthenticator: FAC-200D, FAC-200E, FAC-300F, FAC-400C, FAC-400E, FAC-800F, FAC-1000C, FAC-1000D, FAC-2000E, FAC-3000D, FAC-3000E FortiAuthenticator VM: FAC-VM

Firmware Version 6.6 6.5 6.4 6.3

FortiCache models

Model
FortiCache: FCH-400C, FCH-400E, FCH-1000C, FCH-1000D, FCH-3000C, FCH-3000D, FCH-3000E, FCH-3900E FortiCache VM:FCH-KVM, FCH-VM64
FortiCache: FCH-400C, FCH-400E, FCH-1000C, FCH-1000D, FCH-3000C, FCH-3000D, FCH-3900E FortiCache VM:FCH-VM64

Firmware Version 4.1, 4.2
4.0

FortiDDoS models
Model FortiDDoS: FortiDDoS-200F, FortiDDoS-1500F, FortiDDoS-2000F, FortiDDoS-3000F FortiDDoS VM: FortiDDoS-VM FortiDDoS: FortiDDoS-200F, FortiDDoS-1500F, FortiDDoS-2000F, FortiDDoS-3000F FortiDDoS VM: FortiDDoS-VM FortiDDoS: FortiDDoS-200F, FortiDDoS-1500F, FortiDDoS-2000F, FortiDDoS-3000F FortiDDoS VM: FortiDDoS-VM FortiDDoS: FortiDDoS-200F, FortiDDoS-1500F, FortiDDoS-2000F, FortiDDoS-3000F

Firmware Version 7.0 6.6 6.5 6.4

FortiManager 7.4.6 Release Notes

45

Fortinet Inc.

Product Integration and Support

Model
FortiDDoS VM: FortiDDoS-VM
FortiDDoS: FortiDDoS-200F, FortiDDoS-1500F, FortiDDoS-2000F FortiDDoS VM: FortiDDoS-VM
FortiDDoS: FortiDDoS-200B, FortiDDoS-400B, FortiDDoS-600B, FortiDDoS-800B, FortiDDoS-900B, FortiDDoS-1000B, FortiDDoS-1200B, FortiDDoS-1500E, FortiDDoS2000B, FortiDDoS-2000E

Firmware Version 6.3 5.6, 5.7

FortiDeceptor models
Model FortiDeceptor: FDC-100G, FDC-1000F, FDC-1000G FortiDeceptor Rugged: FDCR-100G FortiDeceptor VM: FDC-VM FortiDeceptor: FDC-1000F, FDC-1000G FortiDeceptor Rugged: FDCR-100G FortiDeceptor VM: FDC-VM

Firmware Version 5.0, 5.1, 5.2, 5.3, 6.0
4.3

FortiFirewall models

Some of the following FortiFirewall models are released on special branches of FortiFirewall firmware. FortiManager version 7.4.6 supports these models on the identified FortiFirewall firmware version and build number.

FortiFirewall 7.4

Model

Firmware Version

FortiFirewall: FortiFirewall-1801F, FortiFirewall-2600F, FortiFirewall-3001F, FortiFirewall- 7.4 3501F, FortiFirewall-3980E, FortiFirewall-4200F, FortiFirewall-4400F, FortiFirewall-4401F, FortiFirewall-4801F
FortiFirewall DC: FortiFirewall-3980E-DC, FortiFirewall-4200F-DC, FortiFirewall-4400F-DC, FortiFirewall-4401F-DC

FortiFirewall-VM: FortiFirewall-VM64, FortiFirewall-VM64-KVM

7.4

FortiManager 7.4.6 Release Notes

46

Fortinet Inc.

Product Integration and Support

FortiFirewall 7.2

Model
FortiFirewall: FortiFirewall-3980E, FortiFirewall-4200F, FortiFirewall-4400F, FortiFirewall4401F, FortiFirewall-4801F FortiFirewall DC: FortiFirewall-4200F-DC, FortiFirewall-4401F-DC FortiFirewall-VM: FortiFirewall-VM64, FortiFirewall-VM64-KVM

Firmware Version 7.2

FortiFirewall 7.0

Model

Firmware Version

FortiFirewall: FortiFirewall-3001F
FortiFirewall: FortiFirewall-3501F
FortiFirewall: FortiFirewall-3980E FortiFirewall DC: FortiFirewall-3980E-DC FortiFirewall-VM: FortiFirewall-VM64, FortiFirewall-VM64-KVM

7.0.10 7.0.10 7.0

Firmware Build (for special branch)
4955
4955

FortiFirewallCarrier models

Some of the following FortiFirewallCarrier models are released on special branches of FortiFirewallCarrier firmware. FortiManager version 7.4.6 supports these models on the identified FortiFirewallCarrier firmware version and build number.

Model
FortiFirewallCarrier: FortiFirewallCarrier-1801F, FortiFirewallCarrier-2600F, FortiFirewallCarrier-3501F, FortiFirewallCarrier-3980E, FortiFirewallCarrier-4200F, FortiFirewallCarrier-4400F, FortiFirewallCarrier-4401F FortiFirewallCarrier DC: FortiFirewallCarrier-1801F-DC, FortiFirewallCarrier-4200F-DC, FortiFirewallCarrier-4401F-DC FortiFirewallCarrier-VM: FortiFirewallCarrier-VM64, FortiFirewallCarrier-VM64-KVM
FortiFirewallCarrier: FortiFirewallCarrier-2600F, FortiFirewallCarrier-3980E, FortiFirewallCarrier-4200F, FortiFirewallCarrier-4400F, FortiFirewallCarrier-4801F FortiFirewallCarrier DC: FortiFirewallCarrier-4200F-DC FortiFirewallCarrier-VM: FortiFirewallCarrier-VM64, FortiFirewallCarrier-VM64-KVM
FortiFirewallCarrier-VM: FortiFirewallCarrier-VM64, FortiFirewallCarrier-VM64-KVM

Firmware Version 7.4
7.2 7.0

FortiManager 7.4.6 Release Notes

47

Fortinet Inc.

Product Integration and Support
FortiFirewall special branch models
Model FortiFirewallCarrier: FortiFirewallCarrier-1801F, FortiFirewallCarrier-4401F FortiFirewallCarrier: FortiFirewallCarrier-3001F FortiFirewallCarrier: FortiFirewallCarrier-3501F

Firmware Version 7.2.6

Firmware Build 4609

7.0.10 7.0.10

4955 4940

FortiMail models

Model
FortiMail: FE-200F, FE-400F, FE-900F, FE-2000E, FE-2000F, FE-3000E, FE-3000F, FE3200E FortiMail VM: FML-VM, FortiMail Cloud
FortiMail: FE-60D, FE-200D, FE-200E, FE-200F, FE-400E, FE-400F, FE-900F, FE-2000E, FE-2000F, FE-3000E, FE-3000F, FE-3200E FortiMail VM: FML-VM, FortiMail Cloud
FortiMail: FE-60D, FE-200D, FE-200E, FE-200F, FE-400E, FE-400F, FE-900F, FE-1000D, FE-2000E, FE-2000F, FE-3000D, FE-3000E, FE-3000F, FE-3200E FortiMail VM: FML-VM, FortiMail Cloud

Firmware Version 7.4
7.2
7.0

FortiPAM models
Model FortiPAM: FortiPAM-1000G, FortiPAM-3000G FortiPAM VM: FortiPAM-AWS, FortiPAM-Azure, FortiPAM-GCP, FortiPAM-HyperV, FortiPAM-KVM, FortiPAM-VM64

Firmware Version 1.0, 1.1, 1.2, 1.3, 1.4

FortiProxy models

Model
FortiProxy: FPX-400E, FPX-400G, FPX-2000E, FPX-2000G, FPX-4000E, FPX-4000G FortiProxy VM: FortiProxy-AliCloud, FortiProxy-AWS, FortiProxy-Azure, FortiProxy-GCP, FortiProxy-HyperV, FortiProxy-KVM, FortiProxy-OPC, FortiProxy-VM64
FortiProxy: FPX-400E, FPX-400G, FPX-2000E, FPX-2000G, FPX-4000E, FPX-4000G

Firmware Version 7.4
7.2

FortiManager 7.4.6 Release Notes

48

Fortinet Inc.

Product Integration and Support

Model
FortiProxy VM: FortiProxy-AliCloud, FortiProxy-AWS, FortiProxy-Azure, FortiProxy-GCP, FortiProxy-HyperV, FortiProxy-KVM, FortiProxy-VM64
FortiProxy: FPX-400E, FPX-400G, FPX-2000E, FPX-2000G, FPX-4000E, FPX-4000G FortiProxy VM: FortiProxy-AliCloud, FortiProxy-AWS, FortiProxy-Azure, FortiProxy-GCP, FortiProxy-HyperV, FortiProxy-KVM, FortiProxy-OPC, FortiProxy-VM64
FortiProxy: FPX-400E, FPX-2000E, FPX-4000E FortiProxy VM: FortiProxy-KVM, FortiProxy-VM64

Firmware Version 7.0 1.0, 1.1, 1.2, 2.0

FortiSandbox models

Model
FortiSandbox: FSA-500F, FSA-500G, FSA-1000D, FSA-1000F, FSA-1500G, FSA-2000E, FSA-3000D, FSA-3000E, FSA-3000F, FSA-3500D FortiSandbox DC: FSA-1000F-DC FortiSandbox-VM: FortiSandbox-AWS, FortiSandbox-Cloud, FSA-VM
FortiSandbox: FSA-500F, FSA-1000D, FSA-1000F, FSA-2000E, FSA-3000D, FSA-3000E, FSA-3000F, FSA-3500D FortiSandbox DC: FSA-1000F-DC FortiSandbox-VM: FortiSandbox-AWS, FortiSandbox-Cloud, FSA-VM
FortiSandbox: FSA-500F, FSA-1000D, FSA-1000F, FSA-2000E, FSA-3000D, FSA-3000E, FSA-3500D FortiSandbox DC: FSA-1000F-DC FortiSandbox-VM: FortiSandbox-AWS, FSA-VM

Firmware Version 4.2, 4.4
4.0
3.2

FortiSOAR models
Model FortiSOAR VM: FortiSOAR-VM

Firmware Version 7.2, 7.3, 7.4

FortiSRA models
Model FortiSRA: FortiSRA-1000G, FortiSRA-3000G FortiSRA-VM: FortiSRA-Azure, FortiSRA-HyperV, FortiSRA-KVM, FortiSRA-VM64

Firmware Version 1.0, 1.1

FortiManager 7.4.6 Release Notes

49

Fortinet Inc.

Product Integration and Support
FortiSwitch models
Model FortiController: FTCL-5103B, FTCL-5903C, FTCL-5913C FortiSwitch: FS-5003A, FS-5003B FortiController: FTCL-5103B FortiSwitch: FS-5003A, FS-5003B

Firmware Version 5.2 5.0
4.3

FortiTester models

Model
FortiTester: FortiTester-100F, FortiTester-2000D, FortiTester-2000E, FortiTester-2000F, FortiTester-2500E, FortiTester-3000E, FortiTester-3000F, FortiTester-4000E, FortiTester4000F FortiTester VM: FortiTester-VM, FortiTester-VM-ALI-BYOL, FortiTester-VM-ALI-PAYG, FortiTester-VM-AWS-BYOL, FortiTester-VM-AWS-PAYG, FortiTester-VM-AZURE-BYOL, FortiTester-VM-AZURE-PAYG, FortiTester-VM-GCP-BYOL, FortiTester-VM-GCP-PAYG, FortiTester-VM-IBM-BYOL, FortiTester-VM-IBM-PAYG, FortiTester-VM-KVM, FortiTesterVM-OCI-BYOL, FortiTester-VM-OCI-PAYG
FortiTester: FortiTester-100F, FortiTester-2000D, FortiTester-2000E, FortiTester-2000F, FortiTester-2500E, FortiTester-3000E, FortiTester-3000F, FortiTester-4000E, FortiTester4000F FortiTester VM: FortiTester-VM, FortiTester-VM-ALI-BYOL, FortiTester-VM-ALI-PAYG, FortiTester-VM-AWS-BYOL, FortiTester-VM-AWS-PAYG, FortiTester-VM-AZURE-BYOL, FortiTester-VM-AZURE-PAYG, FortiTester-VM-GCP-BYOL, FortiTester-VM-GCP-PAYG, FortiTester-VM-IBM-BYOL, FortiTester-VM-IBM-PAYG, FortiTester-VM-KVM, FortiTesterVM-OCI-BYOL, FortiTester-VM-OCI-PAYG
FortiTester: FortiTester-60F, FortiTester-100F, FortiTester-2000D, FortiTester-2000E, FortiTester-2000F, FortiTester-2500E, FortiTester-3000E, FortiTester-3000F, FortiTester4000E, FortiTester-4000F FortiTester VM: FortiTester-VM, FortiTester-VM-ALI-BYOL, FortiTester-VM-ALI-PAYG, FortiTester-VM-AWS-BYOL, FortiTester-VM-AWS-PAYG, FortiTester-VM-AZURE-BYOL, FortiTester-VM-AZURE-PAYG, FortiTester-VM-GCP-BYOL, FortiTester-VM-GCP-PAYG, FortiTester-VM-IBM-PAYG, FortiTester-VM-KVM, FortiTester-VM-OCI-BYOL, FortiTesterVM-OCI-PAYG

Firmware Version 7.3
7.2
7.1

FortiManager 7.4.6 Release Notes

50

Fortinet Inc.

Product Integration and Support

FortiWeb models

Model

Firmware Version

FortiWeb: FortiWeb-100D, FortiWeb-100E, FortiWeb-100F, FortiWeb-400C, FortiWeb-

7.4

400D, FortiWeb-400E, FortiWeb-400F, FortiWeb-600D, FortiWeb-600E, FortiWeb-600F,

FortiWeb-1000D, FortiWeb-1000E, FortiWeb-1000F, FortiWeb-2000E, FortiWeb-2000F,

FortiWeb-3000C, FortiWeb-3000CFSX, FortiWeb-3000D, FortiWeb-3000DFSX, FortiWeb-

3000E, FortiWeb-3000F, FortiWeb-3010E, FortiWeb-4000C, FortiWeb-4000D, FortiWeb-

4000E, FortiWeb-4000F

FortiWeb VM: FortiWeb-Azure, FortiWeb-Azure_OnDemand, FortiWeb-GCP, FortiWebGCP_OnDemand, FortiWeb-HyperV, FortiWeb-VM, FortiWeb-XENOpenSource, FortiWebXENServer

FortiWeb: FortiWeb-100D, FortiWeb-100E, FortiWeb-400C, FortiWeb-400D, FortiWeb-

7.2

400E, FortiWeb-600D, FortiWeb-600E, FortiWeb-1000D, FortiWeb-1000E, FortiWeb-1000F,

FortiWeb-2000E, FortiWeb-2000F, FortiWeb-3000C, FortiWeb-3000CFSX, FortiWeb-3000D,

FortiWeb-3000DFSX, FortiWeb-3000E, FortiWeb-3000F, FortiWeb-3010E, FortiWeb-4000C,

FortiWeb-4000D, FortiWeb-4000E, FortiWeb-4000F

FortiWeb VM: FortiWeb-Azure, FortiWeb-Azure_OnDemand, FortiWeb-GCP, FortiWebGCP_OnDemand, FortiWeb-HyperV, FortiWeb-VM, FortiWeb-XENOpenSource, FortiWebXENServer

FortiWeb: FortiWeb-100D, FortiWeb-100E, FortiWeb-400C, FortiWeb-400D, FortiWeb-

7.0

400E, FortiWeb-600D, FortiWeb-600E, FortiWeb-1000D, FortiWeb-1000E, FortiWeb-2000E,

FortiWeb-2000F, FortiWeb-3000C, FortiWeb-3000CFSX, FortiWeb-3000D, FortiWeb-

3000DFSX, FortiWeb-3000E, FortiWeb-3000F, FortiWeb-3010E, FortiWeb-4000C,

FortiWeb-4000D, FortiWeb-4000E, FortiWeb-4000F

FortiWeb VM: FortiWeb-Azure, FortiWeb-Azure_OnDemand, FortiWeb-GCP, FortiWebGCP_OnDemand, FortiWeb-HyperV, FortiWeb-VM, FortiWeb-XENOpenSource, FortiWebXENServer

FortiExtender MODEM firmware compatibility
See the FortiOS Release Notes for a list of MODEM firmware filename and version for each FortiExtender model and where in the world the MODEMs are compatible.

FortiManager 7.4.6 Release Notes

51

Fortinet Inc.

Compatibility with FortiOS Versions

This section highlights compatibility issues that administrators should be aware of in FortiManager 7.4.6. This includes providing the syntax diff between the fully supported versions of FortiOS and the newly released versions that may have objects changed, added, or removed. The differences listed apply to FortiOS, but not to FortiManager 7.4.6. Thus, administrators should be aware if they are using the related FortiOS version(s), platform(s), and object(s) listed in this section.
FortiOS versions will be added to this section as the syntax diff becomes available after the FortiOS release. For current support, see the FortiOS Compatibility Tool on the Fortinet Document Library.

FortiManager 7.4.6 and FortiOS 7.0.16 compatibility issues
This section identifies interoperability issues that have been identified with FortiManager 7.4.6 and FortiOS 7.0.16. FortiOS 7.0.16 includes syntax changes not supported by FortiManager 7.4.6.
When specific platforms are indicated, the syntax change applies to both the FortiGate and FortiCarrier platform for the model. For example, (4 platforms: 3980E,3960E) indicates FortiGate-3980E, FortiCarrier3980E, FortiGate-3960E, FortiCarrier-3960E.
The following objects were added in FortiOS 7.0.16. These objects can only be configured on the FortiOS device, and they cannot be configured from FortiManager 7.4.6.
(attr) system csf legacy-authentication Additional option changes in FortiOS 7.0.16. You must confirm these option changes do not conflict with options that you have set from FortiManager. For example, from FortiManager 7.4.6, you cannot use options that have been removed and you cannot set options that have been added.
switch-controller system tunnel-mode ++ 1 opts: moderate (110 platforms: excludes 5001E1,5001E)

FortiManager 7.4.6 and FortiOS 7.0.17 compatibility issues
This section identifies interoperability issues that have been identified with FortiManager 7.4.6 and FortiOS 7.0.17. FortiOS 7.0.17 includes syntax changes not supported by FortiManager 7.4.6.

FortiManager 7.4.6 Release Notes

52

Fortinet Inc.

Compatibility with FortiOS Versions
When specific platforms are indicated, the syntax change applies to both the FortiGate and FortiCarrier platform for the model. For example, (4 platforms: 3980E,3960E) indicates FortiGate-3980E, FortiCarrier3980E, FortiGate-3960E, FortiCarrier-3960E.
The following objects were added in FortiOS 7.0.17. These objects can only be configured on the FortiOS device, and they cannot be configured from FortiManager 7.4.6.
(attr) system csf legacy-authentication Additional option changes in FortiOS 7.0.17. You must confirm these option changes do not conflict with options that you have set from FortiManager. For example, from FortiManager 7.4.6, you cannot use options that have been removed and you cannot set options that have been added.
switch-controller system tunnel-mode ++ 1 opts: moderate (110 platforms: excludes 5001E1,5001E)
FortiManager 7.4.6 and FortiOS 7.2.11 compatibility issues
This section identifies interoperability issues that have been identified with FortiManager 7.4.6 and FortiOS 7.2.11.
The following compatibility issues are in addition to the "Compatibility issues with FortiOS 7.2.11" documented in Special Notices on page 12.
When specific platforms are indicated, the syntax change applies to both the FortiGate and FortiCarrier platform for the model. For example, (4 platforms: 3980E,3960E) indicates FortiGate-3980E, FortiCarrier3980E, FortiGate-3960E, FortiCarrier-3960E.
The following objects were added in FortiOS 7.2.11. These objects can only be configured on the FortiOS device, and they cannot be configured from FortiManager 7.4.6.
l (attr) system admin old-password (148 platforms: excludes 80F-2R-3G4G-DSL) l (attr) system npu dedicated-lacp-queue (43 platforms:
901G,600F,3701F,3500F,3200F,1000F,3501F,2600F,401F,1801F,3700F,400F,3001F,4200F,601 F,4401F,4400F,3000F,900G,2601F,1001F,3201F,4201F) l (attr) system password-policy login-lockout-upon-downgrade (148 platforms: excludes 80F2R-3G4G-DSL) l (attr) user radius require-message-authenticator (148 platforms: excludes 80F-2R-3G4GDSL) l (attr) vpn ssl web portal os-check-list minor-version The following objects were removed in FortiOS 7.2.11. These objects cannot be pushed from FortiManager 7.4.6 to FortiOS devices running 7.2.11.

FortiManager 7.4.6 Release Notes

53

Fortinet Inc.

Compatibility with FortiOS Versions
l (attr) system settings gui-endpoint-control (146 platforms: excludes 140E-POE,80F-2R3G4G-DSL,101E)
l (attr) system settings gui-endpoint-control-advanced (146 platforms: excludes 140EPOE,80F-2R-3G4G-DSL,101E)
The following default values changed in FortiOS 7.2.11. If you do not wish to use these default settings, you must update the setting in FortiManager and push to the FortiOS devices running 7.2.11.
l log tacacs+accounting filter cli-cmd-audit (enable -> disable) l log tacacs+accounting2 filter cli-cmd-audit (enable -> disable) l log tacacs+accounting3 filter cli-cmd-audit (enable -> disable) l system global ssh-kex-algo (diffie-hellman-group-exchange-sha256 curve25519-
sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 -> diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18sha512 diffie-hellman-group-exchange-sha256 curve25519-sha256@libssh.org ecdh-sha2nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521) l web-proxy global max-waf-body-cache-length (32 -> 1) l webfilter profile antiphish max-body-len (65536 -> 1024)
Additional option changes in FortiOS 7.2.11. You must confirm these option changes do not conflict with options that you have set from FortiManager. For example, from FortiManager 7.4.6, you cannot use options that have been removed and you cannot set options that have been added.
system global ssh-kex-algo ++ 3 opts: diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellmangroup18-sha512 (2 platforms: 90G,120G)
web-proxy explicit pref-dns-result ++ 2 opts: ipv4-strict ipv6-strict (2 platforms: 90G,120G)
Other changes in FortiOS 7.2.11. If a table size or integer range has changed in FortiOS 7.2.11, you are still restricted to the old table size or integer range in FortiManager.
switch-controller managed-switch tab-size (tag|tz): 0,8,0 -> 0,24,0 (1 platforms: 90G)
switch-controller system parallel-process int-range (tag|lmt): 1,8 -> 1,24 (1 platforms: 90G)
system csf group-password tag: mu -> None (2 platforms: 90G,120G)
system global faz-disk-buffer-size tag: lmt -> None (2 platforms: 90G,120G) tag: lsz -> None (2 platforms: 90G,120G)
web-proxy global max-waf-body-cache-length int-range (tag|lmt): 10,1024 -> 1,1024 (138 platforms: excludes 80F-2R-3G4G-DSL)

FortiManager 7.4.6 and FortiOS 7.4.7 compatibility issues

This section identifies interoperability issues that have been identified with FortiManager 7.4.6 and FortiOS 7.4.7.
When using FortiGate-1000/FortiCarrier-1000 or higher models, there are two table size changes to note:
router policy6 tab-size (tag|tz): 2048,2048,0 -> 5000,5000,0
router policy

FortiManager 7.4.6 Release Notes

54

Fortinet Inc.

Compatibility with FortiOS Versions tab-size (tag|tz): 2048,2048,0 -> 5000,5000,0

FortiManager 7.4.6 Release Notes

55

Fortinet Inc.

Resolved issues

The following issues have been fixed in 7.4.6. To inquire about a particular bug, please contact Customer Service & Support.
AP Manager

Bug ID 1076200
1081136

Description
Policy install fails due to FortiManager installs unexpected changes related to "<wifi_intf> address". FortiManager is trying to delete and create ssid interface subnet address after upgrade.

Device Manager

Bug ID 952422 1039591 1041440
1053194
1063635 1063835 1074717

Description
IPsec templates created by SDWAN Overlay does not create tunnels for all the underlay interfaces.
The Link Status entries are blank under the Interfaces >>> Network.
Some FortiGate platforms (FGT-40F & FGT-60F) do not support the "ip-managed-byfortiipam" and FortiGate refuses to take the configuration from FortiManager; hence users will be experiencing the install error.
If the "system interface speed" attribute is changed from the FortiManager, it may potentially cause an installation failure. Modifying the "system interface speed" is not currently supported on the FortiManager and must be done on the FortiGate side.
FortiManager does not support the "FortiWiFi-80F-2R-3G4G-DSL".
FortiManager ZTP installation to FortiGate versions 7.2.8 and lower may fail due to differing default "ssh-kex-algo" settings between FortiManager and FortiGate.
An error might be observed when the SD-WAN template health check name contains a space, displaying the following message: "Bad health check name...".

FortiManager 7.4.6 Release Notes

56

Fortinet Inc.

Resolved issues
Bug ID 1075052
1075281 1075747 1080414 1099824

Description
Occasionally, installations may fail on FortiGates in HA mode due to a "Serial number does NOT match" error. This can happen if the HA device's serial number on FortiManager does not immediately update after a failover.
Unable to add FortiAnalyzer to FortiManager when "fgfm-peercert-withoutsn" is enabled.
SD-WAN Monitor does not display the members under the SD-WAN Rules (Map View or Table View). This issue is most likely to occur when "priority-zone" is configured.
CSV import fails to set metadata variables due to old header format ("name").
FortiManager may push the ICAP and WAF profile configurations to low-end FortiGate models that do not support these features, potentially causing installation failures.

FortiSwitch Manager

Bug ID 1075021

Description Users with the "admin profile" rights cannot access the FortiSwitch Manager.

Others

Bug ID 998198 1003711
1058185 1075449 1078947

Description
When upgrading ADOM, the upgrade process fails with the following error: "invalid value - can not find import template 'XYZ' ".
During the FortiGate HA upgrade, both the primary and secondary FortiGates may reboot simultaneously, which can disrupt the network. This issue is more likely to occur in FortiGates that require disk checks, leading to longer boot times.
FortiProxy policies not imported if the policies have either internet service or IPv6 used in the source or destination.
Intermittent connection issues have been reported randomly when the FortiManager manages 1000+ FortiGates.
Repeatedly testing the URL rating on FortiManager (diagnose fmupdate test fgdurl-rating...) may cause the "fgdsvr daemon" to crash.

FortiManager 7.4.6 Release Notes

57

Fortinet Inc.

Resolved issues
Policy and Objects

Bug ID 978136
986256
991720 1029921 1071226 1074686 1076659
1077964 1079678 1082548

Description
Occasionally, installation may fail due to an error message, "Waiting for another session", which prevents policies from being installed from FortiManager. During this issue, the following message may also appear: "Blocked by session id(XYZ) username(n/a)". This issue may be caused by a signal loss between the child and parent security console processes, leading the parent process to continue waiting for a copy result.
When creating the application list on the FortiManager, if the Category ID is set to 33 or 34, the installation does not display any errors. However, these invalid categories cannot be set on the FortiGate. Consequently, the assigned application list entry will be created without a specific category and will default to the "block" action. This behavior may cause network interruptions.
FortiManager still has an option to enable the "match-vip" through the policy package for "allow" policies. However, this is not supported anymore on the FortiGates.
Under the "Web Application Firewall" security profiles, users are unable to disable the signatures through the GUI.
Policy Lookup is not showing result as highlighted when the sections are not expended.
FortiManager fails to import NAC policies.
When policy package configured with policy block, installation to multiple devices may have copy fail errors if combined length of the Policy Block name and Policy name is greater than 35 characters and if the total number of such policies exceeds 1000.
After ZTNA server real server address type changes from FQDN to IP, the policy installation may fail; FortiManager pushes ZTNA server config with wrong order.
FortiManager does not provide any warning when there is a "deny all" policy in the middle of a Policy Package. This can be still seen on the "task monitor".
Address type FQDN is missing DNS resolve domain name function feature.

Script

Bug ID 976873

Description
Running "exe fmpolicy print-adom-package-assignment Global 1" command terminates the CLI/SSH session.

FortiManager 7.4.6 Release Notes

58

Fortinet Inc.

Resolved issues
System Settings

Bug ID 1047252
1063040

Description
Incorrect warning message displayed in FortiManager GUI during upgrade from Feature build to Mature build.
Unable to import a local certificate into FortiManager. This issue may occur if the certificate is encrypted with a newer OpenSSL version that FortiManager does not yet support.

Common Vulnerabilities and Exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID 1020280 1055002 1093573

CVE references
FortiManager 7.4.6 is no longer vulnerable to the following CVE Reference: l CVE-2024-33504
FortiManager 7.4.6 is no longer vulnerable to the following CVE Reference: l CVE-2024-3596
FortiManager 7.4.6 is no longer vulnerable to the following CVE Reference: l CVE-2024-52962

FortiManager 7.4.6 Release Notes

59

Fortinet Inc.

Known issues

Known issues are organized into the following categories: l New known issues l Existing known issues
To inquire about a particular bug or to report a bug, please contact Fortinet Customer Service & Support.

New known issues

The following issues have been identified in version 7.4.6.

Device Manager

Bug ID 1079654 1080940
1091441 1110780
1129574

Description
Firewall address entries are incorrectly generated when creating a bridge/mesh-type SSID.
In an IPSEC tunnel template, deleting an IPSEC tunnel that is not the last one in the template causes the configuration of the last remaining tunnel to disappear when you revisit the template.
Managed FortiAnalyzer is not available in dropdown menu in System Template in Log Settings.
FortiManager does not allow creating the local-in policy with SD-WAN zone. Workaround: Delete the local-in policy from policy package and use CLI template instead to add the policy.
Unable to restrict Firmware upgrade via Admin Profile.

FortiSwitch Manager

Bug ID 1026433
1097467

Description
When navigating to FortiSwitch Manager > FSW VLAN > "BUILD-VLAN" and enabling the DHCP Server, the Advanced options are missing the filename field.
There is a mismatch in the per-VDOM limit between the Managed FortiSwitch on the FortiManager and the actual FortiGate, causing a copy failure error when installing the configuration. So far, this issue has been observed on the FGT-90G.

FortiManager 7.4.6 Release Notes

60

Fortinet Inc.

Known issues

Policy & Objects

Bug ID 969923 1101436 1106646
1114832

Description
The View Mode button, which is used to check the interface in Pair View, is missing in the Firewall Policy under Policy Packages.
The sni-server-cert-check cannot be disabled on SSL-SSH inspection profile for ftps, pop3s, and smtps.
When attempting to configure a local-in policy on FortiManager using ISDB objects as the source, the following error is encountered: "Attribute 'srcaddr' MUST be set when internetservice-src-name is set".
Any addition/modification in Application and Filter Overrides for Application profile doesn't show up in the install preview. Workaround: 1. Print out the ADOM application list objects using the following CLI:
execute fmpolicy print-adom-object <ADOMInQuestion> "application list" <ProfileName>
For example, execute fmpolicy print-adom-object root "application list" <ProfileName>
2. Save it as CLI template and assign it to device(s). 3. Then do the install; FortiManager will install the "Application and Filter Overrides" to the
FortiGates.

Others
Bug ID 1103008 1111686 1114809
1117603 1126662

Description
Not able to edit DNS Filter profile in FortiProxy ADOM.
FortiManager's GUI may crash with the error "Oops! Sorry, an unexpected error has occurred." when downloading a backup or accessing the "Last Script Run" option under Device Database.
After upgrading the FMG using the "Upgrade Image via FortiGuard" feature, the FortiManager JSON API login may fail, leading to service disruptions. This issue is important for FortiPortal and other FortiManager API clients. Workaround: If the JSON API login failure is observed, reboot the FortiManager.
Some compatibility issues have been encountered with FortiOS 7.4.7. Please review FortiManager 7.4.6 and FortiOS 7.4.7 compatibility issues on page 54.
In a FortiGate HA setup running on the public cloud platform, the FortiManager attempts to install changes on static routes, which may cause routes to be deleted after an HA failover.

FortiManager 7.4.6 Release Notes

61

Fortinet Inc.

Known issues
Services
Bug ID 1116120

Description
When the FortiGuard Web Filter and Email Filter services are enabled, the usage of the root filesystem ("rootfs") gradually increases until it reaches 100%. This may affect the performance of other functions on the FortiManager, and it will be more noticeable when the FortiManager is operating with a smaller memory size. Workaround: Public FortiGuard Web Filter service can be used or disable FortiGuard Web Filter and Email Filter service and delete its database by using the following commands, then reboot the FortiManager.
config fmupdate service set query-antispam disable set query-antivirus disable set query-filequery disable set query-iot disable set query-iot-collection disable set query-iot-vulnerability disable set query-outbreak-prevention disable set query-webfilter disable end
diagnose fmupdate fgd-del-db <Database-category-type>
For example: diagnose fmupdate fgd-del-db wf

System Settings

Bug ID 1115464

Description
When any interfaces have the serviceaccess feature enabled (fgtupdates, fclupdates, and webfilter-antispam), changing the IP address on the desired interfaces may not immediately affect the listing port for that IP. As a result, the user might not be able to access the GUI using the newly configured IP address (assuming default port 443 is being used). Workaround: 1. Set a new IP address on the desired interface. 2. Unset the serviceaccess on any ports. 3. After confirming access to the GUI, reconfigure the serviceaccess.

FortiManager 7.4.6 Release Notes

62

Fortinet Inc.

Known issues

VPN Manager

Bug ID 1084696

Description
If users reopen the IPsec Tunnel template and close it without making any changes, FortiManagermight still display the following error message in the install log: "Error: VPN IPsec phase1-interface psksecret...Minimum psksecret length is 6..."

Existing known issues

The following issues have been identified in a previous version of FortiManager and remain in FortiManager 7.4.6.

AP Manager

Bug ID 1032762
1041445 1050466 1083224

Description
Since FortiOS 7.4.4 now supports the selection of multiple 802.11 protocols and has trimmed the band options, importing FortiOS 7.4.3 AP profiles may result in some bands and channels being un-matched or unset.
The AP attributes do not automatically update in the AP Manager.
The 802.11ax-5g AP profile is missing for all FortiAPs that support WiFi 6.
FortiManager attempts to install 'port1-mode > bridge-to-wan' when 'Override LAN Port' is enabled and 'LAN Port Bridge' is set to 'Bridge to LAN'.

Device Manager

Bug ID 932579 973365
974925

Description
Assigning a BGP template is purging the previously existing BGP config from the target FortiGates.
FortiManager does not display the IP addresses of FortiGate interfaces configured with DHCP addressing mode. Workaround: Disable Addressing Mode from DHCP to Manual in FortiManager Device DB, then retrieve from FortiGate and IP will be updated successfully.
The NTP Server setting may not display the correct configuration. This issue might occur on managed devices running FortiOS version 7.4.2 or higher. Workaround:

FortiManager 7.4.6 Release Notes

63

Fortinet Inc.

Known issues Bug ID 1004220 1041265 1063850 1073479 1085385 1086303
1089102 1094451 1099270 1103166 1115014 1119280 1122481
1124171
1124431 1126321

Description
Edit NTP server setting under CLI configuration.
The SD-WAN Overlay template creates route-map names that exceed the 35-character limit.
While using a Device Blueprint to apply a pre-run cli template and creating model devices via CSV import, the pre-run does not show applied in Device Manager.
FortiManager is attempting to install a "PRIVATE KEY" with every installation, even after retrieving the config.
Install preview does not function properly.
Importing SD-WAN configuration previously completed on a FortiGate as a provisioning template in FortiManager returns "Response format error" message
An installation error may occur when binding and installing the created VLAN interface to the software switch due to ip-managed-by-fortiipam. No issues have been observed with the installation of VLAN interfaces or physical interfaces. Workaround: Use a script (CLI template) on device database on FortiManager to unset "ip-managed-byfortiipam" under wan interface (every time before installation), and then install the configuration.
Metadata variable value cannot be emptied (value deleted) after a value has been set via Edit Variable Mapping for a model device
If the Timezone field in the System Template is left blank, FortiManager may apply its default timezone and overwrite the existing timezone on the FortiGates.
Unable to upgrade of FortiGate HA devices via Firmware Templates.
Installation wizard might get stuck at 50% if the device has Jinja CLI template assigned.
FortiManager fails to install SSID configuration in FortiGate when captive portal is enabled with error "Must set selected-usergroups".
Firmware Template assignment does not work properly.
When a FortiGate HA failover occurs, making any changes to the SD-WAN configuration on the FortiGate HA may cause FortiManager to attempt to purge the firewall policies on the device during the installation (Install Device Settings (only)).
FortiManager retrieves the device configuration from the ZTP FortiGate after the image upgrade is performed, due to the 'Enforce Firmware' feature. This action erases all settings in the device database on the FortiManager side, and as a result, AutoLink installation will not be completed successfully. Workaround:
config fmupdate fwm-setting set retrieve disable
end
Installation failure due to 'sslvpn os check' syntax error.
When creating a VLAN with "LAN" Role, an object is created even if "Create Address Object

FortiManager 7.4.6 Release Notes

64

Fortinet Inc.

Known issues Bug ID 1136080

Description
Matching Subnet" is disabled.
Starting from version 7.2.11, FortiGate devices use a different password type for the administrator's password field. FortiManager versions released before this change cannot verify the administrator password when installing to a FortiGate, which may result in an installation failure.

FortiSwitch Manager

Bug ID 1077058 1089719 1110598

Description
IPv4 allow access for VLAN interface over Per-Device Mapping cannot be set.
FortiSwitch 110G is not supported.
Unable to add per device mapping config for FortiSwitch VLAN. Workaround: A script can be run on "Policy Package or ADOM Database". The following is an example:
config fsp vlan edit "vlan200" set vlanid 200 set _dhcp-status disable config interface set ip-managed-by-fortiipam disable end
config dynamic_mapping edit "FortiGate-80F-POE"-"root" set _dhcp-status disable config interface set vlanid 20 end
config dhcp-server set dns-service default set ntp-service default set timezone-option default end next end next end

FortiManager 7.4.6 Release Notes

65

Fortinet Inc.

Known issues
Others
Bug ID 1009848 1019261
1049457 1052341 1065593 1066240 1081941 1091375 1124007 1136765 1142559

Description
Support ISE distributed deployment: PAN/MnT Nodes up to 2, Pxgrid Nodes up to 4.
Unable to upgrade ADOM from 7.0 to 7.2, due to the error "Do not support urlfilter-table for global scope webfilter profile". Workaround: Run the following script against the ADOM DB:
config webfilter profile edit "g-default" config web unset urlfilter-table end next
end
When FortiAnalyzer is added as a managed device, users may encounter an issue in the FortiManager GUI when expanding the log details.
Not able to select Address type MAC in SD-WAN rule source address.
Not able upgrade ADOM.
The FortiSASE connector is supported only on FortiManager VM platforms and is not supported on FortiManager hardware models.
When UTM-Profile gets added to a FortiProxy policy FortiManager generates invalid config.
When the install is waiting for a session, it neither updates nor completes the task.
OK button does not save the settings. Navigate to Device Manager > Device & Groups > Right click on FGT > Firmware upgrade > Schedule > Custom > Define time > Press OK.
The PxGrid connector should support Fully Qualified Domain Names (FQDN).
When attempting to upload the firmware image from FortiGuard, FortiManager returns the following error "Code: -1, Invalid image". This issue has primarily been observed on FortiGate hardware platforms running special build firmware versions, where the image contains an encrypted MBR--such as on the FortiGateRugged-70G-5G-Dual, FortiGateRugged-70G, FortiGateRugged-50G-5G, FortiWiFi-70G models.

Policy & Objects

Bug ID 845022 968149 1025012

Description SDN Connector failed to import objects from VMware VSphere. Unable to export policy package to CSV. Configuring the SSL/SSH inspection profile may result in the following error: "The server certificate replacement mode cannot support category exemptions."

FortiManager 7.4.6 Release Notes

66

Fortinet Inc.

Known issues Bug ID
1030914 1057228
1070800 1073463 1078598 1079128 1086603 1086705 1101919 1108159 1109061 1119299
1130475 1131552 1139220

Description
Workaroud: 1. Modify the SSL/SSH inspection profiles. 2. Toggle from Protecting SSL Server to Multiple Clients Connecting to multiple Servers. 3. Remove the categories from the Exempt from SSL inspection list. 4. Toggle back to Protecting SSL Server and click OK. 5. Then install.
Copy and paste function in GUI removes name of the policy rule and adds unwanted default security profiles (SSL-SSH no-inspection and default PROTOCOL OPTIONS).
Importing the SDN Objects, with multiple tags, will add multiple entries listed as SDN objects; when clients add anything into the filters section, browser immediately redirects to an error page showing: "Oops! Sorry, an unexpected error has occurred"
FortiManager is attempting to install the "cli-cmd-audit" command on a FortiGate running version 7.2.8, which does not support this command, leading to an installation error.
Installation is failed with error, "VIP entry cannot be moved when central-nat is disabled."
Unable to import policy due to issues related to the protocol-options feature.
ZTNA Server Per-Device Mapping may display a copy error failure if a new per-device mapping is created without specifying the object interface.
Unable to create local-in policy with ISDB objects
Multicast policy table Log column shows wrong info and right-click update does not work properly.
Changes to a Virtual IP global settings are not applied when a per-device mapping exists.
IP address list for an ISDB object differ between FortiManager and managed FortiGate while both devices have installed the same ISDB definitions.
FortiManager tries to set the inspection mode for the deny policies.
Installation fails due to syntax compatibility issues between FortiManager and FortiGate version 7.2.10. Specifically, the issue occurs when FortiManager attempts to unset the servercert in the vpn ssl settings.
FortiManager starts appending an ID to the global-label associated with policies. This can cause a problem if global labels are being used to group policies together.
Import fails due to an invalid remote certificate, even though the certificate is available on the FortiGate.
FortiManager does not prevent users to mix ISDB and destination addresses.

FortiManager 7.4.6 Release Notes

67

Fortinet Inc.

Known issues
Script
Bug ID 931088 1085374

Description
Unable to delete VDOMs using the FortiManager script. Interfaces remain in the device database, causing the installation to fail. FortiManager does not support exporting the TCL scripts via CLI.

Services
Bug ID 1108706
1104925 1138715

Description
When updating query service packages from the global anycast server (globalupdate.fortinet.net), medium-sized IoTS packages may encounter checksum errors. These errors can prevent the proper updating of SPAM and URL databases, potentially impacting the FortiManager's FortiGuard Services.
FortiManager in Cascade mode may fail to display accurate license information/contracts for FortiGate retrieved from the FDS server, as it is not listed in the FortiGate's authlist.
FortiManager does not auto-download the FortiClient signature from FortiGuard.

System Settings

Bug ID 1108205 1081463
1121608

Description
ADOM lock override does notwork even though lock-preempt has been enabled.
The encrypted backup file cannot be easily correlated with the backup details, as the date and time are not included.
Under the Dashboard > Sessions widget, the number of current sessions presented in FortiManager does not match the number of sessions in the FortiGate.

VPN Manager

Bug ID 1084434
1090636

Description
Unable to rename the address objects (either source and/or destination) used in Phase2 quick selectors in IPSec VPN without an installation error.
Unable to edit VPN community due to the following error message: "vpnmgr/vpntable/: cannot be edited".

FortiManager 7.4.6 Release Notes

68

Fortinet Inc.

Appendix A - FortiGuard Distribution Servers (FDS)

In order for FortiManager to request and retrieve updates from FDS, and for FortiManager to serve as an FDS, please configure the necessary settings on all devices between FortiManager and FDS, or between FortiManager and FortiGate devices based on the following items:
l FortiManager accesses FDS for antivirus and attack updates through TCP/SSL port 443. l If there is a proxy server between FortiManager and FDS, FortiManager uses port 443 to communicate with the
proxy server in tunnel mode by default. Alternatively, you can configure web proxy to use proxy mode using port 80. For more information, see the FortiManager Administration Guide.

FortiGuard Center update support

You can configure FortiManager as a local FDS to provide FortiGuard updates to other Fortinet devices and agents on your network. The following table lists which updates are available per platform:

Platform FortiGate FortiADC FortiCache FortiCarrier FortiClient FortiDeceptor FortiDDoS FortiEMS FortiMail FortiProxy FortiSandbox FortiSOAR FortiSRA FortiTester

Update Service              

Query Service 
 
  

VM License Activation    
 
  
 

FortiManager 7.4.6 Release Notes

69

Fortinet Inc.

Appendix A - FortiGuard Distribution Servers (FDS)

Platform FortiWeb FortiPAM

Update Service  

Query Service

VM License Activation  

FortiManager 7.4.6 Release Notes

70

Fortinet Inc.

Appendix B - Default and maximum number of ADOMs supported

This section identifies the supported number of ADOMs for FortiManager hardware models and virtual machines.

Hardware models

FortiManager supports a default number of ADOMs based on hardware model.
Some hardware models support an ADOM subscription license. When you purchase an ADOM subscription license, you increase the number of supported ADOMs. For example, you can purchase an ADOM subscription license for the FMG3000G series, which allows you to use up to a maximum of 8000 ADOMs.
Other hardware models do not support the ADOM subscription license. For hardware models that do not support the ADOM subscription license, the default and maximum number of ADOMs is the same.

FortiManager Platform
200G Series 300F Series 400G Series 1000F Series 2000E Series 3000G Series 3700G Series

Default number of ADOMs 30 100 150 1000 1200 4000 10,000

ADOM license support?
 

Maximum number of ADOMs 30 100 150 1000 1200 8000 12,000

For FortiManager F series and earlier, the maximum number of ADOMs is equal to the maximum devices/VDOMs as described in the FortiManager Data Sheet.

Virtual Machines

FortiManager VM subscription license includes five (5) ADOMs. Additional ADOMs can be purchased with an ADOM subscription license.

FortiManager 7.4.6 Release Notes

71

Fortinet Inc.

Appendix B - Default and maximum number of ADOMs supported
For FortiManager VM perpetual license, the maximum number of ADOMs is equal to the maximum number of Devices/VDOMs listed in the FortiManager Data Sheet.
l FortiManager-VM subscription licenses are fully stackable. l For FortiManager-VM perpetual licenses, only the number of managed devices is
stackable.

FortiManager 7.4.6 Release Notes

72

Fortinet Inc.

www.fortinet.com
Copyright© 2025 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet's Chief Legal Officer, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet's internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.


madbuild