FortiNAC-F 7.4.0-Release Notes
FortiNAC-F 7.4.0-Release Notes
Version F 7.4.0
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTIGUARD LABS
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
Change log 4
Overview of Version F 7.4.0 5
Notes 5
Supplemental Documentation 5
Version Information 5
Upgrade Requirements 7
Upgrade path 8
Hardware support 9
Pre-upgrade Procedures 10
Pre-upgrade procedure (FNC-M-xx/FNC-CA-xx) 10
Pre-upgrade procedure (FNC-MX-xx/FNC-CAX-xx) 12
Compatibility 14
Agents 14
Web Browsers for the Administration UI 14
Operating Systems Supported Without an Agent 14
What's new 15
Version F 7.4.0 15
HSTS default enabling 16
Resolved Issues Version F 7.4.0 17
Known Issues Version F 7.4.0 22
Device Support Considerations 24
Device Support 25
System Update Settings 27
Numbering Conventions 28
Change log
Notes
l Starting from 9.1.0, FortiNAC uses a new GUI format. FortiNAC cannot go backwards to a previous
version. Snapshots should always be taken on virtual appliances prior to upgrade.
Post 9.4, FortiNAC re-versioned. The first release after re-versioning is F 7.2.0.
Hence, the order of releases is:
FortiNAC 9.1 > FortiNAC 9.2 > FortiNAC 9.4 > FortiNAC F 7.2 > FortiNAC F 7.4
l Prior to upgrading, review the FortiNAC Known Anomalies posted in the Fortinet Document Library.
l If using agents or configured for High Availability, additional steps may be required after upgrade for proper
functionality. See Upgrade Instructions and Considerations posted in the Fortinet Document Library.
l For upgraded FortiNAC devices running CentOS, use the sysinfo command; for newly deployed FortiNAC
F 7.4+, issue get system status within the admin CLI.
l To review software version information via CLI:
Appliances running on CentOS: type sysyinfo
Appliances running on FortiNAC-OS: type get system status
l For upgrade procedure, see Upgrade Instructions and Considerations posted in the Fortinet Document
Library.
Supplemental Documentation
Version Information
These Release Notes contain additional Enhancements, Device Support, and features. Unique numbering is
used for the various components of the product. The software version and Agent version supplied with this
release are listed below.
Version: F 7.4.0
Agent Version:
l MacOS — 10.7.1.9
l Windows — 9.4.3.100
Agents ship independent of product. For the latest Agent release notes, please see the
Agent release notes.
l MacOS — 10.7.1.9
l Windows — 9.4.3.100
A newer Persistent Agent may be required to support certain antivirus and anti-spyware products. Refer to the
Agent Release Notes in the Fortinet Document Library.
Firmware version represents a collection of system services and operating system features imaged on to the
appliance before it leaves manufacturing. The firmware image cannot be updated by a Fortinet customer.
Services within the image are updated by Fortinet or a certified Fortinet Partner in appliance maintenance
packages released as new more robust and secure versions of services become available.
Note: Upgrading software versions does not change firmware nor does it automatically require an upgrade to
the Persistent Agent. Newer Persistent Agents are not compatible with older software versions unless that
capability is specifically highlighted in the corresponding release notes.
Upgrade Requirements
Ticket # Description
931408 Under Portal > Portal SSL the "Disabled" option is no longer available as
of FortiNAC v9.4.5, vF7.2.5 and vF7.4.0. If using this option, install SSL
certificates in the Portal target prior to upgrade. See Certificate
management in the Administration Guide.
FortiNAC License Key Upgrading to this release requires the FortiNAC License. It is possible,
however unlikely, older appliances may not have this specific type of
license key installed. In such cases, an error will display during the
upgrade. For additional details, see KB article
https://community.fortinet.com/t5/FortiNAC/Troubleshooting-Tip-Upgrade-
fails-with-license-requirement-error/ta-p/246324
892856 High Availibility and FortiNAC Manager Environments: The following are
required as of 7.2.2:
Key files containing certificates are installed in all FortiNAC servers.
License keys with certificates were introduced on January 1st 2020.
Appliances registered after January 1st should have certificates. To
confirm, login to the UI of each appliance and review the System Summary
Dashboard widget (Certificates = Yes). If there are no certificates, see
Importing License Key Certificates in the applicable FortiNAC Manager
Guide.
Allowed serial numbers: Due to enhancements in communication between
FortiNAC servers, a list of allowed FortiNAC appliance serial numbers must
be set. This can be configured prior to upgrade to avoid communication
interruption. For instructions, see What's New.
885056 All devices managed by FortiNAC must have a unique IP address. This
includes FortiSwitches in Link Mode: Managed FortiSwitch interface IP
addresses must be unique. Otherwise, they will not be properly managed
by FortiNAC and inconsistencies may occur. This is also noted in the
FortiSwitch Integration reference manual.
Upgrade path
Important notice
Version 9.1.7 may directly upgrade to 7.x, without any intermediary steps.
However, Version 9.1.6 must follow this path:
9.1.6 > 9.2.6 > 7.x
Hardware support
Pre-upgrade Procedures
Enhancements were made to the communication method between FortiNAC servers for security. Due to this
change, all servers must have additional configuration in order to communicate. The following procedure should
be done prior to upgrade to prevent communication interruption.
Follow the instructions for the appropriate appliance:
l Pre-upgrade procedure (FNC-M-xx/FNC-CA-xx): FortiNAC appliances running on CentOS
l Pre-upgrade procedure (FNC-MX-xx/FNC-CAX-xx): FortiNAC appliance running on FortiNAC-OS
If 'certificates = []' or there is not a 'certificates' entry listed at all, keys with certificates must be
installed. See Importing License Key Certificates in the FortiNAC Manager Guide.
2. Compile the allowed serial number list. In a text file (Notepad, etc), document the serial numbers of each
appliance. Serial numbers can be obtained in the following ways:
l Customer Portal (https://support.fortinet.com)
l System Summery Dashboard widget in the Administration UI of each appliance
l CLI of each appliance using licensetool command
Example:
FortiNAC Manager A (primary) & B (secondary)
FortiNAC-CA servers A (primary) & B (secondary)
FortiNAC-CA server C
Example
globaloptiontool -name security.allowedserialnumbers -setRaw "FNVM-Mxxxxxxx1,FNVM-
Mxxxxxxx2,FNVM-CAxxxxx4,FNVM-CAxxxxx5,FNVM-CAxxxxx6"
Example
> globaloptiontool -name security.allowedserialnumbers
Warning: There is no known option with name: security.allowedserialnumbers
122 security.allowedserialnumbers: FNVM-Mxxxxxxx1,FNVM-Mxxxxxxx2,FNVM-
CAxxxxx4,FNVM-CAxxxxx5,FNVM-CAxxxxx6
Example
globaloptiontool -name security.allowedserialnumbers -setRaw "FNVM-Mxxxxxxx1,FNVM-
Mxxxxxxx2,FNVM-CAxxxxx4,FNVM-CAxxxxx5,FNVM-CAxxxxx6"
Hit <ENTER>
b. Paste the globaloptiontool command from the previous step.
Note:
l The message "Warning: There is no known option with name: security.allowedserialnumbers" may
appear. This is normal.
l In High Availability configurations, only the Primary Server need to have the command entered.
Database replication will copy the configuration to the Secondary Server. Using the above example,
CLI configuration would be applied to Manager A.
Example
> globaloptiontool -name security.allowedserialnumbers -setRaw "FNVM-
Mxxxxxxx1,FNVM-Mxxxxxxx2,FNVM-CAxxxxx4,FNVM-CAxxxxx5,FNVM-CAxxxxx6"
Warning: There is no known option with name: security.allowedserialnumbers
New option added
Example
> globaloptiontool -name security.allowedserialnumbers
Warning: There is no known option with name: security.allowedserialnumbers
122 security.allowedserialnumbers: FNVM-Mxxxxxxx1,FNVM-Mxxxxxxx2,FNVM-
CAxxxxx4,FNVM-CAxxxxx5,FNVM-CAxxxxx6
<wait 30 seconds>
startupNAC
Compatibility
FortiNAC Product releases are not backwards compatible. It is not possible to go from a newer release to any
older release.
Example: 7.2.0.0035 cannot be downgraded to any other release.
Agents
FortiNAC Agent Package releases 5.x are compatible with FortiNAC Product release F 7.4.0. Compatibility of
Agent Package versions 4.x and below with FortiNAC F 7.4.0 is not guaranteed.
Many of the views in FortiNAC are highly dependent on JavaScript. The browser used directly impacts the
performance of these views. It is recommended that you choose a browser with enhanced JavaScript
processing.
iOS for iPad iOS for iPhone iOS for iPod Linux
What's new
Version F 7.4.0
Radius CoA
Complete support for RADIUS Change of Authorization (CoA) with custom attributes (AVPairs).
l Full support for CoA messages as well as the standard "Packet of Disconnect.”
l Ability to create a custom change of authorization profile which includes the required AVPairs / standard or
vendor specific attributes to be sent in the CoA request message. This will allow the administrator to force a
port bounce via RADIUS CoA message.
l Change of Authorization profile is assigned to the logical network.
See the RFC5176 CoA/Disconnect Message Cookbook.
Support for an EduRoam environment with FortiNAC to create an authentication process for visitors from
different institutions.
See the EduRoam Cookbook.
RADIUS Service Proxy Support / Deprecate existing (Legacy) Proxy
RADIUS service now supports the ability to proxy authentication requests and accounting packets to another
server by creating a server configuration in the Virtual Servers tab of type 'Proxy'.
In pre-7.4 releases, the FortiNAC server itself would listen for and forward RADIUS packets rather than the
RADIUS service. This has been deprecated. However, it can still be configured in the 'Legacy Proxy' tab.
SFTP
New SFTP backup feature provides an alternative to FTP backup that allows you to backup FortiNAC
configuration by adding a layer of security to the process.
The current FortiNAC appliances are built based on a Dell OEM hardware running with CentOS 7. FortiNAC
CentOS 7 is coming to end-of-life by June 2024. In the near future, FortiNAC releases will only be available on
FortiNAC-OS .
See the Hardware Migration Guide.
Agent enhancements
Device integration
FortiNAC provides network visibility (where endpoints connect) and manages network access for wireless
endpoints connecting to Access Points managed by the Arista Cloud Wireless Controller. FortiNAC supports
individual SSID configuration and management for this device.
See the Arista Cloud Wireless Integration Reference Manual.
HSTS for the Admin GUI is enabled by default in versions 9.4.5+, 7.2.4+, and 7.4.0+.
l 9.4.5
l F 7.2.5
Ticket # Description
990531 Migration script fails to bundle on Control and Application server pairs
configured for High Availability.
955711 Guest account creation does not retain some account data.
901925 Removing profile mapping operation deletes the admin user account.
858184 Custom subject line for Self Registration Request sent to sponsor does not
reflect custom text.
810574 Unable to scan using Dissolvable agent when scan configuration label
contains non-US-ASCII characters.
972884 Config backup file taken before the FortiNAC factory reset cannot be
restored after factory reset, and vice versa.
909376 FortiNAC-OS CLI: Unable to tail named.log file in CLI due to permissions.
907413 Include get hardware status and get system status in grab-log-snapshot.
896471 Licensetool is not correctly reporting the license level from the NCM.
845008 Grab-log-snapshot should collect more master log files than the two
collected.
Ticket # Description
881899 FortiNAC is unable to resolve hostnames unless they are fully qualified
domain names (FQDNs).
986049 FortiSwitch MAC Trap Notifications not mapping to the correct switch port.
956436 FortiNAC doesn't work as RADIUS proxy properly when integrated with
NEC-QX switch.
954103 After FortiGate power cycle, FortiNAC shows incorrect port state for
FortiSwitches (FortiLink) once the device is pingable again.
914193 Issues with Brocade switch - not seeing all VLANs and hence unable to set
VLANs in model.
912128 FortiNAC is not sending CoA to Meraki MS switch on host state changes.
900284 Juniper switches are taking longer than they should to make changes.
881650 HP J9776A 2530-24G Switch - uplink ports are not properly displayed in
Ports view.
874363 FortiGate VPN user not consistently retaining firewall tag when multiple
connected adapters exist on the endpoint.
Ticket # Description
981854 Registration Requests view is visible for admin users that do not have Host
Registration Requests permissions.
969091 Admin with System Administrator profile cannot delete another user in the
UI with Base license.
969037 In the Adapters view in Ports tab, PA status will show the green tick when
the agent hasn’t checked in.
951938 Admin Profile for Guest Permissions can see other accounts.
902533 Modifying port name value via port properties that include '&' generates
'amp;' in port name.
894165 Test Device Profiling Rule results in 'Rule Does Not Match' if rule name
contains a double space.
893561 Load CLI Configuration error when navigating to System > Scheduler.
890988 Device View in Inventory does not load for users with 'Network Devices-
>Access' read only permissions.
890929 Unable to restart server after uploading new license key through GUI.
890015 Can't edit the syslog files, 'filter values consisting of only alphanumeric
characters'.
887470 Domain with single character between dots in multiple dot domains results
in error when adding to allowed domains.
884077 Guests & Contractors - Modifying a Guest account with 'Can view
passwords:' permission disabled generates error.
883989 Default attribute for Phone is incorrect when adding an AD server to LDAP
settings.
835149 Host role cannot be modified for endpoint registered as device in host and
inventory view from within inventory/topology view.
Ticket # Description
833305 Guest account password is unmasked on badge when user does not have
password viewing permissions.
919953 Enhance MSIntune Integration to query MSIntune API for a specific host
on-demand. For details, see:
https://docs.fortinet.com/document/fortinac-f/7.4.0/mdm-
integration/825384/microsoft-intune
878836 Intune MDM Integration 'Invalid Audience' when using an App registration in
the Azure Government cloud.
992236 Device Profiling rule with WINRM method not matching properly.
982765 Proxy Radius validation and test and save function result in RADIUS reject
due to incorrect password attribute.
901236 Radius Authentication rejecting with network access policy setup with
Direct configuration.
882265 FortiNAC is not sending the correct serial number field to FortiAnalyzer.
Ticket # Description
877942 Performance issues related to Firewall Session table growing too large.
987991 "This Host name contained characters not allowed in host names" appears
if the length of host.host in csv file is 2 characters.
980366 Unable to connect to Admin GUI on secondary after starting secondary GUI
service.
896150 Interfaces not properly mapped when installing FortiNAC-OS KVM image.
Ticket # Description
999354 Host remains isolated due to delay in Agent reporting external network
connectors.
996251 FortiNAC-F is unable to profile PXE boot host since it does not build
profiling/fingeprint entries from DHCP PXE boot packets.
994775 FortiNAC doesn't change the FortiGate/FortiSwitch port mode from 802.1x
to Normal and vice-versa.
1002475 Unable to scan using Dissolvable Agent with spaces in scan name.
998758 Captive Portal Authentication Failure message "Custom text" not taking
effect when customized via Portal Configuration.
988244 "Portal" and "Persistent Agent" SSL certificates not included in Control and
Application Server pair to FortiNAC-OS server migrations.
972501 Syslog messages are not sent to new external log server until restart of
services is preformed.
962235 Can't schedule a task in scheduler to start at 00:00:00 or any time with 00
as the hour.
974270 Non fabric root FortiGate does not have dynamic tags after firmware
update.
970135 Unchecking System > FSSO communication returns "There was an error
processing this request" when saving.
951419 HTTPS Status 500 - Internal Server Error attempting to access model
config from right click context menu.
964841 Users & Hosts > Hosts GUI does not allow selection of bulk hosts in view.
827499 Show system interface does not accurately display port1/port2 IP sub
Interfaces on FortiNAC-OS appliances.
Ticket # Description
Workaround: Navigate to System > Config Wizard > Summary or run the
following commands in the CLI:
execute enter-shell
ip addr
827283 The Roaming Guest Logical Network is missing from the Model
Configuration of FortiGate and possibly from other vendors.
Ticket # Description
730221 Stacked Meraki switches currently not supported. If required, contact sales
or support to submit a New Feature Request (NFR).
679230 Aruba 9012-US currently not supported.If required, contact sales or support
to submit a New Feature Request (NFR).
7680531 Ubiquiti Gen2 Unifi switches (example: USW-16-POE) are currently not
supported. If required, contact sales or support to submit a New Feature
Request (NFR).
At this time, integration with Cisco 1852i Controller is not supported due to
the device's limited CLI and SNMP capability. For details, see related KB
article 189545.
At this time, Fortinet does not support wired port management for the Cisco
702W. The access point does not provide the management capabilities
required.
At this time, Fortinet is not able to support the Linksys LAPN600 Wireless-
N600 Dual Band Access Point.
Device models for Avaya 4800 switches (and potentially other related
models) only support SSH. Device models for Avaya Ethernet Routing
Switches only support Telnet. Contact Support if the alternate protocol is
required.
Device Support
l 9.4.5
l 9.2.8
Ticket # Description
981176 Intelligent IEC 61850-3 28-port rack mount managed Gigabit Ethernet
switch with 4 slots.
Ticket # Description
FortiAP-U431F
Cisco IOS Software, S5700 Software (S5700-UNIVERSALK9-M), Version
15.2(6)E2a
HP Comware Platform Software, Software Version 5.20.99, Release
2110P02 HP 3600-24 v2 EI Switch
1620-24G Switch Software Version 5.20.99, Release 1113
Arista Networks EOS version 4.30.4M running on an Arista Networks CCS-
720DT-48S-2
Brocade Communications Systems, Inc. ICX7250-24, IronWare Version
08.0.30fT213
CBS350-48FP-4X 48-Port Gigabit PoE Stackable Managed Switch with
10G Uplinks
Juniper Networks, Inc. ex4100-f-12p Ethernet Switch, kernel JUNOS
22.3R2-S2.9
Cisco IOS Software [Dublin], Catalyst L3 Switch Software (CAT9K_IOSXE)
Aruba Instant On 1930 24G Class4 PoE 4SFP/SFP+ 370W Switch JL684B
924265 Huawei Versatile Routing Platform Software VRP (R) software, Version
8.100
Cambium cnPilot E400 Access Point
Huawei Versatile Routing Platform Software VRP (R) Software, Version
5.170
Aruba Instant On 1830 24G 12p Class4 PoE 2SFP 195W Switch JL813A
S5710-28C-EI Huawei Versatile Routing Platform Software VRP (R)
software,Version 5.110
Huawei AR2220 Huawei Versatile Routing Platform Software VRP
1. In the FortiNAC Administrative UI, navigate to System > Settings > Updates > System.
2. Update the appropriate fields to configure connection settings for the download server.
Field Definition
3. When the download settings have been entered, click Save Settings.
Numbering Conventions
l Release Notes pertain to a certain version of the product. Release Notes are revised as needed. The Rev
letter increments accordingly. For example, updating the Release Notes from Rev C to Rev D indicates
changes in the Release notes only -- no changes were made to the product.